Academic & Scientific Articles
Permanent URI for this communityhttp://dl.cerist.dz/handle/CERIST/3
Browse
4 results
Search Results
Item Efficient Machine Learning-based Approach for Brain Tumor Detection Using the CAD System(Taylor & Francis, 2023-04) Guerroudji, Mohamed Amine; Hadjadj, Zineb; Lichouri, Mohamed; Amara, Kahina; Zenati, NadiaMedical research has focused on improving diagnosis through medical imaging in recent decades. Computer Assisted Diagnosis (CAD) systems have been developed to help doctors identify suspicious areas of interest, particularly those with cancer-like characteristics. CAD systems employ various algorithms and techniques to extract important numerical measurements from medical images that clinicians can use to evaluate patient conditions. This study proposes a statistical classification-based approach to efficient brain cancer detection. The proposed approach operates in three stages: first, Gradient Vector Flow (GVF) Snake models and mathematical morphology techniques retrieve regions of interest. The second stage characterizes these regions using morphological and textural parameters. Finally, a Bayesian network uses this description as input to identify malignant and benign cancer classes. We also compared the performance of the Bayesian network with other popular classification algorithms, including SVM, MLP, KNN, Random Forest, Decision Tree, XGBoost, LGBM, Gaussian Process, and RBF SVM. The results showed the superiority of the Bayesian network for the task of brain tumor classification. The proposed approach has been experimentally validated, with a sensitivity of 100% and a classification accuracy of over 98% for tumors, demonstrating the high efficiency of cancer cell segmentation.Item TriDroid: a triage and classification framework for fast detection of mobile threats in android markets(Springer-Verlag, 2021) Amira, Abdelouahab; Derhab, Abdelouahid; Karbab, ElMouatez Billah; Nouali, Omar; Aslam Khan , FarrukhThe Android platform is highly targeted by malware developers, which aim to infect the maximum number of mobile devices by uploading their malicious applications to different app markets. In order to keep a healthy Android ecosystem, app-markets check the maliciousness of newly submitted apps. These markets need to (a) correctly detect malicious app, and (b) speed up the detection process of the most likely dangerous applications among an overwhelming flow of submitted apps, to quickly mitigate their potential damages. To address these challenges, we propose TriDroid, a market-scale triage and classification system for Android apps. TriDroid prioritizes apps analysis according to their risk likelihood. To this end, we categorize the submitted apps as: botnet, general malware, and benign. TriDroid starts by performing a (1) Triage process, which applies a fast coarse-grained and less-accurate analysis on a continuous stream of the submitted apps to identify their corresponding queue in a three-class priority queuing system. Then, (2) the Classification process extracts fine-grained static features from the apps in the priority queue, and applies three-class machine learning classifiers to confirm with high accuracy the classification decisions of the triage process. In addition to the priority queuing model, we also propose a multi-server queuing model where the classification of each app category is run on a different server. Experiments on a dataset with more than 24K malicious and 3K benign applications show that the priority model offers a trade-off between waiting time and processing overhead, as it requires only one server compared to the multi-server model. Also it successfully prioritizes malicious apps analysis, which allows a short waiting time for dangerous applications compared to the FIFO policy.Item Ontology learning: Grand tour and challenges(Elsevier, 2021-02-21) Chérifa Khadir, Ahlem; Aliane, Hassina; Guessoum, AhmedOntologies are at the core of the semantic web. As knowledge bases, they are very useful resources for many artificial intelligence applications. Ontology learning, as a research area, proposes techniques to automate several tasks of the ontology construction process to simplify the tedious work of manually building ontologies. In this paper we present the state of the art of this field. Different classes of approaches are covered (linguistic, statistical, and machine learning), including some recent ones (deep-learning-based approaches). In addition, some relevant solutions (frameworks), which offer strategies and built-in methods for ontology learning, are presented. A descriptive summary is made to point out the capabilities of the different contributions based on criteria that have to do with the produced ontology components and the degree of automation. We also highlight the challenge of evaluating ontologies to make them reliable, since it is not a trivial task in this field; it actually represents a research area on its own. Finally, we identify some unresolved issues and open questions.Item Side Channel Attack using Machine Learning(IEEE, 2022-12-15) Amrouche, Amina; Boubchir, Larbi; Yahiaoui, SaïdThe overwhelming majority of significant security threats are hardware-based, where the attackers attempt to steal information straight from the hardware that our secure and encrypted software operates on. Unquestionably, side-channel attacks are one of the most severe risks to hardware security. Rather than depending on bugs in the program itself, a side-channel attack exploits information leaked from the program implementation in order to exfiltrate sensitive secret information such as cryptographic keys. A side channel assault could manifest in different ways including electromagnetic radiation, power consumption, timing data, or even acoustic emanation. Ever since the side-channel attacks were introduced in the 1990s, a number of significant attacks on cryptographic implementations utilizing side-channel analysis have emerged, such as template attacks, and attacks based on power analysis and electromagnetic analysis. However, Artificial Intelligence has become more prevalent. Attackers are now more interested in machine learning and deep learning technologies that enable them to interpret the extracted raw data. The aim of this paper is to highlight the main methods of machine learning and deep learning that are used in the most recent studies that deal with different types of side-channel attacks.