Mr. Mohamed Neji | Biometrics and Security | Best Researcher Award

Mr. Mohamed Neji | Biometrics and Security | Best Researcher Award

Mohamed Neji at University of Sfax, Tunisia

👨‍🎓 Profiles

Scopus

Deep keypoints adversarial attack on face recognition systems

  • Authors: BenSaid, E., Neji, M., Jabberi, M., Alimi, A.M.
  • Journal: Neurocomputing
  • Year: 2025

Deep learning methods for early detection of Alzheimer’s disease using structural MR images: a survey

  • Authors: Hassen, S.B., Neji, M., Hussain, Z., Alimi, A.M., Frikha, M.
  • Journal: Neurocomputing
  • Year: 2024

Facial Dataset Anonymization: Striking the Balance between Privacy and Utility

  • Authors: Bensaid, E., Neji, M., Chabchoub, H., Ouahada, K., Alimi, A.M.
  • Journal: IEEE Access
  • Year: 2024

A Hybrid Approach Using 2D CNN and Attention-Based LSTM for Parkinson’s Disease Detection from Video

  • Authors: Krichene, E., Jarraya, I., Dhieb, T., Ouahada, K., Alimi, A.M.
  • Journal: Lecture Notes in Computer Science
  • Year: 2024

Parkinson’s Disease Detection From Online Handwriting Based on Beta-Elliptical Approach and Fuzzy Perceptual Detector

  • Authors: Allebawi, M.F., Dhieb, T., Neji, M., Beyrouthy, T., Alimi, A.M.
  • Journal: IEEE Access
  • Year: 2024

Mrs. Emna BenSaid | Biometrics and Security | Best Researcher Award

Mrs. Emna BenSaid | Biometrics and Security | Best Researcher Award

Emna BenSaid at National School of Engineers of Sfax, Tunisia

👨‍🎓 Profiles

Scopus

Orcid

Deep keypoints adversarial attack on face recognition systems

  • Authors: BenSaid, E., Neji, M., Jabberi, M., Alimi, A.M.
  • Journal: Neurocomputing
  • Year: 2025

Facial Dataset Anonymization: Striking the Balance between Privacy and Utility

  • Authors: Bensaid, E., Neji, M., Chabchoub, H., Ouahada, K., Alimi, A.M.
  • Journal: IEEE Access
  • Year: 2024

FaceAnonym: Face Anonymization Model via Latent Space Mapping

  • Authors: Bensaid, E., Neji, M., Alimi, A.M.
  • Journal: Proceedings – 2023 International Conference on Cyberworlds
  • Year: 2023

Natural Face Anonymization via Latent Space Layers Swapping

  • Authors: Bensaid, E., Neji, M., Alimi, A.M.
  • Journal: Proceedings – IEEE Symposium on Computers and Communications
  • Year: 2023

Dr. Shao Cuiping | System Security | Best Researcher Award

Dr. Shao Cuiping | System Security | Best Researcher Award

Doctorate at Shenzhen Institute of Advanced Technology, Chinese Academy of Sciences, China

👨‍🎓 Profiles

Orcid

Google Scholar

Education

  • Ph.D. in Computer Application Technology (University of Chinese Academy of Sciences, 2019)
  • M.Eng. in Microelectronics (Xi’an Institute of Microelectronics Technology, 2012)
  • B.Eng. in Electronic Science and Technology (Xi’an University of Technology, 2009)

🔬 Research Interests

  • System Security 
  • IC Testability and Reliability 
  • Heterogeneous Chip Optimization Design

🏆 Awards

  • High-Level Talent Recognition (Shenzhen City)
  • 2020 Guangdong Province Science and Technology Progress Award (2nd Prize) 
  • 2020 Shenzhen City Science and Technology Progress Award (1st Prize) 
  • 2019 Wu Wenjun Artificial Intelligence Science and Technology Award (3rd Prize) 
  • Six-Time “Excellent Employee” Award at SIAT
  • “Energetic Rose Award” for SIAT’s 15th Anniversary 
  • 7 Innovation Awards from SIAT

🛠️ Work Experience

  • Research Intern & Assistant Researcher (Shenzhen Institute of Advanced Technology, CAS)
  • Associate Researcher (2020-2024)

📋 Service & Influence

  • Project Reviewer (Guangdong Provincial Department of Science and Technology)
  • Expert Committee Member (Shenzhen Commercial Cryptography Industry Association)
  • Senior Member (China Computer Federation)
  • Member (Chinese Institute of Electronics)
  • Reviewer for IEEE Transactions on VLSI Systems, Circuits and Systems I, and Dependable and Secure Computing

 

Publications

Probabilistic Model-Based Reinforcement Learning Unmanned Surface Vehicles Using Local Update Sparse Spectrum Approximation

  • Authors: Yunduan Cui, Wenbo Shi, Huan Yang, Cuiping Shao, Lei Peng, Huiyun Li
  • Journal: IEEE Transactions on Industrial Informatics
  • Year: 2023

Anomaly recognition method of perception system for autonomous vehicles based on distance metric

  • Authors: Cuiping Shao, Beizhang Chen, Zujia Miao, Yunduan Cui, Huiyun Li
  • Journal: Electronics Letters
  • Year: 2022

Detection of security vulnerabilities in cryptographic ICs against fault injection attacks based on compressed sensing and basis pursuit

  • Authors: Cuiping Shao, Dongyan Zhao, Huiyun Li, Song Cheng, Shunxian Gao, Liuqing Yang
  • Journal: Journal of Cryptographic Engineering
  • Year: 2024

The Bitmap Decryption Model on Interleaved SRAM Using Multiple-Bit Upset Analysis

  • Authors: Jinlong Guo, Guangbo Mao, Wenjing Liu, Cuiping Shao, Ruqun Wu, Yaning Li, Jing Zhao, Cheng Shen, Hongjin Mou, Lei Zhang, Huiyun Li, Guanghua Du
  • Journal: IEEE Transactions on Nuclear Science
  • Year: 2022

Data redundancy mitigation in V2X based collective perceptions

  • Authors: Hui Huang, Huiyun Li, Cuiping Shao, Tianfu Sun, Wenqi Fang, Shaobo Dang
  • Journal: IEEE Access
  • Year: 2020