default search action
Lyes Khoukhi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j56]Khalil Guibene, Nadhir Messai, Marwane Ayaida, Lyes Khoukhi:
A Pattern Mining-Based False Data Injection Attack Detector for Industrial Cyber-Physical Systems. IEEE Trans. Ind. Informatics 20(2): 2969-2978 (2024) - [j55]Zakaria Abou El Houda, Hajar Moudoud, Bouziane Brik, Lyes Khoukhi:
Blockchain-Enabled Federated Learning for Enhanced Collaborative Intrusion Detection in Vehicular Edge Computing. IEEE Trans. Intell. Transp. Syst. 25(7): 7661-7672 (2024) - [c97]Adam Kadi, Lyes Khoukhi, Jouni Viinikka, Pierre-Edouard Fabre:
Machine Learning for QUIC Traffic Flood Detection. GIIS 2024: 1-6 - [c96]Aymene Selamnia, Lyes Khoukhi, Mondher Ayadi, Bouaziz Ahmed:
Securing IIoT Against DDoS attacks: A Stochastic Approach. GIIS 2024: 1-6 - [c95]Zakaria Abou El Houda, Hajar Moudoud, Lyes Khoukhi:
Blockchain Meets O-RAN: A Decentralized Zero-Trust Framework for Secure and Resilient O-RAN in 6G and Beyond. INFOCOM (Workshops) 2024: 1-6 - 2023
- [j54]Houda Amari, Zakaria Abou El Houda, Lyes Khoukhi, Lamia Hadrich Belguith:
Trust Management in Vehicular Ad-Hoc Networks: Extensive Survey. IEEE Access 11: 47659-47680 (2023) - [j53]Saru Kumari, Hu Xiong, Lyes Khoukhi, Joel J. P. C. Rodrigues:
Safety and security of autonomous vehicles. Trans. Emerg. Telecommun. Technol. 34(11) (2023) - [j52]Zakaria Abou El Houda, Bouziane Brik, Adlen Ksentini, Lyes Khoukhi:
A MEC-Based Architecture to Secure IoT Applications using Federated Deep Learning. IEEE Internet Things Mag. 6(1): 60-63 (2023) - [j51]Djabir Abdeldjalil Chekired, Mohammed Amine Togou, Lyes Khoukhi:
HybCon: A Scalable SDN-Based Distributed Cloud Architecture for 5G Networks. IEEE Trans. Cloud Comput. 11(1): 550-563 (2023) - [j50]Zakaria Abou El Houda, Abdelhakim Senhaji Hafid, Lyes Khoukhi:
MiTFed: A Privacy Preserving Collaborative Network Attack Mitigation Framework Based on Federated Learning Using SDN and Blockchain. IEEE Trans. Netw. Sci. Eng. 10(4): 1985-2001 (2023) - [j49]Zakaria Abou El Houda, Abdelhakim Senhaji Hafid, Lyes Khoukhi, Bouziane Brik:
When Collaborative Federated Learning Meets Blockchain to Preserve Privacy in Healthcare. IEEE Trans. Netw. Sci. Eng. 10(5): 2455-2465 (2023) - [c94]Zakaria Abou El Houda, Hajar Moudoud, Lyes Khoukhi:
Secure and Efficient Federated Learning for Robust Intrusion Detection in IoT Networks. GLOBECOM 2023: 2668-2673 - [c93]Zakaria Abou El Houda, Jérémy Beaugeard, Quentin Sauvêtre, Lyes Khoukhi:
Towards a Secure and Scalable Access Control System Using Blockchain. ICBC 2023: 1-8 - [c92]Adam Kadi, Lyes Khoukhi, Jouni Viinikka, Pierre-Edouard Fabre:
Mining classification algorithms to identify flooding attacks through the HTTP/3 protocol. ICC Workshops 2023: 1259-1264 - [c91]Zakaria Abou El Houda, Hajar Moudoud, Bouziane Brik, Lyes Khoukhi:
Securing Federated Learning through Blockchain and Explainable AI for Robust Intrusion Detection in IoT Networks. INFOCOM Workshops 2023: 1-6 - 2022
- [j48]Dhaou Said, Mayssa Elloumi, Lyes Khoukhi:
Cyber-Attack on P2P Energy Transaction Between Connected Electric Vehicles: A False Data Injection Detection Based Machine Learning Model. IEEE Access 10: 63640-63647 (2022) - [j47]Fadlallah Chbib, Lyes Khoukhi, Walid Fahs, Jamal Haydar, Rida Khatoun:
A cross-layered scheme for multichannel and reactive routing in vehicular ad hoc networks. Trans. Emerg. Telecommun. Technol. 33(7) (2022) - [j46]Maryam Najafi, Lyes Khoukhi, Marc Lemercier:
Decentralized prediction and reputation approach in vehicular networks. Trans. Emerg. Telecommun. Technol. 33(7) (2022) - [j45]Zakaria Abou El Houda, Bouziane Brik, Lyes Khoukhi:
"Why Should I Trust Your IDS?": An Explainable Deep Learning Framework for Intrusion Detection Systems in Internet of Things Networks. IEEE Open J. Commun. Soc. 3: 1164-1176 (2022) - [j44]Zakaria Abou El Houda, Bouziane Brik, Adlen Ksentini, Lyes Khoukhi, Mohsen Guizani:
When Federated Learning Meets Game Theory: A Cooperative Framework to Secure IIoT Applications on Edge Computing. IEEE Trans. Ind. Informatics 18(11): 7988-7997 (2022) - [j43]Dongqing Liu, Abdelhakim Hafid, Lyes Khoukhi:
Workload Balancing in Mobile Edge Computing for Internet of Things: A Population Game Approach. IEEE Trans. Netw. Sci. Eng. 9(3): 1726-1739 (2022) - [j42]Hajar Moudoud, Zoubeir Mlika, Lyes Khoukhi, Soumaya Cherkaoui:
Detection and Prediction of FDI Attacks in IoT Systems via Hidden Markov Model. IEEE Trans. Netw. Sci. Eng. 9(5): 2978-2990 (2022) - [j41]Fadlallah Chbib, Sherali Zeadally, Rida Khatoun, Lyes Khoukhi, Walid Fahs, Jamal Haydar:
A secure cross-layer architecture for reactive routing in vehicle to vehicle (V2V) communications. Veh. Commun. 38: 100541 (2022) - [c90]Djabir Abdeldjalil Chekired, Lyes Khoukhi:
5G-Slicing of EVs Services: A Latency Analysis Model Based on Decentralized SDN-Fog Architecture. CSA 2022: 133-142 - [c89]Khalil Guibene, Nadhir Messai, Marwane Ayaida, Lyes Khoukhi, Atika Rivenq, Yassin El Hillali:
False Data Injection Attack Against Cyber-Physical Systems Protected by a Watermark. GLOBECOM 2022: 1-6 - [c88]Zakaria Abou El Houda, Lyes Khoukhi:
A Hierarchical Fog Computing Framework for Network Attack Detection in SDN. ICC 2022: 4366-4371 - [c87]Zakaria Abou El Houda, Bouziane Brik, Lyes Khoukhi:
Ensemble Learning for Intrusion Detection in SDN-Based Zero Touch Smart Grid Systems. LCN 2022: 149-156 - [c86]Zakaria Abou El Houda, Lyes Khoukhi, Bouziane Brik:
A Low-Latency Fog-based Framework to secure IoT Applications using Collaborative Federated Learning. LCN 2022: 343-346 - [c85]Houda Amari, Lyes Khoukhi, Lamia Hadrich Belguith:
Prediction and detection model for hierarchical Software-Defined Vehicular Network. LCN 2022: 463-470 - [c84]Khalil Guibene, Nadhir Messai, Marwane Ayaida, Lyes Khoukhi:
A Data Mining-based Intrusion Detection System for Cyber Physical Power Systems. Q2SWinet 2022: 55-62 - [c83]Maryam Najafi, Marc Lemercier, Lyes Khoukhi:
Data leakage prevention model for vehicular networks. WiMob 2022: 124-129 - [i5]Hajar Moudoud, Soumaya Cherkaoui, Lyes Khoukhi:
Towards a Secure and Reliable Federated Learning using Blockchain. CoRR abs/2201.11311 (2022) - [i4]Hajar Moudoud, Soumaya Cherkaoui, Lyes Khoukhi:
Towards a Scalable and Trustworthy Blockchain: IoT Use Case. CoRR abs/2201.11337 (2022) - [i3]Hajar Moudoud, Lyes Khoukhi, Soumaya Cherkaoui:
Prediction and Detection of FDIA and DDoS Attacks in 5G Enabled IoT. CoRR abs/2201.11368 (2022) - [i2]Hajar Moudoud, Soumaya Cherkaoui, Lyes Khoukhi:
An IoT Blockchain Architecture Using Oracles and Smart Contracts: the Use-Case of a Food Supply Chain. CoRR abs/2201.11370 (2022) - [i1]Hajar Moudoud, Soumaya Cherkaoui, Lyes Khoukhi:
An Overview of Blockchain and 5G Networks. CoRR abs/2201.11385 (2022) - 2021
- [j40]Lyes Khoukhi, Hu Xiong, Saru Kumari, Nicolas Puech:
The Internet of vehicles and smart cities. Ann. des Télécommunications 76(9-10): 545-546 (2021) - [j39]Mengying Ren, Jun Zhang, Lyes Khoukhi, Houda Labiod, Véronique Vèque:
A review of clustering algorithms in VANETs. Ann. des Télécommunications 76(9-10): 581-603 (2021) - [j38]Fadlallah Chbib, Walid Fahs, Jamal Haydar, Lyes Khoukhi, Rida Khatoun:
IEEE 802.11p performance enhancement based on Markov chain and neural networks for safety applications. Ann. des Télécommunications 76(9-10): 617-632 (2021) - [j37]Hajar Moudoud, Lyes Khoukhi, Soumaya Cherkaoui:
Prediction and Detection of FDIA and DDoS Attacks in 5G Enabled IoT. IEEE Netw. 35(2): 194-201 (2021) - [c82]Zakaria Abou El Houda, Abdelhakim Senhaji Hafid, Lyes Khoukhi:
A Novel Machine Learning Framework for Advanced Attack Detection using SDN. GLOBECOM 2021: 1-6 - [c81]Hajar Moudoud, Soumaya Cherkaoui, Lyes Khoukhi:
Towards a Secure and Reliable Federated Learning using Blockchain. GLOBECOM 2021: 1-6 - [c80]Samira Chouikhi, Lyes Khoukhi:
A Multi-Leader-Follower Game Model for Resource Allocation in Wireless Sensor/Actuator Networks. ICC 2021: 1-6 - [c79]Zakaria Abou El Houda, Abdelhakim Senhaji Hafid, Lyes Khoukhi:
Blockchain-based Reverse Auction for V2V charging in smart grid environment. ICC 2021: 1-6 - [c78]Hajar Moudoud, Soumaya Cherkaoui, Lyes Khoukhi:
Towards a Scalable and Trustworthy Blockchain: IoT Use Case. ICC 2021: 1-6 - [c77]Maryam Najafi, Lyes Khoukhi, Marc Lemercier:
Decentralized Reputation Model based on Bayes' Theorem in Vehicular Networks. ICC 2021: 1-6 - [c76]Maryam Najafi, Lyes Khoukhi, Marc Lemercier:
A Multidimensional Trust Model for Vehicular Ad-Hoc Networks. LCN 2021: 419-422 - [c75]Houda Amari, Wassef Louati, Lyes Khoukhi, Lamia Hadrich Belguith:
Securing Software-Defined Vehicular Network Architecture against DDoS attack. LCN 2021: 653-656 - 2020
- [j36]Badis Hammi, Sherali Zeadally, Houda Labiod, Rida Khatoun, Youcef Begriche, Lyes Khoukhi:
A secure multipath reactive protocol for routing in IoT and HANETs. Ad Hoc Networks 103: 102118 (2020) - [j35]Samira Chouikhi, Lyes Khoukhi, Moez Esseghir, Leïla Merghem-Boulahia:
Generalized Nash Equilibrium approach for radio resource sharing and power allocation in vehicular networks. Comput. Networks 182: 107490 (2020) - [j34]Djabir Abdeldjalil Chekired, Lyes Khoukhi, Hussein T. Mouftah:
Fog-Computing-Based Energy Storage in Smart Grid: A Cut-Off Priority Queuing Model for Plug-In Electrified Vehicle Charging. IEEE Trans. Ind. Informatics 16(5): 3470-3482 (2020) - [j33]Zakaria Abou El Houda, Lyes Khoukhi, Abdelhakim Senhaji Hafid:
Bringing Intelligence to Software Defined Networks: Mitigating DDoS Attacks. IEEE Trans. Netw. Serv. Manag. 17(4): 2523-2535 (2020) - [j32]Dongqing Liu, Abdelhakim Hafid, Lyes Khoukhi:
Multi-Item Auction Based Mechanism for Mobile Data Offloading: A Robust Optimization Approach. IEEE Trans. Veh. Technol. 69(4): 4155-4168 (2020) - [c74]Fadlallah Chbib, Lyes Khoukhi, Walid Fahs, Jamal Haydar, Rida Khatoun:
A Cross-Layered Interference in Multichannel MAC of VANET. Cloudtech 2020: 1-6 - [c73]Fadlallah Chbib, Walid Fahs, Jamal Haydar, Lyes Khoukhi, Rida Khatoun:
Message Fabrication Detection Model based on Reactive Protocols in VANET. CSNet 2020: 1-5 - [c72]Lyes Khoukhi, Rida Khatoun:
Safe Traffic Adaptation Model in Wireless Mesh Networks. CSNet 2020: 1-4 - [c71]Houda Amari, Wassef Louati, Lyes Khoukhi, Lamia Hadrich Belguith:
TCP Incast Solutions in Data Center Networks: Survey. HIS 2020: 535-545 - [c70]Zakaria Abou El Houda, Abdelhakim Hafid, Lyes Khoukhi:
BrainChain - A Machine learning Approach for protecting Blockchain applications using SDN. ICC 2020: 1-6 - [c69]Zakaria Abou El Houda, Abdelhakim Hafid, Lyes Khoukhi:
Blockchain Meets AMI: Towards Secure Advanced Metering Infrastructures. ICC 2020: 1-6 - [c68]Khalil Guibene, Marwane Ayaida, Lyes Khoukhi, Nadhir Messai:
