166 results on '"Chadi Assi"'
Search Results
2. Enhancing Sensing Capabilities in RSMA Downlink Networks through User-Assisted Beamforming.
3. Cooperative Rate Splitting Multiple Access in Multi-Cell Networks.
4. Expander-Based DC Routing: A Programmable Data Plane Perspective.
5. Securing IoT Malware Classifiers: Dynamic Trigger-Based Attack and Mitigation.
6. Inter-Slice Defender: An Anomaly Detection Solution for Distributed Slice Mobility Attacks.
7. Joint User Pairing and Resource Allocation Optimization in Downlink 2-Layer Cooperative RSMA Networks.
8. Uncovering Covert Attacks on EV Charging Infrastructure: How OCPP Backend Vulnerabilities Could Compromise Your System.
9. RIS-Assisted SWIPT-Empowered Cooperative Rate-Splitting Multiple Access for Two Users.
10. Integrated Sensing and Communication: NOMA vs Cooperative NOMA.
11. Full Duplex UAV-Assisted Rate-Splitting Multiple Access Cellular Networks.
12. RPM: Ransomware Prevention and Mitigation Using Operating Systems' Sensing Tactics.
13. 5GShield: HTTP/2 Anomaly Detection in 5G Service-Based Architecture.
14. Quality of Service Evaluation and Forecast for EV Charging Based on Real-World Data.
15. Optimizing Information Freshness Leveraging Multi-RISs in NOMA-based IoT Networks.
16. NOMA-Aided UAV Data Collection from Time-Constrained IoT Devices.
17. Leveraging Reconfigurable Intelligent Surface to Minimize Age of Information in Wireless Networks.
18. Latency and Reliability Aware Edge Computation Offloading in IRS-aided Networks.
19. Optimizing Information Freshness in RIS-Assisted Cooperative Autonomous Driving.
20. EVOLIoT: A Self-Supervised Contrastive Learning Framework for Detecting and Characterizing Evolving IoT Malware Variants.
21. ChargePrint: A Framework for Internet-Scale Discovery and Security Analysis of EV Charging Management Systems.
22. Cascaded Artificial Neural Networks for Proactive Power Allocation in Indoor LiFi Systems.
23. Joint Resource and Power Allocation for URLLC-eMBB Traffics Multiplexing in 6G Wireless Networks.
24. Joint Scheduling of eMBB and URLLC Services in RIS-Aided Downlink Cellular Networks.
25. AutoGuard: A Dual Intelligence Proactive Anomaly Detection at Application-Layer in 5G Networks.
26. Ensuring a Resilient and Secure EV Charging Infrastructure for Sustainable Transportation.
27. Impact Analysis of EV Preconditioning on the Residential Distribution Network.
28. Minimizing the Age of Information in Intelligent Transportation Systems.
29. Cooperative content delivery in UAV-RSU assisted vehicular networks.
30. A Low-Complexity Approach for Sum-Rate Maximization in Cooperative NOMA Enhanced Cellular Networks.
31. Delay-Aware Multi-Source Multicast Resource optimization in NFV-Enabled Network.
32. On Leveraging the Computational Potential of Fog-Enabled Vehicular Networks.
33. Low-Latency Service Schedule Orchestration in NFV-based Networks.
34. Demand Aware Deployment and Expansion Method for an Electric Vehicles Fast Charging Network.
35. A Reliability-aware Computation Offloading Solution via UAV-mounted Cloudlets.
36. Joint User Pairing and Power Control for C-NOMA with Full-Duplex Device-to-Device Relaying.
37. MIMO System with Multi-Directional Receiver in Optical Wireless Communications.
38. SNR Statistics of Indoor Mobile VLC Users with Random Device Orientation.
39. Joint Optimization of UAV Trajectory and Radio Resource Allocation for Drive-Thru Vehicular Networks.
40. An Energy-efficient Task Offloading Solution for MEC-based IoT in Ultra-dense Networks.
41. Joint Beamforming and Location Optimization for Cooperative Content-Aware UAVs.
42. Computational Cost and Energy Efficient Task Offloading in Hierarchical Edge-Clouds.
43. Discrete Input Signaling for Secure MISO VLC Systems with Randomly Located Eavesdroppers.
44. Inferring, Characterizing, and Investigating Internet-Scale Malicious IoT Device Activities: A Network Telescope Perspective.
45. A Novel Cooperative NOMA in Wireless Backhaul Heterogeneous Networks.
46. Data Collection in Wireless Sensor Networks Using UAV and Compressive Data Gathering.
47. Enhancing the Secrecy Performance of Gaussian MISO VLC Wiretap Channels with Randomly Located Eavesdroppers.
48. On the achievable secrecy rate of the MIMO VLC Gaussian wiretap channel.
49. Achievable Secrecy Sum-Rate of the MISO VLC Broadcast Channel with Confidential Messages.
50. A NOMA Scheme for a Two-User MISO Downlink Channel with Unknown CSIT.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.