Photo

GAHI Youssef

Email : youssef.gahi@uit.ac.ma

Institution : National School of Applied Sciences

Laboratory :

📚 Scopus Publications — Total : 83
Title Year 🔗 View
Empirical Evaluation of Big Data Stacks: Performance and Design Analysis of Hadoop, Modern, and Cloud Architectures 2026 🔗 View
DRADG: A Dynamic Risk-Adaptive Data Governance Framework for Modern Digital Ecosystems 2026 🔗 View
Data Management in Smart Manufacturing Supply Chains: A Systematic Review of Practices and Applications (2020–2025) 2026 🔗 View
Mobile Threat Detection Model Using Tiny ML: Malware Case Study 2026 🔗 View
AVI-SHIELD: An Explainable TinyML Cross-Platform Threat Detection Framework for Aviation Mobile Security 2026 🔗 View
Toward Resilient Cyber Defense: Integrating AI and Blockchain for Smart Risk Management 2025 🔗 View
Adaptive, Privacy-Enhanced Real-Time Fraud Detection in Banking Networks Through Federated Learning and VAE-QLSTM Fusion 2025 🔗 View
Enhancing DataOps practices through innovative collaborative models: A systematic review 2025 🔗 View
Pioneering the Security of EHRs Using an Immersive Blockchain Conceptual Framework 2025 🔗 View
Systematic review for attack tactics, privacy, and safety models in big data systems 2025 🔗 View
Quantum Computing and AI Applications in Industry 5.0 Use Cases 2025 🔗 View
Rethinking Big Data Value Chains: A Comparative Framework Across Hadoop, Modern, and Cloud Stacks 2025 🔗 View
Modern Data Stack Demystified: A Strategic Framework for Scalable Adoption 2025 🔗 View
Unlocking Revolutionary Use Cases and Data Privacy Controls Throughout Quantum Computing and Blockchain 2025 🔗 View
Addressing Security Gaps in MCP: Design of a Resilient Reference Architecture 2025 🔗 View
Quantum-Resistant Blockchain for Secure Health Data Exchange in Post-Quantum Era 2025 🔗 View
Risks Assessment of AI Integration in Cybersecurity: A Synergistic Approach with FMECA and ISO 31000 2025 🔗 View
Harnessing Data-Driven Approaches for Robust Real-Time Fraud Prevention and Detection 2025 🔗 View
Leveraging Federated Learning for Detecting Fraud in Banking Systems 2025 🔗 View
Pioneering Quantum AI Applications for Fraud Detection in FinTechs 2025 🔗 View
A Conceptual Real-Time and Privacy-Preserving Architecture for Banking Fraud Detection 2025 🔗 View
Enhancing Mobile Threat Detection through TinyML and Auditable ML 2025 🔗 View
Natural Language Processing in the Nuclear Industry: Opportunities and Challenges 2025 🔗 View
Digital banking fortification: a real-time isolation forest architecture for detecting online transaction fraud 2024 🔗 View
Unified Data Framework for Enhanced Data Management, Consumption, Provisioning, Processing and Movement 2024 🔗 View
Active Metadata and Machine Learning based Framework for Enhancing Big Data Quality 2024 🔗 View
Real-Time Online Banking Fraud Detection Model by Unsupervised Learning Fusion 2024 🔗 View
Synergy of Machine Learning and Blockchain Strategies for Transactional Fraud Detection in FinTech Systems 2024 🔗 View
Integrating Generative AI for Advancing Agile Software Development and Mitigating Project Management Challenges 2024 🔗 View
Securing EHRs With a Novel Token-Based and PPoS Blockchain Methodology 2024 🔗 View
Quantum Cryptology in the Big Data Security Era 2024 🔗 View
Securing the Future: Harnessing Blockchain's Power Against New-Age Vulnerabilities 2024 🔗 View
Enhanced Banking Security: Isolation Forest with Attention Mechanism for Sophisticated Fraud Detection 2024 🔗 View
Enhancing Blockchain Consensus Mechanisms with Artificial Intelligence: Potential Improvements and Applications 2024 🔗 View
An Automated Big Data Quality Anomaly Correction Framework Using Predictive Analysis 2023 🔗 View
Advancing Healthcare Security: A Cutting-Edge Zero-Trust Blockchain Solution for Protecting Electronic Health Records 2023 🔗 View
A private cloud-based Datalab for scalable DSML pipelines 2023 🔗 View
High Availabale Hadoop Deployment Modes with Enterprise-Level capabilities 2023 🔗 View
Enabling open banking and analytics in the cloud through a distributed data anonymization pipeline 2023 🔗 View
Data Security Patterns for Critical Big Data Systems 2023 🔗 View
Quality Anomaly Detection Using Predictive Techniques: An Extensive Big Data Quality Framework for Reliable Data Analysis 2023 🔗 View
An Efficient Framework for the Implementation of Sustainable Industry 4.0 2023 🔗 View
Moving Towards Blockchain-Based Methods for Revitalizing Healthcare Domain 2023 🔗 View
Online Continual Learning Data Quality Framework for Entity Resolution 2023 🔗 View
Big Data Quality Anomaly Scoring Framework Using Artificial Intelligence 2023 🔗 View
Analysis of Banking Fraud Detection Methods through Machine Learning Strategies in the Era of Digital Transactions 2023 🔗 View
End-to-End Real-time Architecture for Fraud Detection in Online Digital Transactions 2023 🔗 View
An Advanced Big Data Quality Framework Based on Weighted Metrics 2022 🔗 View
Metadata Quality in the Era of Big Data and Unstructured Content 2022 🔗 View
Data Quality in the Era of Big Data: A Global Review 2022 🔗 View
Securing Big Data-Based Smart Applications Using Blockchain Technology 2022 🔗 View
An End-to-End Big Data Deduplication Framework based on Online Continuous Learning 2022 🔗 View
Preface 2022 🔗 View
CPC-H2: Convolution Power-based Cryptosystem and Digital Signature 2021 🔗 View
Machine Learning and Deep Learning Models for Big Data Issues 2021 🔗 View
An End to End Cloud Computing Privacy Framework Using Blind Processing 2021 🔗 View
A Novel Approach for Big Data Monetization as a Service 2021 🔗 View
Big data value chain: A unified approach for integrated data quality and security 2020 🔗 View
An adaptable big data value chain framework for end-to-end big data monetization 2020 🔗 View
Big data monetization throughout Big Data Value Chain: a comprehensive review 2020 🔗 View
Fully homomorphic encryption without noise 2020 🔗 View
Network security strategies in big data context 2020 🔗 View
A multi-layer big data value chain approach for security issues 2020 🔗 View
Correction to: A novel adaptable approach for sentiment analysis on big social data (Journal of Big Data, (2018), 5, 1, (12), 10.1186/s40537-018-0120-0) 2019 🔗 View
Big data quality metrics for sentiment analysis approaches 2019 🔗 View
Full consideration of big data characteristics in sentiment analysis context 2019 🔗 View
A secure multi-user database-as-a-service approach for cloud computing privacy 2019 🔗 View
The impact of big data quality on sentiment analysis approaches 2019 🔗 View
A novel adaptable approach for sentiment analysis on big social data 2018 🔗 View
Big Data Analytics: A Comparison of Tools and Applications 2018 🔗 View
Security analysis of C-BGP: A light alternative to S-BGP 2016 🔗 View
Blind forwarding for secure and private communications in untrusted networks 2016 🔗 View
Wormhole Detection in Secured BGP Networks 2016 🔗 View
A Review of Intrusion Detection in 802.15.4-Based Wireless Sensor Networks 2016 🔗 View
Big Data Analytics: Security and privacy challenges 2016 🔗 View
Blind decryption for cloud computing 2016 🔗 View
Performance analysis of private information retrieval scheme based on homomorphic encryption 2016 🔗 View
Private video streaming service using leveled somewhat homomorphic encryption 2014 🔗 View
Securing internet applications using homomorphic encryption schemes 2013 🔗 View
A fully private video on-Demand service 2012 🔗 View
An encrypted trust-based routing protocol 2012 🔗 View
Encrypted processes for oblivious data retrieval 2011 🔗 View
Biometric identification system based on electrocardiogram data 2008 🔗 View