Black-box System Identification of CPS Protected by a Watermark-based Detector. LCN 2020: 341-344 - [c67]Samira Chouikhi, Lyes Khoukhi, Samiha Ayed, Marc Lemercier:
An Efficient Reputation Management Model based on Game Theory for Vehicular Networks. LCN 2020: 413-416 - [e3]Hwee-Pink Tan, Lyes Khoukhi, Sharief Oteafy:
45th IEEE Conference on Local Computer Networks, LCN 2020, Sydney, Australia, November 16-19, 2020. IEEE 2020, ISBN 978-1-7281-7158-6 [contents] - [e2]Hwee-Pink Tan, Lyes Khoukhi, Sharief Oteafy:
45th IEEE LCN Symposium on Emerging Topics in Networking, LCN Symposium 2020, Sydney, Australia, November 16-19, 2020. IEEE 2020, ISBN 978-1-7281-8314-5 [contents]
2010 – 2019
- 2019
- [j31]Zakaria Abou El Houda, Abdelhakim Senhaji Hafid, Lyes Khoukhi:
Cochain-SC: An Intra- and Inter-Domain Ddos Mitigation Scheme Based on Blockchain Using SDN and Smart Contract. IEEE Access 7: 98893-98907 (2019) - [j30]Rida Khatoun, Youcef Begriche, Lyes Khoukhi:
A statistical detection mechanism for node misbehaviours in wireless mesh networks. Int. J. Ad Hoc Ubiquitous Comput. 31(1): 23-35 (2019) - [j29]Djabir Abdeldjalil Chekired, Mohammed Amine Togou, Lyes Khoukhi, Adlen Ksentini:
5G-Slicing-Enabled Scalable SDN Core Network: Toward an Ultra-Low Latency of Autonomous Driving Service. IEEE J. Sel. Areas Commun. 37(8): 1769-1782 (2019) - [j28]Mohammed Amine Togou, Djabir Abdeldjalil Chekired, Lyes Khoukhi, Gabriel-Miro Muntean:
A Hierarchical Distributed Control Plane for Path Computation Scalability in Large Scale Software-Defined Networks. IEEE Trans. Netw. Serv. Manag. 16(3): 1019-1031 (2019) - [c66]Zakaria Abou El Houda, Abdelhakim Hafid, Lyes Khoukhi:
Co-IoT: A Collaborative DDoS Mitigation Scheme in IoT Environment Based on Blockchain Using SDN. GLOBECOM 2019: 1-6 - [c65]Djabir Abdeldjalil Chekired, Lyes Khoukhi, Hussein T. Mouftah:
Fog-Based Distributed Intrusion Detection System Against False Metering Attacks in Smart Grid. ICC 2019: 1-6 - [c64]Dongqing Liu, Lyes Khoukhi, Abdelhakim Hafid:
Aggregate Offloading Decision Analysis for Mobile Edge Computing in Software Defined Network. ICC 2019: 1-5 - [c63]Djabir Abdeldjalil Chekired, Lyes Khoukhi:
Distributed SDN-Based C4ISR Communications: A Delay-Tolerant Network for Trusted Tactical Cloudlets. ICMCIS 2019: 1-7 - [c62]Fadlallah Chbib, Lyes Khoukhi, Walid Fahs, Rida Khatoun, Jamal Haydar:
Wave Performance Analysis and Enhancement for Safety Applications in Vehicular Networks. NTMS 2019: 1-7 - [c61]Hajar Moudoud, Soumaya Cherkaoui, Lyes Khoukhi:
An IoT Blockchain Architecture Using Oracles and Smart Contracts: the Use-Case of a Food Supply Chain. PIMRC 2019: 1-6 - [e1]Soumaya Cherkaoui, Lyes Khoukhi:
2019 IEEE 44th LCN Symposium on Emerging Topics in Networking (LCN Symposium), Osnabrück, Germany, October 14-17, 2019. IEEE 2019, ISBN 978-1-7281-2561-9 [contents] - 2018
- [j27]Badis Hammi, Rida Khatoun, Sherali Zeadally, Achraf Fayad, Lyes Khoukhi:
IoT technologies for smart cities. IET Networks 7(1): 1-13 (2018) - [j26]Tian Yang, Moez Esseghir, Lyes Khoukhi:
A Survey of EE Optimization Methods for Primary and Secondary Users in Cognitive Radio Networks. Netw. Protoc. Algorithms 10(3): 18-42 (2018) - [j25]Chekired Djabir Abd Eldjalil, Lyes Khoukhi, Hussein T. Mouftah:
Decentralized Cloud-SDN Architecture in Smart Grid: A Dynamic Pricing Model. IEEE Trans. Ind. Informatics 14(3): 1220-1231 (2018) - [j24]Djabir Abdeldjalil Chekired, Lyes Khoukhi, Hussein T. Mouftah:
Industrial IoT Data Scheduling Based on Hierarchical Fog Computing: A Key for Enabling Smart Factory. IEEE Trans. Ind. Informatics 14(10): 4590-4602 (2018) - [j23]Mengying Ren, Jun Zhang, Lyes Khoukhi, Houda Labiod, Véronique Vèque:
A Unified Framework of Clustering Approach in Vehicular Ad Hoc Networks. IEEE Trans. Intell. Transp. Syst. 19(5): 1401-1414 (2018) - [j22]Mohammed Amine Togou, Lyes Khoukhi, Abdelhakim Hafid:
Performance Analysis and Enhancement of WAVE for V2V Non-Safety Applications. IEEE Trans. Intell. Transp. Syst. 19(8): 2603-2614 (2018) - [j21]Dongqing Liu, Lyes Khoukhi, Abdelhakim Hafid:
Prediction-Based Mobile Data Offloading in Mobile Cloud Computing. IEEE Trans. Wirel. Commun. 17(7): 4660-4673 (2018) - [j20]Djabir Abdeldjalil Chekired, Mohammed Amine Togou, Lyes Khoukhi:
Hierarchical Wireless Vehicular Fog Architecture: A Case Study of Scheduling Electric Vehicle Energy Demands. IEEE Veh. Technol. Mag. 13(4): 116-126 (2018) - [c60]Djabir Abdeldjalil Chekired, Mohammed Amine Togou, Lyes Khoukhi:
A Hybrid SDN Path Computation for Scaling Data Centers Networks. GLOBECOM 2018: 1-6 - [c59]Zakaria Abou El Houda, Lyes Khoukhi, Abdelhakim Hafid:
ChainSecure - A Scalable and Proactive Solution for Protecting Blockchain Applications Using SDN. GLOBECOM 2018: 1-6 - [c58]Dongqing Liu, Abdelhakim Hafid, Lyes Khoukhi:
Population Game Based Energy and Time Aware Task Offloading for Large Amounts of Competing Users. GLOBECOM 2018: 1-6 - [c57]Mohammed Amine Togou, Djabir Abdeldjalil Chekired, Lyes Khoukhi, Gabriel-Miro Muntean:
A Distributed Control Plane for Path Computation Scalability in Software-Defined Networks. GLOBECOM 2018: 1-6 - [c56]Djabir Abd Eldjalil Chekired, Lyes Khoukhi:
Multi-Tier Fog Architecture: A New Delay-Tolerant Network for IoT Data Processing. ICC 2018: 1-6 - [c55]Djabir Abdeldjalil Chekired, Lyes Khoukhi, Hussein T. Mouftah:
Queuing Model for EVs Energy Management: Load Balancing Algorithms Based on Decentralized Fog Architecture. ICC 2018: 1-6 - [c54]Mengying Ren, Jun Zhang, Lyes Khoukhi, Houda Labiod, Véronique Vèque:
A Stochastic Model for Vehicle Clustering Performance Analysis. ICC 2018: 1-6 - [c53]Djabir Abdeldjalil Chekired, Lyes Khoukhi, Hussein T. Mouftah:
Multi-Level Fog Based Resource Allocation Model for EVs Energy Planning in Smart Grid. LCN 2018: 243-250 - [c52]Tian Yang, Moez Esseghir, Lyes Khoukhi:
An Evolutionary Game Approach Towards Energy-Activated Cooperative Spectrum Sensing. VTC Fall 2018: 1-5 - 2017
- [j19]Mohammad Rmayti, Rida Khatoun, Youcef Begriche, Lyes Khoukhi, Dominique Gaïti:
A stochastic approach for packet dropping attacks detection in mobile Ad hoc networks. Comput. Networks 121: 53-64 (2017) - [j18]Hocine Ameur, Moez Esseghir, Lyes Khoukhi, Leïla Merghem-Boulahia:
Enhanced MIH (media independent handover) for collaborative green wireless communications. Int. J. Commun. Syst. 30(7) (2017) - [j17]Hocine Ameur, Lyes Khoukhi, Moez Esseghir, Leïla Merghem-Boulahia:
Energy efficient networks: recent research and future challenges. Int. J. Wirel. Mob. Comput. 12(1): 1-15 (2017) - [j16]Juliette Dromard, Lyes Khoukhi, Rida Khatoun, Youcef Begriche:
Towards combining admission control and link scheduling in wireless mesh networks. Telecommun. Syst. 66(1): 39-54 (2017) - [j15]Achraf Bourass, Soumaya Cherkaoui, Lyes Khoukhi:
Secure Optimal Itinerary Planning for Electric Vehicles in the Smart Grid. IEEE Trans. Ind. Informatics 13(6): 3236-3245 (2017) - [j14]Chekired Djabir Abd Eldjalil, Lyes Khoukhi:
Smart Grid Solution for Charging and Discharging Services Based on Cloud Computing Scheduling. IEEE Trans. Ind. Informatics 13(6): 3312-3321 (2017) - [j13]Mengying Ren, Lyes Khoukhi, Houda Labiod, Jun Zhang, Véronique Vèque:
A mobility-based scheme for dynamic clustering in vehicular ad-hoc networks (VANETs). Veh. Commun. 9: 233-241 (2017) - [c51]Chekired Djabir Abd Eldjalil, Dhaou Said, Lyes Khoukhi, Hussein T. Mouftah:
A novel pricing policy for G2V and V2G services. CCNC 2017: 634-635 - [c50]Dongqing Liu, Lyes Khoukhi, Abdelhakim Hafid:
Decentralized data offloading for mobile cloud computing based on game theory. FMEC 2017: 20-24 - [c49]Jun Zhang, Mengying Ren, Houda Labiod, Lyes Khoukhi:
Link Duration Prediction in VANETs via AdaBoost. GLOBECOM 2017: 1-6 - [c48]Achraf Bourass, Soumaya Cherkaoui, Lyes Khoukhi:
Secure Communication Scheme for Electric Vehicles in the Smart Grid. GLOBECOM 2017: 1-5 - [c47]Achraf Bourass, Soumaya Cherkaoui, Lyes Khoukhi:
Intelligent Route Guidance for Electric Vehicles in the Smart Grid. GLOBECOM 2017: 1-7 - [c46]Chekired Djabir Abd Eldjalil, Lyes Khoukhi:
Optimal priority-queuing for EV charging-discharging service based on cloud computing. ICC 2017: 1-6 - [c45]Dongqing Liu, Lyes Khoukhi, Abdelhakim Hafid:
Data offloading in mobile cloud computing: A Markov Decision Process approach. ICC 2017: 1-6 - [c44]Mohammed Amine Togou, Lyes Khoukhi, Abdelhakim Hafid:
An altruistic service channel selection scheme for V2V infotainment applications. ICC 2017: 1-6 - [c43]Mohammed Amine Togou, Lyes Khoukhi, Abdelhakim Hafid:
IEEE 802.11p EDCA performance analysis for vehicle-to-vehicle infotainment applications. ICC 2017: 1-6 - [c42]Jun Zhang, Mengying Ren, Houda Labiod, Lyes Khoukhi:
Every dog has its day: A comparative study of clustering algorithms in VANETs. ISCC 2017: 383-389 - [c41]Djabir Abd Eldjalil Chekired, Dhaou Said, Lyes Khoukhi, Hussein T. Mouftah:
Dynamic pricing model for EV charging-discharging service based on cloud computing scheduling. IWCMC 2017: 1010-1015 - [c40]Mengying Ren, Jun Zhang, Lyes Khoukhi, Houda Labiod, Véronique Vèque:
A study of the impact of merging schemes on cluster stability in VANETs. PIMRC 2017: 1-7 - 2016
- [j12]Rida Khatoun, Youcef Begriche, Juliette Dromard, Lyes Khoukhi, Ahmed Serhrouchni:
A statistical trust system in wireless mesh networks. Ann. des Télécommunications 71(5-6): 187-199 (2016) - [j11]Mohammed Amine Togou, Abdelhakim Hafid, Lyes Khoukhi:
SCRP: Stable CDS-Based Routing Protocol for Urban Vehicular Ad Hoc Networks. IEEE Trans. Intell. Transp. Syst. 17(5): 1298-1307 (2016) - [c39]Mohammed Amine Togou, Lyes Khoukhi, Abdelhakim Senhaji Hafid:
Throughput analysis of the IEEE802.11p EDCA considering transmission opportunity for non-safety applications. ICC 2016: 1-6 - [c38]Mengying Ren, Lyes Khoukhi, Houda Labiod, Jun Zhang, Véronique Vèque:
A new mobility-based clustering algorithm for vehicular ad hoc networks (VANETs). NOMS 2016: 1203-1208 - [c37]Hocine Ameur, Moez Esseghir, Lyes Khoukhi:
Fully Distributed Approach for Energy Saving in Heterogeneous Networks. NTMS 2016: 1-6 - [c36]Hocine Ameur, Moez Esseghir, Lyes Khoukhi:
Maximum weight matching based heuristic for future HetNets greening. WCNC 2016: 1-6 - 2015
- [j10]Maher Rebai, Matthieu Le Berre, Hichem Snoussi, Faicel Hnaien, Lyes Khoukhi:
Sensor deployment optimization methods to achieve both coverage and connectivity in wireless sensor networks. Comput. Oper. Res. 59: 11-21 (2015) - [j9]Dhaou Said, Soumaya Cherkaoui, Lyes Khoukhi:
Multi-priority queuing for electric vehicles charging at public supply stations with price variation. Wirel. Commun. Mob. Comput. 15(6): 1049-1065 (2015) - [c35]Hocine Ameur, Lyes Khoukhi, Moez Esseghir:
MIH (Media Independent Handover) for green wireless communications. CCNC 2015: 322-327 - [c34]Mohammed Amine Togou, Abdelhakim Hafid, Lyes Khoukhi:
A Novel CDS-Based Routing Protocol for Vehicular Ad Hoc Networks in Urban Environments. GLOBECOM 2015: 1-6 - [c33]Dhaou Said, Soumaya Cherkaoui, Lyes Khoukhi:
Guidance model for EV charging service. ICC 2015: 5765-5770 - [c32]Ali El Masri, Lyes Khoukhi, Abdelhakim Hafid, Ahmad Sardouk, Dominique Gaïti:
An efficient and fair MAC scheme for Wireless Mesh Networks using beamforming antennas. IWCMC 2015: 1447-1451 - [c31]Hocine Ameur, Moez Esseghir, Lyes Khoukhi:
Lyes Khoukhig mechanism for future HetNets. PIMRC 2015: 1628-1633 - [c30]Youcef Begriche, Rida Khatoun, Lyes Khoukhi, Xiuzhen Chen:
Bayesian-based model for a reputation system in vehicular networks. SSIC 2015: 1-6 - [c29]Rida Khatoun, P. Gut, R. Doulami, Lyes Khoukhi, Ahmed Serhrouchni:
A reputation system for detection of black hole attack in vehicular networking. SSIC 2015: 1-5 - [c28]Mohammad Rmayti, Youcef Begriche, Rida Khatoun, Lyes Khoukhi, Dominique Gaïti:
Flooding attacks detection in MANETs. SSIC 2015: 1-6 - 2014
- [j8]Maher Rebai, Matthieu Le Berre, Faicel Hnaien, Hichem Snoussi, Lyes Khoukhi:
A Branch and Bound Algorithm for the Critical Grid Coverage Problem in Wireless Sensor Networks. Int. J. Distributed Sens. Networks 10 (2014) - [j7]Lyes Khoukhi, Ali El Masri, Ahmad Sardouk, Abdelhakim Hafid, Dominique Gaïti:
Toward Fuzzy Traffic Adaptation Solution in Wireless Mesh Networks. IEEE Trans. Computers 63(5): 1296-1308 (2014) - [j6]Ali El Masri, Ahmad Sardouk, Lyes Khoukhi, Abdelhakim Hafid, Dominique Gaïti:
Neighborhood-Aware and Overhead-Free Congestion Control for IEEE 802.11 Wireless Mesh Networks. IEEE Trans. Wirel. Commun. 13(10): 5878-5892 (2014) - [c27]Juliette Dromard, Rida Khatoun, Lyes Khoukhi:
Adaptive CUSUM Algorithm to Detect Malicious Behaviors in Wireless Mesh Networks. AIMS 2014: 29-41 - [c26]Mohammad Rmayti, Youcef Begriche, Rida Khatoun, Lyes Khoukhi, Dominique Gaïti:
Denial of Service (DoS) attacks detection in MANETs through statistical models. GIIS 2014: 1-3 - [c25]Dhaou Said, Soumaya Cherkaoui, Lyes Khoukhi:
Scheduling protocol with load managementfor EV charging. GLOBECOM 2014: 362-367 - [c24]Ali El Masri, Ahmad Sardouk, Lyes Khoukhi, Leïla Merghem-Boulahia, Dominique Gaïti:
Multimedia Support in Wireless Mesh Networks Using Interval Type-2 Fuzzy Logic System. NTMS 2014: 1-5 - [c23]Mohammad Rmayti, Youcef Begriche, Rida Khatoun, Lyes Khoukhi, Dominique Gaïti:
Denial of service (DoS) attacks detection in MANETs using Bayesian classifiers. SCVT 2014: 7-12 - 2013
- [j5]Lyes Khoukhi, Hakim Badis, Leïla Merghem-Boulahia, Moez Esseghir:
Admission control in wireless ad hoc networks: a survey. EURASIP J. Wirel. Commun. Netw. 2013: 109 (2013) - [j4]Juliette Dromard, Lyes Khoukhi, Rida Khatoun:
An efficient admission control model based on dynamic link scheduling in wireless mesh networks. EURASIP J. Wirel. Commun. Netw. 2013: 288 (2013) - [j3]Majdi Mansouri, Lyes Khoukhi, Hazem N. Nounou, Mohamed N. Nounou:
Secure and robust clustering for quantized target tracking in wireless sensor networks. J. Commun. Networks 15(2): 164-172 (2013) - [c22]Juliette Dromard, Rida Khatoun, Lyes Khoukhi:
An Admission Control Scheme Based on Transmissions Scheduling for Wireless Mesh Networks. AINA Workshops 2013: 75-81 - [c21]Mohamed Amin Benatia, Lyes Khoukhi, Moez Esseghir, Leïla Merghem-Boulahia:
A Markov Chain Based Model for Congestion Control in VANETs. AINA Workshops 2013: 1021-1026 - [c20]Dhaou Said, Soumaya Cherkaoui, Lyes Khoukhi:
Advanced scheduling protocol for electric vehicle home charging with time-of-use pricing. ICC 2013: 6272-6276 - [c19]Juliette Dromard, Rida Khatoun, Lyes Khoukhi:
A Watchdog extension scheme considering packet loss for a reputation system in wireless mesh network. ICT 2013: 1-5 - [c18]Dhaou Said, Soumaya Cherkaoui, Lyes Khoukhi:
Queuing model for EVs charging at public supply stations. IWCMC 2013: 65-70 - 2012
- [c17]Juliette Dromard, Lyes Khoukhi, Rida Khatoun:
An Admission Control Scheme Based on Links' Activity Scheduling for Wireless Mesh Networks. ADHOC-NOW 2012: 399-412 - [c16]Ali El Masri, Lyes Khoukhi, Ahmad Sardouk, Dominique Gaïti:
QoS support in WMNs using temporal resource reservation and traffic regulation schemes. CCNC 2012: 132-137 - [c15]Najet Boughanmi, Moez Esseghir, Leïla Merghem-Boulahia, Lyes Khoukhi:
Energy Efficient Aggregation in Wireless Sensor Networks. ICAIT 2012: 264-273 - [c14]Majdi Mansouri, Lyes Khoukhi, Hazem N. Nounou, Mohamed N. Nounou:
Robust routing for target tracking in quantized sensor networks. IWCMC 2012: 1130-1135 - [c13]Ali El Masri, Ahmad Sardouk, Lyes Khoukhi, Dominique Gaïti:
An efficient and fair congestion control protocol for IEEE 802.11-based Wireless Mesh Networks. PIMRC 2012: 738-744 - 2011
- [c12]Majdi Mansouri, Lyes Khoukhi, Hazem N. Nounou, Mohamed N. Nounou:
Genetic Algorithm Optimization for Quantized Target Tracking in Wireless Sensor Networks. GLOBECOM 2011: 1-6 - [c11]Ali El Masri, Lyes Khoukhi, Ahmad Sardouk, Majdi Mansouri, Dominique Gaïti:
WIRS: Resource Reservation and Traffic Regulation for QoS Support in Wireless Mesh Networks. GLOBECOM 2011: 1-5 - [c10]Lyes Khoukhi, Ali El Masri, Ahmad Sardouk, Abdelhakim Hafid, Dominique Gaïti:
Traffic adaptation in wireless mesh networks: Fuzzy-based model. IWCMC 2011: 41-46 - [c9]Majdi Mansouri, Lyes Khoukhi:
Secure quantized target tracking in wireless sensor networks. IWCMC 2011: 713-718 - [c8]Majdi Mansouri, Lyes Khoukhi, Hichem Snoussi, Cédric Richard:
Quantized variational filtering for target tracking and relay localization in sensor networks. IWCMC 2011: 1837-1842 - [c7]Ali El Masri, Ahmad Sardouk, Lyes Khoukhi, Dominique Gaïti:
A Preventive Traffic Adaptation Model for Wireless Mesh Networks Using Fuzzy Logic. NAS 2011: 73-81 - [c6]Lyes Khoukhi, Ali El Masri, Dominique Gaïti:
A Hybrid Stateless QoS Approach for Wireless Mobile Ad hoc Networks. NTMS 2011: 1-5 - [c5]Ali El Masri, Ahmad Sardouk, Lyes Khoukhi, Leïla Merghem-Boulahia, Dominique Gaïti, Rana Rahim-Amoud:
A Hybrid Mesh, Ad Hoc, and Sensor Network for Forest Fire Management. VTC Fall 2011: 1-5 - 2010
- [j2]Lyes Khoukhi, Soumaya Cherkaoui:
Intelligent QoS management for multimedia services support in wireless mobile ad hoc networks. Comput. Networks 54(10): 1692-1706 (2010)
2000 – 2009
- 2009
- [j1]Lyes Khoukhi, Soumaya Cherkaoui:
Toward Neural Networks Solution for Multimedia Support in Mobile Ad hoc Networks. J. Networks 4(2): 148-161 (2009) - [c4]Lyes Khoukhi, Soumaya Cherkaoui, Dominique Gaïti:
Managing rescue and relief operations using wireless mobile ad hoc technology, the best way? LCN 2009: 708-713 - 2005
- [c3]Lyes Khoukhi, Soumaya Cherkaoui:
A Fuzzy Petri Nets QoS Model for Wireless AD Hoc Networks. INTELLCOMM 2005: 147-156 - [c2]Lyes Khoukhi, Soumaya Cherkaoui:
FuzzyCCG: a fuzzy logic QoS approach for congestiosn control in wireless ad hoc networks. Q2SWinet 2005: 105-111 - 2004
- [c1]Lyes Khoukhi, Soumaya Cherkaoui:
Flexible QoS Routing Protocol for Mobile Ad Hoc Network. ICT 2004: 354-362
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint