


default search action
12th WINCOM 2025: Riyadh, Saudi Arabia
- 12th International Conference on Wireless Networks and Mobile Communications, WINCOM 2025, Riyadh, Saudi Arabia, November 25-27, 2025. IEEE 2025, ISBN 979-8-3315-9878-5

- Yassine Benhlal, Khadija Marzagui, Abdelkaher Ait Abdelouahad, Abdellatif Dahmouni:

No-Reference Image Quality Assessment Using FPLBP Features with Laplacian of Gaussian. 1-6 - Ennaciri Hicham, Farissi Youssra, Yasser Elouargui, Meriyem Chergui, Imtiaz Adam:

Financial Factor Returns and Portfolio Optimization: From Forecasting to Investment Strategy Using Temporal Fusion Transformers and Genetic Algorithms. 1-6 - Chaimae Illi, Azeddine Elhassouny:

A Multi-Layered Architecture for AI-Enhanced Learning in the Edu-Metaverse. 1-6 - Peyman Teymoori, Toktam Ramezanifarkhani:

Performance Modeling of Recursive Networks with PEPA: Quantitative Insights and Scalability Challenges. 1-8 - Khaled Humaid Altuwairgi, Abdulkarim Al Hanif, Khairi Ashour Hamdi:

Impact of Interference on the Performance of Integrated Sensing and Backscatter Communications. 1-5 - Adnane Souha, Charaf Ouaddi, Lamya Benaddi, Abdeslam Jakimi:

Modeling and Automated Code Generation of the Backend of Tourism Applications. 1-6 - Zakariae Zrimek, Youssef Mourchid, Mohammed El Hassouni:

Knowledge Distillation with Enhanced Lightweight STGCN for Gait Disorders Recognition. 1-6 - Maryam Ben Driss, Essaid Sabir:

Device- and Location-Aware Client Clustering for Heterogeneous Federated Learning. 1-6 - Mohammad J. Akhtar, Rishabh Jain, Iqra Batool, Mostafa M. Fouda, Mohamed I. Ibrahem, Sherief Hashima, Zubair Md Fadlullah:

Combating Neural Network Adversaries in Autonomous Vehicles: A 6G-Ready Defense Framework. 1-6 - Fadwa Bezzazi, Dounia Lotfi:

Optimizing Firewall Policy Rule Ordering Using Discrete Cuckoo Search Algorithm. 1-6 - Nesrine Atitallah, Feras Dalou, Bandar Ali Al-Rami Al-Ghamdi:

Advanced Self-Supervised Learning for Enhanced Heart Disease Prediction. 1-7 - Wassim Kribaa, Miloud Bagaa, Ibrahim Afolabi, Adlen Ksentini, Mohammed S. Elmusrati, Petri Välisuo:

ML-Based UAV Routing with Dynamic Geofencing Using 5G NEF and CAMARA APIs. 1-8 - Abdelaziz Boukhalfa, Meryem Lasaad, Lamya Benaddi, Abdeslam Jakimi, Moulay Youssef Hadi:

Blockchain-Enabled Smart Tourism: Key Benefits and Systemic Comparison with Centralized Models. 1-7 - Hind Amrani, Jamal Elhachmi, Abdellatif Kobbane:

Federated Learning for DDoS Attack Detection in SDN: A Privacy-Preserving Approach. 1-6 - Mohammed Ibrahim El-Hajj:

Hybrid Malware Classification using Static and Dynamic Features with Machine Learning. 1-8 - Moughit Imane, Hafidi Imad, Najib Mouhassine, Moughit Mohamed:

A Novel Approach to Test Case Generation in Software Testing Using Pre-Trained Large Language Models. 1-7 - Dahhak Hajar, Nadia Afifi, Imane Hilal:

Optimizing Falcon-Based Post-Quantum Blockchain Performance Through Compression Integration. 1-6 - Elly Warni, Indrabayu, Andani Achmad:

Comparative Analysis of Series YOLO Models for Loose Fruits Palm Oil Detection: A Comprehensive Performance Evaluation. 1-6 - Jamila El Moubaraki, Omar Boutkhoum, Hamid El Byad:

Approaches of Deep Learning for Diagnostic use on Cone Beam CT Imaging in Dentistry: A Review. 1-8 - Jaouhara Bouamama, Yahya Benkaouz, Mohammed Ouzzif:

