default search action
21st IWCMC 2025: Abu Dhabi, United Arab Emirates
- International Wireless Communications and Mobile Computing, IWCMC 2025, Abu Dhabi, United Arab Emirates, May 12-16, 2025. IEEE 2025, ISBN 979-8-3315-0887-6
- Bing Yang, Zhonghui Li, Kaiping Xue, Lutong Chen, Qibin Sun, Jun Lu:
SwappingBoost: Optimizing Entanglement Routing by Mitigating Bottlenecks in Quantum Networks. 1-6 - Meng Yue, Hongwei Chen, Baoxu Chen, Zhijun Wu:
SPRLP: Spatial-aware Pathfinding Routing for Aeronautical Ad-Hoc Networks based on Location Prediction. 1-7 - Soumya Kanti Datta, Tomaz Bokan, Lara Resman:
A Reference Architecture for Agricultural Data Spaces: Case Study from DIVINE Project. 8-13 - Tiago Souza, Augusto J. V. Neto, Denis do Rosário, Ramon R. Fontes, Eduardo Cerqueira:
P4LoWPAN: Transforming IoT Networks with a Programmable Data plane and In-band Telemetry. 14-19 - Raiza Dimapilis-Borreo:
Automated Analysis of Swimming Pool Water Quality Using Image Processing. 20-24 - Sicong Liu, Tiankuo Wei, Bin Chen:
Privacy-Preserving Cooperative Visible Light Positioning for Nonstationary Environment: A Federated Learning Perspective. 25-30 - Qicheng Guo, Xiaozhen Yan, Qinghua Luo, Jiaqi Lin:
Cooperative localization algorithm for multiple AUVs under communication Delay. 31-36 - Jianhao Guo, Haoge Jia, Ailing Xiao, Sheng Wu, Ting Jiang:
Few-Shot Specific Emitter Identification Based on Multi-Domain Fusion and Metric Learning. 37-42 - Rawan Elabyad, Ahmad Jasim Jasmy
, Abdulmalik Alwarafy:
Breaking New Ground in Pneumonia Classification: YOLOv11 Nano vs. ResNet-50. 43-48 - Chang Lu, Yuan Chang, Aobo Liang, Hong Luo, Yan Sun:
An Efficient Timer-Expanded Multi-variate Time Series Forecasting Foundation Model. 49-54 - Charles H. F. dos Santos, Augusto Neto, Ramon R. Fontes, Roger Immich, Vicente Sousa, Helber Wagner da Silva:
Predictive Disaster Recovery for Multi-Redundant Operations and Maintenance 5G Network Systems. 55-60 - Muhammad Irfan, Maryam Al-Malki, Savio Sciancalepore
, Gabriele Oligeri:
Radio Frequency Fingerprinting: Models, Methodologies and Performance. 61-66 - Manel Allani, Georges Kaddoum, Hazem Barka:
Enabling High-Order Modulation Over Fading Channels Using E2E Deep Learning-Based Transceiver Optimization. 67-72 - Mohammed Mahyoub, Ashraf Mahmoud:
Assessing Contiki-NG's Reliability for RPL-based Trickle Algorithm in IoT Networks. 73-78 - Longyu Zhou, Supeng Leng, Zonghang Li, Tony Q. S. Quek:
TopoDT: Digital Twin-Assisted UAV Topology Optimization for Targets Tracking. 79-84 - Leila Aissaoui Ferhi, Sawsan Selmi
, Manel Ben Amar, Fethi Choubani, Ridha Bouallègue:
Dense IoT Deployments with LoRaWAN: Performance Evaluation and Scalability Insights. 85-90 - Hesam Khoshkbari, Georges Kaddoum, Majid Altamimi:
A Generalized Deep Hierarchical Reinforcement Learning for HAPS Resource Scheduler. 91-96 - Dan Xia, Pengpeng Xu:
Energy Efficiency Optimization Method for Heterogeneous Networks in Smart Factories. 97-102 - Xiaoyin Zhao:
The networking scheme of 5G connected UAV : At 3.5 GHz frequency band. 103-107 - Lei Liu, Dan Tu:
Study of Interference Coexistence between Space-Air-Ground integrated NR system and High-Orbit Satellite System. 108-113 - David Li, Houbing Herbert Song:
GPS Spoofing on UAV Simulation using Ardupilot. 114-119 - Eranga Bandara, Safdar H. Bouk, Sachin Shetty, Ross Gore, Sastry Kompella, Ravi Mukkamala, Abdul Rahman, Peter Foytik, Xueping Liang, Ng Wee Keong, Kasun De Zoysa:
VindSec-Llama - Fine-Tuned Meta's Llama-3 LLM, Federated Learning, Blockchain and PBOM-enabled Data Security Architecture for Wind Energy Data Platforms. 120-126 - Ghada Afifi, Bassem Mokhtar:
Distributed Resource Allocation and Task Offloading for Vehicular Edge of Things Computing. 127-132 - Heng Wang, Xiong Xiong, Jing Jia, Jiaying Zong, Xu Xia:
Research and Practice on Integrated Satellite-Terrestrial Network for Maritime Voice Communication. 133-137 - Song Mao, Ying Ouyang, Chungang Yang, Zhenzi Wang:
Intent-Driven Segment Routing Design for Large-Scale LEO Satellite Networks. 138-143 - Jing Jia, Heng Wang, Xu Xia, Menghan Yu:
A network architecture for 5G and 6G satellites based on Integrated access and backhaul. 144-148 - Lydia Yahiaoui
, Mohamed Mohammedi, Khaled Hamouid:
Efficient and Reliable Predictive Maintenance in Trains based on BiLSTM Model. 149-154 - Lydia Yahiaoui
, Anouar Aggoune, Khalil Amrani, Mohamed Mohammedi, Khaled Hamouid:
Proactive Failure Prediction in Train Air Production Units Using XGBoost for Enhanced Safety. 155-160 - Keqi Xiong, Zehua Liu, Jiayong Wei, Huimin Gong:
A Blockchain-Based Verifiable Data Quality Assessment Scheme. 161-167 - Mingji Wu, Bo Bai, Ying Ouyang, Chungang Yang, Yao Wang:
Multi-Satellite Collaboration Task Planning Based On Behavior Tree. 168-173 - Mohamed Amine Hechmi, Sonia Ben Rejeb, Nidal Nasser, Sami Tabbane:
AI-Enabled Dynamic Load Balancing and Mobility Management for Internet of Vehicles in SDN 6G Networks. 174-179 - Mahsa Shirzadian Gilan, Behrouz Maham:
Diversity Achieving IRS-Assisted Full-Duplex Relaying under CCI with Dynamic Antenna Mode Design. 180-185 - Surbhi Bahri, Hussein T. Mouftah:
Evaluating Real-Time Object Detection Models for Autonomous Vehicular Vision applications. 186-191 - Ons Aouedi, Alexandre Boissel, Kandaraj Piamrat:
GAIA-FL: Generative AI-Augmented Federated Learning for Intrusion Detection System. 192-197 - Rui Fu, ShuFeng Li, JianBo Liu, Qiang Wang, Xin Jin, Xiaoqiang Guo:
Research on Non-Binary Raptor-Like Codes in Application Layer of 6G Data Broadcasting. 198-203 - Haojia Zhang, Shuai Han, Hao Chen:
Low-Complexity Neural Belief Propagation Algorithm for LDPC Decoding. 204-208 - Qingyu Huo, Zunliang Wang, Haipeng Yao, Tianle Mai, Yuan He, Yunhao Liu:
Dynamic UAV Swarm Networking: A Two-Stage Adaptive Learning-Based Approach. 209-215 - Kaifeng Song, Guanyu Xu, Caiqing Liao, Rongfei Fan, Cheng Zhan, Xin Wei:
ESC: An Efficient Semantic Communication Architecture with Feature Selection and Adaptive Inference. 216-221 - Jiaxiang Liu, Shuo Peng, Xin Tong:
Non-Terrestrial Networks in 6G on Standardization, Key Technologies and Challenges. 222-226 - Neazmul Mowla
, Md. Najmul Mowla
, Khaled M. Rabie, Belal Alsinglawi:
A Lightweight Deep Learning Model for Retinopathy of Prematurity Classification in eHealth Applications. 227-232 - Ziwen Yi, Peng Yu, Ying Wang, Yutong Ji, Ran Yu, Sirui Pang, Yue Ma:
Path and Cycle Decoupled Deterministic Routing for Wide-Area Precision Load Control Services in New Power Systems. 233-238 - Muztaba Fuad, Nancy Smith
, Debzani Deb, Tiffany N. Adams, Anthony Smith, Tameron Hill, Mavis Grace Moree:
Automating Healthcare Practitioner's Indoor Mobility Detection Using Mobile Application. 239-245 - Chi Zhang, Peng Jiang, Zijian Zhang, Liehuang Zhu:
Verifiable Predicate-based Access Control Encryption with Dynamic Revocation. 246-251 - Meng Yue, Hanwen Xu, Zhijun Wu, Yanrong Lu:
Trustworthy Management of Network Resources Based on Blockchain. 252-256 - Yansheng Liu, Jinbo Wen, Zongyao Zhang, Kun Zhu, Yang Zhang, Jiangtian Nie, Jiawen Kang:
Learning-based Power Control for Secure Covert Semantic Communication. 257-262 - Yike Wang, Ningkang Qin, Min Wang:
Repairing Inconsistent-Data Errors in Cyber-Physical System Based on the Petri Net with Data. 263-268 - Yuxin Shi, Cheng Li, Yusi Zhang, Chen Han, Fanggang Wang:
Hybrid Noise and Jamming Modulation For Efficient Anti-Jamming. 269-274 - Satya Srinivasa Arun Kumar Chavali, Akarsh K. Nair, Jayakrushna Sahoo:
ComFLEX: A Communication efficient FL training framework for Edge computing environments. 275-280 - Enhao Wang, Yun Xiao, Yunfei Chen:
Terahertz Communication Channel Measurement for Indoor and Outdoor Scenario Using Wireless Insite. 281-286 - Yun Xiao, Enhao Wang, Yunfei Chen:
Sub-THz Sensing Channel Modeling in Indoor and Outdoor Environments. 287-292 - Qihang Cao, Ruisong Wang, Ruofei Ma, Gongliang Liu, Jing Meng:
Constellation Design Strategies for Effective Inter-Satellite Interference Suppression. 293-298 - Pengpeng Xu, Dan Xia, Huaxi Zhang, Wenlong Qin, Jianxin Pang, Jun Cheng:
An Efficient Hand Grasping Method Based on CVAE for Target Pose Estimation. 299-304 - Jaime Sebastian Burbano, Yuriy Pigovskyi, Eldiyar Zhantileuov, Ivan Dokuchaev, Mohan Liyanage, Ali Kadhum Idrees, Rolf Schuster:
SeQaM: A Service Quality Manager for Edge Computing. 305-311 - Hae-In Lee, Quoc-Vinh Lai-Dang, Hong-Woo Seok, Hyo-Sang Shin, Tingyu Gong, Arthur Mendez, Robin Gojon:
Communication RSSI Prediction and Validation Framework for Advanced Air Mobility. 312-317 - Rejab Hajlaoui, Meshari Alazmi, François Spies:
Towards Green Communication in VANETs: A Metaheuristic-Based Clustering Framework. 318-323 - Mustafa Al Samara, Marc Glig, Abdelhafid Abouaissa, Ismail Bennis, Pascal Lorenz:
B2CAR: Behavioural Biometrics for Continuous Authentication with Regularisation Techniques. 324-329 - Eranga Bandara, Safdar H. Bouk, Sachin Shetty, Ross Gore, Sastry Kompella, Ravi Mukkamala, Abdul Rahman, Peter Foytik, Xueping Liang, Ng Wee Keong, Kasun De Zoysa:
Bassa-Llama - Fine-Tuned Meta's Llama LLM, Blockchain and NFT Enabled Real-Time Network Attack Detection Platform for Wind Energy Power Plants. 330-336 - Kuan-Cheng Chen, Samuel Yen-Chi Chen, Chen-Yu Liu, Kin K. Leung:
Toward Large-Scale Distributed Quantum Long Short-Term Memory with Modular Quantum Computers. 337-342 - Kai Yan, Yuanfang Chen, Xing Fang, Guangxu Bian, Noël Crespi:
A Distributed Personalized Federated Learning Method based on Siamese Neural Networks. 343-348 - Zeeman Memon, Ikjot Saini:
Enhancing Security of Over-the-Air Updates in Connected and Autonomous Vehicles using Blockchain: Proof of Concept. 349-354 - Jingqi Huang, Chunyi Peng:
Unveiling 5G Performance Variance In the Wild. 355-360 - Lavanya Nagaraju, Ikjot Saini:
Trust-centric Detection of Roadside Unit Misbehaviour in VANETs. 361-366 - Wafa Abid, Moufida Hajjaj, Hanene Zormati, Ridha Bouallegue:
Machine Learning Strategies for Reconfigurable Intelligent Surface: An Overview. 367-372 - Dong Wang, Shenhu Zhang, Ruiran Su:
Distributed Intelligent Endogenous Design for 6G: A DOICT Fusion Approach. 373-378 - Yuanfeng Li, Qi Zhang, Haipeng Yao, Xiangjun Xin, Ran Gao, Fu Wang:
Multimodal Reinforcement Learning Aided Dynamic Service Function Chain Deployment in Satellite-Terrestrial Network. 379-385 - Yusi Zhang, Ke Shi, Yuxin Shi, Wanyu Xiang, Han Liao, Chen Han:
A CP-Free DCWFRFT Based OTFS Framework in High Mobility Scenario: Design and Performance Analysis. 386-391 - Andreas Andreou, Constandinos X. Mavromoustakis, Evangelos K. Markakis, Athina Bourdena, George Mastorakis:
Lightweight Lattice-Based Secure Communication Framework for Forward and Backward Secrecy in IoD Systems. 392-397 - Andreas Andreou, Constandinos X. Mavromoustakis, Houbing Song, Evangelos K. Markakis, Athina Bourdena, George Mastorakis:
Deep Reinforcement Learning for Dynamic Network Slice Security Using Moving Target Defense. 398-403 - Sanaz Amanlou, Robin Doss, Jack Li:
Implementing A Dynamic and Context-Aware Trust Evaluation Model for Zero Trust Architecture (ZTA): A Fuzzy Logic Approach. 404-411 - Mingshuo Wei, Yong Zhao, Jinyang Yu:
Research on Low Altitude Network Coverage Solutions. 412-417 - Mikhail Tishin, Constandinos X. Mavromoustakis, Jordi Mongay Batalla, George Mastorakis, Evangelos K. Markakis, Athina Bourdena:
Machine Learning assisted in-device tasks scheduling optimization in context of IoT ecosystems. 418-423 - Kabiru Nasiru Aliyu, Karim Abed-Meraim, Azzedine Zerguine, Abdulmajid Lawal:
Semi-Blind Multi-Modulus Algorithm for Joint CFO Estimation and Symbol Detection in MIMO-OFDM. 424-428 - Cuimin Pan, Xiangbin Yu, Han Zhang:
Error Bound for Two-Dimensional DOA Estimation in RIS-Aided Wireless Localization. 429-434 - Maroua Belkneni, Khaled Guedria, Skander Chamakhi, Wiem Hjiri, Nouha Ben Slimen:
Development of an Artificial Intelligence-Based Companion clone. 435-440 - Abdelweheb Gueddes
, Wyssem Fathallah, Mohamed Ali Mahjoub:
Context-Driven Need Detection in Home Care: A Hybrid Approach Leveraging BERT, OWL, and MEBN for Enhanced Personalized Support. 441-446 - Sen Xu, Yu Fu, Guanghui Zhang, Wei Si, Miao Wu, Hua Xu:
Performance Evaluation on Joint Beamforming for Distributed Massive MIMO System in Indoor Secenario. 447-452 - Zaid Shuqfa, Abderrahmane Lakas:
Motor Imagery-Based Brain-Computer Interfaces: Challenges, Methods, and Future Directions. 453-460 - Abdelweheb Gueddes
, Wyssem Fathallah, Mohamed Ali Mahjoub:
BERT-Based Knowledge Graph Construction from Social Media. 461-466 - Ziang Lei, Jiafu Wan, Luo Fang:
FactoryTwin: Dual-Mode Scalable Digital Twin Software for Smart Workshop. 467-472 - Marianna Rezk
, Hassan Harb, Ismail Bennis, Sébastien Bindel, Abdelhafid Abouaissa:
A Comparative Study of Recent Advances in Internet of Intrusion Detection Things. 473-478 - Jessica Al Achy
, Hassan Harb, Abdallah Makhoul:
Bringing Intelligence to Energy Consumption in Smart Buildings: Leveraging Fog Computing and Federated Learning. 479-484 - Jihene Khoualdi, Nourhene Ellouze
, Hella Kaffel Ben Ayed, Jean-Philippe Kokora:
Blockchain-Driven SSI for Securing Privacy and Quality Assurance in Agri-Food Supply Chains. 485-490 - Ahmad Abdel-Qader, Anas Chaaban, Mohamed S. Shehata:
Mutli-Level Autoencoder: Deep Learning Based Channel Coding and Modulation. 491-496 - Konstantinos Tsioutas, Yannis Thomas, Fotios Bistas, Ioannis Barous, George Xylomenos, George C. Polyzos:
Network Music Performance Beyond 4G. 497-502 - Han Liao, Wanyu Xiang, Yusi Zhang, Chen Han, Yusheng Li, Yuxin Shi:
UAV Anti-jamming Deployment with Power Control: A Game-Theoretical Perspective. 503-508 - Chenguang He, Jian Zhang, Weixiao Meng, Hua Tan:
Joint Design of Communication Efficiency and Resource Allocation in V2X Networks Based on Multi-agent Deep Reinforcement Learning*. 509-513 - Chen-Cheng Yo, Ching-Kuo Hsu:
A 5G-enabled IoT-based Fatigue Driving Detection System using Proximal Policy Optimization. 514-519 - Ching-Kuo Hsu:
A Double DQN Based Job-Shop Scheduling Method in IIoT Process Monitoring System. 520-525 - Ziyi Deng, Yin Zhang, Jia Liu, Fang Hu:
CL-MFTD: Enhanced Feature Representation with Contrastive Learning and Multiscale Filter for Tumor Detection. 526-531 - Ke Liu, Wubin Zhou, Chenchen Zhang, Fei Xue, Kaibo Tian:
Study on the Performance of Low-Power Wake-up Receiver in Release 19. 532-537 - Menghan Yu, Yanxia Xing, Xu Xia, Jing Jia:
AI Agent Based Autonomous Cognitive Architecture for 6G Core Network. 538-542 - Dorra Zaibi, Alya Alkameli, Riadh Ksantini:
Plant Disease Clustering System using Dynamic Auto-Encoder. 543-548 - Mahmoud A. Elhaj, Sam Ansari, Natasa Kleanthous, Abdulla M. Alawadhi, Abdalla S. Alsuwaidi, Khawla A. Alnajjar, Soliman A. Mahmoud, Hayssam Dahrouj, Abir Hussain:
AI-Enhanced IoT-Integrated Virtual Fencing: A Proof-of-Concept for Camel Monitoring and Collision Mitigation. 549-555 - Liangni Chen, Jiafu Wan, Luo Fang:
PCA and Failure Mechanism-driven Fault Sample Generation for Rotor Bearing Fault Diagnosis. 556-561 - Md. Morshed Alam, Lokesh Chandra Das, Sandip Roy, Sachin Shetty, Weichao Wang:
RESTRAIN: Reinforcement Learning-Based Secure Framework for Trigger-Action IoT Environment. 562-567 - Ahlem Bouafia, Amira Zrelli, Taoufik Aguili:
Enhancing Security in Vehicular Networks based on Blockchain Technology. 568-573 - Lea Mansour, Nadine Abbas:
Context-Aware Client Selection and Security Protocol Identification in Federated Learning for Heterogeneous IoT Networks. 574-579 - Mohammad Fatin Fatihur Rahman, Ning Zhang, Esam Abdel-Raheem:
Intelligent Transportation Systems Utilizing UAVs: Integration with IoT and Machine Learning. 580-586 - Rayan Gustavo O. J. Lima, Antonio A. de A. Rocha, Flávia Coimbra Delicato:
A new BRAIN-based Approach to Resource Allocation using Consortiums. 587-592 - Mohammed Dhyia Eddine Gouaouri, Miloud Bagaa, Oussama Bekkouche, Messaoud Ahmed Ouameur, Adlen Ksentini:
A Reinforcement Learning Approach for Multi-edge Task Offloading Through Bi-level Optimization. 593-599 - Kamal Acharya
, Mehul Lad, Liang Sun, Houbing Song:
Neurosymbolic Approach for Travel Demand Prediction: Integrating Decision Tree Rules into Neural Networks. 600-605 - Haoyu Zhang, Weizhuo Yao, Zhengyang Xu, Xianghan Hu:
Efficient Large-Scale IoT Network: Integrating Asynchronous Communication and Huffman Coding in LoRa/PLC Systems. 606-611 - Hend Fourati, Ichraf Ayari, Leïla Azouz Saïdane:
Artificial Intelligence Use for intelligent Agriculture. 612-617 - Hend Fourati, Leïla Azouz Saïdane:
Artificial Intelligence use in Sign Recognition: a dataset in Tunisian Sign Language. 618-623 - Gianmarco Baldini, Kandeepan Sithamparanathan:
Robust Classification of Wi-Fi Network Saturation Condition with the Sparse Data Observers (SDO) Outlier Detection Algorithm. 624-629 - Abdullah Melhem, Ahmed Aleroud, Abdullah Al-mamun, George Karabatis, Mohamed I. Ibrahem:
Adversary-Resilient Clustered Federated Learning for Secure AI-Driven Healthcare Data Analytics. 630-636 - Abdelhamid Garah, Nader Mbarek, Sergey Kirgizov:
DBSCAN-Based IoT Object Integrity Self-Management. 637-642 - Sayyed Farid Ahamed, Sandip Roy, Soumya Banerjee, Marc Vucovich, Kevin Choi, Abdul Rahman, Alison Hu, Edward Bowen, Sachin Shetty:
Evaluating Query Efficiency and Accuracy of Transfer Learning-based Model Extraction Attack in Federated Learning. 643-648 - Soumya Banerjee, Sandip Roy, Sachin Shetty:
P2Q-ASB: PUF-Secured Post Quantum Aggregate Signature Scheme using Public Blockchain for e-Healthcare Systems. 649-654 - Gunjan Bharti
, Debasis Das, Yatindra Nath Singh:
SRRS: A Sustainable Route Recommendation System using Advanced YOLO and SUMO. 655-660 - Manel Boujelben, Mohammed Adnan Mohammed
, Mohamed Abid:
An End-to-End Secure Blockchain-Based Architecture for Data Sharing in E-Health. 661-666 - Gianmarco Baldini, Kandeepan Sithamparanathan:
Wireless Channel classification with Entropy Enhanced Supervised Time Series Forest (EESTSF). 667-672 - Maciej Krasicki:
Re-Designed Algorithm to Obtain the Optimal Hypercube Constellation Mappings for BICM-ID Systems. 673-678 - Saif Eddine Khelifa, Miloud Bagaa, Sihem Ouahouah, Messaoud Ahmed Ouameur, Adlen Ksentini:
Tail-Latency Aware Scheduler For Inference Workloads. 679-684 - Ahmad Fakhr Aldeen Sattout, Ali Chehab:
OCSVM-Siamese Framework for Detecting Adversarial Attacks for Autonomous Driving Cars. 685-691 - Adel Merabet, Abderrahmane Lakas, Abdelkader Nasreddine Belkacem, Abdelmoumen Benamarouche, Pedro Silva:
eMAVLink: Enhancing MAVLink for Secure and Robust UAV Communication. 692-697 - Jinlong Wang, Ying Feng, Zhiquan Zhou, Chenxu Wang, Shaobo Jia, Di Zhang:
Joint Optimization Design for Double Irregular IRS-Assisted Secure Communications. 698-703 - Qianqian Wang:
A Group-Based Fast Handover Authentication Scheme for 5G Networks. 704-709 - Zecheng Tian, Yan Zhang, Kaien Zhang
, Jiupeng Song, Zunwen He, Hua Wang, Wancheng Zhang:
A Coordinate-Attention-Based Path Loss Prediction Scheme for Indoor IoT Applications. 710-715 - Kai Li, Shuyan Hu, Bochun Wu, Sai Zou, Wei Ni, Falko Dressler:
Undermining Federated Learning Accuracy in EdgeIoT via Variational Graph Auto-Encoders. 716-721 - Nelson I. Oliveira, Helber Wagner da Silva, Marcos M. Pinheiro, Augusto J. V. Neto:
Security and regulatory insights for 5G Network Slicing-enabled eHealth applications. 722-727 - Mohammed Mahyoub, Sami Muhaidat, Halim Yanikomeroglu, Gunes Karabulut Kurt:
Risk-Aware Slicing-Based Security Functions Allocation in LEO Satellite Networks. 728-733 - Jiachen Sun, Xu Chen, Jiawei Wang, Huanxi Cui, Haoge Jia, Sheng Wu:
Data-Driven Distributionally Robust Optimization for Energy-Efficient Offloading in UAV-Satellite Edge Computing Networks. 734-739 - Fangce Zhao, Zhenglun Pan, Xiyue Xia, Minghao Yuan, Dongxuan He, Huazhou Hou:
Beamforming Optimization for STAR-RIS-Assisted Integrated Sensing and Communication. 740-745 - Mohamed Redha Bouakouk, Abdelkrim Abdelli, Lynda Mokdad, Jalel Ben-Othman:
A QoS-Aware Data Collection Protocol for the IoT. 746-751 - Vidhi Ruparelia, Kanak Jain, Khushi Shah, Lakshit Pathak, Rajesh Gupta, Sudeep Tanwar, Mohsen Guizani:
DL-based Framework for Malicious Node Detection in PoS Blockchains to Secure Telesurgery Systems. 752-757 - Khushi Trivedi, Karm Dave, Jay Gor, Rajesh Gupta, Sudeep Tanwar, Mohsen Guizani:
DL-based Attack Classification Framework for Robotic Sensor Communication in Industry 4.0. 758-763 - Alessandra Rizzardi, Raffaele Della Corte, Jesús Fernando Cevallos Moreno, Simona De Vivo, Vittorio Orbinato, Sabrina Sicari, Domenico Cotroneo, Alberto Coen-Porisini:
Open-FARI: An Open-source testbed for Federated Anomaly detection in the Railway Industrial Internet of Things. 764-769 - Jing Zhang, Dongyang Gao, Jiacheng Wang, Zemin Sun, Shuang Liang, Ruichen Zhang, Geng Sun:
Real-Time Beam Tracking Algorithm for UAVs in Millimeter-wave Networks with Adaptive Beamwidth Adjustment. 770-775 - Omar Alnaseri, Yassine Himeur, Shadi Atalla, Wathiq Mansoor:
Complexity of Post-Quantum Cryptography in Embedded Systems and Its Optimization Strategies. 776-781 - Xu Xia:
A Novel Handover Management Scheme for LEO Satellite Internet. 782-786 - Hanen Louati, Yaser Al Mtawa:
Enhancing Network Security: Machine Learning Meets Anomaly Detection. 787-792 - Xiaochun Lu, Shangkun Xiong, Sen Xu, Yuefei Liao, Tao Yang, Jingyuan Nan:
LTE and NR Inter-symbol Interference Optimization Analysis Based on OFDMA-RSMA Jointly MBSs Grouping and Power Allocation in Hybrid Network. 793-798 - Mengrui Guo, Xuanli Wu, Jing Li, Zifan Shi:
MASTTN: A Multi-Feature Adaptive Spatio-Temporal Trend Network for Intelligent Cellular Traffic Prediction. 799-804 - Md. Shirajum Munir, Sravanthi Proddatoori, Manjushree Muralidhara, Marco A. Gamarra, Walid Saad, Zhu Han, Sachin Shetty:
Securing Next-Generation Wireless Networks Against Native GenAI Attacks: An Evidence-Theoretic Approach. 805-811 - Anas Alashqar, Ehsan Olyaei Torshizi, Raed Mesleh, Werner Henkel:
A Low-Complexity Deep Learning Approach to Enhance Secret Key Generation for IoT Networks. 812-817 - Usman Iqbal, Haejoon Jung, Mohsen Guizani:
Secrecy Analysis of Distributed Null-Steering-Based Physical Layer Security Algorithm under Imperfect Channel Estimation. 819-823 - Nourhene Ellouze
, Cyrine Bouallegue, Hella Kaffel Ben Ayed:
Energy-Aware IoT based solution for smart Beehives. 824-829 - Lucas Bastos, Rafael Veiga, Renan Morais, Augusto Neto, Denis do Rosário, Eduardo Cerqueira:
Federated Learning for User Identification Method from Biosignals in Wearable Devices. 830-835 - Jikun Zhu, Xiaochen Ma, Zheng Wang, Yongming Huang:
Cluster-Based Low-Complexity Codebook Design for Hierarchical Beam Training in XL-MIMO. 836-840 - Yujing Zhou, Marc L. Jacquet, Robel Dawit, Skyler Fabre, Dev Sarawat, Faheem Khan, Madison Newell, Yongxin Liu, Dahai Liu, Hongyun Chen, Jian Wang, Huihui Wang:
Machine Learning for Cyber-Attack Identification from Traffic Flows. 841-846 - Xuyang Yao:
Training-Oriented Data Chunking and Transmission Method for Federated Learning in 6G Scenarios. 847-852 - Haiyan Wu, Wenji He, Lin Du, Xiaoxu Ren, Tianhao Ouyang, Haipeng Yao:
Generative Diffusion Model-Enhanced Federated Fine-Tuning for Resource-Aware Edge Intelligence. 853-858 - Zahraa Ghabriess, Hassan Harb, Ali Mansour, Koffi Clément Yao, Christophe Osswald:
Attacks Detection in IoT-enabled 5G and beyond Networks: Performance Evaluation of Integrating Cutting-Edge Technologies. 859-864 - Louay Tanazefti, Rihab Boussada, Leïla Azouz Saïdane:
Enhancing Digital Twins for Smart Agriculture. 865-870 - Weinan Cao, Keyu Chen, Lvqingyun Xiao, En Cheng, Maode Ma:
Dynamic Trajectory-Based Adaptive Scheduling MAC Protocol for AUV-assisted Data Collection in UASNs. 871-876 - Han Hu, Zuan Chen, Qun Wang, Qiang Wang, Chenming Zhu:
Task Allocation and Trajectory Scheduling for UAV Swarm-Assisted Aerial-Ground Collaborative Computing Networks. 877-882 - Amal Alhashmi, Kais Belwafi, Ashfaq Ahmed, Abdulhadi Shoufan:
Secure Authentication for Remote Drone Identification using ASTM Standards. 883-889 - Mohamed Amine Hechmi, Sonia Ben Rejeb, Nidal Nasser, Sami Tabbane:
Advanced Load Management for 6G Networks Using Multi-Agent Reinforcement Learning. 890-895 - Yiran Wei, Zhipeng Li, Minhao Zhang, Hongjiang Chen, Yueyi Qiao, Yan Wei, Jiang Zhu, Xingbin Tu, Fengzhong Qu:
A Newtonized Approach for Estimation of Doubly Spread Acoustic Channels. 902-907 - Chenguang He, Hua Tan, Lin Ma, Jian Zhang:
Enhancing Image Compression through GAN-based Semantic Communication. 908-913 - Elham Alaa Aldein, Mohamed Abdel-Raheem, Mohammad M. Abdellatif, Usama Sayed Mohamed, Mohamed Atef:
ECG-Based Blood Pressure Estimation Using a Two-Stage Inception-Regression Model. 914-919 - Yingquan Zou, Nan Yang, Jingfu Li:
YOLO-HERA: An Optimized Model for Efficient and Real-Time Termite Detection in Complex Environments. 920-925 - Mahdi Jemmali, Rena Ayham Housain, Mustafa Sami Abou Rakbe:
Heuristic Scheduling for Secure and Efficient Robotic Data Transmission in Autonomous Decision Support Systems. 926-931 - Boutheina Ben Ismail, Mohamed Hamroun
, Bassem Ben Salah, Hedi Sakli:
A Transformer-Based Approach for Enhanced Depressive Emotion Detection from Facial Expressions. 932-937 - Ibtihel Mansour, Mohamed Hamroun
, Sonia Lajmi, Ryma Abassi:
RAFID: A Hybrid ResNet50-ViT Framework for Arabic Sign Language Recognition in Healthcare. 938-943 - Muhammad Asif, Júlio Chilela, Driss Benhaddou:
USRP-Based 5G Testbed for Advanced Network Deployment: A Practical Implementation and Traffic Management Study. 944-949 - Manel Chahed, Aref Meddeb, Amine Boufaied:
Evaluating Distance-Induced Performance Trade-offs in IoT: Simple Automatic ReQuest vs. TCP and UDP. 950-955 - Lei Liu, Bingxin Wang:
Radio compatibility analysis of 5G systems with radio astronomy services in the 1800 MHz band. 956-960 - Wang Ge, Lv Congyue, Shiwang Xing:
Multivariate Time Series Anomaly Detection in Cyber Security Systems via Stein Discrepancy. 961-966 - Siyu Cheng, Zhiqiang Li, Shuai Han, Cheng Li:
Ephemeris-Assisted Doppler Frequency Compensation in Satellite Communication Systems. 967-972 - Jiacheng Wang, Changyuan Zhao, Ruichen Zhang, Yinqiu Liu, Geng Sun, Nan Ma, Dusit Niyato:
Generative AI Based Data Augmentation for Integrated Sensing and Communications Networks. 973-978 - Tianhui Zhang, Shuyi Chen, Weixiao Meng:
Subarray Measurement Optimization Algorithm for Hybrid-Field Channel Estimation in UM-MIMO Systems. 979-984 - Mario Bou Abboud, Oumaya Baala, Maroua Drissi
, Sylvain Allio:
Gated Temporal-Graph Attention Networks for Large-Scale Cellular Traffic Volume Prediction. 985-990 - Jintong Cai, Huimin Lu, Yujie Li:
Polygon Mesh Recovery via Segmentation Priors and Neural Radiance Fields. 991-996 - Jer Shyuan Ng, Cyril Leung, Chunyan Miao:
An Evolutionary Approach Towards Synthetic Data Empowered Hierarchical Federated Learning. 997 - NoorAlhoda Elshawadfy, Loay Ismail, Nizar Zorba:
Latency Analysis of Aerial Offloading for Command Prediction in Autonomous Driving. 1003-1008 - Malek Chabbouh, Nizar Zorba, Tamer Khattab, Mohamed Mabrok:
UAV-Assisted HAPS in Intelligent Transportation Systems under Wind Disturbances. 1009-1014 - Hengfa Liu, Tong Wang, Shencheng Zhou, Yun Gao:
Cross-Modal Saliency Prediction for Omnidirectional Video. 1015-1020 - Zaina Maqour, Hanan El Bakkali, Driss Benhaddou, Houda Benbrahim, Hajar Elgadi:
BlockCrowd: A Privacy-Preserving Trust Management Blockchain-Based System for Crowdsensing. 1021-1026 - Farah-Emma Braiteh
, Francesca Bassi
, Rida Khatoun:
Securing Cooperative Vehicular Platooning with a Set of Reinforced Checks. 1027-1033 - Rijo Joy
:
The Impact of Perceived Competence on ISP Compliance in Flexible Work Settings: Strengthening Employee Security Behavior. 1034-1040 - Yu-Chun Chen, Hui-Nien Hung, Shun-Ren Yang, Yu-Chen Chou, Phone Lin:
On Defending against Label Flipping Poisoning Attack for Personalized Federated Learning. 1041-1046 - Yuang Cao, Dongxuan He, Tiancheng Yang, Hua Wang, Rongkun Jiang:
Low-Complexity Joint Range and Velocity Estimation for OFDM-Based Integrated Sensing and Communication. 1047-1052 - Saoussen Cheikhrouhou, Mariem Turki, Slim Kallel, Amal Abid, Mohamed Jmaiel:
Blockchain-Powered Certificate Verification Enhanced by Self-Sovereign Identity and Off-Chain Caching. 1053-1058 - Inam Ullah, Hesham El-Sayed, Alexis A. Dowhuszko
, Abdulmalik Alwarafy, Manzoor Ahmed Khan, Jyri Hämäläinen:
Performance Evaluation of IAB-Assisted mmWave Mobile Radio Access in Dense Urban Environments. 1059-1064 - Anass Sebbar, Mustapha Oudani
, Ouassim Karrakchou
, Mohammed Boulmalf:
A Hesitant Fuzzy Sets-Based Approach for SDN Security Assessment. 1065-1071 - Zhongmin Ma, Qinghe Du, Linzhong Xia, Jintao Zhang, Chen Lu:
UAV-Assisted Vehicular Trajectory Tracking Using HMM in Integrated Sensing and Communication System. 1072-1077 - Raghda Akasheh, Ahmed Badawy:
Group Secret Key Generation for Vehicular Networks Based on Physical Layer Security. 1078-1083 - Yuanbin Chen, Dongxuan He, Shunyu Li, Tianqi Mao:
Codebook Design for Holographic MIMO: Near-Field Prospects and Road to Standardization. 1084-1090 - Mohammed Boulmalf, Anass Sebbar, Sara Mobsite, Ouassim Karrakchou
, Mounir Ghogho:
Deep Learning-Driven Mobile Application for E-tourism. 1091-1096 - Mohamed Sofiane Batta, Alexandre Moral, Rahim Kacimi:
Dynamic Spreading Factor and Power Allocation in LoRaWAN Networks Using Reinforcement Learning. 1097-1102 - Jiaying Zong, Heng Nie, Wen Qi, Heng Wang, Xu Xia:
Architecture and Procedure Enhancements for Store and Forward Satellite Operations. 1103-1107 - Hossam M. Farag
, Mohamed Ragab, Gilberto Berardinelli, Cedomir Stefanovic
:
Proactive Radio Resource Allocation for 6G In-Factory Subnetworks. 1108-1113 - Rui Ma, Yuanli Ma, Jikun Zhu, Zheng Wang, Yuekai Cai:
A Low Complexity Expectation Propagation Algorithm for Active User Detection for Massive Connectivity. 1114-1118 - Haojin Peng, Meng Lu, Wei Peng:
Indoor Human Posture Recognition: an ISAC Method based on Environmental Map. 1119-1124 - Baraq Ghaleb, Jawad Ahmad, Ahmed Al-Dubai
, Imdad Ullah Khan
, Iain Baird, Isam Wadhaj, Amar Almaini
:
A Lightweight and Robust Security Mechanism for RPL-based Resource-Constrained IoT Networks. 1125-1130 - Fin Gentzen, Mounir Bensalem, Admela Jukan:
Effective ML Model Versioning in Edge Networks. 1131-1136 - Rima Hasna Yamouni, Rim Trabelsi, Adnane Cabani, Fatma Abdelkefi:
Efficient Semantic Segmentation via Advanced Prompt Tuning Techniques. 1137-1143 - Ali Alfatemi, Mohamed Rahouti, Zakirul Alam Bhuiyan, Aiman Solyman, Mohammed Aledhari:
ProtoMAML: A Hybrid Meta-Learning Approach Integrating Prototypical Networks for Data-Efficient DDoS Attack Detection. 1144-1149 - Mohammed Aledhari, Mohamed Rahouti:
Forecasting Oil Prices with Social Media Sentiment and Natural Language Processing. 1150-1155 - Tariq Qayyum, Asadullah Tariq
, Muhammad Ali
, Mohamed Adel Serhani, Zouheir Trabelsi, Maite López-Sánchez:
Intelligent Task Offloading in VANETs: A Hybrid AI-Driven Approach for Low-Latency and Energy Efficiency. 1156-1161 - Nishat Ara Nipa, Sachin Shetty:
Uncertainty Aware Indoor Localization: Deep Learning Regression for Predicting Mobile Device Locations. 1162-1167 - Muhammad Ali
, Usman Nazir, Mubashar Mushtaq, Faizad Ullah, Tariq Qayyam, Asadullah Tariq
, Mohamed Adel Serhani, Irfanud Din:
Deep Learning-Based Task Offloading for Efficient and Reliable Computation in High-Mobility Vehicular Networks. 1168-1173 - Wyssem Fathallah, Hiba Mzoughi, Sawsan Selmi
, Abdelbaki Souid, Hedi Sakli:
Computer Aided Diagnosis CAD tool for lung and thoracic pathologies detection from chest X-ray images. 1174-1179 - Abir Raza, Elarbi Badidi:
A Trust-based Client Selection Framework for Federated Learning in the Internet of Vehicles. 1180-1185 - Noura Aljeri, Azzedine Boukerche:
Towards A Secure Proactive Handover Mechanism Design for intelligent Connected Vehicles. 1186-1191 - Fatma Gamal, Mohamed Abdel-Raheem, Mohammad M. Abdellatif, Mahmoud Elsaadany, Omar A. M. Aly:
Fast Power Allocation Technique for Downlink Transmission in Cell-Free Massive MIMO Systems. 1192-1197 - Frederic Adjewa, Moez Esseghir, Leïla Merghem-Boulahia, Cheikh Kacfah:
LLM-based Continuous Intrusion Detection Framework for Next-Gen Networks. 1198-1203 - Baraq Ghaleb, Ahmed Yassin Al-Dubai
, Khaled El-Zayyat, Ammar Hawbani, Liang Zhao, Jawad Ahmad:
Efficient Downward Routing in IoT Networks: A Novel Leaf-Centric Mode for RPL. 1204-1209 - Marwa Said, Maher Jabberi, Akram Hakiri
, Hella Kaffel Ben Ayed, Nédra Mellouli:
Optimal LoRaWAN Gateway Placement for Efficient Large-Scale IoT Deployments. 1210-1215 - Hanene Zormati, Jalel Chebil, Wafa Abid, Jamel Bel Hadj Taher, Ridha Bouallegue:
Path Loss Characterization for Vehicular Communication Inside Tunnel Under LOS and NLOS Conditions. 1216-1220 - Majdi Abdmoulah, Eckehard G. Steinbach:
MPUrge: Merge, Purge, and Urge Multipath Fingerprints into Virtual Transmitters. 1221-1228 - Wahiba Abou-Zbiba, Houda Benbrahim, Driss Benhaddou, Hanan El Bakkali:
Is Attention Mechanism Enough for Accurate Deep Learning-Based Image Forgery Detection Models? 1229-1234 - Karidja Dominique Christelle Adje, Oussama Habachi, Gérard Chalhoub, Asma Ben Letaifa, Majed Haddad:
FedEst: A Federated K-Means Based Load Balancing for Channel Estimation in Cell-Free Massive MIMO Networks. 1235-1240 - Amit Chakraborty, Sayyed Farid Ahamed, Sandip Roy, Soumya Banerjee, Kevin Choi, Abdul Rahman, Alison Hu, Edward Bowen, Sachin Shetty:
RADEP: A Resilient Adaptive Defense Framework Against Model Extraction Attacks. 1241-1246 - Abderrahime Filali, Diala Naboulsi, Georges Kaddoum:
Enhancing RAN Slicing Isolation and UAV Positioning in Tactical Networks with DRL. 1247-1252 - Wen Qi, Xu Xia, Jiaying Zhong, Heng Wang, Heng Nie, Yanxia Xing:
Optimizing UE-Satellite-UE Communication for 6G Emergency Scenarios: Challenges and Future Solutions. 1253-1257 - Sushmitha Halli Sudhakara, Md. Shirajum Munir, Mostafizur Rahman, Sachin Shetty:
Native AI-based Predictive Operational Resiliency in Cyber-Physical Energy Systems. 1258-1263 - Mario Chahoud, Hani Sami, Rabeb Mizouni, Hadi Otrok, Jamal Bentahar, Azzam Mourad, Chamseddine Talhi:
Multi-Agent Deep Reinforcement Learning for Resource Management in On-Demand Environments. 1264-1269 - Meng Lu, Haojin Peng, Wei Peng:
Pilot Free Channel Prediction for 6G: Semi-deterministic Modeling and Calculation. 1270-1275 - Amr M. Zaki, Sara A. Elsayed, Khalid Elgazzar, Hossam S. Hassanein:
CoGroup: Cooperative Quality Offloading with Worker Grouping using Hierarchical Multi-Agent Deep Reinforcement Learning. 1276-1281 - Mariam Ishtiaq
, Eunseo Oh, Sungjoon Byun, Jong-Un Won:
Towards Multi-Exposure Image Correction using Dynamic 3D Look-Up Tables. 1282-1287 - Adam Bryant
, Raymond Owen, Kathleen Silleri:
From Outage to Opportunity: Building Robust Telecommunications Standards for Emergency Services. 1288-1293 - Eunseo Oh, Mariam Ishtiaq
, Junho Song, Jongun Won:
Transportation Failure Prediction Framework Using Explainable Artificial Intelligence and Quantum Algorithm. 1294-1299 - Abubakar Abdulkarim, Behrouz Maham, Refik Çaglar Kizilirmak:
Multi-LEO Satellite Networks for Integrated Access and Backhaul: Delay Analysis. 1300-1305 - Dinushika Chathurangani Alahakoon, Sithamparanathan Kandeepan, Fernando Moya Caceres, Xinghuo Yu, Ke Wang
, Gianmarco Baldini:
On the Impact of Occupancy Characteristics on Multi-Step Spectrum Prediction: A Deep Learning Study. 1306-1311 - Anna Triesch, Tim Barsch, Veelasha Moonsamy, Matteo Große-Kampmann:
5G Under Siege: A Comprehensive Guide to Threats and Penetration Testing in 5G Campus Networks. 1312-1317 - Michael Aygur
, Sithamparanathan Kandeepan, Akram Al-Hourani, Edward Arbon, Zarko Kursevac:
Spectrum Sensing Using Semantic Segmentation for Hybrid Satellite-Terrestrial Applications. 1318-1323 - Haoran Xie, Yafeng Zhan, Yongsheng Cui, Daquan Liu:
Fault Diagnosis in Satellite System: A Federated Learning Approach with Communication Constraints. 1324-1329 - Sihem Omri
, Manel Abdelkader, Mohamed Hamdi:
Enhancing Control of Large Language Model-based AI Systems Through Declarative Memory. 1330-1335 - Abdelilah Mansour, Wyssem Fathallah, Bassem Ben Salah, Hedi Sakli:
Compact MIMO Antenna Design with SRR-Enhanced Isolation for Wireless Communication. 1336-1341 - Yongjun Ye, Changyong Pan, Chao Zhang, Jun Wang:
A Generalized Communication Complexity Analysis Model Based on 5G NR Classical Numerology. 1342-1347 - Youcef Yahiatene
, Abderrezak Rachedi, Mohamed Amine Riahla:
Towards Blockchain-Based GDPR-Compliant spontaneous and ephemeral social network. 1348-1353 - Lazaros S. Savvidis, Constandinos X. Mavromoustakis, Houbing Herbert Song, Evangelos K. Markakis, Jordi Mongay Batalla, George Mastorakis:
FTM and PDR Based Dynamic Mapping for Indoor Localization Enhanced by Wi-Fi Aware. 1354-1359 - Akshat Gaurav, Varsha Arya, Brij B. Gupta, Kwok Tai Chui:
Attention-Enhanced Hybrid AI Model for IoT Security. 1360-1365 - Diego Medeiros de Abreu, Arthur Pimentel, Antônio J. G. Abelém:
Q-CAST Mobility: Multipath Routing Protocol for Mobile Quantum Networks. 1366-1371 - Fabrice Wansi, Thabet Kacem:
3MTL: A Multi-Modal Multi-Task Learning Approach for Plant Disease Detection and Analysis. 1372-1377 - Chao Zhou, Zhengquan Zhang, Xiaoxu Zhang, Nan Li, Zheng Ma, Ming Xiao:
Joint Beamforming Design for Secure ISAC Systems with Target-Mounted RIS. 1378-1383 - Liangfan Shi, Yufeng Gu, Yuchao Zheng, Shintaro Kameda, Huimin Lu:
LWD-IUM: A Lightweight Detector for Advancing Robotic Grasp in VR-Based Industrial and Underwater Metaverse. 1384-1391 - Sudipto Baral, Sajal Saha, Anwar Haque:
Autonomous Cyber Incident Response Using Reasoning and Action. 1392-1397 - Sofien Gannouni, Kais Belwafi:
Explainable Common Spatial Pattern to Improve the Design of Brain-Computer Interfaces. 1398-1403 - Oussama Bouldjedri, Mohamad Wazzeh
, Hani Sami, Chamseddine Talhi, Hakima Ould-Slimane:
Privacy-Preserving Continuous User Authentication Using Federated Learning. 1404-1409 - Abdelaziz Ould Bahammou, Monia Najjar:
High sensitive Diamond-shaped ring resonator Biosensor for Tuberculosis Diagnosis. 1410-1415 - Ather Saeed, M. Arif Khan
, Muhammad Imran:
GTFD Protocol for Fault-detection and Self-stabilization in Wireless Sensor Networks. 1416-1421 - Bozhi Ding, Huimin Lu, Yujie Li:
A Multi-Degree-of-Freedom Wave Energy Harvester for Self-Powered IoT System. 1422-1427 - Yunqi Feng, Mengru Wu, Yu Zhang, Huimei Han, Weidang Lu:
Multi-User Frequency Synchronization and Performance Analysis for Massive MIMO Systems With One-Bit ADCs. 1428-1433 - Xinrui Liu, Ruidong Li:
Quantum Network Routing Design with Dynamic Requests Scheduling in Multi-User Environments. 1434-1439 - Zineb Sadok:
An Adaptive and Energy-Efficient Edge Framework for Real-Time Fake News Detection. 1440-1447 - Han Mei, Xiaofeng Zhong, Shidong Zhou, Jie Wei:
Single Mobile Base Station Positioning Algorithm Designed for Disaster Emergency Communication. 1448-1453 - Soham Guha Mazumder, Naveen Gupta:
NOMA Aided Energy Efficient Cooperative U2U Communications System with Best UT Selection. 1454-1459 - Yin Yu, Jie Wei, Xiaofeng Zhong:
A Fast Multi-Token Neighbor Discovery Strategy for Urban Asynchronous Directional Ad-Hoc Network. 1460-1465 - Ammar Kamal Abasi, Moayad Aloqaily, Mohsen Guizani:
Anomaly Detection in 6G Networks Using Large Language Models (LLMs). 1466-1471 - Floribert Katembo Vuseghesa, Mohamed-Lamine Messai, Fadila Bentayeb:
SHIELD: Self-Healing IoT Networks with Automated Response and AI-Driven Detection of Node Compromising Attacks. 1472-1477 - Rihab Hmaied, Takoua Kefi, Ryma Abassi:
Enhancing Privacy and Performance in V2P Systems through Decentralized Federated Learning. 1478-1483 - Haijun Liao, Haoyu Ci, Wen Zhou, Zhenyu Zhou, Xiaoyan Wang, Muhammad Tariq:
Fuzzy Learning-based Wireless Resource Scheduling for Distribution Grid: An Information-Energy Flow Integration Perspective. 1484-1488 - Feriel Lamirem, Wyssem Fathallah, Imen Helal, Nizar Sakli, Hedia Bellali, Aschraf Chadli-Debbiche, Taoufik Aguili, Hedi Sakli:
Automated Quantification of the Immunoscore® in Colorectal Carcinomas Using Deep Learning. 1489-1494 - Samira Chouikhi, Lyes Khoukhi:
Power Grid Protection Solution Against Load Altering Cyberattack via EV Charging Stations. 1495-1500 - Sofiane Dahmane, Abdelmadjid Benarfa, Bouziane Brik, Zakaria Abou El Houda:
Vehicular Edge Computing: An Enhanced Vehicle Participant Selection System for Federated Learning. 1501-1506 - Abderraouf Zaimen, Lubana Al Rayes
, Nabil Hezil, Ahmed Bouridane, Raouf Dridi:
Face Recognition in the Encrypted Domain Using Homomorphic Encryption. 1507-1512 - Negar Javadzadeh No, Hossein Taghizadeh, Mohammad Parsa Sedighi, Bardia Safaei, Jörg Henkel:
EDEN: Energy-aware Dynamic Genetic and Neural Network-based Path Predictive Routing and Clustering for Mobile SD-IoT Networks. 1513-1518 - Sani Umar, Rabeb Mizouni, Shakti Singh, Hadi Otrok, Jamal Bentahar:
Anchor Node-Based Trust Management for Reliable Data Fusion in Crowdsensing. 1519-1524 - Mohamed Mazouzi, Omar Cheikhrouhou, Mohamed Mosbah:
AHARP: An Adaptive Hybrid Agent-Based Routing Protocol for Internet of Vehicles. 1525-1532 - Godlove Suila Kuaban:
An Analytical Design Framework for Dimensioning Solar-powered Green IoT Nodes. 1533-1539 - Ahmed Mohamed Hussain, Nada Abughanam, Panos Papadimitratos:
Towards a Lightweight Edge AI-based Radio Frequency Fingerprinting. 1540-1545 - Yassine Himeur, Diana W. Dawoud, Omar Alnaseri, Shadi Atalla, Wathiq Mansoor, Hussain Al-Ahmad:
Federated Large Language Models for Wireless Networks. 1546-1551 - Demirel Memet, Ionut Pirnog, Ana-Maria Dragulinescu, George Craioveanu, Ciprian Zamfirescu, Ioana M. Marcu:
Adaptive P2P UAV-UGV Prototype for Ad Hoc Network-based Precision Agriculture. 1552-1557 - Sawsan Selmi
, Leila Aissaoui Ferhi, Wyssem Fathallah, Ali Hamdi, Dhaou Bouchouicha, Hedi Sakli, Ridha Bouallègue:
Intelligent Spectral Efficient Communications Underlay 6G VHetnets. 1558-1563 - Ali Mehrban
, Zakaria Abou El Houda, Hajar Moudoud, Bouziane Brik, Lyes Khoukhi:
A Blockchain-Enabled Multi-Layered Zero-Trust Security Framework for O-RAN. 1564-1569 - Ali Mehrban
, Zakaria Abou El Houda, Hajar Moudoud, Bouziane Brik, Lyes Khoukhi:
Securing O-RAN Equipment Using Blockchain-Based Supply Chain Verification. 1570-1575 - Maryam Ben Driss, Essaid Sabir, Halima Elbiaze:
Multi-Criteria Clustering and Client Selection for Heterogeneous Federated Learning. 1576-1582 - Md. Imtiaz Ahmed, Yaser Al Mtawa:
Metaheuristic Optimization of Controller Placement in Software Defined Networks. 1583-1588 - Manar Abu Talib, Anissa M. Bettayeb, Al Zahraa Sobhe Altayasinah, Fatima Mohamad Dakalbab:
ChatGPT for Coding: User Insights and Challenges in Program Generation. 1589-1596 - Imen Loussaief, Sondes Ksibi, Faouzi Jaïdi, Khaled Nouri:
A Comprehensive Multi-Layered Cybersecurity Framework for Internet of Vehicles: Securing Vulnerable Nodes of V2X Communication Systems. 1597-1603 - Yevhen Zolotavkin, Prajnamaya Dass, Stefan Köpsell:
Privacy Analysis and Enhancement for Joint Communication and Sensing Applications. 1604-1609 - Masmoudi Salma, Habib M. Kammoun, Maha Charfeddine, Bechir Hamdaoui:
Phishing Attack Detection Through Recursive Feature Elimination Via Cross Validation. 1610-1615 - Abdullah Othman, Joao V. C. Evangelista, Georges Kaddoum, Minh Au, Basile L. Agba:
On the Convergence of Transmission Power Control in Multi-Microgrid Systems. 1616-1621 - Nader Khedhri, Monia Najar:
Adaptive Modulation Selection in Wireless Communications: A Comparative Study of Reinforcement Learning, Deep Learning, Deep Reinforcement Learning, and Traditional Policies. 1622-1625 - Qianqian Pan, Jun Wu:
Selective Privacy-Preserving Federated Learning for Large Language Model Fine-Tuning. 1626-1631 - Yanqi Zhao, Minghong Sun, Min Xie, Xiaoyi Yang, Yong Yu:
Threshold Anonymous Counting Tokens with Batch Proofs for Online Paywalls. 1632-1637 - Mostafa Abdelhamid, Ali Safa, Loay Ismail, Amr Mohamed:
FMCW Radar for Human Detection in Collapsed Structures for Post-Disaster Search and Rescue. 1638-1643 - Wiem Fekih Hassen
:
Intelligent Power Management for Hybrid Energy Storage Clusters in EV Charging Stations. 1644-1649 - Maher Guizani, Latif U. Khan, Waseem Ullah, Mohammad A. Islam
:
Resource Optimized Split Federated Learning: A Reinforcement Learning and Optimization Approach. 1650-1655 - Maher Guizani, Latif U. Khan, Mohammad A. Islam
:
Quality of Experience Enhancement in Wireless Metaverse: A Resource Optimization Scheme. 1656-1660 - Deemah H. Tashman, Soumaya Cherkaoui
:
Quantum-Aided Active User Detection for Energy-Efficient CD-NOMA in Cognitive Radio Networks. 1661-1666 - Wajdi Hammami, Soumaya Cherkaoui
, Shengrui Wang:
Enhancing Network Anomaly Detection with Quantum GANs and Successive Data Injection for Multivariate Time Series. 1667-1672 - Huy Q. Le, Latif U. Khan, Choong Seon Hong:
Robust Federated Learning on Edge Devices with Domain Heterogeneity. 1673-1677 - Christina Alhachem, Mounir Kellil, Abdelmadjid Bouabdallah:
A Multi-Agent Deep Reinforcement Learning Approach for Traffic Management in Complex Communication Networks. 1678-1685 - Ahmed Hamdi, Hassan N. Noura, Joseph Azar:
Dust Detection on Solar Panels Using DINOv2 with Multi-Head Self-Attention. 1686-1693 - Ahmed Hamdi, Hassan N. Noura, Joseph Azar, Guy Pujolle:
Frugal Object Detection Models: Solutions, Challenges and Future Directions. 1694-1701 - Kensley Benjamin, Thabet Kacem:
UAV DoS Attack Detection using a Hybrid Transformer-LSTM Approach. 1702-1708 - Ahmad Tayachi, Bassem Ouni
, Azzam Mourad, Aiman Erbad:
Quishing Attack Detection and Mitigation Using Machine Learning and Deep Learning for Malicious URL Identification. 1709-1713 - Tim Barsch, Anna Triesch, Matteo Große-Kampmann:
MobileSniper: Towards Automated Penetration Testing of 5G Campus Networks and IoT Infrastructures. 1714-1719 - Yuli Yang, Mohsen Guizani:
Pseudo-Doppler Aided Full-Duplex Communications for Self-Interference Cancellation. 1720-1725 - Siem Hadish, Maher Guizani, Moayad Aloqaily, Latif U. Khan:
Transformer Based Architecture for Smart Grid Energy Consumption Forecasting. 1726-1731 - Sabina Jangirova, Branislava Jankovic, Waseem Ullah, Latif U. Khan, Mohsen Guizani:
Efficient Aerial Fire Detection on Resource-Constrained Devices Using Cross-Architecture Knowledge Distillation. 1732-1737 - Sifatul Mostafi, Khalid Elgazzar, Ahmed El Sayed:
Traffic Collision Severity on Highway: Characterization, Modeling, and Analysis. 1738-1743 - Hebatalla Ouda, Khalid Elgazzar, Hossam S. Hassanein:
Analyzing the Impact of Network Variability on the Performance of Telesurgery. 1744-1750 - Zaineh Abughazzah, Emna Baccour, Loay Ismail, Amr Mohamed, Mounir Hamdi:
RL-Driven Security-Aware Resource Allocation for UAV-Assisted O-RAN in SAR Operations. 1751-1756 - Abdul Hannaan
, Zubair Shah, Aiman Erbad, Amr Mohamed, Ali Safa:
Federated Learning of Low-Rank One-Shot Image Detection Models in Edge Devices with Scalable Accuracy and Compute Complexity. 1757-1762
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.