default search action
Tala Talaei Khoei
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c19]Aditi Singh, Abul Ehtesham, Saket Kumar, Tala Talaei Khoei:
Enhancing AI Systems with Agentic Workflows Patterns in Large Language Model. AIIoT 2024: 527-532 - [c18]Aditi Singh, Saket Kumar, Abul Ehtesham, Tala Talaei Khoei, Deepshikha Bhati:
Large Language Model-Driven Immersive Agent. AIIoT 2024: 619-624 - [i2]Aditi Singh, Abul Ehtesham, Saket Kumar, Gaurav Kumar Gupta, Tala Talaei Khoei:
Encouraging Responsible Use of Generative AI in Education: A Reward-Based Learning Approach. CoRR abs/2407.15022 (2024) - 2023
- [j5]Tala Talaei Khoei, Naima Kaabouch:
Machine Learning: Models, Challenges, and Research Directions. Future Internet 15(10): 332 (2023) - [j4]Tala Talaei Khoei, Naima Kaabouch:
A Comparative Analysis of Supervised and Unsupervised Models for Detecting Attacks on the Intrusion Detection Systems. Inf. 14(2): 103 (2023) - [j3]Tala Talaei Khoei, Hadjar Ould Slimane, Naima Kaabouch:
Deep learning: systematic review, models, challenges, and research directions. Neural Comput. Appl. 35(31): 23103-23124 (2023) - [c17]Tala Talaei Khoei, Naima Kaabouch:
ACapsule Q-Learning Based Reinforcement Model for Intrusion Detection System on Smart Grid. eIT 2023: 333-339 - [c16]Tala Talaei Khoei, Ghilas Aissou, Khair Al Shamaileh, Vijaya Kumar Devabhaktuni, Naima Kaabouch:
Supervised Deep Learning Models for Detecting GPS Spoofing Attacks on Unmanned Aerial Vehicles. eIT 2023: 340-346 - 2022
- [j2]Tala Talaei Khoei, Shereen Ismail, Naima Kaabouch:
Dynamic Selection Techniques for Detecting GPS Spoofing Attacks on UAVs. Sensors 22(2): 662 (2022) - [c15]Aydan Gasimova, Tala Talaei Khoei, Naima Kaabouch:
A Comparative Analysis of the Ensemble Models for Detecting GPS Spoofing attacks on UAVs. CCWC 2022: 310-315 - [c14]Hadjar Ould Slimane, Selma Benouadah, Tala Talaei Khoei, Naima Kaabouch:
A Light Boosting-based ML Model for Detecting Deceptive Jamming Attacks on UAVs. CCWC 2022: 328-333 - [c13]Tala Talaei Khoei, Wen Chen Hu, Naima Kaabouch:
Residual Convolutional Network for Detecting Attacks on Intrusion Detection Systems in Smart Grid. EIT 2022: 231-237 - [c12]Tala Talaei Khoei, Aydan Gasimova, Mohammad Aymane Ahajjam, Khair Al Shamaileh, Vijay K. Devabhaktuni, Naima Kaabouch:
A Comparative Analysis of Supervised and Unsupervised Models for Detecting GPS Spoofing Attack on UAVs. EIT 2022: 279-284 - [c11]Tala Talaei Khoei, Mohammad Aymane Ahajjam, Wen Chen Hu, Naima Kaabouch:
A Deep Learning Multi-Task Approach for the Detection of Alzheimer's Disease in a Longitudinal Study. EIT 2022: 315-319 - [c10]Tala Talaei Khoei, Naima Kaabouch:
Densely Connected Neural Networks for Detecting Denial of Service Attacks on Smart Grid Network. UEMCON 2022: 207-211 - [i1]Tala Talaei Khoei, Hadjar Ould Slimane, Naima Kaabouch:
A Comprehensive Survey on the Cyber-Security of Smart Grids: Cyber-Attacks, Detection, Countermeasure Techniques, and Future Directions. CoRR abs/2207.07738 (2022) - 2021
- [c9]Tala Talaei Khoei, Ghilas Aissou, When Chen Hu, Naima Kaabouch:
Ensemble Learning Methods for Anomaly Intrusion Detection System in Smart Grid. EIT 2021: 129-135 - [c8]Tala Talaei Khoei, Mary Catherine Labuhn, Toro Dama Caleb, Wen Chen Hu, Naima Kaabouch:
A Stacking-based Ensemble Learning Model with Genetic Algorithm For detecting Early Stages of Alzheimer's Disease. EIT 2021: 215-222 - [c7]Tala Talaei Khoei, Shereen Ismail, Naima Kaabouch:
Boosting-based Models with Tree-structured Parzen Estimator Optimization to Detect Intrusion Attacks on Smart Grid. UEMCON 2021: 165-170 - [c6]Shereen Ismail, Tala Talaei Khoei, Ronald Marsh, Naima Kaabouch:
A Comparative Study of Machine Learning Models for Cyber-attacks Detection in Wireless Sensor Networks. UEMCON 2021: 313-318 - 2020
- [c5]Elias Ghribi, Tala Talaei Khoei, Hamed Taheri Gorji, Prakash Ranganathan, Naima Kaabouch:
A Secure Blockchain-based Communication Approach for UAV Networks. EIT 2020: 411-415 - [c4]Hamed Taheri Gorji, Tala Talaei Khoei, Naima Kaabouch:
Biomarkers Selection Toward Early Detection of Alzheimer's Disease. EIT 2020: 487-494
2010 – 2019
- 2019
- [c3]Gokarna Sharma, Pavan Poudel, Ayan Dutta, Vala Zeinali, Tala Talaei Khoei, Jong-Hoon Kim:
A 2-Approximation Algorithm for the Online Tethered Coverage Problem. Robotics: Science and Systems 2019 - 2015
- [j1]Tala Talaei Khoei, Suchada (Ploy) Vichitvanichphong, Babak Abedin, Ahmad Reza Ghapanchi, Behnam Abedin:
Students' engagement on Facebook in undergraduate business courses: an experimental study. Int. J. Knowl. Learn. 10(4): 325-335 (2015) - [c2]Tala Talaei Khoei, Amir Talaei-Khoei:
Peer Learning in the Class or on Facebook? _x000D_ A Correlational Experiment on Learning Outcomes. AMCIS 2015 - [c1]Amir Talaei-Khoei, Lundy Lewis, Tala Talaei Khoei, Amir Hossein Ghapanchi, Suchada Vichitvanichphong:
Seniors' Perspective on Perceived Transfer Effects of Assistive Robots in Elderly Care: Capability Approach Analysis. ICIS 2015
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint