


default search action
CITS 2025: Colmar, France
- Mohammad S. Obaidat, Pascal Lorenz, Kuei-Fang Hsiao, Petros Nicopolitidis, Yu Guo:
International Conference on Computer, Information and Telecommunication Systems, CITS 2025, Colmar, France, July 16-18, 2025. IEEE 2025, ISBN 979-8-3315-1437-2 - Mustafa Akpinar, Usman K. Durrani, Kevser Ovaz Akpinar, Mohamed Saleh:
Subway Ridership Forecasting Using Seasonal and Holt-Winters Models with Calendar Effects. 1-5 - Neeraj Kumar, Mohammad S. Obaidat, Rifaqat Ali, Balqies Sadoun:
Smart Contract-Enabled Land Registration: Ensuring Secure Buying and Selling with Mutual Authentication. 1-8 - Aya Kh. Ahmed
, Hamed S. Al-Raweshidy:
Performance Evaluation of Concatenated Rate Splitting Multiple Access for 6G Multiuser Communication System. 1-7 - Harun Mohamed Huka, Manar Jammal:
Explainable Machine Learning for Spatio-Temporal Demand Forecasting in Autonomous Vehicle Fleets. 1-6 - Md Saiful Islam Rubel, Nahi Kandil, Nadir Hakem, Mozhan Shirani:
AAPS: An Adaptive Aggregated Parameter-Based Protocol for Agricultural Wireless Sensor Networks. 1-5 - Kangogo Kimeli, Ruairí de Fréin:
Load-Adjusted Transfer Learning for Limited Video-On-Demand Data. 1-8 - Axel Sikora, Vitaliy Yakovyna:
Heterogeneous Real-Time & Secure Networks: TSN over Anything & TLS over Anything. 1-5 - Juan Minango-Negrete, Marcelo Zambrano, Juan Minango, Wladimir Paredes-Parada:
Attendance System Based on Face Recognition. 1-6 - Mohammed A. Alqodah, Mustafa M. Matalgah, Ali A. Al-Sharadqah:
BPSK/BFSK Error Probability Analysis of Best Relay Selection over α-μ Fading Channels. 1-6 - Ketav Shah, Aparna Kumari, Bhavya Solanki, Safaa Najah Saud Al-Humairi, Asma'a Mahfoud Hezam Al-Hakimi:
ZTSec-FedSDN: A Privacy-Preserving Federated Framework for SDN Attack Detection Using Zero-Trust Blockchain and 6G Terahertz Networks. 1-6 - Iker Hernández
, Daniel Mejías, Zaloa Fernández, Victor Herranz:
Beyond NWDAF Services for Comprehensive 5G Network Analytics and Orchestration. 1-8 - Akshita Patwal
, Mohammad S. Obaidat, Gagan Dangwal, Mohammad Wazid, Ashok Kumar Das, Balqies Sadoun, Devesh Pratap Singh:
Enhanced Intrusion Detection System for Securing UAV Networks in Smart Farming Applications. 1-8 - Parshva Shah, Prince Jayantibhai Tandel, Aparna Kumari, Sunil Kumar, Narender Kumar, Suman Ghanghas, Jyotsana Sardana:
DiabSecure: Federated-TinyML-enabled unified Privacy-Preserving Framework for Diabetes Risk Assessment using Zero-Trust Blockchain. 1-8 - Ayushi Shah, Mohammad S. Obaidat, Divyam Shah, Saumya Shah, Rajesh Gupta, Sudeep Tanwar, Jitendra Bhatia:
X-SENSE: Explainable ML-based Intelligent Sensor Environment for Wireless Network Security. 1-6 - Lakshin Pathak, Mohammad S. Obaidat, Khushi Vasava, Vidhi Ruparelia, Shimoly Shah, Rajesh Gupta, Sudeep Tanwar, Kuei-Fang Hsiao:
TeleSure: TinyML-Based Framework for Secure UAV Delivery in Telesurgery Systems with 5G. 1-6 - Qusai Hasan, Sahar Abdelbasit, Kevser Ovaz Akpinar:
Anomaly and Malware Detection in IoT Networks. 1-6 - Bruno Mendes, Adriano Goes, Marco Araújo, Daniel Corujo, Arnaldo S. R. Oliveira:
Study of the Impact of Cooperative Maneuvers Among Different Types of Vehicles in Real-World Scenarios. 1-8 - Deepika Bishnoi, Yogesh Chaba:
