Abstract is missing.
- Better Anomaly Detection for Access Attacks Using Deep Bidirectional LSTMsHenry Clausen, Gudmund Grov, Marc Sabate, David Aspinall 0001. 1-18 [doi]
- Using Machine Learning to Quantify the Robustness of Network ControllabilityAshish Dhiman, Peng Sun, Robert E. Kooij. 19-39 [doi]
- Configuration Faults Detection in IP Virtual Private Networks Based on Machine LearningEl-Heithem Mohammedi, Emmanuel Lavinal, Guillaume Fleury. 40-56 [doi]
- Improving Android Malware Detection Through Dimensionality Reduction TechniquesVasileios Kouliaridis, Nektaria Potha, Georgios Kambourakis. 57-72 [doi]
- A Regret Minimization Approach to Frameless Irregular Repetition Slotted Aloha: IRSA-RMIman Hmedoush, Cédric Adjih, Paul Mühlethaler. 73-92 [doi]
- Mobility Based Genetic Algorithm for Heterogeneous Wireless NetworksKamel Barka, Lyamine Guezouli, Samir Gourdache, Sara Ameghchouche. 93-106 [doi]
- Geographical Information Based Clustering Algorithm for Internet of VehiclesRim Gasmi, Makhlouf Aliouat, Hamida Seba. 107-121 [doi]
- Active Probing for Improved Machine-Learned Recognition of Network TrafficHamidreza Anvari, Paul Lu. 122-140 [doi]
- A Dynamic Time Warping and Deep Neural Network Ensemble for Online Signature VerificationMandlenkosi Victor Gwetu. 141-153 [doi]
- Performance Evaluation of Some Machine Learning Algorithms for Security Intrusion DetectionOuafae Elaeraj, Cherkaoui Leghris, Éric Renault. 154-166 [doi]
- Three Quantum Machine Learning Approaches for Mobile User Indoor-Outdoor DetectionFrank Phillipson, Robert S. Wezeman, Irina Chiscop. 167-183 [doi]
- Learning Resource Allocation Algorithms for Cellular NetworksThi Thuy Nga Nguyen, Olivier Brun, Balakrishna J. Prabhu. 184-203 [doi]
- Enhanced Pub/Sub Communications for Massive IoT Traffic with SARSA Reinforcement LearningCarlos E. Arruda, Pedro F. Moraes, Nazim Agoulmine, Joberto S. B. Martins. 204-225 [doi]
- Deep Learning-Aided Spatial Multiplexing with Index ModulationMerve Turhan, Ersin Öztürk, Hakan Ali Çirpan. 226-236 [doi]
- A Self-gated Activation Function SINSIG Based on the Sine Trigonometric for Neural Network ModelsKhalid Douge, Aissam Berrahou, Youssef Talibi Alaoui, Mohammed Talibi Alaoui. 237-244 [doi]
- Spectral Analysis for Automatic Speech Recognition and EnhancementJane Oruh, Serestina Viriri. 245-254 [doi]
- Road Sign Identification with Convolutional Neural Network Using TensorFlowMohammed Kherarba, Mounir Tahar Abbes, Selma Boumerdassi, Mohammed Meddah, Abdelhak Benhamada, Mohammed Senouci. 255-264 [doi]
- A Semi-automated Approach for Identification of Trends in Android Ransomware LiteratureTanya Gera, Jaiteg Singh, Deepak Thakur, Parvez Faruki. 265-283 [doi]
- Towards Machine Learning in Distributed Array DBMS: Networking ConsiderationsRamon Antonio Rodriges Zalipynis. 284-304 [doi]
- Deep Learning Environment Perception and Self-tracking for Autonomous and Connected VehiclesIhab Benamer, Arslane Yahiouche, Afifa Ghenai. 305-319 [doi]
- Remote Sensing Scene Classification Based on Effective Feature Learning by Deep Residual NetworksRonald Tombe, Serestina Viriri. 320-336 [doi]
- Identifying Device Types for Anomaly Detection in IoTChin-Wei Tien, Tse-Yung Huang, Ping Chun Chen, Jenq-Haur Wang. 337-348 [doi]
- A Novel Heuristic Optimization Algorithm for Solving the Delay-Constrained Least-Cost ProblemAmina Boudjelida, Ali Lemouari. 349-363 [doi]
- Terms Extraction from Clustered Web Search ResultsChouaib Bourahla, Ramdane Maamri, Zaïdi Sahnoun, Nardjes Bouchemal. 364-373 [doi]