Picture for Abdenacer Naouri

Abdenacer Naouri

Maximizing UAV Fog Deployment Efficiency for Critical Rescue Operations

Feb 25, 2024
Viaarxiv icon

Selective Task offloading for Maximum Inference Accuracy and Energy efficient Real-Time IoT Sensing Systems

Feb 24, 2024
Viaarxiv icon

Task Offloading for Smart Glasses in Healthcare: Enhancing Detection of Elevated Body Temperature

Aug 14, 2023
Figure 1 for Task Offloading for Smart Glasses in Healthcare: Enhancing Detection of Elevated Body Temperature
Figure 2 for Task Offloading for Smart Glasses in Healthcare: Enhancing Detection of Elevated Body Temperature
Figure 3 for Task Offloading for Smart Glasses in Healthcare: Enhancing Detection of Elevated Body Temperature
Figure 4 for Task Offloading for Smart Glasses in Healthcare: Enhancing Detection of Elevated Body Temperature
Viaarxiv icon

Context-Aware Service Recommendation System for the Social Internet of Things

Aug 14, 2023
Viaarxiv icon

Blockchain-based Optimized Client Selection and Privacy Preserved Framework for Federated Learning

Jul 25, 2023
Viaarxiv icon

A Multi-Modal Latent-Features based Service Recommendation System for the Social Internet of Things

Jun 01, 2023
Figure 1 for A Multi-Modal Latent-Features based Service Recommendation System for the Social Internet of Things
Figure 2 for A Multi-Modal Latent-Features based Service Recommendation System for the Social Internet of Things
Figure 3 for A Multi-Modal Latent-Features based Service Recommendation System for the Social Internet of Things
Figure 4 for A Multi-Modal Latent-Features based Service Recommendation System for the Social Internet of Things
Viaarxiv icon

Chatbots to ChatGPT in a Cybersecurity Space: Evolution, Vulnerabilities, Attacks, Challenges, and Future Recommendations

May 29, 2023
Figure 1 for Chatbots to ChatGPT in a Cybersecurity Space: Evolution, Vulnerabilities, Attacks, Challenges, and Future Recommendations
Figure 2 for Chatbots to ChatGPT in a Cybersecurity Space: Evolution, Vulnerabilities, Attacks, Challenges, and Future Recommendations
Figure 3 for Chatbots to ChatGPT in a Cybersecurity Space: Evolution, Vulnerabilities, Attacks, Challenges, and Future Recommendations
Figure 4 for Chatbots to ChatGPT in a Cybersecurity Space: Evolution, Vulnerabilities, Attacks, Challenges, and Future Recommendations
Viaarxiv icon