Decentralized Privacy-Preserving Federated Learning Using Additive Secret Sharing. 1-6 - Abdelhadi Rachad, Lotfi Gaiz, Khalid Bouragba, Mohammed Ouzzif:

Application of Blockchain Technology in International Maritime Logistics: Case of Smart Bill of Lading. 1-6 - Wiâme Bouhali, Elmostafa Belmekki, Mostafa Bellafkih:

Investigating Cyber Attacks on Linux: A Lightweight Forensic Toolkit. 1-7 - Yufei Liu, Noor Ahmed:

Performance Evaluation of MQTT and ZeroMQ Messaging Protocols for UAV Applications. 1-6 - Moad Dehbi, Mohamed Amine Bouzaidi Tiali, Yassin El Hillali, Atika Rivenq, Marwane Ayaida:

ECHO: An Explainable Cooperative Highway Operator for Human-Centric ADAS. 1-7 - Jawaher Badr Alotibi, Samia Dardouri:

Diagnosis of Gallbladder Diseases Using Artificial Intelligence: A Comprehensive Survey. 1-5 - Anass Bengmah, Abdelhakim Khaouiti, Mahmoud El Hamlaoui, Rdouan Faizi, Bouchaib Bounabat:

AI-Driven Diabetes Management: A Retrieval-Augmented Conversational Approach. 1-6 - El Hadji Malick Ndoye, Ousmane Diallo, Malaw Ndiaye, Mohamed El-Kamili:

A Zone-Based LoRa Deployment for Agriculture Area Monitoring. 1-6 - Mohcine Baalla, Driss Bouzidi:

Zero Knowledge Proof in Vehicular Networks. 1-6 - Manal Ed-Daoudi, Karima Moumane, Zineb Mouman, Ibtissam AIT Lakhal, Farha Oudaoud:

Performance and Security in AI-Driven mHealth: A Comparative Evaluation of PostgreSQL, MongoDB, and Firebase for Endometriosis Management. 1-7 - Ahmed Khoumsi:

A Robust Optimal Patient Distribution Enforced by Blockchain. 1-8 - Ali Mohammad Hayajneh, Maryam Hafeez, Abdelaziz Salama, Syed Ali Raza Zaidi, Desmond C. McLernon:

UAV-Assisted Federated Learning: Elevating Decentralized Training to Optimal Heights. 1-6 - Salma Tika, Abdelkrim Haqiq, Essaid Sabir, Elmahdi Driouch:

Where 6G Stands Today: Evolution, Enablers, and Research Gaps. 1-8 - Ilham Salhane, Hanae Terchoune, Mounir Rifi:

Parametric Analysis of a Rectangular Microstrip Antenna Array Resonating at 5.8 GHz for a Microwave Power Transfer System. 1-5 - Yasser Elouargui, Abdellatif Sassioui, Meriyem Chergui, Rachid Benouini, El Mehdi Benyoussef, Mohamed El-Kamili, Mohamed Ouzzif:

Knowledge Distillation or Efficient Attention? A Systematic Benchmark of Compact Transformers for ESG Text Classification. 1-6 - Ali Bouchareb, Boucif Amar Bensaber, Ismaïl Biskri:

A Flexible Architecture for Securing Transactions and Data Flows in Smart Home IoT. 1-8 - Andrey Garnaev, Wade Trappe:

A Strategy of Guaranteed Information Freshness for Several Receivers Under Jamming. 1-6 - Hind Laachari, Abdellatif Kobbane, Hamidou Tembine:

Leveraging Transformer-Based Models for Cyberbullying Detection in the Moroccan Arabic Dialect. 1-6 - Younes-Amine Loutfi, Marc Frappier, Brahim EL Bhiri, Pierre-Martin Tardif, Mohammed Raiss El-Fenni:

EHKEA: A Lightweight and Secure Authentication Protocol for Healthcare Iot Systems in 5G Networks with Enhanced Resistance to Emerging Threats. 1-6 - Anass Rghioui, Mariam Cherrabi:

Enhancing Security and Anomaly Detection in IoMT Systems Using Autoencoders and Blockchain. 1-6 - Mohamed Elsersy, Ahmed Abdelwahab:

Towards Transparent IoT Malware Detection: A ML/DL and XAI-Based Multi-Class Classification Approach. 1-8 - Akkaoui Achraf, Wafaa Dachry, Zahidi Yassine, Mohamed El Moufid, Hicham Medromi, Gziri Hassan:

Reinforcement Learning for Hemodialysis Management: Framework, Simulation, and Evaluation. 1-6 - Nouhaila Sennouni, Jamal Elhachmi, Abdellatif Kobbane, Khaoula Oulidi Omali:

Hybrid IDS for IoT Approach Combining Deep Extraction and Robust Classification. 1-6 - Ryan McCarthy, Noor Ahmed:

On Convolutional Neural Networks for Mini UAV Swarms. 1-6 - Wasim A. Ali, Mohsen S. Alsaadi, Michele Roccotelli, Agostino Marcello Mangini, Maria Pia Fanti:

Real-Time Sybil Attack Detection in Vehicular Networks Using Simulation-Based Machine Learning. 1-6 - Hadj Ahmed Chikh Dahmane, Sherif Mostafa, Moustafa Youssef, Muhammad Sulaiman, Raouf Boutaba:

vChainnet: Accurate and Scalable End-to-End Slice Modeling for 5G and Beyond Networks. 1-6 - Muhammad Hasnain, Nadeem Javaid, Nidal Nasser, AbdulAziz Al-Helali:

MALOS-IoT: A Multi-Stage Advance Learning and Optimization Framework for IoT Intrusion Detection. 1-6 - Rawaa Dkhil, Boumedyen Boussaid, Ahmed Zouinkhi, Mohamed Djemai:

Cyberattack Detection in Multi-Agent System. 1-6 - Dahlila Putri Dahnil, Maryati Mohd Yusof, Nurhidayah Bahar, Meng Chun Lam:

An Integrated Mobile Application with Tangible Assistive Device for Braille Quranic Studies. 1-8 - Abdelilah Zadid, Soufiane Hamida, Amal Tmiri, Oumaima Majdoubi, Bouchaib Cherradi:

Early UAV Motor-Fault Prediction Using Classical Machine Learning on RflyMAD. 1-6 - Bernard Armel Sanou, D. O. Abdoul Fatas Bamogo, Pasteur Poda:

Bridging Digital Divide for Participants of Videoconferencing Sessions with Unequal Access to Mobile Internet: A MEC-Based Approach. 1-6 - Issam Ait Yahia, Abdelkader El Mahdaouy, Soufiane Oualil, Ismail Berrada:

LiteMixer: Scalable, Low-Overhead Multi-Scale Mixing for Time Series Forecasting. 1-7 - Hafiz Muhammad Fahad Noman, Effariza Hanafi, Kaharudin Dimyati, Kamarul Ariffin Noordin, Atef Abdrabou:

A Multi-Agent DDQN-Based Joint Spectral and Energy-Efficient Resource Allocation in D2D-Assisted Heterogeneous 6G Networks. 1-6 - Hajar Sahbani, Mouad Assadi, Najwa Rhefrali, Yassine Inbach, Mourad Ouadou:

A Hybrid Approach for Threat Detection in Social Networks Using Graph Metrics and GANs. 1-5 - Saida Haidrar, Adil Anwar, Leila Amdah, Hajar Elmaghraoui, Yasmine Ghazlane, Hafsa Ouchra:

NLP-Assisted Requirements Traceability Pipeline: Multimedia System use Case. 1-6 - Nada Bendahman, Dounia Lotfi:

Dual Parameters of Influence: Unveiling a Novel Centrality Measure for Social Media Networks. 1-6 - Karima el Hachimi, Ghizlane Orhanou, Lahoucine Ballihi:

Credit Card Fraud Detection Model Based on Explainable Tabnet-Based Feature Selection. 1-7 - Idriss Moumen, Adil El Makrani, Najat Rafalia, Jaafar Abouchabaka:

A Novel Hybrid XGB-RF BlendStack Model for Traffic Flow Prediction. 1-7 - Chaymae El Mechal, Najiba El Amrani El Idrissi, Loubna Mazgouti, Fatima-Zahra Ammor:

TransUNet++: A Multiscale CNN-Transformer Hybrid Framework for Multi-Modal Brain Tumor Segmentation. 1-6 - Nabeil Eltayieb, Majdi Abdellatief, Samah Mohamed Osman, Rashad Elhabob:

