default search action
Mohammed Jouhari
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c15]Khalil Ibrahimi, Mohammed Jouhari, Zineb Jakout:
Enhancing Intrusion Detection Systems Using Machine Learning Classifiers on the CSE-CIC-IDS2018 Dataset. WINCOM 2024: 1-6 - [c14]Mohammed Jouhari, Hafsa Benaddi, Khalil Ibrahimi:
Efficient Intrusion Detection: Combining X2 Feature Selection with CNN-BiLSTM on the UNSW-NB15 Dataset. WINCOM 2024: 1-6 - [i6]Mohammed Jouhari, Mohsen Guizani:
Lightweight CNN-BiLSTM based Intrusion Detection Systems for Resource-Constrained IoT Devices. CoRR abs/2406.02768 (2024) - [i5]Mohammed Jouhari, Hafsa Benaddi, Khalil Ibrahimi:
Efficient Intrusion Detection: Combining χ2 Feature Selection with CNN-BiLSTM on the UNSW-NB15 Dataset. CoRR abs/2407.14945 (2024) - 2023
- [j6]Mohammed Jouhari, Nasir Saeed, Mohamed-Slim Alouini, El Mehdi Amhoud:
A Survey on Scalable LoRaWAN for Massive IoT: Recent Advances, Potentials, and Challenges. IEEE Commun. Surv. Tutorials 25(3): 1841-1876 (2023) - [c13]Hafsa Benaddi, Mohammed Jouhari, Khalil Ibrahimi, Abderrahim Benslimane, El Mehdi Amhoud:
Improvement of Anomaly Detection System in the IoT Networks using CNN-LSTM Approach. GLOBECOM 2023: 3771-3776 - [c12]El Mehdi Amhoud, Mohammed Jouhari, Taras Maksymyuk, Kawtar Zerhouni, Khalil Ibrahimi:
Conditional Generative Adversarial Networks for Rx-to-Tx Translation in Wireless Communication Systems. GLOBECOM 2023: 7629-7634 - [c11]Mohammed Jouhari, Khalil Ibrahimi, Jalel Ben-Othman, El Mehdi Amhoud:
Deep Reinforcement Learning-Based Energy Efficiency Optimization for Flying LoRa Gateways. ICC 2023: 6157-6162 - [c10]Yaya Etiabi, Mohammed Jouhari, Andreas Burg, El Mehdi Amhoud:
Spreading Factor assisted LoRa Localization with Deep Reinforcement Learning. VTC2023-Spring 2023: 1-5 - [i4]Mohammed Jouhari, Khalil Ibrahimi, Jalel Ben-Othman, El Mehdi Amhoud:
Deep Reinforcement Learning-based Energy Efficiency Optimization For Flying LoRa Gateways. CoRR abs/2302.05214 (2023) - 2022
- [j5]Mohammed Jouhari, Abdulla Khalid Al-Ali, Emna Baccour, Amr Mohamed, Aiman Erbad, Mohsen Guizani, Mounir Hamdi:
Distributed CNN Inference on Resource-Constrained UAVs for Surveillance Systems: Design and Optimization. IEEE Internet Things J. 9(2): 1227-1242 (2022) - [j4]Hafsa Benaddi, Mohammed Jouhari, Khalil Ibrahimi, Jalel Ben-Othman, El Mehdi Amhoud:
Anomaly Detection in Industrial IoT Using Distributional Reinforcement Learning and Generative Adversarial Networks. Sensors 22(21): 8085 (2022) - [j3]Hafsa Benaddi, Khalil Ibrahimi, Abderrahim Benslimane, Mohammed Jouhari, Junaid Qadir:
Robust Enhancement of Intrusion Detection Systems Using Deep Reinforcement Learning and Stochastic Game. IEEE Trans. Veh. Technol. 71(10): 11089-11102 (2022) - [c9]Hafsa Benaddi, Mohammed Jouhari, Khalil Ibrahimi, Abderrahim Benslimane, El Mehdi Amhoud:
Adversarial Attacks Against IoT Networks using Conditional GAN based Learning. GLOBECOM 2022: 2788-2793 - [c8]Boutaina Jebari, Khalil Ibrahimi, Mohammed Jouhari, Mounir Ghogho:
Analysis of Blockchain Selfish Mining: a Stochastic Game Approach. ICC 2022: 4217-4222 - [i3]Mohammed Jouhari, El Mehdi Amhoud, Nasir Saeed, Mohamed-Slim Alouini:
A Survey on Scalable LoRaWAN for Massive IoT: Recent Advances, Potentials, and Challenges. CoRR abs/2202.11082 (2022) - [i2]Yaya Etiabi, Mohammed Jouhari, El Mehdi Amhoud:
Spreading Factor and RSSI for Localization in LoRa Networks: A Deep Reinforcement Learning Approach. CoRR abs/2205.11428 (2022) - 2021
- [c7]Hamza Zradgui, Mohammed Jouhari, Khalil Ibrahimi:
Decentralized Autonomous Underwater Vehicles Distribution for IPv6-UWSN: A Study With Heuristic Methods. CommNet 2021: 1-9 - [c6]Hafsa Benaddi, Mohammed Jouhari, Khalil Ibrahimi, Abderrahim Benslimane:
Securing IoT Transactions Against Double-Spending Attacks based on Signaling Game Approach. GLOBECOM 2021: 1-6 - [i1]Mohammed Jouhari, Abdulla K. Al-Ali, Emna Baccour, Amr Mohamed, Aiman Erbad, Mohsen Guizani, Mounir Hamdi:
Distributed CNN Inference on Resource-Constrained UAVs for Surveillance Systems: Design and Optimization. CoRR abs/2105.11013 (2021)
2010 – 2019
- 2019
- [j2]Mohammed Jouhari, Khalil Ibrahimi, Hamidou Tembine, Jalel Ben-Othman:
Underwater Wireless Sensor Networks: A Survey on Enabling Technologies, Localization Protocols, and Internet of Underwater Things. IEEE Access 7: 96879-96899 (2019) - [j1]Mohammed Jouhari, Khalil Ibrahimi, Hamidou Tembine, Mohammed Benattou, Jalel Ben-Othman:
Signaling game approach to improve the MAC protocol in the underwater wireless sensor networks. Int. J. Commun. Syst. 32(13) (2019) - 2018
- [c5]Mohamed Ammar, Khalil Ibrahimi, Mohammed Jouhari, Jalel Ben-Othman:
MAC Protocol-Based Depth Adjustment and Splitting Mechanism for UnderWater Sensor Network (UWSN). GLOBECOM 2018: 1-6 - 2017
- [c4]Imane Rouam, Khalil Ibrahimi, Mohammed Jouhari:
Best association of macro user in two-tier cellular networks. WINCOM 2017: 1-6 - 2016
- [c3]Mohammed Jouhari, Khalil Ibrahimi, Mohammed Benattou, Abdellatif Kobbane:
New greedy forwarding strategy for UWSNs geographic routing protocols. IWCMC 2016: 388-393 - [c2]Mohammed Jouhari, Khalil Ibrahimi, Mohammed Benattou:
Implementation of Bit Error Rate Model of 16-QAM in Aqua-Sim Simulator for Underwater Sensor Networks. UNet 2016: 123-134 - 2015
- [c1]Mohammed Jouhari, Khalil Ibrahimi, Mohammed Benattou:
Topology control through depth adjustment and transmission power control for UWSN routing protocols. WINCOM 2015: 1-5
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint