.png)
Research
Research Areas
Ce champ ne comporte pas de données en ce moment.
Research Networks
Ce champ ne comporte pas de données en ce moment.
Publications
9 of 56
2026
Towards Context-Aware Log Anomaly Detection Using Fine-Tuned Large Language Models
Hugo Breniaux, Djedjiga Mouheb
Hugo Breniaux, Djedjiga Mouheb
Chapitre de livre
Book chapter
2026
Assessment of differentially private fine-tuning of large language models for synthetic clinical note generation
Atiquer Rahman Sarkar, Fatima Jahan Sarmin, Djedjiga Mouheb, Benjamin C. M. Fung, Noman Mohammed
Atiquer Rahman Sarkar, Fatima Jahan Sarmin, Djedjiga Mouheb, Benjamin C. M. Fung, Noman Mohammed
Intelligent Systems with Applications
Article de revue
Journal article
2022
Arabic Cyberbullying Detection from Imbalanced Dataset Using Machine Learning
AlFarah M.E., Kamel I., Al Aghbari Z., Mouheb D.
AlFarah M.E., Kamel I., Al Aghbari Z., Mouheb D.
Communications in Computer and Information Science
Livre
Book
2021
Portable Supervised Malware Fingerprinting Using Deep Learning
Billah Karbab E.M., Debbabi M., Derhab A., Mouheb D.
Billah Karbab E.M., Debbabi M., Derhab A., Mouheb D.
Advances in Information Security
Chapitre de livre
Book chapter
2021
Introduction
Billah Karbab E.M., Debbabi M., Derhab A., Mouheb D.
Billah Karbab E.M., Debbabi M., Derhab A., Mouheb D.
Advances in Information Security
Chapitre de livre
Book chapter
2021
Robust Android Malicious Community Fingerprinting
Billah Karbab E.M., Debbabi M., Derhab A., Mouheb D.
Billah Karbab E.M., Debbabi M., Derhab A., Mouheb D.
Advances in Information Security
Chapitre de livre
Book chapter
2021
Fingerprinting Android Malware Packages
Billah Karbab E.M., Debbabi M., Derhab A., Mouheb D.
Billah Karbab E.M., Debbabi M., Derhab A., Mouheb D.
Advances in Information Security
Chapitre de livre
Book chapter
2021
Background and Related Work
Billah Karbab E.M., Debbabi M., Derhab A., Mouheb D.
Billah Karbab E.M., Debbabi M., Derhab A., Mouheb D.
Advances in Information Security
Chapitre de livre
Book chapter
2021
Resilient and Adaptive Android Malware Fingerprinting and Detection
Billah Karbab E.M., Debbabi M., Derhab A., Mouheb D.
Billah Karbab E.M., Debbabi M., Derhab A., Mouheb D.
Advances in Information Security
Chapitre de livre
Book chapter
Ce champ ne comporte pas de données en ce moment.
Fields of interest
Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries, but also the leap into electronic typesetting, remaining essentially unchanged. It was popularised in the 1960s with the release of Letraset sheets containing Lorem Ipsum passages, and more recently with desktop publishing software like Aldus PageMaker including versions of Lorem Ipsum.
Funded Research Projects
Present
AI-powered Malicious Social Media Bots: Detection, Investigation and Takedown
Programme: Subventions à la découverte SD (individuelles et d'équipe)
Organisme(s) subventionnaire(s): Conseil de recherches en sciences naturelles et génie Canada
Program: Subventions à la découverte SD (individuelles et d'équipe)
Granting organization(s): Conseil de recherches en sciences naturelles et génie Canada
Du 1 avril 2026 au 31 mars 2031
From April 1, 2026 to March 31, 2031