default search action
Maha Charfeddine
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j10]Maha Charfeddine, Habib M. Kammoun, Bechir Hamdaoui, Mohsen Guizani:
ChatGPT's Security Risks and Benefits: Offensive and Defensive Use-Cases, Mitigation Measures, and Future Implications. IEEE Access 12: 30263-30310 (2024) - [j9]Ali Hussein Ali, Maha Charfeddine, Boudour Ammar, Bassem Ben Hamed, Faisal Albalwy, Abdulrahman Alqarafi, Amir Hussain:
Unveiling machine learning strategies and considerations in intrusion detection systems: a comprehensive survey. Frontiers Comput. Sci. 6 (2024) - [j8]Masmoudi Salma, Maha Charfeddine, Chokri Ben Amar:
MP3 Audio watermarking using calibrated side information features for tamper detection and localization. Multim. Tools Appl. 83(24): 64637-64662 (2024) - [c19]Raghda Amami, Maha Charfeddine, Masmoudi Salma:
Exploration of Open Source SIEM Tools and Deployment of an Appropriate Wazuh-Based Solution for Strengthening Cyberdefense. CoDIT 2024: 1-7 - [c18]Masmoudi Salma, Maha Charfeddine, Chokri Ben Amar:
Secure Audio Watermarking for Multipurpose Defensive Applications. ENASE 2024: 743-751 - [c17]Ali Hussein Ali, Boudour Ammar, Maha Charfeddine, Bassem Ben Hamed:
Enhanced Intrusion Detection Based Hybrid Meta-heuristic Feature Selection. ICCCI (CCIS Volume 2) 2024: 3-15 - [c16]Ali Hussein Ali, Maha Charfeddine, Boudour Ammar, Bassem Ben Hamed:
Intrusion Detection Schemes Based on Synthetic Minority Oversampling Technique and Machine Learning Models. ISORC 2024: 1-8 - 2023
- [j7]Nesrine Tarhouni, Masmoudi Salma, Maha Charfeddine, Chokri Ben Amar:
Fake COVID-19 videos detector based on frames and audio watermarking. Multim. Syst. 29(1): 361-375 (2023) - [c15]Nesrine Tarhouni, Rahma Fourati, Maha Charfeddine, Chokri Ben Amar:
ReVQ-VAE: A Vector Quantization-Variational Autoencoder for COVID-19 Chest X-Ray Image Recovery. ICCCI 2023: 753-765 - 2022
- [j6]Maha Charfeddine, Eya Mezghani, Masmoudi Salma, Chokri Ben Amar, Hesham Alhumyani:
Audio Watermarking for Security and Non-Security Applications. IEEE Access 10: 12654-12677 (2022) - 2020
- [j5]Masmoudi Salma, Maha Charfeddine, Chokri Ben Amar:
A Semi-Fragile Digital Audio Watermarking Scheme for MP3-Encoded Signals Using Huffman Data. Circuits Syst. Signal Process. 39(6): 3019-3034 (2020) - [j4]Nesrine Tarhouni, Maha Charfeddine, Chokri Ben Amar:
Novel and Robust Image Watermarking for Copyright Protection and Integrity Control. Circuits Syst. Signal Process. 39(10): 5059-5103 (2020)
2010 – 2019
- 2017
- [j3]Faten Chaabane, Maha Charfeddine, William Puech, Chokri Ben Amar:
A two-stage traitor tracing scheme for hierarchical fingerprints. Multim. Tools Appl. 76(12): 14405-14435 (2017) - [c14]Faten Chaabane, Maha Charfeddine, Chokri Ben Amar:
An Enhanced Hierarchical Traitor Tracing Scheme Based on Clustering Algorithms. HAIS 2017: 379-390 - [c13]Eya Mezghani, Maha Charfeddine, Henri Nicolas, Chokri Ben Amar:
Speaker emotion recognition: from classical classifiers to deep neural networks. ICMV 2017: 106962M - 2016
- [c12]Eya Mezghani, Maha Charfeddine, Chokri Ben Amar, Henri Nicolas:
Multifeature speech/music discrimination based on mid-term level statistics and supervised classifiers. AICCSA 2016: 1-8 - [c11]Eya Mezghani, Maha Charfeddine, Henri Nicolas, Chokri Ben Amar:
Speaker gender identification based on majority vote classifiers. ICMV 2016: 103410A - [c10]Faten Chaabane, Maha Charfeddine, William Puech, Chokri Ben Amar:
An EM-based estimation for a two-level traitor tracing scheme. SMC 2016: 3594-3599 - 2015
- [c9]Faten Chaabane, Maha Charfeddine, William Puech, Chokri Ben Amar:
A QR-code based audio watermarking technique for tracing traitors. EUSIPCO 2015: 51-55 - [c8]Faten Chaabane, Maha Charfeddine, William Puech, Chokri Ben Amar:
Towards a Blind MAP-Based Traitor Tracing Scheme for Hierarchical Fingerprints. ICONIP (4) 2015: 505-512 - [c7]Eya Mezghani, Maha Charfeddine, Chokri Ben Amar, Henri Nicolas:
Audiovisual video characterization using audio watermarking scheme. ISDA 2015: 213-218 - [c6]Faten Chaabane, Maha Charfeddine, Chokri Ben Amar:
Clustering impact on group-based traitor tracing schemes. ISDA 2015: 440-445 - 2014
- [j2]Maha Charfeddine, Maher El'arbi, Chokri Ben Amar:
A new DCT audio watermarking scheme based on preliminary MP3 study. Multim. Tools Appl. 70(3): 1521-1557 (2014) - [c5]Faten Chaabane, Maha Charfeddine, Chokri Ben Amar:
A Multimedia Tracing Traitors Scheme Using Multi-level Hierarchical Structure for Tardos Fingerprint Based Audio Watermarking. SIGMAP 2014: 289-296 - 2013
- [c4]Faten Chaabane, Maha Charfeddine, Chokri Ben Amar:
A survey on digital tracing traitors schemes. IAS 2013: 85-90 - [c3]Eya Mezghani, Maha Charfeddine, Chokri Ben Amar:
Audio silence deletion before and after MPEG video compression. EUROCON 2013: 1625-1629 - 2011
- [j1]Maher El'arbi, Mohamed Koubàa, Maha Charfeddine, Chokri Ben Amar:
A dynamic video watermarking algorithm in fast motion areas in the wavelet domain. Multim. Tools Appl. 55(3): 579-600 (2011) - 2010
- [c2]Masmoudi Salma, Maha Charfeddine, Chokri Ben Amar:
A robust audio watermarking technique based on the perceptual evaluation of audio quality algorithm in the multiresolution domain. ISSPIT 2010: 326-331 - [c1]Maha Charfeddine, Maher El'arbi, Mohamed Koubàa, Chokri Ben Amar:
DCT based Blind Audio Watermarking Scheme. SIGMAP 2010: 139-144
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-13 23:48 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint