Wadii Boulila

ORCID: 0000-0003-2133-0757
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Remote-Sensing Image Classification
  • Network Security and Intrusion Detection
  • Anomaly Detection Techniques and Applications
  • Remote Sensing in Agriculture
  • Advanced Malware Detection Techniques
  • Land Use and Ecosystem Services
  • IoT and Edge/Fog Computing
  • COVID-19 diagnosis using AI
  • Chaos-based Image/Signal Encryption
  • Advanced Steganography and Watermarking Techniques
  • Geochemistry and Geologic Mapping
  • Remote Sensing and Land Use
  • Video Surveillance and Tracking Methods
  • Data Management and Algorithms
  • Date Palm Research Studies
  • Automated Road and Building Extraction
  • Cloud Computing and Resource Management
  • Constraint Satisfaction and Optimization
  • Artificial Intelligence in Healthcare and Education
  • Artificial Intelligence in Healthcare
  • Smart Agriculture and AI
  • AI in cancer detection
  • Advanced Neural Network Applications
  • Blockchain Technology Applications and Security
  • Energy Efficient Wireless Sensor Networks

Prince Sultan University
2021-2025

Manouba University
2016-2025

Northeastern University
2024

Taibah University
2018-2021

ORCID
2020

Institut Mines-Télécom
2008-2017

Satimo (France)
2009-2016

IMT Atlantique
2013

Laboratoire Traitement et Communication de l’Information
2013

Laboratoire des Sciences et Techniques de l’Information de la Communication et de la Connaissance
2011

Abstract Medical images possess significant importance in diagnostics when it comes to healthcare systems. These contain confidential and sensitive information such as patients’ X-rays, ultrasounds, computed tomography scans, brain images, magnetic resonance imaging. However, the low security of communication channels loopholes storage systems hospitals or medical centres put these at risk being accessed by unauthorized users who illegally exploit them for non-diagnostic purposes. In...

10.1007/s11277-021-08584-z article EN cc-by Wireless Personal Communications 2021-05-19

A brain tumour is one of the major reasons for death in humans, and it tenth most common type that affects people all ages. However, if detected early, treatable types tumours. Brain tumours are classified using biopsy, which not usually performed before definitive surgery. An image classification technique diseases important accelerating treatment process avoiding surgery errors from manual diagnosis by radiologists. The advancement technology machine learning (ML) can assist radiologists...

10.3390/e24060799 article EN cc-by Entropy 2022-06-08

The Vision Transformer (ViT) architecture has been remarkably successful in image restoration. For a while, Convolutional Neural Networks (CNN) predominated most computer vision tasks. Now, both CNN and ViT are efficient approaches that demonstrate powerful capabilities to restore better version of an given low-quality format. In this study, the efficiency restoration is studied extensively. architectures classified for every task Seven tasks considered: Image Super-Resolution, Denoising,...

10.3390/s23052385 article EN cc-by Sensors 2023-02-21

The evolution of wireless and mobile communication from 0G to the upcoming 5G gives rise data sharing through Internet. This transfer via open public networks are susceptible several types attacks. Encryption is a method that can protect information hackers hence confidential be secured cryptosystem. Due increased number cyber attacks, encryption has become an important component modern-day communication. In this article, new image algorithm presented using chaos theory dynamic substitution....

10.1109/access.2020.3012912 article EN cc-by IEEE Access 2020-01-01

Visual selective image encryption can both improve the efficiency of algorithm and reduce frequency severity attacks against data.In this article, a new form is proposed based on keys derived from Deoxyribonucleic Acid (DNA) plaintext image.The scheme results in chaotic visual order to make ensure that robust secure various kinds attacks, initial conditions maps utilized are generated random DNA sequence as well via an SHA-512 hash function.To increase key space, three different single...

10.1109/access.2020.3020917 article EN cc-by IEEE Access 2020-01-01

Vehicular ad hoc networks (VANETs) play an important role as enabling technology for future cooperative intelligent transportation systems (CITSs). Vehicles in VANETs share real-time information about their movement state, traffic situation, and road conditions. However, are susceptible to the cyberattacks that create life threatening situations and/or cause congestion. Intrusion detection (IDSs) rely on cooperation between vehicles detect intruders, were most suggested security solutions...

10.3390/electronics9091411 article EN Electronics 2020-09-01

Satellite images have drawn increasing interest from a wide variety of users, including business and government, ever since their increased usage in important fields ranging weather, forestry agriculture to surface changes biodiversity monitoring. Recent updates the field also introduced various deep learning (DL) architectures satellite imagery as means extracting useful information. However, this new approach comes with its own issues, fact that many users utilize ready-made cloud services...

10.3390/rs13112221 article EN cc-by Remote Sensing 2021-06-06

Early cancer identification is regarded as a challenging problem in prevention for the healthcare community. In addition, ensuring privacy-preserving data becomes more difficult with growing demand sharing these data. This study proposes novel non-invasive detection method using Deep Learning (DL). Initially, clinical collected over Internet via wireless channels diagnostic purposes. It paramount to secure personal against eavesdropping by unauthorized users that may exploit it personalized...

10.1109/tnse.2022.3199235 article EN IEEE Transactions on Network Science and Engineering 2022-11-01

Abstract Deep learning‐based applications for disease detection are essential tools experts to effectively diagnose diseases at different stages. In this article, a new approach based on an evidence fusion theory is proposed, allowing the combination of set deep learning classifiers provide more accurate results. The main contribution work application Dempster–Shafer five pre trained convolutional neural networks including VGG16, Xception, InceptionV3, ResNet50, and DenseNet201 diagnosis...

10.1002/ima.22653 article EN International Journal of Imaging Systems and Technology 2021-09-13

Extensive research has been conducted on healthcare technology and service advancements during the last decade. The Internet of Medical Things (IoMT) demonstrated ability to connect various medical apparatus, sensors, specialists ensure best treatment in a distant location. Patient safety improved, prices have decreased dramatically, services become more approachable, operational efficiency industry increased. This paper offers recent review current future applications, security, market...

10.1007/s40747-022-00767-w article EN cc-by Complex & Intelligent Systems 2022-05-31

Abstract In many cases, images contain sensitive information and patterns that require secure processing to avoid risk. It can be accessed by unauthorized users who illegally exploit them threaten the safety of people’s life property. Protecting privacies has quickly become one biggest obstacles prevent further exploration image data. this paper, we propose a novel privacy-preserving scheme protect within images. The proposed approach combines deoxyribonucleic acid (DNA) sequencing code,...

10.1007/s00500-021-06459-w article EN cc-by Soft Computing 2021-12-01

Road detection technology plays an essential role in a variety of applications, such as urban planning, map updating, traffic monitoring and automatic vehicle navigation. Recently, there has been much development detecting roads high-resolution (HR) satellite images based on semantic segmentation. However, the objects being segmented are small size, not all information is equally important when making decision. This paper proposes novel approach to road segmentation edge detection. Our aims...

10.3390/rs14030613 article EN cc-by Remote Sensing 2022-01-27

In the dynamic field of Industrial Internet Things (IIoT), networks are increasingly vulnerable to a diverse range cyberattacks. This vulnerability necessitates development advanced intrusion detection systems (IDSs). Addressing this need, our research contributes existing cybersecurity literature by introducing an optimized Intrusion Detection System based on Deep Transfer Learning (DTL), specifically tailored for heterogeneous IIoT networks. Our framework employs tri-layer architectural...

10.1016/j.jnca.2023.103784 article EN cc-by Journal of Network and Computer Applications 2023-11-13

The Internet of Things (IoT) is a global network that connects large number smart devices. MQTT de facto standard, lightweight, and reliable protocol for machine-to-machine communication, widely adopted in IoT networks. Various devices within these networks are employed to handle sensitive information. However, the scale openness make them highly vulnerable security breaches attacks, such as eavesdropping, weak authentication, malicious payloads. Hence, there need advanced machine learning...

10.1016/j.comnet.2023.110072 article EN cc-by Computer Networks 2023-10-17

ChatGPT, a groundbreaking natural language processing technology released few months ago, has attracted significant attention due to its remarkable capabilities. This AI milestone urged researchers, industry, decision-makers, and governments examine this technology, including implications, threats, benefits. Despite the short period since release, several researchers have examined ChatGPT from different perspectives. paper presents comprehensive review of highlighting technical novelties...

10.1109/access.2023.3326474 article EN cc-by-nc-nd IEEE Access 2023-01-01

Video streaming-based real-time vehicle identification and license plate recognition systems are challenging to design deploy in terms of processing on edge, dealing with low image resolution, high noise, identification. This paper addresses these issues by introducing a novel multi-stage, real-time, deep learning-based system. The system is based set algorithms that efficiently integrate two object detectors, an classifier, multi-object tracker recognize car models plates. information...

10.3390/s23042120 article EN cc-by Sensors 2023-02-13
Coming Soon ...