{"id":1505,"date":"2023-07-12T01:11:47","date_gmt":"2023-07-12T01:11:47","guid":{"rendered":"https:\/\/lincslab.ca\/?page_id=1505"},"modified":"2026-04-27T00:21:24","modified_gmt":"2026-04-27T04:21:24","slug":"publications","status":"publish","type":"page","link":"https:\/\/lincslab.ca\/en\/publications\/","title":{"rendered":"Publications"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"1505\" class=\"elementor elementor-1505\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-xky4t4l elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"xky4t4l\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-fd69444\" data-id=\"fd69444\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-abcc2f2 elementor-widget elementor-widget-heading\" data-id=\"abcc2f2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-xl\"><b>Publications<\/b><\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-507a9c7 e-grid e-con-boxed e-con e-parent\" data-id=\"507a9c7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ee92fc5 elementor-widget elementor-widget-heading\" data-id=\"ee92fc5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><b>2020 - Present<\/b><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b16f4bf elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"b16f4bf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-61ded56 e-flex e-con-boxed e-con e-parent\" data-id=\"61ded56\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3765dd0 elementor-widget elementor-widget-heading\" data-id=\"3765dd0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><b>2026<\/b><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-93bbf98 e-con-full e-flex e-con e-parent\" data-id=\"93bbf98\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-846d6c4 elementor-widget elementor-widget-text-editor\" data-id=\"846d6c4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li><p>M. Rahim, I. Azam, S. Cherkaoui, <strong>\u201cRIS-Assisted Joint Resource Allocation for 6G FR3 IoT Networks,\u201d<\/strong> arXiv preprint arXiv:2604.02487, Apr.2026.<\/p><p>[<span style=\"color: #000000;\"><strong>\ud83d\udd13<\/strong><\/span>: <a href=\"https:\/\/arxiv.org\/pdf\/2604.02487\">arxiv<\/a> ]<\/p><\/li><li><p>D. H. Tashman and S. Cherkaoui, <strong>\u201c<\/strong><strong style=\"font-size: 16px;\">Adversarial Attacks in AI-Driven RAN Slicing: SLA Violations and Recovery<\/strong><span style=\"font-size: 16px;\">,<\/span><span style=\"font-size: 16px;\">\u201d <\/span><span style=\"font-size: 16px;\">arXiv preprint arXiv:2604.01049, Apr. 2026.<\/span><\/p><p>[<span style=\"color: #000000;\"><strong>\ud83d\udd13<\/strong><\/span>: <a href=\"https:\/\/arxiv.org\/pdf\/2604.01049\">arxiv<\/a> ]<\/p><\/li><li><p>A. Aaraba, S. Cherkaoui, O. Ahmad, and S. Wang, \u201c<strong>QuaRK: A quantum reservoir kernel for time series learning<\/strong>,\u201d <em data-start=\"165\" data-end=\"181\">arXiv preprint<\/em> arXiv:2602.13531, Feb. 2026.\u00a0<\/p><p>[<span style=\"color: #000000;\"><strong>\ud83d\udd13<\/strong><\/span>: <a href=\"https:\/\/arxiv.org\/pdf\/2602.13531\">arxiv<\/a> ]<\/p><\/li><li><p>M. C. Kirana, P. Keyela, F. Rostamian, D. H. Tashman, and S. Cherkaoui, \u201c<span style=\"text-decoration: underline;\"><strong><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/11370849\">ML-enabled open RAN: A comprehensive survey of architectures, challenges, and opportunities<\/a><\/strong><\/span>,\u201d <em data-start=\"224\" data-end=\"265\">IEEE Communications Surveys &amp; Tutorials<\/em>, Early Access, 2026, doi: 10.1109\/COMST.2026.3660649.<\/p><p>[<span style=\"color: #000000;\"><strong>\ud83d\udd13<\/strong><\/span>: <a href=\"https:\/\/arxiv.org\/abs\/2604.01239\">arxiv<\/a> ]<\/p><\/li><li><p>D. H. Tashman and S. Cherkaoui, \u201c<span style=\"text-decoration: underline;\"><strong><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/11371394\">Trustworthy AI-driven dynamic hybrid RIS: Joint optimization and reward poisoning-resilient control in cognitive MISO networks<\/a><\/strong><\/span>,\u201d <em data-start=\"219\" data-end=\"272\">IEEE Transactions on Network and Service Management<\/em>, Early Access, 2026, doi: 10.1109\/TNSM.2026.3660728.<\/p><p>[<span style=\"color: #000000;\"><strong>\ud83d\udd13<\/strong><\/span>: <a href=\"https:\/\/arxiv.org\/abs\/2604.01238\">arxiv<\/a> ]<\/p><\/li><li><p>M. Rahim and S. Cherkaoui, \u201c<strong>Dual-tier IRS-assisted mid-band 6G mobile networks: Robust beamforming and user association<\/strong>,\u201d <em data-start=\"183\" data-end=\"199\">arXiv preprint<\/em> arXiv:2602.00431, Jan. 2026, doi: 10.48550\/arXiv.2602.00431.<\/p><p>[<span style=\"color: #000000;\"><strong>\ud83d\udd13<\/strong><\/span>: <a href=\"https:\/\/arxiv.org\/pdf\/2602.00431\">arxiv<\/a> ]<\/p><\/li><li><p>M. Rahim and S. Cherkaoui, \u201c<strong>Reliable IoT communications in 6G non-terrestrial networks with dual RIS<\/strong>,\u201d <em data-start=\"200\" data-end=\"216\">arXiv preprint<\/em> arXiv:2602.00438, Jan. 2026, doi: 10.48550\/arXiv.2602.00438.<\/p><p>[<span style=\"color: #000000;\"><strong>\ud83d\udd13<\/strong><\/span>: <a href=\"https:\/\/arxiv.org\/pdf\/2602.00438\">arxiv<\/a> ]<\/p><\/li><li><p>M. Sarker and S. Cherkaoui, \u201c<strong>Priority-based bandwidth allocation in network slicing-enabled cell-free massive MIMO systems<\/strong>,\u201d <em data-start=\"179\" data-end=\"195\">arXiv preprint<\/em> arXiv:2601.12689, Jan. 2026.\u00a0<\/p><p>[<span style=\"color: #000000;\"><strong>\ud83d\udd13<\/strong><\/span>: <a href=\"https:\/\/arxiv.org\/pdf\/2601.12689\">arxiv<\/a> ]<\/p><\/li><li><p>M. Sarker and S. Cherkaoui, \u201c<strong>Network slicing resource management in uplink user-centric cell-free massive MIMO systems<\/strong>,\u201d <em data-start=\"181\" data-end=\"197\">arXiv preprint<\/em> arXiv:2601.12687, Jan. 2026.\u00a0<\/p><p>[<span style=\"color: #000000;\"><strong>\ud83d\udd13<\/strong><\/span>: <a href=\"https:\/\/arxiv.org\/pdf\/2601.12687\">arxiv<\/a> ]<\/p><\/li><li><p>S. Abdelghani and S. Cherkaoui, \u201c<strong>QFed: Parameter-Compact Quantum-Classical Federated Learning<\/strong>,\u201d <em data-start=\"156\" data-end=\"172\">arXiv preprint<\/em> arXiv:2601.09809, Jan. 2026.\u00a0<\/p><p>[<span style=\"color: #000000;\"><strong>\ud83d\udd13<\/strong><\/span>: <a href=\"https:\/\/arxiv.org\/pdf\/2601.09809\">arxiv<\/a> ]<\/p><\/li><li><p>Z. Yuan, Q. Li, X. Lin, T.-M. Gr\u00f8nl, and S. Cherkaoui, \u201c<a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/11333941\"><span style=\"text-decoration: underline;\"><strong>Edge AI for Internet of Robotic Things<\/strong><\/span><\/a>,\u201d <em data-start=\"214\" data-end=\"248\">IEEE Internet of Things Magazine<\/em>, vol. 9, no. 1, pp. 4\u20136, Jan. 2026.<\/p><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-94add3e e-flex e-con-boxed e-con e-parent\" data-id=\"94add3e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-22f8a5c elementor-widget elementor-widget-heading\" data-id=\"22f8a5c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><b>2025<\/b><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e8b924f e-con-full e-flex e-con e-parent\" data-id=\"e8b924f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8d578bd elementor-widget elementor-widget-text-editor\" data-id=\"8d578bd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>W. Hammami, S. Cherkaoui, J.-F. Laprade, O. Ahmad, and S. Wang, \u201c<strong>Quantum Gated Recurrent GAN with Gaussian Uncertainty for Network Anomaly Detection<\/strong>,\u201d <em data-start=\"231\" data-end=\"247\">arXiv preprint<\/em>, Oct. 2025. doi: 10.48550\/arXiv.2510.26487<br \/>[<span style=\"color: #000000;\"><strong>\ud83d\udd13<\/strong><\/span>: <a href=\"https:\/\/arxiv.org\/pdf\/2510.26487\">arXiv<\/a>]<\/li><li><p>W. Hamhoum, S. Cherkaoui, J.-F. Laprade, O. Ahmed, and S. Wang, \u201c<span style=\"text-decoration: underline;\"><strong><a href=\"https:\/\/arxiv.org\/abs\/2510.13634\">Multivariate Time Series Forecasting with Gate-Based Quantum Reservoir Computing on NISQ Hardware<\/a><\/strong><\/span>,\u201d <em data-start=\"265\" data-end=\"281\">arXiv preprint<\/em> arXiv:2510.13634, Oct. 2025.<\/p><p>[<span style=\"color: #000000;\"><strong>\ud83d\udd13<\/strong><\/span>: <a href=\"https:\/\/arxiv.org\/pdf\/2510.13634\">arXiv<\/a>, <a href=\"https:\/\/inspirehep.net\/literature\/3070154\">INSPIRE-HEP<\/a>]<strong>\u00a0<\/strong><\/p><\/li><li><p>K. M. Naguib, S. Cherkaoui, M. M. Elmessalawy, A. M. A. El-Haleem and I. I. Ibrahim, <span style=\"text-decoration: underline;\">&#8220;<strong><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/11178232\">DRL-Driven Edge-Aware Utility Optimization for Multi-Slice 6G Networks<\/a><\/strong><\/span>,&#8221; <em>in IEEE Networking Letters<\/em>, doi: 10.1109\/LNET.2025.3614549.<br \/>[<span style=\"color: #000000;\"><strong>\ud83d\udd13<\/strong><\/span>: <a href=\"https:\/\/lincslab.ca\/wp-content\/uploads\/2025\/12\/IEEE_Networking_Letter___updated.pdf\">pdf<\/a> ]<\/p><\/li><li><p>\u00a0D. H. Tashman and S. Cherkaoui, &#8220;<span style=\"text-decoration: underline;\"><strong><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/11059714\">Quantum-Aided Active User Detection for Energy-Efficient CD-NOMA in Cognitive Radio Networks<\/a><\/strong><\/span>,&#8221; <em>2025 International Wireless Communications and Mobile Computing (IWCMC), Abu Dhabi, United Arab Emirates<\/em>, 2025, pp. 1661-1666, doi: 10.1109\/IWCMC65282.2025.11059714.<br \/>[<span style=\"color: #000000;\"><strong>\ud83d\udd13<\/strong><\/span>: <a href=\"https:\/\/lincslab.ca\/wp-content\/uploads\/2025\/12\/Quantum_Aided_Active_User_Detection_for_Energy_Efficient_CD_NOMA_in_CRN_2025.pdf\">pdf<\/a> ]<\/p><\/li><li><p>W. Hammami, S. Cherkaoui and S. Wang, &#8220;<span style=\"text-decoration: underline;\"><strong><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/11059562\">Enhancing Network Anomaly Detection with Quantum GANs and Successive Data Injection for Multivariate Time Series<\/a><\/strong><\/span>,&#8221; <em>2025 International Wireless Communications and Mobile Computing (IWCMC), Abu Dhabi, United Arab Emirates, 2025<\/em>, pp. 1667-1672, doi: 10.1109\/IWCMC65282.2025.11059562.<\/p><p>[<span style=\"color: #000000;\"><strong>\ud83d\udd13<\/strong><\/span>: <a href=\"https:\/\/arxiv.org\/pdf\/2505.11631\">arXiv<\/a>]<strong>\u00a0<\/strong><\/p><\/li><li><p>D. H. Tashman and S. Cherkaoui, &#8220;<span style=\"text-decoration: underline;\"><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/10921906\"><strong>Dynamic Synergy: Leveraging RIS and Reinforcement Learning for Secure, Adaptive Underlay Cognitive Radio Networks<\/strong><\/a><\/span>,&#8221;\u00a0<em>2025 Global Information Infrastructure and Networking Symposium (GIIS), Dubai, United Arab Emirates, 2025<\/em>, pp. 1-6, doi: 10.1109\/GIIS64151.2025.10921906.<br \/>[<span style=\"color: #000000;\"><strong>\ud83d\udd13<\/strong><\/span>: <a href=\"https:\/\/lincslab.ca\/wp-content\/uploads\/2025\/12\/Dynamic_Synergy.pdf\">pdf<\/a> ]<\/p><\/li><li><p>P. Keyela and S. Cherkaoui, &#8220;<span style=\"text-decoration: underline;\"><strong><a href=\"https:\/\/ieeexplore.ieee.org\/document\/10921752\">Open RAN Slicing with Quantum Optimization<\/a><\/strong><\/span>,&#8221; <em>2025 Global Information Infrastructure and Networking Symposium (GIIS), Dubai, United Arab Emirates, 2025<\/em>, pp. 1-6, doi: 10.1109\/GIIS64151.2025.10921752.<\/p><p>[<span style=\"color: #000000;\"><strong>\ud83d\udd13<\/strong><\/span>: <a href=\"https:\/\/arxiv.org\/pdf\/2502.00142\">arXiv<\/a>]<strong>\u00a0<\/strong><\/p><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f1b8c0c e-flex e-con-boxed e-con e-parent\" data-id=\"f1b8c0c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-559e0ae elementor-widget elementor-widget-heading\" data-id=\"559e0ae\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><b>2024<\/b><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c627cd6 e-con-full e-flex e-con e-parent\" data-id=\"c627cd6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c020fc8 elementor-widget elementor-widget-text-editor\" data-id=\"c020fc8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li><p>B. Nour and S. Cherkaoui, &#8220;<span style=\"text-decoration: underline;\"><strong><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/10901209\">Matching-based Service Offloading for Compute-less Driven IoT Networks<\/a><\/strong><\/span>,&#8221;\u00a0<em>GLOBECOM 2024 &#8211; 2024 IEEE Global Communications Conference<\/em>, Cape Town, South Africa, 2024, pp. 3122-3127, doi: 10.1109\/GLOBECOM52923.2024.10901209. <br \/>[<strong style=\"font-style: inherit;\">\ud83d\udd13<\/strong><span style=\"font-style: inherit; font-weight: inherit;\">: <\/span><a style=\"font-style: inherit; font-weight: inherit; background-color: #ffffff;\" href=\"https:\/\/arxiv.org\/pdf\/2201.04195\">arXiv<\/a><span style=\"font-style: inherit; font-weight: inherit;\">]<\/span><\/p><\/li><\/ul><ul><li><p>A. Vieloszynski\u00a0<em>et al<\/em>., &#8220;<strong><span style=\"text-decoration: underline;\"><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/10811384\">LatentQGAN: A Hybrid QGAN with Classical Convolutional Autoencoder<\/a><\/span><\/strong>,&#8221;\u00a0<em>2024 IEEE 10th World Forum on Internet of Things (WF-IoT)<\/em>, Ottawa, ON, Canada, 2024, pp. 1-7, doi: 10.1109\/WF-IoT62078.2024.10811384.<br \/>[<strong>\ud83d\udd13<\/strong>: <a href=\"https:\/\/arxiv.org\/pdf\/2409.14622?\">arXiv<\/a>]<\/p><\/li><li><p>A. Aaraba\u00a0<em>et al<\/em>., &#8220;<span style=\"text-decoration: underline;\"><strong><a href=\"https:\/\/ieeexplore.ieee.org\/document\/10821473\">QuaCK-TSF: Quantum-Classical Kernelized Time Series Forecasting<\/a><\/strong><\/span>,&#8221;\u00a0<em>2024 IEEE International Conference on Quantum Computing and Engineering (QCE)<\/em>, Montreal, QC, Canada, 2024, pp. 1628-1638, doi: 10.1109\/QCE60285.2024.00190.<br \/>[<strong>\ud83d\udd13<\/strong>: <a href=\"https:\/\/arxiv.org\/abs\/2408.12007\">arXiv<\/a>]<\/p><\/li><li><p><span style=\"color: #000000;\">B. Kalfon, S. Cherkaoui, J.-F. Laprade, O. Ahmad, and S. Wang, &#8220;<strong><span style=\"text-decoration: underline;\"><a href=\"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/full\/10.1049\/qtc2.12088\">Successive data injection in conditional quantum GAN applied to time series anomaly detection<\/a><\/span>,<\/strong>&#8221; <em>IET Quantum Communication<\/em>, vol. 5, no. 3, pp. 269\u2013281, 2024, doi: 10.1049\/qtc2.12088.<br \/>[<strong>\ud83d\udd13<\/strong>: <a href=\"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/full\/10.1049\/qtc2.12088\">IET<\/a>,\u00a0<a href=\"https:\/\/arxiv.org\/abs\/2310.05307\">arXiv<\/a>]<\/span><\/p><\/li><li><p>Abouaomar, A., Filali, A., Ta\u00efk, A., &amp; Cherkaoui, S. (2024). &#8220;<a href=\"https:\/\/www.taylorfrancis.com\/chapters\/edit\/10.1201\/9781003284871-4\/machine-learning-applications-cr-iov-amine-abouaomar-abderrahime-filali-afaf-taik-soumaya-cherkaoui\"><strong><span style=\"text-decoration: underline;\">Machine Learning Applications in CR-IoV<\/span><\/strong><\/a>&#8220;. In Bukhari, S. H. R., Rehan, M. M., &amp; Rehmani, M. H. (eds.), <em>Cognitive Radio-based Internet of Vehicles<\/em>\u00a0(pp. 21-49)<\/p><\/li><li><p><span style=\"color: #000000;\">\u00a0D. H. Tashman, S. Cherkaoui and W. Hamouda, &#8220;<span style=\"text-decoration: underline;\"><strong><a href=\"https:\/\/ieeexplore.ieee.org\/document\/10646359\">Optimizing Cognitive Networks: Reinforcement Learning Meets Energy Harvesting Over Cascaded Channels<\/a><\/strong><\/span>,&#8221; in <em>IEEE Systems Journal<\/em>, doi: 10.1109\/JSYST.2024.3442017.<br \/>[<strong>\ud83d\udd13<\/strong>: <a href=\"https:\/\/arxiv.org\/pdf\/2507.06981\">arXiv<\/a>]<\/span><\/p><\/li><li><p><span style=\"color: #000000;\">Y. Baseri, A. Hafid, M. D. Firoozjaei, S. Cherkaoui, and I. Ray, \u201c<a href=\"https:\/\/www.sciencedirect.com\/science\/article\/pii\/S2214212624001261\"><strong><span style=\"text-decoration: underline;\">Statistical privacy protection for secure data access control in cloud<\/span><\/strong><\/a>,\u201d <em>Journal of Information Security and Applications,\u00a0<\/em><br \/>vol. 84, Art. no. 103823, Aug. 2024, doi: 10.1016\/j.jisa.2024.103823.\u00a0<br \/><\/span>[<span style=\"font-style: inherit; font-weight: bold;\">\ud83d\udd13<\/span><span style=\"font-style: inherit; font-weight: inherit;\">:<\/span><span style=\"font-style: inherit; font-weight: inherit; color: #000000;\">\u00a0<a href=\"https:\/\/lincslab.ca\/wp-content\/uploads\/2025\/12\/Simulation_and_Performance.pdf\" target=\"_blank\" rel=\"noopener\">pdf<\/a>]<\/span><\/p><\/li><li><p>W. Hamhoum and S. Cherkaoui, <strong>\u201c<span style=\"text-decoration: underline;\"><a href=\"https:\/\/arxiv.org\/abs\/2407.18462\">MistralBSM: Leveraging Mistral-7B for Vehicular Networks Misbehavior Detection<\/a><\/span><\/strong>,\u201d <em data-start=\"221\" data-end=\"254\">arXiv preprint arXiv:2407.18462<\/em>, Jul. 2024.<br \/>[<strong>\ud83d\udd13<\/strong>: <a href=\"https:\/\/arxiv.org\/abs\/2407.18462\">arXiv<\/a>]<\/p><\/li><li><p>D. H. Tashman and S. Cherkaoui, &#8220;<span style=\"text-decoration: underline;\"><strong><a href=\"https:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?tp=&amp;arnumber=10794361\">Securing Cognitive IoT Networks: Reinforcement Learning for Adaptive Physical Layer Defense<\/a><\/strong><\/span>,&#8221;<em> 2024 6th International Conference on Communications, Signal Processing, and their Applications (ICCSPA), Istanbul, Turkiye, 2024<\/em>, pp. 1-6, doi: 10.1109\/ICCSPA61559.2024.10794361. <br \/>[<strong>\ud83d\udd13<\/strong>: <a href=\"https:\/\/lincslab.ca\/wp-content\/uploads\/2025\/12\/Securing_Cognitive_IoT_Networks__2024.pdf\">pdf<\/a> ]<\/p><\/li><li><p><span style=\"color: #000000;\">W. Hamhoum, H. Lakhdar, and S. Cherkaoui, &#8220;<strong><span style=\"text-decoration: underline;\"><a href=\"https:\/\/ieeexplore.ieee.org\/document\/10622553\">Fortifying Open RAN Security with Zero Trust Architecture and Transformers<\/a><\/span>,<\/strong>&#8220;<em>ICC 2024 &#8211; IEEE International Conference on Communications<\/em>, Denver, CO, USA, 2024, pp. 2216-2221, doi: 10.1109\/ICC51166.2024.10622553.<br \/>[<strong>\ud83d\udd13<\/strong>: <a href=\"https:\/\/lincslab.ca\/wp-content\/uploads\/2025\/12\/Fortifying-.pdf\">pdf<\/a> ]<\/span><\/p><\/li><li><p><span style=\"color: #000000;\">D. H. Tashman, S. Cherkaoui and W. Hamouda, &#8220;<span style=\"text-decoration: underline;\"><strong><a href=\"https:\/\/ieeexplore.ieee.org\/document\/10622458\">Federated Learning-based MARL for Strengthening Physical-Layer Security in B5G Networks<\/a><\/strong><\/span>,&#8221;<em> ICC 2024 &#8211; IEEE International Conference on Communications, Denver, CO, USA, 2024<\/em>, pp. 293-298, doi: 10.1109\/ICC51166.2024.10622458.<br \/>[<strong>\ud83d\udd13<\/strong>: <a href=\"https:\/\/arxiv.org\/pdf\/2507.06997\">arXiv<\/a> ]<\/span><\/p><\/li><li><p>C. Qu\u00e9men\u00e9ur and S. Cherkaoui, \u201c<span style=\"text-decoration: underline;\"><a href=\"https:\/\/arxiv.org\/abs\/2406.03611\"><strong>FedPylot: Navigating Federated Learning for Real-Time Object Detection in Internet of Vehicles<\/strong><\/a><\/span>,\u201d <em data-start=\"211\" data-end=\"244\">arXiv preprint arXiv:2406.03611<\/em>, Jun. 2024.<br \/>[<strong>\ud83d\udd13<\/strong>: <a href=\"https:\/\/arxiv.org\/pdf\/2406.03611\">arXiv<\/a>, <a href=\"https:\/\/github.com\/CyprienQuemeneur\/fedpylot\">GitHub<\/a>]<\/p><\/li><li><p>D. H. Tashman and S. Cherkaoui, &#8220;<span style=\"text-decoration: underline;\"><strong><a href=\"https:\/\/ieeexplore.ieee.org\/document\/10592377\">Securing Next-Generation Networks against Eavesdroppers: FL-Enabled DRL Approach<\/a><\/strong><\/span>,&#8221; <em>2024 International Wireless Communications and Mobile Computing (IWCMC), Ayia Napa, Cyprus, 2024<\/em>, pp. 1643-1648, doi: 10.1109\/IWCMC61514.2024.10592377.<br \/>[<strong>\ud83d\udd13<\/strong>: <a href=\"https:\/\/lincslab.ca\/wp-content\/uploads\/2025\/12\/Securing_Next_Generation_Networks_against_Eavesdroppers__FL_Enabled_DRL_Approach-2024.pdf\">pdf<\/a> ]<\/p><\/li><li><p>D. H. Tashman, S. Cherkaoui and W. Hamouda, &#8220;<span style=\"text-decoration: underline;\"><strong><a href=\"https:\/\/ieeexplore.ieee.org\/document\/10466378\">Maximizing Reliability in Overlay Radio Networks With Time Switching and Power Splitting Energy Harvesting<\/a><\/strong><\/span>,&#8221; in <em>IEEE Transactions on Cognitive Communications and Networking<\/em>, vol. 10, no. 4, pp. 1307-1316, Aug. 2024, doi: 10.1109\/TCCN.2024.3375500.<br \/>[<strong>\ud83d\udd13<\/strong>: <a href=\"https:\/\/arxiv.org\/pdf\/2507.06983\">arXiv<\/a>]<span style=\"color: #000000;\"><br \/><\/span><\/p><\/li><li><p>A. Filali, Z. Mlika and S. Cherkaoui, &#8220;<a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/10433640\"><span style=\"text-decoration: underline;\"><strong>Open RAN Slicing for MVNOs With Deep Reinforcement Learning<\/strong><\/span><\/a>,&#8221; in\u00a0<em>IEEE Internet of Things Journal<\/em>, vol. 11, no. 10, pp. 18711-18725, 15 May15, 2024, doi: 10.1109\/JIOT.2024.3365665.<br \/>[<strong>\ud83d\udd13<\/strong>: <a href=\"https:\/\/lincslab.ca\/wp-content\/uploads\/2025\/12\/IEEE_IoT__copyOpen_Radio_Access_Network_Slicing_Among_MVNOs_with_Deep_Reinforcement_Learning.pdf\">pdf<\/a>]<\/p><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-00e79cd e-flex e-con-boxed e-con e-parent\" data-id=\"00e79cd\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4233fbe elementor-widget elementor-widget-heading\" data-id=\"4233fbe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><b>2023<\/b><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-afcd4ec e-con-full e-flex e-con e-child\" data-id=\"afcd4ec\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-78fd110 elementor-widget elementor-widget-text-editor\" data-id=\"78fd110\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li><p><span style=\"color: #000000;\">D. H. Tashman, S. Cherkaoui, W. Hamouda and S. M. Senouci, &#8220;<span style=\"text-decoration: underline;\"><strong><a href=\"https:\/\/ieeexplore.ieee.org\/document\/10464644\">Securing Overlay Cognitive Radio Networks Over Cascaded Channels with Energy Harvesting<\/a><\/strong><\/span>,&#8221; <em>2023 IEEE Globecom Workshops (GC Wkshps), Kuala Lumpur, Malaysia, 2023<\/em>, pp. 620-625, doi: 10.1109\/GCWkshps58843.2023.10464644.<br \/>[<strong>\ud83d\udd13<\/strong>: <a href=\"https:\/\/lincslab.ca\/wp-content\/uploads\/2025\/12\/GlobeCom_2023.pdf\">pdf<\/a> ]<\/span><\/p><\/li><li><p>N. Charef, M. Abdelhafidh, A. Ben Mnaouer, K. Andersson and S. Cherkaoui, &#8220;<strong><span style=\"text-decoration: underline;\"><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/10437207\">RL-Based Adaptive Duty Cycle Scheduling in WSN-Based IoT Nets<\/a><\/span><\/strong>,&#8221;\u00a0<em>GLOBECOM 2023 &#8211; 2023 IEEE Global Communications Conference<\/em>, Kuala Lumpur, Malaysia, 2023, pp. 3777-3782, doi: 10.1109\/GLOBECOM54140.2023.10437207.<\/p><\/li><li><p>Y. Tao, J. Wu, X. Lin, S. Mumtaz and S. Cherkaoui, &#8220;<strong><span style=\"text-decoration: underline;\"><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/10437455\">Digital Twin and DRL-Driven Semantic Dissemination for 6G Autonomous Driving Service<\/a><\/span><\/strong>,&#8221;\u00a0<em>GLOBECOM 2023 &#8211; 2023 IEEE Global Communications Conference<\/em>, Kuala Lumpur, Malaysia, 2023, pp. 2075-2080, doi: 10.1109\/GLOBECOM54140.2023.10437455.<br \/><span style=\"color: #000000;\">[<strong>\ud83d\udd13<\/strong>:<\/span> <a href=\"https:\/\/drive.google.com\/file\/d\/1RD6LTkWoB-NWWkm2tQRKZoLbKy4FZ_54\/view\">PDF<\/a> ]<\/p><\/li><li><p>H. Moudoud, W. Hamhoum and S. Cherkaoui, &#8220;<span style=\"text-decoration: underline;\"><strong><a href=\"https:\/\/ieeexplore.ieee.org\/document\/10437829\">Strengthening Open Radio Access Networks: Advancing Safeguards Through ZTA and Deep Learning<\/a><\/strong><\/span>,&#8221;\u00a0<em>GLOBECOM 2023 &#8211; 2023 IEEE Global Communications Conference<\/em>, Kuala Lumpur, Malaysia, 2023, pp. 80-85, doi: 10.1109\/GLOBECOM54140.2023.10437829.<\/p><p>[\u00a0<a href=\"https:\/\/ieeexplore.ieee.org\/document\/10243611\">IEEE<\/a>, <a href=\"https:\/\/publications.polymtl.ca\/56517\/1\/2023_Moudoud_Empowering_Security_Trust_5G_Beyond.pdf\">PolyPublie <\/a>] [<strong>\ud83d\udd13<\/strong>: <a href=\"https:\/\/lincslab.ca\/wp-content\/uploads\/2025\/12\/Strengthening.pdf\">pdf<\/a>]<\/p><\/li><li><p>H. Moudoud and S. Cherkaoui, &#8220;<a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/10437043\"><span style=\"text-decoration: underline;\"><strong>Enhancing Open RAN Security with Zero Trust and Machine Learning<\/strong><\/span><\/a>,&#8221;\u00a0<em>GLOBECOM 2023 &#8211; 2023 IEEE Global Communications Conference<\/em>, Kuala Lumpur, Malaysia, 2023, pp. 2772-2777, doi: 10.1109\/GLOBECOM54140.2023.10437043.<\/p><p>[<strong>\ud83d\udd13<\/strong>: <a href=\"https:\/\/lincslab.ca\/wp-content\/uploads\/2025\/12\/Enhancing.pdf\">pdf<\/a> ]<\/p><\/li><li><p>A. Saadallah, P. Brunet, I. El-Korbi, S. -M. Senouci and S. Cherkaoui, &#8220;<strong><span style=\"text-decoration: underline;\"><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/10436720\">Leveraging Graph Theory for Efficient Cache Policy Design in\u00a0<span id=\"MathJax-Element-93-Frame\" class=\"MathJax\" tabindex=\"0\"><span id=\"MathJax-Span-930\" class=\"math\"><span id=\"MathJax-Span-931\" class=\"mrow\"><span id=\"MathJax-Span-932\" class=\"msubsup\"><span id=\"MathJax-Span-933\" class=\"mn\">360<\/span><span id=\"MathJax-Span-934\" class=\"texatom\"><span id=\"MathJax-Span-935\" class=\"mrow\"><span id=\"MathJax-Span-936\" class=\"mo\">\u2218<\/span><\/span><\/span><\/span><\/span><\/span><\/span>\u00a0Video Streaming<\/a><\/span><\/strong>,&#8221;\u00a0<em>GLOBECOM 2023 &#8211; 2023 IEEE Global Communications Conference<\/em>, Kuala Lumpur, Malaysia, 2023, pp. 976-981, doi: 10.1109\/GLOBECOM54140.2023.10436720.<\/p><\/li><li><p>W. Rafique, A. S. Hafid, and S. Cherkaoui, \u201c<span style=\"text-decoration: underline;\"><strong><a href=\"https:\/\/www.sciencedirect.com\/science\/article\/abs\/pii\/S1389128623004115\">SoftCaching: A framework for caching node selection and routing in Software-Defined Information Centric Internet of Things<\/a><\/strong><\/span>,\u201d <em data-start=\"479\" data-end=\"498\">Computer Networks<\/em>, vol. 235, Art. no. 109966, Nov. 2023, doi: 10.1016\/j.comnet.2023.109966. <br \/><span style=\"color: #000000;\">[<strong>\ud83d\udd13<\/strong>:<\/span> <a href=\"https:\/\/drive.google.com\/file\/d\/1Xk_05erSsjOEiQVHA8fDUYoC3PlMC_E7\/view\">PDF<\/a> ]<\/p><\/li><li><p>S. Cherkaoui, \u201c<strong><span style=\"text-decoration: underline;\"><a href=\"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3616388.3625543\">Quantum Leap: Exploring the Potential of Quantum Machine Learning for Communication Networks<\/a><\/span><\/strong>,\u201d in <em data-start=\"113\" data-end=\"216\">Proc. Int\u2019l ACM Conf. on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM \u201923)<\/em>. New York, NY, USA: ACM, 2023, doi: 10.1145\/3616388.3625543.<\/p><\/li><li><p>S. Mumtaz\u00a0<em>et al<\/em>., &#8220;<strong><span style=\"text-decoration: underline;\"><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/10298011\">Guest Editorial Digital Twins for Mobile Networks\u2014Part I<\/a><\/span><\/strong>,&#8221; in\u00a0<em>IEEE Journal on Selected Areas in Communications<\/em>, vol. 41, no. 10, pp. 3001-3007, Oct. 2023, doi: 10.1109\/JSAC.2023.3313016.<br \/><span style=\"color: #000000;\">[<strong>\ud83d\udd13<\/strong>:<\/span> <a href=\"https:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?arnumber=10298011\">IEEE PDF<\/a> ]<\/p><\/li><li><p>S. Mumtaz\u00a0<em>et al<\/em>., &#8220;<strong><span style=\"text-decoration: underline;\"><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/10297965\">Guest Editorial Digital Twins for Mobile Networks\u2014Part II,<\/a><\/span><\/strong>&#8221; in\u00a0<em>IEEE Journal on Selected Areas in Communications<\/em>, vol. 41, no. 11, pp. 3349-3354, Nov. 2023, doi: 10.1109\/JSAC.2023.3313017.<br \/><span style=\"color: #000000;\">[<strong>\ud83d\udd13<\/strong>:<\/span> <a href=\"https:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?arnumber=10297965\">IEEE PDF<\/a> ]<\/p><\/li><li><p>A. Taik, A. Abouaomar, and S. Cherkaoui, \u201c<span style=\"text-decoration: underline;\"><strong><a href=\"https:\/\/www.taylorfrancis.com\/chapters\/edit\/10.1201\/9781003230427-3\/green-federated-learning-based-models-protocols-afaf-taik-amine-abouaomar-soumaya-cherkaoui\">Green federated learning-based models and protocols<\/a><\/strong><\/span>,\u201d in <em data-start=\"99\" data-end=\"167\">Green Machine Learning Protocols for Future Communication Networks<\/em>. CRC Press, 2023, pp. 63\u2013102.<\/p><\/li><li><p>H. Moudoud, Z. Mlika, S. Cherkaoui, and L. Khoukhi, \u201c<strong><span style=\"text-decoration: underline;\"><a href=\"https:\/\/www.taylorfrancis.com\/chapters\/edit\/10.1201\/9781003230427-6\/green-machine-learning-internet-things-hajar-moudoud-zoubeir-mlika-soumaya-cherkaoui-lyes-khoukhi\">Green machine learning for Internet-of-Things: Current solutions and future challenges<\/a><\/span><\/strong>,\u201d in <em data-start=\"164\" data-end=\"232\">Green Machine Learning Protocols for Future Communication Networks<\/em>. Boca Raton, FL, USA: CRC Press, 2023, pp. 161\u2013175.<br \/><span style=\"color: #000000;\">[<strong>\ud83d\udd13<\/strong>:<\/span> <a href=\"https:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?arnumber=10243611\">IEEE PDF<\/a> ]<\/p><\/li><li><p>H. Moudoud and S. Cherkaoui, &#8220;<strong><span style=\"text-decoration: underline;\"><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/10243611\">Empowering Security and Trust in 5G and Beyond: A Deep Reinforcement Learning Approach<\/a><\/span><\/strong>,&#8221; in\u00a0<em>IEEE Open Journal of the Communications Society<\/em>, vol. 4, pp. 2410-2420, 2023, doi: 10.1109\/OJCOMS.2023.3313352.\u00a0<\/p><\/li><li><p><span style=\"color: #000000;\">Z. Mlika and S. Cherkaoui, J.F. Laprade, S. Corbeil Letourneau, \u201c<span style=\"text-decoration: underline;\"><a href=\"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/full\/10.1049\/qtc2.12061\"><strong>User trajectory prediction in mobile wireless networks using quantum reservoir computing<\/strong><\/a><\/span>\u201d, <em>IET Quantum Communication. Jan 2023, doi: 10.1049\/qtc2.12061.<\/em><br \/>[<strong>\ud83d\udd13<\/strong>: <a href=\"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/full\/10.1049\/qtc2.12061\">IET<\/a>, <a href=\"https:\/\/arxiv.org\/abs\/2301.08796\">arXiv<\/a> ]<\/span><\/p><\/li><li><p><span style=\"color: #000000;\">A. Allouis, A. A. Hamza, I. Dayoub and S. Cherkaoui, \u201c<span style=\"text-decoration: underline;\"><a href=\"https:\/\/ieeexplore.ieee.org\/document\/10160115\"><strong>Maximum Sum Rate of MCM-NOMA in Future Vehicular Sensor Networks<\/strong><\/a><\/span>,\u201d<em>in\u00a0IEEE Sensors Letters, vol. 7, no. 7, pp. 1-4, July 2023, Art no. 7500504, doi: 10.1109\/LSENS.2023.3288938.<\/em><br \/>[<strong>\ud83d\udd13<\/strong>: <a href=\"https:\/\/uphf.hal.science\/hal-04150407v1\">HAL UPHF<\/a>]<\/span><\/p><\/li><li><p><span style=\"color: #000000;\">D. H. Tashman, S. Cherkaoui and W. Hamouda, <a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/10182973\">\u201c<\/a><strong><span style=\"text-decoration: underline;\"><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/10182973\">Performance Optimization of Energy-Harvesting Underlay Cognitive Radio Networks Using Reinforcement Learning<\/a><\/span>,<\/strong>\u201d <em>2023 International Wireless Communications and Mobile Computing (IWCMC), Marrakesh, Morocco, 2023, pp. 1160-1165, doi: 10.1109\/IWCMC58020.2023.1018<\/em>2973.<br \/>[<strong>\ud83d\udd13<\/strong>: <a href=\"https:\/\/arxiv.org\/pdf\/2505.14581\">arXiv<\/a>]<\/span><\/p><\/li><li><p>A. Azarnoush, O. A. Dambri, E. \u00dc. Karatop, D. Makrakis and S. Cherkaoui, &#8220;<strong><span style=\"text-decoration: underline;\"><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/10078300\">Simulation and Performance Evaluation of a Bio-Inspired Nanogenerator for Medical Applications<\/a><\/span><\/strong>,&#8221; in\u00a0<em>IEEE Transactions on Biomedical Engineering<\/em>, vol. 70, no. 9, pp. 2616-2623, Sept. 2023, doi: 10.1109\/TBME.2023.3260200. <br \/>[<span style=\"color: #000000;\"><strong>\ud83d\udd13<\/strong>:<\/span> <a href=\"https:\/\/lincslab.ca\/wp-content\/uploads\/2025\/12\/Simulation_and_Performance.pdf\">PDF<\/a> ]<\/p><\/li><li><p><span style=\"color: #000000;\">A. Filali, B. Nour, S. Cherkaoui and A. Kobbane, \u201c<\/span><span style=\"text-decoration: underline;\"><strong><a href=\"https:\/\/ieeexplore.ieee.org\/document\/10078092\">Communication and Computation O-RAN Resource Slicing for URLLC Services Using Deep Reinforcement Learning<\/a><\/strong><\/span>,<span style=\"color: #000000;\">\u201d <em>in IEEE Communications Standards Magazine, vol. 7, no. 1, pp. 66-73, March 2023, doi: 10.1109\/MCOMSTD.0002.2100078.<\/em><br \/>[<strong>\ud83d\udd13<\/strong>: <a href=\"https:\/\/arxiv.org\/pdf\/2202.06439\">arXiv<\/a>\u00a0 ]<\/span><\/p><\/li><\/ul><ul><li><p><span style=\"color: #000000;\">H. Moudoud and S. Cherkaoui, \u201c<strong><span style=\"text-decoration: underline;\"><a href=\"https:\/\/ieeexplore.ieee.org\/document\/10182956\">Federated Learning Meets Blockchain to Secure the Metaverse<\/a><\/span>,<\/strong>\u201d<em>\u00a02023 International Wireless Communications and Mobile Computing (IWCMC), Marrakesh, Morocco, 2023, pp. 339-344, doi: 10.1109\/IWCMC58020.2023.10182956.<\/em><\/span><\/p><\/li><li><p><span style=\"color: #000000;\">A. Filali, B. Nour, S. Cherkaoui and A. Kobbane, \u201c<strong><span style=\"text-decoration: underline;\"><a href=\"https:\/\/ieeexplore.ieee.org\/document\/10078092\">Communication and Computation O-RAN Resource Slicing for URLLC Services Using Deep Reinforcement Learning<\/a><\/span>,<\/strong>\u201d in IEEE Communications Standards Magazine, vol. 7, no. 1, pp. 66-73, March 2023, doi: 10.1109\/MCOMSTD.0002.2100078.<br \/>[<strong>\ud83d\udd13<\/strong>: <a href=\"https:\/\/arxiv.org\/abs\/2202.06439\">arXiv<\/a> ]<\/span><\/p><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7d5c332 e-flex e-con-boxed e-con e-parent\" data-id=\"7d5c332\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8e3a212 elementor-widget elementor-widget-heading\" data-id=\"8e3a212\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><b>2022<\/b><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2a23ecd e-con-full e-flex e-con e-child\" data-id=\"2a23ecd\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-52c5cb3 elementor-widget elementor-widget-text-editor\" data-id=\"52c5cb3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li><p><span style=\"color: #000000;\">A. Abouaomar, A. Taik, A. Filali and S. Cherkaoui, \u201c<span style=\"text-decoration: underline;\"><strong><a href=\"https:\/\/ieeexplore.ieee.org\/document\/9999295\">Federated Deep Reinforcement Learning for Open RAN Slicing in 6G Networks<\/a><\/strong><\/span>,\u201d<em> in IEEE Communications Magazine, vol. 61, no. 2, pp. 126-132, February 2023, doi: 10.1109\/MCOM.007.2200555.<\/em><br \/>[<strong>\ud83d\udd13<\/strong>: <a href=\"https:\/\/arxiv.org\/pdf\/2206.11328\">arXiv<\/a> ]<\/span><\/p><\/li><li><p>R. Wang\u00a0<em>et al<\/em>., &#8220;<strong><span style=\"text-decoration: underline;\"><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/10000770\">Collaborative Computation Offloading and Resource Allocation in Satellite Edge Computing<\/a><\/span><\/strong>,&#8221;\u00a0<em>GLOBECOM 2022 &#8211; 2022 IEEE Global Communications Conference<\/em>, Rio de Janeiro, Brazil, 2022, pp. 5625-5630, doi: 10.1109\/GLOBECOM48099.2022.10000770.<br \/>[ <span style=\"color: #000000;\"><strong>\ud83d\udd13<\/strong>:<\/span> <a href=\"https:\/\/drive.google.com\/file\/d\/1B2lm-pUfxp2Q_yMA6HDUcaHNgesyXMga\/view\">PDF<\/a> ]<\/p><\/li><li><p><span style=\"color: #000000;\">A. Triwinarko, S. Cherkaoui and I. Dayoub, \u201c<strong><span style=\"text-decoration: underline;\"><a href=\"https:\/\/ieeexplore.ieee.org\/document\/9975999\">Performance of PHY\/MAC Cross-Layer Design for Next-Generation V2X Applications<\/a><\/span>,<\/strong>\u201d <em>2022 IEEE International Conference on Internet of Things and Intelligence Systems (IoTaIS), Indonesia, 2022, pp. 98-104,<\/em> doi: 10.1109\/IoTaIS56727.2022.9975999.<br \/>[<strong>\ud83d\udd13<\/strong>: <a href=\"https:\/\/hal.science\/hal-05287253v1\/file\/PHY_MAC_Cross-Layer_Design_using_NOMA_for_Next_Generation_C-V2X.pdf\">HAL UPHF<\/a>]<\/span><\/p><\/li><li><p><span style=\"color: #000000;\">H. Moudoud and S. Cherkaoui, \u201c<span style=\"text-decoration: underline;\"><a href=\"https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1570870523001841?via%3Dihub\"><strong>Multi-tasking federated learning meets Blockchain to foster Trust and Security in the Metaverse,<\/strong><\/a><\/span>\u201d <em data-start=\"273\" data-end=\"290\">Ad Hoc Networks<\/em>, vol. 150, p. 103264, 2023, doi: 10.1016\/j.adhoc.2023.103264.<br \/>[<strong>\ud83d\udd13<\/strong>: <a href=\"https:\/\/pdf.sciencedirectassets.com\/272922\/1-s2.0-S1570870523X00109\/1-s2.0-S1570870523001841\/main.pdf?X-Amz-Security-Token=IQoJb3JpZ2luX2VjEPn%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FwEaCXVzLWVhc3QtMSJIMEYCIQDe1TEzVOQ9fpBO3L1T9H64n9JfU%2FeecYAALAYPuKvD2AIhAMMvOwtPa6%2BbBK2q%2BSTgqiSM3Xiu7lfuNo6LjZHEYp54KrsFCJH%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FwEQBRoMMDU5MDAzNTQ2ODY1IgxcWqI7tVIt1%2FGeMjsqjwWJVXCwt9XcS%2FgMzMlftGAGqAsFXLtaSIuhRIe69voHNOjk2Vt%2B5xmu%2BkyTNKnli0lBg9wspjY2fZ7NHv9sxiAk6viz%2BQj0oKjQoiMkAu%2FugaQHInznW5dEALPnUTOAiXw%2BIexi2WyLtOWkwhRVkROU3kimiKUpQZmNNt9AH91zdelKUEDOqDH6ApI5%2BLdnHUyls0371pLrDfW8rfXz%2BbpdLvEgc8BCw3nPntL527Ui7mdcZA9jEoq21%2F5Yjo%2FBkNaHfoCGtzi6f0vrlHIUT08c0EzPHZIbwVmJPDjiKT12YeILFlaKbLKD%2F3I2lF6F2wjTfWvkYMKwRA1V6pOMBZwzydM9nckvRrN%2Bwd8KSO53TwZDe10Efnky653Pqc530C2%2FELV0%2BCFbG0X%2BsqtDGVCqCHcPjo4G1xhiIzFOe0Lby23mVQA%2FTZWDMsYuz3kqHb%2BDgIwOQ%2FW7tCha2HOULm0cOkizpp2p9ISfDLYdZkqAutCMJfFvohx8lD0%2FHnes%2Fu3EAI4Y1szv9Rt2YzfLMDSFfITdNzU5CptuFzp3WnRQ3iU954TprLpO%2Fu9RcTGVbsBcYcU%2Fv7%2B5Wxrxq%2Ffy1CPJL5qO0ZqyeUturvCWPLQGTqmRc6WP%2BI91cISqIVrhWGzfg78hb6IdF8hLq3SpKYhjN3nIizSzssDlBCnDlIl6eUBboagtGcsIouDKrbCKYGOr3PpDU5R80uNHC00f2rO9PSHkIMLBN2rWhab8N%2Bxo520kRAhcT%2BwifzzC3tHO%2FpTUGmq4uXNARR0bxt9WCW%2FvGgRFjoaxluduqQh7HiHZSUXmbti2gPmSGE1Hle4RtQVjVhrRaC0sq68JyDYc12QDM9NvSJxtCSRaHj4x4sGVMJrUj8cGOrABfJSHhd0vhS837vJ6nxfp1DZHfqjEoCvRn0ZXU9ArhTyR2Qv1QUVK%2BjBqSWM0l%2FvLrHV9Z3mITCGVhNlU%2FDDg3zqaTWP93KsJAbt8wqIt5dE2TRf6AEmVPmY4y3ws%2B2UcJkRQNQ1kMdkIVdXjP%2BF2VJgyKsxSA1lj2P5EMZcF8hMT5FjKIWeP0iLiBfTcQLrLsKJuKOnW7CmuXyaVa9BMQBm%2BEDOMvPH8nS7P%2BOsmnJU%3D&amp;X-Amz-Algorithm=AWS4-HMAC-SHA256&amp;X-Amz-Date=20251006T162649Z&amp;X-Amz-SignedHeaders=host&amp;X-Amz-Expires=300&amp;X-Amz-Credential=ASIAQ3PHCVTYUR3PHY4Y%2F20251006%2Fus-east-1%2Fs3%2Faws4_request&amp;X-Amz-Signature=ca5c0aeac5bbd0b3671b86d5cd8e407187072c07d059e15e3a4c98dc228281b9&amp;hash=9618cafcb1a60f89b166732bcbc34413dcbd8888d2416a2ac3f03e4cc715ad50&amp;host=68042c943591013ac2b2430a89b270f6af2c76d8dfd086a07176afe7c76c2c61&amp;pii=S1570870523001841&amp;tid=spdf-cf95939e-5a1b-40bc-95c9-a2070b5e4752&amp;sid=c710d45652a1f74a3d78228-a2a1f4cfb2e2gxrqa&amp;type=client&amp;tsoh=d3d3LnNjaWVuY2VkaXJlY3QuY29t&amp;rh=d3d3LnNjaWVuY2VkaXJlY3QuY29t&amp;ua=19035d590455575b010d&amp;rr=98a685cbe89ea2c2&amp;cc=ca\">ScienceDirect<\/a>]<\/span><\/p><\/li><li><p><span style=\"color: #000000;\">Triwinarko, A., Mlika, Z., Cherkaoui, S., &amp; Dayoub, I. (2022, October). \u201c<span style=\"text-decoration: underline;\"><strong><a href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-031-29419-8_11\">Deep Reinforcement Learning to Improve Vehicle-to-Vulnerable Road User Communications in C-V2X<\/a><\/strong><\/span>,\u201d <em>8th International Symposium on ubiquitous Networking (UNeT 2022), Montreal, Qc, Canada. https:\/\/doi.org\/10.1007\/978-3-031-29419-8_11<\/em>.<\/span><\/p><\/li><li><p><span style=\"color: #000000;\">W. Rafique, A. S. Hafid and S. Cherkaoui, \u201c<strong><span style=\"text-decoration: underline;\"><a href=\"https:\/\/ieeexplore.ieee.org\/document\/9888774\">Complementing IoT Services Using Software-Defined Information Centric Networks: A Comprehensive Survey<\/a><\/span>,<\/strong>\u201d in IEEE Internet of Things Journal, vol. 9, no. 23, pp. 23545-23569, 1 Dec.1, 2022, doi: 10.1109\/JIOT.2022.3206146.<br \/>[<strong>\ud83d\udd13<\/strong>: <a href=\"https:\/\/www.techrxiv.org\/users\/682933\/articles\/678231-complementing-iot-services-using-software-defined-information-centric-networks-a-comprehensive-survey\">TechRxiv<\/a>]<\/span><\/p><\/li><li><p><span style=\"color: #000000;\">Z. Mlika and S. Cherkaoui, \u201c<strong><span style=\"text-decoration: underline;\"><a href=\"https:\/\/ieeexplore.ieee.org\/document\/9839316\">Deep Deterministic Policy Gradient to Minimize the Age of Information in Cellular V2X Communications<\/a><\/span>,<\/strong>\u201d in IEEE Transactions on Intelligent Transportation Systems, vol. 23, no. 12, pp. 23597-23612, Dec. 2022, doi: 10.1109\/TITS.2022.3190799.<br \/>[<strong>\ud83d\udd13<\/strong>: <a href=\"https:\/\/arxiv.org\/abs\/2210.09586\">arXiv<\/a> ]<\/span><\/p><\/li><li><p><span style=\"color: #000000;\">B. Nour and S. Cherkaoui, \u201c<span style=\"text-decoration: underline;\"><strong><a href=\"https:\/\/ieeexplore.ieee.org\/document\/9815185\">How Far Can We Go in Compute-less Networking: Computation Correctness and Accuracy<\/a><\/strong><\/span>,\u201d in IEEE Network, vol. 36, no. 4, pp. 197-202, July\/August 2022, doi: 10.1109\/MNET.012.2100157.<br \/>[<strong>\ud83d\udd13<\/strong>: <a href=\"https:\/\/arxiv.org\/pdf\/2103.15924\">arXiv<\/a> ]<\/span><\/p><\/li><li><p>O. A. Dambri, S. Cherkaoui and D. Makrakis, &#8220;<strong><span style=\"text-decoration: underline;\"><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/9794705\">Design and Evaluation of a Receiver for Wired Nano-Communication Networks<\/a><\/span><\/strong>,&#8221; in\u00a0<em>IEEE Transactions on NanoBioscience<\/em>, vol. 22, no. 2, pp. 223-236, April 2023, doi: 10.1109\/TNB.2022.3182587.\u00a0<br \/><span style=\"color: #000000;\">[<strong>\ud83d\udd13<\/strong>: <a href=\"https:\/\/arxiv.org\/pdf\/2009.11805\">arXiv<\/a> ]<\/span><\/p><\/li><li><p><span style=\"color: #000000;\">A. Abouaomar, S. Cherkaoui, Z. Mlika and A. Kobbane, \u201c<strong><span style=\"text-decoration: underline;\"><a href=\"https:\/\/ieeexplore.ieee.org\/document\/9785397\">Service Function Chaining in MEC: A Mean-Field Game and Reinforcement Learning Approach<\/a><\/span>,<\/strong>\u201d in IEEE Systems Journal, vol. 16, no. 4, pp. 5357-5368, Dec. 2022, doi: 10.1109\/JSYST.2022.3171232.<br \/>[<strong>\ud83d\udd13<\/strong>: <a href=\"https:\/\/arxiv.org\/abs\/2105.04701\">arXiv<\/a> ]<\/span><\/p><\/li><li><p><span style=\"color: #000000;\">A. Triwinarko, S. Cherkaoui and I. Dayoub, &#8220;<span style=\"text-decoration: underline;\"><strong><a href=\"https:\/\/ieeexplore.ieee.org\/document\/9838580\">Performance of Radio Access Technologies for Next Generation V2VRU Networks<\/a><\/strong><\/span>,&#8221;\u00a0<em>ICC 2022 &#8211; IEEE International Conference on Communications<\/em>, Seoul, Korea, Republic of, 2022, pp. 1524-1529, doi: 10.1109\/ICC45855.2022.9838580. <br \/>[<strong>\ud83d\udd13<\/strong>: <a href=\"https:\/\/lincslab.ca\/wp-content\/uploads\/2025\/12\/Performance-.pdf\">pdf<\/a> ]<\/span><\/p><\/li><li><p><span style=\"color: #000000;\">B. Nour and S. Cherkaoui, \u201c<span style=\"text-decoration: underline;\"><a href=\"https:\/\/ieeexplore.ieee.org\/document\/9882289\"><strong>Unsupervised Data Splitting Scheme for Federated Edge Learning in IoT\u00a0<\/strong><strong>Networks<\/strong><\/a><\/span>\u201d, <em>ICC 2022 &#8211; IEEE International Conference on Communications<\/em>, Seoul, Korea, Republic of, 2022, pp. 1-6, doi: 10.1109\/ICC45855.2022.9882289.<br \/>[<strong>\ud83d\udd13<\/strong>: <a href=\"https:\/\/arxiv.org\/pdf\/2203.04376\">arXiv<\/a> ]<br \/><\/span><\/p><\/li><li><p><span style=\"color: #000000;\">H. Moudoud, Z. Mlika, L. Khoukhi and S. Cherkaoui, \u201c<strong><span style=\"text-decoration: underline;\"><a href=\"https:\/\/ieeexplore.ieee.org\/document\/9740504\">Detection and Prediction of FDI Attacks in IoT Systems via Hidden Markov Model<\/a><\/span>,<\/strong>\u201d in IEEE Transactions on Network Science and Engineering, vol. 9, no. 5, pp. 2978-2990, 1 Sept.-Oct. 2022, doi: 10.1109\/TNSE.2022.3161479.<br \/>[<strong>\ud83d\udd13<\/strong>: <a href=\"https:\/\/arxiv.org\/pdf\/2201.11368\">arXiv<\/a> ]<\/span><\/p><\/li><li><p><span style=\"color: #000000;\">A. Filali, Z. Mlika, S. Cherkaoui, A. Kobbane., \u201c<strong><span style=\"text-decoration: underline;\"><a href=\"https:\/\/ieeexplore.ieee.org\/document\/9729992\">Dynamic SDN-based Radio Access Network Slicing with Deep Reinforcement Learning for URLLC and eMBB Services<\/a><\/span><\/strong>,\u201d <em>IEEE Transactions on Network Science and Engineering, 2022.doi:10.1109\/TNSE.2022.3157274.<\/em><br \/>[<strong>\ud83d\udd13<\/strong>: <a href=\"https:\/\/arxiv.org\/abs\/2202.06435\">arXiv<\/a> ]<\/span><\/p><\/li><li><p><span style=\"color: #000000;\">A. Ta\u00efk, Z. Mlika and S. Cherkaoui, \u201c<a href=\"https:\/\/ieeexplore.ieee.org\/document\/9716076\"><span style=\"text-decoration: underline;\"><strong>Clustered Vehicular Federated Learning: Process and Optimization<\/strong><\/span><\/a>,\u201d in IEEE Transactions on Intelligent Transportation Systems, vol. 23, no. 12, pp. 25371-25383, Dec. 2022, doi: 10.1109\/TITS.2022.3149860.<br \/>[<strong>\ud83d\udd13<\/strong>: <a href=\"https:\/\/arxiv.org\/abs\/2201.11271\">arXiv<\/a> ]<\/span><\/p><\/li><li><p>S. Cherkaoui, &#8220;<strong><span style=\"text-decoration: underline;\"><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/9687530\">Research Landscape \u2013 6G Networks Research in Europe<\/a><\/span><\/strong>,&#8221; in\u00a0<em>IEEE Network<\/em>, vol. 35, no. 6, pp. 4-6, November\/December 2021, doi: 10.1109\/MNET.2021.9687530<\/p><\/li><li><p><span style=\"color: #000000;\">A. Ta\u00efk, Z. Mlika and S. Cherkaoui, \u201c<span style=\"text-decoration: underline;\"><strong><a href=\"https:\/\/ieeexplore.ieee.org\/document\/9499115\">Data-Aware Device Scheduling for Federated Edge Learning<\/a><\/strong><\/span>,\u201d in IEEE Transactions on Cognitive Communications and Networking, vol. 8, no. 1, pp. 408-421, March 2022, doi: 10.1109\/TCCN.2021.3100574.<br \/>[<strong>\ud83d\udd13<\/strong>: <a href=\"https:\/\/arxiv.org\/abs\/2102.09491\">arXiv<\/a> ]<\/span><\/p><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8696fc2 e-flex e-con-boxed e-con e-parent\" data-id=\"8696fc2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-28b56b1 elementor-widget elementor-widget-heading\" data-id=\"28b56b1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><b>2021<\/b><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fbd3ee6 e-con-full e-flex e-con e-child\" data-id=\"fbd3ee6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2d4b8a3 elementor-widget elementor-widget-text-editor\" data-id=\"2d4b8a3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li><p><span style=\"color: #000000;\">H. Moudoud and S. Cherkaoui, \u201c<span style=\"text-decoration: underline;\"><a href=\"https:\/\/ieeexplore.ieee.org\/document\/10000623\"><strong>Toward Secure and Private Federated Learning for IoT using Blockchain<\/strong><\/a><\/span>,\u201d <em>GLOBECOM 2022 \u2013 2022 IEEE Global Communications Conference, Rio de Janeiro, Brazil, 2022, pp. 4316-4321, doi: 10.1109\/GLOBECOM48099.2022.10000623<\/em>.<br \/>[\ud83d\udd13 : <a href=\"https:\/\/arxiv.org\/abs\/2201.11311\">arXiv<\/a> ]<\/span><\/p><\/li><li><p>A. Triwinarko, I. Dayoub, and S. Cherkaoui, \u201c<span style=\"text-decoration: underline;\"><strong><a href=\"https:\/\/www.sciencedirect.com\/science\/article\/abs\/pii\/S2214209621000541\">PHY layer enhancements for next generation V2X communication<\/a><\/strong><\/span>,\u201d <em data-start=\"108\" data-end=\"134\">Vehicular Communications<\/em>, vol. 32, Art. no. 100385, Dec. 2021, doi: 10.1016\/j.vehcom.2021.100385.<br \/><span style=\"color: #000000;\">[\ud83d\udd13 : <a href=\"https:\/\/pdf.sciencedirectassets.com\/287272\/1-s2.0-S2214209621X00046\/1-s2.0-S2214209621000541\/am.pdf?X-Amz-Security-Token=IQoJb3JpZ2luX2VjENL%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FwEaCXVzLWVhc3QtMSJIMEYCIQD%2Bz%2F5FW%2FWlbPh38zGkr5%2BV3nDGKYwNnFxgJQl2G0TGcAIhAL1BQHrmjCLC481euhrERkJXwtdymrwgaCgAPisCzXs9KrwFCJv%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FwEQBRoMMDU5MDAzNTQ2ODY1IgzhMOlx4U6WzgEWGCsqkAVeOCdyw3DDORaXQ%2FWpM20tLkP36md7k5lHH4ghzI2LVabQBoCxU%2BZWi4H57YqWP7j3RXwBC%2B1DeKWLd1XeKivqYp4DRQQR0s7MK6Al96H9mwHe79rkZmTxOCWRzSM5dB9j48MECLmEbBqtYM6oQNgf2t4eFpuSIHnMSxsx0rTGxpbNz8hSniIWALkKO7kmXFnjrIw2nVfR1bBCpEmoHnFqjBQLnKaMoy9TF3%2BLr8C%2F951Q1aoK%2FUmW%2BXiF7fEh89UzGkGNmNJP2hNV%2FnNzif%2BxfjYXCAxfJ9sTRZr9V6yEo%2FZZm%2FJx3MP79pg4oq9Y91idw9SAkaIJPAVjC8sxwg6gcE7EKifzVERBFUr%2BveQ%2BCFoII49PUwYo7hbvbD7u6bWAEpt4yMhs9P%2Bty1hXA1Q8aKB9bNEQQVidbVNYG0FYXb99YPUzofS5aZ8SuqIVV2HiMhSmYVCiR7un4FIGSPkWzB0mNp3aETYram%2FGMc6cl5xWB9K9PnSCc2Y73%2BMR8gN9iATUwmRng%2BUmEdBIYB2RYMVuzCFaqdQlRHscYhIUYOR1NJMjp2IAx%2BBmhxwJyWbYyh4oL25TyMBATXQNZbLCFuygs%2BJSnpnN6%2Ftb6n3bkX%2B%2F9JOzt84PaYpSi%2Fkpyf570ik0F5zRx4XGF%2B8GlG9MGSe94UrMdr52kOKvpg3Cb1c8disn79SuzNZMVoerf1LHJ91ud8tn5S%2F%2BGUpaj3mmKLU2QpUJcdmVSHkS5l7yZq19YYJsfrlF%2FHmz15QH5ClmWQuLbzR7u2ac6%2B9X7o34H%2FSQ2rkr3uyRFCzK5wGKVfNH2hq8MJC7QFqF338nXpC%2BH%2FJEhpDsMQa0I%2BP7dINIyMpeomKJH0Z8GJco7EFshTC4soHLBjqwAS8EGh1nuLndwb9gHaDv8Cxs2R5WbO33mREhUF6qWh8GzDGGZ%2ByIkOptlNHvqOw3CXDHYRyYbliYZyz22i%2Bdht59Hb4ZL%2F2jkqKRq2jSaT6m6NOwg%2Fs7SPG3TL%2BRmzK5v5kJ1PJI7E5vt4vdHQJpt66GYEBDtSyWeufDBmT9GGuWA98igEEnJPi0zOlxDEm2QenL8H99lSwtQudpyz3WCJ372vQUsOe9TyuYQjKO4ru7&amp;X-Amz-Algorithm=AWS4-HMAC-SHA256&amp;X-Amz-Date=20260109T023046Z&amp;X-Amz-SignedHeaders=host&amp;X-Amz-Expires=300&amp;X-Amz-Credential=ASIAQ3PHCVTY25IH5EQA%2F20260109%2Fus-east-1%2Fs3%2Faws4_request&amp;X-Amz-Signature=8c59c7251ca1523a002ba3fdc038c4f01709eade3bcd334b5729684e7cc979ba&amp;hash=57b26c5de5d094844b54bea09299796523c8e78643f65e94adebb8aed3dec6e1&amp;host=68042c943591013ac2b2430a89b270f6af2c76d8dfd086a07176afe7c76c2c61&amp;pii=S2214209621000541&amp;tid=pdf-61aaae36-bb97-45c6-9de6-d1434755c2bd&amp;sid=13df388149b40442131bf307b0fe35ffb2begxrqa&amp;type=client\">ScienceDirect PDF<\/a> ]<\/span><\/p><\/li><li><p>B. Nour, S. Cherkaoui and Z. Mlika, &#8220;<span style=\"text-decoration: underline;\"><strong><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/9628038\">Federated Learning and Proactive Computation Reuse at the Edge of Smart Homes<\/a><\/strong><\/span>,&#8221; in\u00a0<em>IEEE Transactions on Network Science and Engineering<\/em>, vol. 9, no. 5, pp. 3045-3056, 1 Sept.-Oct. 2022, doi: 10.1109\/TNSE.2021.3131246.<\/p><\/li><li><p><span style=\"color: #000000;\">O. A. Dambri and S. Cherkaoui, \u201c<strong><span style=\"text-decoration: underline;\"><a href=\"https:\/\/ieeexplore.ieee.org\/document\/9564267\">Modeling Self-Assembly of Polymer-Based Wired Nano-Communication Channel<\/a><\/span><\/strong>,\u201d <em>in IEEE Transactions on Molecular, Biological and Multi-Scale Communications, vol. 8, no. 2, pp. 107-118, June 2022, doi: 10.1109\/TMBMC.2021.3118943<\/em>.<br \/>[\ud83d\udd13: <a href=\"https:\/\/arxiv.org\/abs\/2005.12328\">arXiv<\/a> ]<\/span><\/p><\/li><li><p>O. A. Dambri and S. Cherkaoui, &#8220;<span style=\"text-decoration: underline;\"><strong><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/9564267\">Modeling Self-Assembly of Polymer-Based Wired Nano-Communication Channel<\/a><\/strong><\/span>,&#8221; in\u00a0<em>IEEE Transactions on Molecular, Biological, and Multi-Scale Communications<\/em>, vol. 8, no. 2, pp. 107-118, June 2022, doi: 10.1109\/TMBMC.2021.3118943.<\/p><\/li><li><p>A. Ta\u00efk, H. Moudoud and S. Cherkaoui, &#8220;<strong><span style=\"text-decoration: underline;\"><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/9524974\">Data-Quality Based Scheduling for Federated Edge Learning<\/a><\/span><\/strong>,&#8221;\u00a0<em>2021 IEEE 46th Conference on Local Computer Networks (LCN)<\/em>, Edmonton, AB, Canada, 2021, pp. 17-23, doi: 10.1109\/LCN52139.2021.9524974.<\/p><p><span style=\"color: #000000;\">[\ud83d\udd13<\/span><span style=\"color: #000000;\">: <a href=\"https:\/\/arxiv.org\/pdf\/2201.11247\">arXiv<\/a> ]<\/span><\/p><\/li><li><p>A. Abouaomar, Z. Mlika, A. Filali, S. Cherkaoui and A. Kobbane, &#8220;<strong><span style=\"text-decoration: underline;\"><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/9524882\">A Deep Reinforcement Learning Approach for Service Migration in MEC-enabled Vehicular Networks<\/a><\/span><\/strong>,&#8221;\u00a0<em>2021 IEEE 46th Conference on Local Computer Networks (LCN)<\/em>, Edmonton, AB, Canada, 2021, pp. 273-280, doi: 10.1109\/LCN52139.2021.9524882.<\/p><p><span style=\"color: #000000;\">[<strong>\ud83d\udd13<\/strong>: <a href=\"https:\/\/arxiv.org\/pdf\/2201.11831\">arXiv<\/a> ]<\/span><\/p><\/li><li><p>Z. Mlika and S. Cherkaoui, \u201c<strong><span style=\"text-decoration: underline;\"><a href=\"https:\/\/link.springer.com\/article\/10.1007\/s12243-021-00872-w\">Network slicing for vehicular communications: A multi-agent deep reinforcement learning approach<\/a><\/span><\/strong>,\u201d <em data-start=\"127\" data-end=\"157\">Annals of Telecommunications<\/em>, vol. 76, pp. 665\u2013683, 2021, doi: 10.1007\/s12243-021-00872-w.\u00a0<br \/><span style=\"color: #000000;\">[<strong>\ud83d\udd13<\/strong>: <a href=\"https:\/\/arxiv.org\/pdf\/2201.11281\">arXiv<\/a> ]<\/span><\/p><\/li><li><p><span style=\"color: #000000;\">A. Taik, Z. Mlika, S. Cherkaoui., \u201c<strong><span style=\"text-decoration: underline;\"><a href=\"https:\/\/ieeexplore.ieee.org\/document\/9499115\">Data-Aware Device Scheduling for Federated Edge Learning<\/a><\/span><\/strong>,\u201d IEEE Transactions on Cognitive Communications and Networking, 2021, doi:10.1109\/TCCN.2021.3100574.<br \/>[<strong>\ud83d\udd13<\/strong>: <a href=\"https:\/\/arxiv.org\/abs\/2102.09491\">arXiv<\/a> ]<\/span><\/p><\/li><li><p><span style=\"color: #000000;\">A. Alalewi, I. Dayoub and S. Cherkaoui, \u201c<strong><span style=\"text-decoration: underline;\"><a href=\"https:\/\/ieeexplore.ieee.org\/document\/9497103\">On 5G-V2X Use Cases and Enabling Technologies: A Comprehensive Survey<\/a><\/span>,<\/strong>\u201d <em>in IEEE Access, vol. 9, pp. 107710-107737, 2021,<\/em> doi: 10.1109\/ACCESS.2021.3100472.<br \/>[<strong>\ud83d\udd13<\/strong>: <a href=\"https:\/\/uphf.hal.science\/hal-03311360\/file\/On_5G-V2X_Use_Cases_and_Enabling_Technologies_A_Comprehensive_Survey.pdf\">HAL UPHF<\/a>]<\/span><\/p><\/li><li><p>H. Moudoud, S. Cherkaoui and L. Khoukhi, &#8220;<span style=\"text-decoration: underline;\"><strong><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/9500535\">Towards a Scalable and Trustworthy Blockchain: IoT Use Case<\/a><\/strong><\/span>,&#8221;\u00a0<em>ICC 2021 &#8211; IEEE International Conference on Communications<\/em>, Montreal, QC, Canada, 2021, pp. 1-6, doi: 10.1109\/ICC42927.2021.9500535. <br \/><span style=\"color: #000000;\">[<strong>\ud83d\udd13<\/strong>: <a href=\"https:\/\/arxiv.org\/pdf\/2201.11337\">arXiv<\/a> ]<\/span><\/p><\/li><li><p>Z. Mlika and S. Cherkaoui, &#8220;<strong><span style=\"text-decoration: underline;\"><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/9500285\">Competitive Algorithms and Reinforcement Learning for NOMA in IoT Networks<\/a><\/span><\/strong>,&#8221;\u00a0<em>ICC 2021 &#8211; IEEE International Conference on Communications<\/em>, Montreal, QC, Canada, 2021, pp. 1-6, doi: 10.1109\/ICC42927.2021.9500285.\u00a0\u00a0<br \/><span style=\"color: #000000;\">[<strong>\ud83d\udd13<\/strong>: <a href=\"https:\/\/arxiv.org\/pdf\/2201.12395\">arXiv<\/a> ]<\/span><\/p><\/li><li><p>E. Vagnoni, F. Gerini, R. Cherkaoui, and M. Paolone, \u201c<span style=\"text-decoration: underline;\"><strong><a href=\"https:\/\/iopscience.iop.org\/article\/10.1088\/1755-1315\/774\/1\/012107\/meta\">Digitalization in hydropower generation: Development and numerical validation of a model-based Smart Power Plant Supervisor,<\/a><\/strong><\/span>\u201d <em data-start=\"180\" data-end=\"217\">IOP Conf. Ser.: Earth Environ. Sci.<\/em>, vol. 774, Art. no. 012107, 2021, doi: 10.1088\/1755-1315\/774\/1\/012107.<br \/>[<span style=\"color: #000000;\"><strong>\ud83d\udd13<\/strong>:<\/span> <a href=\"https:\/\/iopscience.iop.org\/article\/10.1088\/1755-1315\/774\/1\/012107\/pdf\">IOP PDF<\/a> ]<\/p><\/li><li><p>O. Chughtai, M. H. Rehmani, L. Musavian, S. -M. Senouci, S. Cherkaoui and S. Mao, &#8220;<strong><span style=\"text-decoration: underline;\"><a href=\"https:\/\/ieeexplore.ieee.org\/document\/9439982\">IEEE Access Special Section Editorial: Flying Ad Hoc Networks: Challenges, Potentials, Future Applications, and Way Forward<\/a><\/span><\/strong>,&#8221; in IEEE Access, vol. 9, pp. 74189-74193, 2021, doi: 10.1109\/ACCESS.2021.3077816. <span style=\"color: #000000;\"><br \/>[<strong>\ud83d\udd13<\/strong>: <a href=\"https:\/\/www.mdpi.com\/2504-446X\/4\/4\/65\">MDPI<\/a> ]<\/span><\/p><\/li><li><p>H. Moudoud, S. Cherkaoui, and L. Khoukhi, \u201c<a href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-030-77185-0_1\"><span style=\"text-decoration: underline;\"><strong>An overview of blockchain and 5G networks<\/strong><\/span><\/a>,\u201d in <em data-start=\"94\" data-end=\"155\">Computational Intelligence in Recent Communication Networks<\/em> (EAI\/Springer Innovations in Communication and Computing), M. Ouaissa, Z. Boulouard, M. Ouaissa, and B. Guermah, Eds. Cham, Switzerland: Springer, 2022, doi: 10.1007\/978-3-030-77185-0_1. <br \/><span style=\"color: #000000;\">[<strong>\ud83d\udd13<\/strong>: <a href=\"https:\/\/arxiv.org\/pdf\/2201.12395\">arXiv<\/a> ]<\/span><\/p><\/li><li><p><span style=\"color: #000000;\">Z. Mlika and S. Cherkaoui, &#8220;<strong><span style=\"text-decoration: underline;\"><a href=\"https:\/\/ieeexplore.ieee.org\/document\/9383093\">Massive IoT Access With NOMA in 5G Networks and Beyond Using Online Competitiveness and Learning<\/a><\/span><\/strong>,&#8221; in\u00a0<em>IEEE Internet of Things Journal<\/em>, vol. 8, no. 17, pp. 13624-13639, 1 Sept.1, 2021, doi: 10.1109\/JIOT.2021.3068061.<br \/>[<strong>\ud83d\udd13<\/strong>: <a href=\"https:\/\/arxiv.org\/abs\/2002.07957\">arXiv<\/a> ]<\/span><\/p><\/li><li><p>M. Lakoju, A. Javed, O. Rana, <em data-start=\"30\" data-end=\"37\">et al<\/em>., \u201c<strong><span style=\"text-decoration: underline;\"><a href=\"https:\/\/link.springer.com\/article\/10.1007\/s43926-021-00004-9\">\u2018Chatty Devices\u2019 and edge-based activity classification<\/a><\/span><\/strong>,\u201d <em data-start=\"99\" data-end=\"128\">Discover Internet of Things<\/em>, vol. 1, Art. no. 5, Feb. 2021, doi: 10.1007\/s43926-021-00004-9. <br \/><span style=\"color: #000000;\"> [<strong>\ud83d\udd13<\/strong>: <a href=\"https:\/\/link.springer.com\/article\/10.1007\/s43926-021-00004-9\">Springer<\/a>]<\/span><\/p><\/li><li><p><span style=\"color: #000000;\">A. Abouaomar, S. Cherkaoui, Z. Mlika and A. Kobbane, &#8220;<span style=\"text-decoration: underline;\"><strong><a href=\"https:\/\/ieeexplore.ieee.org\/document\/9326402\">Resource Provisioning in Edge Computing for Latency-Sensitive Applications<\/a><\/strong><\/span>,&#8221; in\u00a0<em>IEEE Internet of Things Journal<\/em>, vol. 8, no. 14, pp. 11088-11099, 15 July15, 2021, doi: 10.1109\/JIOT.2021.3052082.<br \/>[<strong> \ud83d\udd13<\/strong>:\u00a0 <a href=\"https:\/\/arxiv.org\/pdf\/2201.11837\">arXiv<\/a> ]<\/span><\/p><\/li><li><p><span style=\"color: #000000;\">Z. Mlika and S. Cherkaoui, &#8220;<span style=\"text-decoration: underline;\"><strong><a href=\"https:\/\/ieeexplore.ieee.org\/document\/9318243\">Network Slicing with MEC and Deep Reinforcement Learning for the Internet of Vehicles<\/a><\/strong><\/span>,&#8221; in\u00a0<em>IEEE Network<\/em>, vol. 35, no. 3, pp. 132-138, May\/June 2021, doi: 10.1109\/MNET.011.2000591.<br \/>[<strong> \ud83d\udd13<\/strong>:\u00a0 <a href=\"https:\/\/arxiv.org\/pdf\/2201.11295\">arXiv<\/a> ]<\/span><\/p><\/li><li><p>M. Lakoju, A. Javed, O. Rana, P. Burnap, S. T. Atiba, and S. Cherkaoui, \u201c\u2018Chatty Devices\u2019 and edge-based activity classification,\u201d <em data-start=\"131\" data-end=\"160\">Discover Internet of Things<\/em>, vol. 1, Art. no. 5, Feb. 2021, doi: 10.1007\/s43926-021-00004-9. <br \/><span style=\"color: #000000;\"> [<strong>\ud83d\udd13<\/strong>:\u00a0 <a href=\"https:\/\/figshare.cardiffmet.ac.uk\/articles\/journal_contribution\/_Chatty_Devices_and_edge-based_activity_classification\/16989172\/files\/31423741.pdf\">cardiffmet.ac.uk pdf<\/a>]<\/span><\/p><\/li><li><p>Z. Mlika and S. Cherkaoui, &#8220;<span style=\"text-decoration: underline;\"><strong><a href=\"https:\/\/ieeexplore.ieee.org\/document\/9318243\">Network Slicing with MEC and Deep Reinforcement Learning for the Internet of Vehicles<\/a><\/strong><\/span>,&#8221; in\u00a0<em>IEEE Network<\/em>, vol. 35, no. 3, pp. 132-138, May\/June 2021, doi: 10.1109\/MNET.011.2000591. <span style=\"color: #000000;\"><br \/>[<strong>\ud83d\udd13<\/strong>: <a href=\"https:\/\/arxiv.org\/pdf\/2201.11295\">arXiv<\/a> ]<\/span><\/p><\/li><li><p><span style=\"color: #000000;\">A. Taik, B. Nour and S. Cherkaoui, \u201c<span style=\"text-decoration: underline;\"><strong><a href=\"https:\/\/ieeexplore.ieee.org\/document\/9690142\">Empowering Prosumer Communities in Smart Grid with Wireless Communications and Federated Edge Learning<\/a><\/strong><\/span><span style=\"text-decoration: underline;\"><a style=\"color: #000000; text-decoration: underline;\" href=\"https:\/\/doi.org\/10.1109\/MWC.017.2100187\"><strong>,<\/strong><\/a><\/span>\u201d \u00a0in\u00a0<em>IEEE Wireless Communications<\/em>, vol. 28, no. 6, pp. 26-33, December 2021, doi: 10.1109\/MWC.017.2100187.<br \/>[<strong>\ud83d\udd13<\/strong>: <a href=\"https:\/\/arxiv.org\/abs\/2104.03169\">arXiv<\/a> ]<\/span><\/p><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b205e92 e-flex e-con-boxed e-con e-parent\" data-id=\"b205e92\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b56376f elementor-widget elementor-widget-heading\" data-id=\"b56376f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><b>2020<\/b><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-97b6279 e-con-full e-flex e-con e-child\" data-id=\"97b6279\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-195789f elementor-widget elementor-widget-text-editor\" data-id=\"195789f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li><span style=\"color: #000000;\"><span style=\"color: #000000;\">A. Filali, Z. Mlika, S. Cherkaoui and A. Kobbane, &#8220;<strong><span style=\"text-decoration: underline;\"><a href=\"https:\/\/ieeexplore.ieee.org\/document\/9263348\">Preemptive SDN Load Balancing With Machine Learning for Delay Sensitive Applications<\/a><\/span><\/strong>,&#8221; in\u00a0<em>IEEE Transactions on Vehicular Technology<\/em>, vol. 69, no. 12, pp. 15947-15963, Dec. 2020, doi: 10.1109\/TVT.2020.3038918.<\/span><\/span><p>\u00a0<\/p><\/li><li>H. Moudoud, L. Khoukhi and S. Cherkaoui, &#8220;<span style=\"text-decoration: underline;\"><strong><a href=\"https:\/\/ieeexplore.ieee.org\/document\/9246616\">Prediction and Detection of FDIA and DDoS Attacks in 5G Enabled IoT<\/a><\/strong><\/span>,&#8221; in\u00a0<em>IEEE Network<\/em>, vol. 35, no. 2, pp. 194-201, March\/April 2021, doi: 10.1109\/MNET.011.2000449.<br \/>\u00a0<span style=\"font-style: inherit; font-weight: inherit;\">[<\/span><span style=\"font-style: inherit; font-weight: bold; color: #000000;\">\ud83d\udd13<\/span><span style=\"font-style: inherit; font-weight: inherit; color: #000000;\">:\u00a0<\/span><span style=\"font-style: inherit; font-weight: inherit;\"><span style=\"font-style: inherit; font-weight: inherit;\"><a href=\"https:\/\/lincslab.ca\/wp-content\/uploads\/2025\/12\/Prediction_and_Detection_of_FDIA_and_DDoS_Attacks_in_5G_Enabled_IoT.pdf\" target=\"_blank\" rel=\"noopener\">pdf<\/a>]<\/span><\/span><\/li><li>J. Rezgui, \u00c9. Gagn\u00e9, G. Blain, M. Harvey, O. St-Pierre and S. Cherkaoui, &#8220;<strong><span style=\"text-decoration: underline;\"><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/9248485\">Open Source Platform for Extended Perception Using Communications and Machine Learning on a Small-Scale Vehicular Testbed<\/a><\/span><\/strong>,&#8221;\u00a0<em>2020 Global Information Infrastructure and Networking Symposium (GIIS)<\/em>, Tunis, Tunisia, 2020, pp. 1-4, doi: 10.1109\/GIIS50753.2020.9248485. <br \/>[<span style=\"font-style: inherit; font-weight: bold; color: #000000;\">\ud83d\udd13<\/span><span style=\"font-style: inherit; font-weight: inherit; color: #000000;\"><span style=\"font-style: inherit; font-weight: inherit; color: #000000;\">:\u00a0<a href=\"https:\/\/lincslab.ca\/wp-content\/uploads\/2025\/12\/Open-Source-Platform.pdf\">pdf<\/a>]<\/span><\/span><\/li><li><span style=\"font-style: inherit; font-weight: inherit;\">A. Filali, A. Abouaomar, S. Cherkaoui, A. Kobbane and M. Guizani, &#8220;<\/span><span style=\"font-style: inherit; font-weight: inherit; text-decoration-line: underline;\"><strong><a href=\"https:\/\/ieeexplore.ieee.org\/document\/9240934\">Multi-Access Edge Computing: A Survey<\/a><\/strong><\/span><span style=\"font-style: inherit; font-weight: inherit;\">,&#8221; in\u00a0<\/span><em style=\"font-weight: inherit;\">IEEE Access<\/em><span style=\"font-style: inherit; font-weight: inherit;\">, vol. 8, pp. 197017-197046, 2020, doi: 10.1109\/ACCESS.2020.3034136. <br \/>[<\/span><span style=\"font-style: inherit; font-weight: bold; color: #000000;\">\ud83d\udd13<\/span><span style=\"font-style: inherit; font-weight: inherit; color: #000000;\">:\u00a0<\/span><span style=\"font-style: inherit; font-weight: inherit;\"><span style=\"font-style: inherit; font-weight: inherit;\"><a href=\"https:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?arnumber=9240934\">IEEE PDF<\/a>]<\/span><\/span><\/li><li>A. Tak and S. Cherkaoui, &#8220;<strong><span style=\"text-decoration: underline;\"><a href=\"https:\/\/ieeexplore.ieee.org\/document\/9220170\">Federated Edge Learning: Design Issues and Challenges<\/a><\/span><\/strong>,&#8221; in\u00a0<em>IEEE Network<\/em>, vol. 35, no. 2, pp. 252-258, March\/April 2021, doi: 10.1109\/MNET.011.2000478. <span style=\"color: #000000;\"><span style=\"color: #000000;\"><br \/>[<strong>\ud83d\udd13<\/strong>:\u00a0 <a href=\"https:\/\/arxiv.org\/abs\/2009.00081\">arXiv<\/a> ]<\/span><\/span><\/li><li>J. H. Yi, R. Cherkaoui and M. Paolone, &#8220;<span style=\"text-decoration: underline;\"><strong><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/9203947\">Optimal Allocation of ESSs in Active Distribution Networks to Achieve Their Dispatchability<\/a><\/strong><\/span>,&#8221; in\u00a0<em>IEEE Transactions on Power Systems<\/em>, vol. 36, no. 3, pp. 2068-2081, May 2021, doi: 10.1109\/TPWRS.2020.3025991.<br \/><span style=\"color: #000000;\"><span style=\"color: #000000;\">[<strong>\ud83d\udd13<\/strong>:\u00a0 <a href=\"https:\/\/arxiv.org\/pdf\/1909.12667\">arXiv<\/a> ]<\/span><\/span><\/li><li>A. Ta\u00efk and S. Cherkaoui, &#8220;<span style=\"text-decoration: underline;\"><strong><a href=\"https:\/\/ieeexplore.ieee.org\/document\/9148937\">Electrical Load Forecasting Using Edge Computing and Federated Learning<\/a><\/strong><\/span>,&#8221;\u00a0<em>ICC 2020 &#8211; 2020 IEEE International Conference on Communications (ICC)<\/em>, Dublin, Ireland, 2020, pp. 1-6, doi: 10.1109\/ICC40277.2020.9148937.<br \/>[<strong>\ud83d\udd13<\/strong>: <a href=\"https:\/\/arxiv.org\/pdf\/2201.11248\">arXiv<\/a> ]<\/li><li>O. A. Dambri and S. Cherkaoui, \u201c<strong><span style=\"text-decoration: underline;\"><a href=\"https:\/\/arxiv.org\/pdf\/2005.12328\">A physical channel model for wired nano-communication networks<\/a><\/span><\/strong>,\u201d <em data-start=\"97\" data-end=\"113\">arXiv preprint<\/em> arXiv:2005.12328, May 2020, doi: 10.48550\/arXiv.2005.12328.<br \/>[<strong>\ud83d\udd13<\/strong>: <a href=\"https:\/\/arxiv.org\/pdf\/2005.12328\">arXiv<\/a> ]<\/li><li>O. A. Dambri and S. Cherkaoui, &#8220;<strong><span style=\"text-decoration: underline;\"><a href=\"https:\/\/ieeexplore.ieee.org\/document\/9148728\">Toward a Wired Ad Hoc Nanonetwork<\/a><\/span><\/strong>,&#8221;\u00a0<em>ICC 2020 &#8211; 2020 IEEE International Conference on Communications (ICC)<\/em>, Dublin, Ireland, 2020, pp. 1-6, doi: 10.1109\/ICC40277.2020.9148728.<br \/>[<strong>\ud83d\udd13<\/strong>: <a href=\"https:\/\/arxiv.org\/abs\/1911.08674\">arXiv<\/a> ]<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Publications 2020 &#8211; Present 2026 M. Rahim, I. Azam, S. Cherkaoui, \u201cRIS-Assisted Joint Resource Allocation for 6G FR3 IoT Networks,\u201d arXiv preprint arXiv:2604.02487, Apr.2026. [\ud83d\udd13: arxiv ] D. H. Tashman and S. Cherkaoui, \u201cAdversarial Attacks in AI-Driven RAN Slicing: SLA Violations and Recovery,\u201d arXiv preprint arXiv:2604.01049, Apr. 2026. [\ud83d\udd13: arxiv ] A. Aaraba, S. Cherkaoui, [&hellip;]<\/p>\n","protected":false},"author":15,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"site-sidebar-layout":"right-sidebar","site-content-layout":"page-builder","ast-site-content-layout":"normal-width-container","site-content-style":"default","site-sidebar-style":"unboxed","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-1505","page","type-page","status-publish","hentry"],"rttpg_featured_image_url":null,"rttpg_author":{"display_name":"Wissal Hamhoum","author_link":"https:\/\/lincslab.ca\/en\/author\/wissal-hamhoum\/"},"rttpg_comment":0,"rttpg_category":null,"rttpg_excerpt":"Publications 2020 &#8211; Present 2026 M. Rahim, I. Azam, S. Cherkaoui, \u201cRIS-Assisted Joint Resource Allocation for 6G FR3 IoT Networks,\u201d arXiv preprint arXiv:2604.02487, Apr.2026. [\ud83d\udd13: arxiv ] D. H. Tashman and S. Cherkaoui, \u201cAdversarial Attacks in AI-Driven RAN Slicing: SLA Violations and Recovery,\u201d arXiv preprint arXiv:2604.01049, Apr. 2026. [\ud83d\udd13: arxiv ] A. Aaraba, S. Cherkaoui,&hellip;","_links":{"self":[{"href":"https:\/\/lincslab.ca\/en\/wp-json\/wp\/v2\/pages\/1505","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lincslab.ca\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/lincslab.ca\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/lincslab.ca\/en\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/lincslab.ca\/en\/wp-json\/wp\/v2\/comments?post=1505"}],"version-history":[{"count":1309,"href":"https:\/\/lincslab.ca\/en\/wp-json\/wp\/v2\/pages\/1505\/revisions"}],"predecessor-version":[{"id":8099,"href":"https:\/\/lincslab.ca\/en\/wp-json\/wp\/v2\/pages\/1505\/revisions\/8099"}],"wp:attachment":[{"href":"https:\/\/lincslab.ca\/en\/wp-json\/wp\/v2\/media?parent=1505"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}