Mohammed Jouhari

Orcid: 0000-0001-5406-8594

According to our database1, Mohammed Jouhari authored at least 24 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Efficient Intrusion Detection: Combining χ<sup>2</sup> Feature Selection with CNN-BiLSTM on the UNSW-NB15 Dataset.
CoRR, 2024

Lightweight CNN-BiLSTM based Intrusion Detection Systems for Resource-Constrained IoT Devices.
CoRR, 2024

Efficient Intrusion Detection: Combining X<sup>2</sup> Feature Selection with CNN-BiLSTM on the UNSW-NB15 Dataset.
Proceedings of the 11th International Conference on Wireless Networks and Mobile Communications, 2024

Enhancing Intrusion Detection Systems Using Machine Learning Classifiers on the CSE-CIC-IDS2018 Dataset.
Proceedings of the 11th International Conference on Wireless Networks and Mobile Communications, 2024

2023
A Survey on Scalable LoRaWAN for Massive IoT: Recent Advances, Potentials, and Challenges.
IEEE Commun. Surv. Tutorials, 2023

Spreading Factor assisted LoRa Localization with Deep Reinforcement Learning.
Proceedings of the 97th IEEE Vehicular Technology Conference, 2023

Deep Reinforcement Learning-Based Energy Efficiency Optimization for Flying LoRa Gateways.
Proceedings of the IEEE International Conference on Communications, 2023

Improvement of Anomaly Detection System in the IoT Networks using CNN-LSTM Approach.
Proceedings of the IEEE Global Communications Conference, 2023

Conditional Generative Adversarial Networks for Rx-to-Tx Translation in Wireless Communication Systems.
Proceedings of the IEEE Global Communications Conference, 2023

2022
Robust Enhancement of Intrusion Detection Systems Using Deep Reinforcement Learning and Stochastic Game.
IEEE Trans. Veh. Technol., 2022

Anomaly Detection in Industrial IoT Using Distributional Reinforcement Learning and Generative Adversarial Networks.
Sensors, 2022

Distributed CNN Inference on Resource-Constrained UAVs for Surveillance Systems: Design and Optimization.
IEEE Internet Things J., 2022

Spreading Factor and RSSI for Localization in LoRa Networks: A Deep Reinforcement Learning Approach.
CoRR, 2022

Analysis of Blockchain Selfish Mining: a Stochastic Game Approach.
Proceedings of the IEEE International Conference on Communications, 2022

Adversarial Attacks Against IoT Networks using Conditional GAN based Learning.
Proceedings of the IEEE Global Communications Conference, 2022

2021
Securing IoT Transactions Against Double-Spending Attacks based on Signaling Game Approach.
Proceedings of the IEEE Global Communications Conference, 2021

Decentralized Autonomous Underwater Vehicles Distribution for IPv6-UWSN: A Study With Heuristic Methods.
Proceedings of the 4th International Conference on Advanced Communication Technologies and Networking, 2021

2019
Signaling game approach to improve the MAC protocol in the underwater wireless sensor networks.
Int. J. Commun. Syst., 2019

Underwater Wireless Sensor Networks: A Survey on Enabling Technologies, Localization Protocols, and Internet of Underwater Things.
IEEE Access, 2019

2018
MAC Protocol-Based Depth Adjustment and Splitting Mechanism for UnderWater Sensor Network (UWSN).
Proceedings of the IEEE Global Communications Conference, 2018

2017
Best association of macro user in two-tier cellular networks.
Proceedings of the International Conference on Wireless Networks and Mobile Communications, 2017

2016
Implementation of Bit Error Rate Model of 16-QAM in Aqua-Sim Simulator for Underwater Sensor Networks.
Proceedings of the Advances in Ubiquitous Networking 2 - Proceedings of the UNet'16, Casablanca, Morocco, May 30, 2016

New greedy forwarding strategy for UWSNs geographic routing protocols.
Proceedings of the 2016 International Wireless Communications and Mobile Computing Conference (IWCMC), 2016

2015
Topology control through depth adjustment and transmission power control for UWSN routing protocols.
Proceedings of the International Conference on Wireless Networks and Mobile Communications, 2015


  Loading...