السجلات المعروضة 1461 -- 1480 من 2402

    • Dynamic Network Selection in Heterogeneous Wireless Networks: A user-centric scheme for improved delivery 

      Awad A.; Mohamed A.; Chiasserini C.-F. ( Institute of Electrical and Electronics Engineers Inc. , 2017 , Article)
      The increasing tendency toward extreme network densification has motivated network operators to leverage spectrum across multiple radio access networks to significantly enhance spectral efficiency, quality of service, and ...
    • TIDCS: A Dynamic Intrusion Detection and Classification System Based Feature Selection 

      Chkirbene Z.; Erbad A.; Hamila R.; Mohamed A.; Guizani M.; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)
      Machine learning techniques are becoming mainstream in intrusion detection systems as they allow real-time response and have the ability to learn and adapt. By using a comprehensive dataset with multiple attack types, a ...
    • Transcoding resources forecasting and reservation for crowdsourced live streaming 

      Haouari F.; Baccour E.; Erbad A.; Mohamed A.; Guizani M. ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)
      During the last decade, empowered by the technological advances of mobile devices and the revolution of wireless mobile network access, crowdsourced live streaming has become more popular. Ensuring a stable high-quality ...
    • A survey of blockchain enabled cyber-physical systems 

      Rathore H.; Mohamed A.; Guizani M. ( MDPI AG , 2020 , Article Review)
      Cyber-physical systems (CPS) is a setup that controls and monitors the physical world around us. The advancement of these systems needs to incorporate an unequivocal spotlight on making these systems efficient. Blockchains ...
    • QoE-Aware Resource Allocation for Crowdsourced Live Streaming: A Machine Learning Approach 

      Haouari F.; Baccour E.; Erbad A.; Mohamed A.; Guizani M. ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)
      Driven by the tremendous technological advancement of personal devices and the prevalence of wireless mobile network accesses, the world has witnessed an explosion in crowdsourced live streaming. Ensuring a better viewers ...
    • Optimal resource allocation for green and clustered video sensor networks 

      Arar A.; Mohamed A.; El-Sherif A.A.; Leung V.C.M. ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Article)
      Wireless video sensor networks (WVSNs) are opening the door for many applications, such as industrial surveillance, environmental tracking, border security, and infrastructure health monitoring. In WVSN, energy conservation ...
    • Deep learning and low rank dictionary model for mHealth data classification 

      Said A.B.; Mohamed A.; Elfouly T.; Abualsaud K.; Harras K. ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)
      In the context of mobile Health (mHealth) applications, data are prone to several sources of contamination which would lead to false interpretation and misleading classification results. In this paper, a robust deep learning ...
    • VisDrone-CC2020: The Vision Meets Drone Crowd Counting Challenge Results 

      Du D.; Wen L.; Zhu P.; Fan H.; Hu Q.; ... more authors ( Springer Science and Business Media Deutschland GmbH , 2020 , Conference Paper)
      Crowd counting on the drone platform is an interesting topic in computer vision, which brings new challenges such as small object inference, background clutter and wide viewpoint. However, there are few algorithms focusing ...
    • Multi-layer security scheme for implantable medical devices 

      Rathore H.; Fu C.; Mohamed A.; Al-Ali A.; Du X.; ... more authors ( Springer , 2020 , Article)
      Internet of Medical Things (IoMTs) is fast emerging, thereby fostering rapid advances in the areas of sensing, actuation and connectivity to significantly improve the quality and accessibility of health care for everyone. ...
    • FacebookVideoLive18: A Live Video Streaming Dataset for Streams Metadata and Online Viewers Locations 

      Baccour E.; Erbad A.; Bilal K.; Mohamed A.; Guizani M.; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
      With the advancement in personal smart devices and pervasive network connectivity, users are no longer passive content consumers, but also contributors in producing new contents. This expansion in live services requires a ...
    • Public Security Surveillance System Using Blockchain Technology and Advanced Image Processing Techniques 

      Al-Sahan L.; Al-Jabiri F.; Abdelsalam N.; Mohamed A.; Elfouly T.; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
      National security is a top priority to mitigate intrusions and criminal acts. Governments require robust national surveillance system that can cover all geographical areas, including the blind spots that may hold violence ...
    • PCCP: Proactive Video Chunks Caching and Processing in edge networks 

      Baccour E.; Erbad A.; Bilal K.; Mohamed A.; Guizani M. ( Elsevier B.V. , 2020 , Article)
      Mobile Edge Computing (MEC) networks have been proposed to extend the cloud services and bring the cloud computing capabilities near the end-users at the Mobile Base Stations (MBS). To improve the efficiency of pushing the ...
    • Deep Learning for RF-Based Drone Detection and Identification: A Multi-Channel 1-D Convolutional Neural Networks Approach 

      Allahham M.S.; Khattab T.; Mohamed A. ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
      Commercial unmanned aerial vehicles, or drones, are getting increasingly popular in the last few years. The fact that these drones are highly accessible to public may bring a range of security and technical issues to ...
    • Performance Evaluation of Hyperledger Fabric 

      Shalaby S.; Abdellatif A.A.; Al-Ali A.; Mohamed A.; Erbad A.; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
      Blockchain is a distributed secure ledger that eliminates the need for centralized authority to store data. The centralized approach has several limitations as it is a Single-Point-of-Failure and a third-party might be ...
    • Traffic Analysis Attacks on Tor: A Survey 

      Basyoni L.; Fetais N.; Erbad A.; Mohamed A.; Guizani M. ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
      The Tor anonymity network is one of the most popular and widely used tools to protect the privacy of online users. Tor provides defenses against multiple adversarial activities aiming to identify or trace the users. Traffic ...
    • Service-Less Video Multicast in 5G: Enablers and Challenges 

      Zahoor K.; Bilal K.; Erbad A.; Mohamed A. ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)
      The massive upsurge in production and demand of crowdsourced live streaming necessitates feasible and cost effective solutions in future cellular networks. Video multicast is one of the viable options to deliver live video ...
    • Smart Edge Healthcare Data Sharing System 

      Chkirbene Z.; Mohamed A.; Erbad A.; Guizani M. ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
      Smart health systems improve the efficiency of healthcare infrastructures and biomedical systems by integrating information and technology into health and medical practices. However, reliability, scalabilty and latency are ...
    • CE-D2D: Collaborative and Popularity-aware Proactive Chunks Caching in Edge Networks 

      Baccour E.; Erbad A.; Mohamed A.; Guizani M.; Hamdi M. ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
      Leveraging video caching to collaborative Mobile Edge Computing (MEC) servers is an emerging paradigm, where cloud computing services are extended to edge networks to allocate multimedia contents close to end-users. However, ...
    • Weighted Trustworthiness for ML Based Attacks Classification 

      Chkirbene Z.; Erbad A.; Hamila R.; Gouissem A.; Mohamed A.; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
      Recently, machine learning techniques are gaining a lot of interest in security applications as they exhibit fast processing with real-time predictions. One of the significant challenges in the implementation of these ...
    • Iterative per Group Feature Selection for Intrusion Detection 

      Chkirbene Z.; Erbad A.; Hamila R.; Gouissem A.; Mohamed A.; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
      Network security is an critical subject in any distributed network. Recently, machine learning has proven their efficiency for intrusion detection. By using a comprehensive dataset with multiple attack types, a well-trained ...