• English
    • العربية
  • English
  • تسجيل الدخول
  • جامعة قطر
  • مكتبة جامعة قطر
  •  الصفحة الرئيسية
  • الوحدات والمجموعات
  • المساعدة
    • إرسال الأعمال الأكاديمية
    • سياسات الناشر
    • أدلة المستخدم
    • الأسئلة الأكثر تكراراً
  • عن المستودع الرقمي
    • الرؤية والرسالة
بحث بسيط 
  •   مركز المجموعات الرقمية لجامعة قطر
  • المستودع الرقمي لجامعة قطر
  • أكاديمية
  • مساهمة أعضاء هيئة التدريس
  • بحث بسيط
  • مركز المجموعات الرقمية لجامعة قطر
  • المستودع الرقمي لجامعة قطر
  • أكاديمية
  • مساهمة أعضاء هيئة التدريس
  • بحث بسيط
  •      
  •  
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    بحث بسيط

    إظهار التصفية المتقدمةإخفاء التصفية المتقدمة

    التصفيات

    استخدم التصفيات لتنقيح نتائج البحث .

    السجلات المعروضة 1 -- 10 من 59

    • خيارات الفرز:
    • الصلة
    • العنوان تصاعدياً
    • العنوان تنازلياً
    • تاريخ الإصدار تصاعدياً
    • تاريخ النشر تنازلياً
    • النتائج لكل صفحة:
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100
    Thumbnail

    Malware Classification Based on Multilayer Perception and Word2Vec for IoT Security 

    Qiao, Yanchen; Zhang, Weizhe; Du, Xiaojiang; Guizani, Mohsen ( Association for Computing Machinery , 2022 , Article)
    With the construction of smart cities, the number of Internet of Things (IoT) devices is growing rapidly, leading to an explosive growth of malware designed for IoT devices. These malware pose a serious threat to the ...
    Thumbnail

    Joint resource allocation and power control for D2D communication with deep reinforcement learning in MCC 

    Wang, Dan; Qin, Hao; Song, Bin; Xu, Ke; Du, Xiaojiang; Guizani, Mohsen... more authors ... less authors ( Elsevier B.V. , 2021 , Article)
    Mission-critical communication (MCC) is one of the main goals in 5G, which can leverage multiple device-to-device (D2D) connections to enhance reliability for mission-critical communication. In MCC, D2D users can reuses ...
    Thumbnail

    Trust-Based Cloud Machine Learning Model Selection for Industrial IoT and Smart City Services 

    Qolomany, Basheer; Mohammed, Ihab; Al-Fuqaha, Ala; Guizani, Mohsen; Qadir, Junaid ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)
    With machine learning (ML) services now used in a number of mission-critical human-facing domains, ensuring the integrity and trustworthiness of ML models becomes all important. In this work, we consider the paradigm where ...
    Thumbnail

    A method of chained recommendation for charging piles in internet of vehicles 

    Zhang, Tianle; Zheng, Liwen; Jiang, Yu; Tian, Zhihong; Du, Xiaojiang; Guizani, Mohsen... more authors ... less authors ( Springer , 2021 , Article)
    With the popularization of new energy electric vehicles (EVs), the recommendation algorithm is widely used in the relatively new field of charge piles. At the same time, the construction of charging infrastructure is facing ...
    Thumbnail

    Guest editorial: Special issue on enabling massive iot with 6g: Applications, architectures, challenges, and research directions 

    Mumtaz, Shahid; Menon, Varun G.; Al-Dulaimi, Anwer; Ashraf, Muhammad Ikram; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)
    Driven by the Internet-of-Things (IoT)-enabled massively data-intensive applications, such as virtual-augmented-reality-based gaming, ultramassive machine-type communications, holographic rendering and high-precision ...
    Thumbnail

    CorrAUC: A Malicious Bot-IoT Traffic Detection Method in IoT Network Using Machine-Learning Techniques 

    Shafiq, Muhammad; Tian, Zhihong; Bashir, Ali Kashif; Du, Xiaojiang; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)
    Identification of anomaly and malicious traffic in the Internet-of-Things (IoT) network is essential for the IoT security to keep eyes and block unwanted traffic flows in the IoT network. For this purpose, numerous ...
    Thumbnail

    3D Beamforming Based on Deep Learning for Secure Communication in 5G and beyond Wireless Networks 

    Yang, Helin; Lam, Kwok Yan; Nie, Jiangtian; Zhao, Jun; Garg, Sahil; Xiao, Liang; Xiong, Zehui; Guizani, Mohsen... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference)
    Three-dimensional (3D) beamforming is a potential technique to enhance communication security of new generation networks such as 5G and beyond. However, it is difficult to achieve optimal beamforming due to the challenges ...
    Thumbnail

    Federated Learning for Energy-balanced Client Selection in Mobile Edge Computing 

    Zheng, Jingjing; Li, Kai; Tovar, Eduardo; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference)
    Mobile edge computing (MEC) has been considered as a promising technology to provide seamless integration of multiple application services. Federated learning (FL) is carried out at edge clients in MEC for privacy-preserving ...
    Thumbnail

    Fast, Reliable, and Secure Drone Communication: A Comprehensive Survey 

    Hassija, Vikas; Chamola, Vinay; Agrawal, Adhar; Goyal, Adit; Luong, Nguyen Cong; Niyato, Dusit; Yu, Fei Richard; Guizani, Mohsen... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)
    Drone security is currently a major topic of discussion among researchers and industrialists. Although there are multiple applications of drones, if the security challenges are not anticipated and required architectural ...
    Thumbnail

    A survey of cyber-physical attacks and detection methods in smart water distribution systems 

    Addeen, Hajar Hameed; Xiao, Yang; Li, Jiacheng; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)
    Modern technologies empower water distribution systems (WDS) for better services in the processes of water supply, storage, distribution, and recycling. They improve real-time monitoring, automating, and managing. However, ...
    • 1
    • 2
    • 3
    • 4
    • . . .
    • 6

    مركز المجموعات الرقمية لجامعة قطر هو مكتبة رقمية تديرها مكتبة جامعة قطر بدعم من إدارة تقنية المعلومات

    اتصل بنا | ارسل ملاحظاتك
    اتصل بنا | ارسل ملاحظاتك | جامعة قطر

     

     

    الصفحة الرئيسية

    أرسل عملك التابع لجامعة قطر

    تصفح

    محتويات مركز المجموعات الرقمية
      الوحدات والمجموعات تاريخ النشر المؤلف العناوين الموضوع النوع اللغة الناشر
    هذه الوحدة
      تاريخ النشر المؤلف العناوين الموضوع النوع اللغة الناشر

    حسابي

    تسجيل الدخول

    اكتشف

    المؤلف
    • n 98031117 (59)
    • n 2014181566 (19) Tian, Zhihong (7) Mumtaz, Shahid (6) ... عرض المزيد
    النوع
      Article (53) Conference (5) Article Review (1)
    الموضوع
      COVID-19 (6) Blockchain (5) machine learning (ML) (4) Artificial intelligence (3) ... عرض المزيد
    تاريخ النشر
      2021 (26) 2020 (23) 2022 (8) 2015 (1) 2019 (1)
    Accessioned Date
      2022 (54) 2020 (2) 2017 (1) 2023 (1) 2024 (1)
    يحتوي على ملفات
    • نعم (59)

    عن المستودع الرقمي

    الرؤية والرسالة

    المساعدة

    إرسال الأعمال الأكاديميةسياسات الناشرأدلة المستخدمالأسئلة الأكثر تكراراً

    مركز المجموعات الرقمية لجامعة قطر هو مكتبة رقمية تديرها مكتبة جامعة قطر بدعم من إدارة تقنية المعلومات

    اتصل بنا | ارسل ملاحظاتك
    اتصل بنا | ارسل ملاحظاتك | جامعة قطر