Layth Sliman

Layth Sliman

Professor

About

119
Publications
19,733
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
612
Citations
Introduction
I work on Blockchain-Based Supply Chain platforms, Dynamic collaboration, Smart Contract Formal verification . lightweight cryptography solutions proposed with the aim of integrating human and IoT security in systems’ design phase.

Publications

Publications (119)
Article
Full-text available
Purpose: The integration of AI with blockchain technology is investigated in this study to address challenges in IoT-based supply chains, specifically focusing on latency, scalability, and data consistency. Background: Despite the potential of blockchain technology, its application in supply chains is hindered by significant limitations such as lat...
Article
Full-text available
Blockchain provides several advantages, including decentralization, data integrity, traceability, and immutability. However, despite its advantages, blockchain suffers from significant limitations, including scalability, resource greediness, governance complexity, and some security related issues. These limitations prevent its adoption in mainstrea...
Chapter
Full-text available
Over the last few decades, researchers have become increasingly interested in machine learning. The field has progressed from classical techniques to neural networks (NNs) and fuzzy neural networks. A novel approach that employs an algebraic model has recently emerged, which enables data conceptualization through generalization and formalization. T...
Preprint
Full-text available
Le problème croissant des pénuries de médicaments au sein de la chaîne d’approvisionnement pharmaceutique est devenu une préoccupation mondiale cruciale, posant des menaces importantes à la santé publique et à l’intégrité des systèmes de santé. Cet article propose un examen approfondi de l’origine des pénuries de médicaments, qui affectent une larg...
Article
Full-text available
Algebraic machine learning is a novel parameter-free model that has demonstrated impressive accuracy in challenging tasks such as the MNIST dataset and N-Queens completion. However, its utilization of two semi-lattices can lead to significant computational demands. To tackle this issue, a solution has been proposed that employs a single semi-lattic...
Article
Full-text available
Fingerprint-based biometric systems are widely used because of their advantages against conventional authentication systems based on passwords and tokens. However, a major limitation is that individuals’ fingerprint information cannot be easily changed if compromised. The fuzzy vault is a promising technique that secures fingerprint data by generat...
Conference Paper
Full-text available
Although data mining is very relevant to the medical sector, it has also raised privacy concerns since it is applied to sensitive data, which undoubtedly affects citizens' rights and freedoms, which are strictly regulated by the EU through the General Data Protection Regulation (GDPR). This concern creates a big gap between the data owner and the d...
Conference Paper
Full-text available
0000−0003−3234−8653] , Ziad Doughan 1[0000−0002−7566−7710] , Layth Sliman 2[0000−0003−3369−7302] , and Ali Haidar 1[0000−0001−8065−3658] Abstract. With the advancement of Machine Learning, recommender systems have emerged with the aim of improving the user experience in a world where data and available alternatives are tremendously growing. Employi...
Article
Full-text available
A Smart Contract (SC) is a piece of code executed on the blockchain to automatically trigger transactions upon the occurrence of predefined events. Due to the intrinsic features regarding traceability and data immutability, many companies started using blockchain Smart Contracts to perform collaborative processes. Despite their promising features,...
Chapter
Full-text available
With the advancement of Machine Learning, recommender systems have emerged with the aim of improving the user experience in a world where data and available alternatives are tremendously growing. Employing Natural Language Processing with such systems can provide them with a sense of empowerment, given that most of the users’ opinions are reflected...
Conference Paper
Full-text available
Elliptic Curve Digital Signature Algorithm (ECDSA) is a crucial au- thentication component of many modern internet and communica- tion systems. It is used in different domains such as cryptocurrency, IoT, e-health, e-banking, e-governance, etc. Due to the spread of open, distributed and collaborative systems brought by the sharing economy, the surg...
Article
Full-text available
Many today’s companies use Smart Contracts to represent and execute their business processes. Smart contracts are self-executed programs running over blockchain. In this context, composite smart contracts are used to represent collaborative business processes. A composite smart contract is a smart contract that needs to execute other contracts usin...
Chapter
Full-text available
A Service Level Agreement (SLA) is an agreement between clients and providers in the context of a particular service provision. In fact, trust between the consumer and the service provider (SP) is a real issue, especially when there is a violation of the SLA. Usually, the consumer is unable to prove or determine a violation. Therefore, traditional...
Article
Full-text available
Very few organizations can afford the necessary infrastructure for genomic data analytic, which requires a very large amount of storage and computational resources. In this context, cloud computing platforms can be adopted as a practical solution for storage and computations. However, sharing such sensitive information with cloud providers can lead...
Conference Paper
Full-text available
In recent years, Blockchain technology has proved its efficiency in many domains. A smart contract is a software component allowing exposing services via the Blockchain network. Smart contracts are small programs that automatically execute the terms of an agreement when predetermined terms and conditions are reached. With the increasing growth in t...
Conference Paper
Full-text available
Blockchain brings many added values to modern business systems. However, Blockchain-based applications with massive IoT devices experience some limitations. The limitations are due to the linear structure and the consensus algorithms used in Blockchain that consume the participating nodes' considerable resources. In addition, IoT devices are genera...
Chapter
Full-text available
In this article, we study the NP-Hard combinatorial optimization problem of the minimum initial marking (MIM) computation in labeled Petri net (L-PN) while considering a sequence of labels to minimize the resource consumption in a flexible manufacturing system (FMS), and we propose an approach based on the ant colony optimization (ACO) precisely th...
Article
Conventional cryptographic methods are not appropriate for IoT environments due to the specific IoT devices constraints, such as memory usage, time and computational costs. This leads to the emergence of the lightweight cryptography field. This paper investigates the different lightweight cryptographic design methods and proposes an IoT-based crypt...
Article
Full-text available
Modern IT technologies shaped the shift in economic models with many advantages on cost, optimization, and time to market. This economic shift has increased the need for transparency and traceability in supply chain platforms to achieve trust among partners. Distributed ledger technology (DLT) is proposed to enable supply chains systems with trust...
Article
Full-text available
IOTA is a distributed ledger technology (DLT) platform proposed for the internet of things (IoT) systems in order to tackle the limitations of Blockchain in terms of latency, scalability, and transaction cost. The main concepts used in IOTA to reach this objective are a directed acyclic graph (DAG) based ledger, called Tangle, used instead of the c...
Article
Full-text available
Data transparency is essential in the modern supply chain to improve trust and boost collaboration among partners. In this context, Blockchain is a promising technology to provide full transparency across the entire supply chain. However, Blockchain was originally designed to provide full transparency and uncontrolled data access. This leads many m...
Preprint
Full-text available
Authors are invited to submit a manuscript to the 3rd IEEE International Workshop on Smart & Sustainable Mobility & Logistics in Smart Cities - SSMLS 2021 (at COMPSAC 2021). Deadline for submission (Extended): May 1, 2021
Article
Full-text available
A multi‐biometric system uses different modalities to identify individuals more accurately. The authors analyse fusion efficiency of a significant number of multi‐biometric fusion schemes. To do so, the study applies different functions that are generated using genetic programming (GP) on the 2000 multi‐biometric instances produced by the fusion of...
Chapter
Full-text available
The use of blockchain (BC) technology for IoT-based collaboration platforms is still hindered by its inherent properties, namely, the need for ever-increasing storage and the low scalability. In this paper, we investigate the interoperability requirements between BC and tangle distributed technologies. We propose a new decentralization architecture...
Chapter
Ensuring the correctness of smart contracts is of paramount importance to achieve trust and continuity in the Blockchain-based business process execution. Due to the immutable nature of distributed ledger technology on the blockchain, a smart contract should work as intended before using it. Any bugs or errors will become permanent once published a...
Chapter
Full-text available
This paper presents the design and implementation of a new platform that takes into consideration the requirements and constraints resulting from the industrial context based on IoT. This platform combines the “Tangle” and “Blockchain” techniques. Tangle is primarily designed to address scale-up issues and the relatively high cost (time and resourc...
Article
To achieve trust and continuity in the smart contracts-based business process execution, the verification of such smart contracts is mandatory. A blockchain-based smart contract should work as intended before using it. Due to the immutable nature of blockchain, any bugs or errors will become permanent once published and could lead to huge economic...
Article
System analysis is a crucial activity throughout component-based architecture design. It enables detecting and correcting errors in the early stage of the system development life cycle. In this paper, we consider system analysis in UML2.0 component-based architectural design phase. This is done by proposing a Model Driven Engineering (MDE) tool cal...
Article
Full-text available
Authors are invited to submit a manuscript to the 2nd IEEE International Workshop on Smart & Sustainable Mobility & Logistics in Smart Cities - SSMLS 2020 (at COMPSAC 2020). Deadline for submission (Extended): April 24, 2020
Article
Motivation: As a result of the worldwide health care system digitalization trend, the produced healthcare data is estimated to reach as much as 2314 Exabytes of new data generated in 2020. The ongoing development of intelligent systems aims to provide better reasoning and to more efficiently use the data collected. This use is not restricted retro...
Article
Full-text available
Computing the minimum initial marking (MIM) in labeled Petri nets (PN) while considering a sequence of labels constitutes a difficult problem. The existing solutions of such a problem suffer from diverse limitations. In this paper, we proposed a new approach to automatically compute the MIM in labeled PNs in a timely fashion. We adopted a genetic-b...
Article
System analysis is a crucial activity throughout component-based architecture design. It enables detecting and correcting errors in the early stage of the system development life cycle. In this article, we consider system analysis in UML2.0 component-based architectural design phase. This is done by proposing a model-driven engineering (MDE) tool c...
Chapter
Full-text available
Service Component Architectures (SCA) is widely used for the integration of heterogeneous applications. This heterogeneity, added to the distributed aspect of SCA, can be a source of behavioral mismatches. In this paper, we present a new approach for behavioral verification of SCA software architectures. More precisely , we propose a translation of...
Chapter
Full-text available
So far, many cryptography systems adapted to Internet of Things (IoT) paradigm have been introduced. However, in these approaches, the constraint of images exchange has not been taken into consideration. In fact, image content is characterized by the correlation between its elements e.g. pixels. Correlation impacts negatively the security. Actually...
Chapter
Full-text available
A uni-biometric system suffers from unbalanced accuracy because of image quality, features extraction weakness, matching algorithm and limited degrees of freedom. This can be overcome by using multiple evidences of the same identity (Multi-biometrics fusion). In a previous work, we proposed new fusion functions based on arithmetic operators and sea...
Article
Computing the minimum initial marking (MIM) in labeled Petri nets (PN) while considering a sequence of labels constitutes a difficult problem. The existing solutions of such a problem suffer from diverse limitations. In this paper, we proposed a new approach to automatically compute the MIM in labeled PNs in a timely fashion. We adopted a simulated...
Chapter
In this paper, an approach for verifying data exchange requirements in the context of IoT with regard to resource constraints is described. The verification is done using Event-B method. The security requirements are defined based on the correlation concept. The capacity requirements are defined as a set of constraints on the exchanged data. The pr...
Chapter
Web systems verification is a crucial activity throughout the systems development life cycle, especially in the phase of service-component architectural design. Indeed, this activity allows the detection and consequently the correction of errors early in Web systems development life cycle. In this paper, we discuss the behavioral verification probl...
Conference Paper
AC (Access Control) is the process of ensuring that an authenticated user accesses only what he or she is authorized to do with respect to certain models and security policies. In business collaboration systems, services are designed to conduct actions requested by a customer, using service provider's infrastructure. In such context, the agreement...
Conference Paper
With the spread of Internet of Things (IoT), ensuring security and privacy proves essential. However, given the limited computation resources of IoT objects, the mechanisms and techniques used to secure data exchange in these environments should consider many constraints such as power consumption, size, execution time … etc. To cope with these cons...
Preprint
Full-text available
Typically an ontology matching technique is a combination of much different type of matchers operating at various abstraction levels such as structure, semantic, syntax, instance etc. An ontology matching technique which employs matchers at all possible abstraction levels is expected to give, in general, best results in terms of precision, recall a...
Article
Context: Open standards are urgently needed for enabling software interoperability in Cloud Computing. Open Cloud Computing Interface (OCCI) provides a set of best design principles to create interoperable REST management APIs. Although OCCI is the only standard addressing the management of any kind of cloud resources, it does not support a range o...
Chapter
Several Lightweight cryptosystems were specially designed for constrained-devices. For this reason many papers have been comparing and assessing existing Lightweight cryptosystems. Our contribution; compared to those papers; is to analyse the recently and popular Lightweight cryptosystems using actual devices used in IoT context namely the Raspberr...
Chapter
Full-text available
In recent years, the Unified Modeling Language (UML) has emerged as a de facto industrial standard for modeling Component-Based Software (CBS). However, in order to ensure the safety and vivacity of UML CBS, many approaches have been proposed to verify the concurrency between interconnected components. But, rare are the works that tackle concurrenc...
Article
There is a need for further research in the area of ontology evaluation specifically dealing with ontology development exploiting concept maps. The existing literature on ontology evaluation primarily emphasis on ontology formalisation as well as on performing logical inferences, which is usually not directly relevant for concept maps as they are c...
Conference Paper
Cloud environments have been increasingly used to deploy and run software while providing a high level performance with a low operating cost. Most of the existing software applications are nowadays distributed as Package-based Free and Open Source (PFOS) applications. Different requirements must be considered while configuring PFOS software. These...
Conference Paper
Cyber-attacks have become more complex and unpredictable. Due to their devastating impacts, choosing the appropriate response has become a priority for corporations. This paper introduces an incident response system based on a supervised machine learning model. It offers a framework to process alerts and enhance them to classify and defend against...
Conference Paper
In this paper, we introduce a new chaff-points generation method in fuzzy vault fingerprint. Our method is based on squares boundaries and Knapsack problem. Chaff-points generation process consists of creating a set of chaff points similar to authentic minutiae feature representation. Squares based chaff-points generation consist of delimiting a sq...