


default search action
20th IWCMC 2024: Ayia Napa, Cyprus
- International Wireless Communications and Mobile Computing, IWCMC 2024, Ayia Napa, Cyprus, May 27-31, 2024. IEEE 2024, ISBN 979-8-3503-6126-1

- Khawla Saif Almazrouei

, Khawla A. Alnajjar:
Error-correcting Codes in Communication Systems. 1-6 - Zhen Li, Jialong Gong, Dong Wang:

Conflict Management based on Deep Reinforcement Learning for Edge Computing in Intent-Driven Networks. 1-5 - Amani Benamor, Oussama Habachi, Jean-Pierre Cances, Vahid Meghdadi:

Physical Layer Security Meets Privacy Requirements for Downlink NOMA. 1-6 - Yufei Long, Qimiao Zeng, Yirong Zhuang, Qing Pan, Han Xiao:

An Innovative Task Offloading Algorithm Based on Deep Reinforcement Learning in Computation Resource Network. 1-7 - Jimena Andrade-Hoz, José M. Alcaraz Calero

, Qi Wang:
Handling Imbalanced 5G and Beyond Network Tabular Data Using Conditional Generative Models. 7-12 - Yingjuan Shi, Maode Ma:

ECCIA: An Identity Authentication Scheme against IFAs in NDNs. 13-18 - Zuting Chen, Shuai Han, Peng Yu, Chenyu Wu:

A Res-GRU Based Decoder for Polar Codes. 19-24 - Sara Kassan, Bechir Mnakri, Thierry Nagellen, Frédéric Guyard, Tamara Tosic:

Signal quality detection in mobile network based on synthetic vehicle location data generation using generative adversial neural networks. 25-30 - Mahdi Barhoush, Ahmad Ayad, Mohammad Kohankhaki, Anke Schmeink:

Communication-efficient Decentralised Federated Learning via Low Huffman-coded Delta Quantization Scheme. 31-36 - Haijun Meng, Huimin Lu:

A Survey of Deep Learning Technology in Visual SLAM. 37-42 - Liangfan Shi, Huimin Lu:

Comprehensive Review of End-to-End Video Compression. 43-48 - Hanxue Fu, Huimin Lu:

A Review of Multimodal Sentiment Analysis: Modal Fusion and Representation. 49-54 - Xuan Huang:

Mobility Management Approach for Co-Orbital Regenerated LEO Satellites. 55-60 - Naomi Kirimi, Chadi Barakat, Yassine Hadjadj-Aoul:

Passive network monitoring and troubleshooting from within the browser: a data-driven approach. 61-66 - Yogi Patel, Rajesh Gupta

, Riya Kakkar, Sudeep Tanwar, Mohsen Guizani:
Blockchain and DL-based Brain Tumour Prediction Scheme for Telesurgery Systems in Healthcare 4.0. 67-72 - Qiuyue Gao, Jinyan Li, Junli Xue, Yanxia Xing:

An enhanced quality of service mechanism based on the two-way negotiation procedure. 73-77 - Ronghao Ma, Jianhong Zhou, Maode Ma:

A Blockchain-assisted Group Handover Authentication Protocol for 5G Wireless Networks. 78-83 - Ying Dong, Yafeng Zhan, Haoran Xie:

Deep Learning Based Fault Diagnosis Methods for Satellite Power System. 84-89 - Ali Riahi, Aiman Erbad, Abdelaziz Bouras, Amr Mohamed:

RL-Based Incentive Cooperative Data Learning Framework Over Blockchain in Healthcare Applications (RL-ICDL-BC). 90-96 - Nikolaos Prodromos, Damianos Diasakos, Vasileios Kokkinos

, Apostolos Gkamas, Christos Bouras, Philippos Pouyioutas:
Dynamic Bandwidth Allocation in MIMO 5G Networks. 97-102 - Zhijun Wu, Pei Xu, Haoyu Fan:

Network Security Situation Assessment Method Based Eigenvector Centrality. 103-108 - Weikang Yang, Jianing Zhao, Shaoxuan Xue, Xin Wang, Xuenan Ni:

A New Radio Frequency Fingerprint Identification Method Based on CEEMDAN. 109-113 - Julio Diez-Tomillo

, José M. Alcaraz Calero
, Qi Wang:
Edge-Accelerated UAV Operations: A Case Study of Open Source Solutions. 114-119 - Alexander Seng

, Ulrich Trick
, Armin Lehmann
, Bogdan Ghita:
Network Slice Placement in Wireless Mesh Networks. 120-125 - Maroua Drissi

, Sylvain Allio:
End-to-End Spatio-temporal Latency Prediction for Vehicular Applications. 126-131 - Ali El Attar, Rida Khatoun, Fadlallah Chbib, Ahmad Fadlallah

, Ahmed Serhrouchni:
DNS flooding attack detection scheme through Machine Learning. 132-137 - Sinan Yavuz, Edwin Naroska, Kai Daniel

:
Implementation of a Symmetric Double Arbiter Physical Unclonable Function and Evaluation the Impact of Temperature Influences using PYNQ-Z1 Board. 138-143 - Thabet Kacem

, Sourou Tossou:
ADS-B Replay Attack Detection using Transformers. 144-149 - Parisa Eslami, Houbing Song:

Stability Analysis of Deep Neural Networks under Adversarial Attacks and Noise Perturbations. 150-155 - Muhammad Rehan Yasin, Hassan Jamil Syed, Junaid Shuja

:
An Efficient Approach for Tampering Attack Detection in WSN Using Blockchain. 156-161 - Yiyang Xiong, Cheng Li, Shilei Dong, Fangning Shi, Haoming Zhang:

Enhancing IoT Traffic Detection via Attention Mechanisms Derived from Matrix Eigenvalues and Eigenvectors within Transformer Architectures*. 162-167 - Hongba Bao, Hui Wang, Yiying Sun, Sheng Pan:

An Improved Grey Wolf Optimizer for Task Scheduling in D2D-Assisted MEC Systems. 168-173 - Yiyang Xiong, Shilei Dong, Fangning Shi, Haoming Zhang:

Advancing IoT Anomalous Traffic Detection through Arithmetic Coding in Transformer-Based Architectures. 174-179 - Henry Alexander Ignatious, Hesham El-Sayed:

Usecase-based generic framework for data fusion and decision making in Autonomous Driving. 180-185 - Andreas Andreou, Constandinos X. Mavromoustakis, Jordi Mongay Batalla, Evangelos Markakis

, Athina Bourdena
, George Mastorakis, Houbing Song:
Enhancing Secure Communication in 6G-Enabled IoV through UAV and Control Center Integration. 186-191 - Andreas Andreou, Constandinos X. Mavromoustakis, Jordi Mongay Batalla, Evangelos Markakis

, Athina Bourdena
, George Mastorakis, Houbing Song:
Enhancing UAV Network Efficiency through 6G+ Enabled Federated Learning Algorithms and Energy optimization Techniques. 192-197 - Xuenan Ni, Jianing Zhao, Xinping Xia, Xiaoying Zhang, Jianyi Zhou, Weikang Yang:

Power Allocation and User Pairing Based Beam Reuse in a NOMA System. 198-203 - Yidi Xie, Chen Zhang, Gang Du:

Resource Management Based on Resource Parameters in Computing Networks. 204-207 - Jintong Cai

, Huimin Lu:
NeRF-based Multi-View Synthesis Techniques: A Survey. 208-213 - Chan Dai Truyen Thai:

Opportunistic Routing and Energy Harvesting in Multi-tier Networks against Jamming Attacks. 214-219 - Nema Ahmed, Somaya Al-Máadeed:

Enhancing Post-Disaster Survivor Detection Using UAV Imagery and Transfer Learning Strategies. 220-225 - Vasu Mistry, Binod Vaidya

, Hussein T. Mouftah:
Evaluation of LSTM GAN for Trajectory Prediction in Connected and Autonomous Vehicles. 226-231 - Elif Ak, Berk Canberk

, Vishal Sharma, Octavia A. Dobre, Trung Q. Duong:
What-if Analysis Framework for Digital Twins in 6G Wireless Network Management. 232-237 - Palwasha Waheed Shaikh

, Hussein T. Mouftah:
Intelligent DWC Reservation and Trip Planning of CAEV and UAV for 6G ITS. 238-243 - Xingyu Yuan

, He Li, Kaoru Ota, Mianxiong Dong:
Generative Inference of Large Language Models in Edge Computing: An Energy Efficient Approach. 244-249 - Zeyuan Guo, Changjun Ren

, Lin Yan
, Shujie Yang, Yi Sun:
A Hierarchical PoW-Powered Access Mechanism for Shuffling-Based Moving Target Defense System. 250-255 - Ivo Müürsepp, Aleksei Fjodorov, Muhammad Mahtab Alam:

Non-Line of Sight Detection Based on 5G Signal Strength- and Quality Measurements and its impact on mobile positioning accuracy. 256-261 - Yuchao Zheng, Xiu Chen, Yujie Li:

Efficient 3D Object Recognition for Unadjusted Bin Picking Automation. 262-268 - Yuqing Chai:

Advanced Techniques in Adaptive Beamforming for Enhanced DOA Estimation. 269-273 - Zhirong Zhang:

Massive MIMO technology: a key advancement in shaping communication networks for the 5G/5G+ era. 274-278 - Zhirong Zhang:

Spectrum Sharing Technologies in the 5G Era: Innovative Applications and Challenges in the FDD Band. 279-284 - Zhirong Zhang:

Research and Application of Multi-Access Collaboration Technology in 6G Networks. 285-290 - Bingxin Wang, Dan Tu, Jie Wang:

Actor-Critic Deep RL for Vehicular Edge Computing Optimization. 291-295 - Bingxin Wang, Dan Tu, Jie Wang:

Cost-Efficient Computation Offloading in VEC Using Deep Reinforcement Learning Techniques. 296-300 - Chemsedine Bchir, Moayad Aloqaily, Fakhri Karray, Mohsen Guizani:

Advancing Fairness in Microgrid Energy Transaction: An Alternative Approach. 301-308 - Bingxin Wang, Dan Tu, Jie Wang:

Balancing Energy Consumption and Latency in Vehicle Edge Computing for 6G Networks. 309-314 - Xiaoyin Zhao, Xueqi Yuan:

Impact Assessment of IAB and Small 5G Stations on Railway Network Communications. 315-320 - Sinda Besrour, Gael S. Mubibya, Zikuan Liu, Jalal Almhana:

Context-Aware Hard and Slow Fall Detection. 321-326 - Fenil Ramoliya, Rajesh Gupta

, Krisha Darji, Chinmay Trivedi
, Riya Kakkar, Sudeep Tanwar, Mohsen Guizani:
A Green IoT-Integrated AI-Based EV Scheduling Scheme for Efficient Charging Station Selection. 327-332 - Xijian Xu

, Jun Wu:
Bridging Economic Model and Blockchain: ZKP Empowered Privacy Preserving Payment Channel with Intermediary Pricing. 333-338 - Shuai Han, Zhiqiang Li, Cheng Li:

Adaptive Grouping Access Based on Rate-Splitting Multiple Access for Multibeam Satellite System. 339-344 - Bin Jiang, Yining Wang, Fanhui Kong, Xuerong Cui, Shibao Li, Jian Wang:

UAV Path Planning for Aviation Optimazition Based on Doubly Decoupled Reinforced Network. 345-350 - Xiaoyin Zhao, Lei Liu:

Evaluating Interference Impact on On-board Small Station Systems in Railway Networks. 351-356 - Xiaoyin Zhao, Xi Meng, Bingxin Wang:

Advancing Railway Systems with Next-Generation 5G Connectivity. 357-362 - Aakash, Saksham Mittal, Mohammad Wazid, Amit Kumar Mishra, Ashok Kumar Das, Sachin Shetty, Mohsen Guizani:

EM-PAD: An Effective Mechanism for Phishing Attack Detection. 363-368 - Mohammed Laroui, Hatem Ibn-Khedher, Nathalie Banoun:

Fog computing-empowered smart systems for latency-sensitive control applications. 369-374 - Yupeng Du, Zhenglei Huang

, Shujie Yang, Han Xiao:
Collaborative Task Offloading Based on Deep Reinforcement Learning in Heterogeneous Edge Networks. 375-380 - Jing Jia, Heng Wang, Xu Xia, Dong Wang:

Mobility management in 5G and 6G satellite access networks. 381-385 - Pedro Horchulhack, Eduardo K. Viegas, Altair O. Santin, João A. Simioni:

Network-based Intrusion Detection Through Image-based CNN and Transfer Learning. 386-391 - Konstantinos Gus Nikolaos Amouris:

Flat, Gateway-free, Infinite MANET Architecture with Variable Cell Size Cellular Barrage Relay Networks, and Geographic-Based Hazy Link State Routing. 392-399 - Huiying Zhao, Hongwu Li, Bin Wu, Ruiqi Liu, Lexi Xu, Bingming Huang, Zhipu Xie, Xinzhou Cheng:

Cross-Layer Alarm Association Rules Discovery of Cloud-Network based on Knowledge Graph. 400-405 - Lei Liu:

Analysis and Optimization: interference study of 900MHz NR system to NB-IoT system. 406-412 - Lei Liu, Xi Meng:

Interference compatibility study and interference management for 5G and Broadband TDD Private Networks. 413-420 - Lei Liu, Xiaoyin Zhao:

Interference Analysis between 1800MHz NR System and Meteorological Satellites System Using ITU-R Model. 421-427 - Rahul Mishra

, Pritam Anand:
On Demand Reliability in the Internet of Things Enabled Sensors Networks. 428-432 - Tao Xu, Xuanli Wu, Ziyi Xie:

Analysis of Physical Layer Security Based on WFRFT with Multiple Eavesdroppers. 433-438 - Jana Koteich, Nathalie Mitton:

Dataset Collection of Multi-Communication Technologies Monitored in Different Mobility Contexts. 439-444 - Floribert Katembo Vuseghesa

, Mohamed-Lamine Messai, Fadila Bentayeb:
Node Compromising Detection to Mitigate Poisoning Attacks in IoT Networks. 445-450 - Yanxia Xing, Jianfeng Zhou, Pengyu Li, Menghan Yu:

Research on Key Technologies of 6G Network Architecture. 451-455 - Zexu Li, Zhen Li, Xiong Xiong, Dongjie Liu:

Cross-Domain AI Towards 6G: Requirements, Solution, and Validation. 456-460 - Yuquan Xiao, Qinghe Du, Chen Lu, Yizhuo Wang:

Secure Status Updates for Internet of Drones: A Deep Q-Learning-Based Antenna Selection Approach. 461-466 - Mohamed Khadmaoui-Bichouna, José M. Alcaraz Calero

, Qi Wang:
5G RAN service classification using Long Short Term Memory Neural Network. 467-472 - Guangyao Liu, Tianqi Mao, Ruiqi Liu, Zhenyu Xiao:

Pre-Chirp-Domain Index Modulation for Affine Frequency Division Multiplexing. 473-478 - Yuquan Xiao, Zixiao Zhao:

Ultra-Reliable and Low-Latency UAV Communications in High-Mobility Environments. 479-483 - Aamir Latif, Osama Elgarhy, Yannick Le Moullec, Muhammad Mahtab Alam:

Energy Consumption Evaluation of NOMA-based Sustainable Scheduling in 6G O-RAN. 484-489 - Hanyi Li, Yang Huang, Runhe Wang, Miaomiao Dong:

Dynamic Resource Scheduling for Air-Ground Collaborative Communication: A Hierarchical Multi-Agent Method for Metaverse. 490-495 - Fan Zhang, Tianqi Mao, Ruiqi Liu, Leyi Zhang, Dezhi Zheng, Tengfei Wang, Zhaocheng Wang:

Multicarrier Waveform Design for mmWave/THz Integrated Sensing and Communication. 501-506 - Meng-Hsuan Lin, Shun-Ren Yang, Hsin-Yin Chiang, Chu-Chun Chang, Phone Lin

:
A Kubernetes-Powered Personalized Federated Learning Platform for Resource-Constrained Internet of Medical Things. 507-512 - Khoa Nguyen, Wei Shi, Marc St-Hilaire:

Online Resource Allocation in Internet of Vehicles Using Topology Attribute-Aware Genetic Algorithm. 513-518 - Shijiao Zhang, Guomei Zhang, Yezhao Shi, Lei Lu, Jiaoxian Yin:

Dynamic Interference Source Tracking Based on Motion State Decomposition. 519-524 - Hongyu Gu, Xinyue Qi, Liang Sun, Yang Zhang:

Semantic Knowledge Consensus for Multi-agent Collaboration: A Naming Game Approach. 525-530 - Hongyang Du, Guangyuan Liu, Yijing Lin, Dusit Niyato, Jiawen Kang, Zehui Xiong

, Dong In Kim
:
Mixture of Experts for Intelligent Networks: A Large Language Model-enabled Approach. 531-536 - Zhongxiang Wei, Jingjing Wang

, Christos Masouros, Tongyang Xu, Jianrui Chen, Ang Li:
Sub-Block Level Interference Exploitation Precoding in Satellite Communications. 537-542 - Zain Ul Abideen Tariq, Emna Baccour, Aiman Erbad, Mounir Hamdi:

Reinforcement Learning-based anti-Jamming Solution for Aerial RIS-aided Dense Dynamic Multi-User Environments. 543-548 - Chen Zhang, Zhenyu Xiao, Lingfeng Zhang, Guangyao Liu, Wei Zhang, Xiang-Gen Xia:

Collaborative Multi-Agent Jamming Deceiving for UAV-assisted Wireless Communications. 549-554 - Hina Nasir, Syed Ali Raza Zaidi, Ian D. Robertson:

Link Quality Analysis for Buried Pipeline Monitoring using LoRa. 555-560 - Hao Chen, Shuyi Chen, Chenguang He, Hongrui Li:

A Scalable Semantic Communication System Based on Meta-Learning. 561-566 - Yuhan Wang, Zhuo Zou, Xiaoming Hu, Zhongxue Gan, Lizheng Liu:

Robust Robot Formation Control Based on Streaming Communication and Leader-Follower Approach. 567-572 - Pengyu Cui, Xusheng Qian, Xiuyong Zhang, Wei Wang, Chao Yang, Nan Zhang, Yuxiao Liu, Ao Xiong:

A Cross Domain Authentication Scheme Based on Blockchain. 573-579 - Jiahong Xu, Miao Hu, Qinglin Zhao, Di Wu:

EASR: Enabling Neural-Enhanced Video Streaming on Mobile Devices with Edge Assistance. 580-585 - Suhua Tang, Sadao Obana:

Combining AF-based Relay and Multiantenna for Over-the-Air Computation. 586-591 - Chengrun Yang, Gangqiang Zhou, Miao Hu, Qinglin Zhao, Di Wu:

CoarseUCB: A Context-Aware Bitrate Adaptation Algorithm for VBR-encoded Video Streaming. 592-597 - Jian Li, Xingguang Wei, Min Ren, Chunli Liang, Xing Liu, Xianghui Han, Ruiqi Liu, Xinhui Wang:

A Novel Block Diagonalization Based Beam Nulling Method in Dynamic TDD Systems. 598-603 - Zixing Zhao, Baoxian Zhang, Chen Liu, Zheng Yao, Cheng Li:

A Task Bundling based Multi-Platform Cooperation Mechanism for Mobile Crowdsensing. 604-609 - Yi-Yu Chen, Hui-Nien Hung, Shun-Ren Yang, Chia-Cheng Yen, Phone Lin

:
On Poisoning Attacks and Defenses for LSTM Time Series Prediction Models: Speed Prediction as an Example. 610-615 - Aurélien Chambon

, Abderrahim Sahli, Abderrezak Rachedi, Ahmed Mebarki:
Analyzing the Integration of 3D Building Digital Twins in Optimal IoT Networks Deployment. 616-621 - Ziwei Wan, Zhen Gao, Fabien Héliot, Yu Su, Zhonghuai Wu, Lei Chen, Qu Luo, Pei Xiao:

Orthogonal Chirp Division Multiplexing Waveform Design for 6G mmWave UAV Integrated Sensing and Communication. 622-627 - Vijay Karnatak, Neha Tripathi

, Amit Kumar Mishra, Mohammad Wazid, Ashok Kumar Das, Mohsen Guizani, Sachin Shetty:
AKM-FCCI: Secure Authentication and Key Management Mechanism for Fog Computing-Based IoT-Driven Critical Infrastructure. 628-633 - Jiacheng Lu, Chao Zhang, Mingyang Wang, Shihan Chen, Hongming Zhang:

Photon-Counting-Based Ultraviolet Communication System with Self Bit Synchronization Module. 634-638 - Jiayue Liu, Tianqi Mao, Yicheng Huang, Dongxuan He:

An Action Recognition Algorithm Based on Two-Stream Deep Learning for Metaverse Applications. 639-642 - Yi Hu, Shuai Han, Shiji Wang, Cheng Li:

A Deployment Method to Improve the Generalizability of Recurrent Neural Network. 643-648 - Shuai Han, Sen Meng, Shiji Wang, Weixiao Meng, Cheng Li:

Sparse Channel Estimation utilizing Optimal Wiener-Hopf Filtering in MIMO-OTFS Paradigm. 649-654 - Reem Tluli, Somaya Al-Máadeed:

Pose Estimation of Physiotherapy Exercises using ML Techniques. 655-661 - Zixuan Liang, Xinchen Lyu, Chenshan Ren, Na Li, Kai Li:

Communication-Efficient Topology Orchestration for Distributed Learning in UAV Networks. 662-667 - Dan Tu, Bingxin Wang, Lei Liu:

Automatic Recognition of FM Signals Based on FFT Spectrum Analysis. 668-672 - Xiaoxuan Peng

, Litao Yan, Yi Zhong, Tao Han, Qiang Li, Xiaohu Ge:
Temperature-based evaluation and optimization of multi-processor mobile computing. 673-678 - Saloua Hendaoui, Fatma Hendaoui:

Synergistic Solution: IDS and Scheduler Harmony for Secure 5G Radio Resources. 679-684 - Jiana Liao, Jinbo Wen, Jiawen Kang, Yang Zhang, Jianbo Du, Qihao Li, Weiting Zhang, Dong Yang:

Optimizing Information Propagation for Blockchain-empowered Mobile AIGC: A Graph Attention Network Approach. 685-690 - Shree Chand Khichar, Awaneesh Kumar Yadav, Manoj Misra, Brij B. Gupta:

An Enhanced Authentication Protocol for IoT-AmI Environment. 691-696 - Bashaer Al-Rowaili, Noor Al-Obaidli, Dana Al-Marri, Khalid Abualsaud, Elias Yaacoub:

Fall Detection Wristband with Optimized Security and Health Monitoring. 697-702 - Xu Xia:

6G Satellite Communication: Key Technologies, Challenges and Trends. 703-705 - Xiu Chen, Yujie Li, Huimin Lu:

Few-Shot Object Detection Algorithm Based on Geometric Prior and Attention RPN. 706-711 - Everton de Matos, Willian Tessaro Lunardi

, Jouni Ukkonen, Tero Salminen:
An seL4-based Trusted Execution Environment on RISC-V. 712-717 - Kacper Kamieniarz, Wojciech Mazurczyk:

A Comparative Study on the Security of Kubernetes Deployments. 718-723 - Hongming Zhang

, Xi Meng, Yiran Xian, Pengpeng Li:
A Link Adaptive Approach for Federated Learning aided UAV Networks. 724-728 - Hajar Rezzouqi, Assia Naja, Nada Sbihi, Mounir Ghogho:

Traffic Counts-based Origin-Destination Matrix Estimation using a Traffic Simulator and Machine Learning. 729-734 - Hajar Rezzouqi, Assia Naja, Nada Sbihi, Houda Benbrahim, Mounir Ghogho:

A Comparison of Temporal and Spatio-Temporal Methods for Short-Term Traffic Flow Prediction. 735-741 - Yang Huang, Yuqi Hou, Qiuming Zhu

, Xiaomin Chen, Lei Chen:
Towards the Metaverse: Distributed Radio Map Reconstruction based on Federated Learning Generative Adversarial Networks. 742-747 - Muhammad Anwar Shahid, Arunita Jaekel, Ning Zhang, Tim Allsopp:

DoS Attack Detection in VANET using Transfer Learning Approach for BSM Data. 748-753 - Mohammad A. Massad

, Abdallah Y. Alma'aitah, Hossam S. Hassanein
:
STEBS: Spatio-Temporal Entropy-Based Scoring Handover Model for LEO Satellite. 761-767 - Chongju Mai, Anwar Haque:

MavSec: A safer version of MavLink. 768-773 - Samhita Kuili, Burak Kantarci, Marcel Chenier, Melike Erol-Kantarci, Bernard Herscovici:

Domain adaptive deep semi-supervised transfer learning for anomaly detection in OpenWiFi. 774-779 - Xinxin Zhang, Xin Zhang:

Graph Neural Network Based Resource Allocation for Full-duplex Device-to-Device Communication. 780-785 - Shuyue Ai, Yuna Jiang, Qiang Li, Xiaohu Ge, Aduwati Sali:

Decentralized Spectrum Sharing Networks Based on Blockchains. 786-791 - Haitao Zhao, Ying Liu, Qin Wang, Haotong Cao, Wenchao Xia, Hongbo Zhu:

Joint Optimization of User Association, UAV Placement, and Power Allocation in UAV-Satellite-Assisted Cell-Free mMIMO Systems. 792-797 - Ibrahim Sammour

, Gérard Chalhoub, Oussama Habachi:
Intelligent CSMA/CA for Wi-Fi networks. 798-803 - Patrick Purucker, Christian Reil, Alfred Höß, Björn W. Schuller:

Deep Neural Quality of Service Prediction for Unmanned Aircraft System Communications. 804-810 - Shuki Zanyovka

, Asaf Shabtai:
Simultaneous Transmission and Null Space Tracking Using Interference Feedback for Spatial Division Multiple Access. 811-817 - Farooque Hassan Kumbhar, Raza Nathani, Kamran Ali Memon

, Wessam Mesbah:
Rule Based Maliciousness Detection in Computer Network using Machine Learning in Fog Node. 818-823 - Saeif Alhazbi, Ahmed Hussain

, Savio Sciancalepore
, Gabriele Oligeri, Panos Papadimitratos
:
Radio Frequency Fingerprinting via Deep Learning: Challenges and Opportunities. 824-829 - Hongwei Zhang

, Marzia Zaman, Achin Jain, Srinivas Sampalli:
A Hybrid Machine Learning Intrusion Detection System for Wireless Sensor Networks. 830-835 - Qingtian Wang, Siyu Chen, Jiaying Zong, Beining Feng, Yunfei Shen, Xu Xia:

Resource Allocation in LEO Satellites assisted Terrestrial Network for Latency-Sensitive Task. 836-841 - Rui Freitas, Maria João Nicolau

, António Costa
:
Detection and positioning of vulnerable road users in vehicular networks. 842-848 - Ahmed Rafik El-Mehdi Baahmed

, Jean-François Dollinger, Mohamed-el-Amine Brahmia
, Mourad Zghal
:
Hyperparameter Impact on Computational Efficiency in Federated Edge Learning. 849-854 - Simon Pichot, Vania Conan

, Hicham Khalifé, André-Luc Beylot, Gentian Jakllari:
Routing Edge-Cloud Requests via Multi-Objective Reinforcement Learning. 861-866 - Romeo Giuliano, Anna Maria Vegni, Valeria Loscrí, Eros Innocenti, Alessandro Vizzarri

, Franco Mazzenga:
A Cooperative C-V2X System with UAV-aided Enhanced Connectivity. 867-872 - Faten Ziadi, Hend Fourati, Leïla Azouz Saïdane:

AI and IoT Uses, Challenges and Opportunities for e-Health: a review. 873-878 - Fatima Chahal, Hacène Fouchal, Dominique Gaïti:

Proximity Marketing: A Diverse Classification Approach. 879-884 - Audrey Terracher, Rémy Kocik, Rédha Hamouche, Abderrezak Rachedi, Tarik Bourouina

:
Model-Based Approach for Efficient Data Exploitation Process in IoT Systems. 885-890 - Omar Ait Oualhaj, Ali Azougaghe

, Assia Naja, Abdelfettah Mabrouk:
Towards Efficient Urban Network Mobility: A Cloud-Based Ride-Sharing System. 891-896 - Jeffrey Redondo

, Zhenhui Yuan, Nauman Aslam, Juan Zhang
:
Cross-layer Adaptable Contention Window for High-definition Map QoS Enhancement. 897-902 - Boutheina Ben Ismail, Mohamed Hamroun

, Bassem Ben Salah, Hedi Sakli:
Improving Response Prediction: Transformer Integration and Optimizer Evaluation. 903-908 - Seyedeh Bahereh Hassanpour, Ahmad Khonsari, Masoumeh Moradian, Aresh Dadlani

, Galymzhan Nauryzbayev:
Age-Aware Edge Caching and Multicast Scheduling Using Deep Reinforcement Learning. 909-914 - Lukasz Pietraszek

, Wojciech Mazurczyk:
A Research Environment for Evaluating File-based Cryptojacking Detection Techniques. 915-920 - Chenguang He, Yuchuan Ma, Shouming Wei, Jian Zhang:

Research on Adaptive Self-Interference Cancellation and Sensing Methods in ISAC System. 921-926 - Man Ru, Yafeng Zhan, Fang Xin:

The optimization of Networked TT&C System for Mega LEO Constellation. 927-932 - Chenguang He, Bohan Zhang, Shouming Wei:

Design of Base Station Sleeping Scheme in Heterogeneous Cellular Networks Based on User Traffic and SINR. 933-938 - Intissar Krimi

, Sofiane Ben Mbarek, Fethi Choubani:
Investigations on Wireless communication Transmission for Wireless Health Monitoring. 939-943 - Petros Stylianou, Elio Faddoul, Ioannis Krikidis:

Experimental Analysis of Chirp Waveforms for Wireless Power Transfer. 944-948 - Bouchra Fakher

, Mohamed-el-Amine Brahmia
, Mustafa Al Samara
, Ismail Bennis
, Abdelhafid Abouaissa:
FedLbs: Federated Learning Loss-Based Swapping Approach for Energy Building's Load Forecasting. 949-954 - Srija Venkata Sai Ravali Kothapalli, Cristina Hava Muntean, Abid Yaqoob:

Advanced Deep Learning Framework for Improved Wildfire Detection and Aerosol Identification Using Active Satellite Imagery. 955-960 - Hassan N. Noura

, Khalil Hariss:
An Efficient and Secure Federated Learning Communication Framework. 961-968 - Joseph Azar, Hassan N. Noura

, Raphaël Couturier:
Lightweight Image Crypto-Compression Using Haar Transform and Selective Encryption for Grayscale IoT Images. 969-974 - Pingping Lin:

Technical Analysis of Non-terrestrial Networks. 975-979 - Reem Tluli, Ahmed Badawy, Saeed Salem, Mohamed Hardan, Sailesh Chauhan, Guillaume Alinier:

A Dynamic Redeployment System for Mobile Ambulances in Qatar, Empowered by Deep Reinforcement Learning. 980-985 - Joel Puga, Armando André Fontainhas, António Costa

, Alexandre J. T. Santos, Maria João Nicolau
, Filipe Meneses:
Leveraging V2P communications to improve the VRU's safety. 986-992 - Maroua Moatemri, Hamdi Eltaief, Habib Youssef:

Enhancing Security in Multi-Controller SDMN Environments: A Novel 5G Access Authentication Protocol. 993-998 - Ambono M. Kple, Deepak G. C.

, Bhaskar Prasad Rimal:
Holochain-Based Secure and Energy Efficient IoT Network. 999-1004 - Muhammad Ali Akbar, Jeong-A Lee

, Amine Bermak
:
Comparative Analysis of Fault-Localization Techniques in Adder. 1005-1009 - Amira Henaien

, Hadda Ben Elhadj, Lamia Chaari Fourati:
RFID IoT Architecture for Smart Inventory Management: Security Integration. 1010-1015 - Khouloud Gharsalli, Thierry Le Pors

, Sameh Najeh, Pierre-Jean Bouvet, Hichem Besbes:
Nash Bargaining Game for Cooperative Resource Allocation in Underwater Acoustic Communication. 1016-1021 - Ola Salman, Hassan N. Noura

, Ali Chehab:
SERS: Secure & Efficient Random and Symbol Linear Network Coding Schemes. 1022-1029 - Radhia Khdhir, Salwa Othmen, Aymen Belghith, Jamilah Alamri:

Breast Cancer Segmentation in Mammograms using Antlion Optimization and CNN/GRU Architectures. 1030-1035 - Yongtao Wei, Siqi Wang

, Farid Naït-Abdesselam, Aziz Benlarbi-Delaï:
The Influence of Temporal Dependency on Training Algorithms for Spiking Neural Networks. 1036-1041 - Rima Boughariou, Hend Marouane

, Mohamed Mosbah, Hassene Mnif
, Amel Meddeb-Makhlouf:
Efficient IoV-Based Geofencing Model for V2X Communication Using Energy Saving Approach. 1042-1047 - Jianzhao Liu, Yang Liu, Junxiong Zhang, Xiaohu Ge, Aibo Xu, Mingming Zhao:

A Bayesian Optimization Algorithm to Improve the Spatial Reuse in the Next-Generation WLANs. 1048-1053 - Abdelmounaim Bouroudi, Abdelkader Outtagarts, Yassine Hadjadj-Aoul:

Multi-Domain Scaling Algorithm with Inter-Orchestrator Communication for Beyond 5G/6G Networks. 1054-1061 - Francesco Colosimo, Floriano De Rango:

Byzantine-Robust Federated Learning Based on Dynamic Gradient Filtering. 1062-1067 - Tanmay Badageri, Bechir Hamdaoui, Rami Langar:

Load-Balanced Multipath Routing Through Software-Defined Networking. 1068-1073 - Vittorio Bertolini, Fabio Corti, Ermanno Cardelli:

Effects of Misalignment on Output Voltage Stability in SS Controlled Wireless Power Transfer Systems with Different Control Strategies. 1074-1079 - Ben Schneider, Björn Richerzhagen, Michael Bahr, Georg Carle:

Scheduled Trigger Frames: Enabling Worst-case Latency Bounds for Wi-Fi Industrial Use. 1080-1085 - Sean Ernest Clyde Nodado, Aniel James Villamor:

Gesture-based notification system for Paralytics. 1086-1093 - Muhammad Asif, Júlio Chilela, Driss Benhaddou

, Ji Chen:
Vertical Network Slicing and its Impact on 5G Data Traffic and Performance. 1094-1099 - Murat Arda Onsu, Pankti Shah, Murat Simsek, Mark Fobert, Burak Kantarci:

Real-Time Binary Cell Phone Usage Detection and Classification on Vehicular Edge Devices. 1100-1105 - Mehdi Salim Benhelal, Badii Jouaber, Hossam Afifi, Hassine Moungla:

SiamFLTP: Siamese Networks Empowered Federated Learning for Trajectory Prediction. 1106-1111 - Okba Ben Atia, Mustafa Al Samara

, Ismail Bennis
, Jaafar Gaber, Abdelhafid Abouaissa, Pascal Lorenz:
ERD-FL: Entropy-Driven Robust Defense for Federated Learning. 1112-1117 - Aline Abboud, Mohamed-el-Amine Brahmia

, Abdelhafid Abouaissa, Ahmad Shahin, Rocks Mazraani:
Empowering Energy Consumption Forecasting in Smart Buildings: Towards a Hybrid Loss Function. 1118-1123 - Di Wu:

Scaled Conjugate Gradient Digital Cancellation Algorithm Study for 6G Full Duplex Wireless Communication System. 1124-1128 - Youssef Keryakos, Youssef Bou Issa, Michel Salomon

, Abdallah Makhoul:
Introducing the Concept of a Hybrid Navigation System Adapted to Blind Users for Optimal Stress-free Indoor and Outdoor Mobility. 1129-1134 - Sinda Besrour, Yogesh Surapaneni, Gael S. Mubibya, Fahim Ashkar, Jalal Almhana:

A Transformer-Based Approach for Better Hand Gesture Recognition. 1135-1140 - Safayat Bin Hakim, Muhammad Adil, Jordi Mongay Batalla, Constandinos X. Mavromoustakis, Houbing Herbert Song:

Exploring the Frontiers of Firmware Fuzzing: μAFL's Application on Cortex M4 and Unix Programs. 1141-1148 - Ahmed Dammak, Yaser Al Mtawa:

Enhancing Reliability in Smart Agriculture: Detecting Failures and Anomalies in Irrigation System. 1149-1154 - Mario Bou Abboud, Oumaya Baala

, Maroua Drissi
, Sylvain Allio:
Unsupervised Learning Approach for Network Traffic Classification. 1155-1160 - Srijeet Qazi, Kedir Mamo Besher, Mohammed Zamshed Ali:

Security for Underground Utility Data Transmission in IoT Sensor Networks. 1161-1165 - Sicong Liu, Younan Mou, Hong Zhang:

Block-Sparse Learning Enabled Approach Towards Efficient Channel Estimation for Underwater Visible Light Communications. 1166-1170 - Sicong Liu, Younan Mou, Hong Zhang:

Sparsity-Aware Channel Estimation for Underwater Acoustic Wireless Networks: A Generative Adversarial Network Enabled Approach. 1171-1176 - Harrison Kurunathan, Kai Li, Wei Ni, Na Li, Eduardo Tovar, Mohsen Guizani:

