default search action
Ihsen Alouani
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j19]Bilel Tarchoun, Anouar Ben Khalifa, Mohamed Ali Mahjoub, Nael B. Abu-Ghazaleh, Ihsen Alouani:
An information-theoretic perspective of physical adversarial patches. Neural Networks 179: 106590 (2024) - [c38]Nahla Majdoub Bhiri, Safa Ameur, Imen Jegham, Ihsen Alouani, Anouar Ben Khalifa:
A Deep CNN-BiGRU Network for Multi-stream Hand Gesture Recognition Framework. CoDIT 2024: 893-898 - [c37]Amira Guesmi, Ruitian Ding, Muhammad Abdullah Hanif, Ihsen Alouani, Muhammad Shafique:
DAP: A Dynamic Adversarial Patch for Evading Person Detectors. CVPR 2024: 24595-24604 - [c36]Md. Shohidul Islam, Sankha Baran Dutta, Andres Marquez, Ihsen Alouani, Khaled N. Khasawneh:
Harnessing ML Privacy by Design Through Crossbar Array Non-Idealities. DATE 2024: 1-2 - [c35]Hamed Poursiami, Ihsen Alouani, Maryam Parsa:
Watermarking Neuromorphic Brains: Intellectual Property Protection in Spiking Neural Networks. ICONS 2024: 287-294 - [c34]Md. Shohidul Islam, Ihsen Alouani, Khaled N. Khasawneh:
Hardware Support for Trustworthy Machine Learning: A Survey. ISQED 2024: 1-6 - [i25]Behnam Omidi, Khaled N. Khasawneh, Ihsen Alouani:
Evasive Hardware Trojan through Adversarial Power Trace. CoRR abs/2401.02342 (2024) - [i24]Hamed Poursiami, Ihsen Alouani, Maryam Parsa:
BrainLeaks: On the Privacy-Preserving Properties of Neuromorphic Architectures against Model Inversion Attacks. CoRR abs/2402.00906 (2024) - [i23]Amira Guesmi, Muhammad Abdullah Hanif, Ihsen Alouani, Bassem Ouni, Muhammad Shafique:
SSAP: A Shape-Sensitive Adversarial Patch for Comprehensive Disruption of Monocular Depth Estimation in Autonomous Navigation Applications. CoRR abs/2403.11515 (2024) - [i22]Hamed Poursiami, Ihsen Alouani, Maryam Parsa:
Watermarking Neuromorphic Brains: Intellectual Property Protection in Spiking Neural Networks. CoRR abs/2405.04049 (2024) - [i21]Mahmoud Ghorbel, Halima Bouzidi, Ioan Marius Bilasco, Ihsen Alouani:
Model for Peanuts: Hijacking ML Models without Training Access is Possible. CoRR abs/2406.01708 (2024) - 2023
- [j18]Imen Jegham, Ihsen Alouani, Anouar Ben Khalifa, Mohamed Ali Mahjoub:
Deep learning-based hard spatial attention for driver in-vehicle action monitoring. Expert Syst. Appl. 219: 119629 (2023) - [j17]Nahla Majdoub Bhiri, Safa Ameur, Ihsen Alouani, Mohamed Ali Mahjoub, Anouar Ben Khalifa:
Hand gesture recognition with focus on leap motion: An overview, real world challenges and future directions. Expert Syst. Appl. 226: 120125 (2023) - [j16]Marwa Afnouch, Olfa Gaddour, Yosr Hentati, Fares Bougourzi, Mohamed Abid, Ihsen Alouani, Abdelmalik Taleb-Ahmed:
BM-Seg: A new bone metastases segmentation dataset and ensemble of CNN-based segmentation approach. Expert Syst. Appl. 228: 120376 (2023) - [j15]Doaa K. Abdelrahman, Mohammed E. Fouda, Ihsen Alouani, Lobna A. Said, Ahmed G. Radwan:
Ternary SRAM circuit designs with CNTFETs. Int. J. Circuit Theory Appl. 51(7): 3443-3453 (2023) - [j14]Md. Shohidul Islam, Ihsen Alouani, Khaled N. Khasawneh:
SecureVolt: Enhancing Deep Neural Networks Security via Undervolting. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 42(12): 4922-4933 (2023) - [c33]Bilel Tarchoun, Anouar Ben Khalifa, Mohamed Ali Mahjoub, Nael B. Abu-Ghazaleh, Ihsen Alouani:
Jedi: Entropy-Based Localization and Removal of Adversarial Patches. CVPR 2023: 4087-4095 - [c32]Md. Shohidul Islam, Ihsen Alouani, Khaled N. Khasawneh:
Stochastic-HMDs: Adversarial-Resilient Hardware Malware Detectors via Undervolting. DAC 2023: 1-6 - [c31]Maryam Parsa, Khaled N. Khasawneh, Ihsen Alouani:
A Brain-inspired Approach for Malware Detection using Sub-semantic Hardware Features. ACM Great Lakes Symposium on VLSI 2023: 139-142 - [c30]Md. Shohidul Islam, Behnam Omidi, Ihsen Alouani, Khaled N. Khasawneh:
VPP: Privacy Preserving Machine Learning via Undervolting. HOST 2023: 315-325 - [c29]Ayoub Arous, Amira Guesmi, Muhammad Abdullah Hanif, Ihsen Alouani, Muhammad Shafique:
Exploring Machine Learning Privacy/Utility Trade-Off from a Hyperparameters Lens. IJCNN 2023: 1-10 - [i20]Amira Guesmi, Muhammad Abdullah Hanif, Ihsen Alouani, Muhammad Shafique:
APARATE: Adaptive Adversarial Patch for CNN-based Monocular Depth Estimation for Autonomous Navigation. CoRR abs/2303.01351 (2023) - [i19]Amira Guesmi, Ioan Marius Bilasco, Muhammad Shafique, Ihsen Alouani:
AdvART: Adversarial Art for Camouflaged Object Detection Attacks. CoRR abs/2303.01734 (2023) - [i18]Ayoub Arous, Amira Guesmi, Muhammad Abdullah Hanif, Ihsen Alouani, Muhammad Shafique:
Exploring Machine Learning Privacy/Utility trade-off from a hyperparameters Lens. CoRR abs/2303.01819 (2023) - [i17]Bilel Tarchoun, Anouar Ben Khalifa, Mohamed Ali Mahjoub, Nael B. Abu-Ghazaleh, Ihsen Alouani:
Jedi: Entropy-based Localization and Removal of Adversarial Patches. CoRR abs/2304.10029 (2023) - [i16]Amira Guesmi, Ruitian Ding, Muhammad Abdullah Hanif, Ihsen Alouani, Muhammad Shafique:
DAP: A Dynamic Adversarial Patch for Evading Person Detectors. CoRR abs/2305.11618 (2023) - [i15]Md Abdullah Al Mamun, Quazi Mishkatul Alam, Erfan Shaigani, Pedram Zaree, Ihsen Alouani, Nael B. Abu-Ghazaleh:
DeepMem: ML Models as storage channels and their (mis-)applications. CoRR abs/2307.08811 (2023) - [i14]Quazi Mishkatul Alam, Bilel Tarchoun, Ihsen Alouani, Nael B. Abu-Ghazaleh:
Attention Deficit is Ordered! Fooling Deformable Vision Transformers with Collaborative Adversarial Patches. CoRR abs/2311.12914 (2023) - [i13]Bilel Tarchoun, Quazi Mishkatul Alam, Nael B. Abu-Ghazaleh, Ihsen Alouani:
Fool the Hydra: Adversarial Attacks against Multi-view Object Detection Systems. CoRR abs/2312.00173 (2023) - [i12]Ayoub Arous, Andrés F. López-Lopera, Nael B. Abu-Ghazaleh, Ihsen Alouani:
May the Noise be with you: Adversarial Training without Adversarial Examples. CoRR abs/2312.08877 (2023) - 2022
- [j13]Amira Guesmi, Ihsen Alouani, Mouna Baklouti, Tarek Frikha, Mohamed Abid:
SIT: Stochastic Input Transformation to Defend Against Adversarial Attacks on Deep Neural Networks. IEEE Des. Test 39(3): 63-72 (2022) - [j12]Rawan Mohammed, Mohammed E. Fouda, Ihsen Alouani, Lobna A. Said, Ahmed G. Radwan:
CNTFET-based ternary address decoder design. Int. J. Circuit Theory Appl. 50(10): 3682-3691 (2022) - [j11]Anis Amazigh Hamza, Iyad Dayoub, Ihsen Alouani, Abderrahmane Amrouche:
On the Error Rate Performance of Full-Duplex Cooperative NOMA in Wireless Networks. IEEE Trans. Commun. 70(3): 1742-1758 (2022) - [c28]Ihsen Alouani:
Breaking (and Fixing) Channel-based Cryptographic Key Generation: A Machine Learning Approach. DSD 2022: 383-390 - [c27]Amira Guesmi, Khaled N. Khasawneh, Nael B. Abu-Ghazaleh, Ihsen Alouani:
ROOM: Adversarial Machine Learning Attacks Under Real-Time Constraints. IJCNN 2022: 1-10 - [c26]Shail Dave, Alberto Marchisio, Muhammad Abdullah Hanif, Amira Guesmi, Aviral Shrivastava, Ihsen Alouani, Muhammad Shafique:
Special Session: Towards an Agile Design Methodology for Efficient, Reliable, and Secure ML Systems. VTS 2022: 1-14 - [d2]Venu Babu Thati, Nikolay Smagin, Hatem Dahmani, Julien Carlier, Ihsen Alouani:
Ultra High Frequency Acoustic Coda Waves. IEEE DataPort, 2022 - [d1]Venu Babu Thati, Ibrahim Zaaroura, Malika Toubal, Nikolay Smagin, Souad Harmand, Julien Carlier, Ihsen Alouani:
Fluid concentration estimation. IEEE DataPort, 2022 - [i11]Amira Guesmi, Khaled N. Khasawneh, Nael B. Abu-Ghazaleh, Ihsen Alouani:
ROOM: Adversarial Machine Learning Attacks Under Real-Time Constraints. CoRR abs/2201.01621 (2022) - [i10]Shail Dave, Alberto Marchisio, Muhammad Abdullah Hanif, Amira Guesmi, Aviral Shrivastava, Ihsen Alouani, Muhammad Shafique:
Special Session: Towards an Agile Design Methodology for Efficient, Reliable, and Secure ML Systems. CoRR abs/2204.09514 (2022) - [i9]Amira Guesmi, Ihsen Alouani:
Adversarial Attack on Radar-based Environment Perception Systems. CoRR abs/2211.01112 (2022) - [i8]Amira Guesmi, Ihsen Alouani, Khaled N. Khasawneh, Mouna Baklouti, Tarek Frikha, Mohamed Abid, Nael B. Abu-Ghazaleh:
Defending with Errors: Approximate Computing for Robustness of Deep Neural Networks. CoRR abs/2211.01182 (2022) - 2021
- [j10]Amr Mohammaden, Mohammed E. Fouda, Ihsen Alouani, Lobna A. Said, Ahmed G. Radwan:
CNTFET design of a multiple-port ternary register file. Microelectron. J. 113: 105076 (2021) - [j9]Alexandre Chabot, Ihsen Alouani, Réda Nouacer, Smaïl Niar:
A Memory Reliability Enhancement Technique for Multi Bit Upsets. J. Signal Process. Syst. 93(4): 439-459 (2021) - [c25]Amira Guesmi, Ihsen Alouani, Khaled N. Khasawneh, Mouna Baklouti, Tarek Frikha, Mohamed Abid, Nael B. Abu-Ghazaleh:
Defensive approximation: securing CNNs using approximate computing. ASPLOS 2021: 990-1003 - [c24]Bilel Tarchoun, Ihsen Alouani, Anouar Ben Khalifa, Mohamed Ali Mahjoub:
Adversarial Attacks in a Multi-view Setting: An Empirical Study of the Adversarial Patches Inter-view Transferability. CW 2021: 299-302 - [c23]Rida El-Allami, Alberto Marchisio, Muhammad Shafique, Ihsen Alouani:
Securing Deep Spiking Neural Networks against Adversarial Attacks through Inherent Structural Parameters. DATE 2021: 774-779 - [c22]Amira Mimouna, Anouar Ben Khalifa, Ihsen Alouani, Abdelmalik Taleb-Ahmed, Atika Rivenq, Najoua Essoukri Ben Amara:
LSTM-based System for Multiple Obstacle Detection using Ultra-wide Band Radar. ICAART (2) 2021: 418-425 - [c21]Md. Shohidul Islam, Ihsen Alouani, Khaled N. Khasawneh:
Lower Voltage for Higher Security: Using Voltage Overscaling to Secure Deep Neural Networks. ICCAD 2021: 1-9 - [c20]Ihsen Alouani, Anouar Ben Khalifa, Farhad Merchant, Rainer Leupers:
An Investigation on Inherent Robustness of Posit Data Representation. VLSID 2021: 276-281 - [i7]Ihsen Alouani, Anouar Ben Khalifa, Farhad Merchant, Rainer Leupers:
An Investigation on Inherent Robustness of Posit Data Representation. CoRR abs/2101.01416 (2021) - [i6]Md. Shohidul Islam, Ihsen Alouani, Khaled N. Khasawneh:
Stochastic-HMDs: Adversarial Resilient Hardware Malware Detectors through Voltage Over-scaling. CoRR abs/2103.06936 (2021) - [i5]Nicolas Fleury, Theo Dubrunquez, Ihsen Alouani:
PDF-Malware: An Overview on Threats, Detection and Evasion Attacks. CoRR abs/2107.12873 (2021) - [i4]Bilel Tarchoun, Ihsen Alouani, Anouar Ben Khalifa, Mohamed Ali Mahjoub:
Adversarial Attacks in a Multi-view Setting: An Empirical Study of the Adversarial Patches Inter-view Transferability. CoRR abs/2110.04887 (2021) - 2020
- [j8]Anouar Ben Khalifa, Ihsen Alouani, Mohamed Ali Mahjoub, Najoua Essoukri Ben Amara:
Pedestrian detection using a moving camera: A novel framework for foreground detection. Cogn. Syst. Res. 60: 77-96 (2020) - [j7]Imen Jegham, Anouar Ben Khalifa, Ihsen Alouani, Mohamed Ali Mahjoub:
Vision-based human action recognition: An overview and real world challenges. Digit. Investig. 32: 200901 (2020) - [j6]Mohamed A. Neggaz, Ihsen Alouani, Smaïl Niar, Fadi J. Kurdahi:
Are CNNs Reliable Enough for Critical Applications? An Exploratory Study. IEEE Des. Test 37(2): 76-83 (2020) - [j5]Anouar Ben Khalifa, Ihsen Alouani, Mohamed Ali Mahjoub, Atika Rivenq:
A novel multi-view pedestrian detection database for collaborative Intelligent Transportation Systems. Future Gener. Comput. Syst. 113: 506-527 (2020) - [j4]Ihsen Alouani, Hamzeh Ahangari, Ozcan Ozturk, Smaïl Niar:
Power-efficient reliable register file for aggressive-environment applications. IET Comput. Digit. Tech. 14(1): 1-8 (2020) - [j3]Imen Jegham, Anouar Ben Khalifa, Ihsen Alouani, Mohamed Ali Mahjoub:
A novel public dataset for multimodal multiview and multispectral driver distraction analysis: 3MDAD. Signal Process. Image Commun. 88: 115960 (2020) - [c19]Karim M. A. Ali, Ihsen Alouani, Abdessamad Ait El Cadi, Hamza Ouarnoughi, Smaïl Niar:
Cross-layer CNN Approximations for Hardware Implementation. ARC 2020: 151-165 - [c18]Bilel Tarchoun, Imen Jegham, Anouar Ben Khalifa, Ihsen Alouani, Mohamed Ali Mahjoub:
Deep CNN-based Pedestrian Detection for Intelligent Infrastructure. ATSIP 2020: 1-6 - [c17]Valerio Venceslai, Alberto Marchisio, Ihsen Alouani, Maurizio Martina, Muhammad Shafique:
NeuroAttack: Undermining Spiking Neural Networks Security through Externally Triggered Bit-Flips. IJCNN 2020: 1-8 - [i3]Valerio Venceslai, Alberto Marchisio, Ihsen Alouani, Maurizio Martina, Muhammad Shafique:
NeuroAttack: Undermining Spiking Neural Networks Security through Externally Triggered Bit-Flips. CoRR abs/2005.08041 (2020) - [i2]Amira Guesmi, Ihsen Alouani, Khaled N. Khasawneh, Mouna Baklouti, Tarek Frikha, Mohamed Abid, Nael B. Abu-Ghazaleh:
Defensive Approximation: Enhancing CNNs Security through Approximate Computing. CoRR abs/2006.07700 (2020) - [i1]Rida El-Allami, Alberto Marchisio, Muhammad Shafique, Ihsen Alouani:
Securing Deep Spiking Neural Networks against Adversarial Attacks through Inherent Structural Parameters. CoRR abs/2012.05321 (2020)
2010 – 2019
- 2019
- [c16]Imen Jegham, Anouar Ben Khalifa, Ihsen Alouani, Mohamed Ali Mahjoub:
MDAD: A Multimodal and Multiview in-Vehicle Driver Action Dataset. CAIP (1) 2019: 518-529 - [c15]Alexandre Chabot, Ihsen Alouani, Smaïl Niar, Réda Nouacer:
