default search action
SmartNets 2024: Harrisonburg, VA, USA
- International Conference on Smart Applications, Communications and Networking, SmartNets 2024, Harrisonburg, VA, USA, May 28-30, 2024. IEEE 2024, ISBN 979-8-3503-8532-8
- Alma Oracevic, Ahmad Salman:
Unmanned Aerial Vehicles in Peril: Investigating and Addressing Cyber Threats to UAVs. 1-7 - Ramesh Deshpande, B. Rama Sanjeeva Reddy, Jayshree Das, B. Naresh Kumar, Sanjay Dubey, Srinivas Gutthi:
Design and Simulation of Microstrip Patch Antenna with Defected Ground Structure for Satellite Application in Ku Band. 1-4 - Georgios Samaras, Marinela Mertiri, Maria-Evgenia Xezonaki, Nikolaos Psaromanolakis, Vasileios Theodorou, Theodoros Bozios:
Unlocking the Path Towards Automation of Tiny Machine Learning for Edge Computing. 1-6 - Ndala Yves Mulongo:
Industry 5.0 a Novel Technological Concept. 1-6 - Marius Iulian Mihailescu, Stefania Loredana Nita, Valentina Marascu:
CRANE: A Genuine Framework based on Verifiable Searchable Encryption Security and Resource Constraints Balancing on Client Side. 1-6 - Lizbeth He, Xiang Sun:
IoT-Based Automated Farmland Contamination Monitoring Systems. 1-6 - Oduwunmi Odukoya:
The Transformative Impact of Cloud Computing on Small and Medium-sized Enterprises (SMEs): A Comprehensive Analysis. 1-5 - Shijon Das, Mostafa M. Fouda, Mohammad G. Abdo:
Short-Term Load Forecasting Using GRU-LGBM Fusion. 1-6 - Hai Dinh-Tuan, Franz Florian Six:
Optimizing Cloud-Native Services with SAGA: A Service Affinity Graph-Based Approach. 1-6 - Sumesh J. Philip, Fnu Amisha, Fnu Kamesh:
Access Control Attacks Against IoT Smart Devices: A Case Study. 1-7 - Asif Rasheed, Zubair Md. Fadlullah, Mostafa M. Fouda:
Optimizing Feature Panels for Effective Model Training Toward Early Diagnosis of Alzheimer's Disease. 1-6 - Harshith Vaitla, Gad Gad, Zubair Md. Fadlullah, Mostafa M. Fouda:
Combating Malware Traffic in Emerging Networks: A Collaborative Learning Approach. 1-6 - Asanga Udugama, Sneha Kulkarni, Thenuka Karunathilake, Anna Förster:
Reflexive Forwarding: Way Forward for Communications in an Information-centric IoT? 1-8 - Ali Hamzah Abbas, Yousif Samer Mudhafar, Akram Talib Kareem, Waleed Abed Abohana:
Quantum Broadcast By Entanglement Swapping. 1-5 - Konrad Horbach, Mathias Kretschmer:
A Random Early Detection Approach for Capacity Policing in Wireless Backhaul Networks. 1-4 - Alzahraa Alsenani, Cady Alsuhibani, Yousra Almathami, Leen Aldekhayyel, Fatoon Alshaiddi:
MedCore: Intelligent Diagnostics for an Integrated Healthcare Experience. 1-7 - Wallace C. Potts, Christopher Carver:
Best Practices Implementing AIOps in Large Organizations. 1-5 - Tanzim Mostafa, Mostafa M. Fouda, Mohammad G. Abdo:
Short-Term Load Forecasting Employing Recurrent Neural Networks. 1-6 - Ahmed F. Ashour, Mostafa M. Fouda, Zubair Md. Fadlullah, Mohamed I. Ibrahem:
Enhancing Diabetes Prediction Based on Pair-Wise Ensemble Learning Model Selection. 1-6 - Kavya Agarwal, Ritesh Lalwani, U. Abeena, Kurian Polachan:
VLC-LE: Energy-Efficient and Secure Visible Light Communication for the Internet of Bodies. 1-6 - Jihene Rezgui, Félix Jobin, Younes Kechout, Chritine Turgeon, Foutse Khomh:
Towards a Reliable French Speech Recognition Tool for an Automated Diagnosis of Learning Disabilities. 1-6 - Kshitij Saxena:
A Feasible Railyard Automation Solution for Freight Railroad operators. 1-6 - Mariam Mussbah, Stefan Schwarz, Markus Rupp:
Graph-Based Access Point Switch On/Off Schemes for Energy-Efficient Cell-Free MIMO. 1-6 - Anam Rajper, Norlina Binti Paraman, Muhammad Nadzir Marsono, Noor Jahan Rajper:
iCuSMAT-DT: A Two-Tier Detection Mechanism for High-Rate DDoS Attacks and Discriminating Benign Flash Traffic in Software-Defined Networks. 1-8 - Mahamat Ismael Hassan, Daouda Ahmat, Samuel Ouya:
Technologies Behind the Humanitarian Demining: A Review. 1-7 - Hamidreza Asefi-Ghamari, Murtadha Hassani, Imad Mahgoub:
Game-Theoretic Method for Optimal Initial Allocation of Honeypots for Enhanced Network Security. 1-7 - Kürsat Çakal, Suat Özdemir:
Transforming Military Security: Quantum Age Blockchain Architecture for IoBT - PARS. 1-6 - Yunhwan Jeong, Junghyun Lim, Geunkyung Choi, Byeong-Hee Roh:
Deep Deterministic Policy Gradient-Based Load Balancing Method in SDN Environments. 1-6 - Puya Ghazizadeh, Pushpa Choudhury, Brandon Singh, Alireza Ebrahimi:
Assessing Cooperative Trust-Based Authentication within Micro Vehicular Clouds. 1-6 - Andre Slonopas, Adam Beatty, Yenni Djajalaksana:
Applying Reservoir Computing and Machine Learning Techniques for Image Enhancement in Biomedical Imaging. 1-7 - Ndala Yves Mulongo:
Application of Machine Learning In The South African Process Industry. 1-5 - Wassila Lalouani, Lloyd Emokpae:
Lightweight Zero Knowledge Proof-Based Multi Access Control Schema for Smart Telehealth System. 1-6 - Nowfel Mashnoor, Batyr Charyyev:
Network Traffic Analysis of Medical Devices. 1-6 - Chandler Scott, Mohammad S. Khan, Biju Bajracharya, Anirudh Paranjothi:
Trust-Based Security for Decentralized Clustering in IoV. 1-4 - Iqra Batool, Mostafa M. Fouda, Zubair Md. Fadlullah:
Deep Learning-Based Throughput Prediction in 5G Cellular Networks. 1-6 - Amisha Gunderia, Priyansh Agarwal, Valmik B. Nikam, A. N. Bambole:
AI Approaches for Predictive Maintenance in Road Bridge Infrastructure. 1-6 - Lanlan Pan, Ruonan Qiu, Minghui Yang:
ASDWL: Mitigating DNS Random Subdomain Attacks for Second Level Domain. 1-4 - Akram Talib Kareem, Yousif Samer Mudhafar, Waleed Abed Abohana, Haider Salih Mahdi, Ali Hamzah Abbas:
Bidirectional Quantum Teleportation By Simultaneously Sending A Secret Classic Bit From Both Sides. 1-6 - Jialin Dong, Jiayi Wang, Lin F. Yang:
Provably Correct SGD-Based Exploration for Generalized Stochastic Bandit Problem. 1-6 - Muhammad Ahsan, Ashfaq Ahmed, Sabit Ekin, John F. O'Hara, Arsalan Ahmad:
Traffic-Aware Network Slicing for 5G Networks in Cloud Fog-RAN over WDM Architecture. 1-6 - Ndala Yves Mulongo:
South African Manufacturing Industry in the Aeon of Artificial Intelligence. 1-5 - Vinod Kumar Verma:
Internet of Things Focused Optimal Distance and Boundary Algorithm for Smart Cities. 1-4 - Dirk Henrici, Andreas Boose:
Market Study and User-Friendly Enablement of 4G/5G LAN-Like Connectivity for SOHO Customers. 1-4 - Abdallah Mohammad, Derar Eleyan, Amna Eleyan, Tarek Bejaoui:
IoT-Based Plant Disease Detection using Machine Learning: A Systematic Literature Review. 1-7 - Nadine Danielle Reyes, Russtin Tolentino, Nestor Michael C. Tiglao:
Automated Load Identification and Consumption Prediction for Smart Energy Meters. 1-7 - Dina Jrab, Derar Eleyan, Amna Eleyan, Tarek Bejaoui:
Heart Disease Prediction Using Machine Learning Algorithms. 1-8 - Prakash Agarwal, Rajendra Hegadi, Prathamesh P. Pai, Sudeepto Chatterjee, Siddhant Dixit:
