Publications

Journal Articles

YearAuthorsTitleJournalURL Link
2025Chaima Njeh, Haïfa Nakouri, Fehmi JaafarA Data-centric approach for safe and secure large language models against threatening and toxic content
International Journal of Information Security
Link
2025Chaimaa Oulmalme, Haifa Nakouri, Fehmi JaafarA systematic review of generative AI approaches for medical image enhancement: Comparing GANs, transformers, and diffusion modelsInternational journal of medical informaticsLink
2025Wissam Salhab, Darine Ameyed, Fehmi Jaafar, Hamid McheickA systematic literature review on ai safety: Identifying trends, challenges and future directionsIEEE AccessLink
2025Kerson Boisrond, Pierre Martin Tardif, Fehmi JaafarEnsuring the integrity, confidentiality, and availability of IoT data in Industry 5.0: A Systematic Mapping StudyIEEE AccessLink
2023Darine Ameyed, Fehmi Jaafar, Fabio Petrillo, Mohamed CherietQuality and Security Frameworks for IoT-Architecture Models EvaluationSN Computer ScienceLink
2022Amine Barrak, Fabio Petrillo, Fehmi Jaafar.Serverless on Machine Learning: A systematic mapping studyIEEELink
2022Fehmi Jaafar, Florent Avellaneda, Omer Nguena Timo, Mario Beaulieu, David LandrySpot the hack: Intrusion detection systems for avionics networks using machine learningOpen ScienceLink
2021Sajid Habib Gill, Noor Ahmed Sheikh, Samina Rajpar, NZ Jhanjhi, Muneer Ahmad, Mirza Abdur Razzaq, Sultan S Alshamrani, Yasir Malik, Fehmi Jaafar.Extended forgery detection framework for covid-19 medical data using convolutional neural networkComputers, Materials and ContinuaLink
2020Schallum Pierre, Fehmi Jaafar.Médias sociaux: perspectives sur les défis liés à la cybersécurité, la gouvernementalité algorithmique et l'intelligence artificiellePresses de l'Université LavalLink
2020Manel Grichi, Mouna Abidi, Fehmi Jaafar, Ellis E. Eghan, and Bram Adams.On the Impact of Inter-language Dependencies in Multi-language Systems.The IEEE Transactions on ReliabilityLink
2020Zeinab (Azadeh) Kermansaravi, Md. Saidur Rahman, Fehmi Jaafar, Foutse Khomh, and Yann-Gaël Guéhéneuc.Investigating Design Patterns and Design Anti-pattern Mutations and their Change and Fault-pronenessThe Empirical Software Engineering JournalLink
2018Darine Ameyed, Moeiz Miraoui, Atef Zaguia, Fehmi Jaafar, and Chakib Tadj.Using Probabilistic Temporal Logic PCTL and Model Checking for Context PredictionComputing and Informatics JournalLink
2017Fehmi Jaafar, Angela Lozano, Kim Mens, and Yann-Gaël Guéhéneuc.Analyzing Software Evolution and Quality by Extracting Asynchrony Change-patterns.Journal of Systems and SoftwareLink
2017Mohammad Shahrear Iqbal, Fehmi Jaafar, Mohammad Zulkernine, and Yuan Gu.Protecting internet users from becoming victimized attackers of click-fraud.Journal of Software : Evolution and Process.Link
2016Fehmi Jaafar, Yann-Gaël Guéhéneuc, Sylvie Hamel, Foutse Khomh, and Mohammad Zulkernine.Evaluating the Impact of Design Pattern and Anti-pattern Dependencies on Faults and Changes.Journal of Empirical Software Engineering.Link
2014Angela Lozano, Fehmi Jaafar, Kim Mens, and Yann-Gaël Guéhéneuc.Clones and Macro Co-ChangesJournal of Electronic Communications of the European Association of Software Science and Technology.Link
2014Fehmi Jaafar, Yann-Gaël Guéhéneuc, Giuliano Antoniol, and Sylvie Hamel.Detecting Asynchrony and Dephase Change Patterns by Mining Software Repositories.Journal of Software : Evolution and Process.Link

Conference Publications

YearAuthorsTitleConference InformationURL Link
2011Fehmi Jaafar, Yann-Gaël Guéhéneuc, Giuliano Antoniol, and Sylvie Hamel.An Exploratory Study of Macro Co-Changes.The Working Conference on Reverse Engineering, IrelandLink
2012Fehmi Jaafar.On the analysis of evolution of software artefacts and programs.The IEEE International Conference on Software Engineering.Link
