Follow
Mohand Tahar Kechadi
Title
Cited by
Cited by
Year
Customer churn prediction in telecommunications
B Huang, MT Kechadi, B Buckley
Expert Systems with Applications 39 (1), 1414-1425, 2012
4662012
Cloud forensics
K Ruan, J Carthy, T Kechadi, M Crosbie
Advances in Digital Forensics VII: 7th IFIP WG 11.9 International Conference …, 2011
4522011
Implications of LHCb measurements and future prospects
LHCb Collaboration TJ Gershon@ warwick. ac. uk, A Bharucha, II Bigi, ...
The European Physical Journal C 73, 1-92, 2013
3502013
Cloud forensics definitions and critical criteria for cloud forensic capability: An overview of survey results
K Ruan, J Carthy, T Kechadi, I Baggili
Digital Investigation 10 (1), 34-43, 2013
2442013
Exploratory spatio-temporal data mining and visualization
P Compieta, S Di Martino, M Bertolotto, F Ferrucci, T Kechadi
Journal of Visual Languages & Computing 18 (3), 255-279, 2007
2112007
Multi-objective feature selection by using NSGA-II for customer churn prediction in telecommunications
B Huang, B Buckley, TM Kechadi
Expert Systems with Applications 37 (5), 3638-3646, 2010
1902010
Cupcarbon: A multi-agent and discrete event wireless sensor network design and simulation tool
K Mehdi, M Lounis, A Bounceur, T Kechadi
Seventh International Conference on Simulation Tools and Techniques, 2014
1552014
An effective hybrid learning system for telecommunication churn prediction
Y Huang, T Kechadi
Expert Systems with Applications 40 (14), 5635-5647, 2013
1442013
Human activity recognition with convolutional neural networks
A Bevilacqua, K MacDonald, A Rangarej, V Widjaya, B Caulfield, ...
Machine Learning and Knowledge Discovery in Databases: European Conference …, 2019
1302019
Internet of things forensics–challenges and a case study
S Alabdulsalam, K Schaefer, T Kechadi, NA Le-Khac
Advances in Digital Forensics XIV: 14th IFIP WG 11.9 International …, 2018
1242018
Application of data mining for anti-money laundering detection: A case study
NA Le Khac, MT Kechadi
2010 IEEE international conference on data mining workshops, 577-584, 2010
1192010
Privacy-aware blockchain innovation for 6G: Challenges and opportunities
T Nguyen, N Tran, L Loven, J Partala, MT Kechadi, S Pirttikangas
2020 2nd 6G Wireless Summit (6G SUMMIT), 1-5, 2020
118*2020
Edge-enabled metaverse: the convergence of metaverse and mobile edge computing
N Aung, S Dhelim, L Chen, H Ning, L Atzori, T Kechadi
Tsinghua Science and Technology 29 (3), 795-805, 2023
97*2023
Survey on cloud forensics and critical criteria for cloud forensic capability: A preliminary analysis
K Ruan, I Baggili, J Carthy, T Kechadi
932011
A new feature set with new window techniques for customer churn prediction in land-line telecommunications
BQ Huang, TM Kechadi, B Buckley, G Kiernan, E Keogh, T Rashid
Expert Systems with Applications 37 (5), 3657-3665, 2010
932010
A complete formalized knowledge representation model for advanced digital forensics timeline analysis
Y Chabot, A Bertaux, C Nicolle, MT Kechadi
Digital Investigation 11, S95-S105, 2014
892014
Dimensionality reduction in data mining: A Copula approach
R Houari, A Bounceur, MT Kechadi, AK Tari, R Euler
Expert Systems with Applications 64, 247-260, 2016
872016
Preprocessing techniques for online handwriting recognition
BQ Huang, YB Zhang, MT Kechadi
Seventh International Conference on Intelligent Systems Design and …, 2007
812007
Framework TDR for the LHCb upgrade: technical design report
I Bediaga, H Chanal, P Hopchev, S Cadeddu, S Stoica, M Calvo Gomez, ...
LHCb-TDR-012, 2012
752012
Clustering approaches for financial data analysis: a survey
F Cai, NA Le-Khac, T Kechadi
arXiv preprint arXiv:1609.08520, 2016
662016
The system can't perform the operation now. Try again later.
Articles 1–20