Exploring LSTM-assisted A2C For Physical Layer Security in Vehicular Cyber-Physical Systems. 1177-1182 - Intissar Krimi

, Sofiane Ben Mbarek, Fethi Choubani:
Power Transmission Assessment for Body Channel Communication. 1183-1188 - Muhammad Hanif Lashari, Wafa Batayneh, Ashfaq Khokhar:

Enhancing Precision in Tactile Internet-Enabled Remote Robotic Surgery: Kalman Filter Approach. 1189-1196 - Sadia Yeasmin, Anwar Haque:

DDoS Attack Prevention in Autonomous Vehicle's OTA Updates: Combining PBFT Consensus and Distributed Firewall in Hyperledger Fabric Blockchain. 1197-1202 - Muhammad Ibrar, Hayla Nahom Abishu

, Abegaz Mohammed Seid, Sergio Márquez Sánchez, Javier Hernandez Fernandez, Juan Manuel Corchado, Aiman Erbad:
Survey on Demand Response in the Landscape of Adaptive and Intelligent Building Energy Management Systems. 1203-1209 - Hayla Nahom Abishu

, Abegaz Mohammed Seid, Sergio Márquez Sánchez, Javier Hernandez Fernandez, Juan Manuel Corchado, Aiman Erbad:
Multi-Agent DRL-based Multi-Objective Demand Response Optimization for Real-Time Energy Management in Smart Homes. 1210-1217 - Christopher Dentremont, Hong Liu:

Deep Learning Dataset Generation for Physical Layer Authentication in Wireless Sensor Networks (WSN). 1218-1223 - Sanica Kamble, Cristina Hava Muntean, Anderson Augusto Simiscuka

:
A Hybrid HSV and YCrCb OpenCV-based Skin Tone Recognition Mechanism for Makeup Recommender Systems. 1224-1229 - Nasim Ravi

, Marília Curado, Edmundo Monteiro:
Dynamic Switching Access in Massive Machine Type Communication. 1230-1235 - Defeng Zhou

, Shimin Gong, Lanhua Li, Bo Gu, Mohsen Guizani:
Deep Reinforcement Learning for IRS-assisted Secure NOMA Transmissions Against Eavesdroppers. 1236-1241 - Yongqiang Huang, Ruiqi Li, Zhijun Wu, Meng Yue:

Data Source Authentication Protocol for Aviation Broadband Communication System. 1242-1247 - Ameni Sassi, Junior Tonga, Stéphanie Poaty, Sanon Steve, Djibrine Idriss Abakar Adjid, Moukhtar Cherif, Wael Ouarda:

AfriDial: African Dialect Model based on Deep Learning for Sentiment Analysis. 1248-1254 - Sobhi Mejjaouli

, Sanabel Alnourani, Malek Almobarek, Sghaier Guizani
:
Optimization Approaches for the Optimal Placement of Electrical Charging Stations. 1255-1262 - Fadhila Tlili, Samiha Ayed, Lamia Chaari Fourati:

Towards a Responsive Security Operations Center for UAVs. 1263-1268 - Kodjo E. F. Tossou, Sid Lamrous, Tchamye Boroze, Oumaya Baala

:
Optimizing QoS of the LTE network using a machine-learning-based spatio-temporal distribution and Tabu search metaheuristic. 1269-1274 - Elias Benamira, Fatiha Merazka, Gunes Karabulut Kurt:

Outage Probability in Network Coding Based Cooperative Wireless Networks over Nakagami-m Fading Channels. 1275-1282 - Jiawen Guo, Haipeng Yao, Wenji He, Tianle Mai, Tianhao Ouyang, Fu Wang:

Reinforcement Learning-Based Genetic Algorithm for Differentiated Traffic Scheduling in Industrial TSN-5G Networks. 1283-1289 - Houda Hafi, Bouziane Brik, Miloud Bagaa, Adlen Ksentini:

Impact of Neural Network Depth on Split Federated Learning Performance in Low-Resource UAV Networks. 1290-1295 - Fatema El Husseini, Hassan N. Noura

, Flavien Vernier:
Machine-Learning-Based Smart Energy Management Systems: A Review. 1296-1302 - Mohamed Mouhiha

, Omar Ait Oualhaj, Abdelfettah Mabrouk:
Enhancing Movie Recommendations: A Deep Neural Network Approach with MovieLens Case Study. 1303-1308 - Nouha Samet, Asma Ben Letaifa, Mohamed Hamdi, Sami Tabbane:

Adaptive cloud-based mobile video streaming service using real-time QoE estimation. 1309-1314 - Dongbo Geng, Zhongxiang Wei, Haiyong Zeng:

Beyond Holographic Hybrid Precoding: New Role of Downlink Multiuser Interference. 1315-1319 - Bayan Mahfood, Ayad Turky, Manar Abu Talib, Chaouki Ghenai:

Deep Learning Model for Energy Consumption Prediction and Carbon Emission Estimation. 1320-1326 - Ines Damak

, Ridha Bouallegue
:
Downlink Coverage Probability in Aerial Base Station. 1327-1332 - Farah Farid Babar, Faisal Jamil, Tariq Alsboui, Faiza Fareed Babar, Shabir Ahmad, Reem Ibrahim Alkanhel:

Federated Active Learning with Transfer Learning: Empowering Edge Intelligence for Enhanced Lung Cancer Diagnosis. 1333-1338 - Muhammad Ibrar, Aamir Akbar, Nadir Shah, Aiman Erbad, Kamran Ali:

LRS2: Improved Link Recovery in Software-Defined Networks with Stacked Generalization Ensemble. 1339-1344 - Muhammad Absaruddin

, Saim Ghafoor
, Mubashir Husain Rehmani:
Beamwidth Trade-offs Analysis of THz MAC Protocols for Wireless Data Center. 1345-1350 - Mohammad Ali Nemer, Joseph Azar, Abdallah Makhoul, Julien Bourgeois:

Leveraging AI for Enhanced Semantic Interoperability in IoT: Insights from NER Models. 1351-1357 - Kunpeng Cao, Guobing Jiang, Leyi Zhang:

An Improved Risk Assessment Scheme Balancing Safety and Security. 1358-1363 - Xiping Li

, Wei Dong, Yi Sun, Shaolong Chen, Detong Kong, Shujie Yang:
Stealthy Adversarial Attacks on Intrusion Detection Systems: A Functionality-Preserving Approach. 1364-1369 - Charles Montes, Todd Morehouse, Ruolin Zhou:

Class-Incremental Learning for Baseband Modulation Classification: A Comparison. 1370-1375 - Kerima Saleh Abakar, Ismail Bennis

, Abdelhafid Abouaissa, Pascal Lorenz:
A Hidden Parameter Study for Traffic-oriented LoRaWAN Deployment. 1376-1381 - Sajal Saha, Sudipto Baral, Anwar Haque:

Optimizing Internet Traffic Predictions with a Novel Deep Learning EMD-KNN Framework. 1382-1387 - Yufan Yuan

, Jianzhang Liu, Chenhao Hong, Guangjie Han, Fengzhong Qu, Yan Wei, Shaojian Yang:
An Air-Sea-Ground Integrated Observation System Based on Ad Hoc Network for the Archipelagic Environment. 1388-1393 - Arwa Amaira, Koubaa Hend, Faouzi Zarai:

Handover Management in a Sliced 5G Network Using Deep Reinforcement Learning. 1394-1399 - Zafer Karadayi, Mehmet Özdem

