Axes de recherche
Publications
-
2025Hamida Labidi, Abir Chaabani, Nadia Ben Azzouna
Hybrid Genetic Algorithm for Solving an Online Vehicle Routing Problem with Time Windows and Heterogeneous Fleet
This paper proposes a hybrid genetic algorithm to address an online vehicle routing problem with time windows and a heterogeneous fleet, presented at Hybrid Intelligent Systems (HIS 2023)., 2025
Résumé
The Vehicle Routing Problem (VRP) is a well-known optimization problem in which we aim traditionally to minimize transportation costs while satisfying customer demands. In fact, most logistics companies use a heterogeneous fleet with varying capacities and costs, presenting a more complex variant known as Rich VRP (RVRP). In this paper, we present a mathematical formulation of the RVRP, considering both hard time windows and dynamically changing requests to be as close as possible to real-life logistics scenarios. To solve this challenging problem, we propose a Hybrid Genetic Algorithm (HGA). The experimental study highlights the out-performance of our proposal when evaluated alongside other algorithms on the same benchmark problems. Additionally, we conduct a sensitivity analysis to illustrate how resilient the algorithm is when problem parameters are altered.
Ali Abdelghafour Bejaoui, Meriam Jemel, Nadia Ben AzzounaExplainable AI Planning:literature review
Automated planning systems have become indispensable tools in a wide range of applications, from robotics and healthcare to logistics and autonomous systems. However, as these systems grow in complexity, their decision-making processes often become opaque, 2025
Résumé
Explainable AI Planning (XAIP) is a pivotal research
area focused on enhancing the transparency, interpretability,
and trustworthiness of automated planning systems. This
paper provides a comprehensive review of XAIP, emphasizing key
techniques for plan explanation, such as contrastive explanations,
hierarchical decomposition, and argumentative reasoning frameworks.
We explore the critical role of argumentation in justifying
planning decisions and address the challenges of replanning in
dynamic and uncertain environments, particularly in high-stakes
domains like healthcare, autonomous systems, and logistics.
Additionally, we discuss the ethical and practical implications
of deploying XAIP, highlighting the importance of human-AI
collaboration, regulatory compliance, and uncertainty handling.
By examining these aspects, this paper aims to provide a detailed
understanding of how XAIP can improve the transparency,
interpretability, and usability of AI planning systems across
various domains.Jihene LATRECH, Zahra Kodia, Nadia Ben AzzounaCoD-MaF: toward a Context-Driven Collaborative Filtering using Contextual Biased Matrix Factorization
International Journal of Data Science and Analytics, 1-18., 2025
Résumé
Contextual recommendation has become attainable through the massive amounts of contextual information generated by smartphones and Internet of Things (IoT) devices. The availability of a huge amount of contextual data paves the way for a revolution in recommendation systems. It overcomes the static nature of personalization, which does not allow the discovery of new items and interests, toward a contextualization of the user’s tastes, which are in constant evolution. In this paper, we proposed CoD-MaF, a Context-Driven Collaborative Filtering using Contextual biased Matrix Factorization. Our approach employs feature selection methods to extract the most influential contextual features that will be used to cluster the users using K-means algorithm. The model then performs a collaborative filtering based on matrix factorization with improved contextual biases to suggest relevant personalized recommendations. We highlighted the performance of our method through experiments on four datasets (LDOS-CoMoDa, STS-Travel, IncarMusic and Frappe). Our model enhanced the accuracy of predictions and achieved competitive performance compared to baseline methods in metrics of RMSE and MAE.
Jihene LATRECH, Zahra Kodia, Nadia Ben AzzounaMachine Learning Based Collaborative Filtering Using Jensen-Shannon Divergence for Context-Driven Recommendations
*, 2025
Résumé
This research presents a machine learning-based context-driven collaborative filtering approach with three
steps: contextual clustering, weighted similarity assessment, and collaborative filtering. User data is clustered
across 3 aspects, and similarity scores are calculated, dynamically weighted, and aggregated into a normalized
User-User similarity matrix. Collaborative filtering is then applied to generate contextual recommendations.
Experiments on the LDOS-CoMoDa dataset demonstrated good performance, with RMSE and MAE rates of
0.5774 and 0.3333 respectively, outperforming reference approaches. -
2024Alia Maaloul, Meriam Jemel, Nadia Ben Azzouna
Feature selection for Gestational Diabetes Mellitus prediction using XAI based AutoML approach
International Conference on Decision Aid and Artificial Intelligence 2024 (ICODAI), Tunis, Tunisia, 2024, 2024
Résumé
Predicting Gestational Diabetes Mellitus (GDM) is crucial for
pregnant women to enable regular monitoring of their blood sugar levels and
adherence to a healthy diet. Early intervention can significantly lower the risk
of developing this condition. To assess this risk, Machine Learning (ML) and
Deep Learning techniques are employed. However, traditional ML models often
face challenges in accurately predicting GDM risk due to the complex
processing required to optimize their hyperparameters for the best performance.
This study presents a feature selection for GDM prediction using AutoML-XAI
techniques (Automatic Machine Learning – eXplainable Artificial Intelligence
techniques) approach, which aims to automatically predict GDM risk as
accurate as possible while providing meaningful interpretations of the
predictive results used in feature selection. The AutoML models generated
utilize a Kaggle dataset and several combinations of features selected based on
their scores of importance determinated with XAI techniques such as SHAP(Shapley Additive Explanations) and LIME (Local Interpretable Model-
agnostic Explanations). The proposed approach of autoML and featuresselection with XAI techniques leads to the creation of a precise, efficient, and
easily interpretable model which surpasses other machine learning models in
predicting GDM risk without the need for human intervention. The scores of
importance of features are involved in the feature selection process and
multiple AutoML models are generated and assessed, with the optimal AutoML
model being established automatically.Rihab Abidi, Nadia Ben Azzouna, Wassim Trojet, Ghaleb Hoblos, Nabil SahliA study of mechanisms and approaches for IoV trust models requirements achievement
Journal of Supercomputing, 80(3)., 2024
Résumé
Intelligent Transportation Systems (ITS) are a promising research area that offers a variety of applications. The objective of these applications is to enhance road safety, to optimize traffic efficiency, and to provide a better driving experience. Yet, the efficiency of ITS applications, such as safety and driver assistance applications, relies essentially on the exchanged data between different entities of the network. Accordingly, trust management models are used to guarantee the quality of the data and to eliminate malicious and selfish nodes to secure vehicular communications. In this paper, we pay a special attention to the requirements of trust management models used in the context of ITS applications. We also dissected the trust model to extract the mechanisms used in the literature to fulfil the identified requirements. Furthermore, we present the most known simulators and evaluation metrics that are used to validate the proposed models. The aim of this study is to provide a global overview of the mechanisms that may be used to fulfil the crucial requirements of trust management models. For this purpose, we employed a systematic mapping study, through which we carefully analysed 60 selected articles. Through our analysis, five main requirements were identified: scalability, accuracy, robustness, privacy preservation, appropriate response time. Different mechanisms and techniques were applied to meet with the identified requirements. Two main findings are reported: (1) The accuracy and robustness requirements are the most considered requirements. On the other hand, the privacy requirement is the least covered by the publications, (2) the majority of the reviewed papers focus on addressing two or three requirements at most. A little number of publications covered all the requirements. Based on the identified research gaps, we highlight some future directions that may be investigated. We provide general recommendations that may serve as a guideline for researchers who want to design trust models that fulfil certain requirements.
Malek Lachheb, Rihab Abidi, Nadia Ben Azzouna, Nabil SahliInfrastructure-Based Communication Trust Model for Intelligent Transportation Systems.
In VEHITS (pp. 513-521)., 2024
Résumé
Intelligent Transportation Systems (ITS) aim to enhance traffic management through Vehicle-to-Vehicle (V2V), Vehicle-to-Infrastructure (V2I) and Infrastructure-to-Infrastructure (I2I) communications. However, the wireless medium and dynamic nature of these networks expose them to security threats from faulty nodes or malicious attacks. While cryptography-based mechanisms provide security against outsider attacks, the network remains vulnerable to attacks from legitimate but malicious nodes. Trust models have hence been proposed to evaluate node and data credibility to make informed security decisions. Existing models are either vehicle-centric with limited stability due to mobility or infrastructure-based with risks of single points of failure. This paper proposes a self-organizing, infrastructure-based trust model for securing ITS communication leveraging Smart Roadside Signs (SRSs). The model introduces a trust-based clustering algorithm using a fuzzy-based Dempster Shafer Theory (DST). This eliminates dependence on external trusted authorities while enhancing stability through infrastructure oversight. The decentralized trust formation and adaptive clustering balance security assurance with scalability. The results of the simulations show that our model is resilient against on-off attack, packet drop attack, jamming attack, bad-mouthing attack and collusion attack.Laibidi Hamida, Abir Chaabani, Nadia Ben Azzouna, Hassine KhaledHybrid genetic algorithm for solving an online vehicle routing problem with time windows and heterogeneous fleet
23rd International Conference on Hybrid Intelligent Systems (HIS'23), 437-446, Springer Nature Switzerland, 2024
Résumé
The Vehicle Routing Problem (VRP) is a well-known optimization problem in which we aim traditionally to minimize transportation costs while satisfying customer demands. In fact, most logistics companies use a heterogeneous fleet with varying capacities and costs, presenting a more complex variant known as Rich VRP (RVRP). In this paper, we present a mathematical formulation of the RVRP, considering both hard time windows and dynamically changing requests to be as close as possible to real-life logistics scenarios. To solve this challenging problem, we propose a Hybrid Genetic Algorithm (HGA). The experimental study highlights the out-performance of our proposal when evaluated alongside other algorithms on the same benchmark problems. Additionally, we conduct a sensitivity analysis to illustrate how resilient the algorithm is when problem parameters are altered.