TRCP-SSG: A Tamper-Resilient Cryptographic Protocol for Secure Smart Grids. 1-7 - Kelebaone Tsamaase, Sajid Mubashir Sheikh, Theo Motlhatlhedi, Thabang Seeketso, Karabo L. Sithole:

Design of a Solar-Powered Automated Dip Spray System for Small Stock Farmers in Remote Areas in Developing Countries. 1-6 - Oumaima Ennasri, Iyad Lahsen Cherif, Omar Ait Oualhaj, Abdelah Najid:

Federated Learning Meets Cybersecurity: Aggregation Strategies Using UNSW-NB15 Dataset. 1-6 - Youssef Sabiri, Walid Houmaidi, Fatima Zahra Iguenfer, Amine Abouaomar:

AttriGen: Automated Multi-Attribute Annotation for Blood Cell Datasets. 1-6 - Walid Houmaidi, Youssef Sabiri, Salmane El Mansour Billah, Amine Abouaomar:

Accelerating Cerebral Diagnostics with BrainFusion: A Comprehensive MRI Tumor Framework. 1-6 - Adnan A. Hnaif:

A Comparative Analysis of Edge Computing and Fog Computing in Decentralized Networks: Performance and Scalability. 1-5 - Hamza El Atrassi, Yasmina El Idrissi, Yahya Benkaouz:

CodeWisp: AST Guided Retrieval Augmented Generation for Code Generation and Completion. 1-6 - Rim Hamdaoui, Rawaa Dkhil, Abdullah Shawan, Boumedyen Boussaid, Mohamed Djemai:

Cyberattack Detection in a Robotic Network Using the LPV Kalman Filter Approach. 1-6 - Aymin Javed, Nadeem Javaid, Zeeshan Ali, Nidal Nasser, Asmaa Ali:

An Intelligent Intrusion Detection Framework for IoT Using Active Learning and Metaheuristic Optimization. 1-6 - Abdulkadir Dauda, Olivier Flauzac, Florent Nolot:

IoT Applications Management Approach for Universal Container-Based Gateway Using Webservices. 1-6 - Ayoub El Idrissi, Abdelfatteh Haidine, Mohamed Hanine:

A Bibliometric Analysis of Machine Learning in Maritime Industry as Part of Industry 4.0/5.0. 1-7 - Moncef Zarrouk, Faissal El Bouanani, Zakaria El Allali, Fouad Ayoub:

Optimized Threshold Selection for Client Participation in Iot-Based Federated Learning. 1-5 - Shunrui Huang, Shuang Li, Peter J. Smith, Pawel A. Dmochowski, Longxiang Guo, Yuxiang Zhang, Wei Ge:

Long-Term Hybrid MRC with Imperfect CSI for Distributed MU-MIMO Systems. 1-6 - Rami Alboqmi, Rose F. Gamble:

Securing Microservices: Risk-Adaptive gRPC Access Control Policies. 1-6 - Mohammed Moustaid, Soufiane Hamida, Abdelaziz Daaif, Bouchaib Cherradi:

Toward Dynamic Risk Assessment: Machine Learning and LLMs in Software Vulnerability Prioritization. 1-6 - Sahar Saleh, Tale Saeidi, Nick F. Timmons, Faroq Razzaz:

Compact Low SAR X-Ku Band Planar Inverted F Antenna for Wearable Application. 1-5 - Salah El Hajla, El Mahfoud Ennaji, Yassine Maleh, Soufyane Mounir:

Boosting IoT Intrusion Detection with Hybrid Federated Learning. 1-6 - Meihan Lin, Cailian Chen, Yanzhou Zhang, Lynda Mokdad, Mohamad Assaad, Jalel Ben-Othman:

MDP-Based Modeling of TSN Switches Under Stochastic Flow Behaviors. 1-6 - Tarik Benabbou, Aïcha Sahel, Abdelmajid Badri, Ilham El Mourabit:

Reinforced-2GSeg: A Dual-Generator cGAN Enhanced with Channel and Spatial Attention for Accurate and Resource-Efficient Medical Image Segmentation. 1-6 - Khaled Suwais, Sally Almanasra:

Advancements in Leaf Recognition Technologies: a Comprehensive Review. 1-6 - Abdelaziz Salama, Mohammed M. H. Qazzaz, Syed Danial Ali Shah, Maryam Hafeez, Syed Ali Raza Zaidi, Hamed Ahmadi:

EcoFL: Resource Allocation for Energy-Efficient Federated Learning in Multi-RAT ORAN Networks. 1-7 - El Ouatiq Meriem, Abdelkaher Ait Abdelouahad, Abdellatif Dahmouni:

From Structure to Strength: A Deep Learning Approach to Edge Weighting in Graph-Based Community Detection. 1-6 - Zawar Hussain, Faran Awais Butt, Ali Hussein Muqaibel, Saleh Ahmed Alawsh, Ijaz Haider Naqvi:

Impact of RIS Orientation on Throughput in UAV-Assisted Wireless Systems. 1-5 - Aki Nagano:

Designing Personas for Business AI Agents. 1-6 - Aya El Hjajbi, Archi Taha, Mohammed Benattou:

Intrusion Detection in IoT Networks Using Hybrid Feature Selection. 1-6 - Oumayma Lanaya, Hajar El Karch, Youssef Natij, Meriem Elatik, Abdelmounaim Belaarbi, Abdelkader Mezouari:

Review of AI Methods for Intelligent Photovoltaic Systems in Smart Grids: Forecasting, Sizing, MPPT, and Fault Diagnosis. 1-4 - Youssou Faye, Abdallah Makhoul, Serigne Mbacké Diene, Mohammed Ouzzif, Cheikhou Oumar Sow:

S-Cup: A Security Protocol for Self-Reconfiguration by Clustering on Programmable Matter Based Modular Robots. 1-8 - Rabab Benfouina, Ahmed Drissi El Maliani:

Custom Image-To-Graph Transformation Strategies for Object Detection with GATs on the KITTI Dataset. 1-6 - Abdulaziz Alatawi, Hamid R. Sadjadpour, Zouheir Rezki:

LSTM-Based Channel Estimation for OFDM Systems. 1-5 - Anas Abouaomar, Mohammed El Hanjri, Abdellatif Kobbane, Anis Laouiti, Khalid Nafil:

Hierarchical Federated Learning for Crop Yield Prediction in Smart Agricultural Production Systems. 1-6 - Lachhab Youssef, Elhoussine Ziyati:

The Effectiveness of Prompt Engineering for Arabic Aspect Category Polarity Analysis. 1-6 - Sabella Millicent Sefho, Sajid Mubashir Sheikh, Ali Akbar Firoozi:

UAV-Assisted Surface Hole Detection and Volume Estimation for Construction Site Monitoring. 1-6 - Laghzil Said, Lahcen Niharmine, Ahmed Azouaoui, Moulay Youssef Hadi:

Tifinagh Handwritten Word Recognition Using CNN Algorithm. 1-5 - Mohamed M. H. Shalma, Engy Aly Maher, Ahmed El-Mahdy:

Hybrid Deep Reinforcement Learning for Joint Resource Allocation in Multi-Active RIS-Aided Uplink Communications. 1-6 - Nadim Ahmed, Md. Ashraful Babu, Md. Manir Hossain Mollah, Md. Mortuza Ahmmed, Md. Mostafizur Rahman, Mufti Mahmud:

LRAE: A Low-Rank Autoencoder for Real-Time Efficient CAN Bus Intrusion Detection. 1-6 - Youssef Oubaydallah, Khalil Ibrahimi, Rachid El Azouzi, Hatim Ousilmaati:

W-RPC: A Weighted Reducer Placement and Coflow Scheduling Scheme. 1-7 - Jinfeng Li, Haolin Zhou:

Comparative Radiation Analysis of Vertical and Circular Disk Monopole Antennas for 433 MHz LoRa IoT Applications Using Method of Moments. 1-6 - Ramzi Boutahala, Hacène Fouchal, Marwane Ayaida, Shiwen Mao:

Trust Verification in Connected Vehicles Using Unsupervised Variational Autoencoder. 1-6 - Adil Haouas, Abdellatif Kobbane, Hamidou Tembine:

Ranking Large Language Models with Human Preferences: A Game-Theoretic and Bayesian Comparative Study. 1-6 - Yassine Ben-Aboud, Abdellatif Kobbane:

AgriTwin-Sim: An Interactive Digital Twin Framework for AI-Driven Smart Farming. 1-6 - Marran Al Qwaid:

A SVM-GWO-Based Prediction Method in a Smart Home with a Security-Conscious Data Model. 1-8 - Lahcen Hassine, Yassine Loukili, Hasna Chaibi, Younes Ledmaoui, Rachid Saadane, Abdellah Chehri:

Towards Proactive Cybersecurity in Smart Grids: Behavioral Advanced Persistent Threat Detection via Adversarial and Autoencoder Architectures. 1-6 - Nouhayla El Anzoul, Younes Karfa Bekali, Khalid Minaoui:

Reconfigurable Ring-Enhanced Circular Patch Antenna for 5G and Dual-Band WiFi Applications. 1-6 - Hassan Saadaoui, Faissal El Bouanani, Karim Abouelmehdi:

Enhanced Cooperative UAV Swarm Search via LoPSO Integration and Adaptive Sequential Stopping Strategy. 1-7 - Aymin Javed, Nadeem Javaid, Zeeshan Ali, Nidal Nasser:

OASIS: Optimized Active Sampling for Intrusion Detection in IoT Systems. 1-6 - Iqra Batool, Mostafa M. Fouda, Mohamed I. Ibrahem, Muhammad Ismail, Sherief Hashima, Zubair Md Fadlullah:

PFANS: An Intelligent 6G Framework for Dynamic Autonomous Vehicle Learning. 1-6 - Adnane Touiyate, Tarik Boujiha, Chaïmaâ Kissi, Idriss Moumen:

Alignment-Free DNA Sequence Clustering Using Deep Siamese BiLSTM and Attention Mechanisms. 1-6 - Fatiha Lamaallaoui, Sara Laghmati, Dounia Lotfi:

Graph-Based Analysis of Brain Connectivity Alterations Induced by Tumors. 1-6 - Tarik El Arrouch, Najiba El Amrani El Idrissi, Chaibi Mohamed, Sudipta Das, Errajraji Karim:

Gain Improvement of a Monopole Antenna for Wimax /Wlan 5G/6G Applications Using Amc Technique. 1-7 - Achraf Sayah, Said Aqil, Mohamed Lahby:

Mathematical Modeling and Metaheuristic Optimization of IoT Task Scheduling in Distributed Flow Shop Edge Networks. 1-6 - Youssra Baja, Khalid Chougdali:

A Hybrid Semi-Supervised Learning Approach Based Dimensionality Reduction for Emerging IoT Cyber Attack Analysis. 1-8 - Mohsin Khalil, Raheel Asif, Muhammad Amir Tahir, Muhammad Nasar Jamal:

Seizure Detection Using Reduced Temporal EEG Channels: A Performance-Driven Approach. 1-6 - Nada M. Sallam, Samah Osman:

Semantics Driven Multi Agent Artificial Intelligence Framework for Adaptive Resource Management in SixG Mobile Edge Networks. 1-6 - Hira Khan, Nadeem Javaid, Asmaa Ali, Nidal Nasser, AbdulAziz Al-Helali:

Real-Time IoT Intrusion Detection using Deep Learning with Uncertainty and Optimization Mechanism. 1-7 - Mehdi Moucharraf, Mohammed Ridouani, Fatima Salahdine, Naima Kaabouch:

A Hybrid CNN-LSTM Architecture for Multiclass Intrusion Detection in IoT Networks. 1-7 - Ayoub El-Alami, Younes Nadir, Khalifa Mansouri:

Zero-Shot YOLOv8 Descriptors for Low-Latency Object Tracking. 1-5 - Youssef Sabiri, Walid Houmaidi, Amine Abouaomar:

EYE-DEX: Eye Disease Detection and EXplanation System. 1-6 - Assiya Akli, Khalid Chougdali:

A Unified Framework for Decentralized Identity and Trust Management in IoT Using Self-Sovereign Identity and IOTA. 1-5 - Hamza Zradgui, Khalil Ibrahimi, Mohamed El-Kamili:

Adaptive Fuzzy Energy-Efficient Clustering and Energy Optimization Protocol for Underwater Wireless Sensors Networks. 1-6 - Hatim Jaadouni, Samya Bouhaddour, Imane Daha Belghiti, Chaimae Saadi, Habiba Chaoui:

AI-Enhanced Routing Optimization for SDN/NFV Architectures in Large-Scale IoT Networks. 1-6 - Douaaw El Achhab, Meryeme Ayache, Ait Oualhaj Omar:

Hybrid Deep Learning for Intrusion Detection in IIoT Networks: A CNN-LSTM-Attention Approach. 1-6

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