, Ismail Burak Karaceylan, Zeynep Yagmur Duman:
Establishing the Future of Work and Collaboration through Institutional Metaverse. 1400-1403 - Nessrine Trabelsi, Rihab Maaloul, Lamia Chaari Fourati, Wael Jaafar:

Deep Reinforcement Learning for Sleep Control in 5G and Beyond Radio Access Networks: An Overview. 1404-1411 - Khadidja Zairi

, Bouziane Brik, Younes Guellouma
, Hadda Cherroun:
Deep Learning-Driven Resource Allocation for MEC-Enabled UAV Collision Avoidance System. 1412-1417 - Gaith Rjoub, Saidul Islam, Jamal Bentahar, Mohammed Amin Almaiah, Rana Al-Rawashdeh:

Enhancing IoT Intelligence: A Transformer-based Reinforcement Learning Methodology. 1418-1423 - Asadullah Tariq

, Farag M. Sallabi, Mohamed Adel Serhani, Ezedin Barka:
A Trust and Data Quality-Based Dynamic Node Selection and Aggregation Optimization in Federated Learning. 1424-1430 - Chamseddine Oueslati

, Nabil Dakhli, Mondher Labidi:
5G MIMO Antenna Design for Aerial Base Stations. 1431-1436 - Najoua Benalaya, Ichrak Amdouni

, Cédric Adjih, Anis Laouiti, Leïla Azouz Saïdane:
Deep Reinforcement Learning Approach for UAV Search Path Planning In Discrete Time and Space. 1437-1442 - Lanxin He, Zheng Wang, Yongming Huang:

A Massive MIMO Sampling Detection Strategy Based on Denoising Diffusion Model. 1443-1448 - Dahina Koulougli, Kim Khoa Nguyen, Mohamed Cheriet:

Dynamic FlexEthernet Defragmentation Under Time-Varying Traffic in Multi-layer Multi-domain Networks. 1449-1454 - Yuanli Ma, Qiqiang Chen

, Bin Yan
, Zheng Wang, Lanxin He:
Efficient Joint Hybrid Precoding And Analog Combining Scheme For Massive MIMO Systems. 1455-1459 - Cheng Li, Pei-Yuan Lai, Yu-Xuan Zhou, Chang-Dong Wang:

Temporal Hierarchical Graph Attention Network for Traffic Prediction with Prompt Learning. 1460-1465 - Manuele Favero

, Chiara Schiavo, Lavinia Verzotto, Alessandro Buratto
, Thomas Marchioro, Leonardo Badia
:
Strategic Cooperation in the Metaverse: A Game Theory Analysis with Age Of Information. 1466-1471 - Zhipu Xie, Bin Yang, Jinchao Huang, Huiying Zhao, Lexi Xu, Yue Wang, Xin Wang, Ruiqi Liu:

Locating the Root Cause of Poor Coverage in Mobile Communication Networks Based on Spatio-temporal Graph Message Propagation. 1472-1477 - Nour-El-Houda Yellas, Éric Renault, Selma Boumerdassi:

Grubbs Test Based Algorithms to Improve the Efficiency of Blockchain Oracles. 1478-1482 - Saad El Jaouhari, Shaikh Ahmed:

CTIoT: A Cyber Threat Intelligence Tool for IoT. 1483-1489 - Godlove Suila Kuaban, Tadeusz Czachórski, Erol Gelenbe, Piotr Pecka, Valery Nkemeni, Piotr Czekalski:

Energy performance of Internet of Things (IoT) networks for pipeline monitoring. 1490-1497 - Hrant Khachatrian

, Rafayel Mkrtchyan, Theofanis P. Raptis
:
Outdoor Environment Reconstruction with Deep Learning on Radio Propagation Paths. 1498-1503 - Muhammad Kamran Saeed

, Ashfaq Khokhar, Shakil Ahmed:
Pilot Contamination in Massive MIMO Systems: Challenges and Future Prospects. 1504-1509 - Mohamad Abdulkadir

, Saeed Alketbi
, Hanane Lamaazi
, Rashed Altamimi, Saeed Alblooshi
, Abderrahmane Lakas
:
Vault-PMS: A Vault-Based Password Management System for Secure Offline Data Storage. 1510-1515 - Jad Bassil, Hassan N. Noura

, Ola Salman, Khaled Chahine
, Mohsen Guizani:
Deep Learning Image Classification Models for Solar Panels Dust Detection. 1516-1521 - Zaid Allal

, Hassan Noura
, Ola Salman, Flavien Vernier:
Predicting Power Consumption Using Machine Learning Techniques. 1522-1527 - Meriem Arbaoui

, Mohamed-el-Amine Brahmia
, Abdellatif Rahmoun, Mourad Zghal
:
Optimizing Shapley Value for Client Valuation in Federated Learning through Enhanced GTG-Shapley. 1528-1533 - Jean-Paul A. Yaacoub, Hassan N. Noura

, Joseph Azar, Ola Salman, Khaled Chahine
:
Cybersecurity in Smart Renewable Energy Systems. 1534-1540 - Insaf Rzig, Wael Jafaar, Maha Jebalia, Sami Tabbane:

Dependency-Aware Task Offloading in Cooperative UAV-HAPS-Assisted Vehicular Networks. 1541-1546 - Mojtaba Mahdavi:

Design and Implementation of Recursive Filters using Processing In Memory. 1547-1552 - Rania Jadlaoui, Wided Hadj Alouane

, Hatem Boujemaa:
Performance Analysis of Multi-Source Two-way NOMA-AF Relaying Networks. 1553-1557 - Mohammed Jouhari, Mohsen Guizani:

Lightweight CNN-BiLSTM based Intrusion Detection Systems for Resource-Constrained IoT Devices. 1558-1563 - Abdelhak Hidouri

, Haifa Touati
, Mohamed Hadded, Nasreddine Hajlaoui, Paul Muhlethaler, Samia Bouzefrane:
Improving NDN Resilience: A Novel Mitigation Mechanism Against Cache Pollution Attack. 1564-1569 - Marcel A. Vieira, Hong Liu:

Defense against Black Hole Attacks in Wireless Sensor Network with Anomaly Report Cycling. 1570-1576 - Youngmin Lee, Xiaomin Ma, Andrew S. I. D. Lang, Enrique F. Valderrama-Araya

, Andrew L. Chapuis:
Deep Learning based Modeling of Wireless Communication Channel with Fading. 1577-1582 - Amira Henaien

, Hadda Ben Elhadj, Lamia Chaari Fourati:
TinyML enabled smart parking dynamic slots computing and license plate recognition. 1583-1588 - Arwa Amaira, Koubaa Hend, Faouzi Zarai:

Performance Study in Heterogeneous Vehicular Networks Using Dual Connectivity and Deep Reinforcement Learning. 1589-1594 - Avleen Malhi, Mohammad Naiseh, Kunal Jangra:

Real-time Twitter data sentiment analysis to predict the recession in the UK using Graph Neural Networks. 1595-1600 - Mohamed El Amine Ameur

, Habiba Drias, Bouziane Brik, Mazene Ameur:
Leveraging Transfer Learning with Federated DRL for Autonomous Vehicles Platooning. 1601-1606 - Oluwatobi Baiyekusi, Haitham Mahmoud, De Mi, Junaid Arshad, Femi Adeyemi-Ejeye, Haeyoung Lee

:
An ML-based Spectrum Sharing Technique for Time-Sensitive Applications in Industrial Scenarios. 1607-1612 - Mona Alghamdi

, Atm Shafiul Alam, Arumugam Nallanathan, Asma Cherif:
Dynamic Clustering-based Task Orchestrator in Mobile Edge Computing. 1613-1618 - Harir Razzazi, Qingli Zeng

, Farid Naït-Abdesselam:
An Enhanced Online K-Means Algorithm for Flooding Attacks Detection in Vehicular Networks. 1619-1624 - Jin Feng Lin, Todd Morehouse, Charles Montes, Erika Caushi, Artem Dudko, Eric Noah Savage, Ruolin Zhou:

A Study of Angle of Arrival Estimation of a RF Signal with FPGA Acceleration. 1625-1630 - SeyedMohammad Kashani

, Syed Mujtaba Haid Sherazi, Ashfaq Khokhar, Sang Wu Kim, Farid Naït-Abdesselam:
Radio Frequency Fingerprinting in WBANs Using Complex-Valued Convolutional Neural Networks. 1631-1636 - Anderson Augusto Simiscuka

, Abid Yaqoob, Gabriel-Miro Muntean:
Utility-Based Multipath Delivery of Prioritized XR Content in a Machine Learning and Network Slicing-enhanced Environment. 1637-1642 - Deemah H. Tashman, Soumaya Cherkaoui

:
Securing Next-Generation Networks against Eavesdroppers: FL-Enabled DRL Approach. 1643-1648 - V. Rasagna, G. Geethakumari, Jinil Bhavin Shah, Nisarg Chaudhari:

Task Integrity Checker: A Block Chain - Enabled Trust Management System for Fog Nodes. 1649-1654 - Justin Chigu, Ahmed El-Mahdy, Bassem Mokhtar, Maha Elsabrouty:

A Low-Latency Edge-Cloud Serverless Computing Framework with a Multi-Armed Bandit Scheduler. 1655-1660 - Ahmed Bali, Mohamed Cheriet, Abdelouahed Gherbi:

Enhancing Traffic Load Forecasting in 5G Networks: A Statistical and Temporal Feature Engineering Approach. 1661-1667 - Jiajia Chen

, Ao Peng:
PHD Filter-Based Spatial-Temporal Calibration of 5G Base Stations for Urban Canyon Localization. 1668-1673 - Bryce Afonso, Hong Liu:

Wireless Sensing for Structural Health Monitoring of Bridges by Unmanned Aerial Vehicle (UAV) via BLE Communication. 1674-1678 - Xinhua Liu, Ruonan Zhang, Daosen Zhai, Yi Jiang, Xiao Tang, Bin Li, Haotong Cao:

A 3-D Geometrical-Based Stochastic Model for Satellite-to-Ground MIMO Channels. 1679-1684 - Panagiotis Charatsaris, Matthew Salcido, Maria Diamanti

, Abid Mohammad Ali
, Eirini-Eleni Tsiropoulou, Symeon Papavassiliou:
AGORA: A Multi-Provider Edge Computing Resource Management and Pricing Framework. 1685-1690 - Haoran Xie, Yafeng Zhan, Xin Fang:

Resource Allocation for Satellite Communication Network of Emergency Communications in Distribution Network. 1691-1696 - Alaa Ghabi, Zakariyya Alatoom, Mohsen Guizani, Habib Hamam:

Peer-to-Peer Energy Optimization in V2X Using Reinforcement Learning. 1697-1704 - Zahid Khan, Nauman Khan, Anis Koubaa, Adel Ben Mnaouer

, Wadii Boulila:
SDN-Enabled Cluster-based Evolving Graph Routing Scheme (SE-CEGRS). 1705-1711 - Khaled Chahine

, Asmaa AlSafran, Ghadeer Alattar, Mariam Alozairi, Shaikhah AlRefaei:
Fault Classification on Power Transmission Lines Using DC Component Extraction. 1712-1715 - Afshan Ahmed, Muhammad Ibrar, Muhammad Munwar Iqbal, Aiman Erbad, Sohail Jabbar:

Real-time Emergency Message Dissemination in IoV: A Cluster-based Approach with SDN and Fog Computing. 1716-1722 - Mojtaba Mahdavi:

Low-Complexity Mean Calculation Schemes Using In Memory Computing. 1723-1728 - Imasha Bandara, Oluyomi Simpson

, Yichuang Sun:
Optimizing Efficiency Using a Low-Cost RFID-Based Inventory Management System. 1729-1733 - Yassmine Ben Dhiab, Mohamed Ould-Elhassen Aoueileyine

, Manel Abdelkader, Ridha Bouallegue
:
Edge-Based Human Activity Recognition: A Novel Approach Using Spectral Analysis and Deep Learning. 1734-1739 - Jie Chen, Shuai Yang, Tse-Tin Chan

, Haoyuan Pan:
SemFusion: Multi-Source Semantic Information Fusion and Communication. 1740-1745 - Abdelhafid Dahhani, Hubert Kenfack Ngankam, Sylvain Giroux

, Ilham Alloui, Sébastien Monnet, Flavien Vernier:
Ontology Alignment: First Step towards Voice Control for Smart-Home Assistive Scenarios. 1746-1752 - Mostafa Hussien, Ahmed A. Abdelmoaty, Mahmoud Elsaadany, Mohammed F. A. Ahmed

, Ghyslain Gagnon, Mohamed Cheriet:
Temporal-correlation Modeling for Improved CFO Estimation: The BiModule CFO Estimation (BMCE) Framework. 1753-1758 - Fatma Ellouze, Ghofrane Fersi, Mohamed Jmaiel:

Lightweight WEB3 interface for secure IoMT-Blockchain integration. 1759-1766 - Ala Gouissem, Zina Chkirbene, Tamer Khattab, Mohamed Mabrok, M. Abdallah, Ridha Hamila:

Refine and Identify: An Accelerated Iterative Algorithm for Securing Federated Learning. 1767-1772 - Abdelaziz Amara Korba, Souad Sebaa, Malik Mabrouki, Yacine Ghamri-Doudane, Karima Benatchba:

A Life-long Learning Intrusion Detection System for 6G-Enabled IoV. 1773-1778 - Abdelaziz Amara Korba, Aleddine Diaf, Yacine Ghamri-Doudane:

AI-Driven Fast and Early Detection of IoT Botnet Threats: A Comprehensive Network Traffic Analysis Approach. 1779-1784 - Ibrahim Shaer, Abdallah Shami:

Thwarting Cybersecurity Attacks with Explainable Concept Drift. 1785-1790 - Rafik Louati

, Mariem Thaalbi, Nabil Tabbane:
An Adaptive Data Rate scheme for multi-hop forwarding in LoRaWAN networks. 1791-1796 - Bayrem Zarai, Leïla Nasraoui, Rihab Boussada, Saadi Boudjit:

6G-enabled Situation-Aware ML-assisted UTM (6G-SAMU). 1797-1802 - Wentao Cai, Baoxian Zhang, Yan Yan, Cheng Li:

An Efficient Elastic Scaling, Service Deployment, and Task Allocation Algorithm for Mobile Edge Computing. 1803-1808 - Chuangxin Jiang, Junchen Liu, Junpeng Lou, Ruiqi Liu, Qi Yang, Xinhui Wang:

A Novel Approach to Model the Scattering Environment in Channel Modeling for Integrated Sensing and Communications. 1809-1813 - Pedro Henrique Rodrigues Emerick, Silvio Costa Sampaio, Bruno Lopes Dalmazo

, Andre Riker, Augusto José Venâncio Neto, Roger Immich:
Enhancing Privacy in Healthcare: A Multilevel Approach to (Pseudo)Anonymization. 1814-1819 - Zeyad Abdelhay, Ahmed Refaey:

xG Security: Zero-Trust and Moving Target Defense in Decentralized Learning Environment. 1820-1825 - Hossameldin Ouda, Abdelrahman Elewah, Khalid Elgazzar:

A Comparative Analysis of Data Models for Heterogeneous Sensor Data Management. 1826-1833

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














