Abstract is missing.
- Machine Learning for IoT Devices Security ReinforcementPhilippe Ea, Jiahui Xiang, Osman Salem, Ahmed Mehaoua. 1-13 [doi]
- Attentive, Permutation Invariant, One-Shot Node-Conditioned Graph Generation for Wireless Networks Topology OptimizationFélix Marcoccia, Cédric Adjih, Paul Mühlethaler. 14-31 [doi]
- Enhancing Social Media Profile Authenticity Detection: A Bio-Inspired Algorithm ApproachNadir Mahammed, Badia Klouche, Imène Saidi, Miloud Khaldi, Mahmoud Fahsi. 32-49 [doi]
- A Deep Learning Based Automatic Outdoor Home Video Surveillance ApproachHamid Reza Tohidypour, Tala Bazzaza, Yixiao Wang, Panos Nasiopoulos, Vincent Sastra, Bowei Ren, Elbert Ng, Sebastian Gonzalez, Andrew Shieh. 50-56 [doi]
- Detecting Abnormal Authentication Delays In Identity And Access Management Using Machine LearningJiahui Xiang, Osman Salem, Ahmed Mehaoua. 57-71 [doi]
- SIP-DDoS: SIP Framework for DDoS Intrusion Detection Based on Recurrent Neural NetworksOussama Sbai, Benjamin Allaert, Patrick Sondi, Ahmed Meddahi. 72-89 [doi]
- Deep Reinforcement Learning for Multiobjective Scheduling in Industry 5.0 Reconfigurable Manufacturing SystemsMadani Bezoui, Abdelfatah Kermali, Ahcène Bounceur, Saeed Mian Qaisar, Abdulaziz T. Almaktoom. 90-107 [doi]
- Toward A Digital Twin IoT for the Validation of AI Algorithms in Smart-City ApplicationsHamza Ngadi, Ahcène Bounceur, Madani Bezoui, Laaziz Lahlou, Mohammad Hammoudeh, Nadjia Kara, Laurent Nana. 108-117 [doi]
- Data Summarization for Federated LearningJulianna Devillers, Olivier Brun, Balakrishna J. Prabhu. 118-137 [doi]
- ML Comparison: Countermeasure Prediction Using Radio Internal Metrics for BLE RadioMorgane Joly, Éric Renault, Fabian Rivière. 138-147 [doi]
- Towards Road Profiling with Cooperative Intelligent Transport SystemsMohamed Lamine Benzagouta, Emilien Bourdy, Hasnaâ Aniss, Hacène Fouchal, Nour-Eddin El Faouzi. 148-166 [doi]
- Study of Masquerade Attack in VANETs with Machine LearningYasmine Chaouche, Éric Renault, Ryma Boussaha. 167-184 [doi]
- Detecting Virtual Harassment in Social Media Using Machine LearningLina Feriel Benassou, Safa Bendaouia, Osman Salem, Ahmed Mehaoua. 185-198 [doi]
- Leverage Data Security Policies Complexity for Users: An End-to-End Storage Service Management in the Cloud Based on ABAC AttributesNicolas Grenèche, Frédéric Andrès, Shihori Tanabe, Andreas Pester, Hesham H. Ali, Amgad A. Mahmoud, Dominique Bascle. 199-217 [doi]
- Machine Learning to Model the Risk of Alteration of Historical BuildingsBaptiste Petit, Emilie Huby, Céline Schneider, Patricia Vàzquez, Cyril Rabat, Hacène Fouchal. 218-231 [doi]
- A Novel Image Encryption Technique Using Modified Grain-128Aïssa Belmeguenaï, Djamel Herbadji, Selma Boumerdassi, Oulaya Berrak. 232-249 [doi]
- Transformation Network Model for Ear RecognitionAimee Booysens, Serestina Viriri. 250-266 [doi]
- Cybersecurity Analytics: Toward an Efficient ML-Based Network Intrusion Detection System (NIDS)Tariq Mouatassim, Hassan El Ghazi, Khadija Bouzaâchane, El Mahdi El Guarmah, Iyad Lahsen Cherif. 267-284 [doi]