GAHI Youssef
Email : youssef.gahi@uit.ac.ma
Établissement : Ecole Nationale des Sciences Appliquées
Laboratoire :
📚 Publications Scopus — Total : 83
| Titre | Année | 🔗 Voir |
|---|---|---|
| Empirical Evaluation of Big Data Stacks: Performance and Design Analysis of Hadoop, Modern, and Cloud Architectures | 2026 | 🔗 Voir |
| DRADG: A Dynamic Risk-Adaptive Data Governance Framework for Modern Digital Ecosystems | 2026 | 🔗 Voir |
| Data Management in Smart Manufacturing Supply Chains: A Systematic Review of Practices and Applications (2020–2025) | 2026 | 🔗 Voir |
| Mobile Threat Detection Model Using Tiny ML: Malware Case Study | 2026 | 🔗 Voir |
| AVI-SHIELD: An Explainable TinyML Cross-Platform Threat Detection Framework for Aviation Mobile Security | 2026 | 🔗 Voir |
| Toward Resilient Cyber Defense: Integrating AI and Blockchain for Smart Risk Management | 2025 | 🔗 Voir |
| Adaptive, Privacy-Enhanced Real-Time Fraud Detection in Banking Networks Through Federated Learning and VAE-QLSTM Fusion | 2025 | 🔗 Voir |
| Enhancing DataOps practices through innovative collaborative models: A systematic review | 2025 | 🔗 Voir |
| Pioneering the Security of EHRs Using an Immersive Blockchain Conceptual Framework | 2025 | 🔗 Voir |
| Systematic review for attack tactics, privacy, and safety models in big data systems | 2025 | 🔗 Voir |
| Quantum Computing and AI Applications in Industry 5.0 Use Cases | 2025 | 🔗 Voir |
| Rethinking Big Data Value Chains: A Comparative Framework Across Hadoop, Modern, and Cloud Stacks | 2025 | 🔗 Voir |
| Modern Data Stack Demystified: A Strategic Framework for Scalable Adoption | 2025 | 🔗 Voir |
| Quantum-Resistant Blockchain for Secure Health Data Exchange in Post-Quantum Era | 2025 | 🔗 Voir |
| Unlocking Revolutionary Use Cases and Data Privacy Controls Throughout Quantum Computing and Blockchain | 2025 | 🔗 Voir |
| Addressing Security Gaps in MCP: Design of a Resilient Reference Architecture | 2025 | 🔗 Voir |
| Risks Assessment of AI Integration in Cybersecurity: A Synergistic Approach with FMECA and ISO 31000 | 2025 | 🔗 Voir |
| Harnessing Data-Driven Approaches for Robust Real-Time Fraud Prevention and Detection | 2025 | 🔗 Voir |
| Leveraging Federated Learning for Detecting Fraud in Banking Systems | 2025 | 🔗 Voir |
| A Conceptual Real-Time and Privacy-Preserving Architecture for Banking Fraud Detection | 2025 | 🔗 Voir |
| Pioneering Quantum AI Applications for Fraud Detection in FinTechs | 2025 | 🔗 Voir |
| Enhancing Mobile Threat Detection through TinyML and Auditable ML | 2025 | 🔗 Voir |
| Natural Language Processing in the Nuclear Industry: Opportunities and Challenges | 2025 | 🔗 Voir |
| Digital banking fortification: a real-time isolation forest architecture for detecting online transaction fraud | 2024 | 🔗 Voir |
| Unified Data Framework for Enhanced Data Management, Consumption, Provisioning, Processing and Movement | 2024 | 🔗 Voir |
| Active Metadata and Machine Learning based Framework for Enhancing Big Data Quality | 2024 | 🔗 Voir |
| Real-Time Online Banking Fraud Detection Model by Unsupervised Learning Fusion | 2024 | 🔗 Voir |
| Synergy of Machine Learning and Blockchain Strategies for Transactional Fraud Detection in FinTech Systems | 2024 | 🔗 Voir |
| Securing EHRs With a Novel Token-Based and PPoS Blockchain Methodology | 2024 | 🔗 Voir |
| Integrating Generative AI for Advancing Agile Software Development and Mitigating Project Management Challenges | 2024 | 🔗 Voir |
| Quantum Cryptology in the Big Data Security Era | 2024 | 🔗 Voir |
| Securing the Future: Harnessing Blockchain's Power Against New-Age Vulnerabilities | 2024 | 🔗 Voir |
| Enhanced Banking Security: Isolation Forest with Attention Mechanism for Sophisticated Fraud Detection | 2024 | 🔗 Voir |
| Enhancing Blockchain Consensus Mechanisms with Artificial Intelligence: Potential Improvements and Applications | 2024 | 🔗 Voir |
| An Automated Big Data Quality Anomaly Correction Framework Using Predictive Analysis | 2023 | 🔗 Voir |
| Advancing Healthcare Security: A Cutting-Edge Zero-Trust Blockchain Solution for Protecting Electronic Health Records | 2023 | 🔗 Voir |
| A private cloud-based Datalab for scalable DSML pipelines | 2023 | 🔗 Voir |
| High Availabale Hadoop Deployment Modes with Enterprise-Level capabilities | 2023 | 🔗 Voir |
| Enabling open banking and analytics in the cloud through a distributed data anonymization pipeline | 2023 | 🔗 Voir |
| Data Security Patterns for Critical Big Data Systems | 2023 | 🔗 Voir |
| Quality Anomaly Detection Using Predictive Techniques: An Extensive Big Data Quality Framework for Reliable Data Analysis | 2023 | 🔗 Voir |
| An Efficient Framework for the Implementation of Sustainable Industry 4.0 | 2023 | 🔗 Voir |
| Moving Towards Blockchain-Based Methods for Revitalizing Healthcare Domain | 2023 | 🔗 Voir |
| Online Continual Learning Data Quality Framework for Entity Resolution | 2023 | 🔗 Voir |
| Big Data Quality Anomaly Scoring Framework Using Artificial Intelligence | 2023 | 🔗 Voir |
| Analysis of Banking Fraud Detection Methods through Machine Learning Strategies in the Era of Digital Transactions | 2023 | 🔗 Voir |
| End-to-End Real-time Architecture for Fraud Detection in Online Digital Transactions | 2023 | 🔗 Voir |
| An Advanced Big Data Quality Framework Based on Weighted Metrics | 2022 | 🔗 Voir |
| Metadata Quality in the Era of Big Data and Unstructured Content | 2022 | 🔗 Voir |
| Data Quality in the Era of Big Data: A Global Review | 2022 | 🔗 Voir |
| Securing Big Data-Based Smart Applications Using Blockchain Technology | 2022 | 🔗 Voir |
| An End-to-End Big Data Deduplication Framework based on Online Continuous Learning | 2022 | 🔗 Voir |
| Preface | 2022 | 🔗 Voir |
| CPC-H2: Convolution Power-based Cryptosystem and Digital Signature | 2021 | 🔗 Voir |
| Machine Learning and Deep Learning Models for Big Data Issues | 2021 | 🔗 Voir |
| An End to End Cloud Computing Privacy Framework Using Blind Processing | 2021 | 🔗 Voir |
| A Novel Approach for Big Data Monetization as a Service | 2021 | 🔗 Voir |
| Big data value chain: A unified approach for integrated data quality and security | 2020 | 🔗 Voir |
| An adaptable big data value chain framework for end-to-end big data monetization | 2020 | 🔗 Voir |
| Big data monetization throughout Big Data Value Chain: a comprehensive review | 2020 | 🔗 Voir |
| Fully homomorphic encryption without noise | 2020 | 🔗 Voir |
| Network security strategies in big data context | 2020 | 🔗 Voir |
| A multi-layer big data value chain approach for security issues | 2020 | 🔗 Voir |
| Correction to: A novel adaptable approach for sentiment analysis on big social data (Journal of Big Data, (2018), 5, 1, (12), 10.1186/s40537-018-0120-0) | 2019 | 🔗 Voir |
| Big data quality metrics for sentiment analysis approaches | 2019 | 🔗 Voir |
| Full consideration of big data characteristics in sentiment analysis context | 2019 | 🔗 Voir |
| A secure multi-user database-as-a-service approach for cloud computing privacy | 2019 | 🔗 Voir |
| The impact of big data quality on sentiment analysis approaches | 2019 | 🔗 Voir |
| A novel adaptable approach for sentiment analysis on big social data | 2018 | 🔗 Voir |
| Big Data Analytics: A Comparison of Tools and Applications | 2018 | 🔗 Voir |
| Security analysis of C-BGP: A light alternative to S-BGP | 2016 | 🔗 Voir |
| Blind forwarding for secure and private communications in untrusted networks | 2016 | 🔗 Voir |
| Wormhole Detection in Secured BGP Networks | 2016 | 🔗 Voir |
| A Review of Intrusion Detection in 802.15.4-Based Wireless Sensor Networks | 2016 | 🔗 Voir |
| Big Data Analytics: Security and privacy challenges | 2016 | 🔗 Voir |
| Blind decryption for cloud computing | 2016 | 🔗 Voir |
| Performance analysis of private information retrieval scheme based on homomorphic encryption | 2016 | 🔗 Voir |
| Private video streaming service using leveled somewhat homomorphic encryption | 2014 | 🔗 Voir |
| Securing internet applications using homomorphic encryption schemes | 2013 | 🔗 Voir |
| A fully private video on-Demand service | 2012 | 🔗 Voir |
| An encrypted trust-based routing protocol | 2012 | 🔗 Voir |
| Encrypted processes for oblivious data retrieval | 2011 | 🔗 Voir |
| Biometric identification system based on electrocardiogram data | 2008 | 🔗 Voir |
