International Conference Papers

Permanent URI for this collectionhttp://dl.cerist.dz/handle/CERIST/4

Browse

Search Results

Now showing 1 - 3 of 3
  • Thumbnail Image
    Item
    DIAG a diagnostic web application based on lung CT Scan images and deep learning
    (IOS Press Ebooks, 2021-05-29) Hadj Bouzid, Amel Imene; Yahiaoui, Saïd; Lounis, Anis; Berrani, Sid-Ahmed; Belbachir, Hacène; Naili, Qaid; Abdi, Mohamed El Hafedh; Bensalah, Kawthar; Belazzougui, Djamal
    Coronavirus disease is a pandemic that has infected millions of people around the world. Lung CT-scans are effective diagnostic tools, but radiologists can quickly become overwhelmed by the flow of infected patients. Therefore, automated image interpretation needs to be achieved. Deep learning (DL) can support critical medical tasks including diagnostics, and DL algorithms have successfully been applied to the classification and detection of many diseases. This work aims to use deep learning methods that can classify patients between Covid-19 positive and healthy patient. We collected 4 available datasets, and tested our convolutional neural networks (CNNs) on different distributions to investigate the generalizability of our models. In order to clearly explain the predictions, Grad-CAM and Fast-CAM visualization methods were used. Our approach reaches more than 92% accuracy on 2 different distributions. In addition, we propose a computer aided diagnosis web application for Covid-19 diagnosis. The results suggest that our proposed deep learning tool can be integrated to the Covid-19 detection process and be useful for a rapid patient management.
  • Thumbnail Image
    Item
    Side Channel Attack using Machine Learning
    (IEEE, 2022-12-15) Amrouche, Amina; Boubchir, Larbi; Yahiaoui, Saïd
    The overwhelming majority of significant security threats are hardware-based, where the attackers attempt to steal information straight from the hardware that our secure and encrypted software operates on. Unquestionably, side-channel attacks are one of the most severe risks to hardware security. Rather than depending on bugs in the program itself, a side-channel attack exploits information leaked from the program implementation in order to exfiltrate sensitive secret information such as cryptographic keys. A side channel assault could manifest in different ways including electromagnetic radiation, power consumption, timing data, or even acoustic emanation. Ever since the side-channel attacks were introduced in the 1990s, a number of significant attacks on cryptographic implementations utilizing side-channel analysis have emerged, such as template attacks, and attacks based on power analysis and electromagnetic analysis. However, Artificial Intelligence has become more prevalent. Attackers are now more interested in machine learning and deep learning technologies that enable them to interpret the extracted raw data. The aim of this paper is to highlight the main methods of machine learning and deep learning that are used in the most recent studies that deal with different types of side-channel attacks.
  • Thumbnail Image
    Item
    Graph Edit Distance Compacted Search Tree
    (Springer, Cham, 2022) Chegrane, Ibrahim; Hocine, Imane; Yahiaoui, Saïd; Bendjoudi, Ahcene; Nouali_Taboudjemat, Nadia
    We propose two methods to compact the used search tree during the graph edit distance (GED) computation. The first maps the node information and encodes the different edit operations by numbers and the needed remaining vertices and edges by BitSets. The second represents the tree succinctly by bit-vectors. The proposed methods require 24 to 250 times less memory than traditional versions without negatively influencing the running time.