


default search action
21st WiMob 2025: Marrakesh, Morocco
- 21th International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob 2025, Marrakesh, Morocco, October 20-22, 2025. IEEE 2025, ISBN 979-8-3503-9281-4

- Ines Guerziz, Zakaria Abou El Houda, Long Bao Le:

Enhanced Adversarial Domain Adaptation for Intrusion Detection Systems. 1-6 - Insaf Rzig, Wael Jaafar, Maha Jebalia, Sami Tabbane:

Cooperative MEC-Enabled HAPS and UAV-RIS Assisted Task Offloading in ITS Systems. 1-6 - Youssef Laraig, Yann Ben Maissa, Sébastien Roy, Pierre-Martin Tardif, Brahim El Bhiri:

A Feature-Aware Adaptive Ensemble Framework for IoT Intrusion Detection Systems. 1-6 - Maroua Drissi:

Enhancing Vehicular Communication with Predictive Quality of Service: A Real-World Proof of Concept. 1-6 - Sana Slama, Aida Lahouij, Lazhar Hamel, Mohamed Graiet, Walid Gaaloul:

Dilated Causal CNNs for Energy Forecasting and Optimization in LoRaWAN Networks. 1-6 - August F. Valentin, Simon K. Janum, Fabian Fernando Jurado Lasso, Xenofon Fafoutis

, Charalampos Orfanidis
:
Adaptive Mobility Control in LoRaWAN via Reinforcement Learning. 1-8 - Namory Fofana, Wiem Fekih Hassen

, Asma Ben Letaifa, Abderrezak Rachedi:
Distributed Task Offloading Using Federated Reinforcement Learning in VEC. 1-7 - Riccardo Pezzoni, Antonio Boiano, Fabio Palmese, Alessandro E. C. Redondi:

Multi-Party Consensus-based Blockchain for Chain of Custody in Iot Forensic Investigations. 1-6 - Hassan Ahmad

, Awais Bin Asif, Alexander Poets, Jürgen Peissig:
MAC-Layer Protocol for Ultra-Reliable Multi-Hop Communication in DECT-2020 NR IIoT Networks. 1-8 - Kalyan Nakka, Habib M. Ammari:

Stochastic Connected $k$-Coverage in Planar Wireless Sensor Networks Using Optimal Hexagonal Tessellation. 1-6 - Tran Thanh Lam Nguyen

, Barbara Carminati, Elena Ferrari:
Detecting Privacy Non-Compliance in Wearable Apps via Knowledge Graphs and LLMs. 1-7 - Timothé Pitault, Mauro Conti, Federico Corò:

SPARKS: A Serverless Protocol for Authentication and Resilient Key Sharing in UAV Networks. 1-6 - Daniel Shalev, Tal Shapira, Yuval Shavitt:

FlowPicClip: Improving Network Traffic Classification Using Language Supervision. 1-6 - Komal Ghafoor, Furquan Rustam, Anca Delia Jurcut, Devis Bianchiniè:

SG-VAE: Explainable Semi-Generative Model for Attack Detection in IoT Healthcare Systems. 1-6 - Suvajit Lodh, Islam Obaidat, Furqan Rustam, Anca Delia Jurcut:

Lightweight Fine-Tuning of LLMS for Explainable Intrusion Detection in SDN. 1-6 - Farah-Emma Braiteh

, Francesca Bassi, Rida Khatoun:
Secure Group Key Dissemination Protocol in Cooperative Vehicular Platooning. 1-8 - David W. Starr, Habib M. Ammari:

ORCHID: Tessellation-Based Cylindrical Deployment Protocol for Energy-Efficient Coverage in Three-Dimensional Wireless Sensor Networks. 1-6 - Vincenzo Agate, Giuseppe Lo Re, Marco Morana, Antonio Virga:

Model-Agnostic Poisoning Attacks on Recommender Systems via PPO. 1-6 - Mattia Giovanni Spina, Graziano Rizzo, Floriano De Rango:

Security-Oriented Load Distribution in MQTTv5: A Token Bucket and Trust Evaluation Approach. 1-6 - Zil e Huma, Sana Ullah Jan, Jawad Ahmad, William J. Buchanan, Nikolaos Pitropakis:

Enhancing IoT Security: A Meta-Learning Approach to Adversarial Robustness. 1-6 - Pedro Henrique Wo De Alcantara, Khalil Ben Fredj

, Geert Heijenk, Yanqiu Huang
:
Evaluating Bi-Directional Connectionless BLE for Bike-To-Everything Wireless Communications. 1-7 - Boutaina Jebari

, Khalil Ibrahimi, Mounir Ghogho:
Decentralized Oracles with Threshold Signatures : A Discrete Public Goods Game Model. 1-6 - Frederic Adjewa, Moez Esseghir, Leïla Merghem-Boulahia, Cheikh Kacfah:

Unseen Attacks Identification in Intrusion Systems Using BERT and Logit Normalization. 1-6 - Khadija Lahrouni, Hayat Semlali, Guillaume Andrieux, Jean-François Diouris, Abdelilah Ghammaz:

Enhanced Detection of Intermittent Primary User Signals for Cognitive Radio-IoT Networks with Markov-Chain Modeled BPSK. 1-6 - Thibaut Rolland, Matthieu Crussière, Marie Le Bot:

A Rendez-Vous in Time: Frequency-Domain Precoding for LoS Alignment in Distributed MISO. 1-5 - Francesco Betti Sorbelli, Sajjad Ghobadi, Lorenzo Palazzetti, Cristina M. Pinotti:

Integrating Ground Communication for Extended Drone Visual Line of Sight. 1-6 - Omar Dario Delgado Brito, Floriano De Rango, Pasquale Pace:

Secure Split and Classification Mechanism for LoRa Networks Against Active and Reactive Interference Attacks. 1-6 - Oshin Daoud, Haïfa Farès, Yahia Medjahdi, Laurent Clavier, Amor Nafkha:

Inverted BER Trends for Energy-Detected GRSM-MQAM Massive MIMO Downlink. 1-7 - Kiarash Rezaei

, Omran Ayoub, Sebastian Troia, Francesco Lelli, Paolo Monti, Carlos Natalino:
Generative Explainability for Next-Generation Networks: Llm-Augmented Xai with Mutual Feature Interactions. 1-6 - Ya-Wen Chuang, Yu-Tsung Cheng, Tung-Min Yu, Ren-Chuan Chang, Hui-Hsin Chin, Der-Jiunn Deng:

Generative-AI Based Health Management System for CKD Patients. 1-4 - Rafael Teixeira, Leonardo Almeida, Pedro Rodrigues, Julio Corona, Mário Antunes, Rui L. Aguiar:

Understanding what Federated Learning Models Learn: a Comparative Study with Traditional Models. 1-6 - Tushar Dupga, Ashutosh Deshwal, Sudiksha Navik, Amitangshu Pal:

Integrated UWB and LIDAR Assisted Localization and Navigation System for Automated Platooning. 1-6 - Hussein Fawaz, Fatima Ezzeddine, Silvia Giordano, Omran Ayoub:

Towards Better-Calibrated ML Models for Reliable Network Intrusion Detection via Calibration-Aware SHAP-Based Feature Selection. 1-6 - Cristian Tommasino

, Cristiano Russo, Angela Crispino, Stefania Staibano, Antonio M. Rinaldi, Francesco Merolla:
Inferring CAF-1/p60 Expression from Hematoxylin and Eosin Stained Images in Oral Squamous Cell Carcinoma. 1-5 - Ladan Gholami, Pietro Ducange, Arcangela Rago, Pietro Cassarà, Alberto Gotta

:
Explainable Machine Learning for Environment-Aware Channel State Prediction in UAV-Based 6G Networks. 1-6 - Jorge Baranda, Albert Bel, Sergio Barrachina-Muñoz, Miquel Payaró, Josep Mangues-Bafalluy:

Design and Evaluation of an Orchestrated E2E Cloud-Native Mobile Network with O-RAN. 1-6 - Moussa Taha, Olivier Berder, Antoine Courtay, Mickaël Le Gentil:

NA-AEKF: A NLOS-Aware Adaptive Extended Kalman Filter for Robust Indoor Localization. 1-6 - Teresa Conte, Nadia Brancati, Martina Russo, Mario Sicuranza:

Bridging the Gap: Integrating Heterogeneous Clinical Data into HL7 FHIR. 1-6 - Fatoumata Y. Sokona, Tidiane Sylla, Harouna Sangaré

, Yannis Formery, Boureima Cissé, Oumar Y. Maïga:
TCHIA-FedPer: An Edge Online Federated Learning and IoT-Based for High-Precision Smart Agriculture. 1-6 - Hafiz Yasir Noor, Isaac Woungang, Glaucio H. S. Carvalho, Issa Traoré, Dao Thanh Hai:

Flow-Based Anomaly Intrusion Detection Systems Using Recurrent Neural Networks. 1-6 - Ife Olalekan Ebo, Idowu Ajayi, Lina Mroueh, Youmni Ziade:

Expert Fusion with Meta-Adaptation for Signal Technology Recognition. 1-6 - Mauro Conti, Federico Corò, Giulio Rigoni

:
Enhancing Uav Swarm Security Through an Rssi-based Protocol for Gnss-Compromised Environments. 1-6 - Naazim Ali Khan, Zhe Lou, Alba Jano, Wolfgang Kellerer:

A Novel Routing Protocol for MANET-Based Smart Indoor Environments. 1-6 - Ismail Bagayoko, Gael S. Mubibya, Elmahdi Driouch:

Joint Optimization of Task Offloading and Multicast Transmission Scheduling in MEC Networks. 1-6 - Yuta Takao, Viktor Erdélyi, Kazuya Ohara, Yasue Kishino, Anh Van Ho, Akira Uchiyama:

Indoor Drone Propeller Speed Estimation Using Wi-Fi Channel State Information. 1-6 - Eito Kurihara, Hideki Ochiai:

A Design of High-Order APSK Constellations with PAPR Constraints for Single-Carrier BICM Systems. 1-6 - Imane Abrya, Safae Bouhaddou, Meryeme Ayache, Nidal Nasser, Amal Bouayad:

Decentralized Tiny Ensemble Learning for Privacy-Preserving Compliance Prediction in Operating Room Environments. 1-6 - Okba Ben Atia, Mustafa Al Samara

, Ismail Bennis:
A Meta Learning Framework for Intrusion Detection in Connected Vehicles. 1-6 - Stefania Zinno, Sayna Rotbei, Giovanni Stanco

, Giorgio Ventre, Giordano D'Urso, Alessio Botta:
Exploring Depression Severity During Lockdown Through Explainable AI. 1-6 - Du Tran-Ngoc, Quang Le-Hoang-Minh, Thang Nguyen-Minh, Trung Dong:

Stability-Driven Quantization-Aware Training for Low-Bit Models. 1-6 - Daniel Ayepah-Mensah, Amine Kidane Ghebreziabiher

, Gordon Owusu Boateng, Rabeb Mizouni, Azzam Mourad, Hadi Otrok, Jamal Bentahar, Sami Muhaidat
:
A RAG-Assisted DRL Framework for Microservices Deployment in 6G Vehicular Networks. 1-6 - Thanh-Nha To, Hoang-Lai Pham, Quynh Nguyen Thi, Tuan Anh Pham, Le Thanh Bang:

Fairness-Aware Secure Communication in ISAC Systems with STAR-RIS and RSMA. 1-6 - Salvatore Carbonara, Daniele Pugliese

, Enrico Boffetti, Fabrizio Greco, Barbara Didonna, Giovanni Grieco
, Alessio Fascista
, Luigi Alfredo Grieco:
An Indoor Experimental Testbed for 5G-Based Uav Control and Communication. 1-6 - Oumaima Ennasri, Manal Abbassi, Yann Ben Maissa, Rachid El Mokadem:

A Communication-Efficient Federated Learning Approach for Intrusion Detection in IoT. 1-6 - Ahmed Mohamed Hussain, Panos Papadimitratos:

Privacy-Enhanced Secure Neighbor Discovery for Wireless Networks. 1-6 - Seyyedeh Maryam Mazloom, Wei-Ping Zhu, Wessam Ajib:

Zero-Day Gps Attack Detection and Classification in Uav Networks. 1-6 - Khadija Akherfi, Michael Gerndt:

Energy Budget Distribution in Mobile Edge Computing Applications. 1-6 - Shruti Mishra

, Mohit Bhuria, Hitesh Singla, Sujata Pal, Isaac Woungang:
ReLEaRN: Reinforcement Learning Enhanced Profitable Rebalancing in Payment Channel Networks. 1-6 - Danila Ferretti

, Leonardo Spampinato, Enrico Testi, Chiara Buratti, Riccardo Marini:
Adaptive Communication for Joint Trajectory and RRM in MADRL-Based UAV Networks. 1-6 - Ahmad Kasaeyan, Minh Dat Nguyen, Wei-Ping Zhu, Wessam Ajib:

Subcarrier and Resource Allocation in Aerial Intelligent Reflecting Surface-Assisted Wireless Networks. 1-6 - Youssef Chakir, Iyad Lahsen Cherif:

ForensicsData: A Digital Forensics Dataset for Large Language Models. 1-6 - Souad Marir, Hind Laouici, Walid Guenounou, Saadi Boudjit:

SPARK: A Kripke-Based Formal Analysis of the SN-MPR Routing Protocol in Wireless Sensor Networks. 1-6 - Marwa Slimene, Nathalie Mitton

, Patrick Sondi
, Ahmed Meddahi
:
An Enhanced Authentication Solution for Infrastructureless Vehicle Environments. 1-6 - Joseph Fares, Eugen Dedu, Jad Nassar, Abdallah Makhoul:

Comparative Study of Packet Loss Models for Flooding Protocols in Dense Wireless Networks. 1-6 - Mustafa Al Samara

, Ismail Bennis, Marc Gilg, Bouziane Brik, Abdelhafid Abouaissa:
AI-Driven Optimisation for Mobile Behavioural Biometrics Continuous Authentication. 1-6 - Brahim Anegdouil, Anass Sebbar, Othmane Cherqi, Mohammed Boulmalf:

Improving Trust and Detecting Malicious Data Sharing in Sdn Data Plane Communications using Lightweight Deep Learning. 1-6 - Giovanni Rocca, Mattia Giovanni Spina, Floriano De Rango:

A Scalable and Efficient Intrusion Detection System Based on a Shapley Value Driven Feature Selection. 31-36 - Abinash Borah, Anirudh Paranjothi:

Securing Connected and Autonomous Vehicles with Sliding Window-Based False Information Tracing. 43-48 - Rachid El Mokadem, Yann Ben Maissa:

XFL-Q: Communication-Efficient Federated Learning with Layer-Wise Quantization for Iot. 55-60 - Rihab Hmaied, Takoua Kefi, Ryma Abassi:

Secure V2P Risk Prediction: A Decentralized Federated Deep Learning Approach. 61-66 - Omar Serghini, Salvatore Serrano, Asmaa Maali, Hayat Semlali:

Federated Learning for Spectrum Sensing in THz Bands. 73-76 - Salah Dine Maham, Guy Pujolle, Atiq Ahmed, Dominique Gaïti, Ali Remili:

Enhancing UAV Communication Security Through HSM-Based Cryptographic Key Protection. 77-80 - Pedro Duarte, André Coelho

, Manuel Ricardo:
A Reinforcement Learning Framework for Mobility Control of gNBs in Dynamic Radio Access Networks. 81-84 - Hazem Chaabi, Nathalie Mitton:

Comparative Analysis of KNN, RNG and K-RNG for Inter-Robot Communication. 91-96 - Fouad Al Tfaily

, Chady Abou Jaoude, Hassan Harb, Hussein Hazimeh, Hassan Kanj:
SHOLO: Similarity-Based Reduction Scheme for Efficient Data Transmission and Energy Saving in Multimedia Sensor Networks. 97-102 - Alberto Salvatore Colletto, Paolo Bonelli Bassano, Alessio Viticchié, Alessandro Aliberti

:
A Multi-Agent Framework for Natural Language-Driven Network Simulation. 109-114 - Anouar Zouhri, Lynda Zitoune, Iyad Lahsen Cherif:

Wifiqna: a Wifi Dataset for Large Language Models. 115-120 - Houaida Ghanmi, Nasreddine Hajlaoui, Haifa Touati, Saadi Boudjit, Mohamed Hadded, Mohand Yazid Saidi, Paul Muhlethaler:

Towards Secure and Transparent Cloud Auditing: A Blockchain and IPFS-Driven Framework with Batch Verification. 121-126 - Godlove Suila Kuaban, Tülin Atmaca, Zeynep Turgut, Tadeusz Czachórski, Piotr Czekalski:

Leveraging Packet Aggregation to Optimise QoS and Energy Trade-Offs in 5G/6G Optical Fronthaul Networks. 127-132 - Ana Patrícia Rocha, Inês Águia

, Pedro Carneiro
, Rafael Pinto, Hugo Senra, Nuno Almeida, Samuel S. Silva, Florinda Costa, António J. S. Teixeira:
Your Health in the Mirror: a Critical Analysis of Health and Well-Being Monitoring by Smart Mirrors. 133-138 - Giorgia Panico, Emanuele Raso, Lorenzo Bracciale, Francesco Bussu, Claudia Crescio, Davide Rizzo, Pierpaolo Loreti:

Telemedicine for the Management of Nasal Obstruction: An Innovative Approach to Remote Monitoring. 144-149 - Antoine Bernard, Antoine Legrain, Maroua Ben Attia, Abdo Shabah:

Distributed Resource Allocation and Application Deployment in Mesh Edge Networks. 198-204 - Massamaesso Narouwa, Léo Mendiboure, Sassi Maaloul, Hakim Badis, Dereje Mechal Molla, Marion Berbineau, Rami Langar:

From Measurement to Materials: Cost-Aware Right-Sizing of Multi-Tier Edge Computing Infrastructures. 205-210 - David Kule Mukuhi, Léo Mendiboure, Rami Langar, Rodrigue Fargeon, Sylvain Cherrier, Marion Berbineau, Pierre-Yves Petton:

Distributed Hierarchical Slack-Reduction in Slicing for Railways FRMCS. 211-216 - Zain Ali, Muhammad Asif, Saud Althunibat, Mazen Omar Hasna, Khalid A. Qaraqe:

Robust Resource Allocation in RSMA-Based Star-RIS-Aided HAP Communication Networks with Imperfect SIC. 217-222 - Awais Bin Asif, Hassan Ahmad

, Jürgen Peissig:
IRS-Assisted DECT-2020 NR Framework for Ensuring URLLC Constraints in Industrial IoT. 223-230

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














