| Author |
Session |
Start page |
Title |
| A A B C D E F G H I J K L M N O P Q R S T U V W Y Z |
| Abbassi, Manal |
W2.2 |
288 |
A Communication-efficient Federated Learning Approach for Intrusion Detection in IoT |
| Abou El Houda, Zakaria |
W1.4 |
249 |
Enhanced Adversarial Domain Adaptation for Intrusion Detection Systems |
| Abou Jaoude, Chady |
ST4.3 |
97 |
SHOLO: Similarity-based Reduction Scheme for Efficient Data Transmission and Energy Saving in Multimedia Sensor Networks |
| Abouaissa, Abdelhafid |
ST3.4 |
67 |
AI-Driven Optimisation for Mobile Behavioural Biometrics Continuous Authentication |
| Abrya, Imane |
W2.3 |
294 |
Decentralized Tiny Ensemble Learning for Privacy-Preserving Compliance Prediction in Operating Room Environments |
| Adjewa, Frederic |
W1.3 |
243 |
Unseen Attacks Identification in Intrusion Systems Using BERT and Logit Normalization |
| Agate, Vincenzo |
W8.3 |
466 |
Model-Agnostic Poisoning Attacks on Recommender Systems via PPO |
| Águia, Inês |
AIMEH - WS.1 |
133 |
Your Health in the Mirror: A Critical Analysis of Health and Well-being Monitoring by Smart Mirrors |
| Aguiar, Rui |
GenXNet'25.2 |
168 |
Understanding What Federated Learning Models Learn: a Comparative Study with Traditional Models |
| Ahmad, Hassan |
ST6.5 |
223 |
IRS-Assisted DECT-2020 NR framework for Ensuring URLLC Constraints in Industrial IoT |
| W11.1 |
427 |
MAC-Layer Protocol for Ultra-Reliable Multi-Hop Communication in DECT-2020 NR IIoT Networks |
| Ahmad, Jawad |
W12.1 |
478 |
Enhancing IoT Security: A Meta-Learning Approach to Adversarial Robustness |
| Ahmed, Atiq |
SP.2 |
77 |
Enhancing UAV Communication Security through HSM-based Cryptographic Key Protection |
| Ajayi, Idowu |
W9.2 |
501 |
Expert Fusion with Meta-Adaptation for Signal Technology Recognition |
| Ajib, Wessam |
W3.4 |
349 |
Zero-day GPS Attack Detection and Classification in UAV Networks |
| W11.4 |
447 |
Subcarrier and Resource Allocation in Aerial Intelligent Reflecting Surface-Assisted Wireless Networks |
| Akherfi, Khadija |
W10.2 |
385 |
Energy Budget Distribution in Mobile Edge Computing Applications |
| Al Samara, Mustafa |
ST3.4 |
67 |
AI-Driven Optimisation for Mobile Behavioural Biometrics Continuous Authentication |
| W4.4 |
275 |
A Meta Learning Framework for Intrusion Detection in Connected Vehicles |
| Ali, Zain |
ST6.4 |
217 |
Robust Resource Allocation in RSMA-based STAR-RIS-aided HAP Communication Networks with Imperfect SIC |
| Ali Khan, Naazim |
W5.2 |
312 |
A Novel Routing Protocol for MANET-Based Smart Indoor Environments |
| Aliberti, Alessandro |
ST5.1 |
109 |
A Multi-Agent Framework for Natural Language-Driven Network Simulation |
| Almeida, Leonardo |
GenXNet'25.2 |
168 |
Understanding What Federated Learning Models Learn: a Comparative Study with Traditional Models |
| Almeida, Nuno |
AIMEH - WS.1 |
133 |
Your Health in the Mirror: A Critical Analysis of Health and Well-being Monitoring by Smart Mirrors |
| Althunibat, Saud |
ST6.4 |
217 |
Robust Resource Allocation in RSMA-based STAR-RIS-aided HAP Communication Networks with Imperfect SIC |
| Ammari, Habib |
ST4.1 |
85 |
Stochastic Connected k-Coverage in Planar Wireless Sensor Networks Using Optimal Hexagonal Tessellation |
| W5.4 |
325 |
ORCHID: Tessellation-Based Cylindrical Deployment Protocol for Energy-Efficient Coverage in Three-dimensional Wireless Sensor Networks |
| Andrieux, Guillaume |
ST4.4 |
103 |
Enhanced Detection of Intermittent Primary User Signals for Cognitive Radio-IoT Networks with Markov-Chain Modeled BPSK |
| Anegdouil, Brahim |
W1.2 |
237 |
Improving Trust and Detecting Malicious Data Sharing in SDN Data Plane Communications using Lightweight Deep Learning |
| Antunes, Mário |
GenXNet'25.2 |
168 |
Understanding What Federated Learning Models Learn: a Comparative Study with Traditional Models |
| Asif, Awais |
ST6.5 |
223 |
IRS-Assisted DECT-2020 NR framework for Ensuring URLLC Constraints in Industrial IoT |
| W11.1 |
427 |
MAC-Layer Protocol for Ultra-Reliable Multi-Hop Communication in DECT-2020 NR IIoT Networks |
| Asif, Muhammad |
ST6.4 |
217 |
Robust Resource Allocation in RSMA-based STAR-RIS-aided HAP Communication Networks with Imperfect SIC |
| Atmaca, Tulin |
ST5.4 |
127 |
Leveraging Packet Aggregation to Optimise QoS and Energy Trade-offs in 5G/6G Optical Fronthaul Networks |
| Ayache, Meryeme |
W2.3 |
294 |
Decentralized Tiny Ensemble Learning for Privacy-Preserving Compliance Prediction in Operating Room Environments |
| Ayepah-Mensah, Daniel |
W10.4 |
397 |
A RAG-assisted DRL Framework for Microservices Deployment in 6G vehicular Networks |
| Ayoub, Omran |
GenXNet'25.3 |
174 |
Towards Better-Calibrated ML Models for Reliable Network Intrusion Detection via Calibration-Aware SHAP-Based Feature Selection |
| GenXNet'25.4 |
180 |
Generative Explainability for Next-Generation Networks: LLM-Augmented XAI with Mutual Feature Interactions |
| B A B C D E F G H I J K L M N O P Q R S T U V W Y Z |
| Badis, Hakim |
ST6.2 |
205 |
From Measurement to Materials: Cost-Aware Right-Sizing of Multi-Tier Edge Computing Infrastructures |
| Bagayoko, Ismael |
W10.3 |
391 |
Joint Optimization of Task Offloading and Multicast Transmission Scheduling in MEC Networks |
| Bang, Le Thanh |
W12.3 |
490 |
Fairness-Aware Secure Communication in ISAC Systems with STAR-RIS and RSMA |
| Baranda, Jorge |
W5.1 |
306 |
Design and Evaluation of an Orchestrated E2E Cloud-Native Mobile Network with O-RAN |
| Barrachina-Muñoz, Sergio |
W5.1 |
306 |
Design and Evaluation of an Orchestrated E2E Cloud-Native Mobile Network with O-RAN |
| Bassi, Francesca |
W4.2 |
261 |
Secure Group Key Dissemination Protocol in Cooperative Vehicular Platooning |
| Bel, Albert |
W5.1 |
306 |
Design and Evaluation of an Orchestrated E2E Cloud-Native Mobile Network with O-RAN |
| Ben Atia, Okba |
W4.4 |
275 |
A Meta Learning Framework for Intrusion Detection in Connected Vehicles |
| Ben Attia, Maroua |
ST6.1 |
198 |
Distributed Resource Allocation and Application Deployment in Mesh Edge Networks |
| Ben Fredj, Khalil |
W5.3 |
318 |
Evaluating Bi-directional Connectionless BLE for Bike-to-Everything Wireless Communications |
| Ben Letaifa, Asma |
W2.1 |
281 |
Distributed Task Offloading Using Federated Reinforcement Learning in VEC |
| Ben Maissa, Yann |
ST2.1 |
25 |
A Feature-aware Adaptive Ensemble Framework for IoT Intrusion Detection Systems |
| ST3.2 |
55 |
XFL-Q: Communication-Efficient Federated Learning with Layer-wise Quantization for IoT |
| W2.2 |
288 |
A Communication-efficient Federated Learning Approach for Intrusion Detection in IoT |
| Bennis, Ismail |
ST3.4 |
67 |
AI-Driven Optimisation for Mobile Behavioural Biometrics Continuous Authentication |
| W4.4 |
275 |
A Meta Learning Framework for Intrusion Detection in Connected Vehicles |
| Bentahar, Jamal |
W10.4 |
397 |
A RAG-assisted DRL Framework for Microservices Deployment in 6G vehicular Networks |
| Berbineau, Marion |
ST6.2 |
205 |
From Measurement to Materials: Cost-Aware Right-Sizing of Multi-Tier Edge Computing Infrastructures |
| ST6.3 |
211 |
Distributed Hierarchical Slack-reduction in Slicing for railways FRMCS |
| Berder, Olivier |
W6.4 |
373 |
NA-AEKF: A NLOS-Aware Adaptive Extended Kalman Filter for robust indoor localization |
| Bernard, Antoine |
ST6.1 |
198 |
Distributed Resource Allocation and Application Deployment in Mesh Edge Networks |
| Betti Sorbelli, Francesco |
W12.2 |
484 |
Integrating Ground Communication for Extended Drone Visual Line of Sight |
| Bhiri, Brahim |
ST2.1 |
25 |
A Feature-aware Adaptive Ensemble Framework for IoT Intrusion Detection Systems |
| Bhuria, Mohit |
W7.1 |
403 |
ReLEaRN: Reinforcement Learning Enhanced Profitable Rebalancing in Payment Channel Networks |
| Bianchini, Devis |
GenXNet'25.5 |
186 |
SG-VAE: Explainable Semi-Generative Model for Attack Detection in IoT Healthcare Systems |
| Boateng, Gordon |
W10.4 |
397 |
A RAG-assisted DRL Framework for Microservices Deployment in 6G vehicular Networks |
| Boffetti, Enrico |
ST1.3 |
13 |
An Indoor Experimental Testbed for 5G-Based UAV Control and Communication |
| Boiano, Antonio |
W7.2 |
409 |
Multi-party Consensus-based Blockchain for Chain of Custody in IoT Forensic Investigations |
| Bonelli Bassano, Paolo |
ST5.1 |
109 |
A Multi-Agent Framework for Natural Language-Driven Network Simulation |
| Borah, Abinash |
ST2.4 |
43 |
Securing Connected and Autonomous Vehicles with Sliding Window-based False Information Tracing |
| Botta, Alessio |
AIMEH - WS.2 |
150 |
Exploring Depression Severity During Lockdown Through Explainable AI |
| Bouayad, Amal |
W2.3 |
294 |
Decentralized Tiny Ensemble Learning for Privacy-Preserving Compliance Prediction in Operating Room Environments |
| Boudjit, Saadi |
ST5.3 |
121 |
Towards Secure and Transparent Cloud Auditing: A Blockchain and IPFS-Driven Framework with Batch Verification |
| W11.2 |
435 |
SPARK: A Kripke-Based Formal Analysis of the SN-MPR Routing Protocol in Wireless Sensor Networks |
| Bouhaddou, Safae |
W2.3 |
294 |
Decentralized Tiny Ensemble Learning for Privacy-Preserving Compliance Prediction in Operating Room Environments |
| Boulahia, Leila |
W1.3 |
243 |
Unseen Attacks Identification in Intrusion Systems Using BERT and Logit Normalization |
| Boulmalf, Mohammed |
W1.2 |
237 |
Improving Trust and Detecting Malicious Data Sharing in SDN Data Plane Communications using Lightweight Deep Learning |
| Bracciale, Lorenzo |
AIMEH - WS.2 |
144 |
Telemedicine for the Management of Nasal Obstruction: An Innovative Approach to Remote Monitoring |
| Braiteh, Farah-Emma |
W4.2 |
261 |
Secure Group Key Dissemination Protocol in Cooperative Vehicular Platooning |
| Brancati, Nadia |
AIMEH - WS.3 |
156 |
Bridging the Gap: Integrating Heterogeneous Clinical Data into HL7 FHIR |
| Brik, Bouziane |
ST3.4 |
67 |
AI-Driven Optimisation for Mobile Behavioural Biometrics Continuous Authentication |
| Buchanan, Bill |
W12.1 |
478 |
Enhancing IoT Security: A Meta-Learning Approach to Adversarial Robustness |
| Buratti, Chiara |
ST1.2 |
7 |
Adaptive Communication for Joint Trajectory and RRM in MADRL-Based UAV Networks |
| Bussu, Francesco |
AIMEH - WS.2 |
144 |
Telemedicine for the Management of Nasal Obstruction: An Innovative Approach to Remote Monitoring |
| C A B C D E F G H I J K L M N O P Q R S T U V W Y Z |
| Carbonara, Salvatore |
ST1.3 |
13 |
An Indoor Experimental Testbed for 5G-Based UAV Control and Communication |
| Carminati, Barbara |
W8.1 |
453 |
Detecting Privacy Non-Compliance in Wearable Apps via Knowledge Graphs and LLMs |
| Carneiro, Pedro |
AIMEH - WS.1 |
133 |
Your Health in the Mirror: A Critical Analysis of Health and Well-being Monitoring by Smart Mirrors |
| Carvalho, Glaucio |
W1.1 |
231 |
Flow-Based Anomaly Intrusion Detection Systems using Recurrent Neural Networks |
| Cassarà, Pietro |
ST1.1 |
1 |
Explainable Machine Learning for Environment-Aware Channel State Prediction in UAV-Based 6G Networks |
| Chaabi, Hazem |
ST4.2 |
91 |
Comparative Analysis of KNN, RNG and K-RNG for Inter-Robot Communication |
| Chakir, Youssef |
W8.4 |
472 |
ForensicsData: a Digital Forensics Dataset for Large Language Models |
| Chang, Ren-Chuan |
W6.2 |
361 |
Generative-AI based Health Management System for CKD Patients |
| Cheng, Yu-Tsung |
W6.2 |
361 |
Generative-AI based Health Management System for CKD Patients |
| Cherqi, Othmane |
W1.2 |
237 |
Improving Trust and Detecting Malicious Data Sharing in SDN Data Plane Communications using Lightweight Deep Learning |
| Cherrier, Sylvain |
ST6.3 |
211 |
Distributed Hierarchical Slack-reduction in Slicing for railways FRMCS |
| Chin, Hui-Hsin |
W6.2 |
361 |
Generative-AI based Health Management System for CKD Patients |
| Chuang, Ya-Wen |
W6.2 |
361 |
Generative-AI based Health Management System for CKD Patients |
| Cissé, Boureima |
ST3.1 |
49 |
TCHIA-FedPer: An Edge Online Federated Learning and IoT Based for High Precision Smart Agriculture |
| Clavier, Laurent |
W9.4 |
513 |
Inverted BER Trends for Energy-Detected GRSM-MQAM Massive MIMO Downlink |
| Coelho, André |
SP.3 |
81 |
A Reinforcement Learning Framework for Mobility Control of gNBs in Dynamic Radio Access Networks |
| Colletto, Alberto Salvatore |
ST5.1 |
109 |
A Multi-Agent Framework for Natural Language-Driven Network Simulation |
| Conte, Teresa |
AIMEH - WS.3 |
156 |
Bridging the Gap: Integrating Heterogeneous Clinical Data into HL7 FHIR |
| Conti, Mauro |
W3.1 |
331 |
Enhancing UAV Swarm Security through an RSSI-based Protocol for GNSS-Compromised Environments |
| W3.2 |
337 |
SPARKS: A Serverless Protocol for Authentication and Resilient Key Sharing in UAV Networks |
| Corò, Federico |
W3.1 |
331 |
Enhancing UAV Swarm Security through an RSSI-based Protocol for GNSS-Compromised Environments |
| W3.2 |
337 |
SPARKS: A Serverless Protocol for Authentication and Resilient Key Sharing in UAV Networks |
| Corona, Julio |
GenXNet'25.2 |
168 |
Understanding What Federated Learning Models Learn: a Comparative Study with Traditional Models |
| Costa, Florinda |
AIMEH - WS.1 |
133 |
Your Health in the Mirror: A Critical Analysis of Health and Well-being Monitoring by Smart Mirrors |
| Courtay, Antoine |
W6.4 |
373 |
NA-AEKF: A NLOS-Aware Adaptive Extended Kalman Filter for robust indoor localization |
| Crescio, Claudia |
AIMEH - WS.2 |
144 |
Telemedicine for the Management of Nasal Obstruction: An Innovative Approach to Remote Monitoring |
| Crispino, Angela |
AIMEH - WS.1 |
139 |
Inferring CAF-1/p60 Expression from Hematoxylin and Eosin Stained Images in Oral Squamous Cell Carcinoma |
| Crussière, Matthieu |
W9.1 |
496 |
A Rendez-Vous in Time: Frequency-Domain Precoding for LoS Alignment in Distributed MISO |
| Czachorski, Tadeusz |
ST5.4 |
127 |
Leveraging Packet Aggregation to Optimise QoS and Energy Trade-offs in 5G/6G Optical Fronthaul Networks |
| Czekalski, Piotr |
ST5.4 |
127 |
Leveraging Packet Aggregation to Optimise QoS and Energy Trade-offs in 5G/6G Optical Fronthaul Networks |
| D A B C D E F G H I J K L M N O P Q R S T U V W Y Z |
| Dao, Hai |
W1.1 |
231 |
Flow-Based Anomaly Intrusion Detection Systems using Recurrent Neural Networks |
| Daoud, Oshin |
W9.4 |
513 |
Inverted BER Trends for Energy-Detected GRSM-MQAM Massive MIMO Downlink |
| Dat, Nguyen |
W11.4 |
447 |
Subcarrier and Resource Allocation in Aerial Intelligent Reflecting Surface-Assisted Wireless Networks |
| De Rango, Floriano |
ST2.2 |
31 |
A Scalable And Efficient Intrusion Detection System Based On A Shapley Value Driven Feature Selection |
| De Rango, Floriano |
ST2.3 |
37 |
Secure Split and Classification Mechanism for LoRa Networks Against Active and Reactive Interference Attacks |
| De Rango, Floriano |
W7.3 |
415 |
Security-Oriented Load Distribution in MQTTv5: A Token Bucket and Trust Evaluation Approach |
| Dedu, Eugen |
W11.3 |
441 |
Comparative Study of Packet Loss Models for Flooding Protocols in Dense Wireless Networks |
| Delgado, Dario |
ST2.3 |
37 |
Secure Split and Classification Mechanism for LoRa Networks Against Active and Reactive Interference Attacks |
| Deng, Der-Jiunn |
W6.2 |
361 |
Generative-AI based Health Management System for CKD Patients |
| Deshwal, Ashutosh |
W4.1 |
255 |
Integrated UWB and LIDAR Assisted Localization and Navigation System for Automated Platooning |
| Didonna, Barbara |
ST1.3 |
13 |
An Indoor Experimental Testbed for 5G-Based UAV Control and Communication |
| Diouris, Jean-Francois |
ST4.4 |
103 |
Enhanced Detection of Intermittent Primary User Signals for Cognitive Radio-IoT Networks with Markov-Chain Modeled BPSK |
| Dong, Trung |
W2.4 |
300 |
Stability-Driven Quantization-Aware Training for Low-Bit Models |
| Driouch, Elmahdi |
W10.3 |
391 |
Joint Optimization of Task Offloading and Multicast Transmission Scheduling in MEC Networks |
| Drissi, Maroua |
ST1.4 |
19 |
Enhancing Vehicular Communication with Predictive Quality of Service: A Real-World Proof of Concept |
| Duarte, Pedro |
SP.3 |
81 |
A Reinforcement Learning Framework for Mobility Control of gNBs in Dynamic Radio Access Networks |
| Ducange, Pietro |
ST1.1 |
1 |
Explainable Machine Learning for Environment-Aware Channel State Prediction in UAV-Based 6G Networks |
| Dupga, Tushar |
W4.1 |
255 |
Integrated UWB and LIDAR Assisted Localization and Navigation System for Automated Platooning |
| Durso, Giordano |
AIMEH - WS.2 |
150 |
Exploring Depression Severity During Lockdown Through Explainable AI |
| E A B C D E F G H I J K L M N O P Q R S T U V W Y Z |
| Ebo, Ife Olalekan |
W9.2 |
501 |
Expert Fusion with Meta-Adaptation for Signal Technology Recognition |
| EL Mokadem, Rachid |
ST3.2 |
55 |
XFL-Q: Communication-Efficient Federated Learning with Layer-wise Quantization for IoT |
| W2.2 |
288 |
A Communication-efficient Federated Learning Approach for Intrusion Detection in IoT |
| Ennasri, Oumaima |
W2.2 |
288 |
A Communication-efficient Federated Learning Approach for Intrusion Detection in IoT |
| Erdelyi, Viktor |
W3.3 |
343 |
Indoor Drone Propeller Speed Estimation Using Wi-Fi Channel State Information |
| Esseghir, Moez |
W1.3 |
243 |
Unseen Attacks Identification in Intrusion Systems Using BERT and Logit Normalization |
| Ezzeddine, Fatima |
GenXNet'25.3 |
174 |
Towards Better-Calibrated ML Models for Reliable Network Intrusion Detection via Calibration-Aware SHAP-Based Feature Selection |
| F A B C D E F G H I J K L M N O P Q R S T U V W Y Z |
| Fafoutis, Xenofon |
W6.3 |
365 |
Adaptive Mobility Control in LoRaWAN via Reinforcement Learning |
| Farès, Haifa |
W9.4 |
513 |
Inverted BER Trends for Energy-Detected GRSM-MQAM Massive MIMO Downlink |
| Fares, Joseph |
W11.3 |
441 |
Comparative Study of Packet Loss Models for Flooding Protocols in Dense Wireless Networks |
| Fargeon, Rodrigue |
ST6.3 |
211 |
Distributed Hierarchical Slack-reduction in Slicing for railways FRMCS |
| Fascista, Alessio |
ST1.3 |
13 |
An Indoor Experimental Testbed for 5G-Based UAV Control and Communication |
| Fawaz, Hussein |
GenXNet'25.3 |
174 |
Towards Better-Calibrated ML Models for Reliable Network Intrusion Detection via Calibration-Aware SHAP-Based Feature Selection |
| Fekih Hassen, Wiem |
W2.1 |
281 |
Distributed Task Offloading Using Federated Reinforcement Learning in VEC |
| Ferrari, Elena |
W8.1 |
453 |
Detecting Privacy Non-Compliance in Wearable Apps via Knowledge Graphs and LLMs |
| Ferretti, Danila |
ST1.2 |
7 |
Adaptive Communication for Joint Trajectory and RRM in MADRL-Based UAV Networks |
| Fofana, Namory |
W2.1 |
281 |
Distributed Task Offloading Using Federated Reinforcement Learning in VEC |
| Formery, Yannis |
ST3.1 |
49 |
TCHIA-FedPer: An Edge Online Federated Learning and IoT Based for High Precision Smart Agriculture |
| G A B C D E F G H I J K L M N O P Q R S T U V W Y Z |
| Gaaloul, Walid |
W6.1 |
355 |
Dilated Causal CNNs for Energy Forecasting and Optimization in LoRaWAN Networks |
| Gaïti, Dominique |
SP.2 |
77 |
Enhancing UAV Communication Security through HSM-based Cryptographic Key Protection |
| Gerndt, Michael |
W10.2 |
385 |
Energy Budget Distribution in Mobile Edge Computing Applications |
| Ghafoor, Komal |
GenXNet'25.5 |
186 |
SG-VAE: Explainable Semi-Generative Model for Attack Detection in IoT Healthcare Systems |
| Ghammaz, Abdelilah |
ST4.4 |
103 |
Enhanced Detection of Intermittent Primary User Signals for Cognitive Radio-IoT Networks with Markov-Chain Modeled BPSK |
| Ghanmi, Houaida |
ST5.3 |
121 |
Towards Secure and Transparent Cloud Auditing: A Blockchain and IPFS-Driven Framework with Batch Verification |
| Ghebreziabiher, Amine |
W10.4 |
397 |
A RAG-assisted DRL Framework for Microservices Deployment in 6G vehicular Networks |
| Ghobadi, Sajjad |
W12.2 |
484 |
Integrating Ground Communication for Extended Drone Visual Line of Sight |
| Ghogho, Mounir |
W7.4 |
421 |
Decentralized Oracles with Threshold Signatures: A Discrete Public Goods Game Model |
| Gholami, Ladan |
ST1.1 |
1 |
Explainable Machine Learning for Environment-Aware Channel State Prediction in UAV-Based 6G Networks |
| Gilg, Marc |
ST3.4 |
67 |
AI-Driven Optimisation for Mobile Behavioural Biometrics Continuous Authentication |
| Giordano, Silvia |
GenXNet'25.3 |
174 |
Towards Better-Calibrated ML Models for Reliable Network Intrusion Detection via Calibration-Aware SHAP-Based Feature Selection |
| Gotta, Alberto |
ST1.1 |
1 |
Explainable Machine Learning for Environment-Aware Channel State Prediction in UAV-Based 6G Networks |
| Graiet, Mohamed |
W6.1 |
355 |
Dilated Causal CNNs for Energy Forecasting and Optimization in LoRaWAN Networks |
| Greco, Fabrizio |
ST1.3 |
13 |
An Indoor Experimental Testbed for 5G-Based UAV Control and Communication |
| Grieco, Giovanni |
ST1.3 |
13 |
An Indoor Experimental Testbed for 5G-Based UAV Control and Communication |
| Grieco, Luigi Alfredo |
ST1.3 |
13 |
An Indoor Experimental Testbed for 5G-Based UAV Control and Communication |
| Guenounou, Walid |
W11.2 |
435 |
SPARK: A Kripke-Based Formal Analysis of the SN-MPR Routing Protocol in Wireless Sensor Networks |
| Guerziz, Ines |
W1.4 |
249 |
Enhanced Adversarial Domain Adaptation for Intrusion Detection Systems |
| H A B C D E F G H I J K L M N O P Q R S T U V W Y Z |
| Hadded, Mohamed |
ST5.3 |
121 |
Towards Secure and Transparent Cloud Auditing: A Blockchain and IPFS-Driven Framework with Batch Verification |
| Hamel, Lazhar |
W6.1 |
355 |
Dilated Causal CNNs for Energy Forecasting and Optimization in LoRaWAN Networks |
| Harb, Hassan |
ST4.3 |
97 |
SHOLO: Similarity-based Reduction Scheme for Efficient Data Transmission and Energy Saving in Multimedia Sensor Networks |
| Hasna, Mazen |
ST6.4 |
217 |
Robust Resource Allocation in RSMA-based STAR-RIS-aided HAP Communication Networks with Imperfect SIC |
| Hazimeh, Hussein |
ST4.3 |
97 |
SHOLO: Similarity-based Reduction Scheme for Efficient Data Transmission and Energy Saving in Multimedia Sensor Networks |
| Heijenk, Geert |
W5.3 |
318 |
Evaluating Bi-directional Connectionless BLE for Bike-to-Everything Wireless Communications |
| Hmaied, Rihab |
ST3.3 |
61 |
Secure V2P Risk Prediction: A Decentralized Federated Deep Learning Approach |
| Ho, Van |
W3.3 |
343 |
Indoor Drone Propeller Speed Estimation Using Wi-Fi Channel State Information |
| Huang, Yanqiu |
W5.3 |
318 |
Evaluating Bi-directional Connectionless BLE for Bike-to-Everything Wireless Communications |
| Huma, Zil |
W12.1 |
478 |
Enhancing IoT Security: A Meta-Learning Approach to Adversarial Robustness |
| Hussain, Ahmed |
W8.2 |
460 |
Privacy-Enhanced Secure Neighbor Discovery for Wireless Networks |
| I A B C D E F G H I J K L M N O P Q R S T U V W Y Z |
| Ibrahimi, Khalil |
W7.4 |
421 |
Decentralized Oracles with Threshold Signatures: A Discrete Public Goods Game Model |
| J A B C D E F G H I J K L M N O P Q R S T U V W Y Z |
| Jaafar, Wael |
W10.1 |
379 |
Cooperative MEC-enabled HAPS and UAV-RIS Assisted Task Offloading in ITS Systems |
| Jan, Sana Ullah |
W12.1 |
478 |
Enhancing IoT Security: A Meta-Learning Approach to Adversarial Robustness |
| Jano, Alba |
W5.2 |
312 |
A Novel Routing Protocol for MANET-Based Smart Indoor Environments |
| Janum, Simon |
W6.3 |
365 |
Adaptive Mobility Control in LoRaWAN via Reinforcement Learning |
| Jebalia, Maha |
W10.1 |
379 |
Cooperative MEC-enabled HAPS and UAV-RIS Assisted Task Offloading in ITS Systems |
| Jebari, Boutaina |
W7.4 |
421 |
Decentralized Oracles with Threshold Signatures: A Discrete Public Goods Game Model |
| Jurado Lasso, Fabian Fernando |
W6.3 |
365 |
Adaptive Mobility Control in LoRaWAN via Reinforcement Learning |
| Jurcut, Anca |
GenXNet'25.5 |
186 |
SG-VAE: Explainable Semi-Generative Model for Attack Detection in IoT Healthcare Systems |
| GenXNet'25.6 |
192 |
Lightweight Fine-Tuning of LLMs for Explainable Intrusion Detection in SDN |
| K A B C D E F G H I J K L M N O P Q R S T U V W Y Z |
| Kacfah, Cheikh |
W1.3 |
243 |
Unseen Attacks Identification in Intrusion Systems Using BERT and Logit Normalization |
| Kanj, Hassan |
ST4.3 |
97 |
SHOLO: Similarity-based Reduction Scheme for Efficient Data Transmission and Energy Saving in Multimedia Sensor Networks |
| Kasaeyan, Ahmad |
W11.4 |
447 |
Subcarrier and Resource Allocation in Aerial Intelligent Reflecting Surface-Assisted Wireless Networks |
| Kellerer, Wolfgang |
W5.2 |
312 |
A Novel Routing Protocol for MANET-Based Smart Indoor Environments |
| Khatoun, Rida |
W4.2 |
261 |
Secure Group Key Dissemination Protocol in Cooperative Vehicular Platooning |
| Kishino, Yasue |
W3.3 |
343 |
Indoor Drone Propeller Speed Estimation Using Wi-Fi Channel State Information |
| Kuaban, Godlove Suila |
ST5.4 |
127 |
Leveraging Packet Aggregation to Optimise QoS and Energy Trade-offs in 5G/6G Optical Fronthaul Networks |
| Kule Mukuhi, David |
ST6.3 |
211 |
Distributed Hierarchical Slack-reduction in Slicing for railways FRMCS |
| Kurihara, Eito |
W9.3 |
507 |
A Design of High-Order APSK Constellations With PAPR Constraints for Single-Carrier BICM Systems |
| L A B C D E F G H I J K L M N O P Q R S T U V W Y Z |
| Lahouij, Aida |
W6.1 |
355 |
Dilated Causal CNNs for Energy Forecasting and Optimization in LoRaWAN Networks |
| Lahrouni, Khadija |
ST4.4 |
103 |
Enhanced Detection of Intermittent Primary User Signals for Cognitive Radio-IoT Networks with Markov-Chain Modeled BPSK |
| Lahsen-Cherif, Iyad |
ST5.2 |
115 |
WiFiQnA: a WiFi Dataset for Large Language Models |
| W8.4 |
472 |
ForensicsData: a Digital Forensics Dataset for Large Language Models |
| Langar, Rami |
ST6.2 |
205 |
From Measurement to Materials: Cost-Aware Right-Sizing of Multi-Tier Edge Computing Infrastructures |
| ST6.3 |
211 |
Distributed Hierarchical Slack-reduction in Slicing for railways FRMCS |
| Laouici, Hind |
W11.2 |
435 |
SPARK: A Kripke-Based Formal Analysis of the SN-MPR Routing Protocol in Wireless Sensor Networks |
| Laraig, Youssef |
ST2.1 |
25 |
A Feature-aware Adaptive Ensemble Framework for IoT Intrusion Detection Systems |
| Le Bot, Marie |
W9.1 |
496 |
A Rendez-Vous in Time: Frequency-Domain Precoding for LoS Alignment in Distributed MISO |
| Le Gentil, Mickaël |
W6.4 |
373 |
NA-AEKF: A NLOS-Aware Adaptive Extended Kalman Filter for robust indoor localization |
| Le Hoang Minh, Quang |
W2.4 |
300 |
Stability-Driven Quantization-Aware Training for Low-Bit Models |
| Legrain, Antoine |
ST6.1 |
198 |
Distributed Resource Allocation and Application Deployment in Mesh Edge Networks |
| Lelli, Francesco |
GenXNet'25.4 |
180 |
Generative Explainability for Next-Generation Networks: LLM-Augmented XAI with Mutual Feature Interactions |
| Lo Re, Giuseppe |
W8.3 |
466 |
Model-Agnostic Poisoning Attacks on Recommender Systems via PPO |
| Lodh, Suvajit |
GenXNet'25.6 |
192 |
Lightweight Fine-Tuning of LLMs for Explainable Intrusion Detection in SDN |
| Long, Le |
W1.4 |
249 |
Enhanced Adversarial Domain Adaptation for Intrusion Detection Systems |
| Loreti, Pierpaolo |
AIMEH - WS.2 |
144 |
Telemedicine for the Management of Nasal Obstruction: An Innovative Approach to Remote Monitoring |
| Lou, Zhe |
W5.2 |
312 |
A Novel Routing Protocol for MANET-Based Smart Indoor Environments |
| M A B C D E F G H I J K L M N O P Q R S T U V W Y Z |
| Maali, Asmaa |
SP.1 |
73 |
Federated Learning for Spectrum Sensing in THz Bands |
| Maaloul, Sassi |
ST6.2 |
205 |
From Measurement to Materials: Cost-Aware Right-Sizing of Multi-Tier Edge Computing Infrastructures |
| Maham, Salah Dine |
SP.2 |
77 |
Enhancing UAV Communication Security through HSM-based Cryptographic Key Protection |
| Maiga, Oumar |
ST3.1 |
49 |
TCHIA-FedPer: An Edge Online Federated Learning and IoT Based for High Precision Smart Agriculture |
| Makhoul, Abdallah |
W11.3 |
441 |
Comparative Study of Packet Loss Models for Flooding Protocols in Dense Wireless Networks |
| Mangues-Bafalluy, Josep |
W5.1 |
306 |
Design and Evaluation of an Orchestrated E2E Cloud-Native Mobile Network with O-RAN |
| Marini, Riccardo |
ST1.2 |
7 |
Adaptive Communication for Joint Trajectory and RRM in MADRL-Based UAV Networks |
| Marir, Souad |
W11.2 |
435 |
SPARK: A Kripke-Based Formal Analysis of the SN-MPR Routing Protocol in Wireless Sensor Networks |
| Mazloom, Seyyedeh Maryam |
W3.4 |
349 |
Zero-day GPS Attack Detection and Classification in UAV Networks |
| Meddahi, Ahmed |
W4.3 |
269 |
An enhanced authentication solution for infrastructureless vehicle environments |
| Medjahdi, Yahia |
W9.4 |
513 |
Inverted BER Trends for Energy-Detected GRSM-MQAM Massive MIMO Downlink |
| Mendiboure, Leo |
ST6.2 |
205 |
From Measurement to Materials: Cost-Aware Right-Sizing of Multi-Tier Edge Computing Infrastructures |
| ST6.3 |
211 |
Distributed Hierarchical Slack-reduction in Slicing for railways FRMCS |
| Merolla, Francesco |
AIMEH - WS.1 |
139 |
Inferring CAF-1/p60 Expression from Hematoxylin and Eosin Stained Images in Oral Squamous Cell Carcinoma |
| Mishra, Shruti |
W7.1 |
403 |
ReLEaRN: Reinforcement Learning Enhanced Profitable Rebalancing in Payment Channel Networks |
| Mitton, Nathalie |
ST4.2 |
91 |
Comparative Analysis of KNN, RNG and K-RNG for Inter-Robot Communication |
| W4.3 |
269 |
An enhanced authentication solution for infrastructureless vehicle environments |
| Mizouni, Rabeb |
W10.4 |
397 |
A RAG-assisted DRL Framework for Microservices Deployment in 6G vehicular Networks |
| Molla, Dereje Mechal |
ST6.2 |
205 |
From Measurement to Materials: Cost-Aware Right-Sizing of Multi-Tier Edge Computing Infrastructures |
| Monti, Paolo |
GenXNet'25.4 |
180 |
Generative Explainability for Next-Generation Networks: LLM-Augmented XAI with Mutual Feature Interactions |
| Morana, Marco |
W8.3 |
466 |
Model-Agnostic Poisoning Attacks on Recommender Systems via PPO |
| Mourad, Azzam |
W10.4 |
397 |
A RAG-assisted DRL Framework for Microservices Deployment in 6G vehicular Networks |
| Mroueh, Lina |
W9.2 |
501 |
Expert Fusion with Meta-Adaptation for Signal Technology Recognition |
| Mubibya, Gael |
W10.3 |
391 |
Joint Optimization of Task Offloading and Multicast Transmission Scheduling in MEC Networks |
| Muhaidat, Sami |
W10.4 |
397 |
A RAG-assisted DRL Framework for Microservices Deployment in 6G vehicular Networks |
| Muhlethaler, Paul |
ST5.3 |
121 |
Towards Secure and Transparent Cloud Auditing: A Blockchain and IPFS-Driven Framework with Batch Verification |
| N A B C D E F G H I J K L M N O P Q R S T U V W Y Z |
| Nafkha, Amor |
W9.4 |
513 |
Inverted BER Trends for Energy-Detected GRSM-MQAM Massive MIMO Downlink |
| Nakka, Kalyan |
ST4.1 |
85 |
Stochastic Connected k-Coverage in Planar Wireless Sensor Networks Using Optimal Hexagonal Tessellation |
| Narouwa, Massamaesso |
ST6.2 |
205 |
From Measurement to Materials: Cost-Aware Right-Sizing of Multi-Tier Edge Computing Infrastructures |
| Nasreddine, Hajlaoui |
ST5.3 |
121 |
Towards Secure and Transparent Cloud Auditing: A Blockchain and IPFS-Driven Framework with Batch Verification |
| Nassar, Jad |
W11.3 |
441 |
Comparative Study of Packet Loss Models for Flooding Protocols in Dense Wireless Networks |
| Nasser, Nidal |
W2.3 |
294 |
Decentralized Tiny Ensemble Learning for Privacy-Preserving Compliance Prediction in Operating Room Environments |
| Natalino, Carlos |
GenXNet'25.4 |
180 |
Generative Explainability for Next-Generation Networks: LLM-Augmented XAI with Mutual Feature Interactions |
| Navik, Sudiksha |
W4.1 |
255 |
Integrated UWB and LIDAR Assisted Localization and Navigation System for Automated Platooning |
| Nguyen, Lam |
W8.1 |
453 |
Detecting Privacy Non-Compliance in Wearable Apps via Knowledge Graphs and LLMs |
| Nguyen Minh, Thang |
W2.4 |
300 |
Stability-Driven Quantization-Aware Training for Low-Bit Models |
| Nguyen Thi, Quynh |
W12.3 |
490 |
Fairness-Aware Secure Communication in ISAC Systems with STAR-RIS and RSMA |
| Noor, Hafiz |
W1.1 |
231 |
Flow-Based Anomaly Intrusion Detection Systems using Recurrent Neural Networks |
| O A B C D E F G H I J K L M N O P Q R S T U V W Y Z |
| Obaidat, Islam |
GenXNet'25.6 |
192 |
Lightweight Fine-Tuning of LLMs for Explainable Intrusion Detection in SDN |
| Ochiai, Hideki |
W9.3 |
507 |
A Design of High-Order APSK Constellations With PAPR Constraints for Single-Carrier BICM Systems |
| Ohara, Kazuya |
W3.3 |
343 |
Indoor Drone Propeller Speed Estimation Using Wi-Fi Channel State Information |
| Orfanidis, Charalampos |
W6.3 |
365 |
Adaptive Mobility Control in LoRaWAN via Reinforcement Learning |
| Otrok, Hadi |
W10.4 |
397 |
A RAG-assisted DRL Framework for Microservices Deployment in 6G vehicular Networks |
| P A B C D E F G H I J K L M N O P Q R S T U V W Y Z |
| Pace, Pasquale |
ST2.3 |
37 |
Secure Split and Classification Mechanism for LoRa Networks Against Active and Reactive Interference Attacks |
| Pal, Amitangshu |
W4.1 |
255 |
Integrated UWB and LIDAR Assisted Localization and Navigation System for Automated Platooning |
| Pal, Sujata |
W7.1 |
403 |
ReLEaRN: Reinforcement Learning Enhanced Profitable Rebalancing in Payment Channel Networks |
| Palazzetti, Lorenzo |
W12.2 |
484 |
Integrating Ground Communication for Extended Drone Visual Line of Sight |
| Palmese, Fabio |
W7.2 |
409 |
Multi-party Consensus-based Blockchain for Chain of Custody in IoT Forensic Investigations |
| Panico, Giorgia |
AIMEH - WS.2 |
144 |
Telemedicine for the Management of Nasal Obstruction: An Innovative Approach to Remote Monitoring |
| Papadimitratos, Panagiotis |
W8.2 |
460 |
Privacy-Enhanced Secure Neighbor Discovery for Wireless Networks |
| Paranjothi, Anirudh |
ST2.4 |
43 |
Securing Connected and Autonomous Vehicles with Sliding Window-based False Information Tracing |
| Payaró, Miquel |
W5.1 |
306 |
Design and Evaluation of an Orchestrated E2E Cloud-Native Mobile Network with O-RAN |
| Peissig, Jürgen |
ST6.5 |
223 |
IRS-Assisted DECT-2020 NR framework for Ensuring URLLC Constraints in Industrial IoT |
| W11.1 |
427 |
MAC-Layer Protocol for Ultra-Reliable Multi-Hop Communication in DECT-2020 NR IIoT Networks |
| Petton, Pierre-Yves |
ST6.3 |
211 |
Distributed Hierarchical Slack-reduction in Slicing for railways FRMCS |
| Pezzoni, Riccardo |
W7.2 |
409 |
Multi-party Consensus-based Blockchain for Chain of Custody in IoT Forensic Investigations |
| Pham, Hoang-Lai |
W12.3 |
490 |
Fairness-Aware Secure Communication in ISAC Systems with STAR-RIS and RSMA |
| Pham, Tuan |
W12.3 |
490 |
Fairness-Aware Secure Communication in ISAC Systems with STAR-RIS and RSMA |
| Pinotti, Cristina M. |
W12.2 |
484 |
Integrating Ground Communication for Extended Drone Visual Line of Sight |
| Pinto, Rafael |
AIMEH - WS.1 |
133 |
Your Health in the Mirror: A Critical Analysis of Health and Well-being Monitoring by Smart Mirrors |
| Pitault, Timothé |
W3.2 |
337 |
SPARKS: A Serverless Protocol for Authentication and Resilient Key Sharing in UAV Networks |
| Pitropakis, Nikolaos |
W12.1 |
478 |
Enhancing IoT Security: A Meta-Learning Approach to Adversarial Robustness |
| Poets, Alexander |
W11.1 |
427 |
MAC-Layer Protocol for Ultra-Reliable Multi-Hop Communication in DECT-2020 NR IIoT Networks |
| Pugliese, Daniele |
ST1.3 |
13 |
An Indoor Experimental Testbed for 5G-Based UAV Control and Communication |
| Pujolle, Guy |
SP.2 |
77 |
Enhancing UAV Communication Security through HSM-based Cryptographic Key Protection |
| Q A B C D E F G H I J K L M N O P Q R S T U V W Y Z |
| Qaraq, Khalid |
ST6.4 |
217 |
Robust Resource Allocation in RSMA-based STAR-RIS-aided HAP Communication Networks with Imperfect SIC |
| R A B C D E F G H I J K L M N O P Q R S T U V W Y Z |
| Rachedi, Abderrezak |
W2.1 |
281 |
Distributed Task Offloading Using Federated Reinforcement Learning in VEC |
| Rago, Arcangela |
ST1.1 |
1 |
Explainable Machine Learning for Environment-Aware Channel State Prediction in UAV-Based 6G Networks |
| Raso, Emanuele |
AIMEH - WS.2 |
144 |
Telemedicine for the Management of Nasal Obstruction: An Innovative Approach to Remote Monitoring |
| Redondi, Alessandro |
W7.2 |
409 |
Multi-party Consensus-based Blockchain for Chain of Custody in IoT Forensic Investigations |
| Remili, Ali |
SP.2 |
77 |
Enhancing UAV Communication Security through HSM-based Cryptographic Key Protection |
| Rezaei, Kiarash |
GenXNet'25.4 |
180 |
Generative Explainability for Next-Generation Networks: LLM-Augmented XAI with Mutual Feature Interactions |
| Ricardo, Manuel |
SP.3 |
81 |
A Reinforcement Learning Framework for Mobility Control of gNBs in Dynamic Radio Access Networks |
| Rigoni, Giulio |
W3.1 |
331 |
Enhancing UAV Swarm Security through an RSSI-based Protocol for GNSS-Compromised Environments |
| Rinaldi, Antonio |
AIMEH - WS.1 |
139 |
Inferring CAF-1/p60 Expression from Hematoxylin and Eosin Stained Images in Oral Squamous Cell Carcinoma |
| Rizzo, Davide |
AIMEH - WS.2 |
144 |
Telemedicine for the Management of Nasal Obstruction: An Innovative Approach to Remote Monitoring |
| Rizzo, Graziano |
W7.3 |
415 |
Security-Oriented Load Distribution in MQTTv5: A Token Bucket and Trust Evaluation Approach |
| Rocca, Giovanni |
ST2.2 |
31 |
A Scalable And Efficient Intrusion Detection System Based On A Shapley Value Driven Feature Selection |
| Rocha, Ana |
AIMEH - WS.1 |
133 |
Your Health in the Mirror: A Critical Analysis of Health and Well-being Monitoring by Smart Mirrors |
| Rodrigues, Pedro |
GenXNet'25.2 |
168 |
Understanding What Federated Learning Models Learn: a Comparative Study with Traditional Models |
| Rolland, Thibaut |
W9.1 |
496 |
A Rendez-Vous in Time: Frequency-Domain Precoding for LoS Alignment in Distributed MISO |
| Rotbei, Sayna |
AIMEH - WS.2 |
150 |
Exploring Depression Severity During Lockdown Through Explainable AI |
| Roy, Sebastien |
ST2.1 |
25 |
A Feature-aware Adaptive Ensemble Framework for IoT Intrusion Detection Systems |
| Russo, Cristiano |
AIMEH - WS.1 |
139 |
Inferring CAF-1/p60 Expression from Hematoxylin and Eosin Stained Images in Oral Squamous Cell Carcinoma |
| Russo, Martina |
AIMEH - WS.3 |
156 |
Bridging the Gap: Integrating Heterogeneous Clinical Data into HL7 FHIR |
| Rustam, Furqan |
GenXNet'25.5 |
186 |
SG-VAE: Explainable Semi-Generative Model for Attack Detection in IoT Healthcare Systems |
| GenXNet'25.6 |
192 |
Lightweight Fine-Tuning of LLMs for Explainable Intrusion Detection in SDN |
| Rzig, Insaf |
W10.1 |
379 |
Cooperative MEC-enabled HAPS and UAV-RIS Assisted Task Offloading in ITS Systems |
| S A B C D E F G H I J K L M N O P Q R S T U V W Y Z |
| Saidi, Mohand Yazid |
ST5.3 |
121 |
Towards Secure and Transparent Cloud Auditing: A Blockchain and IPFS-Driven Framework with Batch Verification |
| Sangaré, Harouna |
ST3.1 |
49 |
TCHIA-FedPer: An Edge Online Federated Learning and IoT Based for High Precision Smart Agriculture |
| Sebbar, Anass |
W1.2 |
237 |
Improving Trust and Detecting Malicious Data Sharing in SDN Data Plane Communications using Lightweight Deep Learning |
| Semlali, Hayat |
SP.1 |
73 |
Federated Learning for Spectrum Sensing in THz Bands |
| Semlali, Hayat |
ST4.4 |
103 |
Enhanced Detection of Intermittent Primary User Signals for Cognitive Radio-IoT Networks with Markov-Chain Modeled BPSK |
| Senra, Hugo |
AIMEH - WS.1 |
133 |
Your Health in the Mirror: A Critical Analysis of Health and Well-being Monitoring by Smart Mirrors |
| Serghini, Omar |
SP.1 |
73 |
Federated Learning for Spectrum Sensing in THz Bands |
| Serrano, Salvatore |
SP.1 |
73 |
Federated Learning for Spectrum Sensing in THz Bands |
| Shabah, Abdo |
ST6.1 |
198 |
Distributed Resource Allocation and Application Deployment in Mesh Edge Networks |
| Shalev, Daniel |
GenXNet'25.1 |
162 |
FlowPicClip: Improving Network Traffic Classification Using Language Supervision |
| Shapira, Tal |
GenXNet'25.1 |
162 |
FlowPicClip: Improving Network Traffic Classification Using Language Supervision |
| Shavitt, Yuval |
GenXNet'25.1 |
162 |
FlowPicClip: Improving Network Traffic Classification Using Language Supervision |
| Sicuranza, Mario |
AIMEH - WS.3 |
156 |
Bridging the Gap: Integrating Heterogeneous Clinical Data into HL7 FHIR |
| Silva, Samuel |
AIMEH - WS.1 |
133 |
Your Health in the Mirror: A Critical Analysis of Health and Well-being Monitoring by Smart Mirrors |
| Singla, Hitesh |
W7.1 |
403 |
ReLEaRN: Reinforcement Learning Enhanced Profitable Rebalancing in Payment Channel Networks |
| Slama, Sana |
W6.1 |
355 |
Dilated Causal CNNs for Energy Forecasting and Optimization in LoRaWAN Networks |
| Slimene, Marwa |
W4.3 |
269 |
An enhanced authentication solution for infrastructureless vehicle environments |
| Sokona, Fatoumata |
ST3.1 |
49 |
TCHIA-FedPer: An Edge Online Federated Learning and IoT Based for High Precision Smart Agriculture |
| Sondi, Patrick |
W4.3 |
269 |
An enhanced authentication solution for infrastructureless vehicle environments |
| Spampinato, Leonardo |
ST1.2 |
7 |
Adaptive Communication for Joint Trajectory and RRM in MADRL-Based UAV Networks |
| Spina, Mattia Giovanni |
ST2.2 |
31 |
A Scalable And Efficient Intrusion Detection System Based On A Shapley Value Driven Feature Selection |
| W7.3 |
415 |
Security-Oriented Load Distribution in MQTTv5: A Token Bucket and Trust Evaluation Approach |
| Staibano, Stefania |
AIMEH - WS.1 |
139 |
Inferring CAF-1/p60 Expression from Hematoxylin and Eosin Stained Images in Oral Squamous Cell Carcinoma |
| Stanco, Giovanni |
AIMEH - WS.2 |
150 |
Exploring Depression Severity During Lockdown Through Explainable AI |
| Starr, David |
W5.4 |
325 |
ORCHID: Tessellation-Based Cylindrical Deployment Protocol for Energy-Efficient Coverage in Three-dimensional Wireless Sensor Networks |
| Sylla, Tidiane |
ST3.1 |
49 |
TCHIA-FedPer: An Edge Online Federated Learning and IoT Based for High Precision Smart Agriculture |
| T A B C D E F G H I J K L M N O P Q R S T U V W Y Z |
| Tabbane, Sami |
W10.1 |
379 |
Cooperative MEC-enabled HAPS and UAV-RIS Assisted Task Offloading in ITS Systems |
| Taha, Moussa |
W6.4 |
373 |
NA-AEKF: A NLOS-Aware Adaptive Extended Kalman Filter for robust indoor localization |
| Takao, Yuta |
W3.3 |
343 |
Indoor Drone Propeller Speed Estimation Using Wi-Fi Channel State Information |
| Tardif, Pierre-Martin |
ST2.1 |
25 |
A Feature-aware Adaptive Ensemble Framework for IoT Intrusion Detection Systems |
| Teixeira, Antonio |
AIMEH - WS.1 |
133 |
Your Health in the Mirror: A Critical Analysis of Health and Well-being Monitoring by Smart Mirrors |
| Teixeira, Rafael |
GenXNet'25.2 |
168 |
Understanding What Federated Learning Models Learn: a Comparative Study with Traditional Models |
| Testi, Enrico |
ST1.2 |
7 |
Adaptive Communication for Joint Trajectory and RRM in MADRL-Based UAV Networks |
| Tfaily, Fouad |
ST4.3 |
97 |
SHOLO: Similarity-based Reduction Scheme for Efficient Data Transmission and Energy Saving in Multimedia Sensor Networks |
| To, Thanh-Nha |
W12.3 |
490 |
Fairness-Aware Secure Communication in ISAC Systems with STAR-RIS and RSMA |
| Tommasino, Cristian |
AIMEH - WS.1 |
139 |
Inferring CAF-1/p60 Expression from Hematoxylin and Eosin Stained Images in Oral Squamous Cell Carcinoma |
| Touati, Haifa |
ST5.3 |
121 |
Towards Secure and Transparent Cloud Auditing: A Blockchain and IPFS-Driven Framework with Batch Verification |
| Tran Ngoc, Du |
W2.4 |
300 |
Stability-Driven Quantization-Aware Training for Low-Bit Models |
| Traore, Issa |
W1.1 |
231 |
Flow-Based Anomaly Intrusion Detection Systems using Recurrent Neural Networks |
| Troia, Sebastian |
GenXNet'25.4 |
180 |
Generative Explainability for Next-Generation Networks: LLM-Augmented XAI with Mutual Feature Interactions |
| Turgut, Zeynep |
ST5.4 |
127 |
Leveraging Packet Aggregation to Optimise QoS and Energy Trade-offs in 5G/6G Optical Fronthaul Networks |
| U A B C D E F G H I J K L M N O P Q R S T U V W Y Z |
| Uchiyama, Akira |
W3.3 |
343 |
Indoor Drone Propeller Speed Estimation Using Wi-Fi Channel State Information |
| V A B C D E F G H I J K L M N O P Q R S T U V W Y Z |
| Valentin, August |
W6.3 |
365 |
Adaptive Mobility Control in LoRaWAN via Reinforcement Learning |
| Ventre, Giorgio |
AIMEH - WS.2 |
150 |
Exploring Depression Severity During Lockdown Through Explainable AI |
| Virga, Antonio |
W8.3 |
466 |
Model-Agnostic Poisoning Attacks on Recommender Systems via PPO |
| Viticchié, Alessio |
ST5.1 |
109 |
A Multi-Agent Framework for Natural Language-Driven Network Simulation |
| W A B C D E F G H I J K L M N O P Q R S T U V W Y Z |
| Wo de Alcantara, Pedro Henrique |
W5.3 |
318 |
Evaluating Bi-directional Connectionless BLE for Bike-to-Everything Wireless Communications |
| Woungang, Isaac |
W1.1 |
231 |
Flow-Based Anomaly Intrusion Detection Systems using Recurrent Neural Networks |
| W7.1 |
403 |
ReLEaRN: Reinforcement Learning Enhanced Profitable Rebalancing in Payment Channel Networks |
| Y A B C D E F G H I J K L M N O P Q R S T U V W Y Z |
| Yu, Tung-Min |
W6.2 |
361 |
Generative-AI based Health Management System for CKD Patients |
| Z A B C D E F G H I J K L M N O P Q R S T U V W Y Z |
| Zhu, Wei-Ping |
W3.4 |
349 |
Zero-day GPS Attack Detection and Classification in UAV Networks |
| W11.4 |
447 |
Subcarrier and Resource Allocation in Aerial Intelligent Reflecting Surface-Assisted Wireless Networks |
| Ziade, Youmni |
W9.2 |
501 |
Expert Fusion with Meta-Adaptation for Signal Technology Recognition |
| Zinno, Stefania |
AIMEH - WS.2 |
150 |
Exploring Depression Severity During Lockdown Through Explainable AI |
| Zitoune, Lynda |
ST5.2 |
115 |
WiFiQnA: a WiFi Dataset for Large Language Models |
| Zouhri, Anouar |
ST5.2 |
115 |
WiFiQnA: a WiFi Dataset for Large Language Models |