default search action
Hamza Kheddar
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j12]Shahab Saquib Sohail, Yassine Himeur, Hamza Kheddar, Abbes Amira, Fodil Fadli, Shadi Atalla, Abigail Copiaco, Wathiq Mansoor:
Advancing 3D point cloud understanding through deep transfer learning: A comprehensive survey. Inf. Fusion 113: 102601 (2025) - [j11]Mustapha Hemis, Hamza Kheddar, Sami Bourouis, Nasir Saleem:
Deep learning techniques for hand vein biometrics: A comprehensive review. Inf. Fusion 114: 102716 (2025) - 2024
- [j10]Billel Essaid, Hamza Kheddar, Noureddine Batel, Muhammad E. H. Chowdhury, Abderrahmane Lakas:
Artificial Intelligence for Cochlear Implants: Review of Strategies, Challenges, and Perspectives. IEEE Access 12: 119015-119038 (2024) - [j9]Ammar Chouchane, Mohcene Bessaoudi, Hamza Kheddar, Abdelmalik Ouamane, Tiago Vieira, Mahmoud Hassaballah:
Multilinear subspace learning for Person Re-Identification based fusion of high order tensor features. Eng. Appl. Artif. Intell. 128: 107521 (2024) - [j8]Hamza Kheddar, Mustapha Hemis, Yassine Himeur, David Megías, Abbes Amira:
Deep learning for steganalysis of diverse data types: A review of methods, taxonomy, challenges and future directions. Neurocomputing 581: 127528 (2024) - [j7]Hamza Kheddar, Mustapha Hemis, Yassine Himeur:
Automatic speech recognition using advanced deep learning approaches: A survey. Inf. Fusion 109: 102422 (2024) - [c2]Afrah Gueriani, Hamza Kheddar, Ahmed Cherif Mazari:
Enhancing IoT Security with CNN and LSTM-Based Intrusion Detection Systems. PAIS 2024: 1-7 - [i18]Hamza Kheddar, Mustapha Hemis, Yassine Himeur:
Automatic Speech Recognition using Advanced Deep Learning Approaches: A survey. CoRR abs/2403.01255 (2024) - [i17]Hamza Kheddar, Yassine Himeur, Abbes Amira, Rachik Soualah:
High-energy physics image classification: A Survey of Jet Applications. CoRR abs/2403.11934 (2024) - [i16]Yassine Habchi, Hamza Kheddar, Yassine Himeur, Abdelkrim Boukabou, Ammar Chouchane, Abdelmalik Ouamane, Shadi Atalla, Wathiq Mansoor:
Machine Learning and Vision Transformers for Thyroid Carcinoma Diagnosis: A review. CoRR abs/2403.13843 (2024) - [i15]Billel Essaid, Hamza Kheddar, Noureddine Batel, Abderrahmane Lakas, Muhammad E. H. Chowdhury:
Advanced Artificial Intelligence Algorithms in Cochlear Implants: Review of Healthcare Strategies, Challenges, and Perspectives. CoRR abs/2403.15442 (2024) - [i14]Afrah Gueriani, Hamza Kheddar, Ahmed Cherif Mazari:
Enhancing IoT Security with CNN and LSTM-Based Intrusion Detection Systems. CoRR abs/2405.18624 (2024) - [i13]Afrah Gueriani, Hamza Kheddar, Ahmed Cherif Mazari:
Deep Reinforcement Learning for Intrusion Detection in IoT: A Survey. CoRR abs/2405.20038 (2024) - [i12]Shahab Saquib Sohail, Yassine Himeur, Hamza Kheddar, Abbes Amira, Fodil Fadli, Shadi Atalla, Abigail Copiaco, Wathiq Mansoor:
Advancing 3D Point Cloud Understanding through Deep Transfer Learning: A Comprehensive Survey. CoRR abs/2407.17877 (2024) - [i11]Yassine Habchi, Hamza Kheddar, Yassine Himeur, Abdelkrim Boukabou, Shadi Atalla, Wathiq Mansoor, Hussain Al-Ahmad:
Deep Transfer Learning for Kidney Cancer Diagnosis. CoRR abs/2408.04318 (2024) - [i10]Hamza Kheddar:
