Journal: Annales des Télécommunications

Volume 78, Issue 9-10

525 -- 549Fatima Salahdine, Tao Han 0002, Ning Zhang 0007. 5G, 6G, and Beyond: Recent advances and future challenges
551 -- 560Dennis Krummacker, Benedikt Veith, Daniel Lindenschmitt, Hans D. Schotten. DLT architectures for trust anchors in 6G
561 -- 576Jean Marc Kelif, Dinh Thuy Phan Huy, Philippe Ratajczak. Backscatter communication system efficiency with diffusing surfaces
577 -- 584Pinakpani Mukherjee, Santu Sarkar, Nikhil R. Das. Analysis of SNR penalty in coherent WDM receiver system for detection of QPSK signal with component crosstalk
585 -- 597T. Nathezhtha, Sangeetha Dhamodaran, Vaidehi V.. Social network malicious insider detection using time-based trust evaluation
599 -- 615Rim Jouini, Chiraz Houaidia, Leïla Azouz Saïdane. Hidden Markov Model for early prediction of the elderly's dependency evolution in ambient assisted living
617 -- 625Mohamed Hamidi, Ouissam Zealouk, Hassan Satori. Telephony speech system performance based on the codec effect
627 -- 639Chongrui Pan, Guanding Yu. Deep unfolding for energy-efficient resource allocation in mmWave networks with multi-connectivity
641 -- 651Yuxi Du, Weijia Cui, Fengtong Mei, Chunxiao Jian, Bin Ba. Robust adaptive beamforming algorithm for coherent signals based on virtual array

Volume 78, Issue 7-8

383 -- 0Esma Aïmeur, Maryline Laurent, Reda Yaich, Benoît Dupont, Frédéric Cuppens. Foreword of the special issue on « FPS 2021» symposium
385 -- 400Hazel Murray, David Malone. Adaptive password guessing: learning language, nationality and dataset source
401 -- 412João Vitorino, Isabel Praça, Eva Maia. Towards adversarial realism and robust learning for IoT intrusion detection and classification
413 -- 427Dylan Paulin, Raphaël Joud, Christine Hennebert, Pierre-Alain Moëllic, Thibault Franco-Rondisson, Romain Jayles. HistoTrust: tracing AI behavior with secure hardware and blockchain technology
429 -- 457Rania Taleb, Sylvain Hallé, Raphaël Khoury. A modular pipeline for enforcement of security properties at runtime
459 -- 474Jemimah J. P. P, S. Miruna Joe Amali. Secure and low PAPR OFDM system using TCCM
475 -- 489Tapan Kumar Mohanta, Dushmanta Kumar Das. A three-dimensional wireless sensor network with an improved localization algorithm based on orthogonal learning class topper optimization
491 -- 507Mohammad Akhondi Darzikolaei, Mohammad Ali Alirezapouri. A modified ZF algorithm for signal detection in an underwater MIMO STBC-OFDM acoustic communication system
509 -- 524Shengzhou Hu, Tingting Zhong, Hua He, Wenhao Li. Attribute-based encryption of LSSS access structure with expressive dynamic attributes based on consortium blockchain

Volume 78, Issue 5-6

249 -- 251Cédric Ware, Marceau Coupechoux, Ekram Hossain 0001, Carmen Mas Machuca, Vinod Sharma, Anna Tzanakaki. Introduction to the special issue: 5+G network energy consumption, energy efficiency and environmental impact
253 -- 0. Publisher Correction: Introduction to the special issue: 5+G network energy consumption, energy efficiency and environmental impact
255 -- 275Dominique Chiaroni, Raffaele Luca Amalfi, Jos George, Maximilian Riegel. Towards greener digital infrastructures for ICT and vertical markets
277 -- 295Tilman Santarius, Jan C. T. Bieser, Vivian Frick, Mattias Höjer, Maike Gossen, Lorenz M. Hilty, Eva Kern, Johanna Pohl, Friederike Rohde, Steffen Lange. Digital sufficiency: conceptual considerations for ICTs on a finite planet
297 -- 311Memedhe Ibrahimi, Omran Ayoub, Aryanaz Attarpour, Francesco Musumeci 0001, Andrea Castoldi, Mario Ragni, Massimo Tornatore. Minimizing equipment and energy cost in mixed 10G and 100G/200G filterless horseshoe networks with hierarchical OTN boards
313 -- 327Louis Golard, Jérôme Louveaux, David Bol. Evaluation and projection of 4G and 5G RAN energy footprints: the case of Belgium for 2020-2025
329 -- 346Kishalay Bairagi, Sulata Mitra, Uma Bhattacharya. Efficient approaches to optimize energy consumption in 3D wireless video sensor network under the coverage and connectivity constraints
347 -- 362Ali Kadhum Idrees, Lina Waleed Jawad. Energy-efficient Data Processing Protocol in edge-based IoT networks
363 -- 381Bartlomiej Blaszczyszyn, Philippe Jacquet, Bernard Mans, Dalia Popescu. Energy and delay trade-offs of end-to-end vehicular communications using a hyperfractal urban modelling

Volume 78, Issue 3-4

133 -- 134Ahmad Samer Wazan, Frédéric Cuppens. Cybersecurity in networking: adaptations, investigation, attacks, and countermeasures
135 -- 147Zhaosen Shi, Xuyang Ding, Fagen Li, Yingni Chen, Canran Li. Mitigation of a poisoning attack in federated learning by using historical distance detection
149 -- 167Raphaël M. J. I. Larsen, Marc-Oliver Pahl, Gouenou Coatrieux. Multipath neural networks for anomaly detection in cyber-physical systems
169 -- 182David Cordova Morales, Pedro B. Velloso, Alexandre Laubé, Thi Mai Trang Nguyen, Guy Pujolle. A performance evaluation of C4M consensus algorithm
183 -- 208Zainab Khalid, Farkhund Iqbal, Faouzi Kamoun, Liaqat Ali Khan, Babar Shah. Forensic investigation of Cisco WebEx desktop client, web, and Android smartphone applications
209 -- 220Kai Lehniger, Abdelaziz Saad, Peter Langendörfer. Finding gadgets in incremental code updates for return-oriented programming attacks on resource-constrained devices
221 -- 233Anushree Belel, Ratna Dutta, Sourav Mukhopadhyay. Communication-friendly threshold trapdoor function from weaker assumption for distributed cryptography
235 -- 247Gang Zhang, Ping He, Lifang He 0005. Multi-carrier multi-level DCSK communication system based on time-reversal

Volume 78, Issue 11-12

653 -- 654Mohamed Lahby, Rachid Saadane, Sérgio D. Correia 0001. Integration of IoT with cloud computing for next generation wireless technology
655 -- 665Tarek Moulahi, Salim el Khediri, Durre Nayab, Mushira Freihat, Rehan Ullah Khan. Effects of dataset attacks on machine learning models in e-health
667 -- 684Preechai Mekbungwan, Adisorn Lertsinsrubtavee, Sukumal Kitisin, Giovanni Pau 0001, Kanchana Kanchanasut. Towards programmable IoT with ActiveNDN
685 -- 0. Publisher Correction: Towards programmable IoT with ActiveNDN
687 -- 702Sevda Özge Bursa, Özlem Durmaz Incel, Gülfem Isiklar Alptekin. Building Lightweight Deep learning Models with TensorFlow Lite for Human Activity Recognition on Mobile Devices
703 -- 715Meryeme Ayache, Ikram El Asri, Jamal N. Al-Karaki, Mohamed Bellouch, Amjad Gawanmeh, Karim Tazzi. Enhanced DASS-CARE 2.0: a blockchain-based and decentralized FL framework
717 -- 728Sara Yassmine Brahimi, Fatna Mouffak, Fatima Zohra Bousbaa, Chaker Abdelaziz Kerrache, Nasreddine Lagraa, Abderrahmane Lakas. Cloud service selection in IoFT-enabled Multi-access Edge Computing: a Game Theoretic approach
729 -- 755Nahid Eddermoug, Abdeljebar Mansour, Mohamed Sadik, Essaid Sabir, Mohamed Azmi. klm-PPSA v. 1.1: machine learning-augmented profiling and preventing security attacks in cloud environments

Volume 78, Issue 1-2

71 -- 77Narendra Kumar, Siddhartha Siddhiprada Bhoi, Ruchir Gupta, Abhay Kumar Singh. Sliding window symbol-pair constrained codes for energy harvesting

Volume 78, Issue 1

1 -- 12Dorabella Santos, Lúcia Martins, Teresa Gomes. A biobjective availability optimization problem with nonlinear constraints
13 -- 31Jaime Galán-Jiménez, Marco Polverini, Francesco Giacinto Lavacca, Juan Luis Herrera, Javier Berrocal. Joint energy efficiency and load balancing optimization in hybrid IP/SDN networks
33 -- 51Michael Braun, Alexander Wiesmaier, Nouri Alnahawi. Efficient practical Byzantine consensus using random linear network coding
53 -- 70Kohei Shiomoto, Tatsuya Otoshi, Masayuki Murata 0001. A novel network traffic prediction method based on a Bayesian network model for establishing the relationship between traffic and population
79 -- 90Amit Kumar Singh, Kamalesh Acharya, Ratna Dutta. Cloud assisted semi-static secure accountable authority identity-based broadcast encryption featuring public traceability without random oracles
91 -- 99Basil K. Jeemon, T. K. Shahana 0001. PAPR reduction using constrained convex optimization for vector OFDM
101 -- 113C. Srikamu, K. G. Sujanth Narayan, S. Karthikeyan, R. Jayabharathy. Performance analysis of NOMA in a MIMO system over Rayleigh channels under imperfect SIC
115 -- 131Pedro Victor Borges Caldas da Silva, Chantal Taconet, Sophie Chabridon, Denis Conan, Everton Cavalcante, Thaís Batista. Energy awareness and energy efficiency in internet of things middleware: a systematic literature review