Content
December 2024, Volume 16, Issue 12
- 1-4 Cloud Computing and High Performance Computing (HPC) Advances for Next Generation Internet
by Jerry Chou & Wu-Chun Chung - 1-13 WiFi Fingerprint Indoor Localization Employing Adaboost and Probability-One Access Point Selection for Multi-Floor Campus Buildings
by Shanyu Jin & Dongwoo Kim - 1-14 Assessing the Value of Information in an Augmented Reality City Experience
by Yonit Rusho & Ganit Richter & Daphne Ruth Raban - 1-16 Customer Churn Prediction Approach Based on LLM Embeddings and Logistic Regression
by Meryem Chajia & El Habib Nfaoui - 1-16 Evaluating DL Model Scaling Trade-Offs During Inference via an Empirical Benchmark Analysis
by Demetris Trihinas & Panagiotis Michael & Moysis Symeonides - 1-17 Hierarchical Federated Learning-Based Intrusion Detection for In-Vehicle Networks
by Muzun Althunayyan & Amir Javed & Omer Rana & Theodoros Spyridopoulos - 1-18 Characterising Payload Entropy in Packet Flows—Baseline Entropy Analysis for Network Anomaly Detection
by Anthony Kenyon & Lipika Deka & David Elizondo - 1-19 SIGNIFY: Leveraging Machine Learning and Gesture Recognition for Sign Language Teaching Through a Serious Game
by Luca Ulrich & Giulio Carmassi & Paolo Garelli & Gianluca Lo Presti & Gioele Ramondetti & Giorgia Marullo & Chiara Innocente & Enrico Vezzetti - 1-19 Rethinking Blockchain Technologies for the Maritime Industry: An Overview of the Current Landscape
by Heejoo Kim & Zhe Xiao & Xiaocai Zhang & Xiuju Fu & Zheng Qin - 1-20 Hydrakon, a Framework for Measuring Indicators of Deception in Emulated Monitoring Systems
by Kon Papazis & Naveen Chilamkurti - 1-20 Empowering LLMs with Toolkits: An Open-Source Intelligence Acquisition Method
by Xinyang Yuan & Jiarong Wang & Haozhi Zhao & Tian Yan & Fazhi Qi - 1-20 Opportunities and Challenges of Artificial Intelligence Applied to Identity and Access Management in Industrial Environments
by Jesús Vegas & César Llamas - 1-21 A Latency Composition Analysis for Telerobotic Performance Insights Across Various Network Scenarios
by Nick Bray & Matthew Boeding & Michael Hempel & Hamid Sharif & Tapio Heikkilä & Markku Suomalainen & Tuomas Seppälä - 1-21 Generative AI in Medicine and Healthcare: Moving Beyond the ‘Peak of Inflated Expectations’
by Peng Zhang & Jiayu Shi & Maged N. Kamel Boulos - 1-21 Gaia-X-Med: Experiences with Building Dataspaces for Medical Applications
by Bennet Gerlach & Hannes Hesse & Stefan Fischer & Martin Leucker - 1-22 Multiple PUE Attack Detection in Cooperative Mobile Cognitive Radio Networks
by Ernesto Cadena Muñoz & Gustavo Chica Pedraza & Alexander Aponte Moreno - 1-24 Policy-Based Smart Contracts Management for IoT Privacy Preservation
by Mohsen Rouached & Aymen Akremi & Mouna Macherki & Naoufel Kraiem - 1-24 A Systematic Comparison Between Open- and Closed-Source Large Language Models in the Context of Generating GDPR-Compliant Data Categories for Processing Activity Records
by Magdalena von Schwerin & Manfred Reichert - 1-24 A Novel Six-Dimensional Chimp Optimization Algorithm—Deep Reinforcement Learning-Based Optimization Scheme for Reconfigurable Intelligent Surface-Assisted Energy Harvesting in Batteryless IoT Networks
by Mehrdad Shoeibi & Anita Ershadi Oskouei & Masoud Kaveh - 1-26 Big Data-Driven Deep Learning Ensembler for DDoS Attack Detection
by Abdulrahman A. Alshdadi & Abdulwahab Ali Almazroi & Nasir Ayub & Miltiadis D. Lytras & Eesa Alsolami & Faisal S. Alsubaei - 1-28 Machine Learning Based Localization of LoRa Mobile Wireless Nodes Using a Novel Sectorization Method
by Madiyar Nurgaliyev & Askhat Bolatbek & Batyrbek Zholamanov & Ahmet Saymbetov & Kymbat Kopbay & Evan Yershov & Sayat Orynbassar & Gulbakhar Dosymbetova & Ainur Kapparova & Nurzhigit Kuttybay & Nursultan Koshkarbay - 1-28 A Reordering Buffer Management Method at Edge Gateway in Hybrid IP-ICN Multipath Transmission System
by Yuqi Liu & Rui Han & Xu Wang - 1-31 A Survey on MLLMs in Education: Application and Future Directions
by Weicheng Xing & Tianqing Zhu & Jenny Wang & Bo Liu - 1-43 Advances in Blockchain-Based Internet of Vehicles Application: Prospect for Machine Learning Integration
by Emmanuel Ekene Okere & Vipin Balyan
November 2024, Volume 16, Issue 12
- 1-16 Using Multimodal Foundation Models for Detecting Fake Images on the Internet with Explanations
by Vishnu S. Pendyala & Ashwin Chintalapati - 1-17 A Transfer Reinforcement Learning Approach for Capacity Sharing in Beyond 5G Networks
by Irene Vilà & Jordi Pérez-Romero & Oriol Sallent - 1-17 QRLIT: Quantum Reinforcement Learning for Database Index Tuning
by Diogo Barbosa & Le Gruenwald & Laurent D’Orazio & Jorge Bernardino - 1-18 Detailed Image Captioning and Hashtag Generation
by Nikshep Shetty & Yongmin Li - 1-20 TasksZE: A Task-Based and Challenge-Based Math Serious Game Using Facial Emotion Recognition
by Humberto Marín-Vega & Giner Alor-Hernández & Maritza Bustos-López & Jonathan Hernández-Capistran & Norma Leticia Hernández-Chaparro & Sergio David Ixmatlahua-Diaz - 1-21 MEC Server Status Optimization Framework for Energy Efficient MEC Systems by Taking a Deep-Learning Approach
by Minseok Koo & Jaesung Park - 1-23 Nonlinear Dynamics and Machine Learning for Robotic Control Systems in IoT Applications
by Vesna Antoska Knights & Olivera Petrovska & Jasenka Gajdoš Kljusurić - 1-23 Towards a Comprehensive Metaverse Forensic Framework Based on Technology Task Fit Model
by Amna AlMutawa & Richard Adeyemi Ikuesan & Huwida Said - 1-24 An Ensemble Deep CNN Approach for Power Quality Disturbance Classification: A Technological Route Towards Smart Cities Using Image-Based Transfer
by Mirza Ateeq Ahmed Baig & Naeem Iqbal Ratyal & Adil Amin & Umar Jamil & Sheroze Liaquat & Haris M. Khalid & Muhammad Fahad Zia - 1-25 Optimizing Radio Access for Massive IoT in 6G Through Highly Dynamic Cooperative Software-Defined Sharing of Network Resources
by Faycal Bouhafs & Alessandro Raschella & Michael Mackay & Max Hashem Eiza & Frank den Hartog - 1-25 Gamification of Orthodontic Treatment with Personalised Facemasks: Enhancing Patient Compliance Through Playful Engagement
by Patrizia Marti & Giulia Teverini & Cecilia Goracci & Lorenzo Franchi - 1-26 Real-Time Text-to-Cypher Query Generation with Large Language Models for Graph Databases
by Markus Hornsteiner & Michael Kreussel & Christoph Steindl & Fabian Ebner & Philip Empl & Stefan Schönig - 1-28 Architectural Trends in Collaborative Computing: Approaches in the Internet of Everything Era
by Débora Souza & Gabriele Iwashima & Viviane Cunha Farias da Costa & Carlos Eduardo Barbosa & Jano Moreira de Souza & Geraldo Zimbrão - 1-30 Implementation and Evaluation of a Low-Cost Measurement Platform over LoRa and Applicability for Soil Monitoring
by Dimitrios Loukatos & Athanasios Fragkos & George Kargas & Konstantinos G. Arvanitis - 1-43 Integrating UAVs and RISs in Future Wireless Networks: A Review and Tutorial on IoTs and Vehicular Communications
by Mohsen Eskandari & Andrey V. Savkin
November 2024, Volume 16, Issue 11
- 1-13 Towards a Decentralized Collaborative Framework for Scalable Edge AI
by Ahmed M. Abdelmoniem & Mona Jaber & Ali Anwar & Yuchao Zhang & Mingliang Gao - 1-16 Design and Evaluation of Steganographic Channels in Fifth-Generation New Radio
by Markus Walter & Jörg Keller - 1-16 Automatically Injecting Robustness Statements into Distributed Applications
by Daniele Marletta & Alessandro Midolo & Emiliano Tramontana - 1-16 Eye Tracking and Human Influence Factors’ Impact on Quality of Experience of Mobile Gaming
by Omer Nawaz & Siamak Khatibi & Muhammad Nauman Sheikh & Markus Fiedler - 1-16 Virtualization vs. Containerization, a Comparative Approach for Application Deployment in the Computing Continuum Focused on the Edge
by Hamish Sturley & Augustin Fournier & Andoni Salcedo-Navarro & Miguel Garcia-Pineda & Jaume Segura-Garcia - 1-18 A Secure Auditable Remote Registry Pattern for IoT Systems
by Antonio Maña & Francisco J. Jaime & Lucía Gutiérrez - 1-19 A Methodological Approach to Securing Cyber-Physical Systems for Critical Infrastructures
by Antonello Calabrò & Enrico Cambiaso & Manuel Cheminod & Ivan Cibrario Bertolotti & Luca Durante & Agostino Forestiero & Flavio Lombardi & Giuseppe Manco & Eda Marchetti & Albina Orlando & Giuseppe Papuzzo - 1-19 Identifying Persons of Interest in Digital Forensics Using NLP-Based AI
by Jonathan Adkins & Ali Al Bataineh & Majd Khalaf - 1-19 Fully Open-Source Meeting Minutes Generation Tool
by Amma Liesvarastranta Haz & Yohanes Yohanie Fridelin Panduman & Nobuo Funabiki & Evianita Dewi Fajrianti & Sritrusta Sukaridhoto - 1-20 SBNNR: Small-Size Bat-Optimized KNN Regression
by Rasool Seyghaly & Jordi Garcia & Xavi Masip-Bruin & Jovana Kuljanin - 1-21 AI-Driven Neuro-Monitoring: Advancing Schizophrenia Detection and Management Through Deep Learning and EEG Analysis
by Elena-Anca Paraschiv & Lidia Băjenaru & Cristian Petrache & Ovidiu Bica & Dragoș-Nicolae Nicolau - 1-22 Resilience in the Internet of Medical Things: A Review and Case Study
by Vikas Tomer & Sachin Sharma & Mark Davis - 1-23 An Explainable Deep Learning-Enhanced IoMT Model for Effective Monitoring and Reduction of Maternal Mortality Risks
by Sherine Nagy Saleh & Mazen Nabil Elagamy & Yasmine N. M. Saleh & Radwa Ahmed Osman - 1-24 An Effective Ensemble Approach for Preventing and Detecting Phishing Attacks in Textual Form
by Zaher Salah & Hamza Abu Owida & Esraa Abu Elsoud & Esraa Alhenawi & Suhaila Abuowaida & Nawaf Alshdaifat - 1-24 Enhanced Long-Range Network Performance of an Oil Pipeline Monitoring System Using a Hybrid Deep Extreme Learning Machine Model
by Abbas Kubba & Hafedh Trabelsi & Faouzi Derbel - 1-24 Flexible Hyper-Distributed IoT–Edge–Cloud Platform for Real-Time Digital Twin Applications on 6G-Intended Testbeds for Logistics and Industry
by Maria Crespo-Aguado & Raul Lozano & Fernando Hernandez-Gobertti & Nuria Molner & David Gomez-Barquero - 1-26 Machine Learning-Based Resource Allocation Algorithm to Mitigate Interference in D2D-Enabled Cellular Networks
by Md Kamruzzaman & Nurul I. Sarkar & Jairo Gutierrez - 1-26 Capacity and Coverage Dimensioning for 5G Standalone Mixed-Cell Architecture: An Impact of Using Existing 4G Infrastructure
by Naba Raj Khatiwoda & Babu Ram Dawadi & Sashidhar Ram Joshi - 1-26 Fault Prediction and Reconfiguration Optimization in Smart Grids: AI-Driven Approach
by David Carrascal & Paula Bartolomé & Elisa Rojas & Diego Lopez-Pajares & Nicolas Manso & Javier Diaz-Fuentes - 1-27 Approaches to Identifying Emotions and Affections During the Museum Learning Experience in the Context of the Future Internet
by Iana Fominska & Stefano Di Tore & Michele Nappi & Gerardo Iovane & Maurizio Sibilio & Angela Gelo - 1-28 A Joint Survey in Decentralized Federated Learning and TinyML: A Brief Introduction to Swarm Learning
by Evangelia Fragkou & Dimitrios Katsaros - 1-30 Visualisation Design Ideation with AI: A New Framework, Vocabulary, and Tool
by Aron E. Owen & Jonathan C. Roberts - 1-30 Privacy-Preserving Data Analytics in Internet of Medical Things
by Bakhtawar Mudassar & Shahzaib Tahir & Fawad Khan & Syed Aziz Shah & Syed Ikram Shah & Qammer Hussain Abbasi - 1-30 Real-Time Evaluation of the Improved Eagle Strategy Model in the Internet of Things
by Venushini Rajendran & R Kanesaraj Ramasamy - 1-30 Advancing Additive Manufacturing Through Machine Learning Techniques: A State-of-the-Art Review
by Shaoping Xiao & Junchao Li & Zhaoan Wang & Yingbin Chen & Soheyla Tofighi - 1-33 Enhancing Communication Security in Drones Using QRNG in Frequency Hopping Spread Spectrum
by J. de Curtò & I. de Zarzà & Juan-Carlos Cano & Carlos T. Calafate - 1-35 6G Use Cases and Scenarios: A Comparison Analysis Between ITU and Other Initiatives
by Alessandro Vizzarri & Franco Mazzenga - 1-41 Recent Advancements in Federated Learning: State of the Art, Fundamentals, Principles, IoT Applications and Future Trends
by Christos Papadopoulos & Konstantinos-Filippos Kollias & George F. Fragulis
October 2024, Volume 16, Issue 11
- 1-2 Key Enabling Technologies for Beyond 5G Networks
by Dania Marabissi & Lorenzo Mucchi - 1-3 Editorial for the Special Issue on Moving Towards 6G Wireless Technologies
by Alessandro Raschella & Michael Mackay - 1-14 Empowering Healthcare: TinyML for Precise Lung Disease Classification
by Youssef Abadade & Nabil Benamar & Miloud Bagaa & Habiba Chaoui - 1-14 Streaming and Elastic Traffic Service in 5G-Sliced Wireless Networks and Mutual Utilization of Guaranteed Resource Units
by Yves Adou & Ekaterina Markova & Yuliya Gaidamaka - 1-14 Deep Reinforcement Learning for UAV-Based SDWSN Data Collection
by Pejman A. Karegar & Duaa Zuhair Al-Hamid & Peter Han Joo Chong - 1-16 A Modified TCP BBR to Enable High Fairness in High-Speed Wireless Networks
by Jinlin Xu & Wansu Pan & Haibo Tan & Longle Cheng & Xiru Li & Xiaofeng Li - 1-18 On Exploiting and Implementing Collaborative Virtual and Augmented Reality in a Cloud Continuum Scenario
by Beniamino Di Martino & Gennaro Junior Pezzullo & Vincenzo Bombace & Ling-Huey Li & Kuan-Ching Li - 1-19 Predicting the Duration of Forest Fires Using Machine Learning Methods
by Constantina Kopitsa & Ioannis G. Tsoulos & Vasileios Charilogis & Athanassios Stavrakoudis - 1-22 Accelerating and Compressing Transformer-Based PLMs for Enhanced Comprehension of Computer Terminology
by Jian Peng & Kai Zhong - 1-22 Connection-Aware Digital Twin for Mobile Adhoc Networks in the 5G Era
by Manuel Jesús-Azabal & Zheng Zhang & Bingxia Gao & Jing Yang & Vasco N. G. J. Soares - 1-23 A Decentralized Digital Watermarking Framework for Secure and Auditable Video Data in Smart Vehicular Networks
by Xinyun Liu & Ronghua Xu & Yu Chen - 1-23 Uncertainty-Aware Time Series Anomaly Detection
by Paul Wiessner & Grigor Bezirganyan & Sana Sellami & Richard Chbeir & Hans-Joachim Bungartz - 1-24 Lightweight Digit Recognition in Smart Metering System Using Narrowband Internet of Things and Federated Learning
by Vladimir Nikić & Dušan Bortnik & Milan Lukić & Dejan Vukobratović & Ivan Mezei - 1-25 Three-Dimensional Drone Cell Placement: Drone Placement for Optimal Coverage
by Aniket Basu & Hooman Oroojeni & Georgios Samakovitis & Mohammad Majid Al-Rifaie - 1-27 Optimizing Multi-Tier Scheduling and Secure Routing in Edge-Assisted Software-Defined Wireless Sensor Network Environment Using Moving Target Defense and AI Techniques
by As’ad Mahmoud As’ad Alnaser & Said S. Saloum & Ahmed A. M. Sharadqh & Hazem (Moh’d Said) Hatamleh - 1-27 Decentralizing Democracy: Secure and Transparent E-Voting Systems with Blockchain Technology in the Context of Palestine
by Eman Daraghmi & Ahmed Hamoudi & Mamoun Abu Helou - 1-32 Cybersecurity Maintenance in the Automotive Industry Challenges and Solutions: A Technology Adoption Approach
by Ignacio Fernandez de Arroyabe & Tim Watson & Iain Phillips - 1-33 Health IoT Threats: Survey of Risks and Vulnerabilities
by Samaneh Madanian & Tserendorj Chinbat & Maduka Subasinghage & David Airehrour & Farkhondeh Hassandoust & Sira Yongchareon - 1-42 Machine Learning and IoT-Based Solutions in Industrial Applications for Smart Manufacturing: A Critical Review
by Paolo Visconti & Giuseppe Rausa & Carolina Del-Valle-Soto & Ramiro Velázquez & Donato Cafagna & Roberto De Fazio
September 2024, Volume 16, Issue 10
- 1-13 An Intelligent System for Determining Driver Anxiety Level: A Comparison Study of Two Fuzzy-Based Models
by Yi Liu & Leonard Barolli - 1-17 Context-Driven Service Deployment Using Likelihood-Based Approach for Internet of Things Scenarios
by Nandan Banerji & Chayan Paul & Bikash Debnath & Biplab Das & Gurpreet Singh Chhabra & Bhabendu Kumar Mohanta & Ali Ismail Awad - 1-19 Predicting Missing Values in Survey Data Using Prompt Engineering for Addressing Item Non-Response
by Junyung Ji & Jiwoo Kim & Younghoon Kim - 1-19 AI Governance in Higher Education: Case Studies of Guidance at Big Ten Universities
by Chuhao Wu & He Zhang & John M. Carroll - 1-23 Generating Process Models by Interacting with Chatbots—A Literature Review
by Luca Franziska Hörner & Manfred Reichert - 1-23 Multi-User Optimal Load Scheduling of Different Objectives Combined with Multi-Criteria Decision Making for Smart Grid
by Yaarob Al-Nidawi & Haider Tarish Haider & Dhiaa Halboot Muhsen & Ghadeer Ghazi Shayea - 1-24 Automated Detection of Misinformation: A Hybrid Approach for Fake News Detection
by Fadi Mohsen & Bedir Chaushi & Hamed Abdelhaq & Dimka Karastoyanova & Kevin Wang - 1-25 A Secure Key Exchange and Authentication Scheme for Securing Communications in the Internet of Things Environment
by Ali Peivandizadeh & Haitham Y. Adarbah & Behzad Molavi & Amirhossein Mohajerzadeh & Ali H. Al-Badi - 1-27 Digital Transformation in Maritime Ports: Defining Smart Gates through Process Improvement in a Portuguese Container Terminal
by Juliana Basulo-Ribeiro & Carina Pimentel & Leonor Teixeira - 1-35 Blockchain-Driven Generalization of Policy Management for Multiproduct Insurance Companies
by Abraham Romero & Roberto Hernandez
October 2024, Volume 16, Issue 10
- 1-4 Correction: Vasilas et al. Beat the Heat: Syscall Attack Detection via Thermal Side Channel. Future Internet 2024, 16 , 301
by Teodora Vasilas & Claudiu Bacila & Remus Brad - 1-14 SPDepth: Enhancing Self-Supervised Indoor Monocular Depth Estimation via Self-Propagation
by Xiaotong Guo & Huijie Zhao & Shuwei Shao & Xudong Li & Baochang Zhang & Na Li - 1-15 Employing Huber and TAP Losses to Improve Inter-SubNet in Speech Enhancement
by Jeih-Weih Hung & Pin-Chen Huang & Li-Yin Li - 1-15 Healthiness and Safety of Smart Environments through Edge Intelligence and Internet of Things Technologies
by Rafiq Ul Islam & Pasquale Mazzei & Claudio Savaglio - 1-16 Stance Detection in the Context of Fake News—A New Approach
by Izzat Alsmadi & Iyad Alazzam & Mohammad Al-Ramahi & Mohammad Zarour - 1-17 Enhancing Heart Disease Prediction with Federated Learning and Blockchain Integration
