Search

Your search keyword '"Georges Kaddoum"' showing total 142 results

Search Constraints

Start Over You searched for: Author "Georges Kaddoum" Remove constraint Author: "Georges Kaddoum" Topic business Remove constraint Topic: business
142 results on '"Georges Kaddoum"'

Search Results

1. Privacy-Aware Access Control in IoT-Enabled Healthcare: A Federated Deep Learning Approach

2. D2MIF: A Malicious Model Detection Mechanism for Federated-Learning-Empowered Artificial Intelligence of Things

3. A Secure Data Aggregation Strategy in Edge Computing and Blockchain-Empowered Internet of Things

4. Online Partial Offloading and Task Scheduling in SDN-Fog Networks With Deep Recurrent Reinforcement Learning

6. Toward Accurate Anomaly Detection in Industrial Internet of Things Using Hierarchical Federated Learning

8. Evolution Strategies for Lightwave Power Transfer Networks

9. A Novel Distributed Multi-Agent Reinforcement Learning Algorithm Against Jamming Attacks

10. A Blockchain-Based Secure Data Aggregation Strategy Using Sixth Generation Enabled Network-in-Box for Industrial Applications

11. Task Allocation Framework For Software-Defined Fog v-RAN

12. LSTM-Based Channel Access Scheme for Vehicles in Cognitive Vehicular Networks With Multi-Agent Settings

13. Software-Defined Content Dissemination Scheme for Internet of Healthcare Vehicles in COVID-Like Scenarios

14. Security in IoT-Driven Mobile Edge Computing: New Paradigms, Challenges, and Opportunities

15. Blockchain-Based Cyber-Physical Security for Electrical Vehicle Aided Smart Grid Ecosystem

16. Blockchain and Deep Reinforcement Learning Empowered Spatial Crowdsourcing in Software-Defined Internet of Vehicles

17. An IoT-Based Secure Vaccine Distribution System through a Blockchain Network

18. Decision-Making Model for Securing IoT Devices in Smart Industries

19. Energy and SLA-driven MapReduce Job Scheduling Framework for Cloud-based Cyber-Physical Systems

20. Deep Learning for MMSE Estimation of a Gaussian Source in the Presence of Bursty Impulsive Noise

21. ANN Assisted-IoT Enabled COVID-19 Patient Monitoring

22. A Trusted Social Network Using Hypothetical Mathematical Model and Decision- Based Scheme

23. Smart Homes: How Much Will They Support Us? A Research on Recent Trends and Advances

24. SDN-NFV-Aided Edge-Cloud Interplay for 5G-Envisioned Energy Internet Ecosystem

25. A Distributed Channel Access Scheme for Vehicles in Multi-Agent V2I Systems

26. NOMA-Based IoT Networks: Impulsive Noise Effects and Mitigation

27. Mitigation Techniques for Impulsive Noise With Memory Modeled by a Two State Markov-Gaussian Process

28. Deep-Learning-Based SDN Model for Internet of Things: An Incremental Tensor Train Approach

29. Impact of Co-Channel Interference and Vehicles as Obstacles on Full-Duplex V2V Cooperative Wireless Network

30. KEIDS: Kubernetes-Based Energy and Interference Driven Scheduler for Industrial IoT in Edge-Cloud Ecosystem

31. Toward Secure and Provable Authentication for Internet of Things: Realizing Industry 4.0

32. A Big Data-Enabled Consolidated Framework for Energy Efficient Software Defined Data Centers in IoT Setups

33. Quasi-Optimization of Distance and Blocklength in URLLC Aided Multi-Hop UAV Relay Links

34. A Collaborative Security Framework for Software-Defined Wireless Sensor Networks

35. Artificial Neural Network for in-Bed Posture Classification Using Bed-Sheet Pressure Sensors

36. A Low Power Circuit Design for Chaos-Key Based Data Encryption

37. Deep Chaos Synchronization

38. Joint Relay Selection, Full-Duplex and Device-to-Device Transmission in Wireless Powered NOMA Networks

39. Trusted Orchestration for Smart Decision-Making in Internet of Vehicles

40. SDN-Based Internet of Autonomous Vehicles: An Energy-Efficient Approach for Controller Placement

41. Demand-Response Management Using a Fleet of Electric Vehicles: An Opportunistic-SDN-Based Edge-Cloud Framework for Smart Grids

42. A Hybrid Deep Learning-Based Model for Anomaly Detection in Cloud Datacenter Networks

43. SDN-Based Secure and Privacy-Preserving Scheme for Vehicular Networks: A 5G Perspective

44. Secrecy Characteristics With Assistance of Mixture Gamma Distribution

45. Secrecy Analysis in Wireless Network With Passive Eavesdroppers by Using Partial Cooperation

46. Robust Design of AC Computing-Enabled Receiver Architecture for SWIPT Networks

47. Compression of Patient’s Video for Transmission Over Low Bandwidth Network

48. Demystifying IoT Security: An Exhaustive Survey on IoT Vulnerabilities and a First Empirical Look on Internet-Scale IoT Exploitations

49. Joint Radio Resource Management and Link Adaptation for Multicasting 802.11ax-based WLAN Systems

50. Multi-stage Jamming Attacks Detection using Deep Learning Combined with Kernelized Support Vector Machine in 5G Cloud Radio Access Networks

Catalog

Books, media, physical & digital resources