A new memory reliability technique for multiple bit upsets mitigation. CF 2019: 145-152 - [c14]Ilyas Bendjillali Ridha, Mohammed Beladgham, Khaled Merit, Ahmed Abdelmalik Taleb, Ihsen Alouani:
Facial Expression Recognition Based on DWT Feature for Deep CNN. CoDIT 2019: 344-348 - [c13]Amira Guesmi, Ihsen Alouani, Mouna Baklouti, Tarek Frikha, Mohamed Abid, Atika Rivenq:
HEAP: A Heterogeneous Approximate Floating-Point Multiplier for Error Tolerant Applications. RSP 2019: 36-42 - 2018
- [j2]Ihsen Alouani, Hamzeh Ahangari, Ozcan Ozturk, Smaïl Niar:
A Novel Heterogeneous Approximate Multiplier for Low Power and High Performance. IEEE Embed. Syst. Lett. 10(2): 45-48 (2018) - [c12]Mohamed A. Neggaz, Ihsen Alouani, Pablo R. Lorenzo, Smaïl Niar:
A Reliability Study on CNNs for Critical Embedded Systems. ICCD 2018: 476-479 - [c11]Imen Jegham, Anouar Ben Khalifa, Ihsen Alouani, Mohamed Ali Mahjoub:
Safe Driving : Driver Action Recognition using SURF Keypoints. ICM 2018: 60-63 - [c10]Alexandre Chabot, Ihsen Alouani, Smaïl Niar, Réda Nouacer:
A Comprehensive Fault Injection Strategy for Embedded Systems Reliability Assessment. RSP 2018: 22-28 - 2017
- [j1]Ihsen Alouani, Wael M. Elsharkasy, Ahmed M. Eltawil, Fadi J. Kurdahi, Smaïl Niar:
AS8-static random access memory (SRAM): asymmetric SRAM architecture for soft error hardening enhancement. IET Circuits Devices Syst. 11(1): 89-94 (2017) - [c9]Ihsen Alouani, Thomas Wild, Andreas Herkersdorf, Smaïl Niar:
Adaptive Reliability for Fault Tolerant Multicore Systems. DSD 2017: 538-542 - [c8]Hamzeh Ahangari, Ihsen Alouani, Özcan Özturk, Smaïl Niar:
Reconfigurable Hardened Latch and Flip-Flop for FPGAs. ISVLSI 2017: 433-438 - 2016
- [b1]Ihsen Alouani:
Design of self-tuning reliable embedded systems and its application in railway transportation systems. (Conception de systèmes embarqués fiables et auto-réglables : applications sur les systèmes de transport ferroviaire). University of Valenciennes and Hainaut-Cambresis, France, 2016 - [c7]Ihsen Alouani, Smaïl Niar, Yassin El Hillali, Mazen A. R. Saghir, Fadi J. Kurdahi, Menhaj Atika:
Auto-tuning Fault Tolerance Technique for DSP-Based Circuits in Transportation Systems. RES4ANT@DATE 2016: 33-37 - [c6]Ihsen Alouani, Hamzeh Ahangari, Özcan Özturk, Smaïl Niar:
NS-SRAM: Neighborhood Solidarity SRAM for Reliability Enhancement of SRAM Memories. DSD 2016: 154-159 - [c5]Hamzeh Ahangari, Ihsen Alouani, Özcan Özturk, Smaïl Niar, Atika Rivenq:
Register file reliability enhancement through adjacent narrow-width exploitation. DTIS 2016: 1-4 - 2015
- [c4]Ihsen Alouani, Smaïl Niar, Yassin El Hillali, Atika Rivenq-Menhaj:
Modeling transistor level masking of soft errors in combinational circuits. EWDTS 2015: 1-4 - [c3]Ihsen Alouani, Braham Lotfi Mediouni, Smaïl Niar:
A multi-objective approach for software/hardware partitioning in a multi-target tracking system. RSP 2015: 119-125 - 2014
- [c2]Ihsen Alouani, Mazen A. R. Saghir, Smaïl Niar:
ARABICA: A Reconfigurable Arithmetic Block for ISA Customization. ARC 2014: 248-253 - 2012
- [c1]Ihsen Alouani, Smaïl Niar, Fadi J. Kurdahi, Mohamed Abid:
Parity-based mono-Copy Cache for low power consumption and high reliability. RSP 2012: 44-48
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-17 21:53 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint