Abstract is missing.
- Conflict Management based on Deep Reinforcement Learning for Edge Computing in Intent-Driven NetworksZhen Li, Jialong Gong, Dong Wang. 1-5 [doi]
- An Innovative Task Offloading Algorithm Based on Deep Reinforcement Learning in Computation Resource NetworkYufei Long, Qimiao Zeng, Yirong Zhuang, Qing Pan, Han Xiao. 1-7 [doi]
- Physical Layer Security Meets Privacy Requirements for Downlink NOMAAmani Benamor, Oussama Habachi, Jean-Pierre Cances, Vahid Meghdadi. 1-6 [doi]
- Error-correcting Codes in Communication SystemsKhawla Almazrouei, Khawla A Alnajjar. 1-6 [doi]
- Handling Imbalanced 5G and Beyond Network Tabular Data Using Conditional Generative ModelsJimena Andrade-Hoz, José M. Alcaraz-Calero, Qi Wang 0001. 7-12 [doi]
- ECCIA: An Identity Authentication Scheme against IFAs in NDNsYingjuan Shi, Maode Ma. 13-18 [doi]
- A Res-GRU Based Decoder for Polar CodesZuting Chen, Shuai Han 0002, Peng Yu, Chenyu Wu. 19-24 [doi]
- Signal quality detection in mobile network based on synthetic vehicle location data generation using generative adversial neural networksSara Kassan, Bechir Mnakri, Thierry Nagellen, Frédéric Guyard, Tamara Tosic. 25-30 [doi]
- Communication-efficient Decentralised Federated Learning via Low Huffman-coded Delta Quantization SchemeMahdi Barhoush, Ahmad Ayad, Mohammad Kohankhaki, Anke Schmeink. 31-36 [doi]
- A Survey of Deep Learning Technology in Visual SLAMHaijun Meng, Huimin Lu 0001. 37-42 [doi]
- Comprehensive Review of End-to-End Video CompressionLiangfan Shi, Huimin Lu 0001. 43-48 [doi]
- A Review of Multimodal Sentiment Analysis: Modal Fusion and RepresentationHanxue Fu, Huimin Lu 0001. 49-54 [doi]
- Mobility Management Approach for Co-Orbital Regenerated LEO SatellitesXuan Huang. 55-60 [doi]
- Passive network monitoring and troubleshooting from within the browser: a data-driven approachNaomi Kirimi, Chadi Barakat, Yassine Hadjadj Aoul. 61-66 [doi]
- Blockchain and DL-based Brain Tumour Prediction Scheme for Telesurgery Systems in Healthcare 4.0Yogi Patel, Rajesh Gupta 0007, Riya Kakkar, Sudeep Tanwar, Mohsen Guizani. 67-72 [doi]
- An enhanced quality of service mechanism based on the two-way negotiation procedureQiuyue Gao, Jinyan Li, Junli Xue, Yanxia Xing. 73-77 [doi]
- A Blockchain-assisted Group Handover Authentication Protocol for 5G Wireless NetworksRonghao Ma, Jianhong Zhou, Maode Ma. 78-83 [doi]
- Deep Learning Based Fault Diagnosis Methods for Satellite Power SystemYing Dong, Yafeng Zhan, Haoran Xie 0004. 84-89 [doi]
- RL-Based Incentive Cooperative Data Learning Framework Over Blockchain in Healthcare Applications (RL-ICDL-BC)Ali Riahi, Aiman Erbad, Abdelaziz Bouras, Amr Mohamed 0001. 90-96 [doi]
- Dynamic Bandwidth Allocation in MIMO 5G NetworksNikolaos Prodromos, Damianos Diasakos, Vasileios Kokkinos, Apostolos Gkamas, Christos Bouras, Philippos Pouyioutas. 97-102 [doi]
- Network Security Situation Assessment Method Based Eigenvector CentralityZhijun Wu, Pei Xu, Haoyu Fan. 103-108 [doi]
- A New Radio Frequency Fingerprint Identification Method Based on CEEMDANWeikang Yang, Jianing Zhao, Shaoxuan Xue, Xin Wang, Xuenan Ni. 109-113 [doi]
- Edge-Accelerated UAV Operations: A Case Study of Open Source SolutionsJulio Diez-Tomillo, José M. Alcaraz-Calero, Qi Wang 0001. 114-119 [doi]
- Network Slice Placement in Wireless Mesh NetworksAlexander Seng, Ulrich Trick, Armin Lehmann, Bogdan Ghita 0003. 120-125 [doi]
- End-to-End Spatio-temporal Latency Prediction for Vehicular ApplicationsMaroua Drissi, Sylvain Allio. 126-131 [doi]
- DNS flooding attack detection scheme through Machine LearningAli El Attar, Rida Khatoun, Fadlallah Chbib, Ahmad Fadlallah, Ahmed Serhrouchni. 132-137 [doi]
- Implementation of a Symmetric Double Arbiter Physical Unclonable Function and Evaluation the Impact of Temperature Influences using PYNQ-Z1 BoardSinan Yavuz, Edwin Naroska, Kai Daniel. 138-143 [doi]
- ADS-B Replay Attack Detection using TransformersThabet Kacem, Sourou Tossou. 144-149 [doi]
- Stability Analysis of Deep Neural Networks under Adversarial Attacks and Noise PerturbationsParisa Eslami, Houbing Song. 150-155 [doi]
- An Efficient Approach for Tampering Attack Detection in WSN Using BlockchainMuhammad Rehan Yasin, Hassan Jamil Syed, Junaid Shuja. 156-161 [doi]
- *Yiyang Xiong, Cheng Li, Shilei Dong, Fangning Shi, Haoming Zhang. 162-167 [doi]
- An Improved Grey Wolf Optimizer for Task Scheduling in D2D-Assisted MEC SystemsHongba Bao, Hui Wang, Yiying Sun, Sheng Pan. 168-173 [doi]
- Advancing IoT Anomalous Traffic Detection through Arithmetic Coding in Transformer-Based ArchitecturesYiyang Xiong, Shilei Dong, Fangning Shi, Haoming Zhang. 174-179 [doi]
- Usecase-based generic framework for data fusion and decision making in Autonomous DrivingHenry Alexander Ignatious, Hesham El-Sayed. 180-185 [doi]
- Enhancing Secure Communication in 6G-Enabled IoV through UAV and Control Center IntegrationAndreas Andreou, Constandinos X. Mavromoustakis, Jordi Mongay Batalla, Evangelos K. Markakis, Athina Bourdena, George Mastorakis, Houbing Song. 186-191 [doi]
- + Enabled Federated Learning Algorithms and Energy optimization TechniquesAndreas Andreou, Constandinos X. Mavromoustakis, Jordi Mongay Batalla, Evangelos K. Markakis, Athina Bourdena, George Mastorakis, Houbing Song. 192-197 [doi]
- Power Allocation and User Pairing Based Beam Reuse in a NOMA SystemXuenan Ni, Jianing Zhao, Xinping Xia, Xiaoying Zhang, Jianyi Zhou, Weikang Yang. 198-203 [doi]
- Resource Management Based on Resource Parameters in Computing NetworksYidi Xie, Chen Zhang, Gang Du. 204-207 [doi]
- NeRF-based Multi-View Synthesis Techniques: A SurveyJintong Cai, Huimin Lu 0001. 208-213 [doi]
- Opportunistic Routing and Energy Harvesting in Multi-tier Networks against Jamming AttacksChan Dai Truyen Thai. 214-219 [doi]
- Enhancing Post-Disaster Survivor Detection Using UAV Imagery and Transfer Learning StrategiesNema Ahmed, Somaya Al-Máadeed. 220-225 [doi]
- Evaluation of LSTM GAN for Trajectory Prediction in Connected and Autonomous VehiclesVasu Mistry, Binod Vaidya, Hussein T. Mouftah. 226-231 [doi]
- What-if Analysis Framework for Digital Twins in 6G Wireless Network ManagementElif Ak, Berk Canberk, Vishal Sharma 0001, Octavia A. Dobre, Trung Q. Duong. 232-237 [doi]
- Intelligent DWC Reservation and Trip Planning of CAEV and UAV for 6G ITSPalwasha Waheed Shaikh, Hussein T. Mouftah. 238-243 [doi]
- Generative Inference of Large Language Models in Edge Computing: An Energy Efficient ApproachXingyu Yuan, He Li 0001, Kaoru Ota, Mianxiong Dong. 244-249 [doi]
- A Hierarchical PoW-Powered Access Mechanism for Shuffling-Based Moving Target Defense SystemZeyuan Guo, Changjun Ren, Lin Yan, Shujie Yang, Yi Sun. 250-255 [doi]
- Non-Line of Sight Detection Based on 5G Signal Strength- and Quality Measurements and its impact on mobile positioning accuracyIvo Müürsepp, Aleksei Fjodorov, Muhammad Mahtab Alam. 256-261 [doi]
- Efficient 3D Object Recognition for Unadjusted Bin Picking AutomationYuchao Zheng, Xiu Chen, Yujie Li 0001. 262-268 [doi]
- Advanced Techniques in Adaptive Beamforming for Enhanced DOA EstimationYuqing Chai. 269-273 [doi]
- Massive MIMO technology: a key advancement in shaping communication networks for the 5G/5G+ eraZhirong Zhang. 274-278 [doi]
- Spectrum Sharing Technologies in the 5G Era: Innovative Applications and Challenges in the FDD BandZhirong Zhang. 279-284 [doi]
- Research and Application of Multi-Access Collaboration Technology in 6G NetworksZhirong Zhang. 285-290 [doi]
- Actor-Critic Deep RL for Vehicular Edge Computing OptimizationBingxin Wang, Dan Tu, Jie Wang. 291-295 [doi]
- Cost-Efficient Computation Offloading in VEC Using Deep Reinforcement Learning TechniquesBingxin Wang, Dan Tu, Jie Wang. 296-300 [doi]
- Advancing Fairness in Microgrid Energy Transaction: An Alternative ApproachChemsedine Bchir, Moayad Aloqaily, Fakhri Karray, Mohsen Guizani. 301-308 [doi]
- Balancing Energy Consumption and Latency in Vehicle Edge Computing for 6G NetworksBingxin Wang, Dan Tu, Jie Wang. 309-314 [doi]
- Impact Assessment of IAB and Small 5G Stations on Railway Network CommunicationsXiaoyin Zhao, Xueqi Yuan. 315-320 [doi]
- Context-Aware Hard and Slow Fall DetectionSinda Besrour, Gael S. Mubibya, Zikuan Liu, Jalal Almhana. 321-326 [doi]
- A Green IoT-Integrated AI-Based EV Scheduling Scheme for Efficient Charging Station SelectionFenil Ramoliya, Rajesh Gupta 0007, Krisha Darji, Chinmay Trivedi, Riya Kakkar, Sudeep Tanwar, Mohsen Guizani. 327-332 [doi]
- Bridging Economic Model and Blockchain: ZKP Empowered Privacy Preserving Payment Channel with Intermediary PricingXijian Xu, Jun Wu 0001. 333-338 [doi]
- Adaptive Grouping Access Based on Rate-Splitting Multiple Access for Multibeam Satellite SystemShuai Han, Zhiqiang Li, Cheng Li. 339-344 [doi]
- UAV Path Planning for Aviation Optimazition Based on Doubly Decoupled Reinforced NetworkBin Jiang 0003, Yining Wang, Fanhui Kong, Xuerong Cui, Shibao Li, Jian Wang 0061. 345-350 [doi]
- Evaluating Interference Impact on On-board Small Station Systems in Railway NetworksXiaoyin Zhao, Lei Liu. 351-356 [doi]
- Advancing Railway Systems with Next-Generation 5G ConnectivityXiaoyin Zhao, Xi Meng, Bingxin Wang. 357-362 [doi]
- EM-PAD: An Effective Mechanism for Phishing Attack DetectionAakash, Saksham Mittal, Mohammad Wazid, Amit Kumar Mishra, Ashok Kumar Das, Sachin Shetty, Mohsen Guizani. 363-368 [doi]
- Fog computing-empowered smart systems for latency-sensitive control applicationsMohammed Laroui, Hatem Ibn-Khedher, Nathalie Banoun. 369-374 [doi]
- Collaborative Task Offloading Based on Deep Reinforcement Learning in Heterogeneous Edge NetworksYupeng Du, Zhenglei Huang, Shujie Yang, Han Xiao. 375-380 [doi]
- Mobility management in 5G and 6G satellite access networksJing Jia, Heng Wang, Xu Xia, Dong Wang. 381-385 [doi]
- Network-based Intrusion Detection Through Image-based CNN and Transfer LearningPedro Horchulhack, Eduardo K. Viegas, Altair O. Santin, João A. Simioni. 386-391 [doi]
- Flat, Gateway-free, Infinite MANET Architecture with Variable Cell Size Cellular Barrage Relay Networks, and Geographic-Based Hazy Link State RoutingKonstantinos Gus Nikolaos Amouris. 392-399 [doi]
- Cross-Layer Alarm Association Rules Discovery of Cloud-Network based on Knowledge GraphHuiying Zhao, Hongwu Li, Bin Wu, Ruiqi Liu, Lexi Xu, Bingming Huang, Zhipu Xie, Xinzhou Cheng. 400-405 [doi]
- Analysis and Optimization: interference study of 900MHz NR system to NB-IoT systemLei Liu. 406-412 [doi]
- Interference compatibility study and interference management for 5G and Broadband TDD Private NetworksLei Liu, Xi Meng. 413-420 [doi]
- Interference Analysis between 1800MHz NR System and Meteorological Satellites System Using ITU-R ModelLei Liu, Xiaoyin Zhao. 421-427 [doi]
- On Demand Reliability in the Internet of Things Enabled Sensors NetworksRahul Mishra, Pritam Anand. 428-432 [doi]
- Analysis of Physical Layer Security Based on WFRFT with Multiple EavesdroppersTao Xu, Xuanli Wu, Ziyi Xie. 433-438 [doi]
- Dataset Collection of Multi-Communication Technologies Monitored in Different Mobility ContextsJana Koteich, Nathalie Mitton. 439-444 [doi]
- Node Compromising Detection to Mitigate Poisoning Attacks in IoT NetworksFloribert Katembo Vuseghesa, Mohamed-Lamine Messai, Fadila Bentayeb. 445-450 [doi]
- Research on Key Technologies of 6G Network ArchitectureYanxia Xing, Jianfeng Zhou, Pengyu Li, Menghan Yu. 451-455 [doi]
- Cross-Domain AI Towards 6G: Requirements, Solution, and ValidationZexu Li, Zhen Li, Xiong Xiong, Dongjie Liu. 456-460 [doi]
- Secure Status Updates for Internet of Drones: A Deep Q-Learning-Based Antenna Selection ApproachYuquan Xiao, Qinghe Du, Chen Lu, Yizhuo Wang. 461-466 [doi]
- 5G RAN service classification using Long Short Term Memory Neural NetworkMohamed Khadmaoui-Bichouna, José M. Alcaraz-Calero, Qi Wang 0001. 467-472 [doi]
- Pre-Chirp-Domain Index Modulation for Affine Frequency Division MultiplexingGuangyao Liu, Tianqi Mao, Ruiqi Liu, Zhenyu Xiao. 473-478 [doi]
- Ultra-Reliable and Low-Latency UAV Communications in High-Mobility EnvironmentsYuquan Xiao, Zixiao Zhao. 479-483 [doi]
- Energy Consumption Evaluation of NOMA-based Sustainable Scheduling in 6G O-RANAamir Latif, Osama Elgarhy, Yannick Le Moullec, Muhammad Mahtab Alam. 484-489 [doi]
- Dynamic Resource Scheduling for Air-Ground Collaborative Communication: A Hierarchical Multi-Agent Method for MetaverseHanyi Li, Yang Huang 0001, Runhe Wang, Miaomiao Dong. 490-495 [doi]
- Multicarrier Waveform Design for mmWave/THz Integrated Sensing and CommunicationFan Zhang 0071, Tianqi Mao, Ruiqi Liu, Leyi Zhang, Dezhi Zheng, Tengfei Wang, Zhaocheng Wang 0001. 501-506 [doi]
- A Kubernetes-Powered Personalized Federated Learning Platform for Resource-Constrained Internet of Medical ThingsMeng-Hsuan Lin, Shun-Ren Yang, Hsin-Yin Chiang, Chu-Chun Chang, Phone Lin. 507-512 [doi]
- Online Resource Allocation in Internet of Vehicles Using Topology Attribute-Aware Genetic AlgorithmKhoa Nguyen 0001, Wei Shi 0001, Marc St-Hilaire. 513-518 [doi]
- Dynamic Interference Source Tracking Based on Motion State DecompositionShijiao Zhang, Guomei Zhang, Yezhao Shi, Lei Lu, Jiaoxian Yin. 519-524 [doi]
- Semantic Knowledge Consensus for Multi-agent Collaboration: A Naming Game ApproachHongyu Gu, Xinyue Qi, Liang Sun, Yang Zhang. 525-530 [doi]
- Mixture of Experts for Intelligent Networks: A Large Language Model-enabled ApproachHongyang Du, Guangyuan Liu, Yijing Lin, Dusit Niyato, Jiawen Kang 0001, Zehui Xiong, Dong In Kim. 531-536 [doi]
- Sub-Block Level Interference Exploitation Precoding in Satellite CommunicationsZhongxiang Wei, Jingjing Wang, Christos Masouros, Tongyang Xu, Jianrui Chen, Ang Li. 537-542 [doi]
- Reinforcement Learning-based anti-Jamming Solution for Aerial RIS-aided Dense Dynamic Multi-User EnvironmentsZain Ul Abideen Tariq, Emna Baccour, Aiman Erbad, Mounir Hamdi. 543-548 [doi]
- Collaborative Multi-Agent Jamming Deceiving for UAV-assisted Wireless CommunicationsChen Zhang, Zhenyu Xiao, LingFeng Zhang, Guangyao Liu, Wei Zhang 0001, Xiang-Gen Xia 0001. 549-554 [doi]
- Link Quality Analysis for Buried Pipeline Monitoring using LoRaHina Nasir, Syed Ali Raza Zaidi, Ian D. Robertson. 555-560 [doi]
- A Scalable Semantic Communication System Based on Meta-LearningHao Chen, Shuyi Chen, Chenguang He, Hongrui Li. 561-566 [doi]
- Robust Robot Formation Control Based on Streaming Communication and Leader-Follower ApproachYuhan Wang, Zhuo Zou, Xiaoming Hu 0001, Zhongxue Gan, Lizheng Liu. 567-572 [doi]
- A Cross Domain Authentication Scheme Based on BlockchainPengyu Cui, Xusheng Qian, Xiuyong Zhang, Wei Wang 0100, Chao Yang, Nan Zhang, Yuxiao Liu, Ao Xiong. 573-579 [doi]
- EASR: Enabling Neural-Enhanced Video Streaming on Mobile Devices with Edge AssistanceJiahong Xu, Miao Hu, Qinglin Zhao, Di Wu 0001. 580-585 [doi]
- Combining AF-based Relay and Multiantenna for Over-the-Air ComputationSuhua Tang, Sadao Obana. 586-591 [doi]
- CoarseUCB: A Context-Aware Bitrate Adaptation Algorithm for VBR-encoded Video StreamingChengrun Yang, Gangqiang Zhou, Miao Hu, Qinglin Zhao, Di Wu 0001. 592-597 [doi]
- A Novel Block Diagonalization Based Beam Nulling Method in Dynamic TDD SystemsJian Li, Xingguang Wei, Min Ren, Chunli Liang, Xing Liu, Xianghui Han, Ruiqi Liu, Xinhui Wang. 598-603 [doi]
- A Task Bundling based Multi-Platform Cooperation Mechanism for Mobile CrowdsensingZixing Zhao, Baoxian Zhang, Chen Liu, Zheng Yao, Cheng Li. 604-609 [doi]
- On Poisoning Attacks and Defenses for LSTM Time Series Prediction Models: Speed Prediction as an ExampleYi-Yu Chen, Hui-Nien Hung, Shun-Ren Yang, Chia-Cheng Yen, Phone Lin. 610-615 [doi]
- Analyzing the Integration of 3D Building Digital Twins in Optimal IoT Networks DeploymentAurélien Chambon, Abderrahim Sahli, Abderrezak Rachedi, Ahmed Mebarki. 616-621 [doi]
- Orthogonal Chirp Division Multiplexing Waveform Design for 6G mmWave UAV Integrated Sensing and CommunicationZiwei Wan, Zhen Gao 0001, Fabien Héliot, Yu Su, Zhonghuai Wu, Lei Chen, Qu Luo, Pei Xiao. 622-627 [doi]
- AKM-FCCI: Secure Authentication and Key Management Mechanism for Fog Computing-Based IoT-Driven Critical InfrastructureVijay Karnatak, Neha Tripathi, Amit Kumar Mishra, Mohammad Wazid, Ashok Kumar Das, Mohsen Guizani, Sachin Shetty. 628-633 [doi]
- Photon-Counting-Based Ultraviolet Communication System with Self Bit Synchronization ModuleJiacheng Lu, Chao Zhang, Mingyang Wang, Shihan Chen, Hongming Zhang. 634-638 [doi]
- An Action Recognition Algorithm Based on Two-Stream Deep Learning for Metaverse ApplicationsJiayue Liu, Tianqi Mao, Yicheng Huang, Dongxuan He. 639-642 [doi]
- A Deployment Method to Improve the Generalizability of Recurrent Neural NetworkYi Hu, Shuai Han 0002, Shiji Wang 0001, Cheng Li 0005. 643-648 [doi]
- Sparse Channel Estimation utilizing Optimal Wiener-Hopf Filtering in MIMO-OTFS ParadigmShuai Han 0002, Sen Meng, Shiji Wang 0001, Weixiao Meng 0001, Cheng Li 0005. 649-654 [doi]
- Pose Estimation of Physiotherapy Exercises using ML TechniquesReem Tluli, Somaya Al-Máadeed. 655-661 [doi]
- Communication-Efficient Topology Orchestration for Distributed Learning in UAV NetworksZixuan Liang, Xinchen Lyu, Chenshan Ren, Na Li, Kai Li. 662-667 [doi]
- Automatic Recognition of FM Signals Based on FFT Spectrum AnalysisDan Tu, Bingxin Wang, Lei Liu. 668-672 [doi]
- Temperature-based evaluation and optimization of multi-processor mobile computingXiaoxuan Peng, Litao Yan, Yi Zhong 0001, Tao Han 0001, Qiang Li 0009, Xiaohu Ge. 673-678 [doi]
- Synergistic Solution: IDS and Scheduler Harmony for Secure 5G Radio ResourcesSaloua Hendaoui, Fatma Hendaoui. 679-684 [doi]
- Optimizing Information Propagation for Blockchain-empowered Mobile AIGC: A Graph Attention Network ApproachJiana Liao, Jinbo Wen, Jiawen Kang 0001, Yang Zhang 0025, Jianbo Du, Qihao Li, Weiting Zhang, Dong Yang. 685-690 [doi]
- An Enhanced Authentication Protocol for IoT-AmI EnvironmentShree Chand Khichar, Awaneesh Kumar Yadav, Manoj Misra, Brij B. Gupta. 691-696 [doi]
- Fall Detection Wristband with Optimized Security and Health MonitoringBashaer Al-Rowaili, Noor Al-Obaidli, Dana Al-Marri, Khalid Abualsaud, Elias Yaacoub. 697-702 [doi]
- 6G Satellite Communication: Key Technologies, Challenges and TrendsXu Xia. 703-705 [doi]
- Few-Shot Object Detection Algorithm Based on Geometric Prior and Attention RPNXiu Chen, Yujie Li 0001, Huimin Lu 0001. 706-711 [doi]
- An seL4-based Trusted Execution Environment on RISC-VEverton de Matos, Willian Tessaro Lunardi, Jouni Ukkonen, Tero Salminen. 712-717 [doi]
- A Comparative Study on the Security of Kubernetes DeploymentsKacper Kamieniarz, Wojciech Mazurczyk. 718-723 [doi]
- A Link Adaptive Approach for Federated Learning aided UAV NetworksHongming Zhang, Xi Meng, Yiran Xian, Pengpeng Li. 724-728 [doi]
- Traffic Counts-based Origin-Destination Matrix Estimation using a Traffic Simulator and Machine LearningHajar Rezzouqi, Assia Naja, Nada Sbihi, Mounir Ghogho. 729-734 [doi]
- A Comparison of Temporal and Spatio-Temporal Methods for Short-Term Traffic Flow PredictionHajar Rezzouqi, Assia Naja, Nada Sbihi, Houda Benbrahim, Mounir Ghogho. 735-741 [doi]
- Towards the Metaverse: Distributed Radio Map Reconstruction based on Federated Learning Generative Adversarial NetworksYang Huang 0001, Yuqi Hou, Qiuming Zhu, Xiaomin Chen, Lei Chen. 742-747 [doi]
- DoS Attack Detection in VANET using Transfer Learning Approach for BSM DataMuhammad Anwar Shahid, Arunita Jaekel, Ning Zhang 0007, Tim Allsopp. 748-753 [doi]
- STEBS: Spatio-Temporal Entropy-Based Scoring Handover Model for LEO SatelliteMohammad A. Massad, Abdallah Y. Alma'aitah, Hossam S. Hassanein. 761-767 [doi]
- MavSec: A safer version of MavLinkChongju Mai, Anwar Haque. 768-773 [doi]
- Domain adaptive deep semi-supervised transfer learning for anomaly detection in OpenWiFiSamhita Kuili, Burak Kantarci, Marcel Chenier, Melike Erol-Kantarci, Bernard Herscovici. 774-779 [doi]
- Graph Neural Network Based Resource Allocation for Full-duplex Device-to-Device CommunicationXinxin Zhang, Xin Zhang 0086. 780-785 [doi]
- Decentralized Spectrum Sharing Networks Based on BlockchainsShuyue Ai, Yuna Jiang, Qiang Li 0009, Xiaohu Ge, Aduwati Sali. 786-791 [doi]
- Joint Optimization of User Association, UAV Placement, and Power Allocation in UAV-Satellite-Assisted Cell-Free mMIMO SystemsHaitao Zhao 0004, Ying Liu, Qin Wang 0002, Haotong Cao, Wenchao Xia, Hongbo Zhu 0002. 792-797 [doi]
- Intelligent CSMA/CA for Wi-Fi networksIbrahim Sammour, Gérard Chalhoub, Oussama Habachi. 798-803 [doi]
- Deep Neural Quality of Service Prediction for Unmanned Aircraft System CommunicationsPatrick Purucker, Christian Reil, Alfred Höß, Björn W. Schuller. 804-810 [doi]
- Simultaneous Transmission and Null Space Tracking Using Interference Feedback for Spatial Division Multiple AccessShuki Zanyovka, Asaf Shabtai. 811-817 [doi]
- Rule Based Maliciousness Detection in Computer Network using Machine Learning in Fog NodeFarooque Hassan Kumbhar, Raza Nathani, Kamran Ali Memon, Wessam Mesbah. 818-823 [doi]
- Radio Frequency Fingerprinting via Deep Learning: Challenges and OpportunitiesSaeif Alhazbi, Ahmed Hussain, Savio Sciancalepore, Gabriele Oligeri, Panos Papadimitratos. 824-829 [doi]
- A Hybrid Machine Learning Intrusion Detection System for Wireless Sensor NetworksHongwei Zhang, Marzia Zaman, Achin Jain, Srinivas Sampalli. 830-835 [doi]
- Resource Allocation in LEO Satellites assisted Terrestrial Network for Latency-Sensitive TaskQingtian Wang, Siyu Chen, Jiaying Zong, Beining Feng, Yunfei Shen, Xu Xia. 836-841 [doi]
- Detection and positioning of vulnerable road users in vehicular networksRui Freitas, Maria João Nicolau, António Costa 0001. 842-848 [doi]
- Hyperparameter Impact on Computational Efficiency in Federated Edge LearningAhmed Rafik El-Mehdi Baahmed, Jean-François Dollinger, Mohamed-el-Amine Brahmia, Mourad Zghal. 849-854 [doi]
- Routing Edge-Cloud Requests via Multi-Objective Reinforcement LearningSimon Pichot, Vania Conan, Hicham Khalifé, André-Luc Beylot, Gentian Jakllari. 861-866 [doi]
- A Cooperative C-V2X System with UAV-aided Enhanced ConnectivityRomeo Giuliano, Anna Maria Vegni, Valeria Loscrí, Eros Innocenti, Alessandro Vizzarri, Franco Mazzenga. 867-872 [doi]
- AI and IoT Uses, Challenges and Opportunities for e-Health: a reviewFaten Ziadi, Hend Fourati, Leïla Azouz Saïdane. 873-878 [doi]
- Proximity Marketing: A Diverse Classification ApproachFatima Chahal, Hacène Fouchal, Dominique Gaïti. 879-884 [doi]
- Model-Based Approach for Efficient Data Exploitation Process in IoT SystemsAudrey Terracher, Rémy Kocik, Rédha Hamouche, Abderrezak Rachedi, Tarik Bourouina. 885-890 [doi]
- Towards Efficient Urban Network Mobility: A Cloud-Based Ride-Sharing SystemOmar Ait Oualhaj, Ali Azougaghe, Assia Naja, Abdelfettah Mabrouk. 891-896 [doi]
- Cross-layer Adaptable Contention Window for High-definition Map QoS EnhancementJeffrey Redondo, Zhenhui Yuan, Nauman Aslam, Juan Zhang. 897-902 [doi]
- Improving Response Prediction: Transformer Integration and Optimizer EvaluationBoutheina Ben Ismail, Mohamed Hamroun 0001, Bassem Ben Salah, Hedi Sakli. 903-908 [doi]
- Age-Aware Edge Caching and Multicast Scheduling Using Deep Reinforcement LearningSeyedeh Bahereh Hassanpour, Ahmad Khonsari, Masoumeh Moradian, Aresh Dadlani, Galymzhan Nauryzbayev. 909-914 [doi]
- A Research Environment for Evaluating File-based Cryptojacking Detection TechniquesLukasz Pietraszek, Wojciech Mazurczyk. 915-920 [doi]
- Research on Adaptive Self-Interference Cancellation and Sensing Methods in ISAC SystemChenguang He, Yuchuan Ma, Shouming Wei, Jian Zhang. 921-926 [doi]
- The optimization of Networked TT&C System for Mega LEO ConstellationMan Ru, Yafeng Zhan, Fang Xin. 927-932 [doi]
- Design of Base Station Sleeping Scheme in Heterogeneous Cellular Networks Based on User Traffic and SINRChenguang He, Bohan Zhang, Shouming Wei. 933-938 [doi]
- Investigations on Wireless communication Transmission for Wireless Health MonitoringIntissar Krimi, Sofiane Ben Mbarek, Fethi Choubani. 939-943 [doi]
- Experimental Analysis of Chirp Waveforms for Wireless Power TransferPetros Stylianou, Elio Faddoul, Ioannis Krikidis. 944-948 [doi]
- FedLbs: Federated Learning Loss-Based Swapping Approach for Energy Building's Load ForecastingBouchra Fakher, Mohamed-el-Amine Brahmia, Mustafa Al Samara, Ismail Bennis, Abdelhafid Abouaissa. 949-954 [doi]
- Advanced Deep Learning Framework for Improved Wildfire Detection and Aerosol Identification Using Active Satellite ImagerySrija Venkata Sai Ravali Kothapalli, Cristina Hava Muntean, Abid Yaqoob. 955-960 [doi]
- An Efficient and Secure Federated Learning Communication FrameworkHassan N. Noura, Khalil Hariss. 961-968 [doi]
- Lightweight Image Crypto-Compression Using Haar Transform and Selective Encryption for Grayscale IoT ImagesJoseph Azar, Hassan N. Noura, Raphaël Couturier. 969-974 [doi]
- Technical Analysis of Non-terrestrial NetworksPingping Lin. 975-979 [doi]
- A Dynamic Redeployment System for Mobile Ambulances in Qatar, Empowered by Deep Reinforcement LearningReem Tluli, Ahmed Badawy, Saeed Salem, Mohamed Hardan, Sailesh Chauhan, Guillaume Alinier. 980-985 [doi]
- Leveraging V2P communications to improve the VRU's safetyJoel Puga, Armando André Fontainhas, António Costa 0001, Alexandre J. T. Santos, Maria João Nicolau, Filipe Meneses. 986-992 [doi]
- Enhancing Security in Multi-Controller SDMN Environments: A Novel 5G Access Authentication ProtocolMaroua Moatemri, Hamdi Eltaief, Habib Youssef. 993-998 [doi]
- Holochain-Based Secure and Energy Efficient IoT NetworkAmbono M. Kple, Deepak G. C., Bhaskar prasad Rimal. 999-1004 [doi]
- Comparative Analysis of Fault-Localization Techniques in AdderMuhammad Ali Akbar, Jeong-A Lee, Amine Bermak. 1005-1009 [doi]
- RFID IoT Architecture for Smart Inventory Management: Security IntegrationAmira Henaien, Hadda Ben Elhadj, Lamia Chaari Fourati. 1010-1015 [doi]
- Nash Bargaining Game for Cooperative Resource Allocation in Underwater Acoustic CommunicationKhouloud Gharsalli, Thierry Le Pors, Sameh Najeh, Pierre-Jean Bouvet, Hichem Besbes. 1016-1021 [doi]
- SERS: Secure & Efficient Random and Symbol Linear Network Coding SchemesOla Salman, Hassan N. Noura, Ali Chehab. 1022-1029 [doi]
- Breast Cancer Segmentation in Mammograms using Antlion Optimization and CNN/GRU ArchitecturesRadhia Khdhir, Salwa Othmen, Aymen Belghith, Jamilah Alamri. 1030-1035 [doi]
- The Influence of Temporal Dependency on Training Algorithms for Spiking Neural NetworksYongtao Wei, Siqi Wang, Farid Naït-Abdesselam, Aziz Benlarbi-Delaï. 1036-1041 [doi]
- Efficient IoV-Based Geofencing Model for V2X Communication Using Energy Saving ApproachRima Boughariou, Hend Marouane, Mohamed Mosbah, Hassène Mnif, Amel Meddeb-Makhlouf. 1042-1047 [doi]
- A Bayesian Optimization Algorithm to Improve the Spatial Reuse in the Next-Generation WLANsJianZhao Liu, Yang Liu, Junxiong Zhang, Xiaohu Ge, Aibo Xu, Mingming Zhao. 1048-1053 [doi]
- Multi-Domain Scaling Algorithm with Inter-Orchestrator Communication for Beyond 5G/6G NetworksAbdelmounaim Bouroudi, Abdelkader Outtagarts, Yassine Hadjadj Aoul. 1054-1061 [doi]
- Byzantine-Robust Federated Learning Based on Dynamic Gradient FilteringFrancesco Colosimo, Floriano De Rango. 1062-1067 [doi]
- Load-Balanced Multipath Routing Through Software-Defined NetworkingTanmay Badageri, Bechir Hamdaoui, Rami Langar. 1068-1073 [doi]
- Effects of Misalignment on Output Voltage Stability in SS Controlled Wireless Power Transfer Systems with Different Control StrategiesVittorio Bertolini, Fabio Corti, Ermanno Cardelli. 1074-1079 [doi]
- Scheduled Trigger Frames: Enabling Worst-case Latency Bounds for Wi-Fi Industrial UseBen Schneider, Björn Richerzhagen, Michael Bahr, Georg Carle. 1080-1085 [doi]
- Gesture-based notification system for ParalyticsSean Ernest Clyde Nodado, Aniel James Villamor. 1086-1093 [doi]
- Vertical Network Slicing and its Impact on 5G Data Traffic and PerformanceMuhammad Asif, Júlio Chilela, Driss Benhaddou, Ji Chen. 1094-1099 [doi]
- Real-Time Binary Cell Phone Usage Detection and Classification on Vehicular Edge DevicesMurat Arda Onsu, Pankti Shah, Murat Simsek, Mark Fobert, Burak Kantarci. 1100-1105 [doi]
- SiamFLTP: Siamese Networks Empowered Federated Learning for Trajectory PredictionMehdi Salim Benhelal, Badii Jouaber, Hossam Afifi, Hassine Moungla. 1106-1111 [doi]
- ERD-FL: Entropy-Driven Robust Defense for Federated LearningOkba Ben Atia, Mustafa Al Samara, Ismail Bennis, Jaafar Gaber, Abdelhafid Abouaissa, Pascal Lorenz. 1112-1117 [doi]
- Empowering Energy Consumption Forecasting in Smart Buildings: Towards a Hybrid Loss FunctionAline Abboud, Mohamed-el-Amine Brahmia, Abdelhafid Abouaissa, Ahmad Shahin, Rocks Mazraani. 1118-1123 [doi]
- Scaled Conjugate Gradient Digital Cancellation Algorithm Study for 6G Full Duplex Wireless Communication SystemDi Wu. 1124-1128 [doi]
- Introducing the Concept of a Hybrid Navigation System Adapted to Blind Users for Optimal Stress-free Indoor and Outdoor MobilityYoussef Keryakos, Youssef Bou Issa, Michel Salomon, Abdallah Makhoul. 1129-1134 [doi]
- A Transformer-Based Approach for Better Hand Gesture RecognitionSinda Besrour, Yogesh Surapaneni, Gael S. Mubibya, Fahim Ashkar, Jalal Almhana. 1135-1140 [doi]
- Exploring the Frontiers of Firmware Fuzzing: μAFL's Application on Cortex M4 and Unix ProgramsSafayat Bin Hakim, Muhammad Adil 0002, Jordi Mongay Batalla, Constandinos X. Mavromoustakis, Houbing Herbert Song. 1141-1148 [doi]
- Enhancing Reliability in Smart Agriculture: Detecting Failures and Anomalies in Irrigation SystemAhmed Dammak, Yaser Al Mtawa. 1149-1154 [doi]
- Unsupervised Learning Approach for Network Traffic ClassificationMario Bou Abboud, Oumaya Baala, Maroua Drissi, Sylvain Allio. 1155-1160 [doi]
- Security for Underground Utility Data Transmission in IoT Sensor NetworksSrijeet Qazi, Kedir Mamo Besher, Mohammed Zamshed Ali. 1161-1165 [doi]
- Block-Sparse Learning Enabled Approach Towards Efficient Channel Estimation for Underwater Visible Light CommunicationsSicong Liu 0002, Younan Mou, Hong Zhang. 1166-1170 [doi]
- Sparsity-Aware Channel Estimation for Underwater Acoustic Wireless Networks: A Generative Adversarial Network Enabled ApproachSicong Liu 0002, Younan Mou, Hong Zhang. 1171-1176 [doi]
- Exploring LSTM-assisted A2C For Physical Layer Security in Vehicular Cyber-Physical SystemsHarrison Kurunathan, Kai Li 0002, Wei Ni 0001, Na Li, Eduardo Tovar, Mohsen Guizani. 1177-1182 [doi]
- Power Transmission Assessment for Body Channel CommunicationIntissar Krimi, Sofiane Ben Mbarek, Fethi Choubani. 1183-1188 [doi]
- Enhancing Precision in Tactile Internet-Enabled Remote Robotic Surgery: Kalman Filter ApproachMuhammad Hanif Lashari, Wafa Batayneh, Ashfaq Khokhar 0001. 1189-1196 [doi]
- DDoS Attack Prevention in Autonomous Vehicle's OTA Updates: Combining PBFT Consensus and Distributed Firewall in Hyperledger Fabric BlockchainSadia Yeasmin, Anwar Haque. 1197-1202 [doi]
- Survey on Demand Response in the Landscape of Adaptive and Intelligent Building Energy Management SystemsMuhammad Ibrar, Hayla Nahom Abishu, Abegaz Mohammed Seid, Sergio Márquez Sánchez, Javier Hernandez Fernandez, Juan Manuel Corchado, Aiman Erbad. 1203-1209 [doi]
- Multi-Agent DRL-based Multi-Objective Demand Response Optimization for Real-Time Energy Management in Smart HomesHayla Nahom Abishu, Abegaz Mohammed Seid, Sergio Márquez Sánchez, Javier Hernandez Fernandez, Juan Manuel Corchado, Aiman Erbad. 1210-1217 [doi]
- Deep Learning Dataset Generation for Physical Layer Authentication in Wireless Sensor Networks (WSN)Christopher Dentremont, Hong Liu. 1218-1223 [doi]
- A Hybrid HSV and YCrCb OpenCV-based Skin Tone Recognition Mechanism for Makeup Recommender SystemsSanica Kamble, Cristina Hava Muntean, Anderson Augusto Simiscuka. 1224-1229 [doi]
- Dynamic Switching Access in Massive Machine Type CommunicationNasim Ravi, Marília Curado, Edmundo Monteiro. 1230-1235 [doi]
- Deep Reinforcement Learning for IRS-assisted Secure NOMA Transmissions Against EavesdroppersDefeng Zhou, Shimin Gong, Lanhua Li, Bo Gu, Mohsen Guizani. 1236-1241 [doi]
- Data Source Authentication Protocol for Aviation Broadband Communication SystemYongqiang Huang, Ruiqi Li, Zhijun Wu, Meng Yue. 1242-1247 [doi]
- AfriDial: African Dialect Model based on Deep Learning for Sentiment AnalysisAmeni Sassi, Junior Tonga, Stéphanie Poaty, Sanon Steve, Djibrine Idriss Abakar Adjid, Moukhtar Cherif, Wael Ouarda. 1248-1254 [doi]
- Optimization Approaches for the Optimal Placement of Electrical Charging StationsSobhi Mejjaouli, Sanabel Alnourani, Malek Almobarek, Sghaier Guizani. 1255-1262 [doi]
- Towards a Responsive Security Operations Center for UAVsFadhila Tlili, Samiha Ayed, Lamia Chaari Fourati. 1263-1268 [doi]
- Optimizing QoS of the LTE network using a machine-learning-based spatio-temporal distribution and Tabu search metaheuristicKodjo E. F. Tossou, Sid Lamrous, Tchamye Boroze, Oumaya Baala. 1269-1274 [doi]
- Outage Probability in Network Coding Based Cooperative Wireless Networks over Nakagami-m Fading ChannelsElias Benamira, Fatiha Merazka, Gunes Karabulut Kurt. 1275-1282 [doi]
- Reinforcement Learning-Based Genetic Algorithm for Differentiated Traffic Scheduling in Industrial TSN-5G NetworksJiawen Guo, Haipeng Yao, Wenji He, Tianle Mai, Tianhao Ouyang, Fu Wang. 1283-1289 [doi]
- Impact of Neural Network Depth on Split Federated Learning Performance in Low-Resource UAV NetworksHouda Hafi, Bouziane Brik, Miloud Bagaa, Adlen Ksentini. 1290-1295 [doi]
- Machine-Learning-Based Smart Energy Management Systems: A ReviewFatema El Husseini, Hassan N. Noura, Flavien Vernier. 1296-1302 [doi]
- Enhancing Movie Recommendations: A Deep Neural Network Approach with MovieLens Case StudyMohamed Mouhiha, Omar Ait Oualhaj, Abdelfettah Mabrouk. 1303-1308 [doi]
- Adaptive cloud-based mobile video streaming service using real-time QoE estimationNouha Samet, Asma Ben Letaifa, Mohamed Hamdi, Sami Tabbane. 1309-1314 [doi]
- Beyond Holographic Hybrid Precoding: New Role of Downlink Multiuser InterferenceDongbo Geng, Zhongxiang Wei, Haiyong Zeng. 1315-1319 [doi]
- Deep Learning Model for Energy Consumption Prediction and Carbon Emission EstimationBayan Mahfood, Ayad Turky, Manar Abu Talib, Chaouki Ghenai. 1320-1326 [doi]
- Downlink Coverage Probability in Aerial Base StationInes Damak, Ridha Bouallegue. 1327-1332 [doi]
- Federated Active Learning with Transfer Learning: Empowering Edge Intelligence for Enhanced Lung Cancer DiagnosisFarah Farid Babar, Faisal Jamil, Tariq Alsboui, Faiza Fareed Babar, Shabir Ahmad, Reem Ibrahim Alkanhel. 1333-1338 [doi]
- 2: Improved Link Recovery in Software-Defined Networks with Stacked Generalization EnsembleMuhammad Ibrar, Aamir Akbar, Nadir Shah, Aiman Erbad, Kamran Ali. 1339-1344 [doi]
- Beamwidth Trade-offs Analysis of THz MAC Protocols for Wireless Data CenterMuhammad Absaruddin, Saim Ghafoor, Mubashir Husain Rehmani. 1345-1350 [doi]
- Leveraging AI for Enhanced Semantic Interoperability in IoT: Insights from NER ModelsMohammad Ali Nemer, Joseph Azar, Abdallah Makhoul, Julien Bourgeois. 1351-1357 [doi]
- An Improved Risk Assessment Scheme Balancing Safety and SecurityKunpeng Cao, Guobing Jiang, Leyi Zhang. 1358-1363 [doi]
- Stealthy Adversarial Attacks on Intrusion Detection Systems: A Functionality-Preserving ApproachXiping Li, Wei Dong, Yi Sun, Shaolong Chen, Detong Kong, Shujie Yang. 1364-1369 [doi]
- Class-Incremental Learning for Baseband Modulation Classification: A ComparisonCharles Montes, Todd Morehouse, Ruolin Zhou. 1370-1375 [doi]
- A Hidden Parameter Study for Traffic-oriented LoRaWAN DeploymentKerima Saleh Abakar, Ismail Bennis, Abdelhafid Abouaissa, Pascal Lorenz. 1376-1381 [doi]
- Optimizing Internet Traffic Predictions with a Novel Deep Learning EMD-KNN FrameworkSajal Saha, Sudipto Baral, Anwar Haque. 1382-1387 [doi]
- An Air-Sea-Ground Integrated Observation System Based on Ad Hoc Network for the Archipelagic EnvironmentYufan Yuan, Jianzhang Liu, Chenhao Hong, Guangjie Han, Fengzhong Qu, Yan Wei, Shaojian Yang. 1388-1393 [doi]
- Handover Management in a Sliced 5G Network Using Deep Reinforcement LearningArwa Amaira, Koubaa Hend, Faouzi Zarai. 1394-1399 [doi]
- Establishing the Future of Work and Collaboration through Institutional MetaverseZafer Karadayi, Mehmet Özdem, Ismail Burak Karaceylan, Zeynep Yagmur Duman. 1400-1403 [doi]
- Deep Reinforcement Learning for Sleep Control in 5G and Beyond Radio Access Networks: An OverviewNessrine Trabelsi, Rihab Maaloul, Lamia Chaari Fourati, Wael Jaafar. 1404-1411 [doi]
- Deep Learning-Driven Resource Allocation for MEC-Enabled UAV Collision Avoidance SystemKhadidja Zairi, Bouziane Brik, Younes Guellouma, Hadda Cherroun. 1412-1417 [doi]
- Enhancing IoT Intelligence: A Transformer-based Reinforcement Learning MethodologyGaith Rjoub, Saidul Islam, Jamal Bentahar, Mohammed Amin Almaiah, Rana Al-Rawashdeh. 1418-1423 [doi]
- A Trust and Data Quality-Based Dynamic Node Selection and Aggregation Optimization in Federated LearningAsadullah Tariq, Farag M. Sallabi, Mohamed Adel Serhani, Ezedin Barka. 1424-1430 [doi]
- 5G MIMO Antenna Design for Aerial Base StationsChamseddine Oueslati, Nabil Dakhli, Mondher Labidi. 1431-1436 [doi]
- Deep Reinforcement Learning Approach for UAV Search Path Planning In Discrete Time and SpaceNajoua Benalaya, Ichrak Amdouni, Cédric Adjih, Anis Laouiti, Leïla Azouz Saïdane. 1437-1442 [doi]
- A Massive MIMO Sampling Detection Strategy Based on Denoising Diffusion ModelLanxin He, Zheng Wang 0013, Yongming Huang 0001. 1443-1448 [doi]
- Dynamic FlexEthernet Defragmentation Under Time-Varying Traffic in Multi-layer Multi-domain NetworksDahina Koulougli, Kim Khoa Nguyen, Mohamed Cheriet. 1449-1454 [doi]
- Efficient Joint Hybrid Precoding And Analog Combining Scheme For Massive MIMO SystemsYuanli Ma, Qiqiang Chen, Bin Yan, Zheng Wang, Lanxin He. 1455-1459 [doi]
- Temporal Hierarchical Graph Attention Network for Traffic Prediction with Prompt LearningCheng Li, Pei-Yuan Lai, Yu-Xuan Zhou, Chang-Dong Wang. 1460-1465 [doi]
- Strategic Cooperation in the Metaverse: A Game Theory Analysis with Age Of InformationManuele Favero, Chiara Schiavo, Lavinia Verzotto, Alessandro Buratto, Thomas Marchioro, Leonardo Badia. 1466-1471 [doi]
- Locating the Root Cause of Poor Coverage in Mobile Communication Networks Based on Spatio-temporal Graph Message PropagationZhipu Xie, Bin Yang 0038, Jinchao Huang 0001, Huiying Zhao, Lexi Xu, Yue Wang, Xin Wang, Ruiqi Liu. 1472-1477 [doi]
- Grubbs Test Based Algorithms to Improve the Efficiency of Blockchain OraclesNour-El-Houda Yellas, Éric Renault, Selma Boumerdassi. 1478-1482 [doi]
- CTIoT: A Cyber Threat Intelligence Tool for IoTSaad El Jaouhari, Shaikh Ahmed. 1483-1489 [doi]
- Energy performance of Internet of Things (IoT) networks for pipeline monitoringGodlove Suila Kuaban, Tadeusz Czachórski, Erol Gelenbe, Piotr Pecka, Valery Nkemeni, Piotr Czekalski. 1490-1497 [doi]
- Outdoor Environment Reconstruction with Deep Learning on Radio Propagation PathsHrant Khachatrian, Rafayel Mkrtchyan, Theofanis P. Raptis. 1498-1503 [doi]
- Pilot Contamination in Massive MIMO Systems: Challenges and Future ProspectsMuhammad Kamran Saeed, Ashfaq Khokhar 0001, Shakil Ahmed. 1504-1509 [doi]
- Vault-PMS: A Vault-Based Password Management System for Secure Offline Data StorageMohamad Abdulkadir, Saeed Alketbi, Hanane Lamaazi, Rashed Altamimi, Saeed Alblooshi, Abderrahmane Lakas. 1510-1515 [doi]
- Deep Learning Image Classification Models for Solar Panels Dust DetectionJad Bassil, Hassan N. Noura, Ola Salman, Khaled Chahine, Mohsen Guizani. 1516-1521 [doi]
- Predicting Power Consumption Using Machine Learning TechniquesZaid Allal, Hassan Noura 0001, Ola Salman, Flavien Vernier. 1522-1527 [doi]
- Optimizing Shapley Value for Client Valuation in Federated Learning through Enhanced GTG-ShapleyMeriem Arbaoui, Mohamed-el-Amine Brahmia, Abdellatif Rahmoun, Mourad Zghal. 1528-1533 [doi]
- Cybersecurity in Smart Renewable Energy SystemsJean-Paul A. Yaacoub, Hassan N. Noura, Joseph Azar, Ola Salman, Khaled Chahine. 1534-1540 [doi]
- Dependency-Aware Task Offloading in Cooperative UAV-HAPS-Assisted Vehicular NetworksInsaf Rzig, Wael Jafaar, Maha Jebalia, Sami Tabbane. 1541-1546 [doi]
- Design and Implementation of Recursive Filters using Processing In MemoryMojtaba Mahdavi. 1547-1552 [doi]
- Performance Analysis of Multi-Source Two-way NOMA-AF Relaying NetworksRania Jadlaoui, Wided Hadj Alouane, Hatem Boujemaa. 1553-1557 [doi]
- Lightweight CNN-BiLSTM based Intrusion Detection Systems for Resource-Constrained IoT DevicesMohammed Jouhari, Mohsen Guizani. 1558-1563 [doi]
- Improving NDN Resilience: A Novel Mitigation Mechanism Against Cache Pollution AttackAbdelhak Hidouri, Haifa Touati, Mohamed Hadded, Nasreddine Hajlaoui, Paul Muhlethaler, Samia Bouzefrane 0001. 1564-1569 [doi]
- Defense against Black Hole Attacks in Wireless Sensor Network with Anomaly Report CyclingMarcel A. Vieira, Hong Liu. 1570-1576 [doi]
- Deep Learning based Modeling of Wireless Communication Channel with FadingYoungmin Lee, Xiaomin Ma, Andrew S. I. D. Lang, Enrique F. Valderrama-Araya, Andrew L. Chapuis. 1577-1582 [doi]
- TinyML enabled smart parking dynamic slots computing and license plate recognitionAmira Henaien, Hadda Ben Elhadj, Lamia Chaari Fourati. 1583-1588 [doi]
- Performance Study in Heterogeneous Vehicular Networks Using Dual Connectivity and Deep Reinforcement LearningArwa Amaira, Koubaa Hend, Faouzi Zarai. 1589-1594 [doi]
- Real-time Twitter data sentiment analysis to predict the recession in the UK using Graph Neural NetworksAvleen Malhi, Mohammad Naiseh, Kunal Jangra. 1595-1600 [doi]
- Leveraging Transfer Learning with Federated DRL for Autonomous Vehicles PlatooningMohamed El Amine Ameur, Habiba Drias, Bouziane Brik, Mazene Ameur. 1601-1606 [doi]
- An ML-based Spectrum Sharing Technique for Time-Sensitive Applications in Industrial ScenariosOluwatobi Baiyekusi, Haitham Mahmoud, De Mi, Junaid Arshad, Femi Adeyemi-Ejeye, Haeyoung Lee. 1607-1612 [doi]
- Dynamic Clustering-based Task Orchestrator in Mobile Edge ComputingMona Alghamdi, Atm Shafiul Alam, Arumugam Nallanathan, Asma Cherif 0001. 1613-1618 [doi]
- An Enhanced Online K-Means Algorithm for Flooding Attacks Detection in Vehicular NetworksHarir Razzazi, Qingli Zeng, Farid Naït-Abdesselam. 1619-1624 [doi]
- A Study of Angle of Arrival Estimation of a RF Signal with FPGA AccelerationJin Feng Lin, Todd Morehouse, Charles Montes, Erika Caushi, Artem Dudko, Eric Savage, Ruolin Zhou. 1625-1630 [doi]
- Radio Frequency Fingerprinting in WBANs Using Complex-Valued Convolutional Neural NetworksSeyedMohammad Kashani, Syed Mujtaba Haid Sherazi, Ashfaq Khokhar 0001, Sang Wu Kim, Farid Naït-Abdesselam. 1631-1636 [doi]
- Utility-Based Multipath Delivery of Prioritized XR Content in a Machine Learning and Network Slicing-enhanced EnvironmentAnderson Augusto Simiscuka, Abid Yaqoob, Gabriel-Miro Muntean. 1637-1642 [doi]
- Securing Next-Generation Networks against Eavesdroppers: FL-Enabled DRL ApproachDeemah H. Tashman, Soumaya Cherkaoui. 1643-1648 [doi]
- Task Integrity Checker: A Block Chain - Enabled Trust Management System for Fog NodesV. Rasagna, G. Geethakumari, Jinil Bhavin Shah, Nisarg Chaudhari. 1649-1654 [doi]
- A Low-Latency Edge-Cloud Serverless Computing Framework with a Multi-Armed Bandit SchedulerJustin Chigu, Ahmed El-Mahdy, Bassem Mokhtar, Maha Elsabrouty. 1655-1660 [doi]
- Enhancing Traffic Load Forecasting in 5G Networks: A Statistical and Temporal Feature Engineering ApproachAhmed Bali, Mohamed Cheriet, Abdelouahed Gherbi. 1661-1667 [doi]
- PHD Filter-Based Spatial-Temporal Calibration of 5G Base Stations for Urban Canyon LocalizationJiajia Chen, Ao Peng. 1668-1673 [doi]
- Wireless Sensing for Structural Health Monitoring of Bridges by Unmanned Aerial Vehicle (UAV) via BLE CommunicationBryce Afonso, Hong Liu. 1674-1678 [doi]
- A 3-D Geometrical-Based Stochastic Model for Satellite-to-Ground MIMO ChannelsXinhua Liu, Ruonan Zhang, Daosen Zhai, Yi Jiang 0005, Xiao Tang 0001, Bin Li 0017, Haotong Cao. 1679-1684 [doi]
- AGORA: A Multi-Provider Edge Computing Resource Management and Pricing FrameworkPanagiotis Charatsaris, Matthew Salcido, Maria Diamanti, Abid Mohammad Ali, Eirini-Eleni Tsiropoulou, Symeon Papavassiliou. 1685-1690 [doi]
- Resource Allocation for Satellite Communication Network of Emergency Communications in Distribution NetworkHaoran Xie 0004, Yafeng Zhan, Xin Fang. 1691-1696 [doi]
- Peer-to-Peer Energy Optimization in V2X Using Reinforcement LearningAlaa Ghabi, Zakariyya Alatoom, Mohsen Guizani, Habib Hamam. 1697-1704 [doi]
- SDN-Enabled Cluster-based Evolving Graph Routing Scheme (SE-CEGRS)Zahid Khan, Nauman Khan, Anis Koubaa, Adel Ben Mnaouer, Wadii Boulila. 1705-1711 [doi]
- Fault Classification on Power Transmission Lines Using DC Component ExtractionKhaled Chahine, Asmaa AlSafran, Ghadeer Alattar, Mariam Alozairi, Shaikhah AlRefaei. 1712-1715 [doi]
- Real-time Emergency Message Dissemination in IoV: A Cluster-based Approach with SDN and Fog ComputingAfshan Ahmed, Muhammad Ibrar, Muhammad Munwar Iqbal, Aiman Erbad, Sohail Jabbar. 1716-1722 [doi]
- Low-Complexity Mean Calculation Schemes Using In Memory ComputingMojtaba Mahdavi. 1723-1728 [doi]
- Optimizing Efficiency Using a Low-Cost RFID-Based Inventory Management SystemImasha Bandara, Oluyomi Simpson, Yichuang Sun. 1729-1733 [doi]
- Edge-Based Human Activity Recognition: A Novel Approach Using Spectral Analysis and Deep LearningYassmine Ben Dhiab, Mohamed Ould-Elhassen Aoueileyine, Manel Abdelkader, Ridha Bouallegue. 1734-1739 [doi]
- SemFusion: Multi-Source Semantic Information Fusion and CommunicationJie Chen, Shuai Yang, Tse-Tin Chan, Haoyuan Pan. 1740-1745 [doi]
- Ontology Alignment: First Step towards Voice Control for Smart-Home Assistive ScenariosAbdelhafid Dahhani, Hubert Kenfack Ngankam, Sylvain Giroux, Ilham Alloui, Sébastien Monnet, Flavien Vernier. 1746-1752 [doi]
- Temporal-correlation Modeling for Improved CFO Estimation: The BiModule CFO Estimation (BMCE) FrameworkMostafa Hussien, Ahmed A. Abdelmoaty, Mahmoud Elsaadany, Mohammed F. A. Ahmed, Ghyslain Gagnon, Mohamed Cheriet. 1753-1758 [doi]
- Lightweight WEB3 interface for secure IoMT-Blockchain integrationFatma Ellouze 0001, Ghofrane Fersi, Mohamed Jmaiel. 1759-1766 [doi]
- Refine and Identify: An Accelerated Iterative Algorithm for Securing Federated LearningAla Gouissem, Zina Chkirbene, Tamer Khattab, M. Mabrok, M. Abdallah, Ridha Hamila. 1767-1772 [doi]
- A Life-long Learning Intrusion Detection System for 6G-Enabled IoVAbdelaziz Amara Korba, Souad Sebaa, Malik Mabrouki, Yacine Ghamri-Doudane, Karima Benatchba. 1773-1778 [doi]
- AI-Driven Fast and Early Detection of IoT Botnet Threats: A Comprehensive Network Traffic Analysis ApproachAbdelaziz Amara Korba, Aleddine Diaf, Yacine Ghamri-Doudane. 1779-1784 [doi]
- Thwarting Cybersecurity Attacks with Explainable Concept DriftIbrahim Shaer, Abdallah Shami. 1785-1790 [doi]
- An Adaptive Data Rate scheme for multi-hop forwarding in LoRaWAN networksRafik Louati, Mariem Thaalbi, Nabil Tabbane. 1791-1796 [doi]
- 6G-enabled Situation-Aware ML-assisted UTM (6G-SAMU)Bayrem Zarai, Leïla Nasraoui, Rihab Boussada, Saadi Boudjit. 1797-1802 [doi]
- An Efficient Elastic Scaling, Service Deployment, and Task Allocation Algorithm for Mobile Edge ComputingWentao Cai, Baoxian Zhang, Yan Yan 0009, Cheng Li 0005. 1803-1808 [doi]
- A Novel Approach to Model the Scattering Environment in Channel Modeling for Integrated Sensing and CommunicationsChuangxin Jiang, Junchen Liu, Junpeng Lou, Ruiqi Liu, Qi Yang, Xinhui Wang. 1809-1813 [doi]
- Enhancing Privacy in Healthcare: A Multilevel Approach to (Pseudo)AnonymizationPedro Henrique Rodrigues Emerick, Silvio Costa Sampaio, Bruno Lopes Dalmazo, Andre Riker, Augusto José Venâncio Neto, Roger Immich. 1814-1819 [doi]
- xG Security: Zero-Trust and Moving Target Defense in Decentralized Learning EnvironmentZeyad Abdelhay, Ahmed Refaey. 1820-1825 [doi]
- A Comparative Analysis of Data Models for Heterogeneous Sensor Data ManagementHossameldin Ouda, Abdelrahman Elewah, Khalid Elgazzar. 1826-1833 [doi]