by Yazan Otoum & Chaosheng Hu & Eyad Haj Said & Amiya Nayak - 1-18 Multi-Source Data Fusion for Vehicle Maintenance Project Prediction
by Fanghua Chen & Deguang Shang & Gang Zhou & Ke Ye & Guofang Wu - 1-19 Collision Avoidance Adaptive Data Rate Algorithm for LoRaWAN
by Rachel Kufakunesu & Gerhard P. Hancke & Adnan M. Abu-Mahfouz - 1-20 An IoT-Enhanced Traffic Light Control System with Arduino and IR Sensors for Optimized Traffic Patterns
by Kian Raheem Qasim & Noor M. Naser & Ahmed J. Jabur - 1-20 Securing the Edge: CatBoost Classifier Optimized by the Lyrebird Algorithm to Detect Denial of Service Attacks in Internet of Things-Based Wireless Sensor Networks
by Sennanur Srinivasan Abinayaa & Prakash Arumugam & Divya Bhavani Mohan & Anand Rajendran & Abderezak Lashab & Baoze Wei & Josep M. Guerrero - 1-21 A Systematic Review and Multifaceted Analysis of the Integration of Artificial Intelligence and Blockchain: Shaping the Future of Australian Higher Education
by Mahmoud Elkhodr & Ketmanto Wangsa & Ergun Gide & Shakir Karim - 1-22 An Intrusion Detection System for 5G SDN Network Utilizing Binarized Deep Spiking Capsule Fire Hawk Neural Networks and Blockchain Technology
by Nanavath Kiran Singh Nayak & Budhaditya Bhattacharyya - 1-22 Countering Social Media Cybercrime Using Deep Learning: Instagram Fake Accounts Detection
by Najla Alharbi & Bashayer Alkalifah & Ghaida Alqarawi & Murad A. Rassam - 1-22 A Performance Benchmark for the PostgreSQL and MySQL Databases
by Sanket Vilas Salunke & Abdelkader Ouda - 1-23 Combating Web Tracking: Analyzing Web Tracking Technologies for User Privacy
by Kyungmin Sim & Honyeong Heo & Haehyun Cho - 1-27 New Model for Defining and Implementing Performance Tests
by Marek Bolanowski & Michał Ćmil & Adrian Starzec - 1-27 Internet of Things and Distributed Computing Systems in Business Models
by Albérico Travassos Rosário & Ricardo Raimundo - 1-28 Internet of Things Adoption in Technology Ecosystems Within the Central African Region: The Case of Silicon Mountain
by Godlove Suila Kuaban & Valery Nkemeni & Onyeka J. Nwobodo & Piotr Czekalski & Fabien Mieyeville - 1-29 Decentralized Web3 Reshaping Internet Governance: Towards the Emergence of New Forms of Nation-Statehood?
by Igor Calzada - 1-29 Large Language Models Meet Next-Generation Networking Technologies: A Review
by Ching-Nam Hang & Pei-Duo Yu & Roberto Morabito & Chee-Wei Tan - 1-29 Malware Detection Based on API Call Sequence Analysis: A Gated Recurrent Unit–Generative Adversarial Network Model Approach
by Nsikak Owoh & John Adejoh & Salaheddin Hosseinzadeh & Moses Ashawa & Jude Osamor & Ayyaz Qureshi - 1-30 Decoding Urban Intelligence: Clustering and Feature Importance in Smart Cities
by Enrico Barbierato & Alice Gatti - 1-31 Advanced Optimization Techniques for Federated Learning on Non-IID Data
by Filippos Efthymiadis & Aristeidis Karras & Christos Karras & Spyros Sioutas - 1-37 A Survey of Security Strategies in Federated Learning: Defending Models, Data, and Privacy
by Habib Ullah Manzoor & Attia Shabbir & Ao Chen & David Flynn & Ahmed Zoha - 1-38 Towards Ensemble Feature Selection for Lightweight Intrusion Detection in Resource-Constrained IoT Devices
by Mahawish Fatima & Osama Rehman & Ibrahim M. H. Rahman & Aisha Ajmal & Simon Jigwan Park - 1-42 Mobility–Multihoming Duality
by Ryo Yanagida & Saleem Noel Bhatti - 1-52 A Survey of the Real-Time Metaverse: Challenges and Opportunities
by Mohsen Hatami & Qian Qu & Yu Chen & Hisham Kholidy & Erik Blasch & Erika Ardiles-Cruz
September 2024, Volume 16, