[J8] Yassine Mekdad, Ahmet Aris, Abbas Acar, Mauro Conti, Riccardo Lazzeretti, Abdeslam El Fergougui, Selcuk Uluagac. A Comprehensive Security and Performance Assessment of UAV Authentication Schemes. Security and Privacy, volume 7, number 1, pages e338, 2024.
[J7] Yassine Mekdad, Ahmet Aris, Leonardo Babun, Abdeslam El Fergougui, Mauro Conti, Riccardo Lazzeretti, Selcuk Uluagac. A Survey on Security and Privacy Issues of UAVs. Computer Networks, volume 224, pages 109626, 2023.
[J6] Ehsan Nowroozi, Mohammadreza Mohammadi, Erkay Savaş, Yassine Mekdad, Mauro Conti. Employing Deep Ensemble Learning for Improving the Security of Computer Networks Against Adversarial Attacks. (IEEE) Transactions on Network and Service Management, 2023.
[J5] Ehsan Nowroozi, Mohammadreza Mohammadi, Pargol Golmohammadi, Yassine Mekdad, Mauro Conti, Selcuk Uluagac. Resisting Deep Learning Models Against Adversarial Attack Transferability via Feature Randomization. In (IEEE) Transactions on Services Computing, in press, 2023.
[J3] Ehsan Nowroozi, Seyedsadra Seyedshoari, Yassine Mekdad, Erkay Savaş, Mauro Conti. Cryptocurrency Wallets: Assessment and Security. In Blockchain for Cybersecurity in Cyber-Physical Systems, pages 1-19, 2022. Publisher: Springer.
[J2] Ehsan Nowroozi, Yassine Mekdad, Mauro Conti, Simone Milani, Selcuk Uluagac, Berrin Yanikoglu. Real or Virtual: A Video Conferencing Background Manipulation-Detection System. arXiv preprint arXiv:2204.11853, 2022.
[J1] Ehsan Nowroozi, Yassine Mekdad, Mohammad Hajian Berenjestanaki, Mauro Conti, Abdeslam El Fergougui. Demystifying the Transferability of Adversarial Attacks in Computer Networks. (IEEE) Transactions on Network and Service Management, volume 19, number 3, pages 3387-3400, 2022.
Conference papers
[C3] Yassine Mekdad, Abbas Acar, Ahmet Aris, Abdeslam El Fergougui, Mauro Conti, Riccardo Lazzeretti, Selcuk Uluagac. Exploring Jamming and Hijacking Attacks for Micro Aerial Drones. In Proceedings of the IEEE International Conference on Communications (ICC 2024)