Follow
Houda Jmila
Houda Jmila
CEA List
Verified email at cea.fr
Title
Cited by
Cited by
Year
Estimating VNF resource requirements using machine learning techniques
H Jmila, MI Khedher, MA El Yacoubi
Neural Information Processing: 24th International Conference, ICONIP 2017 …, 2017
412017
Adversarial machine learning for network intrusion detection: A comparative study
H Jmila, MI Khedher
Computer Networks 214, 109073, 2022
382022
Generative deep learning for Internet of Things network traffic generation
MR Shahid, G Blanc, H Jmila, Z Zhang, H Debar
2020 IEEE 25th Pacific Rim International Symposium on Dependable Computing …, 2020
372020
Explainable artificial intelligence for cybersecurity: a literature survey
F Charmet, HC Tanuwidjaja, S Ayoubi, PF Gimenez, Y Han, H Jmila, ...
Annals of Telecommunications 77 (11), 789-812, 2022
302022
A Survey of Smart Home IoT Device Classification Using Machine Learning-based Network Traffic Analysis
H Jmila, G Blanc, MR Shahid, M Lazrag
IEEE Access, 2022
192022
Automatic processing of Historical Arabic Documents: a comprehensive survey
MI Khedher, H Jmila, MA El-Yacoubi
Pattern Recognition 100, 107144, 2020
192020
Siamese network based feature learning for improved intrusion detection
H Jmila, M Ibn Khedher, G Blanc, MA El Yacoubi
Neural Information Processing: 26th International Conference, ICONIP 2019 …, 2019
182019
Towards Security-Aware 5G Slice Embedding
H Jmila, G Blanc
Computers & Security, 102075, 2021
112021
Solving security constraints for 5G slice embedding: A proof-of-concept
F Boutigny, S Betgé-Brezetz, G Blanc, A Lavignotte, H Debar, H Jmila
Computers & Security 89, 101662, 2020
102020
An adaptive load balancing scheme for evolving virtual networks
H Jmila, D Zeghlache
2015 12th Annual IEEE Consumer Communications and Networking Conference …, 2015
92015
RSforEVN: Node reallocation algorithm for virtual networks adaptation
H Jmila, I Houidi, D Zeghlache
2014 IEEE Symposium on Computers and Communications (ISCC), 1-7, 2014
92014
Le rôle des médias et des TIC dans les «révolutions arabes»: l¢exemple de la Tunisie
N Abid, M Aouadi, M Ben Mohamed, A Bakhti, J Djemali, H Jmila, ...
Chimères, 219-235, 2011
92011
Designing security-aware service requests for NFV-enabled networks
H Jmila, G Blanc
2019 28th International Conference on Computer Communication and Networks …, 2019
72019
Fusion of interest point/image based descriptors for efficient person re-identification
MI Khedher, H Jmila, MA El Yacoubi
2018 International Joint Conference on Neural Networks (IJCNN), 1-7, 2018
62018
A self-stabilizing framework for dynamic bandwidth allocation in virtual networks
H Jmila, K Drira, D Zeghlache
NOMS 2016-2016 IEEE/IFIP Network Operations and Management Symposium, 69-77, 2016
52016
On the formal evaluation of the robustness of neural networks and its pivotal relevance for ai-based safety-critical domains
MI Khedher, H Jmila, M El Yacoubi
International Journal of Network Dynamics and Intelligence, 100018, 2023
32023
Data-driven evaluation of intrusion detectors: a methodological framework
S Ayoubi, G Blanc, H Jmila, T Silverston, S Tixeuil
International Symposium on Foundations and Practice of Security, 142-157, 2022
22022
Dynamic resource allocation and management in virtual networks and Clouds
H Jmila
Institut National des Télécommunications, 2015
22015
Survey on intrusion detection systems in 5G
S Chennoufi, G Blanc, H Jmila, C Kiennert
Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes …, 2023
2023
Evaluation Framework for ML-based IDS
S Ayoubi, G Blanc, H Jmila, S Tixeuil, T Silverston
RESSI 2023: Rendez-vous de la Recherche et de l'Enseignement de la Sécurité …, 2023
2023
The system can't perform the operation now. Try again later.
Articles 1–20