Digital Innovation in Water Governance: Exploring the Synergy of Digital Twins and Blockchain. 1-7 - Ravi Chandra Thota, Sarawat Murtaza Sara, Md. Yusuf Sarwar Uddin, Majid Bani-Yaghoub, Gary Sutkin:
Accurate Estimation of Individual Transmission Rates Through Contact Analytics Using UWB Based Indoor Location Data. 1-8 - Mahmoud Darwich, Kasem Khalil, Magdy A. Bayoumi:
Scalable Video Streaming Solutions Using Federated Learning. 1-6 - Wordh Ul Hasan, Kimia Tuz Zaman, Mohammed Shalan, Xin Wang, Juan Li, Bo Xie, Cui Tao:
CareCompanion: A Personalized Virtual Assistant for Enhancing Support and Independence in ADRD Patients and Older Adults. 1-10 - Sayed Erfan Arefin, Abdul Serwadda:
The Road to Web 3.0: Empirical Insights into Full Node Workload in the Bitcoin Blockchain. 1-6 - Eyad Gad, Zubair Md. Fadlullah, Mostafa M. Fouda:
A Robust Federated Learning Approach for Combating Attacks Against IoT Systems Under Non-IID Challenges. 1-6 - E. S. Santana, L. A. O. Arenas, E. V. Liberado:
Energy Harvesting Integration with Air Quality Monitoring Systems. 1-4 - Wassila Lalouani, Ivan Omorogbe, Christopher Dube, Mohamed Baza, Amar Rasheed, Kim-Kwang Raymond Choo:
A Robust Physical Layer IDS for Intra-Vehicle Communication Security. 1-6 - Waleed Abed Abohana, Yousif Samer Mudhafar, Akram Talib Kareem, Haider Salih Mahdi, Ali Hamzah Abbas:
Scheme of Quantum Controlled Teleportation with Authentication Step. 1-6 - Jack Zhu, Jingwen Tan, Wencen Wu:
Data-Driven End-to-End Lighting Automation Based on Human Residential Trajectory Analysis. 1-6 - Feifei Yang, Xiying Zuo, Bruce Denby:
Privacy-Preserving Randomized-MAC WiFi Client Counting with Short-Term-Coherent Waveform Features and a Bayesian Information Criterion. 1-5 - Ahmed T. El-Toukhy, Islam Elgarhy, Mahmoud M. Badr, Mohamed Mahmoud, Mostafa M. Fouda, Mohamed I. Ibrahem, Fathi Amsaad:
Securing Smart Grids: Deep Reinforcement Learning Approach for Detecting Cyber-Attacks. 1-6 - Hassane Aissaoui-Mehrez:
Proof of Concept: TIs over Bluetooth Implementation. 1-4 - Sérgio Moita, Rui S. Moreira, Feliz Gouveia, José M. Torres, Maria Simas Guerreiro, Diogo Ferreira, Sara Sucena, Maria Alzira Dinis:
An Object-Based Detection Approach for Automating City Accessibility Constraints Mapping. 1-7 - Hillol Biswas, Muthyala Manoj Kumar:
SCADA-Wireshark Testbed Data-Based Exploratory Data Analytics and Intrusion Detection. 1-6 - Hamid Akbarian, Imadeldin Mahgoub, Andre Williams:
Autoencoder-K-Means Algorithm for Efficient Anomaly Detection to Improve Space Operations. 1-6 - Catalina Aranzazu Suescun, Luis Felipe Zapata Rivera, Owen Guerra-Mondragon Saenz, Jacob Michael Christensen:
Securing IoT Surveillance Airport Infrastructure. 1-7 - Faruk Pasic, Markus Hofer, Mariam Mussbah, Sebastian Caban, Stefan Schwarz, Thomas Zemen, Christoph F. Mecklenbräuker:
Channel Estimation for mmWave MIMO Using Sub-6 GHz Out-of-Band Information. 1-6 - Adamu Ibrahim Tafida, Noor Amila Bt Wan Zawawi, Wesam Salah Alaloul, Muhammad Ali Musarat:
A Systematic Review of the Use of Computer Vision and Photogrammetry Tools in Learning-Based Dimensional Road Pavement Defect Detection for Smart Transportation. 1-9 - Mamadou Ba, Thierry Kondengar, Abagana Mahamat Kachallah, Ibrahima Ngom, Samuel Ouya, Mbaye Ndiaye Samb:
Deployment of Next-Gen 5G NSA Networks for Awareness Campaigns in Rural Africa. 1-6 - Suk-Jin Lee, Ahmad Salman, Hsuan-Yun Chang:
Mutual Authentication Protocol using ECC and Hardware Security Module for IoT Devices. 1-6 - Brennon Hahs, Kanika Sood, Desiree Gomez:
A Data-Driven Model for Wildfire Prediction in California. 1-6 - Shay Reardon, Murtadha D. Hssayeni, Imadeldin Mahgoub:
Detection of Zero-Day Attacks on IoT. 1-5 - Brahma Reddy Tanuboddi, Gad Gad, Zubair Md. Fadlullah, Mostafa M. Fouda:
Optimizing VNF Migration in B5G Core Networks: A Machine Learning Approach. 1-5 - Haofan Wang, Farah I. Kandah:
Multi-Critics Generative Adversarial Networks for Imbalanced Data in Intrusion Detection System. 1-6 - Jameela Al-Jaroodi, Nader Mohamed:
Enhancing the Efficiency of Healthcare Facilities Management with Digital Twins. 1-5 - Xin-Wen Wu, Yongtao Cao, Richard Dankwa:
Pareto-Optimal Machine Learning Models for Security of IoT Applications. 1-6 - Gautam Siwach, Abhishek Jain:
Quantum Annotated AI Modelling of Digital Assets. 1-6 - Ndala Yves Mulongo:
Redefining Teaching and Learning Practices in the Post-Covid-19 Pandemic Era. 1-6 - Ismail Butun, Imad Mahgoub:
Expandable Mix-Zones as a Deception Technique for Providing Location Privacy on Internet-of-Battlefield Things (IoBT). 1-7 - Anmol Agarwal, Rakshesh P. Bhatt, Clifton Fernandes:
End-to-End System Level Solution for DDoS Attack Detection and Prediction for 5G and Future Wireless Networks. 1-7 - Alireza Abolhasani Zeraatkar, Parnian Shabani Kamran, Inderpreet Kaur, Nagabindu Ramu, Tyler Sheaves, Hussain Al-Asaad:
On the Performance of Malware Detection Classifiers Using Hardware Performance Counters. 1-6 - Nader Mohamed, Jameela Al-Jaroodi:
A Framework for Energy-Efficient Manufacturing using Digital Twins. 1-5 - Samer Kadhim Jawad, Satea Hikmat Alnajjar:
Enhancing Phishing Detection Through Ensemble Learning and Cross-Validation. 1-7 - Farzana Akhter, Joseph P. Near:
Energy Efficient Data Routing for IoT Networks Using Genetic Algorithm. 1-8 - Ali Ghubaish, Zebo Yang, Raj Jain:
HDRL-IDS: A Hybrid Deep Reinforcement Learning Intrusion Detection System for Enhancing the Security of Medical Applications in 5G Networks. 1-6 - Waseem Raza, Muhammad Umar Bin Farooq, Aneeqa Ijaz, Ali Imran:
Data-Driven Intelligent Outage Management for High Shadowing Environments in 5G&B Networks. 1-6 - Akshayraj Madhubalan, Amit Gautam, Priya Tiwary:
Blender-GAN: Multi-Target Conditional Generative Adversarial Network for Novel Class Synthetic Data Generation. 1-7 - Qiuyang Feng, Fuxiang Chen, Xingle Feng:
Improved YOLOv5s Lightweight Vehicle Axle Recognition Model. 1-6 - Tarek Ali, Amna Eleyan, Tarek Bejaoui, Mohammed Al-Khalidi:
Lightweight Intrusion Detection System with GAN-Based Knowledge Distillation. 1-7 - Giovanny Vazquez, Shengjie Zhai, Mei Yang:
Transfer Learning Enhanced Deep Learning Model for Wildfire Flame and Smoke Detection. 1-4 - Mnassar Alyami, Cliff C. Zou, Yan Solihin:
Adaptive Segmentation: A Tradeoff Between Packet-Size Obfuscation and Performance. 1-4 - Ibrahim Tariq Javed, Victoria L. Lemieux, Dean A. Regier:
SecureConsent: A Blockchain-Based Dynamic and Secure Consent Management for Genomic Data Sharing. 1-7 - Joseph Tolley, Carl B. Dietrich:
Whisper-Key Location Verification Method in Cognitive Radio Networks. 1-7 - Adriano Silva:
Did ChatGPT Exterminate the Writer, Translator, Reviewer and Journalist Professions in Brazil? 1-4
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.