Skip to main content

Research Repository

Advanced Search

Towards securing machine learning models against membership inference attacks (2021)
Journal Article
Ben Hamida, S., Mrabet, H., Belguith, S., Alhomoud, A., & Jemai, A. (2022). Towards securing machine learning models against membership inference attacks. Computers, Materials & Continua, 70(3), 4897-4919. https://doi.org/10.32604/cmc.2022.019709

From fraud detection to speech recognition, including price prediction, Machine Learning (ML) applications are manifold and can significantly improve different areas. Nevertheless, machine learning models are vulnerable and are exposed to differen... Read More about Towards securing machine learning models against membership inference attacks.

Network traffic analysis for threats detection in the Internet of Things (2020)
Journal Article
Hammoudeh, M., Pimlott, J., Belguith, S., Epiphaniou, G., Baker, T., Kayes, A., …Bounceur, A. (2020). Network traffic analysis for threats detection in the Internet of Things. IEEE Internet of Things Magazine, 3(4), 40-45. https://doi.org/10.1109/IOTM.0001.2000015

As the prevalence of the Internet of Things (IoT) continues to increase, cyber criminals are quick to exploit the security gaps that many devices are inherently designed with. Whilst users can not be expected to tackle this threat alone, many cur... Read More about Network traffic analysis for threats detection in the Internet of Things.

Privacy Enhancing Technologies for solving the privacy-personalization paradox : taxonomy and survey (2020)
Journal Article
Kaaniche, N., Laurent, M., & Belguith, S. (2020). Privacy Enhancing Technologies for solving the privacy-personalization paradox : taxonomy and survey. Journal of Network and Computer Applications, 171, 102807. https://doi.org/10.1016/j.jnca.2020.102807

Personal data are often collected and processed in a decentralized fashion, within different contexts. For instance, with the emergence of distributed applications, several providers are usually correlating their records, and providing personalized... Read More about Privacy Enhancing Technologies for solving the privacy-personalization paradox : taxonomy and survey.

A survey of IoT security based on a layered architecture of sensing and data analysis (2020)
Journal Article
Mrabet, H., Belguith, S., Alhomoud, A., & Jemai, A. (2020). A survey of IoT security based on a layered architecture of sensing and data analysis. Sensors, 20(13), 3625

The Internet of Things (IoT) is leading today’s digital transformation. Relying on a combination of technologies, protocols, and devices such as wireless sensors and newly developed wearable and implanted sensors, IoT is changing every aspect of dail... Read More about A survey of IoT security based on a layered architecture of sensing and data analysis.

A service-oriented approach for sensing in the Internet of Things : intelligent transportation systems and privacy use cases (2020)
Journal Article
Hammoudeh, M., Epiphaniou, G., Belguith, S., Unal, D., Adebisi, B., Baker, T., …Watters, P. (2021). A service-oriented approach for sensing in the Internet of Things : intelligent transportation systems and privacy use cases. IEEE Sensors Journal, 21(14), 15753-15761. https://doi.org/10.1109/JSEN.2020.2981558

This paper presents a Sensing-as-a-Service run-time Service Oriented Architecture (SOA), called 3SOA, for the development of Internet of Things (IoT) applications. 3SOA aims to allow interoperability among various IoT platforms and support service-or... Read More about A service-oriented approach for sensing in the Internet of Things : intelligent transportation systems and privacy use cases.

CUPS : Secure Opportunistic Cloud of Things Framework based on Attribute Based Encryption Scheme Supporting Access Policy Update (2019)
Journal Article
Belguith, S., Kaaniche, N., & Russello, G. (2020). CUPS : Secure Opportunistic Cloud of Things Framework based on Attribute Based Encryption Scheme Supporting Access Policy Update. Security and Privacy, 3(4), e85. https://doi.org/10.1002/spy2.85

The ever‐growing number of internet connected devices, coupled with the new computing trends, namely within emerging opportunistic networks, engenders several security concerns. Most of the exchanged data between the internet of things (IoT) devices... Read More about CUPS : Secure Opportunistic Cloud of Things Framework based on Attribute Based Encryption Scheme Supporting Access Policy Update.

Analysis of attribute-based cryptographic techniques and their application to protect cloud services (2019)
Journal Article
Belguith, S., Kaaniche, N., & Hammoudeh, M. (2019). Analysis of attribute-based cryptographic techniques and their application to protect cloud services. Transactions on Emerging Telecommunications Technologies, e3667. https://doi.org/10.1002/ett.3667

Recent technological advances such as the Internet of Things (IoT), fog computing, cloud applications lead to exponential growth in the amount of generated data. Indeed, cloud storage services have experienced unprecedented usage demand. The loss of... Read More about Analysis of attribute-based cryptographic techniques and their application to protect cloud services.

PHOABE : securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IoT (2018)
Journal Article
Belguith, S., Kaaniche, N., Laurent, M., Jemai, A., & Attia, R. (2018). PHOABE : securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IoT. Computer Networks, 133, 141-156. https://doi.org/10.1016/j.comnet.2018.01.036

Attribute based encryption (ABE) is an encrypted access control mechanism that ensures efficient data sharing among dynamic group of users. Nevertheless, this encryption technique presents two main drawbacks, namely high decryption cost and publicly... Read More about PHOABE : securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IoT.