Moez Elarfaoui, Nadia Ben AzzounaCLUSTERING BASED ON HYBRIDIZATION OF GENETIC ALGORITHM AND IMPROVED K-MEANS (GA-IKM) IN AN IOT NETWORK
International Journal of Wireless & Mobile Networks (IJWMN), Vol.16, No.6, December 2024, 2024
Résumé
The continuous development of Internet infrastructures and the evolution of digital electronics, particularly Nano-computers, are making the Internet of Things (IoT) emergent. Despite the progress, these IoT objects suffer from a crucial problem which is their limited power supply. IoT objects are often deployed as an ad-hoc network. To minimize their consumption of electrical energy, clustering techniques are used. In this paper, a centralized clustering algorithm with single-hop routing based on a genetic algorithm and Improved k-means is proposed. The proposed approach is compared with the LEACH, K-means and OK-means algorithms. Simulation results show that the proposed algorithm performs well in terms of network lifetime and energy consumption.
Alia Maaloul, Meriam Jemel, Nadia Ben AzzounaXAI based feature selection for gestational diabetes Mellitus prediction
10th International Conference on Control, Decision and Information Technologies (CoDIT), Vallette, Malta, 2024, pp. 1939-1944, 2024
Résumé
Gestational Diabetes Mellitus (GDM) is a type of diabetes that develops during pregnancy. It is important for pregnant women to monitor their blood sugar levels regularly and follow a healthy diet. However, early intervention can greatly reduce risk of this type of diabetes. Machine Learning and Deep Learning techniques are utilized to predict this risk based on an individual's symptoms, lifestyle, and medical history. By identifying key features such as age, insulin, body mass index, and glucose levels, machine learning models such as Random Forest and XGBoost are used in this research work to classify patients at risk of a gestational diabetes. In addition, we propose an explainable feature selection approach to improve the accuracy of machine learning models for GDM prediction. This method involves iteratively eliminating features that exhibit a negative contribution as determined by the SHAP (Shapley Additive explanations) feature attribution explanations for the model’s predictions
Meriam Jemel, Alia Maaloul, Nadia Ben AzzounaXAI based feature selection for gestational diabetes Mellitus prediction
CoDIT 2024: 1939-1944, 2024
Résumé
Gestational Diabetes Mellitus (GDM) is a type of diabetes that develops during pregnancy. It is important for pregnant women to monitor their blood sugar levels regularly and follow a healthy diet. However, early intervention can greatly reduce risk of this type of diabetes. Machine Learning and Deep Learning techniques are utilized to predict this risk based on an individual's symptoms, lifestyle, and medical history. By identifying key features such as age, insulin, body mass index, and glucose levels, machine learning models such as Random Forest and XGBoost are used in this research work to classify patients at risk of a gestational diabetes. In addition, we propose an explainable feature selection approach to improve the accuracy of machine learning models for GDM prediction. This method involves iteratively eliminating features that exhibit a negative contribution as determined by the SHAP (Shapley Additive explanations) feature attribution explanations for the model’s predictions.
Wiem Ben Ghozzi, Zahra Kodia, Nadia Ben AzzounaFatigue Detection for the Elderly Using Machine Learning Techniques
10th International Conference on Control, Decision and Information Technologies (CoDIT), Vallette, Malta, 2024, pp. 2055-2060, doi: 10.1109/CoDIT62066.2024.10708516., 2024
Résumé
Elderly fatigue, a critical issue affecting the health and well-being of the aging population worldwide, presents as a substantial decline in physical and mental activity levels. This widespread condition reduces the quality of life and introduces significant hazards, such as increased accidents and cognitive deterioration. Therefore, this study proposed a model to detect fatigue in the elderly with satisfactory accuracy. In our contribution, we use video and image processing through a video in order to detect the elderly’s face recognition in each frame. The model identifies facial landmarks on the detected face and calculates the Eye Aspect Ratio (EAR), Eye Fixation, Eye Gaze Direction, Mouth Aspect Ratio (MAR), and 3D head pose. Among the various methods evaluated in our study, the Extra Trees algorithm outperformed all others machine learning methods, achieving the highest results with a sensitivity of 98.24%, specificity of 98.35%, and an accuracy of 98.29%.
Hamdi Ouechtati, Nadia Ben AzzounaTowards an Adaptive Trust Management Model Based on ANFIS in the SIoT
SECRYPT 2024: 710-715, 2024
Résumé
The integration of social networking concepts into the IoT environment has led to the Social Internet of Things
(SIoT) paradigm which enables connected devices and people to facilitate information sharing, interact, and
enable a variety of attractive applications. However, with this emerging paradigm, people feel cautious and
wary. They worry about violating their privacy and revealing their data. Without trustworthy mechanisms to
guarantee the reliability of user’s communications and interactions, the SIoT will not reach enough popularity
to be considered as a cutting-edge technology. Accordingly, trust management becomes a major challenge
to improve security and provide qualified services. Therefore, we overcome these issues through proposing
an adaptive trust management model based on Adaptive Neuro-Fuzzy Inference System (ANFIS) in order to
estimate the trust level of objects in the Social Internet of Things. We formalized and implemented a new trust
management model built ANFIS, to analyze different trust parameters, estimate the trust level of objects and
distinguish malicious behavior from benign behaviors. Experimentation made on a real data set proves the
performance and the resilience of our trust management model.Jihene LATRECH, Zahra Kodia, Nadia Ben AzzounaCoDFi-DL: a hybrid recommender system combining enhanced collaborative and demographic filtering based on deep learning.
Journal of Supercomputing, 80(1), 2024
Résumé
The cold start problem has always been a major challenge for recommender systems. It arises when the system lacks rating records for new users or items. Addressing the challenge of providing personalized recommendations in the cold start scenario is crucial. This research proposes a new hybrid recommender system named CoDFi-DL which combines demographic and enhanced collaborative filtering. The demographic filtering is performed through a deep neural network (DNN) and used to solve the new user cold start problem. The enhanced collaborative filtering component of our model focuses on delivering personalized recommendations through a neighborhood-based method. The major contribution in this research is the DNN-based demographic filtering which overcomes the new user cold start problem and enhances the collaborative filtering process. Our system significantly improves the relevancy of the recommendation task and thus provides personalized recommended items to cold users. To evaluate the effectiveness of our approach, we conducted experiments on real multi-label datasets, 1M and 100K MovieLens. CoDFi-DL recommender system showed higher performance in comparison with baseline methods, achieving lower RMSE rates of 0.5710 on the 1M MovieLens dataset and 0.6127 on the 100K MovieLens dataset.
Jihene LATRECH, Zahra Kodia, Nadia Ben AzzounaTwit-CoFiD: a hybrid recommender system based on tweet sentiment analysis
Social Network Analysis and Mining, 14(1), 123., 2024
Résumé
Internet users are overwhelmed by the vast number of services and products to choose from. This data deluge has led to the need for recommender systems. Simultaneously, the explosion of interactions on social networks is constantly increasing. These interactions produce a large amount of content that incites organizations and individuals to exploit it as a support for decision making. In our research, we propose, Twit-CoFiD, a hybrid recommender system based on tweet sentiment analysis which performs a demographic filtering to use its outputs in an enhanced collaborative filtering enriched with a sentiment analysis component. The demographic filtering, based on a Deep Neural Network (DNN), allows to overcome the cold start problem. The sentiment analysis of Twitter data combined with the enhanced collaborative filtering makes recommendations more relevant and personalized. Experiments were conducted on 1M and 100K Movielens datasets. Our system was compared to other existing methods in terms of predictive accuracy, assessed using Root Mean Square Error (RMSE) and Mean Absolute Error (MAE) metrics. It yielded improved results, achieving lower RMSE and MAE rates of 0.4474 and 0.3186 on 100K Movielens dataset and of 0.3609 and 0.3315 on 1M Movielens dataset.
Jihene LATRECH, Zahra Kodia, Nadia Ben AzzounaContext-based Collaborative Filtering: K-Means Clustering and Contextual Matrix Factorization*
In 2024 10th International Conference on Control, Decision and Information Technologies (CoDIT) (pp. 1-5). IEEE., 2024
Résumé
The rapid expansion of contextual information from smartphones and Internet of Things (IoT) devices paved the way for Context-Aware Recommendation Systems (CARS). This abundance of contextual data heralds a transformative era for traditional recommendation systems. In alignment with this trend, we propose a novel model which provides personalized recommendations based on context. Our approach uses K-means algorithm to cluster users based on contextual features. Then, the model performs collaborative filtering based on matrix factorization with enhanced contextual biases to provide relevant recommendations. We demonstrated the performance of our method through experiments conducted on the movie recommender dataset LDOS-CoMoDa. The experimental results showed the effective performance of our proposal compared to reference methods, achieving an RMSE of 0.7416 and an MAE of 0.6183.
-
2023Ilhem Souissi, Rihab Abidi, Nadia Ben Azzouna, Tahar Berradia, Lamjed Ben Said
ECOTRUST: A novel model for Energy COnsumption TRUST assurance in electric vehicular networks
Ad Hoc Networks, 149, 103246., 2023
Résumé
Electric Vehicles (EVs) emerged new kinds of applications that strongly depend upon the energy information such as identifying the optimal path towards the vehicle’s destination where the EV maximizes the recovered electrical power, displaying the energetic map that provides an overview about the required energy consumption on each lane, etc. The quality of these applications relies on the reliability of the vehicle-related information (e.g. location, energy consumption). EVs may provide wrong energy information due to sensors’ failure, selfish or malicious reasons. To this aim, a fuzzy-based energy consumption trust (ECOTRUST) model is proposed herein to evaluate the quality of energy information based on two fuzzy inference systems: Instant Energy Trust (IEN-Trust) and Total Energy Trust (TEN-Trust) systems. IEN-TRUST relies on a series of plausibility checks to evaluate the coherence between the reported energy information and other parameters (slope degree, speed and acceleration rate) while TEN-TRUST relies on the similarity between neighbouring vehicles. The performance of the ECOTRUST model is evaluated in terms of the system’s robustness and accuracy under different traffic intensities. We varied the traffic volume and the percentage of malicious vehicles and their behaviours. Results show that IEN-TRUST is resilient to false messages with/without the collusion attack. However, it is unable to deal with complex behaviours of malicious vehicles (e.g. on-off attack, bush telegraph). TEN-TRUST was proposed to deal with the latter issue. Simulation results show that it can accurately deal with complex behaviours in different traffic volumes.Rihab Abidi, Nabil Sahli, Wassim Trojet, Nadia Ben Azzouna, Ghaleb HoblosAn Infrastructure-Based Trust Management Framework for Cooperative ITS.
In VEHITS (pp. 329-336)., 2023
Résumé
Intelligent Transportation Systems (ITSs) have been exploited by developed countries to enhance the quality of transportation services. However, these systems are still facing major bottlenecks to be addressed such as the data density, precision and reliability of perceived data and computational feasibility of the nodes. Trust management is a mechanism applied to secure the vehicular networks. However, most of the proposed trust models that are applied to Vehicular Ad-hoc NETwork (VANET) do not address all the aforementioned challenges of ITS. In this paper, we present a comprehensive framework of trust management specifically designed for ITS applications. The proposed framework is an infrastructure-based solution that relies on Smart Road Signs (SRSs) to assess the trustworthiness of traffic data and nodes of the network. The idea of the framework is to use autonomous SRSss that are able to collect raw data and evaluate it in order to alert the drivers with reliable traffic information in real time. We adopt a hierarchical architecture that exploits a two-level trust evaluation to ensure accuracy, scalability, security and high reactivity of ITS applications. A discussion of the framework and its strengths is presented.Rihab Abidi, Nabil Sahli, Nadia Ben Azzouna, Wassim Trojet, Ghaleb HoblosMonitoring Traffic Congestion Using Trust-Based Smart Road Signs
In: Klein, C., Jarke, M., Ploeg, J., Berns, K., Vinel, A., Gusikhin, O. (eds) Smart Cities, Green Technologies, and Intelligent Transport Systems. SMARTGREENS VEHITS 2023 2023. Communications in Computer and Information Science, vol 1989. Springer, Cham., 2023
Résumé
The evolution of Intelligent Transportation Systems (ITSs) enabled the emergence of traffic management applications, with the aim to enhance the traffic flow and ease the congestion by monitoring the traffic. However, the efficiency of these applications resides on the accuracy of the shared traffic information. Accordingly, trust management models are applied to secure the Vehicular Ad-hoc NETwork (VANET) and to assess the reliability of the data shared within the vehicular network. In this paper, we propose a proof-of-concept of the trust framework proposed in . The main objective is to observe the utility of applying trust management models to the intelligent transportation systems. The simulation results show that deploying trust-based Smart Road Signs (SRSs) helps to alleviate the traffic congestion around junctions by displaying the traffic state to users and offering them the opportunity to take alternative roads.Hasanain F. Hashim, Meriam Jemel, Nadia Ben AzzounaDynamic Threasholding GA-based ECG feature selection in cardiovascular disease diagnosis
Iraqi Journal for Computers and Informatics. Vol. 49 No. 2, 2023, 2023
Résumé
Electrocardiogram (ECG) data are usually used to diagnose cardiovascular disease (CVD) with the help of a revolutionary algorithm. Feature selection is a crucial step in the development of accurate and reliable diagnostic models for CVDs. This research introduces the dynamic threshold genetic algorithm (DTGA) algorithm, a type of genetic algorithm that is used for optimization problems and discusses its use in the context of feature selection. This research reveals the success of DTGA in selecting relevant ECG features that ultimately enhance accuracy and efficiency in the diagnosis of CVD. This work also proves the benefits of employing DTGA in clinical practice, including a reduction in the amount of time spent diagnosing patients and an increase in the precision with which individuals who are at risk of CVD can be identified.
Hasanain F. Hashim, Meriam Jemel, Nadia Ben AzzounaOptimization of Multiple Scaling Factors for ECG Steganography Using Dynamic Thresholding GA
International Journal of Intelligent Systems and Applications in Engineering, 11(4), 01–10, 2023, 2023
Résumé
Protecting patient data has become a top priority for healthcare providers in the digital age. ECG steganography is a technique for concealing electrocardiogram (ECG) signals during Internet transmission along with other medical data. This strategy aims to recover all embedded patient data while minimizing degradation of the cover signal caused by embedding. Quantization techniques make it possible to include patient information in the ECG signal, and it has been discovered that multiple scaling factors (MSFs) provide a superior trade-off than uniform single scaling factors. In this paper, we present a novel contribution to the field: a discrete wavelet transforms and singular value decomposition-based dynamic Thresholding GA (DTGA)-based ECG steganography scheme. Using the MITIH database, we demonstrate the efficacy of this method, and our findings corroborate that DTGA significantly improves data security.
Hamida Labidi, Nadia Ben Azzouna, Khaled Hassine, Mohamed Salah GouiderAn improved genetic algorithm for solving the multi-objective vehicle routing problem with environmental considerations
This paper presents an improved genetic algorithm for addressing the multi-objective vehicle routing problem with environmental considerations, published at KES 2023., 2023
Résumé
In recent years, the negative impacts of neglecting the environment, particularly global warming caused by greenhouse gases, have gained attention. Many countries and organizations are taking steps to reduce their greenhouse gas emissions and promote sustainable practices. In this paper, we aim to address the gap in the classical Vehicle Routing Problem (VRP) by taking into consideration the environmental effects of vehicles. To find a balance between cost-efficiency and environmental impact, we propose a Hybrid Genetic Algorithm (HGA) to address the Dynamic Vehicle Routing Problem with Time Windows (DVRPTW) and a heterogeneous fleet, taking into account new orders that arrive dynamically during the routing process. This approach takes into consideration the environmental effects of the solutions by optimizing the number and type/size of vehicles used to fulfill both static and dynamic orders. The goal is to provide a solution that is both cost-effective and environmentally friendly, addressing the issue of over-exploitation of energy and atmospheric pollution that threaten our ecological environment. Computational results prove that the hybridization of a genetic algorithm with a greedy algorithm can find high-quality solutions in a reasonable run time.
Hamdi Ouechtati, Nadia Ben Azzouna, Lamjed Ben SaidA fuzzy logic-based model for filtering dishonest recommendations in the Social Internet of Things
Journal of Ambient Intelligence and Humanized Computing, 14(5), 6181-6200., 2023
Résumé
In the recent year, Internet of Things (IoT) has been adopted in several real-world applications such as smart transportation, smart city, retail, agriculture, smart factory, etc. to make human life more reliable. The integration of social networking concepts into the IoT led to the rise of a new paradigm: the Social Internet of Things (SIoT). In the SIoT environment, the objects are capable of establishing in an autonomous way many social relationships anywhere and anytime with other trusted objects. However, in such environment, objects may provide dishonest recommendations due to malicious reasons such as bad mouthing, ballot stuffing, random opinion, etc. In order to cater these challenges, we propose a new fuzzy logic-based model to filter dishonest recommendations and estimate their trust level based on (1) their values and sending time and the place coordinates and (2) the social relationship parameters of the recommenders. Results prove that our proposed approach is able to detect 100% of the fake Sybil attack and achieves 100% of Recognition Proportion, Sensitivity, Specificity, Accuracy and F1 score and gets 0% of False Negative and False Positive Proportions in presence of up to 90% dishonest recommendations.
-
2022Ilhem Souissi, Nadia Ben Azzouna, Rihab Abidi, Tahar Berradia, Lamjed Ben Said
SP-TRUST: a trust management model for speed trust in vehicular networks
International Journal of Computers and Applications, 44(11), 1065-1073., 2022
Résumé
Information security mechanisms are crucial for Vehicular Ad-hoc NETworks (VANET) applications in order to preserve their robustness. The efficiency of these applications relies on the reliability of the used information, especially the vehicle-related information such as location and speed. Trust management models are crucial to evaluate the quality of the used information. Accordingly, we focus in this paper on the assessment of speed information to detect the malicious vehicles using a fuzzy-based model (SP-TRUST). The proposed model relies on two fuzzy inference systems. The first one evaluates the speed trust based on traffic rules (inter-vehicle distance) while considering the road topology (angle deviation) and the traffic state (density). The correlation between these parameters and the speed value is assessed. The second inference system assesses the speed trust based on the behavior of neighbor vehicles using the median speed of vehicles. Simulations were carried out to evaluate the robustness and the scalability of SP-TRUST model. The results of the experimental studies proved that the model performs well in detecting different behaviors of malicious vehicles in different scenarios, especially when the percentage of malicious vehicles is lower than 50%.
-
2021Rihab Abidi, Nadia Ben Azzouna
abidi rihab Self-adaptive trust management model for social IoT services
In 2021 International Symposium on Networks, Computers and Communications (ISNCC) (pp. 1-7). IEEE., 2021
Résumé
The paradigm of Social Internet of Things (SIoT) incorporates the concepts of social networking in the Internet of Things (IoT). The idea of SIoT is to allow objects to autonomously establish social relationships, which may facilitate network navigability and the discovery of information and services. The characteristics of the IoT such as the heterogeneity and the dynamicity of the network and the social relationships between devices lead to several challenges including how to build a reliable network. In this paper, we propose an adaptive trust management model that helps nodes seeking trusted service providers. The trustworthiness of a service provider is assessed on the basis of its past experiences with the requestor and of the recommendations of the requester’s neighbors. In our trust model, the trust parameters evolve dynamically in response to the change of the network context, the type of the demanded service and the nature of the relationships between the different nodes. The experiment results show that our proposed model achieves high accuracy and it is proved to be resilient against common attacks.
-
2019Meriam Jemel, Nadia Ben Azzouna, Khaled Ghedira
RPMInter-work: a multi-agent approach for planning the task-role assignments in inter-organisational workflow
Enterprise Information Systems, 14(5), 611–640., 2019
Résumé
Workflow management is a core component of modern Enterprise Information Systems (EISs) infrastructure that automates the execution of critical business processes. One of the particular interests of the security community is how to ensure the completion of the workflow execution in the presence of authorisation constraints. These constraints present some restrictions on the users or the roles that are authorised to execute the workflow tasks. The goal is to enforce the legal assignments of access privileges to the executors of the workflow tasks. Despite the variety of approaches proposed in this context, an approach dedicated to the inter-organisational workflows is still missing. In this paper, we take a step towards this goal by proposing a multi-agent-based model, named RPMInter-Work (task-Role assignment Planning Model for Inter-organisational Workflow). Our approach aims to perform the planning of the task-role assignments in inter-organisational workflow in presence of authorisation constraints that are related to task-role assignments. In our research work, this planning problem is formulated as a DisCSP (Distributed Constraint Satisfaction Problem). Our proposed contribution is based on the requirements of inter-organisational workflows, in particular, the autonomy of the participating organisations and the respect of their privacy. A prototype of RPMInter-Work is implemented using JADE (Java Agent DEvelopment) platform and some evaluation results of this prototype are exposed in this paper.
Nadia Ben Azzouna, Khaled GhediraRPMInterwork: A multi-agent approach for planning task-role assignments in inter-organizational workflow
Enterprise Information Systems, 14(5), 611–640., 2019, 2019
Résumé
Workflow management is a core component of modern Enterprise Information Systems (EISs) infrastructure that automates the execution of critical business processes. One of the particular interests of the security community is how to ensure the completion of the workflow execution in the presence of authorisation constraints. These constraints present some restrictions on the users or the roles that are authorised to execute the workflow tasks. The goal is to enforce the legal assignments of access privileges to the executors of the workflow tasks. Despite the variety of approaches proposed in this context, an approach dedicated to the inter-organisational workflows is still missing. In this paper, we take a step towards this goal by proposing a multi-agent-based model, named RPMInter-Work (task-Role assignment Planning Model for Inter-organisational Workflow). Our approach aims to perform the planning of the task-role assignments in inter-organisational workflow in presence of authorisation constraints that are related to task-role assignments. In our research work, this planning problem is formulated as a DisCSP (Distributed Constraint Satisfaction Problem). Our proposed contribution is based on the requirements of inter-organisational workflows, in particular, the autonomy of the participating organisations and the respect of their privacy. A prototype of RPMInter-Work is implemented using JADE (Java Agent DEvelopment) platform and some evaluation results of this prototype are exposed in this paper.
Nadia Ben Azzouna, Khaled GhediraRPMInter-work: a multi-agent approach for planning the task-role assignments in inter-organisational workflow
Enterprise Information Systems, 14(5), 611–640., 2019, 2019
Résumé
Workflow management is a core component of modern Enterprise Information Systems (EISs) infrastructure that automates the execution of critical business processes. One of the particular interests of the security community is how to ensure the completion of the workflow execution in the presence of authorisation constraints. These constraints present some restrictions on the users or the roles that are authorised to execute the workflow tasks. The goal is to enforce the legal assignments of access privileges to the executors of the workflow tasks. Despite the variety of approaches proposed in this context, an approach dedicated to the inter-organisational workflows is still missing. In this paper, we take a step towards this goal by proposing a multi-agent-based model, named RPMInter-Work (task-Role assignment Planning Model for Inter-organisational Workflow). Our approach aims to perform the planning of the task-role assignments in inter-organisational workflow in presence of authorisation constraints that are related to task-role assignments. In our research work, this planning problem is formulated as a DisCSP (Distributed Constraint Satisfaction Problem). Our proposed contribution is based on the requirements of inter-organisational workflows, in particular, the autonomy of the participating organisations and the respect of their privacy. A prototype of RPMInter-Work is implemented using JADE (Java Agent DEvelopment) platform and some evaluation results of this prototype are exposed in this paper.
Meriam Jemel, Nadia Ben Azzouna, Khaled GhediraRPMInterwork: A multi-agent approach for planning task-role assignments in inter-organizational workflow
the Journal of Enterprise Information Systems, Taylor & Francis, 2019, 2019
Résumé
Workflow management is a core component of modern Enterprise Information Systems (EISs) infrastructure that automates the execution of critical business processes. One of the particular interests of the security community is how to ensure the completion of the workflow execution in the presence of authorisation constraints. These constraints present some restrictions on the users or the roles that are authorised to execute the workflow tasks. The goal is to enforce the legal assignments of access privileges to the executors of the workflow tasks. Despite the variety of approaches proposed in this context, an approach dedicated to the inter-organisational workflows is still missing. In this paper, we take a step towards this goal by proposing a multi-agent-based model, named RPMInter-Work (task-Role assignment Planning Model for Inter-organisational Workflow). Our approach aims to perform the planning of the task-role assignments in inter-organisational workflow in presence of authorisation constraints that are related to task-role assignments. In our research work, this planning problem is formulated as a DisCSP (Distributed Constraint Satisfaction Problem). Our proposed contribution is based on the requirements of inter-organisational workflows, in particular, the autonomy of the participating organisations and the respect of their privacy. A prototype of RPMInter-Work is implemented using JADE (Java Agent DEvelopment) platform and some evaluation results of this prototype are exposed in this paper.
Hamdi Ouechtati, Nadia Ben Azzouna, Lamjed Ben SaidA fuzzy logic based trust-ABAC model for the Internet of Things
In International Conference on Advanced Information Networking and Applications (pp. 1157-1168). Cham: Springer International Publishing., 2019
Résumé
The Internet of Things (IoT) integrates a large amount of everyday life devices from heterogeneous network environments, bringing a great challenge into security and reliability management. In order to cope with certain challenges posed by device capacity and the nature of IoT networks, a lightweight access control model is needed to resolve security and privacy issues. In this paper, we present Fuzzy logic based Trust-ABAC model, an access control model for the Internet of Things. Our model for the IoT is an improvement of our previous work Trust-ABAC by a new Fuzzy logic-based model in which we consider an evaluation of trust based on recommendations and social relationship that can deal effectively with certain types of malicious behavior that intend to mislead other nodes. Results prove the performance of the proposed model and its capabilities to detect the collision and singular attacks with high precision.
-
2018Hamdi Ouechtati, Nadia Ben Azzouna, Lamjed Ben Said
Towards a self-adaptive access control middleware for the Internet of Things
In 2018 International Conference on Information Networking (ICOIN) (pp. 545-550). IEEE., 2018
Résumé
In order to cope with certain challenges posed by IoT environment and device capacity, a Self-Adaptive access control model is needed to resolve security and privacy issues. The use of complex encryption algorithms is infeasible due to the volatile nature of IoT environment and pervasive devices with limited resources. In this paper, we propose an access control middleware for the Internet of Things. The latter is an extension of the ABAC model in order to take into account the subject behavior and the trust value in the decision making process. In this work, we introduce a dynamic adaptation process of access control rules based on the risk value, the policies and rule sets which can effectively improve the security of IoT applications and produce more efficient access control mechanisms for the Internet of Things.
-
2017Hamdi Ouechtati, Nadia Ben Azzouna
Trust-abac towards an access control system for the internet of things
In International Conference on Green, Pervasive, and Cloud Computing (pp. 75-89). Cham: Springer International Publishing., 2017
Résumé
In order to cope with certain challenges posed by device capacity and the nature of IoT networks, a lightweight access control model is needed to resolve security and privacy issues. The use of complex encryption algorithms is infeasible due to the volatile nature of IoT environment and pervasive devices with limited resources. In this paper, we present the Trust-ABAC, an access control model for the Internet of Things, in which a coupling between the access control based on attributes and the trust concept is done. We evaluated the performance of Trust-ABAC through an experiment based on a simulation. We used the OMNeT++ simulator to show the efficiency of our model in terms of power consumption, response time and the average number of messages generated by an access request. The obtained results of simulation prove the good scalability of our Trust-ABAC model.
-
2015Meriam Jemel, Nadia Ben Azzouna, Khaled Ghedira
ECA rules for controlling authorisation plan to satisfy dynamic constraints.
. In Proceedings of the 13th Annual Conference on Privacy, Security and Trust (PST 2015), November 26-28 2015, Aksaray, Turkey, pages 133-138, IEEE Computer Society, 2015, 2015
Résumé
The workflow satisfiability problem has been studied by researchers in the security community using various approaches. The goal is to ensure that the user/role is authorised to execute the current task and that this permission doesn't prevent the remaining tasks in the workflow instance to be achieved. A valid authorisation plan consists in affecting authorised roles and users to workflow tasks in such a way that all the authorisation constraints are satisfied. Previous works are interested in workflow satisfiability problem by considering intra-instance constraints, i.e. constraints which are applied to a single instance. However, inter-instance constraints which are specified over multiple workflow instances are also paramount to mitigate the security frauds. In this paper, we present how ECA (Event-Condition-Action) paradigm and agent technology can be exploited to control authorisation plan in order to meet dynamic constraints, namely intra-instance and inter-instance constraints. We present a specification of a set of ECA rules that aim to achieve this goal. A prototype implementation of our proposed approach is also provided in this paper.
-
2013Meriam Jemel, Nadia Ben Azzouna, Khaled Ghedira
A novel approach for dynamic authorisation planning in constrained workow systems
In the 6th International Conference on Security of Information and Networks (SIN 2013), July 21-23 2013, Izmir, Turkey, pages 388-391, ACM, 2013., 2013
Résumé
In this paper we present a specification of the most common static and dynamic workflow authorisation constraints. We propose an authorisation model that includes a planning phase, an execution phase and an adjustment phase. In addition, we focus on how the problems of role-task assignment and user-task assignment are respectively translated into CSP (Constraint Satisfaction Problem) and DyCSP (Dynamic constraint Satisfaction Problem) and solved using the explanation concept. In case of an inconsistent assignment problem, we propose to restore problem consistency based upon inconsistency explanation.
Meriam Jemel, Nadia Ben Azzouna, Khaled GhediraTowards a dynamic authorisation planning satisfying intra-instance and inter-instance constraints
In the 6th International Conference on Security of Information and Networks (SIN 2013), July 21-23 2013, Izmir, Turkey, pages 440-443, ACM, 2013., 2013
Résumé
Role-Based Access Control (RBAC) model has been developed as an alternative to traditional approaches to handle access control in workflow systems. Accordingly, authorisation constraints must be defined to enforce the legal assignment of access privileges to roles and roles to users. The authorisation planning ensures that there is at least one way to complete the workflow instance without breaching any of the authorisation constraints. Authorisation planning with considering intra-instance constraints has been discussed in the research literature. However, the inter-instance constraints also need to be considered to mitigate the security fraud. In this paper, a novel authorisation system that incorporates intra-instance and inter-instance constraints is proposed. It includes the planning phase, the execution phase, and the adjustment phase. It is in charge of generating user/role assignment plans, verifying them and eventually updating them to take into account the dynamic (intra-instance and inter-instance) constraints. Besides, grounded upon agent technology and publish-subscribe communication model, a mechanism for the consideration of dynamic constraints (intra-instance and inter-intance) to generate valid assignment plans is demonstrated.
-
2012Meriam Jemel, Nadia Ben Azzouna, Khaled Ghedira
Towards a scalable and dynamic access control system for web services
In Proceedings of the 8th International conference on Web Information Systems and Technologies(WEBIST 2012), April 18 -21 2012,Porto, Portugal, pages 161-166, 2012., 2012
Résumé
Web services are vulnerable to different types of security attacks. The problem of secure access to web-based
applications is becoming increasingly complex. Management complexity arises because of the scalability
considerations such as the large number of web services users and their invocations and the fact that the
access control system should take into account the context. In this paper we describe the architecture of
our TDRBAC (Trust and Dynamic Role Based Access Control) model which is implemented using agent
technology. In fact, this technology fulfills several requirements of web service’s access control by providing
both context awareness and scalability. In order to verify the scalability of the proposed solution, we expose
some experimental results from a prototype implemented using JADE (Java Agent DEvelopment) platform.
The performance tests show that our TDRBAC multi-agent based system meets the scaling requirements of
large distributed services. -
2010Meriam Jemel, Nadia Ben Azzouna, Khaled Ghedira
Towards a dynamic access control model for e-government web services
In Proceedings of the 2010 IEEE Asia-Pacific Services Computing Conference (APSCC'10), December 6-10 2010, Hangzhou, China, pages 433-440, IEEE Computer Society, 2010
Résumé
The need of interoperable e-government services is addressed through the use of web services where sensitive services need to be granted to only authorized subjects from different organizations. In this paper, we propose a Trust and Dynamic Role Based Access Control model (TDRBAC) which deals with the specific requirements of e-government services. It effectively enhances the access control level since it is based on the trust level notion. The trust level evaluation is based on contextual attributes to assign to user role the appropriate view during the active session. The TDRBAC model is sensitive to the internal or external arisen events and it incorporates them in the access decision which makes it suitable for e-government dynamic environment.
-
2004Nadia Ben Azzouna, Fabrice Guillemin
Experimental analysis of the impact of peer‐to‐peer applications on traffic in commercial IP networks
European Transactions on Telecommunications, 15: 511-522., 2004
Résumé
To evaluate the impact of peer-to-peer (P2P) applications on traffic in wide area networks, we analyze measurements from a high speed IP backbone link carrying TCP traffic towards several ADSL areas. The first observations are that the prevalent part of traffic is due to P2P applications (almost 80% of total traffic) and that the usage of network becomes symmetric in the sense that customers are not only clients but also servers. This latter point is observed by the significant proportion of long flows mainly composed of ACK segments. When analyzing the bit rate created by long flows, it turns out that the TCP connections due to P2P applications have a rather small bit rate and that there is no evidence for long range dependence. These facts are intimately related to the way P2P protocols are running. We separately analyze signaling traffic and data traffic. It turns out that by adopting a suitable level of aggregation, global traffic can be described by means of usual tele-traffic models based on M/G/∞ queues with Weibullian service times.
Nadia Ben Azzouna, Fabrice GuilleminCharcteristic of ip traffic in commercial wide area networks
Proceedings of the International Conference on Computing, Communcations and Control Technologies (CCCT’2004), Austin, Texas (TX), 2004
Résumé
Measurements from an Internet backbone link carrying TCP traf
f
ic towards different ADSL areas are analyzed in this paper. For
traffic analysis, we adopt a flow-based approach and the popular
mice/elephants dichotomy. The originality of the experimental
data reported in this paper, when compared with previous mea
surements from very high speed backbone links, is in that com
mercial traffic comprises a significant percentage due to peer-to
peer applications. This kind of traffic exhibits some remarkable
properties in terms of mice, elephants and bit rates, which are
thoroughly described in this paper. Mice due to p2p protocols and
mice due to classical Internet applications such as HTTP, ftp, etc.
are analyzed separately. It turns out that by adopting a suitable
level of aggregation, global traffic can be described by means of
usual tele-traffic models based on M/G/∞ queues with Weibul
lian service times. The global bit rate can be approximated by the
superposition of Gaussian processes perturbed by a white noise
and does not exhibit long range dependence.Walid Saddi, Nadia Ben Azzouna, Fabrice GuilleminIP Traffic Classification via Blind Source Separation Based on Jacobi Algorithm
Freire, M.M., Chemouil, P., Lorenz, P., Gravey, A. (eds) Universal Multiservice Networks. ECUMN 2004. Lecture Notes in Computer Science, vol 3262. Springer, Berlin, Heidelberg., 2004
Résumé
By distinguishing long and short TCP flows, we address in this paper the problem of efficiently computing the characteristics of long flows. Instead of using time consuming off-line flow classification procedures, we investigate how flow characteristics could directly be inferred from traffic measurements by means of digital signal processing techniques. The proposed approach consists of classifying on the fly packets according to their size in order to construct two signals, one associated with short flows and the other with long flows. Since these two signals have intertwined spectral characteristics, we use a blind source separation technique in order to reconstruct the original spectral densities of short and long flow sources. The method is applied to a real traffic trace captured on a link of the France Telecom IP backbone network and proves efficient to recover the characteristics of long and short flows.
-
2003Nadia Ben Azzouna, Fabrice Guillemin
Analysis of ADSL traffic on an IP backbone link
GLOBECOM'03. IEEE Global Telecommunications Conference (IEEE Cat. No. 03CH37489), 2003
Résumé
Measurements from an Internet backbone link carrying TCP traffic towards different ADSL areas are analyzed. For traffic analysis, we adopt a flow based approach and the popular mice/elephants dichotomy, where mice refer to short traffic transfers and elephants to long transfers. The originality of the reported experimental data, when compared with previous measurements from very high speed backbone links, is that the commercial traffic includes a significant part generated by peer-to-peer applications. This kind of traffic exhibits some remarkable properties in terms of mice and elephants, as we describe. It turns out that by adopting a suitable level of aggregation, the bit rate of mice can be described by means of a Gaussian process. The bit rate of elephants is smoother than that of mice and can also be well approximated by a Gaussian process.
BibTeX
@INPROCEEDINGS{1258932, author={Azzouna, N.B. and Guillemin, F.}, booktitle={GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489)}, title={Analysis of ADSL traffic on an IP backbone link}, year={2003}, volume={7}, number={}, pages={3742-3746 vol.7}, keywords={Spine;Traffic control;Telecommunication traffic;Mice;Internet;Bit rate;IP networks;Fractals;Peer to peer computing;Gaussian processes}, doi={10.1109/GLOCOM.2003.1258932}}
BibTeX
@article{https://doi.org/10.1002/ett.1012,
author = {Ben Azzouna, Nadia and Guillemin, Fabrice},
title = {Experimental analysis of the impact of peer-to-peer applications on traffic in commercial IP networks},
journal = {European Transactions on Telecommunications},
volume = {15},
number = {6},
pages = {511-522},
doi = {https://doi.org/10.1002/ett.1012},
url = {https://onlinelibrary.wiley.com/doi/abs/10.1002/ett.1012},
eprint = {https://onlinelibrary.wiley.com/doi/pdf/10.1002/ett.1012},
abstract = {Abstract To evaluate the impact of peer-to-peer (P2P) applications on traffic in wide area networks, we analyze measurements from a high speed IP backbone link carrying TCP traffic towards several ADSL areas. The first observations are that the prevalent part of traffic is due to P2P applications (almost 80\% of total traffic) and that the usage of network becomes symmetric in the sense that customers are not only clients but also servers. This latter point is observed by the significant proportion of long flows mainly composed of ACK segments. When analyzing the bit rate created by long flows, it turns out that the TCP connections due to P2P applications have a rather small bit rate and that there is no evidence for long range dependence. These facts are intimately related to the way P2P protocols are running. We separately analyze signaling traffic and data traffic. It turns out that by adopting a suitable level of aggregation, global traffic can be described by means of usual tele-traffic models based on M/G/∞ queues with Weibullian service times. Copyright © 2004 AEI},
year = {2004}
BibTeX
@article{azzounacharacteristics, title={Characteristics of IP traffic in commercial wide area networks}, author={Azzouna, Nadia Ben and Guillemin, Fabrice} }
BibTeX
@InProceedings{10.1007/978-3-540-30197-4_29,
author= »Saddi, Walid
and Ben Azzouna, Nadia
and Guillemin, Fabrice »,
editor= »Freire, M{\’a}rio Marques
and Chemouil, Prosper
and Lorenz, Pascal
and Gravey, Annie »,
title= »IP Traffic Classification via Blind Source Separation Based on Jacobi Algorithm »,
booktitle= »Universal Multiservice Networks »,
year= »2004″,
publisher= »Springer Berlin Heidelberg »,
address= »Berlin, Heidelberg »,
pages= »287–296″,
abstract= »By distinguishing long and short TCP flows, we address in this paper the problem of efficiently computing the characteristics of long flows. Instead of using time consuming off-line flow classification procedures, we investigate how flow characteristics could directly be inferred from traffic measurements by means of digital signal processing techniques. The proposed approach consists of classifying on the fly packets according to their size in order to construct two signals, one associated with short flows and the other with long flows. Since these two signals have intertwined spectral characteristics, we use a blind source separation technique in order to reconstruct the original spectral densities of short and long flow sources. The method is applied to a real traffic trace captured on a link of the France Telecom IP backbone network and proves efficient to recover the characteristics of long and short flows. »,
isbn= »978-3-540-30197-4″
}
BibTeX
@article{Jemel27052020,
author = {Meriam Jemel and Nadia Ben Azzouna and Khaled Ghedira},
title = {RPMInter-work: a multi-agent approach for planning the task-role assignments in inter-organisational workflow},
journal = {Enterprise Information Systems},
volume = {14},
number = {5},
pages = {611–640},
year = {2020},
publisher = {Taylor \& Francis},
doi = {10.1080/17517575.2019.1704067},URL = {
https://doi.org/10.1080/17517575.2019.1704067
},
eprint = {https://doi.org/10.1080/17517575.2019.1704067
}
}
BibTeX
@inproceedings{Maaloul2025, title={Feature Selection for Gestational Diabetes Mellitus Prediction using XAI based AutoML Approach}, author={Alia Maaloul and Meriam Jemel and Nadia Ben Azzouna}, year={2025}, booktitle={Proceedings of the International Conference on Decision Aid and Artificial Intelligence (ICODAI 2024)}, pages={121-135}, issn={2589-4919}, isbn={978-94-6463-654-3}, url={https://doi.org/10.2991/978-94-6463-654-3_10}, doi={10.2991/978-94-6463-654-3_10}, publisher={Atlantis Press} }
BibTeX
@INPROCEEDINGS{9615856,
author={Abidi, Rihab and Azzouna, Nadia Ben},
booktitle={2021 International Symposium on Networks, Computers and Communications (ISNCC)},
title={Self-adaptive trust management model for social IoT services},
year={2021},
volume={},
number={},
pages={1-7},
keywords={Measurement;Adaptation models;Uncertainty;Social networking (online);Computational modeling;Optimization methods;Quality of service;IoT;SIoT;adaptive control;context awareness},
doi={10.1109/ISNCC52172.2021.9615856}}
BibTeX
@article{abidi2024study, title={A study of mechanisms and approaches for IoV trust models requirements achievement.}, author={Abidi, Rihab and Azzouna, Nadia Ben and Trojet, Wassim and Hoblos, Ghaleb and Sahli, Nabil}, journal={Journal of Supercomputing}, volume={80}, number={3}, year={2024} }
BibTeX
@article{souissi2022sp, title={SP-TRUST: a trust management model for speed trust in vehicular networks}, author={Souissi, Ilhem and Ben Azzouna, Nadia and Abidi, Rihab and Berradia, Tahar and Ben Said, Lamjed}, journal={International Journal of Computers and Applications}, volume={44}, number={11}, pages={1065--1073}, year={2022}, publisher={Taylor \& Francis} }
BibTeX
@article{souissi2023ecotrust, title={ECOTRUST: A novel model for Energy COnsumption TRUST assurance in electric vehicular networks}, author={Souissi, Ilhem and Abidi, Rihab and Azzouna, Nadia Ben and Berradia, Tahar and Said, Lamjed Ben}, journal={Ad Hoc Networks}, volume={149}, pages={103246}, year={2023}, publisher={Elsevier} }
BibTeX
@inproceedings{abidi2023infrastructure, title={An Infrastructure-Based Trust Management Framework for Cooperative ITS.}, author={Abidi, Rihab and Sahli, Nabil and Trojet, Wassim and Azzouna, Nadia Ben and Hoblos, Ghaleb}, booktitle={VEHITS}, pages={329--336}, year={2023} }
BibTeX
@inproceedings{lachheb2024infrastructure, title={Infrastructure-Based Communication Trust Model for Intelligent Transportation Systems.}, author={Lachheb, Malek and Abidi, Rihab and Azzouna, Nadia Ben and Sahli, Nabil}, booktitle={VEHITS}, pages={513--521}, year={2024} }
BibTeX
@inproceedings{abidi2023monitoring, title={Monitoring Traffic Congestion Using Trust-Based Smart Road Signs}, author={Abidi, Rihab and Sahli, Nabil and Azzouna, Nadia Ben and Trojet, Wassim and Hoblos, Ghaleb}, booktitle={International Conference on Smart Cities and Green ICT Systems}, pages={184--196}, year={2023}, organization={Springer} }
BibTeX
@inproceedings{labidi2023hybrid, title={Hybrid Genetic Algorithm for Solving an Online Vehicle Routing Problem with Time Windows and Heterogeneous Fleet}, author={Labidi, Hamida and Chaabani, Abir and Azzouna, Nadia Ben and Hassine, Khaled}, booktitle={International Conference on Hybrid Intelligent Systems}, pages={437--446}, year={2023}, organization={Springer} }
BibTeX
- Rani, S., Ahmed, S.H. & Rastogi, R. Dynamic clustering approach based on wireless sensor networks genetic algorithm for IoT applications. Wireless Netw26, 2307–2316 (2020).
- HUSSAIN, Muhammad Zunnurain et HANAPI, Zurina Mohd. Efficient Secure Routing Mechanisms for the Low-Powered IoT Network: A Literature Review. Electronics, 2023, vol. 12, no 3, p. 482.
- Abdulzahra, Ali Mohammed Kadhim, Ali Kadhum M. Al-Qurabat, and Suha Abdulhussein Abdulzahra. « Optimizing energy consumption in WSN-based IoT using unequal clustering and sleep scheduling methods. » Internet of Things 22 (2023): 100765.
- DEL-VALLE-SOTO, Carolina, RODRÍGUEZ, Alma, et ASCENCIO-PIÑA, Cesar Rodolfo. A survey of energy-efficient clustering routing protocols for wireless sensor networks based on metaheuristic approaches. Artificial Intelligence Review, 2023, p. 1-72.
- Del-Valle-Soto, C., Rodríguez, A. & Ascencio-Piña, C.R. A survey of energy-efficient clustering routing protocols for wireless sensor networks based on metaheuristic approaches. Artif Intell Rev 56, 9699–9770 (2023). https://doi.org/10.1007/s10462-023-10402-w.
- Yuste-Delgado, Antonio-Jesus, Juan-Carlos Cuevas-Martinez, and Alicia Triviño-Cabrera. « A distributed clustering algorithm guided by the base station to extend the lifetime of wireless sensor networks. » Sensors 20.8 (2020): 2312.
- Shahraki, Amin, et al. « A survey and future directions on clustering: From WSNs to IoT and modern networking paradigms. » IEEE Transactions on Network and Service Management 18.2 (2020): 2242-2274.
- Wohwe Sambo, Damien, et al. « Optimized clustering algorithms for large wireless sensor networks: A review. » Sensors 19.2 (2019): 322.
- Iwendi, C., Maddikunta, P. K. R., Gadekallu, T. R., Lakshmanna, K., Bashir, A. K., & Piran, M. J. (2021). A metaheuristic optimization approach for energy efficiency in the IoT networks. Software: Practice and Experience, 51(12), 2558-2571.
- Rostami, Ali Shokouhi, et al. Survey on clustering in heterogeneous and homogeneous wireless sensor networks. The Journal of Supercomputing 74 (2018): 277-323.
- MERAH, Malha, ALIOUAT, Zibouda, HARBI, Yasmine, et al. Machine learning‐based clustering protocols for Internet of Things networks: An overview. International Journal of Communication Systems, 2023, p. e5487.
- Singh, Santar Pal, and S. C. Sharma. « Genetic-algorithm-based energy-efficient clustering (GAEEC) for homogenous wireless sensor networks. » IETE journal of research 64.5 (2018): 648-659.
- Heidari, Ehsan, et al. A novel approach for clustering and routing in WSN using genetic algorithm and equilibrium optimizer. International Journal of Communication Systems 35.10 (2022): e5148.
- Razzaq, Madiha, Devarani Devi Ningombam, and Seokjoo Shin. Energy efficient K-means clustering-based routing protocol for WSN using optimal packet size. 2018 International Conference on Information Networking (ICOIN). IEEE, 2018.
- El Khediri, Salim, et al. « Improved node localization using K-means clustering for Wireless Sensor Networks. » Computer Science Review 37 (2020): 100284.
- NEDHAM, Wisal Bassim et AL-QURABAT, Ali Kadhum M. An improved energy efficient clustering protocol for wireless sensor networks. In: 2022 International Conference for Natural and Applied Sciences (ICNAS). IEEE, 2022. p. 23-28.
- Ahmad, Waseem, et al. « Optimizing Energy Efficiency in Wireless Sensor Networks using Enhanced K-Means Cluster Head Selection. » International Journal of Communication Networks and Information Security 16.3 (2024): 565-573.
- Bhushan, Shashi, Raju Pal, and Svetlana G. Antoshchuk. « Energy efficient clustering protocol for heterogeneous wireless sensor network: a hybrid approach using GA and K-means. » 2018 IEEE Second International Conference on Data Stream Mining & Processing (DSMP). IEEE, 2018.
- Bhola, Jyoti, Surender Soni, and Gagandeep Kaur Cheema. « Genetic algorithm based optimized leach protocol for energy efficient wireless sensor networks. » Journal of Ambient Intelligence and Humanized Computing 11 (2020): 1281-1288.
- Hassan, A. A. H., et al. « Clustering approach in wireless sensor networks based on K-means: Limitations and recommendations. » Int. J. Recent Technol. Eng 7.6 (2019): 119-126.
- Obeid, Abdulfattah Mohammad, et al. « A survey on efficient power consumption in adaptive wireless sensor networks. » Wireless Personal Communications 101 (2018): 101-117.
- Singh, Jaspreet, Ranjit Kaur, and Damanpreet Singh. « A survey and taxonomy on energy management schemes in wireless sensor networks. » Journal of Systems Architecture 111 (2020): 101782.
- SINGH, Shashank et ANAND, Veena. Load balancing clustering and routing for IoT‐enabled wireless sensor networks. International Journal of Network Management, 2023, vol. 33, no 5, p. e2244.
- Ray, Anindita, and Debashis De. « Energy efficient clustering protocol based on K‐means (EECPK‐means)‐midpoint algorithm for enhanced network lifetime in wireless sensor network. » IET Wireless Sensor Systems 6.6 (2016): 181-191.
- Marutho, Dhendra, Sunarna Hendra Handaka, and Ekaprana Wijaya. « The determination of cluster number at k-mean using elbow method and purity evaluation on headline news. » 2018 international seminar on application for technology of information and communication. IEEE, 2018.
- Kodinariya, Trupti M., and Prashant R. Makwana. « Review on determining number of Cluster in K-Means Clustering. » International Journal 1.6 (2013): 90-95.
- Kramer, Oliver, and Oliver Kramer. Genetic algorithms. Springer International Publishing, 2017.
- Seo, Hyun-Sik, Se-Jin Oh, and Chae-Woo Lee. « Evolutionary genetic algorithm for efficient clustering of wireless sensor networks. » 2009 6th IEEE Consumer Communications and Networking Conference. IEEE, 2009.
- Derrac, J., García, S., Molina, D., & Herrera, F. (2011). A practical tutorial on the use of nonparametric statistical tests as a methodology for comparing evolutionary and swarm intelligence algorithms. Swarm and Evolutionary Computation, 1(1), 3-18.
- BAQERI, Javad. Increase the Lifetime of Wireless Sensor Networks Using Hierarchical Clustering with Cluster Topology Preservation. International Journal of Wireless & Mobile Networks (IJWMN) Vol, 2021, vol. 8.
- RAJ, Bryan, AHMEDY, Ismail, IDRIS, Mohd Yamani Idna, et al. A survey on cluster head selection and cluster formation methods in wireless sensor networks. Wireless Communications and Mobile Computing, 2022, vol. 2022, p. 1-53.
- AL-SULAIFANIE, Adnan Ismail, AL-SULAIFANIE, Bayez Khorsheed, et BISWAS, Subir. Recent trends in clustering algorithms for wireless sensor networks: A comprehensive review. Computer Communications, 2022, vol. 191, p. 395-424.
- DEL-VALLE-SOTO, Carolina, RODRÍGUEZ, Alma, et ASCENCIO-PIÑA, Cesar Rodolfo. A survey of energy-efficient clustering routing protocols for wireless sensor networks based on metaheuristic approaches. Artificial Intelligence Review, 2023, p. 1-72.
- ROY, Nihar Ranjan et CHANDRA, Pravin. Energy dissipation model for wireless sensor networks: a survey. International Journal of Information Technology, 2020, vol. 12, p. 1343-1353.
- Gülbaş, Gülşah, and Gürcan Çetin. « Lifetime Optimization of the LEACH Protocol in WSNs with Simulated Annealing Algorithm. » Wireless Personal Communications4 (2023): 2857-2883.
- Alhijawi, B., Awajan, A. Algorithmes génétiques : théorie, opérateurs génétiques, solutions et applications. Évol. Intel. (2023). https://doi.org/10.1007/s12065-023-00822-6
BibTeX
@INPROCEEDINGS{10708408, author={Maaloul, Alia and Jemel, Meriam and Azzouna, Nadia Ben}, booktitle={2024 10th International Conference on Control, Decision and Information Technologies (CoDIT)}, title={XAI based feature selection for gestational diabetes Mellitus prediction}, year={2024}, volume={}, number={}, pages={1939-1944}, keywords={Pregnancy;Accuracy;Predictive models;Feature extraction;Iterative methods;Biomedical monitoring;Insulin;Random forests;Monitoring;Context modeling}, doi={10.1109/CoDIT62066.2024.10708408}}
BibTeX
@INPROCEEDINGS{10708408, author={Maaloul, Alia and Jemel, Meriam and Azzouna, Nadia Ben}, booktitle={2024 10th International Conference on Control, Decision and Information Technologies (CoDIT)}, title={XAI based feature selection for gestational diabetes Mellitus prediction}, year={2024}, volume={}, number={}, pages={1939-1944}, keywords={Pregnancy;Accuracy;Predictive models;Feature extraction;Iterative methods;Biomedical monitoring;Insulin;Random forests;Monitoring;Context modeling}, doi={10.1109/CoDIT62066.2024.10708408}}
BibTeX
@article{Jemel27052020, author = {Meriam Jemel and Nadia Ben Azzouna and Khaled Ghedira}, title = {RPMInter-work: a multi-agent approach for planning the task-role assignments in inter-organisational workflow}, journal = {Enterprise Information Systems}, volume = {14}, number = {5}, pages = {611--640}, year = {2020}, publisher = {Taylor \& Francis}, doi = {10.1080/17517575.2019.1704067}, URL = { https://doi.org/10.1080/17517575.2019.1704067 }, eprint = { https://doi.org/10.1080/17517575.2019.1704067 } }
BibTeX
@inproceedings{inproceedings,
author = {Jemel, Meriam and Ben Azzouna, Nadia and Ghedira, Khaled},
year = {2011},
month = {01},
pages = {433 – 440},
title = {Towards a Dynamic Access Control Model for E-Government Web Services},
journal = {Proceedings – 2010 IEEE Asia-Pacific Services Computing Conference, APSCC 2010},
doi = {10.1109/APSCC.2010.17}
}
BibTeX
@inproceedings{inproceedings,
author = {Jemel, Meriam and Ben Azzouna, Nadia and Ghedira, Khaled},
year = {2012},
month = {01},
pages = {},
title = {Towards a Scalable and Dynamic Access Control System for Web Services.},
journal = {WEBIST 2012 – Proceedings of the 8th International Conference on Web Information Systems and Technologies}
}
BibTeX
@inproceedings{inproceedings,
author = {Jemel, Meriam and Ben Azzouna, Nadia and Ghedira, Khaled},
year = {2013},
month = {11},
pages = {388-391},
title = {A novel approach for dynamic authorisation planning in constrained workflow systems},
journal = {SIN 2013 – Proceedings of the 6th International Conference on Security of Information and Networks},
doi = {10.1145/2523514.2523569}
}
BibTeX
@inproceedings{inproceedings,
author = {Jemel, Meriam and Ben Azzouna, Nadia and Ghedira, Khaled},
year = {2013},
month = {11},
pages = {440-443},
title = {Towards a dynamic authorisation planning satisfying intra-instance and inter-instance constraints},
journal = {SIN 2013 – Proceedings of the 6th International Conference on Security of Information and Networks},
doi = {10.1145/2523514.2523582}
}
BibTeX
@inproceedings{inproceedings,
author = {Jemel, Meriam and Ben Azzouna, Nadia and Ghedira, Khaled},
year = {2015},
month = {07},
pages = {133-138},
title = {ECA rules for controlling authorisation plan to satisfy dynamic constraints},
doi = {10.1109/PST.2015.7232964}
}
BibTeX
@inproceedings{inproceedings,
author = {Maaloul, Alia and Jemel, Meriam and Ben Azzouna, Nadia},
year = {2024},
month = {07},
pages = {1939-1944},
title = {XAI based feature selection for gestational diabetes Mellitus prediction},
doi = {10.1109/CoDIT62066.2024.10708408}
}
BibTeX
@article{article,
author = {Hashim, Hasanain and Jemel, Meriam and Ben Azzouna, Nadia},
year = {2023},
month = {12},
pages = {73-82},
title = {DYNAMIC THRESHOLDING GA-BASED ECG FEATURE SELECTION IN CARDIOVASCULAR DISEASE DIAGNOSIS},
volume = {49},
journal = {Iraqi Journal for Computers and Informatics},
doi = {10.25195/ijci.v49i2.456}
}
BibTeX
@article{Hashim_Jemel_Azzouna_2023, title={Optimization of Multiple Scaling Factors for ECG Steganography Using Dynamic Thresholding GA}, volume={11}, url={https://ijisae.org/index.php/IJISAE/article/view/3448}, abstractNote={<p>Protecting patient data has become a top priority for healthcare providers in the digital age. ECG steganography is a technique for concealing electrocardiogram (ECG) signals during Internet transmission along with other medical data. This strategy aims to recover all embedded patient data while minimizing degradation of the cover signal caused by embedding. Quantization techniques make it possible to include patient information in the ECG signal, and it has been discovered that multiple scaling factors (MSFs) provide a superior trade-off than uniform single scaling factors. In this paper, we present a novel contribution to the field: a discrete wavelet transforms and singular value decomposition-based dynamic Thresholding GA (DTGA)-based ECG steganography scheme. Using the MITIH database, we demonstrate the efficacy of this method, and our findings corroborate that DTGA significantly improves data security.</p>}, number={4}, journal={International Journal of Intelligent Systems and Applications in Engineering}, author={Hashim , Hasanain F. and Jemel , Meriam and Azzouna , Nadia Ben}, year={2023}, month={Sep.}, pages={01–10} }
BibTeX
@article{Jemel27052020, author = {Meriam Jemel and Nadia Ben Azzouna and Khaled Ghedira}, title = {RPMInter-work: a multi-agent approach for planning the task-role assignments in inter-organisational workflow}, journal = {Enterprise Information Systems}, volume = {14}, number = {5}, pages = {611--640}, year = {2020}, publisher = {Taylor \& Francis}, doi = {10.1080/17517575.2019.1704067}, URL = { https://doi.org/10.1080/17517575.2019.1704067 }, eprint = { https://doi.org/10.1080/17517575.2019.1704067 } }
BibTeX
@INPROCEEDINGS{10708516,
author={Ghozzi, Wiem Ben and Kodia, Zahra and Azzouna, Nadia Ben},
booktitle={2024 10th International Conference on Control, Decision and Information Technologies (CoDIT)},
title={Fatigue Detection for the Elderly Using Machine Learning Techniques},
year={2024},
volume={},
number={},
pages={2055-2060},
keywords={Visualization;Accuracy;Sensitivity;Three-dimensional displays;Webcams;Face recognition;Mouth;Fatigue;Magnetic heads;Older adults;Elderly fatigue;Face recognition;Machine Learning;Classification;Extra Trees},
doi={10.1109/CoDIT62066.2024.10708516}}
BibTeX
@inproceedings{labidi2023hybrid, title={Hybrid Genetic Algorithm for Solving an Online Vehicle Routing Problem with Time Windows and Heterogeneous Fleet}, author={Labidi, Hamida and Chaabani, Abir and Azzouna, Nadia Ben and Hassine, Khaled}, booktitle={International Conference on Hybrid Intelligent Systems}, pages={437--446}, year={2023}, organization={Springer} }
BibTeX
@article{labidi2023improved, title={An improved genetic algorithm for solving the multi-objective vehicle routing problem with environmental considerations}, author={Labidi, Hamida and Azzouna, Nadia Ben and Hassine, Khaled and Gouider, Mohamed Salah}, journal={Procedia Computer Science}, volume={225}, pages={3866--3875}, year={2023}, publisher={Elsevier} }
BibTeX
@inproceedings{ouechtati2017trust, title={Trust-abac towards an access control system for the internet of things}, author={Ouechtati, Hamdi and Azzouna, Nadia Ben}, booktitle={International Conference on Green, Pervasive, and Cloud Computing}, pages={75--89}, year={2017}, organization={Springer} }
BibTeX
] M. Fox, D. Long, and D. Magazzeni, “The emerging landscape of ex-
plainable automated planning & decision making,” Artificial Intelligence,
vol. 289, p. 103387, 2020.
[2] M. Ghallab, Automated Planning and Acting. Cambridge, 2016.
[3] M. Fox, “Explainable planning,” in International Joint Conference on
Artificial Intelligence (IJCAI), 2017.
[4] J. Hoffmann, “Ff: The fast-forward planning system,” Artificial Intelli-
gence Journal, 2001.
[5] L. Kaelbling, “Planning under uncertainty,” Journal of Artificial Intelli-
gence Research (JAIR), 1998.
[6] T. Vidal, “Handling time in planning,” in International Conference on
Automated Planning and Scheduling (ICAPS), 2000.
[7] E. Durfee, “Multi-agent planning,” in International Conference on
Autonomous Agents and Multiagent Systems (AAMAS), 2001.
[8] M. Johnson, “Ethical alignment in ai planning,” Ethics & Information
Technology, 2022.
[9] J. Smith, “Contrastive methods in automated planning,” Journal of
Explainable AI (XAI), 2022.
[10] T. Zhang, “Hierarchical plan decomposition,” in AAAI Conference on
Artificial Intelligence (AAAI), 2020.
[11] B. Williams, “Abductive reasoning in planning,” AI Magazine, 2021.
[12] T. Chakraborti, S. Sreedharan, Y. Zhang, and S. Kambhampati, “Plan
explanations as model reconciliation: Moving beyond explanation as so-
liloquy,” Proceedings of the International Joint Conference on Artificial
Intelligence (IJCAI), pp. 156–163, 2017.
[13] S. Sreedharan, T. Chakraborti, and S. Kambhampati, “Foundations of
explanations as model reconciliation,” Artificial Intelligence, vol. 281,
p. 103234, 2020.
[14] K. Erol, J. Hendler, and D. S. Nau, “Hierarchical task network planning:
Formalization and analysis,” Proceedings of the International Confer-
ence on Knowledge Representation (KR), 1994.
[15] X. Fan and F. Toni, “Argumentation-based explainable planning using
strips,” Journal of Artificial Intelligence Research, vol. 61, pp. 1–30,
2018.
[16] S. Kim, K. Lee, and N. Patel, “Machine learning techniques for
contrastive explanations in ai planning,” Journal of Artificial Intelligence
Research, vol. 65, pp. 123–150, 2021.
[17] Y. Zhang, S. Sreedharan, and S. Kambhampati, “Interactive plan expla-
nations for human-ai collaboration,” Proceedings of the AAAI Confer-
ence on Artificial Intelligence, pp. 8152–8159, 2019.
[18] S. L. Vasileiou and W. Yeoh, “Explainable planning for ethical ai
systems,” Proceedings of the International Conference on Principles of
Knowledge Representation and Reasoning (KR), pp. 678–687, 2021.
[19] B. Williams, “Abductive reasoning in planning,” AI Magazine, vol. 42,
no. 2, pp. 123–150, 2021.
[20] T. Chakraborti, S. Sreedharan, Y. Zhang, and S. Kambhampati, “Plan
explanations as model reconciliation: Moving beyond explanation as
soliloquy,” in Proceedings of the International Joint Conference on
Artificial Intelligence (IJCAI), pp. 156–163, 2017.
[21] S. Sreedharan, T. Chakraborti, and S. Kambhampati, “Foundations of
explanations as model reconciliation,” Artificial Intelligence, vol. 281,
p. 103234, 2020.
[22] Y. Zhang, S. Sreedharan, and S. Kambhampati, “Interactive plan ex-
planations for human-ai collaboration,” in Proceedings of the AAAI
Conference on Artificial Intelligence (AAAI), pp. 8152–8159, 2019.
[23] S. L. Vasileiou and W. Yeoh, “Explainable planning for ethical ai
systems,” in Proceedings of the International Conference on Principles
of Knowledge Representation and Reasoning (KR), pp. 678–687, 2021.
[24] S. Kim, K. Lee, and N. Patel, “Machine learning techniques for
contrastive explanations in ai planning,” Journal of Artificial Intelligence
Research (JAIR), vol. 65, pp. 123–150, 2021.
[25] I. Rahwan and G. Simari, Argumentation in Artificial Intelligence.
Springer, 2009.
[26] S. Modgil and M. Caminada, “A general account of argumentation with
preferences,” Artificial Intelligence, vol. 217, pp. 1–42, 2014.
[27] A. Toniolo and T. J. Norman, “Argumentation-based decision making for
autonomous agents,” Artificial Intelligence Journal, vol. 232, pp. 1–25,
2015.
[28] M. Fox and D. Long, “Pddl2.1: An extension to pddl for expressing
temporal planning domains,” Journal of Artificial Intelligence Research,
vol. 20, pp. 61–124, 2003.
[29] X. Fan and F. Toni, “Explanations in automated planning: Argumentation
and interactive justifications,” Artificial Intelligence, vol. 283, pp. 103–
113, 2020.
[30] S. Heras and S. Villata, “Explainable argumentation for human-ai col-
laboration,” Journal of Artificial Intelligence Research, vol. 67, pp. 151–
177, 2018.
[31] M. Caminada and M. Podlaszewski, “Natural language generation for
argumentation-based explainability,” Computational Models of Argu-
ment, pp. 209–220, 2020.
[32] S. Bistarelli and F. Santini, “Complexity considerations in structured
argumentation,” Artificial Intelligence Review, vol. 55, pp. 213–234,
2022.
[33] L. Cohen and S. Modgil, “Justification-based argumentation for explain-
ability in ai systems,” Knowledge-Based Systems, vol. 227, pp. 107–124,
2021.
[34] I. Rahwan and G. R. Simari, “Argumentation in artificial intelligence,”
Springer, 2009.
[35] S. Modgil and M. Caminada, “A general account of argumentation with
preferences,” Artificial Intelligence, vol. 217, pp. 1–42, 2014.
[36] A. Toniolo and T. J. Norman, “Argumentation-based decision making for
autonomous agents,” Artificial Intelligence Journal, vol. 232, pp. 1–25,
2015.
[37] M. Fox and D. Long, “Pddl2.1: An extension to pddl for expressing
temporal planning domains,” Journal of Artificial Intelligence Research,
vol. 20, pp. 61–124, 2003.
[38] X. Fan and F. Toni, “Explanations in automated planning: Argumentation
and interactive justifications,” Artificial Intelligence, vol. 283, pp. 103–
113, 2020.
[39] S. Heras and S. Villata, “Explainable argumentation for human-ai col-
laboration,” Journal of Artificial Intelligence Research, vol. 67, pp. 151–
177, 2018.
[40] M. Caminada and M. Podlaszewski, “Natural language generation for
argumentation-based explainability,” Computational Models of Argu-
ment, pp. 209–220, 2020.
[41] S. Bistarelli and F. Santini, “Complexity considerations in structured
argumentation,” Artificial Intelligence Review, vol. 55, pp. 213–234,
2022.
[42] L. Cohen and S. Modgil, “Justification-based argumentation for explain-
ability in ai systems,” Knowledge-Based Systems, vol. 227, pp. 107–124,
2021.
BibTeX
@inproceedings{ouechtati2018towards, title={Towards a self-adaptive access control middleware for the Internet of Things}, author={Ouechtati, Hamdi and Azzouna, Nadia Ben and Said, Lamjed Ben}, booktitle={2018 International Conference on Information Networking (ICOIN)}, pages={545--550}, year={2018}, organization={IEEE} }
BibTeX
@inproceedings{ouechtati2019fuzzy, title={A fuzzy logic based trust-ABAC model for the Internet of Things}, author={Ouechtati, Hamdi and Azzouna, Nadia Ben and Said, Lamjed Ben}, booktitle={International Conference on Advanced Information Networking and Applications}, pages={1157--1168}, year={2019}, organization={Springer} }
BibTeX
@article{ouechtati2023fuzzy, title={A fuzzy logic-based model for filtering dishonest recommendations in the Social Internet of Things}, author={Ouechtati, Hamdi and Nadia, Ben Azzouna and Lamjed, Ben Said}, journal={Journal of Ambient Intelligence and Humanized Computing}, volume={14}, number={5}, pages={6181--6200}, year={2023}, publisher={Springer} }
BibTeX
@inproceedings{DBLP:conf/secrypt/OuechtatiA24, author = {Hamdi Ouechtati and Nadia Ben Azzouna}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Towards an Adaptive Trust Management Model Based on {ANFIS} in the SIoT}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {710--715}, publisher = {{SCITEPRESS}}, year = {2024}, timestamp = {Thu, 05 Sep 2024 14:21:37 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/OuechtatiA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
BibTeX
@article{latrech2024codfi, title={CoDFi-DL: a hybrid recommender system combining enhanced collaborative and demographic filtering based on deep learning.}, author={Latrech, Jihene and Kodia, Zahra and Ben Azzouna, Nadia}, journal={Journal of Supercomputing}, volume={80}, number={1}, year={2024} }
BibTeX
@article{latrech2024twit, title={Twit-CoFiD: a hybrid recommender system based on tweet sentiment analysis}, author={Latrech, Jihene and Kodia, Zahra and Ben Azzouna, Nadia}, journal={Social Network Analysis and Mining}, volume={14}, number={1}, pages={123}, year={2024}, publisher={Springer} }
BibTeX
@inproceedings{latrech2024context, title={Context-based collaborative filtering: K-means clustering and contextual matrix factorization}, author={Latrech, Jihene and Kodia, Zahra and Azzouna, Nadia Ben}, booktitle={2024 10th International Conference on Control, Decision and Information Technologies (CoDIT)}, pages={1--5}, year={2024}, organization={IEEE} }
BibTeX
@article{latrech2025cod, title={CoD-MaF: toward a Context-Driven Collaborative Filtering using Contextual Biased Matrix Factorization}, author={Latrech, Jihene and Kodia, Zahra and Ben Azzouna, Nadia}, journal={International Journal of Data Science and Analytics}, pages={1--18}, year={2025}, publisher={Springer} }
BibTeX
@article{latrechmachine, title={Machine Learning Based Collaborative Filtering Using Jensen-Shannon Divergence for Context-Driven Recommendations}, author={Latrech, Jihene and Kodia, Zahra and Azzouna, Nadia Ben} }
Projets
-
2022Lamjed Ben Said Lilia Rejeb, Nadia Ben Azzouna, Rihab Abidi, Yasmine Amor, Lamjed Ben Said | Nabil Sahli
Using smart road signs to predict and manage traffic congestions
Description