default search action
20th IWCMC 2024: Ayia Napa, Cyprus
- International Wireless Communications and Mobile Computing, IWCMC 2024, Ayia Napa, Cyprus, May 27-31, 2024. IEEE 2024, ISBN 979-8-3503-6126-1
- Khawla Almazrouei, Khawla A Alnajjar:
Error-correcting Codes in Communication Systems. 1-6 - Zhen Li, Jialong Gong, Dong Wang:
Conflict Management based on Deep Reinforcement Learning for Edge Computing in Intent-Driven Networks. 1-5 - Amani Benamor, Oussama Habachi, Jean-Pierre Cances, Vahid Meghdadi:
Physical Layer Security Meets Privacy Requirements for Downlink NOMA. 1-6 - Yufei Long, Qimiao Zeng, Yirong Zhuang, Qing Pan, Han Xiao:
An Innovative Task Offloading Algorithm Based on Deep Reinforcement Learning in Computation Resource Network. 1-7 - Jimena Andrade-Hoz, José M. Alcaraz Calero, Qi Wang:
Handling Imbalanced 5G and Beyond Network Tabular Data Using Conditional Generative Models. 7-12 - Yingjuan Shi, Maode Ma:
ECCIA: An Identity Authentication Scheme against IFAs in NDNs. 13-18 - Zuting Chen, Shuai Han, Peng Yu, Chenyu Wu:
A Res-GRU Based Decoder for Polar Codes. 19-24 - Sara Kassan, Bechir Mnakri, Thierry Nagellen, Frédéric Guyard, Tamara Tosic:
Signal quality detection in mobile network based on synthetic vehicle location data generation using generative adversial neural networks. 25-30 - Mahdi Barhoush, Ahmad Ayad, Mohammad Kohankhaki, Anke Schmeink:
Communication-efficient Decentralised Federated Learning via Low Huffman-coded Delta Quantization Scheme. 31-36 - Haijun Meng, Huimin Lu:
A Survey of Deep Learning Technology in Visual SLAM. 37-42 - Liangfan Shi, Huimin Lu:
Comprehensive Review of End-to-End Video Compression. 43-48 - Hanxue Fu, Huimin Lu:
A Review of Multimodal Sentiment Analysis: Modal Fusion and Representation. 49-54 - Xuan Huang:
Mobility Management Approach for Co-Orbital Regenerated LEO Satellites. 55-60 - Naomi Kirimi, Chadi Barakat, Yassine Hadjadj Aoul:
Passive network monitoring and troubleshooting from within the browser: a data-driven approach. 61-66 - Yogi Patel, Rajesh Gupta, Riya Kakkar, Sudeep Tanwar, Mohsen Guizani:
Blockchain and DL-based Brain Tumour Prediction Scheme for Telesurgery Systems in Healthcare 4.0. 67-72 - Qiuyue Gao, Jinyan Li, Junli Xue, Yanxia Xing:
An enhanced quality of service mechanism based on the two-way negotiation procedure. 73-77 - Ronghao Ma, Jianhong Zhou, Maode Ma:
A Blockchain-assisted Group Handover Authentication Protocol for 5G Wireless Networks. 78-83 - Ying Dong, Yafeng Zhan, Haoran Xie:
Deep Learning Based Fault Diagnosis Methods for Satellite Power System. 84-89 - Ali Riahi, Aiman Erbad, Abdelaziz Bouras, Amr Mohamed:
RL-Based Incentive Cooperative Data Learning Framework Over Blockchain in Healthcare Applications (RL-ICDL-BC). 90-96 - Nikolaos Prodromos, Damianos Diasakos, Vasileios Kokkinos, Apostolos Gkamas, Christos Bouras, Philippos Pouyioutas:
Dynamic Bandwidth Allocation in MIMO 5G Networks. 97-102 - Zhijun Wu, Pei Xu, Haoyu Fan:
Network Security Situation Assessment Method Based Eigenvector Centrality. 103-108 - Weikang Yang, Jianing Zhao, Shaoxuan Xue, Xin Wang, Xuenan Ni:
A New Radio Frequency Fingerprint Identification Method Based on CEEMDAN. 109-113 - Julio Diez-Tomillo, José M. Alcaraz Calero, Qi Wang:
Edge-Accelerated UAV Operations: A Case Study of Open Source Solutions. 114-119 - Alexander Seng, Ulrich Trick, Armin Lehmann, Bogdan Ghita:
Network Slice Placement in Wireless Mesh Networks. 120-125 - Maroua Drissi, Sylvain Allio:
End-to-End Spatio-temporal Latency Prediction for Vehicular Applications. 126-131 - Ali El Attar, Rida Khatoun, Fadlallah Chbib, Ahmad Fadlallah, Ahmed Serhrouchni:
DNS flooding attack detection scheme through Machine Learning. 132-137 - Sinan Yavuz, Edwin Naroska, Kai Daniel:
Implementation of a Symmetric Double Arbiter Physical Unclonable Function and Evaluation the Impact of Temperature Influences using PYNQ-Z1 Board. 138-143 - Thabet Kacem, Sourou Tossou:
ADS-B Replay Attack Detection using Transformers. 144-149 - Parisa Eslami, Houbing Song:
Stability Analysis of Deep Neural Networks under Adversarial Attacks and Noise Perturbations. 150-155 - Muhammad Rehan Yasin, Hassan Jamil Syed, Junaid Shuja:
An Efficient Approach for Tampering Attack Detection in WSN Using Blockchain. 156-161 - Yiyang Xiong, Cheng Li, Shilei Dong, Fangning Shi, Haoming Zhang:
Enhancing IoT Traffic Detection via Attention Mechanisms Derived from Matrix Eigenvalues and Eigenvectors within Transformer Architectures*. 162-167 - Hongba Bao, Hui Wang, Yiying Sun, Sheng Pan:
An Improved Grey Wolf Optimizer for Task Scheduling in D2D-Assisted MEC Systems. 168-173 - Yiyang Xiong, Shilei Dong, Fangning Shi, Haoming Zhang:
Advancing IoT Anomalous Traffic Detection through Arithmetic Coding in Transformer-Based Architectures. 174-179 - Henry Alexander Ignatious, Hesham El-Sayed:
Usecase-based generic framework for data fusion and decision making in Autonomous Driving. 180-185 - Andreas Andreou, Constandinos X. Mavromoustakis, Jordi Mongay Batalla, Evangelos K. Markakis, Athina Bourdena, George Mastorakis, Houbing Song:
Enhancing Secure Communication in 6G-Enabled IoV through UAV and Control Center Integration. 186-191 - Andreas Andreou, Constandinos X. Mavromoustakis, Jordi Mongay Batalla, Evangelos K. Markakis, Athina Bourdena, George Mastorakis, Houbing Song:
Enhancing UAV Network Efficiency through 6G+ Enabled Federated Learning Algorithms and Energy optimization Techniques. 192-197 - Xuenan Ni, Jianing Zhao, Xinping Xia, Xiaoying Zhang, Jianyi Zhou, Weikang Yang:
Power Allocation and User Pairing Based Beam Reuse in a NOMA System. 198-203 - Yidi Xie, Chen Zhang, Gang Du:
Resource Management Based on Resource Parameters in Computing Networks. 204-207 - Jintong Cai, Huimin Lu:
NeRF-based Multi-View Synthesis Techniques: A Survey. 208-213 - Chan Dai Truyen Thai:
Opportunistic Routing and Energy Harvesting in Multi-tier Networks against Jamming Attacks. 214-219 - Nema Ahmed, Somaya Al-Máadeed:
Enhancing Post-Disaster Survivor Detection Using UAV Imagery and Transfer Learning Strategies. 220-225 - Vasu Mistry, Binod Vaidya, Hussein T. Mouftah:
Evaluation of LSTM GAN for Trajectory Prediction in Connected and Autonomous Vehicles. 226-231 - Elif Ak, Berk Canberk, Vishal Sharma, Octavia A. Dobre, Trung Q. Duong:
What-if Analysis Framework for Digital Twins in 6G Wireless Network Management. 232-237 - Palwasha Waheed Shaikh, Hussein T. Mouftah:
Intelligent DWC Reservation and Trip Planning of CAEV and UAV for 6G ITS. 238-243 - Xingyu Yuan, He Li, Kaoru Ota, Mianxiong Dong:
Generative Inference of Large Language Models in Edge Computing: An Energy Efficient Approach. 244-249 - Zeyuan Guo, Changjun Ren, Lin Yan, Shujie Yang, Yi Sun:
A Hierarchical PoW-Powered Access Mechanism for Shuffling-Based Moving Target Defense System. 250-255 - Ivo Müürsepp, Aleksei Fjodorov, Muhammad Mahtab Alam:
Non-Line of Sight Detection Based on 5G Signal Strength- and Quality Measurements and its impact on mobile positioning accuracy. 256-261 - Yuchao Zheng, Xiu Chen, Yujie Li:
Efficient 3D Object Recognition for Unadjusted Bin Picking Automation. 262-268 - Yuqing Chai:
Advanced Techniques in Adaptive Beamforming for Enhanced DOA Estimation. 269-273 - Zhirong Zhang:
Massive MIMO technology: a key advancement in shaping communication networks for the 5G/5G+ era. 274-278 - Zhirong Zhang:
Spectrum Sharing Technologies in the 5G Era: Innovative Applications and Challenges in the FDD Band. 279-284 - Zhirong Zhang:
Research and Application of Multi-Access Collaboration Technology in 6G Networks. 285-290 - Bingxin Wang, Dan Tu, Jie Wang:
Actor-Critic Deep RL for Vehicular Edge Computing Optimization. 291-295 - Bingxin Wang, Dan Tu, Jie Wang:
Cost-Efficient Computation Offloading in VEC Using Deep Reinforcement Learning Techniques. 296-300 - Chemsedine Bchir, Moayad Aloqaily, Fakhri Karray, Mohsen Guizani:
Advancing Fairness in Microgrid Energy Transaction: An Alternative Approach. 301-308 - Bingxin Wang, Dan Tu, Jie Wang:
Balancing Energy Consumption and Latency in Vehicle Edge Computing for 6G Networks. 309-314 - Xiaoyin Zhao, Xueqi Yuan:
Impact Assessment of IAB and Small 5G Stations on Railway Network Communications. 315-320 - Sinda Besrour, Gael S. Mubibya, Zikuan Liu, Jalal Almhana:
Context-Aware Hard and Slow Fall Detection. 321-326 - Fenil Ramoliya, Rajesh Gupta, Krisha Darji, Chinmay Trivedi, Riya Kakkar, Sudeep Tanwar, Mohsen Guizani:
A Green IoT-Integrated AI-Based EV Scheduling Scheme for Efficient Charging Station Selection. 327-332 - Xijian Xu, Jun Wu:
Bridging Economic Model and Blockchain: ZKP Empowered Privacy Preserving Payment Channel with Intermediary Pricing. 333-338 - Shuai Han, Zhiqiang Li, Cheng Li:
Adaptive Grouping Access Based on Rate-Splitting Multiple Access for Multibeam Satellite System. 339-344 - Bin Jiang, Yining Wang, Fanhui Kong, Xuerong Cui, Shibao Li, Jian Wang:
UAV Path Planning for Aviation Optimazition Based on Doubly Decoupled Reinforced Network. 345-350 - Xiaoyin Zhao, Lei Liu:
Evaluating Interference Impact on On-board Small Station Systems in Railway Networks. 351-356 - Xiaoyin Zhao, Xi Meng, Bingxin Wang:
Advancing Railway Systems with Next-Generation 5G Connectivity. 357-362 - Aakash, Saksham Mittal, Mohammad Wazid, Amit Kumar Mishra, Ashok Kumar Das, Sachin Shetty, Mohsen Guizani:
EM-PAD: An Effective Mechanism for Phishing Attack Detection. 363-368 - Mohammed Laroui, Hatem Ibn-Khedher, Nathalie Banoun:
Fog computing-empowered smart systems for latency-sensitive control applications. 369-374 - Yupeng Du, Zhenglei Huang, Shujie Yang, Han Xiao:
Collaborative Task Offloading Based on Deep Reinforcement Learning in Heterogeneous Edge Networks. 375-380 - Jing Jia, Heng Wang, Xu Xia, Dong Wang:
Mobility management in 5G and 6G satellite access networks. 381-385 - Pedro Horchulhack, Eduardo K. Viegas, Altair O. Santin, João A. Simioni:
Network-based Intrusion Detection Through Image-based CNN and Transfer Learning. 386-391 - Konstantinos Gus Nikolaos Amouris:
Flat, Gateway-free, Infinite MANET Architecture with Variable Cell Size Cellular Barrage Relay Networks, and Geographic-Based Hazy Link State Routing. 392-399 - Huiying Zhao, Hongwu Li, Bin Wu, Ruiqi Liu, Lexi Xu, Bingming Huang, Zhipu Xie, Xinzhou Cheng:
Cross-Layer Alarm Association Rules Discovery of Cloud-Network based on Knowledge Graph. 400-405 - Lei Liu:
Analysis and Optimization: interference study of 900MHz NR system to NB-IoT system. 406-412 - Lei Liu, Xi Meng:
Interference compatibility study and interference management for 5G and Broadband TDD Private Networks. 413-420 - Lei Liu, Xiaoyin Zhao:
Interference Analysis between 1800MHz NR System and Meteorological Satellites System Using ITU-R Model. 421-427 - Rahul Mishra, Pritam Anand:
On Demand Reliability in the Internet of Things Enabled Sensors Networks. 428-432 - Tao Xu, Xuanli Wu, Ziyi Xie:
Analysis of Physical Layer Security Based on WFRFT with Multiple Eavesdroppers. 433-438 - Jana Koteich, Nathalie Mitton:
Dataset Collection of Multi-Communication Technologies Monitored in Different Mobility Contexts. 439-444 - Floribert Katembo Vuseghesa, Mohamed-Lamine Messai, Fadila Bentayeb:
Node Compromising Detection to Mitigate Poisoning Attacks in IoT Networks. 445-450 - Yanxia Xing, Jianfeng Zhou, Pengyu Li, Menghan Yu:
Research on Key Technologies of 6G Network Architecture. 451-455 - Zexu Li, Zhen Li, Xiong Xiong, Dongjie Liu:
Cross-Domain AI Towards 6G: Requirements, Solution, and Validation. 456-460 - Yuquan Xiao, Qinghe Du, Chen Lu, Yizhuo Wang:
Secure Status Updates for Internet of Drones: A Deep Q-Learning-Based Antenna Selection Approach. 461-466 - Mohamed Khadmaoui-Bichouna, José M. Alcaraz Calero, Qi Wang:
5G RAN service classification using Long Short Term Memory Neural Network. 467-472 - Guangyao Liu, Tianqi Mao, Ruiqi Liu, Zhenyu Xiao:
Pre-Chirp-Domain Index Modulation for Affine Frequency Division Multiplexing. 473-478 - Yuquan Xiao, Zixiao Zhao:
Ultra-Reliable and Low-Latency UAV Communications in High-Mobility Environments. 479-483 - Aamir Latif, Osama Elgarhy, Yannick Le Moullec, Muhammad Mahtab Alam:
Energy Consumption Evaluation of NOMA-based Sustainable Scheduling in 6G O-RAN. 484-489 - Hanyi Li, Yang Huang, Runhe Wang, Miaomiao Dong:
Dynamic Resource Scheduling for Air-Ground Collaborative Communication: A Hierarchical Multi-Agent Method for Metaverse. 490-495 - Fan Zhang, Tianqi Mao, Ruiqi Liu, Leyi Zhang, Dezhi Zheng, Tengfei Wang, Zhaocheng Wang:
Multicarrier Waveform Design for mmWave/THz Integrated Sensing and Communication. 501-506 - Meng-Hsuan Lin, Shun-Ren Yang, Hsin-Yin Chiang, Chu-Chun Chang, Phone Lin:
A Kubernetes-Powered Personalized Federated Learning Platform for Resource-Constrained Internet of Medical Things. 507-512 - Khoa Nguyen, Wei Shi, Marc St-Hilaire:
Online Resource Allocation in Internet of Vehicles Using Topology Attribute-Aware Genetic Algorithm. 513-518 - Shijiao Zhang, Guomei Zhang, Yezhao Shi, Lei Lu, Jiaoxian Yin:
Dynamic Interference Source Tracking Based on Motion State Decomposition. 519-524 - Hongyu Gu, Xinyue Qi, Liang Sun, Yang Zhang:
Semantic Knowledge Consensus for Multi-agent Collaboration: A Naming Game Approach. 525-530 - Hongyang Du, Guangyuan Liu, Yijing Lin, Dusit Niyato, Jiawen Kang, Zehui Xiong, Dong In Kim:
Mixture of Experts for Intelligent Networks: A Large Language Model-enabled Approach. 531-536 - Zhongxiang Wei, Jingjing Wang, Christos Masouros, Tongyang Xu, Jianrui Chen, Ang Li:
Sub-Block Level Interference Exploitation Precoding in Satellite Communications. 537-542 - Zain Ul Abideen Tariq, Emna Baccour, Aiman Erbad, Mounir Hamdi:
Reinforcement Learning-based anti-Jamming Solution for Aerial RIS-aided Dense Dynamic Multi-User Environments. 543-548 - Chen Zhang, Zhenyu Xiao, Lingfeng Zhang, Guangyao Liu, Wei Zhang, Xiang-Gen Xia:
Collaborative Multi-Agent Jamming Deceiving for UAV-assisted Wireless Communications. 549-554 - Hina Nasir, Syed Ali Raza Zaidi, Ian D. Robertson:
Link Quality Analysis for Buried Pipeline Monitoring using LoRa. 555-560 - Hao Chen, Shuyi Chen, Chenguang He, Hongrui Li:
A Scalable Semantic Communication System Based on Meta-Learning. 561-566 - Yuhan Wang, Zhuo Zou, Xiaoming Hu, Zhongxue Gan, Lizheng Liu:
Robust Robot Formation Control Based on Streaming Communication and Leader-Follower Approach. 567-572 - Pengyu Cui, Xusheng Qian, Xiuyong Zhang, Wei Wang, Chao Yang, Nan Zhang, Yuxiao Liu, Ao Xiong:
A Cross Domain Authentication Scheme Based on Blockchain. 573-579 - Jiahong Xu, Miao Hu, Qinglin Zhao, Di Wu:
EASR: Enabling Neural-Enhanced Video Streaming on Mobile Devices with Edge Assistance. 580-585 - Suhua Tang, Sadao Obana:
Combining AF-based Relay and Multiantenna for Over-the-Air Computation. 586-591 - Chengrun Yang, Gangqiang Zhou, Miao Hu, Qinglin Zhao, Di Wu:
CoarseUCB: A Context-Aware Bitrate Adaptation Algorithm for VBR-encoded Video Streaming. 592-597 - Jian Li, Xingguang Wei, Min Ren, Chunli Liang, Xing Liu, Xianghui Han, Ruiqi Liu, Xinhui Wang:
A Novel Block Diagonalization Based Beam Nulling Method in Dynamic TDD Systems. 598-603 - Zixing Zhao, Baoxian Zhang, Chen Liu, Zheng Yao, Cheng Li:
A Task Bundling based Multi-Platform Cooperation Mechanism for Mobile Crowdsensing. 604-609 - Yi-Yu Chen, Hui-Nien Hung, Shun-Ren Yang, Chia-Cheng Yen, Phone Lin:
On Poisoning Attacks and Defenses for LSTM Time Series Prediction Models: Speed Prediction as an Example. 610-615 - Aurélien Chambon, Abderrahim Sahli, Abderrezak Rachedi, Ahmed Mebarki:
Analyzing the Integration of 3D Building Digital Twins in Optimal IoT Networks Deployment. 616-621 - Ziwei Wan, Zhen Gao, Fabien Héliot, Yu Su, Zhonghuai Wu, Lei Chen, Qu Luo, Pei Xiao:
Orthogonal Chirp Division Multiplexing Waveform Design for 6G mmWave UAV Integrated Sensing and Communication. 622-627 - Vijay Karnatak, Neha Tripathi, Amit Kumar Mishra, Mohammad Wazid, Ashok Kumar Das, Mohsen Guizani, Sachin Shetty:
AKM-FCCI: Secure Authentication and Key Management Mechanism for Fog Computing-Based IoT-Driven Critical Infrastructure. 628-633 - Jiacheng Lu, Chao Zhang, Mingyang Wang, Shihan Chen, Hongming Zhang:
Photon-Counting-Based Ultraviolet Communication System with Self Bit Synchronization Module. 634-638 - Jiayue Liu, Tianqi Mao, Yicheng Huang, Dongxuan He:
An Action Recognition Algorithm Based on Two-Stream Deep Learning for Metaverse Applications. 639-642 - Yi Hu, Shuai Han, Shiji Wang, Cheng Li:
A Deployment Method to Improve the Generalizability of Recurrent Neural Network. 643-648 - Shuai Han, Sen Meng, Shiji Wang, Weixiao Meng, Cheng Li:
Sparse Channel Estimation utilizing Optimal Wiener-Hopf Filtering in MIMO-OTFS Paradigm. 649-654 - Reem Tluli, Somaya Al-Máadeed:
Pose Estimation of Physiotherapy Exercises using ML Techniques. 655-661 - Zixuan Liang, Xinchen Lyu, Chenshan Ren, Na Li, Kai Li:
Communication-Efficient Topology Orchestration for Distributed Learning in UAV Networks. 662-667 - Dan Tu, Bingxin Wang, Lei Liu:
Automatic Recognition of FM Signals Based on FFT Spectrum Analysis. 668-672 - Xiaoxuan Peng, Litao Yan, Yi Zhong, Tao Han, Qiang Li, Xiaohu Ge:
Temperature-based evaluation and optimization of multi-processor mobile computing. 673-678 - Saloua Hendaoui, Fatma Hendaoui:
Synergistic Solution: IDS and Scheduler Harmony for Secure 5G Radio Resources. 679-684 - Jiana Liao, Jinbo Wen, Jiawen Kang, Yang Zhang, Jianbo Du, Qihao Li, Weiting Zhang, Dong Yang:
Optimizing Information Propagation for Blockchain-empowered Mobile AIGC: A Graph Attention Network Approach. 685-690 - Shree Chand Khichar, Awaneesh Kumar Yadav, Manoj Misra, Brij B. Gupta:
An Enhanced Authentication Protocol for IoT-AmI Environment. 691-696 - Bashaer Al-Rowaili, Noor Al-Obaidli, Dana Al-Marri, Khalid Abualsaud, Elias Yaacoub:
Fall Detection Wristband with Optimized Security and Health Monitoring. 697-702 - Xu Xia:
6G Satellite Communication: Key Technologies, Challenges and Trends. 703-705 - Xiu Chen, Yujie Li, Huimin Lu:
Few-Shot Object Detection Algorithm Based on Geometric Prior and Attention RPN. 706-711 - Everton de Matos, Willian Tessaro Lunardi, Jouni Ukkonen, Tero Salminen:
An seL4-based Trusted Execution Environment on RISC-V. 712-717 - Kacper Kamieniarz, Wojciech Mazurczyk:
A Comparative Study on the Security of Kubernetes Deployments. 718-723 - Hongming Zhang, Xi Meng, Yiran Xian, Pengpeng Li:
A Link Adaptive Approach for Federated Learning aided UAV Networks. 724-728 - Hajar Rezzouqi, Assia Naja, Nada Sbihi, Mounir Ghogho:
Traffic Counts-based Origin-Destination Matrix Estimation using a Traffic Simulator and Machine Learning. 729-734 - Hajar Rezzouqi, Assia Naja, Nada Sbihi, Houda Benbrahim, Mounir Ghogho:
A Comparison of Temporal and Spatio-Temporal Methods for Short-Term Traffic Flow Prediction. 735-741 - Yang Huang, Yuqi Hou, Qiuming Zhu, Xiaomin Chen, Lei Chen:
Towards the Metaverse: Distributed Radio Map Reconstruction based on Federated Learning Generative Adversarial Networks. 742-747 - Muhammad Anwar Shahid, Arunita Jaekel, Ning Zhang, Tim Allsopp:
DoS Attack Detection in VANET using Transfer Learning Approach for BSM Data. 748-753 - Mohammad A. Massad, Abdallah Y. Alma'aitah, Hossam S. Hassanein:
STEBS: Spatio-Temporal Entropy-Based Scoring Handover Model for LEO Satellite. 761-767 - Chongju Mai, Anwar Haque:
MavSec: A safer version of MavLink. 768-773 - Samhita Kuili, Burak Kantarci, Marcel Chenier, Melike Erol-Kantarci, Bernard Herscovici:
Domain adaptive deep semi-supervised transfer learning for anomaly detection in OpenWiFi. 774-779 - Xinxin Zhang, Xin Zhang:
Graph Neural Network Based Resource Allocation for Full-duplex Device-to-Device Communication. 780-785 - Shuyue Ai, Yuna Jiang, Qiang Li, Xiaohu Ge, Aduwati Sali:
Decentralized Spectrum Sharing Networks Based on Blockchains. 786-791 - Haitao Zhao, Ying Liu, Qin Wang, Haotong Cao, Wenchao Xia, Hongbo Zhu:
Joint Optimization of User Association, UAV Placement, and Power Allocation in UAV-Satellite-Assisted Cell-Free mMIMO Systems. 792-797 - Ibrahim Sammour, Gérard Chalhoub, Oussama Habachi:
Intelligent CSMA/CA for Wi-Fi networks. 798-803 - Patrick Purucker, Christian Reil, Alfred Höß, Björn W. Schuller:
Deep Neural Quality of Service Prediction for Unmanned Aircraft System Communications. 804-810 - Shuki Zanyovka, Asaf Shabtai:
Simultaneous Transmission and Null Space Tracking Using Interference Feedback for Spatial Division Multiple Access. 811-817 - Farooque Hassan Kumbhar, Raza Nathani, Kamran Ali Memon, Wessam Mesbah:
Rule Based Maliciousness Detection in Computer Network using Machine Learning in Fog Node. 818-823 - Saeif Alhazbi, Ahmed Hussain, Savio Sciancalepore, Gabriele Oligeri, Panos Papadimitratos:
Radio Frequency Fingerprinting via Deep Learning: Challenges and Opportunities. 824-829 - Hongwei Zhang, Marzia Zaman, Achin Jain, Srinivas Sampalli:
A Hybrid Machine Learning Intrusion Detection System for Wireless Sensor Networks. 830-835 - Qingtian Wang, Siyu Chen, Jiaying Zong, Beining Feng, Yunfei Shen, Xu Xia:
Resource Allocation in LEO Satellites assisted Terrestrial Network for Latency-Sensitive Task. 836-841 - Rui Freitas, Maria João Nicolau, António Costa:
Detection and positioning of vulnerable road users in vehicular networks. 842-848 - Ahmed Rafik El-Mehdi Baahmed, Jean-François Dollinger, Mohamed-el-Amine Brahmia, Mourad Zghal:
Hyperparameter Impact on Computational Efficiency in Federated Edge Learning. 849-854 - Simon Pichot, Vania Conan, Hicham Khalifé, André-Luc Beylot, Gentian Jakllari:
Routing Edge-Cloud Requests via Multi-Objective Reinforcement Learning. 861-866 - Romeo Giuliano, Anna Maria Vegni, Valeria Loscrí, Eros Innocenti, Alessandro Vizzarri, Franco Mazzenga:
A Cooperative C-V2X System with UAV-aided Enhanced Connectivity. 867-872 - Faten Ziadi, Hend Fourati, Leïla Azouz Saïdane:
AI and IoT Uses, Challenges and Opportunities for e-Health: a review. 873-878 - Fatima Chahal, Hacène Fouchal, Dominique Gaïti:
Proximity Marketing: A Diverse Classification Approach. 879-884 - Audrey Terracher, Rémy Kocik, Rédha Hamouche, Abderrezak Rachedi, Tarik Bourouina:
Model-Based Approach for Efficient Data Exploitation Process in IoT Systems. 885-890 - Omar Ait Oualhaj, Ali Azougaghe, Assia Naja, Abdelfettah Mabrouk:
Towards Efficient Urban Network Mobility: A Cloud-Based Ride-Sharing System. 891-896 - Jeffrey Redondo, Zhenhui Yuan, Nauman Aslam, Juan Zhang:
Cross-layer Adaptable Contention Window for High-definition Map QoS Enhancement. 897-902 - Boutheina Ben Ismail, Mohamed Hamroun, Bassem Ben Salah, Hedi Sakli:
Improving Response Prediction: Transformer Integration and Optimizer Evaluation. 903-908 - Seyedeh Bahereh Hassanpour, Ahmad Khonsari, Masoumeh Moradian, Aresh Dadlani, Galymzhan Nauryzbayev:
Age-Aware Edge Caching and Multicast Scheduling Using Deep Reinforcement Learning. 909-914 - Lukasz Pietraszek, Wojciech Mazurczyk:
A Research Environment for Evaluating File-based Cryptojacking Detection Techniques. 915-920 - Chenguang He, Yuchuan Ma, Shouming Wei, Jian Zhang:
Research on Adaptive Self-Interference Cancellation and Sensing Methods in ISAC System. 921-926 - Man Ru, Yafeng Zhan, Fang Xin:
The optimization of Networked TT&C System for Mega LEO Constellation. 927-932 - Chenguang He, Bohan Zhang, Shouming Wei:
Design of Base Station Sleeping Scheme in Heterogeneous Cellular Networks Based on User Traffic and SINR. 933-938 - Intissar Krimi, Sofiane Ben Mbarek, Fethi Choubani:
Investigations on Wireless communication Transmission for Wireless Health Monitoring. 939-943 - Petros Stylianou, Elio Faddoul, Ioannis Krikidis:
Experimental Analysis of Chirp Waveforms for Wireless Power Transfer. 944-948 - Bouchra Fakher, Mohamed-el-Amine Brahmia, Mustafa Al Samara, Ismail Bennis, Abdelhafid Abouaissa:
FedLbs: Federated Learning Loss-Based Swapping Approach for Energy Building's Load Forecasting. 949-954 - Srija Venkata Sai Ravali Kothapalli, Cristina Hava Muntean, Abid Yaqoob:
Advanced Deep Learning Framework for Improved Wildfire Detection and Aerosol Identification Using Active Satellite Imagery. 955-960 - Hassan N. Noura, Khalil Hariss:
An Efficient and Secure Federated Learning Communication Framework. 961-968 - Joseph Azar, Hassan N. Noura, Raphaël Couturier:
Lightweight Image Crypto-Compression Using Haar Transform and Selective Encryption for Grayscale IoT Images. 969-974 - Pingping Lin:
Technical Analysis of Non-terrestrial Networks. 975-979 - Reem Tluli, Ahmed Badawy, Saeed Salem, Mohamed Hardan, Sailesh Chauhan, Guillaume Alinier:
A Dynamic Redeployment System for Mobile Ambulances in Qatar, Empowered by Deep Reinforcement Learning. 980-985 - Joel Puga, Armando André Fontainhas, António Costa, Alexandre J. T. Santos, Maria João Nicolau, Filipe Meneses:
Leveraging V2P communications to improve the VRU's safety. 986-992 - Maroua Moatemri, Hamdi Eltaief, Habib Youssef:
Enhancing Security in Multi-Controller SDMN Environments: A Novel 5G Access Authentication Protocol. 993-998 - Ambono M. Kple, Deepak G. C., Bhaskar Prasad Rimal:
Holochain-Based Secure and Energy Efficient IoT Network. 999-1004 - Muhammad Ali Akbar, Jeong-A Lee, Amine Bermak:
Comparative Analysis of Fault-Localization Techniques in Adder. 1005-1009 - Amira Henaien, Hadda Ben Elhadj, Lamia Chaari Fourati:
RFID IoT Architecture for Smart Inventory Management: Security Integration. 1010-1015 - Khouloud Gharsalli, Thierry Le Pors, Sameh Najeh, Pierre-Jean Bouvet, Hichem Besbes:
Nash Bargaining Game for Cooperative Resource Allocation in Underwater Acoustic Communication. 1016-1021 - Ola Salman, Hassan N. Noura, Ali Chehab:
SERS: Secure & Efficient Random and Symbol Linear Network Coding Schemes. 1022-1029 - Radhia Khdhir, Salwa Othmen, Aymen Belghith, Jamilah Alamri:
Breast Cancer Segmentation in Mammograms using Antlion Optimization and CNN/GRU Architectures. 1030-1035 - Yongtao Wei, Siqi Wang, Farid Naït-Abdesselam, Aziz Benlarbi-Delaï:
The Influence of Temporal Dependency on Training Algorithms for Spiking Neural Networks. 1036-1041 - Rima Boughariou, Hend Marouane, Mohamed Mosbah, Hassène Mnif, Amel Meddeb-Makhlouf:
Efficient IoV-Based Geofencing Model for V2X Communication Using Energy Saving Approach. 1042-1047 - Jianzhao Liu, Yang Liu, Junxiong Zhang, Xiaohu Ge, Aibo Xu, Mingming Zhao:
A Bayesian Optimization Algorithm to Improve the Spatial Reuse in the Next-Generation WLANs. 1048-1053 - Abdelmounaim Bouroudi, Abdelkader Outtagarts, Yassine Hadjadj Aoul:
Multi-Domain Scaling Algorithm with Inter-Orchestrator Communication for Beyond 5G/6G Networks. 1054-1061 - Francesco Colosimo, Floriano De Rango:
Byzantine-Robust Federated Learning Based on Dynamic Gradient Filtering. 1062-1067 - Tanmay Badageri, Bechir Hamdaoui, Rami Langar:
Load-Balanced Multipath Routing Through Software-Defined Networking. 1068-1073 - Vittorio Bertolini, Fabio Corti, Ermanno Cardelli:
Effects of Misalignment on Output Voltage Stability in SS Controlled Wireless Power Transfer Systems with Different Control Strategies. 1074-1079 - Ben Schneider, Björn Richerzhagen, Michael Bahr, Georg Carle:
Scheduled Trigger Frames: Enabling Worst-case Latency Bounds for Wi-Fi Industrial Use. 1080-1085 - Sean Ernest Clyde Nodado, Aniel James Villamor:
Gesture-based notification system for Paralytics. 1086-1093 - Muhammad Asif, Júlio Chilela, Driss Benhaddou, Ji Chen:
Vertical Network Slicing and its Impact on 5G Data Traffic and Performance. 1094-1099 - Murat Arda Onsu, Pankti Shah, Murat Simsek, Mark Fobert, Burak Kantarci:
Real-Time Binary Cell Phone Usage Detection and Classification on Vehicular Edge Devices. 1100-1105 - Mehdi Salim Benhelal, Badii Jouaber, Hossam Afifi, Hassine Moungla:
SiamFLTP: Siamese Networks Empowered Federated Learning for Trajectory Prediction. 1106-1111 - Okba Ben Atia, Mustafa Al Samara, Ismail Bennis, Jaafar Gaber, Abdelhafid Abouaissa, Pascal Lorenz:
ERD-FL: Entropy-Driven Robust Defense for Federated Learning. 1112-1117 - Aline Abboud, Mohamed-el-Amine Brahmia, Abdelhafid Abouaissa, Ahmad Shahin, Rocks Mazraani:
Empowering Energy Consumption Forecasting in Smart Buildings: Towards a Hybrid Loss Function. 1118-1123 - Di Wu:
Scaled Conjugate Gradient Digital Cancellation Algorithm Study for 6G Full Duplex Wireless Communication System. 1124-1128 - Youssef Keryakos, Youssef Bou Issa, Michel Salomon, Abdallah Makhoul:
Introducing the Concept of a Hybrid Navigation System Adapted to Blind Users for Optimal Stress-free Indoor and Outdoor Mobility. 1129-1134 - Sinda Besrour, Yogesh Surapaneni, Gael S. Mubibya, Fahim Ashkar, Jalal Almhana:
A Transformer-Based Approach for Better Hand Gesture Recognition. 1135-1140 - Safayat Bin Hakim, Muhammad Adil, Jordi Mongay Batalla, Constandinos X. Mavromoustakis, Houbing Herbert Song:
Exploring the Frontiers of Firmware Fuzzing: μAFL's Application on Cortex M4 and Unix Programs. 1141-1148 - Ahmed Dammak, Yaser Al Mtawa:
Enhancing Reliability in Smart Agriculture: Detecting Failures and Anomalies in Irrigation System. 1149-1154 - Mario Bou Abboud, Oumaya Baala, Maroua Drissi, Sylvain Allio:
Unsupervised Learning Approach for Network Traffic Classification. 1155-1160 - Srijeet Qazi, Kedir Mamo Besher, Mohammed Zamshed Ali:
Security for Underground Utility Data Transmission in IoT Sensor Networks. 1161-1165 - Sicong Liu, Younan Mou, Hong Zhang:
Block-Sparse Learning Enabled Approach Towards Efficient Channel Estimation for Underwater Visible Light Communications. 1166-1170 - Sicong Liu, Younan Mou, Hong Zhang:
Sparsity-Aware Channel Estimation for Underwater Acoustic Wireless Networks: A Generative Adversarial Network Enabled Approach. 1171-1176 - Harrison Kurunathan, Kai Li, Wei Ni, Na Li, Eduardo Tovar, Mohsen Guizani:
Exploring LSTM-assisted A2C For Physical Layer Security in Vehicular Cyber-Physical Systems. 1177-1182 - Intissar Krimi, Sofiane Ben Mbarek, Fethi Choubani:
Power Transmission Assessment for Body Channel Communication. 1183-1188 - Muhammad Hanif Lashari, Wafa Batayneh, Ashfaq Khokhar:
Enhancing Precision in Tactile Internet-Enabled Remote Robotic Surgery: Kalman Filter Approach. 1189-1196 - Sadia Yeasmin, Anwar Haque:
DDoS Attack Prevention in Autonomous Vehicle's OTA Updates: Combining PBFT Consensus and Distributed Firewall in Hyperledger Fabric Blockchain. 1197-1202 - Muhammad Ibrar, Hayla Nahom Abishu, Abegaz Mohammed Seid, Sergio Márquez Sánchez, Javier Hernandez Fernandez, Juan Manuel Corchado, Aiman Erbad:
Survey on Demand Response in the Landscape of Adaptive and Intelligent Building Energy Management Systems. 1203-1209 - Hayla Nahom Abishu, Abegaz Mohammed Seid, Sergio Márquez Sánchez, Javier Hernandez Fernandez, Juan Manuel Corchado, Aiman Erbad:
Multi-Agent DRL-based Multi-Objective Demand Response Optimization for Real-Time Energy Management in Smart Homes. 1210-1217 - Christopher Dentremont, Hong Liu:
Deep Learning Dataset Generation for Physical Layer Authentication in Wireless Sensor Networks (WSN). 1218-1223 - Sanica Kamble, Cristina Hava Muntean, Anderson Augusto Simiscuka:
A Hybrid HSV and YCrCb OpenCV-based Skin Tone Recognition Mechanism for Makeup Recommender Systems. 1224-1229 - Nasim Ravi, Marília Curado, Edmundo Monteiro:
Dynamic Switching Access in Massive Machine Type Communication. 1230-1235 - Defeng Zhou, Shimin Gong, Lanhua Li, Bo Gu, Mohsen Guizani:
Deep Reinforcement Learning for IRS-assisted Secure NOMA Transmissions Against Eavesdroppers. 1236-1241 - Yongqiang Huang, Ruiqi Li, Zhijun Wu, Meng Yue:
Data Source Authentication Protocol for Aviation Broadband Communication System. 1242-1247 - Ameni Sassi, Junior Tonga, Stéphanie Poaty, Sanon Steve, Djibrine Idriss Abakar Adjid, Moukhtar Cherif, Wael Ouarda:
AfriDial: African Dialect Model based on Deep Learning for Sentiment Analysis. 1248-1254 - Sobhi Mejjaouli, Sanabel Alnourani, Malek Almobarek, Sghaier Guizani:
Optimization Approaches for the Optimal Placement of Electrical Charging Stations. 1255-1262 - Fadhila Tlili, Samiha Ayed, Lamia Chaari Fourati:
Towards a Responsive Security Operations Center for UAVs. 1263-1268 - Kodjo E. F. Tossou, Sid Lamrous, Tchamye Boroze, Oumaya Baala:
Optimizing QoS of the LTE network using a machine-learning-based spatio-temporal distribution and Tabu search metaheuristic. 1269-1274 - Elias Benamira, Fatiha Merazka, Gunes Karabulut Kurt:
Outage Probability in Network Coding Based Cooperative Wireless Networks over Nakagami-m Fading Channels. 1275-1282 - Jiawen Guo, Haipeng Yao, Wenji He, Tianle Mai, Tianhao Ouyang, Fu Wang:
Reinforcement Learning-Based Genetic Algorithm for Differentiated Traffic Scheduling in Industrial TSN-5G Networks. 1283-1289 - Houda Hafi, Bouziane Brik, Miloud Bagaa, Adlen Ksentini:
Impact of Neural Network Depth on Split Federated Learning Performance in Low-Resource UAV Networks. 1290-1295 - Fatema El Husseini, Hassan N. Noura, Flavien Vernier:
Machine-Learning-Based Smart Energy Management Systems: A Review. 1296-1302 - Mohamed Mouhiha, Omar Ait Oualhaj, Abdelfettah Mabrouk:
Enhancing Movie Recommendations: A Deep Neural Network Approach with MovieLens Case Study. 1303-1308 - Nouha Samet, Asma Ben Letaifa, Mohamed Hamdi, Sami Tabbane:
Adaptive cloud-based mobile video streaming service using real-time QoE estimation. 1309-1314 - Dongbo Geng, Zhongxiang Wei, Haiyong Zeng:
Beyond Holographic Hybrid Precoding: New Role of Downlink Multiuser Interference. 1315-1319 - Bayan Mahfood, Ayad Turky, Manar Abu Talib, Chaouki Ghenai:
Deep Learning Model for Energy Consumption Prediction and Carbon Emission Estimation. 1320-1326 - Ines Damak, Ridha Bouallegue:
Downlink Coverage Probability in Aerial Base Station. 1327-1332 - Farah Farid Babar, Faisal Jamil, Tariq Alsboui, Faiza Fareed Babar, Shabir Ahmad, Reem Ibrahim Alkanhel:
Federated Active Learning with Transfer Learning: Empowering Edge Intelligence for Enhanced Lung Cancer Diagnosis. 1333-1338 - Muhammad Ibrar, Aamir Akbar, Nadir Shah, Aiman Erbad, Kamran Ali:
LRS2: Improved Link Recovery in Software-Defined Networks with Stacked Generalization Ensemble. 1339-1344 - Muhammad Absaruddin, Saim Ghafoor, Mubashir Husain Rehmani:
Beamwidth Trade-offs Analysis of THz MAC Protocols for Wireless Data Center. 1345-1350 - Mohammad Ali Nemer, Joseph Azar, Abdallah Makhoul, Julien Bourgeois:
Leveraging AI for Enhanced Semantic Interoperability in IoT: Insights from NER Models. 1351-1357 - Kunpeng Cao, Guobing Jiang, Leyi Zhang:
An Improved Risk Assessment Scheme Balancing Safety and Security. 1358-1363 - Xiping Li, Wei Dong, Yi Sun, Shaolong Chen, Detong Kong, Shujie Yang:
Stealthy Adversarial Attacks on Intrusion Detection Systems: A Functionality-Preserving Approach. 1364-1369 - Charles Montes, Todd Morehouse, Ruolin Zhou:
Class-Incremental Learning for Baseband Modulation Classification: A Comparison. 1370-1375 - Kerima Saleh Abakar, Ismail Bennis, Abdelhafid Abouaissa, Pascal Lorenz:
A Hidden Parameter Study for Traffic-oriented LoRaWAN Deployment. 1376-1381 - Sajal Saha, Sudipto Baral, Anwar Haque:
Optimizing Internet Traffic Predictions with a Novel Deep Learning EMD-KNN Framework. 1382-1387 - Yufan Yuan, Jianzhang Liu, Chenhao Hong, Guangjie Han, Fengzhong Qu, Yan Wei, Shaojian Yang:
An Air-Sea-Ground Integrated Observation System Based on Ad Hoc Network for the Archipelagic Environment. 1388-1393 - Arwa Amaira, Koubaa Hend, Faouzi Zarai:
Handover Management in a Sliced 5G Network Using Deep Reinforcement Learning. 1394-1399 - Zafer Karadayi, Mehmet Özdem, Ismail Burak Karaceylan, Zeynep Yagmur Duman:
Establishing the Future of Work and Collaboration through Institutional Metaverse. 1400-1403 - Nessrine Trabelsi, Rihab Maaloul, Lamia Chaari Fourati, Wael Jaafar:
Deep Reinforcement Learning for Sleep Control in 5G and Beyond Radio Access Networks: An Overview. 1404-1411 - Khadidja Zairi, Bouziane Brik, Younes Guellouma, Hadda Cherroun:
Deep Learning-Driven Resource Allocation for MEC-Enabled UAV Collision Avoidance System. 1412-1417 - Gaith Rjoub, Saidul Islam, Jamal Bentahar, Mohammed Amin Almaiah, Rana Al-Rawashdeh:
Enhancing IoT Intelligence: A Transformer-based Reinforcement Learning Methodology. 1418-1423 - Asadullah Tariq, Farag M. Sallabi, Mohamed Adel Serhani, Ezedin Barka:
A Trust and Data Quality-Based Dynamic Node Selection and Aggregation Optimization in Federated Learning. 1424-1430 - Chamseddine Oueslati, Nabil Dakhli, Mondher Labidi:
5G MIMO Antenna Design for Aerial Base Stations. 1431-1436 - Najoua Benalaya, Ichrak Amdouni, Cédric Adjih, Anis Laouiti, Leïla Azouz Saïdane:
Deep Reinforcement Learning Approach for UAV Search Path Planning In Discrete Time and Space. 1437-1442 - Lanxin He, Zheng Wang, Yongming Huang:
A Massive MIMO Sampling Detection Strategy Based on Denoising Diffusion Model. 1443-1448 - Dahina Koulougli, Kim Khoa Nguyen, Mohamed Cheriet:
Dynamic FlexEthernet Defragmentation Under Time-Varying Traffic in Multi-layer Multi-domain Networks. 1449-1454 - Yuanli Ma, Qiqiang Chen, Bin Yan, Zheng Wang, Lanxin He:
Efficient Joint Hybrid Precoding And Analog Combining Scheme For Massive MIMO Systems. 1455-1459 - Cheng Li, Pei-Yuan Lai, Yu-Xuan Zhou, Chang-Dong Wang:
Temporal Hierarchical Graph Attention Network for Traffic Prediction with Prompt Learning. 1460-1465 - Manuele Favero, Chiara Schiavo, Lavinia Verzotto, Alessandro Buratto, Thomas Marchioro, Leonardo Badia:
Strategic Cooperation in the Metaverse: A Game Theory Analysis with Age Of Information. 1466-1471 - Zhipu Xie, Bin Yang, Jinchao Huang, Huiying Zhao, Lexi Xu, Yue Wang, Xin Wang, Ruiqi Liu:
Locating the Root Cause of Poor Coverage in Mobile Communication Networks Based on Spatio-temporal Graph Message Propagation. 1472-1477 - Nour-El-Houda Yellas, Éric Renault, Selma Boumerdassi:
Grubbs Test Based Algorithms to Improve the Efficiency of Blockchain Oracles. 1478-1482 - Saad El Jaouhari, Shaikh Ahmed:
CTIoT: A Cyber Threat Intelligence Tool for IoT. 1483-1489 - Godlove Suila Kuaban, Tadeusz Czachórski, Erol Gelenbe, Piotr Pecka, Valery Nkemeni, Piotr Czekalski:
Energy performance of Internet of Things (IoT) networks for pipeline monitoring. 1490-1497 - Hrant Khachatrian, Rafayel Mkrtchyan, Theofanis P. Raptis:
Outdoor Environment Reconstruction with Deep Learning on Radio Propagation Paths. 1498-1503 - Muhammad Kamran Saeed, Ashfaq Khokhar, Shakil Ahmed:
Pilot Contamination in Massive MIMO Systems: Challenges and Future Prospects. 1504-1509 - Mohamad Abdulkadir, Saeed Alketbi, Hanane Lamaazi, Rashed Altamimi, Saeed Alblooshi, Abderrahmane Lakas:
Vault-PMS: A Vault-Based Password Management System for Secure Offline Data Storage. 1510-1515 - Jad Bassil, Hassan N. Noura, Ola Salman, Khaled Chahine, Mohsen Guizani:
Deep Learning Image Classification Models for Solar Panels Dust Detection. 1516-1521 - Zaid Allal, Hassan Noura, Ola Salman, Flavien Vernier:
Predicting Power Consumption Using Machine Learning Techniques. 1522-1527 - Meriem Arbaoui, Mohamed-el-Amine Brahmia, Abdellatif Rahmoun, Mourad Zghal:
Optimizing Shapley Value for Client Valuation in Federated Learning through Enhanced GTG-Shapley. 1528-1533 - Jean-Paul A. Yaacoub, Hassan N. Noura, Joseph Azar, Ola Salman, Khaled Chahine:
Cybersecurity in Smart Renewable Energy Systems. 1534-1540 - Insaf Rzig, Wael Jafaar, Maha Jebalia, Sami Tabbane:
Dependency-Aware Task Offloading in Cooperative UAV-HAPS-Assisted Vehicular Networks. 1541-1546 - Mojtaba Mahdavi:
Design and Implementation of Recursive Filters using Processing In Memory. 1547-1552 - Rania Jadlaoui, Wided Hadj Alouane, Hatem Boujemaa:
Performance Analysis of Multi-Source Two-way NOMA-AF Relaying Networks. 1553-1557 - Mohammed Jouhari, Mohsen Guizani:
Lightweight CNN-BiLSTM based Intrusion Detection Systems for Resource-Constrained IoT Devices. 1558-1563 - Abdelhak Hidouri, Haifa Touati, Mohamed Hadded, Nasreddine Hajlaoui, Paul Muhlethaler, Samia Bouzefrane:
Improving NDN Resilience: A Novel Mitigation Mechanism Against Cache Pollution Attack. 1564-1569 - Marcel A. Vieira, Hong Liu:
Defense against Black Hole Attacks in Wireless Sensor Network with Anomaly Report Cycling. 1570-1576 - Youngmin Lee, Xiaomin Ma, Andrew S. I. D. Lang, Enrique F. Valderrama-Araya, Andrew L. Chapuis:
Deep Learning based Modeling of Wireless Communication Channel with Fading. 1577-1582 - Amira Henaien, Hadda Ben Elhadj, Lamia Chaari Fourati:
TinyML enabled smart parking dynamic slots computing and license plate recognition. 1583-1588 - Arwa Amaira, Koubaa Hend, Faouzi Zarai:
Performance Study in Heterogeneous Vehicular Networks Using Dual Connectivity and Deep Reinforcement Learning. 1589-1594 - Avleen Malhi, Mohammad Naiseh, Kunal Jangra:
Real-time Twitter data sentiment analysis to predict the recession in the UK using Graph Neural Networks. 1595-1600 - Mohamed El Amine Ameur, Habiba Drias, Bouziane Brik, Mazene Ameur:
Leveraging Transfer Learning with Federated DRL for Autonomous Vehicles Platooning. 1601-1606 - Oluwatobi Baiyekusi, Haitham Mahmoud, De Mi, Junaid Arshad, Femi Adeyemi-Ejeye, Haeyoung Lee:
An ML-based Spectrum Sharing Technique for Time-Sensitive Applications in Industrial Scenarios. 1607-1612 - Mona Alghamdi, Atm Shafiul Alam, Arumugam Nallanathan, Asma Cherif:
Dynamic Clustering-based Task Orchestrator in Mobile Edge Computing. 1613-1618 - Harir Razzazi, Qingli Zeng, Farid Naït-Abdesselam:
An Enhanced Online K-Means Algorithm for Flooding Attacks Detection in Vehicular Networks. 1619-1624 - Jin Feng Lin, Todd Morehouse, Charles Montes, Erika Caushi, Artem Dudko, Eric Savage, Ruolin Zhou:
A Study of Angle of Arrival Estimation of a RF Signal with FPGA Acceleration. 1625-1630 - SeyedMohammad Kashani, Syed Mujtaba Haid Sherazi, Ashfaq Khokhar, Sang Wu Kim, Farid Naït-Abdesselam:
Radio Frequency Fingerprinting in WBANs Using Complex-Valued Convolutional Neural Networks. 1631-1636 - Anderson Augusto Simiscuka, Abid Yaqoob, Gabriel-Miro Muntean:
Utility-Based Multipath Delivery of Prioritized XR Content in a Machine Learning and Network Slicing-enhanced Environment. 1637-1642 - Deemah H. Tashman, Soumaya Cherkaoui:
Securing Next-Generation Networks against Eavesdroppers: FL-Enabled DRL Approach. 1643-1648 - V. Rasagna, G. Geethakumari, Jinil Bhavin Shah, Nisarg Chaudhari:
Task Integrity Checker: A Block Chain - Enabled Trust Management System for Fog Nodes. 1649-1654 - Justin Chigu, Ahmed El-Mahdy, Bassem Mokhtar, Maha Elsabrouty:
A Low-Latency Edge-Cloud Serverless Computing Framework with a Multi-Armed Bandit Scheduler. 1655-1660 - Ahmed Bali, Mohamed Cheriet, Abdelouahed Gherbi:
Enhancing Traffic Load Forecasting in 5G Networks: A Statistical and Temporal Feature Engineering Approach. 1661-1667 - Jiajia Chen, Ao Peng:
PHD Filter-Based Spatial-Temporal Calibration of 5G Base Stations for Urban Canyon Localization. 1668-1673 - Bryce Afonso, Hong Liu:
Wireless Sensing for Structural Health Monitoring of Bridges by Unmanned Aerial Vehicle (UAV) via BLE Communication. 1674-1678 - Xinhua Liu, Ruonan Zhang, Daosen Zhai, Yi Jiang, Xiao Tang, Bin Li, Haotong Cao:
A 3-D Geometrical-Based Stochastic Model for Satellite-to-Ground MIMO Channels. 1679-1684 - Panagiotis Charatsaris, Matthew Salcido, Maria Diamanti, Abid Mohammad Ali, Eirini-Eleni Tsiropoulou, Symeon Papavassiliou:
AGORA: A Multi-Provider Edge Computing Resource Management and Pricing Framework. 1685-1690 - Haoran Xie, Yafeng Zhan, Xin Fang:
Resource Allocation for Satellite Communication Network of Emergency Communications in Distribution Network. 1691-1696 - Alaa Ghabi, Zakariyya Alatoom, Mohsen Guizani, Habib Hamam:
Peer-to-Peer Energy Optimization in V2X Using Reinforcement Learning. 1697-1704 - Zahid Khan, Nauman Khan, Anis Koubaa, Adel Ben Mnaouer, Wadii Boulila:
SDN-Enabled Cluster-based Evolving Graph Routing Scheme (SE-CEGRS). 1705-1711 - Khaled Chahine, Asmaa AlSafran, Ghadeer Alattar, Mariam Alozairi, Shaikhah AlRefaei:
Fault Classification on Power Transmission Lines Using DC Component Extraction. 1712-1715 - Afshan Ahmed, Muhammad Ibrar, Muhammad Munwar Iqbal, Aiman Erbad, Sohail Jabbar:
Real-time Emergency Message Dissemination in IoV: A Cluster-based Approach with SDN and Fog Computing. 1716-1722 - Mojtaba Mahdavi:
Low-Complexity Mean Calculation Schemes Using In Memory Computing. 1723-1728 - Imasha Bandara, Oluyomi Simpson, Yichuang Sun:
Optimizing Efficiency Using a Low-Cost RFID-Based Inventory Management System. 1729-1733 - Yassmine Ben Dhiab, Mohamed Ould-Elhassen Aoueileyine, Manel Abdelkader, Ridha Bouallegue:
Edge-Based Human Activity Recognition: A Novel Approach Using Spectral Analysis and Deep Learning. 1734-1739 - Jie Chen, Shuai Yang, Tse-Tin Chan, Haoyuan Pan:
SemFusion: Multi-Source Semantic Information Fusion and Communication. 1740-1745 - Abdelhafid Dahhani, Hubert Kenfack Ngankam, Sylvain Giroux, Ilham Alloui, Sébastien Monnet, Flavien Vernier:
Ontology Alignment: First Step towards Voice Control for Smart-Home Assistive Scenarios. 1746-1752 - Mostafa Hussien, Ahmed A. Abdelmoaty, Mahmoud Elsaadany, Mohammed F. A. Ahmed, Ghyslain Gagnon, Mohamed Cheriet:
Temporal-correlation Modeling for Improved CFO Estimation: The BiModule CFO Estimation (BMCE) Framework. 1753-1758 - Fatma Ellouze, Ghofrane Fersi, Mohamed Jmaiel:
Lightweight WEB3 interface for secure IoMT-Blockchain integration. 1759-1766 - Ala Gouissem, Zina Chkirbene, Tamer Khattab, M. Mabrok, M. Abdallah, Ridha Hamila:
Refine and Identify: An Accelerated Iterative Algorithm for Securing Federated Learning. 1767-1772 - Abdelaziz Amara Korba, Souad Sebaa, Malik Mabrouki, Yacine Ghamri-Doudane, Karima Benatchba:
A Life-long Learning Intrusion Detection System for 6G-Enabled IoV. 1773-1778 - Abdelaziz Amara Korba, Aleddine Diaf, Yacine Ghamri-Doudane:
AI-Driven Fast and Early Detection of IoT Botnet Threats: A Comprehensive Network Traffic Analysis Approach. 1779-1784 - Ibrahim Shaer, Abdallah Shami:
Thwarting Cybersecurity Attacks with Explainable Concept Drift. 1785-1790 - Rafik Louati, Mariem Thaalbi, Nabil Tabbane:
An Adaptive Data Rate scheme for multi-hop forwarding in LoRaWAN networks. 1791-1796 - Bayrem Zarai, Leïla Nasraoui, Rihab Boussada, Saadi Boudjit:
6G-enabled Situation-Aware ML-assisted UTM (6G-SAMU). 1797-1802 - Wentao Cai, Baoxian Zhang, Yan Yan, Cheng Li:
An Efficient Elastic Scaling, Service Deployment, and Task Allocation Algorithm for Mobile Edge Computing. 1803-1808 - Chuangxin Jiang, Junchen Liu, Junpeng Lou, Ruiqi Liu, Qi Yang, Xinhui Wang:
A Novel Approach to Model the Scattering Environment in Channel Modeling for Integrated Sensing and Communications. 1809-1813 - Pedro Henrique Rodrigues Emerick, Silvio Costa Sampaio, Bruno Lopes Dalmazo, Andre Riker, Augusto José Venâncio Neto, Roger Immich:
Enhancing Privacy in Healthcare: A Multilevel Approach to (Pseudo)Anonymization. 1814-1819 - Zeyad Abdelhay, Ahmed Refaey:
xG Security: Zero-Trust and Moving Target Defense in Decentralized Learning Environment. 1820-1825 - Hossameldin Ouda, Abdelrahman Elewah, Khalid Elgazzar:
A Comparative Analysis of Data Models for Heterogeneous Sensor Data Management. 1826-1833
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.