Enhanced Fault Detection and Tolerance in Wireless Sensor Networks Using Recurrent Long-Short Function Harmonic Network with Hybrid CNN-LSTM Model. 1-6 - Alexander Mutiso Mutua, Ruairí de Fréin, Kangogo Kimeli:
Predicting SoH in Lithium-ion Batteries using a Variational Quantum Neural Network. 1-8 - Yogi Patel, Mohammad S. Obaidat, Khushi Savsani, Rajesh Gupta, Jitendra Bhatia, Sudeep Tanwar, Sahil Sawhney, Balqies Sadoun:
Intelligent Wireless Network Security Framework for Telesurgery Communication Systems in Healthcare 4.0. 1-6 - Polash Deb, Damian Valles Molina, Semih Aslan:
FPGA based Matrix Multiplication Accelerator. 1-6 - Anwar Ahmed Khan, Farid Naït-Abdesselam, Indrakshi Dey:
Next-Generation MAC Technique for Priority Handling in Industrial Cyber-Physical Systems. 1-6 - William Abou-Khalil, Oriana Eid, Maria Sokhn, Rima Kilany Chamoun:
A canvas-based AI-driven framework supporting SMEs digital transformation roadmap. 1-8 - Anshika Pandey, Mohammad S. Obaidat, Akriti Kushwaha, Sanjeev Kumar Dwivedi, Ruhul Amin:
Exploring Blockchain in the Metaverse: Review of State-of-the-Art Frameworks and Future Research Challenges. 1-6 - S. Wijesinghe, Charalampos C. Tsimenidis, Shahid Mumtaz:
Precoding Algorithms for IRS Assisted MIMO Networks. 1-6 - Nokwanda Shezi, Noemí Merayo, Bakhe Nleya, Juan Carlos Aguado:
Adaptive Proximal Policy Optimization for Efficient and SLA-Compliant Dynamic O-RAN Slice Resource Allocation. 1-7 - Shama Siddiqui, Indrakshi Dey:
Optimizing Next Generation Wireless BAN with Prioritized Access for Heterogeneous Traffic. 1-5 - Selina Cheggour, Aymen Bouferroum, Rahul Krishnan:
Reinforcement Learning-Driven UC-CFmMIMO for UAVs: A Subband Allocation Framework. 1-8 - Mojtaba Mahdavi:
Solving Systems of Linear Equations Using In-Memory Computing. 1-6 - Sanjeev Kumar Dwivedi, Mohammad S. Obaidat, Ruhul Amin, Adesh Pandey, Hardev Singh Pal, Balqies Sadoun:
Blockchain based Decentralized Micro-loan Management Platform for MSME. 1-6 - Enes Bugra Kaya, Semih Aslan, Damian Valles, Anandi K. Dutta, Sercan Iscan
:
Motor Fault Diagnosis Across Variable Power Using Deep Learning. 1-7 - Helen D. Karatza:
Scheduling Gang Jobs with Security Requirements on a Hybrid Cloud. 1-8 - Anu Sathyajith Mathew
, Axel Sikora:
Realistic Modelling and Optimization of DTLS Handshakes in Constrained LPWAN Environments. 1-7 - Marcus Schulze, Semih Aslan, Damian Valles, Harold P. Stern:
Image Restoration with Variational Dynamic Memory Net, U-Net and LNNS. 1-8 - Divya Bhatt, Le Gruenwald:
Detection of Poisoning Attacks in Federated Learning with Non-IID data. 1-8 - Mukesh Bhandari, Mohammad S. Obaidat, Ishita Tomar, Anshu Gupta, Ishita Singh, Dashpreet Singh, Saksham Mittal, Mohammad Wazid:
Machine Learning-Envisioned Mechanism for Phishing Attack Identification Through URLs. 1-6 - Muhammad Idham Habibie, Khondaker Musfakus Salehin:
Detection of Eavesdropping Attacks in a Noisy Quantum Channel Using k-Means Clustering: A Case Study of BB84 Protocol. 1-8 - Erich S. Ellsworth, Daniyar Boztayev, Priyan Shah, Liam Quinn, Semih Aslan:
Implementation of the Ascon Encryption Algorithm for Secure Industrial IoT Networks. 1-7

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.