Transformers and Large Language Models for Efficient Intrusion Detection Systems: A Comprehensive Survey. CoRR abs/2408.07583 (2024) - [i9]Mustapha Hemis, Hamza Kheddar, Sami Bourouis, Nasir Saleem:
Deep Learning Techniques for Hand Vein Biometrics: A Comprehensive Review. CoRR abs/2409.07128 (2024) - [i8]Noussaiba Djeffal, Hamza Kheddar, Djamel Addou, Ahmed Cherif Mazari, Yassine Himeur:
Automatic Speech Recognition with BERT and CTC Transformers: A Review. CoRR abs/2410.09456 (2024) - 2023
- [j6]Yassine Himeur, Somaya Al-Máadeed, Hamza Kheddar, Noor Al-Máadeed, Khalid Abualsaud, Amr Mohamed, Tamer Khattab:
Video surveillance using deep transfer learning and deep domain adaptation: Towards better generalization. Eng. Appl. Artif. Intell. 119: 105698 (2023) - [j5]Hamza Kheddar, Yassine Himeur, Ali Ismail Awad:
Deep transfer learning for intrusion detection in industrial control networks: A comprehensive review. J. Netw. Comput. Appl. 220: 103760 (2023) - [j4]Hamza Kheddar, Yassine Himeur, Sumaya Almaadeed, Abbes Amira, Faycal Bensaali:
Deep transfer learning for automatic speech recognition: Towards better generalization. Knowl. Based Syst. 277: 110851 (2023) - [j3]Yassine Habchi, Yassine Himeur, Hamza Kheddar, Abdelkrim Boukabou, Shadi Atalla, Ammar Chouchane, Abdelmalik Ouamane, Wathiq Mansoor:
AI in Thyroid Cancer Diagnosis: Techniques, Trends, and Future Directions. Syst. 11(10): 519 (2023) - [i7]Hamza Kheddar, Yassine Himeur, Ali Ismail Awad:
Deep Transfer Learning Applications in Intrusion Detection Systems: A Comprehensive Review. CoRR abs/2304.10550 (2023) - [i6]Hamza Kheddar, Yassine Himeur, Somaya Al-Máadeed, Abbes Amira, Faycal Bensaali:
Deep Transfer Learning for Automatic Speech Recognition: Towards Better Generalization. CoRR abs/2304.14535 (2023) - [i5]Hamza Kheddar, Mustapha Hemis, Yassine Himeur, David Megías, Abbes Amira:
Deep Learning for Diverse Data Types Steganalysis: A Review. CoRR abs/2308.04522 (2023) - [i4]Yassine Himeur, Iraklis Varlamis, Hamza Kheddar, Abbes Amira, Shadi Atalla, Yashbir Singh, Faycal Bensaali, Wathiq Mansoor:
Federated Learning for Computer Vision. CoRR abs/2308.13558 (2023) - [i3]Yassine Habchi, Yassine Himeur, Hamza Kheddar, Abdelkrim Boukabou, Shadi Atalla, Ammar Chouchane, Abdelmalik Ouamane, Wathiq Mansoor:
AI in Thyroid Cancer Diagnosis: Techniques, Trends, and Future Directions. CoRR abs/2308.13592 (2023) - 2022
- [j2]Hamza Kheddar, David Megías:
High capacity speech steganography for the G723.1 coder based on quantised line spectral pairs interpolation and CNN auto-encoding. Appl. Intell. 52(8): 9441-9459 (2022) - [c1]Hamza Kheddar, Yassine Himeur, Shadi Atalla, Wathiq Mansoor:
An Efficient Model for Horizontal Slicing in 5G Network using Practical Simulations. ICSPIS 2022: 158-163 - [i2]Hamza Kheddar, Soufiane Ouldkhaoua, Riadh Bouguerra:
All you need for horizontal slicing in 5G network. CoRR abs/2207.11477 (2022) - [i1]Hamza Kheddar:
From 2G to 4G Mobile Network: Architecture and Key Performance Indicators. CoRR abs/2210.00642 (2022)
2010 – 2019
- 2019
- [j1]Hamza Kheddar, Merouane Bouzid, David Megías:
Pitch and Fourier magnitude based steganography for hiding 2.4 kbps MELP bitstream. IET Signal Process. 13(3): 396-407 (2019)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-25 23:42 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint