default search action
7th CIoT 2024: Montreal, QC, Canada
- 7th Conference on Cloud and Internet of Things, CIoT 2024, Montreal, QC, Canada, October 29-31, 2024. IEEE 2024, ISBN 979-8-3503-5671-7
- Haoran Qi, Zihan Zhang, Farhana H. Zulkernine:
SKELETRACK: Efficient Tracking of Skeleton in Blurry Videos for Human Activity Recognition. 1-5 - Ridwan Arefin Islam, Rezwan-Ul-Islam, Swakkhar Shatabda, Salekul Islam:
ElectroBlock: Reinforcement Learning and Blockchain-based Energy Trade to Optimize Tariffs. 1-5 - Mohamed Ibrahim, Zahra Taheri, Octavio Barrera, Artmiz Golkaramnay:
DEMO: Non-Reciprocal RIS Solution for Power Mismatch in WiFi-Connected IoT Devices. 1-2 - Mirna Awad, Adam Ait Hamid, Yeogeuch Ranganathan, Nizar Choubik, Rami Langar, Wael Jaafar:
xApps for DDoS Attacks Detection and Mitigation in 5G-V2X O-RAN Networks. 1-2 - Peter Yefi, Sikandar Ejaz, Ramanunni Parakkal Menon, Ursula Eicker, Yann-Gaël Guéhéneuc:
An Architectural Approach for Enhanced Data Interoperability Across Building Systems. 1-8 - Sai Suchandan Reddy, Nikolai Pitaev, Aris Leivadeas:
Informed Network Routing for SD-WAN enabled SaaS Optimization: An M365 Proof of Concept. 1-7 - Neelanjana Subin Ferdous, Md. Zoheb Hassan, Imtiaz Ahmed, Lutfa Akter:
Resource Management for Reduced Capability New Radio Devices in Beyond 5G Networks: Opportunities and Research Road Map. 1-8 - Sarah Al Mamoun, Pía Baltazar, Charles Bicari, Marek Blottière, Jean-Michaël Celerier, Rochana Fardon, Olivier Gauthier, Eduardo A. L. Meneses, Maggie Needham, Guillaume Riou:
(DEMO) An IoT toolbox for media arts. 1-2 - Hayato Sagara, Yong Jin, Katsuyoshi Iida, Yoshiaki Takai:
Privacy Preserved IoT Data Inquiry System using DoT. 1-6 - Salman Ali, Cedric Gondro, Qiben Yan, Wolfgang Banzhaf:
End-to-End Decentralized Tracking of Carbon Footprint using Internet of Things and Distributed Databases. 1-8 - Morteza Moghaddassian, J. J. Garcia-Luna-Aceves:
Secure Cloud-Based Provisioning and Managing the Complete Life Cycle of IoT Metals. 1-8 - Pierre Domachowski, Haga Randrianaly, Marie-José Montpetit, Noël Crespi:
Computation Offloading on 5G Core Network for a Highly Delay Sensitive Real Time App. 1-4 - Wael Alsabbagh, Chaerin Kim, Nitin Sanjay Patil, Peter Langendörfer:
Beyond the Lens: False Data Injection Attacks on IIoT-Cameras through MQTT Manipulation. 1-7 - Nupur Gaikwad, Darshana Upadhyay, Jaume Manero, Srinivas Sampalli:
IoT-Enabled Pediatric Pain Care Leveraging Majority Vote-Based Transfer Learning Models. 1-8 - Khalil Snoussi, Wael Jaafar, Rami Langar:
S4HI: A Novel Learning-Based Human Identification Method From Behavioural Data. 1-6 - Shuyan Han, Evelyn Hui Kai Soon, Shihang Ruan, Haoming He, Morteza Moghaddassian, Alberto Leon-Garcia:
(POSTER) Cloud Monitoring and Prediction of Indoor LoRa-based Air Quality Data. 1-2 - Nahed Belhadj Mohamed, Md. Zoheb Hassan, Georges Kaddoum:
Deep Reinforcement Learning-Enabled Resilient Radio Resource Allocation for Internet-of-Things Networks with Receiver Non-Linearity. 1-5 - Lucas Otávio Nascimento De Araújo, Abdelkader Outtagarts:
Sustainability of AI - Energy consumption estimation of an mMTC admission control. 1-7 - Fahima Hasan Athina, Jeniya Sultana, Debaleen Das Spandan, Razib Iqbal:
Metamorphic Testing for Investigation of Context Recognition from Smart Home Voice Commands. 1-4 - Quôc Vo, Philippe Ea, Selma Benzouaoua, Osman Salem, Ahmed Mehaoua:
Anomaly Detection in IoT Sensor Energy Consumption Using LSTM Neural Networks and Isolation Forest. 1-8 - Sabbir M. Saleh, Nazim H. Madhavji, John Steinbacher:
Blockchain for Securing CI/CD Pipeline: A Review on Tools, Frameworks, and Challenges. 1-5 - Khorshed Alam, Md Fahad Monir, Zoheb Hassan, Md. Tarek Habib:
Optimizing IoT Network Intrusion Detection: A Deep Learning Approach. 1-5 - Jean Baptiste Minani, Yahia El Fellah, Sanam Ahmed, Fatima Sabir, Naouel Moha, Yann-Gaël Guéhéneuc:
An Exploratory Study on Code Quality, Testing, Data Accuracy, and Practical Use Cases of IoT Wearables. 1-5 - Jean-Bernard Altidor, Chamseddine Talhi:
Enhancing Port Scan and DDoS Attack Detection using Genetic and Machine Learning Algorithms. 1-7 - Anes Abdennebi, Reda Morsli, Nadjia Kara, Hakima Ould-Slimane:
Machine Learning and Large Language Models-based Techniques for Cyber Threat Detection: A Comparative Study. 1-9 - Messaoud Ait Yahia, Mouhamadou Mouctar Gueye, Wael Jaafar, Rami Langar:
On the Joint Placement of Blockchain and Users' Virtualized Services in the Internet of Vehicles. 1-8 - Zahra Taheri, Mohamed Ibrahim, Mohammad Reza Soleymani, Paul Tornatta:
Non-reciprocal RIS-Aided Full-Duplex Communications: IoT Applications. 1-5 - Swarnabha Roy, Reece Dobson, Jack Campbell, Stavros Kalafatis:
Efficient Resource Allocation for Multi-Robot Collaboration via Traffic-Aware Pod Autoscaling. 1-8 - Tomoyuki Koyama, Takayuki Kushida, Soichiro Ikuno:
Query Prediction for Log Search for Distributed Tracing with External Monitoring Alerts. 1-7 - Hafidh Zouahi, Chamseddine Talhi, Oussama Boudar:
VizCheck: Enhancing Phishing Attack Detection through Visual Domain Name Homograph Analysis. 1-8 - Anurag Kumar, Carol Fung:
An Analysis on CVE Vulnerabilities of the Internet of Things. 1-6 - Souad Beguenane, Wael Jaafar:
A Novel Communication-Efficient and Blockchain-Secured Distributed Federated Learning. 1-6 - Ferdaous Abderrazak, Peyman Pourmohammadi, Larbi Talbi, Eva Antonino-Daviu, Tayeb A. Denidni, Miguel Ferrando-Bataller:
Selective Excitation Technique for Wireless Power Transfer in Wearable Devices Using CMA. 1-6 - Lilatul Ferdouse, Faria Khandaker:
Enhancing IoT Connectivity with Matching Theory-Based Spectrum Sharing for IRS-Aided Multi-Cell Systems. 1-7 - Victor Nikulshin, Chamseddine Talhi:
Effective IDS under constraints of modern enterprise networks: revisiting the OpTC dataset. 1-8 - Abdul Fareed Jamali, Carol Fung:
Demo-ScanIoT, an Application to collect IoT dataset for HomeGuard. 1-2 - Arshin Rezazadeh, Davood Abednezhad, Duff Jones, Hanan Lutfiyya:
Optimizing multi-service migration and downtime at the network edge using deep reinforcement learning. 1-8 - Nicholas Accurso, Samir Si-Mohammed, Diptangshu De, Filippo Malandra:
(DEMO) WTTool: A Visual Web-based Topology Generator and 5G Network Simulator with ns-3. 1-2 - Jorge Ignacio Sandoval, Sandra Céspedes, Agustín González, Diego Torreblanca, Ignacio G. Bugueño-Córdova:
A Deep Dive into Congestion Control and Buffer Management for Fluctuation-Prone 5G-A/6G Links. 1-8 - Mohamed Ahmed M. Hail, Arne Matthes, Stefan Fischer:
Comparative Performance Analysis of NDN Protocol in IoT Environments. 1-8 - Adriana Arteaga Arce, Alexandre Veremme, Carol Habib, Nathalie Mitton:
Demo: Virtualized Wireless Sensor Networks for Distributed Applications over the Cloud Continuum. 1-2 - Dalal Direm, Zakaria Maamar, Amel Benna:
DEMO of: A Policy-based System for Service Provisioning in Edge Computing. 1-2 - Abdelkader Tounsi, Osman Salem, Ahmed Mehaoua:
Anomaly Detection in Federated Learning: A Comprehensive Study on Data Poisoning and Energy Consumption Patterns in IoT Devices. 1-8
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.