2013Fehmi Jaafar, Salima Hassaine, Yann-Gaël Guéhéneuc, Sylvie Hamel, and Bram Adams.On the Relationship Between Program Evolution and Fault-proneness.European Conference on Software Maintenance and Reengineering., Genova, ItalyLink
2013Nasir Ali, Fehmi Jaafar, and Ahmed E. Hassan.Leveraging Historical Co-Change Information for Requirements Traceability.The Working Conference on Reverse Engineering., Koblenz-Landau, GermanyLink
2013Fehmi Jaafar, Yann-Gaël Guéhéneuc, Sylvie Hamel, and Foutse Khomh.Mining the Relationship Between Anti-patterns Dependencies and Fault-proneness.Working Conference on Reverse Engineering, Koblenz-Landau, GermanyLink
2014Fehmi Jaafar,Foutse Khomh, and Yann-Gaël Guéhéneuc.Anti-pattern Mutations and Fault-proneness.The 14th International Conference on Quality Software., Dallas, United StatesLink
2015Darine Ameyed, Fehmi Jaafar, and Jaouhar Fattahi.A Slow Read attack Using Cloud.The International Conference on Electronics, Computers and Artificial Intelligence, Bucharest, Romania.Link
2016Fehmi Jaafar, Gabriela Nicolescu, and Christian Richard.A Systematic Approach For Privilege Escalation Prevention.IEEE International Conference on Software Quality, Reliability and Security, Companion, Vienna, Austria.Link
2016Md Shahrear Iqbal, Fehmi Jaafar, Mohammad Zulkernine, and Yuan Gu.Fighting Click-Fraud from User Side.IEEE High Assurance Systems Engineering Symposium., Orlando, United StatesLink
2017Maryam Davari, Mohammad Zulkernine, ans Fehmi Jaafar.An Automatic Software Vulnerability Classification Framework2017 International Conference on Software Security and Assurance (ICSSA), Altoona, PA, USALink
2017Fehmi Jaafar.An Integrated Architecture for IoT Fingerprinting.IEEE QRS Companion 2016. IEEE International Conference on Software Quality, Reliability and Security, Prague, Czech Republic.Link
2017Harjot Kaur, Pavol Zavarsky, and Fehmi Jaafar.Unauthorized Data Leakage from an Organisation through Web Browser Fingerprinting Vulnerability.The IEEE World Congress on Internet Security, London, United KingdomLink
2017Fehmi Jaafar, Angela Lozano, Yann-Gaël Guéhéneuc, and Kim Mens.On the Analysis of Co-Occurrence of Anti-Patterns and Clones.IEEE International Conference on Software Quality, Reliability and Security, Prague, Czech RepublicLink
2018Gagandeep Singh, Fehmi Jaafar, and Pavol Zavarsky.An Analysis of Android Malware Behavior.International Workshop on Information Assurance, Lisbon, PortugalLink
2018Caesar Jude Clemente, Fehmi Jaafar, and Yasir Malik. Is Predicting Software Security Bugs using Deep Learning Better than the Traditional Machine Learning Algorithms?IEEE International Conference on Software Quality, Reliability, and Security, Lisbon, PortugalLink
2018Pooja Rajendra Prasad, Sergey Butakov, and Fehmi Jaafar.Information Security Considerations for Wireless Infusion Pumps.IEEE International Workshop on Safety and Security in Cyber-Physical Systems, Lisbon, Portugal.Link
2018Gurjot Balraj Singh, Fehmi Jaafar, and Sergey Butakov.Analysis of Overhead Caused by Security Mechanisms in IaaS CloudIEEE International Conference on Control, Decision and Information Technologies, CoDIT, Thessaloniki, GreeceLink
2018Jasmeen Kaur, Fehmi Jaafar, and Pavol Zavarsky.Experimental Analysis of Behavior of Crypto RansomwareThe Thirteenth International Conference on Systems, ICONS, Athens, GreeceLink
2018Mayank Jaiswal, Yasir Malik, and Fehmi Jaafar.Android Gaming Malware Detection Using System Call Behaviour AnalysisThe IEEE International Symposium on Digital Forensic and Security, ISDFS, Antalya, Turkey.Link
2018Manjinder Singh, Sergey Butakov, and Fehmi Jaafar.Analyzing Overhead from Security and Administrative Functions in Virtual EnvironmentThe IEEE 2018 International Conference on Platform Technology and Service, PlatCon, South KoreaLink
2018Gurpreet Kaur, Fehmi Jaafar, and Yasir Malik.Detecting Blind Cross-Site Attacks Using Machine LearningThe 2018 ACM International Conference on Signal Processing and Machine Learning, Shanghai, ChinaLink
2019Carlos Renato Salim Campos, Fehmi Jaafar, and Yasir Malik.Detecting Android Security Vulnerabilities Using Machine Learning and System Calls Analysis IEEE International Workshop on Data-driven System Quality Assurance, QRS Companion 2019Link
2019Anis Kothia, Bobby Swar, and Fehmi Jaafar.Knowledge Extraction and Integration for Information Gathering in Penetration Testing IEEE International Workshop on Software Engineering and Knowledge Management, QRS Companion 2019Link
2019Naiji Zhang, Fehmi Jaafar, and Yasir Malik.Low-Rate DoS Attack Detection Using PSD based Entropy and Machine LearningThe 6th IEEE International Conference on Cyber Security and Cloud Computing (IEEE CSCloud 2019)Link
2019Florent Avellaneda, El-Hachemi Alikacem, and Fehmi Jaafar.Using Attack Pattern for Cyber Attack AttributionIEEE International Conference on Cybersecurity 2019 (ICoC2019)Link
2019Fehmi Jaafar, Asmaa Tellabi, Sabri Abdelbast, and Christoph Ruland. On the Analysis of the Impact of Scheduling Plans in Safety Critical Requirements in Virtualization IEEE International Conference on Cybersecurity 2019 (ICoC2019)Link
2019Samip Dhakal, Fehmi Jaafar, and Pavol Zavarsky.Private Blockchain Network for IoT Device Firmware Integrity Verification and UpdateHASE 2019: The IEEE International Symposium on High Assurance Systems Engineering, Hangzhou, ChinaLink
2019Tunde Akeem Yekini, Pavol Zavarsky, and Fehmi Jafaar.Study of Trust at Device Level of the Internet of Things ArchitectureHASE 2019: The IEEE International Symposium on High Assurance Systems Engineering, Hangzhou, ChinaLink
2019Ranbir Singh Bali, Fehmi Jaafar, and Pavol Zavarasky.Lightweight Authentication for MQTT by using Topic-Based Self Key Agreement and Block CipherThe International Conference on Cryptography, Security and Privacy (ICCSP 2019), Kuala Lumpur, MalaysiaLink
2020Fehmi Jaafar, Florent Avellaneda, and El-Hackemi Alikacem.Demystifying the Cyber Attribution: An Exploratory StudyThe IEEE Cyber Science and Technology Congress (CyberSciTech)Link
2020Fehmi Jaafar, Florent Avellaneda, El-Hackemi AlikacemDemystifying the cyber attribution: An exploratory studyIEEELink
2020Marcela G Dos Santos, Bianca M Napoleão, Fabio Petrillo, Darine Ameyed, Fehmi JaafarA preliminary systematic mapping on software engineering for robotic systems: A software quality perspectiveIEEELink
2020Ruchi Mishra, Sergey Butakov, Fehmi Jaafar, Neelam MemonBehavioral Study of Malware Affecting Financial Institutions and ClientsIEEELink
2020Ruchi Mishra, Sergey Butakov, Fehmi Jaafar, and Neelam Memon.Behavioral Study of Malware Affecting Financial Institutions and ClientsThe IEEE Cyber Science and Technology Congress (CyberSciTech)Link
2020Marcela dos Santos, Bianca Napoleao, Fabio Petrillo, Darine Ameyed and Fehmi Jaafar.A Preliminary Systematic Mapping on Software Engineering for Robotic Systems: A Software Quality PerspectiveThe 2nd International Workshop on Software Engineering Research & Practices for the Internet of Things (SERP4IoT 2020)Link
2020Adegoke Babajide Seyi, Fehmi Jaafar and Ron Ruhl.Securing the Authentication Process of LTE Base StationsIEEE International Conference on Electrical, Communication and Computer EngineeringLink
2020Walter Isharufe, Fehmi Jaafar, and Sergey Butakov.Study of Security Issues in Platform -as a- Service (PaaS) Cloud ModelIEEE International Conference on Electrical, Communication and Computer EngineeringLink
2021Darine Ameyed, Fehmi Jaafar, Francis Charette-Migneault, Mohamed CherietBlockchain based model for consent management and data transparency assurance2021 IEEE 21st International Conference on Software Quality, Reliability and Security Companion (QRS-C)
2022Hugo Bourreau, Emeric Guichet, Amine Barrak, Benoît Simon, Fehmi Jaafar.On Securing the Communication in IoT Infrastructure using Elliptic Curve Cryptography2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)Link
2022Fehmi Jaafar, Yasir Malik, Johan Serre, Haoyu Wang, Tianqi Wang.Lightweight Intrusion Detection in MQTT Based Sensor Network2022 International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME)Link
2022Pratibha Singh, Hamman Samuel, Fehmi Jaafar, Darine Ameyed.Enhancing Biometric Security with Combinatorial and Permutational Multi-Fingerprint Authentication Strategies2022 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)Link
2023Fehmi Jaafar, Darine Amayed, Wissam Salhab, Hajer Bouani, Mohamed CherietBlockchain-based consent management for privacy persevering and transparency in intelligent surveillance systems2023 Fifth International Conference on Blockchain Computing and Applications (BCCA)Link
2023Amine Barrak, Ranim Trabelsi, Fehmi Jaafar, Fabio PetrilloExploring the impact of serverless computing on peer to peer training machine learning2023 IEEE International Conference on Cloud Engineering (IC2E)Link
2023Fehmi Jaafar, Darine Ameyed, Yasmine Bouzid, Abib SyOn Securing Communications Between Connected Objects Using a Data-Centric Security Approach2023 3rd International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME)Link
2023Abubakr Ibrahim, Mohamed Mejri, Fehmi JaafarAn Explainable Artificial Intelligence Approach for a Trustworthy Spam Detection2023 IEEE International Conference on Cyber Security and Resilience (CSR)Link
2023
Amine Barrak, Mayssa Jaziri, Ranim Trabelsi, Fehmi Jaafar, Fabio Petrillo
SPIRT: A Fault-Tolerant and Reliable Peer-to-Peer Serverless ML Training Architecture2023 IEEE 23rd International Conference on Software Quality, Reliability, and Security (QRS)Link
2024Manel Grichi, Mouna Abidi, Fehmi JaafarChange Impact Analysis and Cybersecurity Threats in Multi-language Systems: An Industrial InvestigationInternational Congress on Information and Communication TechnologyLink
2024Fehmi Jaafar, Mohamed Aziz Chabchoub, Darine AmeyedDetection of Abnormal Activities in a Crowd Video Surveillance using Contextual InformationProceedings of the 2024 9th International Conference on Multimedia and Image ProcessingLink
2024Amine Barrak, Gildas Fofe, Léo Mackowiak, Emmanuel Kouam, Fehmi JaafarSecuring AWS Lambda: Advanced Strategies and Best Practices2024 IEEE 11th International Conference on Cyber Security and Cloud Computing (CSCloud)Link
2024Abib Sy, Fehmi Jaafar, Kevin Bouchard
On Securing Sensitive Data Using Deep Convolutional Autoencoders
2024 10th International Conference on Control, Decision and Information Technologies (CoDIT)Link
2024Rachel Ladouceur, Abubakr Hassan, Mohamed Mejri, Fehmi JaafarCan Deep Learning Detect Fake News Better when Adding Context Features?2024 IEEE International Conference on Cyber Security and Resilience (CSR)Link
2024Elisée Toé, Fehmi JaafarEnhancing MQTT Fault Tolerance and Resilience Against Broker Failures and DoS Attacks with Decentralized Blockchain Architecture2024 4th Intelligent Cybersecurity Conference (ICSC)Link
2024Mayssa Bejaoui, Fehmi Jaafar
FairDETOCS: An approach to detect and connect unfair models
2024 4th International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME)Link
2024Hoummady Enzo, Fehmi JaafarBenchmarking Deep Learning Algorithms for Intrusion Detection IoT Networks2024 IEEE Conference on Dependable, Autonomic and Secure Computing (DASC)Link
2024Jean Decian, Fehmi JaafarWiki-IoT: Registering and Evaluating the Security and Resilience of Internet of Things and Connected Devices Using a Collaborative Platform2024 IEEE Conference on Dependable, Autonomic and Secure Computing (DASC)Link
2024Usman Tariq, Fehmi Jaafar, Yasir Malik
Detecting and Mitigating Adversarial Perturbations to Improve E-Commerce Security
2024 IEEE/ACM International Conference on Big Data Computing, Applications and Technologies (BDCAT)Link
2024Manel Grichi, Mouna Abidi, Fehmi JaafarChange Impact Analysis and Cybersecurity ThreatsProceedings of Ninth International Congress on Information and Communication Technology: ICICT 2024, London, Volume 9Link
2024Chaima Njeh, Haïfa Nakouri, Fehmi JaafarEnhancing rag-retrieval to improve llms robustness and resilience to hallucinationsInternational Conference on Hybrid Artificial Intelligence SystemsLink
2024Amine Barrak, Ranim Trabelssi, Fabio Petrillo, Fehmi JaafarAdvancing Serverless ML Training Architectures via Comparative ApproachIEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMSLink
2024Fehmi Jaafar, Darine Ameyed, Lavin Titare, Md NematullahIoT Phishing Detection Using Hybrid NLP and Machine Learning Models Enhanced with Contextual Embedding2023 IEEE 23rd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)Link
2024Riadh Ben Chaabene, Darine Ameyed, Fehmi Jaafar, Alexis Roger, Aimeur Esma, Mohamed Cheriet
A privacy-preserving federated learning for IoT intrusion detection system
2023 9th International Conference on Control, Decision and Information Technologies (CoDIT)Link
2024Amine Barrak, Fabio Petrillo, Fehmi JaafarArchitecting peer-to-peer serverless distributed machine learning training for improved fault toleranceLink

Books

YearAuthorsTitleCo-EditorURL Link
2023Laurent Adatto, Fehmi Jaafar, Schallum PierreL’Intelligence Artificielle et les Technologies Quantiques au regard de la Cybersécurité-IntroductionTechnologie et innovationLink
2023Schallum Pierre and Fehmi JaafarBlockchain and Artificial Intelligence Based Solution to Enhance the Privacy in Digital Identity and IoTs.Accepted, CRC Press | Taylor & Francis Group, Boca Raton, Florida, United States of AmericaLink
2021Schallum Pierre And Fehmi JaafarSocial Network and Cyber SecurityPublished, Laval University Press, Quebec, CanadaLink

Book Chapter

YearAuthorsTitleCo-EditorURL Link
2023Fehmi Jaafar, Schallum PierreBlockchain and Artificial Intelligence-based Solution to Enhance the Privacy in Digital Identity and IoTCRC PressLink
2023Rachel Ladouceur, Fehmi JaafarCyber Influence StakesCRC PressLink
2023Manel Grichi, Fehmi JaafarDemystifying the Digital Identity Challenges and the Blockchain RoleCRC PressLink
2023Darine Ameyed, Fehmi Jaafar, Riadh ben Chaabene, Mohamed CherietFederated Learning and Blockchain: An Opportunity for Artificial Intelligence with Data RegulationAI, Machine Learning and Deep Learning: A Security PerspectiveLink
2023Darine Amayed, Fehmi Jaafar, Riadh Ben Chaabene, Mohamed CherietSecurity and corporate violation to privacy in the internet of things ageCRC Press
2023Darine Ameyed, Fehmi Jaafar, Riadh ben Chaabene and Mohamed CherietSecurity and
Corporate Violation to Privacy in The Internet Of Things Age. Blockchain and Artificial Intelligence Based Solution to Enhance the Privacy in Digital Identity and IoTs
CRC Press - Taylor & Francis Group, Boca Raton, Florida, United States of America
2023Manel Grichi and Fehmi JaafarBlockchain and Artificial Intelligence
Based Solution to Enhance the Privacy in Digital Identity and IoTs
CRC Press - Taylor & Francis Group, Boca Raton, Florida, United States of America
2023Darine Amayed, Fehmi Jaafar, Riadh Ben Chaabene, and Mohamed CherietDemystifying the Digital Identity Challenges and the Blockchain
Role. Blockchain and Artificial Intelligence Based Solution to Enhance the Privacy in Digital Identity and
IoTs
CRC Press - Taylor & Francis Group, Boca Raton, Florida, United States of America
2021 Fehmi Jaafar and Jean DecianCyber Attacks Against Social Network: Lessons Learned. Social
Network and Cyber Security
2020Kolade Folayemi Awe, Yasir Malik, Pavol Zavarsky, and Fehmi JaafarValidating BGP Update
Using Blockchain-Based Infrastructure
Springer Publishing, New York, United States of America