default search action
Khalid Chougdali
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c30]Salaheddine Kably, Nabih Alaoui, Mounir Arioua, Khalid Chougdali, Samira Khoulji, María Dolores Gómez-López:
Blockchain Framework Tailored for Agricultural IoTs. IWINAC (2) 2024: 461-473 - [c29]Assiya Akli, Khalid Chougdali:
A Survey on IOTA Based Technology for Enhanced IoT Security. WINCOM 2024: 1-6 - [c28]Imad Bourian, Anass Sebbar, Mounir Arioua, Khalid Chougdali:
Blockchain Based Smart Contract to Enhance Security in Smart City. WINCOM 2024: 1-6 - [c27]Youssef Natij, Ayyad Maafiri, Hajar El Karch, Yassine Himeur, Khalid Chougdali, Abdelkader Mezouari:
Plant Disease Recognition: A Comprehensive Mini Review. WINCOM 2024: 1-8 - 2023
- [c26]Youssra Baja, Khalid Chougdali, Abdellatif Kobbane:
Improving IoT Botnet Detection Using Ensemble Learning. CommNet 2023: 1-7 - [c25]Samira Benkerroum, Khalid Chougdali:
Enhancing Forensic Analysis Using a Machine Learning-based Approach. CommNet 2023: 1-6 - [c24]Assiya Akli, Khalid Chougdali:
A survey on Machine Learning for IoT Trust Management. GCAIoT 2023: 59-65 - [c23]Anass Sebbar, Othmane Cherqi, Khalid Chougdali, Mohammed Boulmalf:
Real-Time Anomaly Detection in SDN Architecture Using Integrated SIEM and Machine Learning for Enhancing Network Security. GLOBECOM 2023: 1795-1800 - [c22]Imad Bourian, Anass Sebbar, Khalid Chougdali, El Mehdi Amhoud:
SSHCEth: Secure Smart Home Communications based on Ethereum Blockchain and Smart Contract. GLOBECOM 2023: 2674-2679 - [c21]Anas El Kamali, Khalid Chougdali, Abdellatif Kobbane:
A New Intrusion Detection System Based on Convolutional Neural Network. ICC 2023: 2994-2999 - [c20]Oumaima Chentoufi, Ilyas Alloug, Khalid Chougdali:
An Approach for intrusion detection using machine learning algorithms. WINCOM 2023: 1-6 - [c19]Othmane Cherqi, Anass Sebbar, Khalid Chougdali, Mohammed Boulmalf, Houda Benbrahim:
Evaluating Wi-Fi Security Through Wardriving: A Test-Case Analysis. WINCOM 2023: 1-7 - [c18]Zhour Rachidi, Khalid Chougdali, Abdellatif Kobbane:
Hybrid intrusion detection system based on Random forest, decision tree and Multilayer Perceptron (MLP) algorithms. WINCOM 2023: 1-5 - [c17]Abdelkabir Rouagubi, Khalid Chougdali:
Internet of Things Systems Security Based on the Physical Objects: An overview. WINCOM 2023: 1-6 - 2022
- [j6]Ayyad Maafiri, Ahmed Bir-Jmel, Omar Elharrouss, Fouad Khelifi, Khalid Chougdali:
LWKPCA: A New Robust Method for Face Recognition Under Adverse Conditions. IEEE Access 10: 64819-64831 (2022) - [c16]Zhour Rachidi, Khalid Chougdali, Abdellatif Kobbane, Jalel Ben-Othman:
Network intrusion detection using Machine Learning approach. ICICM 2022: 13-17 - [c15]Mohamed Alji, Khalid Chougdali:
Automatic Forensic Imaging of a Virtual USB Device with Emulated User Interaction. ISDFS 2022: 1-4 - [c14]Youssra Baja, Khalid Chougdali:
Security of Internet Of Things Using Machine Learning. WINCOM 2022: 1-6 - [c13]Zayneb Gaouzi, Khalid Chougdali:
Impact of security and privacy risks on the adoption of IoT: A state of the art. WINCOM 2022: 1-5 - 2021
- [j5]Ayyad Maafiri, Omar Elharrouss, Saad Rfifi, Somaya Ali Al-Máadeed, Khalid Chougdali:
DeepWTPCA-L1: A New Deep Face Recognition Model Based on WTPCA-L1 Norm Features. IEEE Access 9: 65091-65100 (2021) - [j4]Ayyad Maafiri, Khalid Chougdali:
Robust face recognition based on a new Kernel-PCA using RRQR factorization. Intell. Data Anal. 25(5): 1233-1245 (2021) - [c12]Mohamed Alji, Khalid Chougdali:
File Slack Handling Tool. CyberSA 2021: 1-3 - 2020
- [c11]Amal Hadri, Khalid Chougdali, Raja Touahni:
Fuzzy ℓ2, p-norm based PCA for Intrusion Detection System. ICECOCS 2020: 1-6
2010 – 2019
- 2019
- [c10]Mohamed Alji, Khalid Chougdali:
Detection of Timestamps Tampering in NTFS using Machine Learning. EUSPN/ICTH 2019: 778-784 - [c9]Safae Lhazmir, Abdellatif Kobbane, Khalid Chougdali, Jalel Ben-Othman:
Energy-Efficient Associations for IoT networks with UAV: A Regret Matching Based Approach. ICICM 2019: 132-136 - 2018
- [j3]Zyad Elkhadir, Khalid Chougdali, Mohammed Benattou:
Improving Network Intrusion Detection Using Geometric Mean LDA. Int. J. Netw. Secur. 20(5): 820-826 (2018) - [c8]Amal Hadri, Khalid Chougdali, Raja Touahni:
A Network Intrusion Detection Based on Improved Nonlinear Fuzzy Robust PCA. CIST 2018: 636-641 - 2017
- [c7]Amal Hadri, Khalid Chougdali, Raja Touahni:
Identifying Intrusions in Computer Networks Using Robust Fuzzy PCA. AICCSA 2017: 1261-1268 - [c6]Zyad Elkhadir, Khalid Chougdali, Mohammed Benattou:
A Median Nearest Neighbors LDA for Anomaly Network Detection. C2SI 2017: 128-141 - [c5]Zyad Elkhadir, Khalid Chougdali, Mohammed Benattou:
An effective cyber attack detection system based on an improved OMPCA. WINCOM 2017: 1-6 - 2016
- [c4]Amal Hadri, Khalid Chougdali, Rajae Touahni:
Intrusion detection system using PCA and Fuzzy PCA techniques. ACOSIS 2016: 1-7 - 2015
- [c3]Khalid Chougdali, Zyad Elkhadir, Mohammed Benattou:
Network intrusion detection system using L1-norm PCA. IAS 2015: 118-122 - 2010
- [j2]Khalid Chougdali, Mohamed Jedra, Noureddine Zahid:
Kernel relevance weighted discriminant analysis for face recognition. Pattern Anal. Appl. 13(2): 213-221 (2010)
2000 – 2009
- 2009
- [j1]Khalid Chougdali, Mohamed Jedra, Noureddine Zahid:
Fuzzy linear and nonlinear discriminant analysis algorithms for face recognition. Intell. Data Anal. 13(4): 657-669 (2009) - 2008
- [c2]Khalid Chougdali, Mohamed Jedra, Noureddine Zahid:
Kernel Weighted Scatter-Difference-Based Discriminant Analysis for Face Recognition. ICIAR 2008: 977-983 - 2007
- [c1]Khalid Chougdali, Mohamed Jedra, Noureddine Zahid:
Using Wavelets based Feature Extraction and Relevance Weighted LDA for Face Recognition. PRIS 2007: 183-188
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint