Youssef Iraqi

Orcid: 0000-0003-0112-2600

According to our database1, Youssef Iraqi authored at least 116 papers between 1997 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A global user profile framework for effective recommender systems.
Multim. Tools Appl., May, 2024

Integrated Terrestrial-Wired and LEO Satellite With Offline Bidirectional Cooperation for 6G IoT Networks.
IEEE Internet Things J., May, 2024

On the BER Analysis of NOMA Systems.
IEEE Wirel. Commun. Lett., March, 2024

On the Performance of IRS-Assisted IoT-NTN With Joint Imperfect Phase Estimation and Quantization.
IEEE Open J. Commun. Soc., 2024

Robust Feature Extraction Using Temporal Context Averaging for Speaker Identification in Diverse Acoustic Environments.
IEEE Access, 2024

Beyond Positive Similarity Metrics: Leveraging Negative Co-Occurrence in Recommender Systems.
IEEE Access, 2024

Student At-Risk Identification and Classification Through Multitask Learning: A Case Study on the Moroccan Education System.
Proceedings of the Artificial Intelligence in Education - 25th International Conference, 2024

Investigating the Predictive Potential of Large Language Models in Student Dropout Prediction.
Proceedings of the Artificial Intelligence in Education - 25th International Conference, 2024

2023
Group Secret Key Generation Using Physical Layer Security for UAV Swarm Communications.
IEEE Trans. Aerosp. Electron. Syst., December, 2023

Speaker identification from emotional and noisy speech using learned voice segregation and speech VGG.
Expert Syst. Appl., August, 2023

Improved score aggregation for authorship verification.
Knowl. Inf. Syst., March, 2023

High-Rate Secret Key Generation Using Physical Layer Security and Physical Unclonable Functions.
IEEE Open J. Commun. Soc., 2023

An Efficient Rating System Using Blockchain for Recommender Systems.
Proceedings of the IEEE International Conference on Artificial Intelligence, 2023

2022
A Trust and Reputation System for IoT Service Interactions.
IEEE Trans. Netw. Serv. Manag., 2022

Efficient NOMA Design Without Channel Phase Information Using Amplitude-Coherent Detection.
IEEE Trans. Commun., 2022

A Power and Spectrum Efficient Uplink Transmission Scheme for QoS-Constrained IoT Networks.
IEEE Internet Things J., 2022

Speaker Identification from emotional and noisy speech data using learned voice segregation and Speech VGG.
CoRR, 2022

A survey on blockchain-based Recommender Systems: Integration architecture and taxonomy.
Comput. Commun., 2022

2021
Power Allocation for Reliable SIC Detection of Rectangular QAM-based NOMA Systems.
IEEE Trans. Veh. Technol., 2021

On the Performance of IRS-Assisted Multi-Layer UAV Communications With Imperfect Phase Compensation.
IEEE Trans. Commun., 2021

Hybrid Automatic Repeat Request (HARQ) in Wireless Communications Systems and Standards: A Contemporary Survey.
IEEE Commun. Surv. Tutorials, 2021

Authorship Identification of Electronic Texts.
IEEE Access, 2021

An Enhanced Emotion Recognition Algorithm Using Pitch Correlogram, Deep Sparse Matrix Representation and Random Forest Classifier.
IEEE Access, 2021

2020
Adaptive Bit Loading With Reduced Computational Time and Complexity for Multicarrier Wireless Communications.
IEEE Trans. Aerosp. Electron. Syst., 2020

Modern Development Technologies and Health Informatics: Area Transformation and Future Trends.
IEEE Internet Things Mag., 2020

Efficient Information Transmission Using Smart OFDM for IoT Applications.
IEEE Internet Things J., 2020

Evaluating Author Attribution on Emirati Tweets.
IEEE Access, 2020

Emotion Recognition From Speech Using Wavelet Packet Transform Cochlear Filter Bank and Random Forest Classifier.
IEEE Access, 2020

Blockchain-Based Distributed Trust and Reputation Management Systems: A Survey.
IEEE Access, 2020

Dominant Voiced Speech Segregation and Noise Reduction Pre-processing Module for Hearing Aids and Speech Processing Applications.
Proceedings of the 12th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2020), 2020

2019
Direct Bit Loading With Reduced Complexity and Overhead for Precoded OFDM Systems.
IEEE Trans. Veh. Technol., 2019

A Survey of Healthcare Monitoring Systems for Chronically Ill Patients and Elderly.
J. Medical Syst., 2019

Collision-Prevention Conditions for Wireless Personal Area Networks.
IEEE Netw. Lett., 2019

Energy efficient cooperative coalition selection in cluster-based capillary networks for CMIMO IoT systems.
Comput. Networks, 2019

Predicting protein functions by applying predicate logic to biomedical literature.
BMC Bioinform., 2019

Dynamic Adaptation for WPANs Collision Prevention in eHealth Environments.
IEEE Access, 2019

2018
Performance Analysis of Semi-Coherent OFDM Systems With Imperfect Channel Estimates.
IEEE Trans. Veh. Technol., 2018

Low-Complexity Slot-Based Bit Loading for Multicarrier Wireless Systems.
Proceedings of the 87th IEEE Vehicular Technology Conference, 2018

Towards an accessible dispatch system for major events.
Proceedings of the 2018 Annual IEEE International Systems Conference, 2018

Attributing Authors of Emirati Tweets.
Proceedings of the IEEE Global Communications Conference, 2018

2017
One-Shot Blind Channel Estimation for OFDM Systems Over Frequency-Selective Fading Channels.
IEEE Trans. Commun., 2017

2016
Error Probability Analysis and Applications of Amplitude-Coherent Detection in Flat Rayleigh Fading Channels.
IEEE Trans. Commun., 2016

Investigating the Impact of Possession-Way of a Smartphone on Action Recognition.
Sensors, 2016

Weighted averaging fusion for multi-view skeletal data and its application in action recognition.
IET Comput. Vis., 2016

A new digital communications receiver using partial knowledge of the channel state information.
Proceedings of the 27th IEEE Annual International Symposium on Personal, 2016

Formal Analysis of Collision Prevention of Two Wireless Personal Area Networks.
Proceedings of the International Conference on Computational Science 2016, 2016

2015
Stylometric Anonymity: Is Imitation the Best Strategy?
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Inferring relevance and presence of evidence in service-oriented and SaaS architectures.
Proceedings of the 2015 IEEE Symposium on Computers and Communication, 2015

Relationship between class order and parameter approximation in unsupervised learning.
Proceedings of the 2015 International Conference on Big Data and Smart Computing, 2015

Substitutive skeleton fusion for human action recognition.
Proceedings of the 2015 International Conference on Big Data and Smart Computing, 2015

2014
A State-of-the-Art Review of Cloud Forensics.
J. Digit. Forensics Secur. Law, 2014

Fall Detection Systems for Elderly Care: A Survey.
Proceedings of the 6th International Conference on New Technologies, Mobility and Security, 2014

Prevention of collisions among two Wireless Personal Area Networks.
Proceedings of the 7th IFIP Wireless and Mobile Networking Conference, 2014

A Slightly-modified GI-based Author-verifier with Lots of Features (ASGALF).
Proceedings of the Working Notes for CLEF 2014 Conference, 2014

2013
An Empirical Evaluation for Feature Selection Methods in Phishing Email Classification.
Comput. Syst. Sci. Eng., 2013

Phishing Detection: A Literature Survey.
IEEE Commun. Surv. Tutorials, 2013

Depth consistency evaluation for error-pose detection.
Proceedings of the Sixth International Conference on Machine Vision, 2013

A multi-sensor surveillance system for elderly care.
Proceedings of the IEEE 15th International Conference on e-Health Networking, 2013

Random-based Fair Allocation Algorithm with Fuzzy Comprehensive Evaluation for Single Carrier Multi-Relay Cooperative Networks.
Proceedings of the European Wireless 2013, 2013

A Distributed Snapshot Framework for Digital Forensics Evidence Extraction and Event Reconstruction from Cloud Environment.
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013

2012
An analysis of peer similarity for recommendations in P2P systems.
Multim. Tools Appl., 2012

Mitigation of DHCP starvation attack.
Comput. Electr. Eng., 2012

Lifetime evaluation of cooperative OFDM WSNs.
Proceedings of the 2012 IEEE Wireless Communications and Networking Conference, 2012

Cluster-Based Fair Allocation Algorithm for Multi-Relay Single Carrier Distributed Networks.
Proceedings of the 75th IEEE Vehicular Technology Conference, 2012

Cost-effective complex service mapping in cloud infrastructures.
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012

2011
Lexical URL analysis for discriminating phishing and legitimate e-mail messages.
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011

Mitigation of spear phishing attacks: A Content-based Authorship Identification framework.
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011

A study of feature subset evaluators and feature subset searching methods for phishing classification.
Proceedings of the 8th Annual Collaboration, 2011

Lexical URL analysis for discriminating phishing and legitimate websites.
Proceedings of the 8th Annual Collaboration, 2011

2010
An SSP formulation of routing in DTN networks.
Proceedings of the IEEE 6th International Conference on Wireless and Mobile Computing, 2010

Random-based fair allocation in Multi-Relay cooperative OFDM system.
Proceedings of the IEEE 6th International Conference on Wireless and Mobile Computing, 2010

Incorporating Trust in Network Virtualization.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

Impact of Peers' Similarity on Recommendations in P2P Systems.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
A contribution-based service differentiation scheme for peer-to-peer systems.
Peer-to-Peer Netw. Appl., 2009

Service admission control in multi-service sensor networks.
Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC 2009), 2009

2008
Personalized Recommendations in Peer-to-Peer Systems.
Proceedings of the 17th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises, 2008

A Recommender Scheme for Peer-to-Peer Systems.
Proceedings of the 2008 International Symposium on Applications and the Internet, 2008

2007
Resource and service discovery in large-scale multi-domain networks.
IEEE Commun. Surv. Tutorials, 2007

OSDA: Open service discovery architecture for efficient cross-domain service provisioning.
Comput. Commun., 2007

2006
Routing protocols in wireless mesh networks: challenges and design considerations.
Multim. Tools Appl., 2006

Gateway Placement Optimization in Wireless Mesh Networks With QoS Constraints.
IEEE J. Sel. Areas Commun., 2006

Peer-to-peer's most wanted: Malicious peers.
Comput. Networks, 2006

2005
Sliding contention window (SCW): towards backoff range-based service differentiation over IEEE 802.11 wireless LAN networks.
IEEE Netw., 2005

Adaptive packet video streaming over IP networks: a cross-layer approach.
IEEE J. Sel. Areas Commun., 2005

Service naming in large-scale and multi-domain networks.
IEEE Commun. Surv. Tutorials, 2005

Weight allocation in distributed admission control for wireless networks.
Comput. Commun., 2005

Zero-budget network dimensioning.
Proceedings of the Integrated Network Management, 2005

Free riders under control through service differentiation in peer-to-peer systems.
Proceedings of the 1st International Conference on Collaborative Computing: Networking, 2005

Detecting malicious peers in a reputation-based peer-to-peer system.
Proceedings of the 2nd IEEE Consumer Communications and Networking Conference, 2005

Handling Free Riders in Peer-to-Peer Systems.
Proceedings of the Agents and Peer-to-Peer Computing, 4th International Workshop, 2005

2004
Pricing and admission control for QoS-enabled Internet.
Comput. Networks, 2004

Lightpaths on demand: a Web-services-based management system.
IEEE Commun. Mag., 2004

Enabling real-time All-IP wireless networks.
Proceedings of the 2004 IEEE Wireless Communications and Networking Conference , 2004

A Reputation Management and Selection Advisor Schemes for Peer-to-Peer Systems.
Proceedings of the Utility Computing: 15th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, 2004

2003
A Multi-Agent Architecture for QoS Management in Multimedia Networks.
J. Netw. Syst. Manag., 2003

Grid-Controlled Lightpaths for High Performance Grid Applications.
J. Grid Comput., 2003

IP Video Streaming with Fine-Grained TCP-Friendly Rate Adaptation.
Proceedings of the Management of Multimedia Networks and Services, 2003

The Degree of Participation Concept in Ad Hoc Networks.
Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June, 2003

Tariff-Based Pricing and Admission Control for DiffServ Networks.
Proceedings of the Integrated Network Management VII, Managing It All, 2003

A multi-commodity flow based approach to virtual network resource allocation.
Proceedings of the Global Telecommunications Conference, 2003

2002
DORA: Efficient Routing for MPLS Traffic Engineering.
J. Netw. Syst. Manag., 2002

Dynamic Online Routing Algorithm for MPLS Traffic Engineering.
Proceedings of the NETWORKING 2002, 2002

2001
Supporting MPEG video VBR traffic in wireless networks.
Comput. Commun., 2001

Is It Worth Involving Several Cooperating Agents for Multimedia User's Admission in Cellular Networks?
Proceedings of the Management of Multimedia on the Internet, 2001

Performance Evaluation of a Distributed Call Admission Control for QoS-Sensitive Wireless Mobile Networks.
Proceedings of the Sixth IEEE Symposium on Computers and Communications (ISCC 2001), 2001

When is it worth involving several cells in the call admission control process for multimedia cellular networks?
Proceedings of the IEEE International Conference on Communications, 2001

2000
QoS control in wireless ATM.
Mob. Networks Appl., 2000

Resource management issues in future wireless multimedia networks.
J. High Speed Networks, 2000

Mobile Radio Networks: Networking and Protocols: B. Walke.
Comput. Commun., 2000

A novel distributed call admission control for wireless mobile multimedia networks.
Proceedings of the Third ACM International Workshop on Wireless Mobile Multimedia, 2000

An adaptive distributed call admission control for QoS-sensitive wireless mobile networks.
Proceedings of the 2000 IEEE Wireless Communications and Networking Conference, 2000

A Multi-agent System for Resource Management in Wireless Mobile Multimedia Networks.
Proceedings of the Services Management in Intelligent Networks, 2000

1999
Statistical properties of MPEG video traffic and their impact on bandwidth allocation in wireless ATM networks.
Proceedings of the 1999 IEEE Wireless Communications and Networking Conference, 1999

A dynamic bandwidth allocation algorithm for MPEG video sources in wireless networks.
Proceedings of the 3rd International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications (DIAL-M 1999), 1999

1997
An intelligent multi-agent architecture for dynamic regulation of ATM congestion control parameters.
Proceedings of the Management of Multimedia Networks and Services, 1997

An Experiment for the Processing of Feature Interactions within an Object-Oriented Environment.
Proceedings of the Feature Interactions in Telecommunications Networks IV, 1997


  Loading...