Search Results - "2022 International Wireless Communications and Mobile Computing (IWCMC)"

Refine Results
  1. 1

    Explainable AI-based Federated Deep Reinforcement Learning for Trusted Autonomous Driving by Rjoub, Gaith, Bentahar, Jamal, Wahab, Omar Abdel

    “…Recently, the concept of autonomous driving became prevalent in the domain of intelligent transportation due to the promises of increased safety, traffic…”
    Get full text
    Conference Proceeding
  2. 2

    Towards Supporting Intelligence in 5G/6G Core Networks: NWDAF Implementation and Initial Analysis by Chouman, Ali, Manias, Dimitrios Michael, Shami, Abdallah

    “…Wireless networks, in the fifth-generation and beyond, must support diverse network applications which will support the numerous and demanding connections of…”
    Get full text
    Conference Proceeding
  3. 3

    Reasoning about Uncertainty over IoT Systems by Alwhishi, Ghalya, Bentahar, Jamal, Drawel, Nagat

    “…The advent of the Internet of Things (IoT) has led to a rapid increase in the number of applications that are deployed within open and uncertain physical…”
    Get full text
    Conference Proceeding
  4. 4

    Towards Multi-view Android Malware Detection Through Image-based Deep Learning by Geremias, Jhonatan, Viegas, Eduardo K., Santin, Altair O., Britto, Alceu, Horchulhack, Pedro

    “…Over the last years, several works have proposed highly accurate Android malware detection techniques. Surprisingly, modern malware apps can still pave their…”
    Get full text
    Conference Proceeding
  5. 5

    A Column Generation Algorithm for Dedicated-Protection O-RAN VNF Deployment by Duong, Quang Huy, Tamim, Ibrahim, Jaumard, Brigitte, Shami, Abdallah

    “…The Open Radio Access Network (O-RAN) architecture brings openness, intelligence, and virtualization to RANs, allowing multi-vendor existence, achieving…”
    Get full text
    Conference Proceeding
  6. 6

    Transfer Learning based GPS Spoofing Detection for Cellular-Connected UAVs by Dang, Yongchao, Benzaid, Chafika, Taleb, Tarik, Yang, Bin, Shen, Yulong

    “…Unmanned Aerial Vehicles (UAVs) are set to become an integral part of 5G and beyond systems with the promise of assisting cellular communications and enabling…”
    Get full text
    Conference Proceeding
  7. 7

    Dynamics of Cooperative and Vulnerable Awareness Messages in V2X Safety Applications by Zoghlami, Chaima, Kacimi, Rahim, Dhaou, Riadh

    “…The main goal of this work is to set up a solution that allows the V2X system to optimize network resources selection under a certain number of constraints…”
    Get full text
    Conference Proceeding
  8. 8

    A Study of Multihop mmW Aerial Backhaul Links by Dabiri, Mohammad T., Hasna, Mazen O., Khattab, Tamer, Qaraqe, Khalid

    “…The main contribution of this paper is to analyze a long networked flying platform (NFP)-based millimeter wave (mmWave) backhaul link that is offered as a cost…”
    Get full text
    Conference Proceeding
  9. 9

    Conditional Handover in 5G - Principles, Future Use Cases and FR2 Performance by Stanczak, Jedrzej, Karabulut, Umur, Awada, Ahmad

    “…This paper elaborates on Conditional Handover (CHO) - a mobility feature designed in Release 16 of 3 rd Generation Partnership Project (3GPP), aimed at…”
    Get full text
    Conference Proceeding
  10. 10

    Optimized VANET Routing Protocol Using Cuckoo Search Algorithm by Hajlaoui, Rejab, Alaya, Bechir, Mchergui, Abir

    “…Having an Intelligent Transportation System is one of the most important research topics due to its economic and social importance. Despite the variety of…”
    Get full text
    Conference Proceeding
  11. 11

    PackChain: Toward a Blockchain-based Management Platform for Last-mile Delivery by Moudaa, Soufiane El, Ibrahim, Youssef, Kadadha, Maha, Mizouni, Rabeb, Otrok, Hadi, Singh, Shakti

    “…In this paper, a blockchain-based management platform, PackChain, for last-mile delivery is proposed. The growing popularity of online shopping has put immense…”
    Get full text
    Conference Proceeding
  12. 12

    Balanced Energy Consumption Based on Historical Participation of Resource-Constrained Devices in Federated Edge Learning by Albaseer, Abdullatif, Abdallah, Mohamed, Al-Fuqaha, Ala, Erbad, Aiman

    “…In recent years, Federated Edge Learning has gained interest from both industry and academia for deployment at the wireless network edge. However, some…”
    Get full text
    Conference Proceeding
  13. 13

    High definition map update for autonomous and connected vehicles: A survey by Boubakri, Anis, Gammar, Sonia METTALI, Brahim, Mohamed BEN, Filali, Fethi

    “…As making the right decision is a key element in autonomous driving systems, perfect knowledge of the traffic environment is necessary in order to avoid…”
    Get full text
    Conference Proceeding
  14. 14

    Collaborative Computation Offloading for UAVs and USV Fleets in Communication Networks by Zeng, Hui, Li, Ruidong, Su, Zhou, Xu, Qichao, Wang, Yuntao, Dai, Minghui, Luan, Tom H., Sun, Xin, Liu, Donglan

    “…Unmanned aerial vehicles (UAVs) empowered with artificial intelligence (AI) have become a new paradigm for marine monitoring and disaster rescue. In AI-enabled…”
    Get full text
    Conference Proceeding
  15. 15

    Cooperative Networking Using Passive Discovery For Dynamic Environments by Voicu, Razvan Cristian, Chang, Yusun

    “…Infrastructure limited zones like military environments differ from commercial and residential demands due to the sensitive applications and dynamic…”
    Get full text
    Conference Proceeding
  16. 16

    A Multi-Classifier for DDoS Attacks Using Stacking Ensemble Deep Neural Network by Sayed, Moinul Islam, Sayem, Ibrahim Mohammed, Saha, Sajal, Haque, Anwar

    “…DDoS (Distributed Denial of Service) attacks have emerged as a serious menace to the security and integrity of data and information systems. The primary aim of…”
    Get full text
    Conference Proceeding
  17. 17

    dRmin - Routing - A Decentralized Algorithm for Reliability-constrained Routing in Wireless Ad-hoc Networks by Kohlstruck, Christopher, Gotzhein, Reinhard

    “…In this paper, we propose a decentralized algorithm for the discovery and operation of reliability-constrained routes in wireless ad-hoc networks called dR min…”
    Get full text
    Conference Proceeding
  18. 18

    A New Architecture of 8K VR FOV Video End-to-End Technology by Zeng, Qimiao, Yin, Zhifan, Yu, Yuan, Zhuang, Yirong

    “…With the rapid development of virtual reality (VR) technology and the increasing demand for higher video quality, streaming videos imposes stringent…”
    Get full text
    Conference Proceeding
  19. 19

    Intelligent IoT Systems: security issues, attacks, and countermeasures by BEKRI, Wiem, LAYEB, Taher, JMAL, Rihab, FOURATI, Lamia CHAARI

    “…The Internet of things (IoT) growth has created a large spectrum of heterogeneous devices where these devices produce a considerable amount of data every…”
    Get full text
    Conference Proceeding
  20. 20

    Threat Modelling for 5G networks by Santos, Bernardo, Barriga, Luis, Dzogovic, Bruno, Hassan, Ismail, Feng, Boning, Jacot, Niels, Do, Van Thuan, Van Do, Thanh

    “…The new fifth generation (5G) mobile cellular network brings enhanced mobile broadband, massive machine type communication (e.g. IoT), critical machine type…”
    Get full text
    Conference Proceeding