Journal: Annales des Télécommunications

Volume 77, Issue 9

573 -- 587Shi Dong, Yuanjun Xia, Tao Peng 0006. Traffic identification model based on generative adversarial deep convolutional network
589 -- 599Abdelouahab Bentrcia. Block-wise Kaczmarz successive interference cancellation: a matrix algebraic approach
601 -- 610Nadia Mouawad, Rami Khoder, Rola Naja, Samir Tohmé. Vertical group handover congestion game for a vehicular platoon in VLC networks
611 -- 619Rodrigo S. V. Eiras, Rodrigo S. Couto 0001, Marcelo G. Rubinstein. Performance evaluation of an HTTP proxy implemented as a virtual network function
621 -- 640Shaheena Khatoon, Te-Yu Chen, Cheng-Chi Lee. An improved user authentication and key agreement scheme for roaming service in ubiquitous network
641 -- 662Aymen Hasan Alawadi, Sándor Molnár. Oddlab: fault-tolerant aware load-balancing framework for data center networks
663 -- 675Wanjia Zheng, Kazumasa Omote. A study on robustness of malware detection model
677 -- 688Dimas Mavares Terán, Kevin M. Diaz España, Laura I. Ochoa Escobar. Full data rate space-time code selection
689 -- 702Kais Jallouli, Mohamed Mazouzi, Jean-Philippe Diguet, Alireza Monemi, Salem Hasnaoui. MIMO-OFDM LTE system based on a parallel IFFT/FFT on NoC-based FPGA
703 -- 723Ghufran Ali M. Jawad, Ali Kadhum M. Al-Qurabat, Ali Kadhum Idrees. Maximizing the underwater wireless sensor networks' lifespan using BTC and MNP5 compression techniques
725 -- 0. Editorial Expression of Concern: Motor imagery-based neuro-feedback system using neuronal excitation of the active synapses

Volume 77, Issue 7-8

455 -- 456Diogo Menezes Ferrazani Mattos, Dianne Scherly Varela de Medeiros, Daniel Mossé. Enabling technologies for running IoT applications on the cloud
457 -- 471Silvio E. Quincozes, Diego G. Passos 0001, Célio Vinicius N. de Albuquerque, Daniel Mossé, Luiz Satoru Ochi. An extended assessment of metaheuristics-based feature selection for intrusion detection in CPS perception layer
473 -- 489Kirti A. Yadav, P. Vijayakumar 0002. LPPSA: an efficient Lightweight Privacy-Preserving Signature-based Authentication protocol for a vehicular ad hoc network
491 -- 503Melody Jamalzadeh, Mohsen Maadani, Mojdeh Mahdavi. EC-MOPSO: an edge computing-assisted hybrid cluster and MOPSO-based routing protocol for the Internet of Vehicles
505 -- 515Renato Souza Silva, Luís F. M. de Moraes. A balanced prior knowledge model based on Beta function for evaluating DIDS performance
517 -- 537Gabriel Antonio F. Rebello, Gustavo Franco Camilo, Lucas C. B. Guimarães, Lucas Airam C. de Souza, Guilherme A. Thomaz, Otto Carlos M. B. Duarte. A security and performance analysis of proof-based consensus protocols
539 -- 554Lucas C. B. Guimarães, Gabriel Antonio F. Rebello, Gustavo Franco Camilo, Lucas Airam C. de Souza, Otto Carlos M. B. Duarte. A threat monitoring system for intelligent data analytics of network traffic
555 -- 571João Vitor Valle Silva, Nicollas R. de Oliveira, Dianne S. V. Medeiros, Martin Andreoni Lopez, Diogo M. F. Mattos. A statistical analysis of intrinsic bias of network security datasets for training machine learning mechanisms

Volume 77, Issue 5

251 -- 252Selma Boumerdassi, Ruben H. Milocco, Leïla Saïdane, Nicolas Puech. Machine learning for networking
253 -- 265Miguel Landry Foko Sindjoung, Pascale Minet. Estimating and predicting link quality in wireless IoT networks
267 -- 280V. Ch Sekhar Rao Rayavarapu, Arunanshu Mahapatro. NLOS identification and mitigation in UWB positioning with bagging-based ensembled classifiers
281 -- 295Golshan Famitafreshi, Cristina Cano. Achieving proportional fairness in WiFi networks via bandit convex optimization
297 -- 309Ons Aouedi, Kandaraj Piamrat, Salima Hamma, Menuka Perera Jayasuriya Kuranage. Network traffic analysis using machine learning: an unsupervised approach to understand and slice your network
311 -- 330Adel Djama, Badis Djamaa, Mustapha Réda Senouci, Nabil Khemache. LAFS: a learning-based adaptive forwarding strategy for NDN-based IoT networks
331 -- 344Adda Boualem, Hacène Fouchal, Marwane Ayaida, Cyril De Runz. Fibonacci tiles strategy for optimal coverage in IoT networks
345 -- 357Abdallah Sobehy, Éric Renault, Paul Mühlethaler. Generalization aspect of accurate machine learning models for CSI-based localization
359 -- 370Samuel A. Ajila, Chung-Horng Lung, Anurag Das. Analysis of error-based machine learning algorithms in network anomaly detection and categorization
371 -- 394Arnaud Rosay, Kévin Riou, Florent Carlier, Pascal Leroux. Multi-layer perceptron for network intrusion detection
395 -- 406Ola Salman, Imad H. Elhajj, Ayman I. Kayssi, Ali Chehab. Mutated traffic detection and recovery: an adversarial generative deep learning approach
407 -- 420Martín Panza, Diego Madariaga, Javier Bustos-Jiménez. Extracting human behavior patterns from DNS traffic
421 -- 435Diogo Ferreira, Carlos R. Senna, Paulo Salvador, Luís Cortesão, Cristina Pires, Rui Pedro, Susana Sargento. Prediction of low accessibility in 4G networks
437 -- 454Taku Wakui, Takao Kondo, Fumio Teraoka. GAMPAL: an anomaly detection mechanism for Internet backbone traffic by flow size prediction with LSTM-RNN

Volume 77, Issue 3-4

119 -- 126Swati Rawal, Sahadeo Padhye, Debiao He. Lattice-based undeniable signature scheme
127 -- 138Van Phu Tuan, Hyung Yun Kong. Secrecy sum rate maximization for UAV-aided NOMA communication systems
139 -- 150Alex Borges Vieira, Wallace Nascimento Paraizo, Luciano Jerez Chaves, Luiz H. A. Correia, Edelberto Franco Silva. An SDN-based energy-aware traffic management mechanism
151 -- 161Supriya Aggarwal. Product of two Gaussian Q-functions as sum of exponentials and its applications
163 -- 175Muhammad Muaaz, Ali Chelli, Martin Wulf Gerdes, Matthias Pätzold 0001. Wi-Sense: a passive human activity recognition system using Wi-Fi and convolutional neural network and its integration in health information systems
177 -- 185Mustafa Namdar, Arif Basgumus, Sultan Aldirmaz Çolak, Eylem Erdogan, Hakan Alakoca, Seda Ustunbas, Lutfiye Durak-Ata. Iterative interference alignment with spatial hole sensing in MIMO cognitive radio networks
187 -- 200Ba Cao Nguyen, Xuan Nam Tran, Dinh Tan Tran. Performance analysis of full-duplex decode-and-forward two-way relay networks with transceiver impairments
201 -- 220Abdelwahab Boualouache, Thomas Engel 0001. Federated learning-based scheme for detecting passive mobile attackers in 5G vehicular edge computing
221 -- 236Zahi Nakad, Mohammad Ali Sayed, Anthony Yaghi, Harag Margossian, Wissam Fawaz. A novel offline indoor acoustic synchronization protocol: experimental analysis
237 -- 250Gang Zhang, Jiangtao Dong, LiFang He. A noise reduction orthogonal multi-user CDSK communication system based on frequency domain processing

Volume 77, Issue 11-12

727 -- 729Gregory Blanc, Yang Liu, Rongxing Lu, Takeshi Takahashi 0001, Zonghua Zhang. Interactions between artificial intelligence and cybersecurity to protect future networks
731 -- 747Maria Mushtaq, Muhammad Muneeb Yousaf, Muhammad Khurram Bhatti, Vianney Lapotre, Guy Gogniat. The Kingsguard OS-level mitigation against cache side-channel attacks using runtime detection
749 -- 761Theobald de Riberolles, Yunkai Zou, Guthemberg Silvestre, Emmanuel Lochin, Jiefu Song. Anomaly detection for ICS based on deep learning: a use case for aeronautical radar data
763 -- 775Mohamed Amine Merzouk, Frédéric Cuppens, Nora Boulahia-Cuppens, Reda Yaich. Investigating the practicality of adversarial evasion attacks on network intrusion detection
777 -- 788Yuki Osada, Ryusei Nagasawa, Yoshiaki Shiraishi, Makoto Takita, Keisuke Furumoto, Takeshi Takahashi 0001, Masami Mohri, Masakatu Morii. Multi-labeling with topic models for searching security information
789 -- 812Fabien Charmet, Harry Chandra Tanuwidjaja, Solayman Ayoubi, Pierre-François Gimenez, Yufei Han, Houda Jmila, Gregory Blanc, Takeshi Takahashi 0001, Zonghua Zhang. Explainable artificial intelligence for cybersecurity: a literature survey
813 -- 824Antonio José Silvério, Rodrigo S. Couto 0001, Miguel Elias M. Campista, Luís Henrique M. K. Costa. A bi-objective optimization model for segment routing traffic engineering
825 -- 834Juin Acharjee, Kaushik Mandal, Sujit Kumar Mandal. Slotted patch and ground for reducing side lobe level of planar antenna operating under higher order mode
835 -- 846Xu Lu 0002, Kezhou Chen, Rongjun Chen. Balance: depolarized intelligent sensing system with multi-angle energy-saving optimized control model
847 -- 865Haidar Taki, Chadi Abou-Rjeily. On enhancing the transmission efficiency of modulated UWB signals under different emission standards
867 -- 879Fábio Henrique Cabrini, Albérico de Castro Barros Filho, Douglas Braz Maciel, Filippo Valiante Filho, Augusto José Venâncio Neto, Sergio Takeo Kofuji. Helix Multi-layered: a context broker federation for an efficient cloud-to-things continuum

Volume 77, Issue 1

1 -- 2Maria Potop-Butucaru, Ariel Orda, Maurice Herlihy, Stefano Secci. Special issue on blockchain networks and distributed protocols
3 -- 12Oded Noam, Ori Rottenstreich. Realizing privacy aspects in blockchain networks
13 -- 32Saima Zafar, K. M. Bhatti, M. Shabbir, Fabiha Hashmat, Ali Hammad Akbar 0001. Integration of blockchain and Internet of Things: challenges and solutions
33 -- 45Pravin Pawar, Neeraj Parolia, Sameer Shinde, Thierry Oscar Edoh, Madhusudan Singh 0001. eHealthChain - a blockchain-based personal health information management system
47 -- 59Vincent Messie, Gaël Fromentoux, Nathalie Labidurie Omnès, Benoit Radier, Sandrine Vaton, Isabel Amigo. BALAdIN: truthfulness in collaborative access networks with distributed ledgers
61 -- 76Maya Leshkowitz, Olivia Benattasse, Oded Wertheim, Ori Rottenstreich. Scalable blockchain execution via parallel block validation
77 -- 99Serguei Popov 0001, Sebastian Müller 0006. Voting-based probabilistic consensuses and their applications in distributed ledgers
101 -- 118Antonio Emerson Barros Tomaz, José Cláudio do Nascimento, José Neuman de Souza. Blockchain-based whistleblowing service to solve the problem of journalistic conflict of interest