A green strategic activity scheduling for UAV networks: A sub-modular game perspective S Koulali, E Sabir, T Taleb, M Azizi IEEE Communications Magazine 54 (5), 58-64, 2016 | 150 | 2016 |
Comparison of Mamdani-type and Sugeno-type fuzzy inference systems for fuzzy real time scheduling M Blej, M Azizi International Journal of Applied Engineering Research 11 (22), 11071-11075, 2016 | 95 | 2016 |
Toward a deep learning-based intrusion detection system for IoT against botnet attacks I Idrissi, M Boukabous, M Azizi, O Moussaoui, H El Fadili IAES International Journal of Artificial Intelligence 10 (1), 110, 2021 | 80 | 2021 |
Environmental awareness and attitude among Iranian students in Malaysian universities Z Aminrad, M Azizi, M Wahab, R Huron, M Nawawi Environment Asia 3 (1), 1-10, 2010 | 64 | 2010 |
IoT security with Deep Learning-based Intrusion Detection Systems: A systematic literature review I Idrissi, M Azizi, O Moussaoui 2020 Fourth international conference on intelligent computing in data …, 2020 | 54 | 2020 |
Crime prediction using a hybrid sentiment analysis approach based on the bidirectional encoder representations from transformers M Boukabous, M Azizi Indonesian Journal of Electrical Engineering and Computer Science 25 (2 …, 2022 | 45 | 2022 |
A lightweight optimized deep learning-based host-intrusion detection system deployed on the edge for IoT I Idrissi, M Mostafa Azizi, O Moussaoui International Journal of Computing and Digital System, 2021 | 45 | 2021 |
Implementation of secure key distribution based on quantum cryptography M Elboukhari, A Azizi, M Azizi 2009 International Conference on Multimedia Computing and Systems, 361-365, 2009 | 39 | 2009 |
Accelerating the update of a DL-based IDS for IoT using deep transfer learning I Idrissi, M Azizi, O Moussaoui Indonesian Journal of Electrical Engineering and Computer Science 23 (2 …, 2021 | 34 | 2021 |
An unsupervised generative adversarial network based-host intrusion detection system for internet of things devices I Idrissi, M Azizi, O Moussaoui Indones. J. Electr. Eng. Comput. Sci 25 (2), 1140-1150, 2022 | 31 | 2022 |
Monitoring and control of the performances for photovoltaic systems M Hamdaoui, A Rabhi, A El Hajjaji, M Rahmoun, M Azizi International Renewable Energy Congress, 2009 | 30 | 2009 |
MDA approach to automate code generation for mobile applications H Benouda, M Azizi, R Esbai, M Moussaoui Mobile and Wireless Technologies 2016, 241-250, 2016 | 27 | 2016 |
Review on forest fires detection and prediction using deep learning and drones M Yandouzi, M Grari, I Idrissi, O Moussaoui, M Azizi, K Ghoumid, ... J. Theor. Appl. Inf. Technol 100 (12), 4565-4576, 2022 | 26 | 2022 |
Augmented binary multi-labeled CNN for practical facial attribute classification M Berrahal, M Azizi Indonesian Journal of Electrical Engineering and Computer Science 23 (2 …, 2021 | 26 | 2021 |
Classification of major security attacks against RFID systems M El Beqqal, M Azizi 2017 International Conference on Wireless Technologies, Embedded and …, 2017 | 26 | 2017 |
Modeling and code generation of Android applications using acceleo H Benouda, R ESSBAI, M AZIZI, M MOUSSAOUI International Journal of Software Engineering and Its Applications 10 (3), 83-94, 2016 | 26 | 2016 |
Analysis of the Security of BB84 by Model Checking M Elboukhari, M Azizi, A Azizi arXiv preprint arXiv:1005.4504, 2010 | 26 | 2010 |
Optimal text-to-image synthesis model for generating portrait images using generative adversarial network techniques M Berrahal, M Azizi Indonesian Journal of Electrical Engineering and Computer Science 25 (2 …, 2022 | 25 | 2022 |
Review of learning-based techniques of sentiment analysis for security purposes M Boukabous, M Azizi The Proceedings of the Third International Conference on Smart City …, 2020 | 25 | 2020 |
Review on security issues in RFID systems M El Beqqal, M Azizi Adv. Sci. Technol. Eng. Syst 2 (6), 194-202, 2017 | 22 | 2017 |