Issue 3-4/2025 Open Topics
Content (11 Articles)
Performance evaluation of DFT/DCT/DST-based SC-FDMA systems in the presence of CFOs for wireless images transmission
Khaled A. M. Al Soufy, Faisal S. Al-Kamali, Claude D’Amours, Nagi H. N. Al-Ashwal, Farhan M. Nashwan, Mohamed A. Swillam
Generating practical adversarial examples against learning-based network intrusion detection systems
Vivek Kumar, Kamal Kumar, Maheep Singh
AutoRoC-DBSCAN: automatic tuning of DBSCAN to detect malicious DNS tunnels
Thi Quynh Nguyen, Romain Laborde, Abdelmalek Benzekri, Arnaud Oglaza, Mehdi Mounsif
A multi-agent deep Q-learning-based joint relay and jammer selection in dual-hop wireless networks
Anil Kumar Kamboj, Poonam Jindal, Pankaj Verma
A dynamic AI-based algorithm selection for Virtual Network Embedding
Abdelmounaim Bouroudi, Abdelkader Outtagarts, Yassine Hadjadj-Aoul
RIOT-ML: toolkit for over-the-air secure updates and performance evaluation of TinyML models
- Open Access
Zhaolan Huang, Koen Zandberg, Kaspar Schleiser, Emmanuel Baccelli
Impact of phase modulator on the performance of Costas loop
F. Sinhababu, A. Mukherjee, S. Sarkar, B. Chatterjee, A. Sarkar
Joint MEC selection and wireless resource allocation in 5G RAN
Tengteng Ma, Chen Li, Yuanmou Chen, Zehui Li, Zhenyu Zhang, Jing Zhao
FATE: flexible attribute-based traceable encrypted data sharing scheme using smart contracts in wireless medical sensor networks
Aparna Singh, Geetanjali Rathee
Reliable feature selection for adversarially robust cyber-attack detection
- Open Access
João Vitorino, Miguel Silva, Eva Maia, Isabel Praça
Discreet: distributed delivery service with context-aware cooperation
Ludovic Paillat, Claudia-Lavinia Ignat, Davide Frey, Mathieu Turuani, Amine Ismail