Hamida Seba

ORCID: 0000-0003-0670-815X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Graph Neural Networks
  • Graph Theory and Algorithms
  • Security in Wireless Sensor Networks
  • Complex Network Analysis Techniques
  • Energy Efficient Wireless Sensor Networks
  • Mobile Ad Hoc Networks
  • Data Management and Algorithms
  • Network Security and Intrusion Detection
  • Graph Labeling and Dimension Problems
  • Opportunistic and Delay-Tolerant Networks
  • Opinion Dynamics and Social Influence
  • Advanced Graph Theory Research
  • graph theory and CDMA systems
  • Cryptography and Data Security
  • Vehicular Ad Hoc Networks (VANETs)
  • Energy Harvesting in Wireless Networks
  • Web Data Mining and Analysis
  • Advanced Authentication Protocols Security
  • Service-Oriented Architecture and Web Services
  • Graph theory and applications
  • Advanced Image and Video Retrieval Techniques
  • Anomaly Detection Techniques and Applications
  • Air Traffic Management and Optimization
  • Caching and Content Delivery
  • IPv6, Mobility, Handover, Networks, Security

Centre National de la Recherche Scientifique
2015-2025

LabEx PERSYVAL-Lab
2014-2025

Université Claude Bernard Lyon 1
2016-2025

Laboratoire d'Informatique en Images et Systèmes d'Information
2016-2025

Institut National des Sciences Appliquées de Lyon
2022-2025

Université de Technologie de Compiègne
2004-2007

Bioingénierie et Dynamique Microbienne aux Interfaces Alimentaires
2006

Heuristics and Diagnostics for Complex Systems
2003-2005

École Nationale Supérieure d'Informatique
2003

The backbone extraction process is pivotal in expediting analysis and enhancing visualization network applications. This study systematically compares seven influential statistical hypothesis-testing edge filtering methods (Disparity Filter (DF), Polya Urn (PF), Marginal Likelihood (MLF), Noise Corrected (NC), Enhanced Configuration Model (ECM), Global Statistical Significance (GloSS), Locally Adaptive Network Sparsification (LANS)) across diverse networks. A similarity reveals that...

10.1371/journal.pone.0316141 article EN cc-by PLoS ONE 2025-01-03

10.1007/s41060-024-00711-w article EN International Journal of Data Science and Analytics 2025-01-04

Advanced Persistent Threats (APTs) represent a significant challenge in cybersecurity due to their sophisticated and stealthy nature. Traditional Intrusion Detection Systems (IDS) often fall short detecting these multi-stage attacks. Recently, Graph Neural Networks (GNNs) have been employed enhance IDS capabilities by analyzing the complex relationships within networked data. However, existing GNN-based solutions are hampered high false positive rates substantial resource consumption. In...

10.48550/arxiv.2501.02981 preprint EN arXiv (Cornell University) 2025-01-06

Abstract Networks are essential for analyzing complex systems. However, their growing size necessitates backbone extraction techniques aimed at reducing while retaining critical features. In practice, selecting, implementing, and evaluating the most suitable method may be challenging. This paper introduces , a Python package designed assessing performance of in weighted networks. Its comparison framework is standout feature . Indeed, tool incorporates state-of-the-art techniques....

10.1038/s41598-023-42076-3 article EN cc-by Scientific Reports 2023-10-09

Data on how Stone Age communities conceived domestic and utilitarian structures are limited to a few examples of schematic non-accurate representations various-sized built spaces. Here, we report the exceptional discovery up-to-now oldest realistic plans that have been engraved stones. These engravings from Jordan Saudi Arabia depict ‘desert kites’, humanmade archaeological mega-traps dated at least 9,000 years ago for oldest. The extreme precision these is remarkable, representing gigantic...

10.1371/journal.pone.0277927 article EN cc-by PLoS ONE 2023-05-17

10.1016/j.future.2017.04.005 article EN Future Generation Computer Systems 2017-04-14

Securing a wireless communication has generally vital importance, particularly when this is in hostile environment like sensor networks (WSNs). The problem how to create cryptographic keys between nodes ensure secure communications. Limited resources of make public key cryptosystem such as RSA not feasible. So, most solutions rely on symmetric cryptosystem. In paper, we propose new management scheme based cryptography which well adapted the specific properties WSNs. evaluation our solution...

10.1155/2010/910695 article EN cc-by EURASIP Journal on Wireless Communications and Networking 2010-08-30
Coming Soon ...