


default search action
7th CIoT 2024: Montreal, QC, Canada
- 7th Conference on Cloud and Internet of Things, CIoT 2024, Montreal, QC, Canada, October 29-31, 2024. IEEE 2024, ISBN 979-8-3503-5671-7

- Haoran Qi, Zihan Zhang, Farhana H. Zulkernine:

SKELETRACK: Efficient Tracking of Skeleton in Blurry Videos for Human Activity Recognition. 1-5 - Ridwan Arefin Islam

, Rezwan-Ul-Islam, Swakkhar Shatabda, Salekul Islam:
ElectroBlock: Reinforcement Learning and Blockchain-based Energy Trade to Optimize Tariffs. 1-5 - Mohamed Ibrahim, Zahra Taheri, Octavio Barrera, Artmiz Golkaramnay:

DEMO: Non-Reciprocal RIS Solution for Power Mismatch in WiFi-Connected IoT Devices. 1-2 - Mirna Awad

, Adam Ait Hamid, Yeogeuch Ranganathan, Nizar Choubik, Rami Langar, Wael Jaafar:
xApps for DDoS Attacks Detection and Mitigation in 5G-V2X O-RAN Networks. 1-2 - Peter Yefi, Sikandar Ejaz

, Ramanunni Parakkal Menon, Ursula Eicker, Yann-Gaël Guéhéneuc:
An Architectural Approach for Enhanced Data Interoperability Across Building Systems. 1-8 - Sai Suchandan Reddy, Nikolai Pitaev, Aris Leivadeas:

Informed Network Routing for SD-WAN enabled SaaS Optimization: An M365 Proof of Concept. 1-7 - Neelanjana Subin Ferdous, Md. Zoheb Hassan, Imtiaz Ahmed, Lutfa Akter:

Resource Management for Reduced Capability New Radio Devices in Beyond 5G Networks: Opportunities and Research Road Map. 1-8 - Sarah Al Mamoun, Pía Baltazar, Charles Bicari, Marek Blottière, Jean-Michaël Celerier, Rochana Fardon, Olivier Gauthier, Eduardo A. L. Meneses, Maggie Needham, Guillaume Riou:

(DEMO) An IoT toolbox for media arts. 1-2 - Hayato Sagara, Yong Jin, Katsuyoshi Iida, Yoshiaki Takai:

Privacy Preserved IoT Data Inquiry System using DoT. 1-6 - Salman Ali, Cedric Gondro, Qiben Yan, Wolfgang Banzhaf:

End-to-End Decentralized Tracking of Carbon Footprint using Internet of Things and Distributed Databases. 1-8 - Morteza Moghaddassian, J. J. Garcia-Luna-Aceves:

Secure Cloud-Based Provisioning and Managing the Complete Life Cycle of IoT Metals. 1-8 - Pierre Domachowski, Haga Randrianaly, Marie-José Montpetit, Noël Crespi:

Computation Offloading on 5G Core Network for a Highly Delay Sensitive Real Time App. 1-4 - Wael Alsabbagh

, Chaerin Kim, Nitin Sanjay Patil, Peter Langendörfer
:
Beyond the Lens: False Data Injection Attacks on IIoT-Cameras through MQTT Manipulation. 1-7 - Nupur Gaikwad, Darshana Upadhyay, Jaume Manero, Srinivas Sampalli:

IoT-Enabled Pediatric Pain Care Leveraging Majority Vote-Based Transfer Learning Models. 1-8 - Khalil Snoussi, Wael Jaafar, Rami Langar:

S4HI: A Novel Learning-Based Human Identification Method From Behavioural Data. 1-6 - Shuyan Han, Evelyn Hui Kai Soon, Shihang Ruan, Haoming He, Morteza Moghaddassian, Alberto Leon-Garcia:

(POSTER) Cloud Monitoring and Prediction of Indoor LoRa-based Air Quality Data. 1-2 - Nahed Belhadj Mohamed, Md. Zoheb Hassan, Georges Kaddoum

:
Deep Reinforcement Learning-Enabled Resilient Radio Resource Allocation for Internet-of-Things Networks with Receiver Non-Linearity. 1-5 - Lucas Otávio Nascimento De Araújo, Abdelkader Outtagarts:

Sustainability of AI - Energy consumption estimation of an mMTC admission control. 1-7 - Fahima Hasan Athina, Jeniya Sultana, Debaleen Das Spandan

, Razib Iqbal:
Metamorphic Testing for Investigation of Context Recognition from Smart Home Voice Commands. 1-4 - Quôc Vo, Philippe Ea, Selma Benzouaoua, Osman Salem, Ahmed Mehaoua:

Anomaly Detection in IoT Sensor Energy Consumption Using LSTM Neural Networks and Isolation Forest. 1-8 - Sabbir M. Saleh, Nazim H. Madhavji, John Steinbacher:

Blockchain for Securing CI/CD Pipeline: A Review on Tools, Frameworks, and Challenges. 1-5 - Khorshed Alam

, Md Fahad Monir, Zoheb Hassan, Md. Tarek Habib:
Optimizing IoT Network Intrusion Detection: A Deep Learning Approach. 1-5 - Jean Baptiste Minani, Yahia El Fellah, Sanam Ahmed, Fatima Sabir, Naouel Moha, Yann-Gaël Guéhéneuc:

An Exploratory Study on Code Quality, Testing, Data Accuracy, and Practical Use Cases of IoT Wearables. 1-5 - Jean-Bernard Altidor, Chamseddine Talhi:

Enhancing Port Scan and DDoS Attack Detection using Genetic and Machine Learning Algorithms. 1-7 - Anes Abdennebi

, Reda Morsli, Nadjia Kara, Hakima Ould-Slimane:
Machine Learning and Large Language Models-based Techniques for Cyber Threat Detection: A Comparative Study. 1-9 - Messaoud Ait Yahia, Mouhamadou Mouctar Gueye, Wael Jaafar, Rami Langar:

On the Joint Placement of Blockchain and Users' Virtualized Services in the Internet of Vehicles. 1-8 - Zahra Taheri, Mohamed Ibrahim, Mohammad Reza Soleymani, Paul Tornatta:

Non-reciprocal RIS-Aided Full-Duplex Communications: IoT Applications. 1-5 - Swarnabha Roy, Reece Dobson, Jack Campbell, Stavros Kalafatis:

Efficient Resource Allocation for Multi-Robot Collaboration via Traffic-Aware Pod Autoscaling. 1-8 - Tomoyuki Koyama

, Takayuki Kushida, Soichiro Ikuno:
Query Prediction for Log Search for Distributed Tracing with External Monitoring Alerts. 1-7 - Hafidh Zouahi, Chamseddine Talhi, Oussama Boudar:

VizCheck: Enhancing Phishing Attack Detection through Visual Domain Name Homograph Analysis. 1-8 - Anurag Kumar, Carol Fung:

An Analysis on CVE Vulnerabilities of the Internet of Things. 1-6 - Souad Beguenane, Wael Jaafar:

A Novel Communication-Efficient and Blockchain-Secured Distributed Federated Learning. 1-6 - Ferdaous Abderrazak, Peyman Pourmohammadi, Larbi Talbi, Eva Antonino-Daviu, Tayeb A. Denidni, Miguel Ferrando-Bataller:

Selective Excitation Technique for Wireless Power Transfer in Wearable Devices Using CMA. 1-6 - Lilatul Ferdouse, Faria Khandaker:

Enhancing IoT Connectivity with Matching Theory-Based Spectrum Sharing for IRS-Aided Multi-Cell Systems. 1-7 - Victor Nikulshin, Chamseddine Talhi:

Effective IDS under constraints of modern enterprise networks: revisiting the OpTC dataset. 1-8 - Abdul Fareed Jamali, Carol Fung:

Demo-ScanIoT, an Application to collect IoT dataset for HomeGuard. 1-2 - Arshin Rezazadeh

, Davood Abednezhad, Duff Jones
, Hanan Lutfiyya:
Optimizing multi-service migration and downtime at the network edge using deep reinforcement learning. 1-8 - Nicholas Accurso, Samir Si-Mohammed

, Diptangshu De, Filippo Malandra:
(DEMO) WTTool: A Visual Web-based Topology Generator and 5G Network Simulator with ns-3. 1-2 - Jorge Ignacio Sandoval

, Sandra Céspedes, Agustín González, Diego Torreblanca, Ignacio G. Bugueño-Córdova:
A Deep Dive into Congestion Control and Buffer Management for Fluctuation-Prone 5G-A/6G Links. 1-8 - Mohamed Ahmed M. Hail, Arne Matthes, Stefan Fischer:

Comparative Performance Analysis of NDN Protocol in IoT Environments. 1-8 - Adriana Arteaga Arce, Alexandre Veremme, Carol Habib, Nathalie Mitton:

Demo: Virtualized Wireless Sensor Networks for Distributed Applications over the Cloud Continuum. 1-2 - Dalal Direm, Zakaria Maamar, Amel Benna:

DEMO of: A Policy-based System for Service Provisioning in Edge Computing. 1-2 - Abdelkader Tounsi, Osman Salem, Ahmed Mehaoua:

Anomaly Detection in Federated Learning: A Comprehensive Study on Data Poisoning and Energy Consumption Patterns in IoT Devices. 1-8

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














