default search action
Abdelwahab Boualouache
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j20]Shajjad Hossain, Sidi-Mohammed Senouci, Bouziane Brik, Abdelwahab Boualouache:
A privacy-preserving Self-Supervised Learning-based intrusion detection system for 5G-V2X networks. Ad Hoc Networks 166: 103674 (2025) - 2024
- [j19]Taki Eddine Toufik Djaidja, Bouziane Brik, Abdelwahab Boualouache, Sidi Mohammed Senouci, Yacine Ghamri-Doudane:
Time-efficient detection of false position attack in 5G and beyond vehicular networks. Comput. Networks 247: 110461 (2024) - [j18]Taki Eddine Toufik Djaidja, Bouziane Brik, Abdelwahab Boualouache, Sidi Mohammed Senouci, Yacine Ghamri-Doudane:
Federated learning for 5G and beyond, a blessing and a curse- an experimental study on intrusion detection systems. Comput. Secur. 139: 103707 (2024) - [j17]Taki Eddine Toufik Djaidja, Bouziane Brik, Sidi Mohammed Senouci, Abdelwahab Boualouache, Yacine Ghamri-Doudane:
Early Network Intrusion Detection Enabled by Attention Mechanisms and RNNs. IEEE Trans. Inf. Forensics Secur. 19: 7783-7793 (2024) - [j16]Abdelwahab Boualouache, Amirhossein Adavoudi Jolfaei, Thomas Engel:
Multi-Process Federated Learning With Stacking for Securing 6G-V2X Network Slicing at Cross-Borders. IEEE Trans. Intell. Transp. Syst. 25(9): 10941-10952 (2024) - [j15]Hichem Sedjelmaci, Abdelwahab Boualouache:
When Two-Layer Federated Learning and Mean-Field Game Meet 5G and Beyond Security: Cooperative Defense Systems for 5G and Beyond Network Slicing. IEEE Trans. Netw. Serv. Manag. 21(1): 1178-1189 (2024) - [j14]Abdelaziz Amara Korba, Abdelwahab Boualouache, Yacine Ghamri-Doudane:
Zero-X: A Blockchain-Enabled Open-Set Federated Learning Framework for Zero-Day Attack Detection in IoV. IEEE Trans. Veh. Technol. 73(9): 12399-12414 (2024) - [c20]Fetulhak Abdurahman Shewajo, Abdelwahab Boualouache, Sidi Mohammed Senouci, Inès El Korbi, Bouziane Brik, Kinde Anlay Fante:
Integrating Blockchain Technology with PKI for Secure and Interoperable Communication in 5G and Beyond Vehicular Networks. CCNC 2024: 998-1001 - [i5]Abdelaziz Amara Korba, Abdelwahab Boualouache, Yacine Ghamri-Doudane:
Zero-X: A Blockchain-Enabled Open-Set Federated Learning Framework for Zero-Day Attack Detection in IoV. CoRR abs/2407.02969 (2024) - [i4]Abdelaziz Amara Korba, Abdelwahab Boualouache, Bouziane Brik, Rabah Rahal, Yacine Ghamri-Doudane, Sidi Mohammed Senouci:
Federated Learning for Zero-Day Attack Detection in 5G and Beyond V2X Networks. CoRR abs/2407.03070 (2024) - 2023
- [j13]Abdelwahab Boualouache, Thomas Engel:
A Survey on Machine Learning-Based Misbehavior Detection Systems for 5G and Beyond Vehicular Networks. IEEE Commun. Surv. Tutorials 25(2): 1128-1172 (2023) - [j12]Abdelwahab Boualouache, Bouziane Brik, Qiang Tang, Abdelaziz Amara Korba, Sylvain Cherrier, Sidi-Mohammed Senouci, Enric Pardo, Yacine Ghamri-Doudane, Rami Langar, Thomas Engel:
5G Vehicle-to-Everything at the Cross-Borders: Security Challenges and Opportunities. IEEE Internet Things Mag. 6(1): 114-119 (2023) - [j11]Abdelwahab Boualouache, Bouziane Brik, Sidi-Mohammed Senouci, Thomas Engel:
On-Demand Security Framework for 5GB Vehicular Networks. IEEE Internet Things Mag. 6(2): 26-31 (2023) - [j10]Amirhossein Adavoudi Jolfaei, Abdelwahab Boualouache, Andy Rupp, Stefan Schiffner, Thomas Engel:
A Survey on Privacy-Preserving Electronic Toll Collection Schemes for Intelligent Transportation Systems. IEEE Trans. Intell. Transp. Syst. 24(9): 8945-8962 (2023) - [c19]Abdelwahab Boualouache, Abdelaziz Amara Korba, Sidi-Mohammed Senouci, Yacine Ghamri-Doudane, Thomas Engel:
Reinforcement Learning-Based Security Orchestration for 5G-V2X Network Slicing at Cross-Borders. GLOBECOM 2023: 2949-2954 - [c18]Badre Bousalem, Vinicius F. Silva, Abdelwahab Boualouache, Rami Langar, Sylvain Cherrier:
Deep Learning-based Smart Radio Jamming Attacks Detection on 5G V2I/V2N Communications. GLOBECOM 2023: 7139-7144 - [c17]Shajjad Hossain, Abdelwahab Boualouache, Bouziane Brik, Sidi-Mohammed Senouci:
A Lightweight 5G-V2X Intra-Slice Intrusion Detection System Using Knowledge Distillation. ICC 2023: 1112-1117 - [c16]Abdelaziz Amara Korba, Abdelwahab Boualouache, Bouziane Brik, Rabah Rahal, Yacine Ghamri-Doudane, Sidi Mohammed Senouci:
Federated Learning for Zero-Day Attack Detection in 5G and Beyond V2X Networks. ICC 2023: 1137-1142 - [c15]Mahdi Fotouhi, Alessio Buscemi, Abdelwahab Boualouache, Florian Jomrich, Christian Köbel, Thomas Engel:
Assessing the Impact of Attacks on an Automotive Ethernet Time Synchronization Testbed. VNC 2023: 223-230 - 2022
- [j9]Abdelwahab Boualouache, Thomas Engel:
Federated learning-based scheme for detecting passive mobile attackers in 5G vehicular edge computing. Ann. des Télécommunications 77(3-4): 201-220 (2022) - [j8]Hichem Sedjelmaci, Sidi-Mohammed Senouci, Nirwan Ansari, Abdelwahab Boualouache:
A Trusted Hybrid Learning Approach to Secure Edge Computing. IEEE Consumer Electron. Mag. 11(3): 30-37 (2022) - [c14]Aymene Selamnia, Bouziane Brik, Sidi Mohammed Senouci, Abdelwahab Boualouache, Shajjad Hossain:
Edge Computing-enabled Intrusion Detection for C-V2X Networks using Federated Learning. GLOBECOM 2022: 2080-2085 - [c13]Taki Eddine Toufik Djaidja, Bouziane Brik, Abdelwahab Boualouache, Sidi Mohammed Senouci, Yacine Ghamri-Doudane:
DRIVE-B5G: A Flexible and Scalable Platform Testbed for B5G-V2X Networks. GLOBECOM 2022: 2800-2805 - [c12]Abdelwahab Boualouache, Thomas Engel:
Federated Learning-based Inter-slice Attack Detection for 5G-V2X Sliced Networks. VTC Fall 2022: 1-6 - [c11]Abdelwahab Boualouache, Taki Eddine Toufik Djaidja, Sidi-Mohammed Senouci, Yacine Ghamri-Doudane, Bouziane Brik, Thomas Engel:
Deep Learning-based Intra-slice Attack Detection for 5G-V2X Sliced Networks. VTC Spring 2022: 1-5 - [i3]Abdelwahab Boualouache, Thomas Engel:
A Survey on Machine Learning-based Misbehavior Detection Systems for 5G and Beyond Vehicular Networks. CoRR abs/2201.10500 (2022) - 2021
- [j7]Abdelwahab Boualouache, Hichem Sedjelmaci, Thomas Engel:
Consortium Blockchain for Cooperative Location Privacy Preservation in 5G-Enabled Vehicular Fog Computing. IEEE Trans. Veh. Technol. 70(7): 7087-7102 (2021) - [c10]Faisal Hawlader, Abdelwahab Boualouache, Sébastien Faye, Thomas Engel:
Intelligent Misbehavior Detection System for Detecting False Position Attacks in Vehicular Networks. ICC Workshops 2021: 1-6 - 2020
- [j6]Abdelwahab Boualouache, Sidi-Mohammed Senouci, Samira Moussaoui:
PRIVANET: An Efficient Pseudonym Changing and Management Framework for Vehicular Ad-Hoc Networks. IEEE Trans. Intell. Transp. Syst. 21(8): 3209-3218 (2020) - [c9]Abdelwahab Boualouache, Ridha Soua, Thomas Engel:
Toward an SDN-based Data Collection Scheme for Vehicular Fog Computing. ICC 2020: 1-6 - [c8]Abdelwahab Boualouache, Ridha Soua, Thomas Engel:
SDN-based Misbehavior Detection System for Vehicular Networks. VTC Spring 2020: 1-5 - [i2]Abdelwahab Boualouache, Ridha Soua, Thomas Engel:
Software-Defined Location Privacy Protection for Vehicular Networks. CoRR abs/2001.09170 (2020)
2010 – 2019
- 2019
- [j5]Abdessamed Derder, Samira Moussaoui, Zouina Doukha, Abdelwahab Boualouache:
An online target tracking protocol for vehicular Ad Hoc networks. Peer-to-Peer Netw. Appl. 12(4): 969-988 (2019) - [c7]Abdelwahab Boualouache, Ridha Soua, Thomas Engel:
VPGA: An SDN-based Location Privacy Zones Placement Scheme for Vehicular Networks. IPCCC 2019: 1-8 - [c6]Abdelwahab Boualouache, Ridha Soua, Thomas Engel:
SDN-based Pseudonym-Changing Strategy for Privacy Preservation in Vehicular Networks. WiMob 2019: 1-6 - 2018
- [j4]Abdelwahab Boualouache, Sidi-Mohammed Senouci, Samira Moussaoui:
A Survey on Pseudonym Changing Strategies for Vehicular Ad-Hoc Networks. IEEE Commun. Surv. Tutorials 20(1): 770-790 (2018) - 2017
- [j3]Noureddine Haouari, Samira Moussaoui, Sidi Mohammed Senouci, Abdelwahab Boualouache, Mohamed Guerroumi:
Enhanced local density estimation in internet of vehicles. IET Commun. 11(15): 2393-2401 (2017) - [j2]Abdelwahab Boualouache, Samira Moussaoui:
Urban pseudonym changing strategy for location privacy in VANETs. Int. J. Ad Hoc Ubiquitous Comput. 24(1/2): 49-64 (2017) - [j1]Abdelwahab Boualouache, Samira Moussaoui:
TAPCS: Traffic-aware pseudonym changing strategy for VANETs. Peer-to-Peer Netw. Appl. 10(4): 1008-1020 (2017) - [c5]Ahmed Alioua, Sidi-Mohammed Senouci, Samira Moussaoui, Hichem Sedjelmaci, Abdelwahab Boualouache:
Software-Defined heterogeneous vehicular networks: Taxonomy and architecture. GIIS 2017: 50-55 - [c4]Noureddine Haouari, Samira Moussaoui, Sidi-Mohammed Senouci, Abdelwahab Boualouache, Mohamed Ayoub Messous:
An efficient management of the control channel bandwidth in VANETs. ICC 2017: 1-6 - [i1]Abdelwahab Boualouache, Sidi-Mohammed Senouci, Samira Moussaoui:
A survey on pseudonym changing strategies for Vehicular Ad-Hoc Networks. CoRR abs/1704.00679 (2017) - 2016
- [c3]Abdelwahab Boualouache, Sidi-Mohammed Senouci, Samira Moussaoui:
VLPZ: The Vehicular Location Privacy Zone. ANT/SEIT 2016: 369-376 - [c2]Abdelwahab Boualouache, Sidi-Mohammed Senouci, Samira Moussaoui:
HPDM: A Hybrid Pseudonym Distribution Method for Vehicular Ad-hoc Networks. ANT/SEIT 2016: 377-384 - [c1]Abdelwahab Boualouache, Sidi-Mohammed Senouci, Samira Moussaoui:
Towards an Efficient Pseudonym Management and Changing Scheme for Vehicular Ad-Hoc Networks. GLOBECOM 2016: 1-7
Coauthor Index
aka: Sidi Mohammed Senouci
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:34 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint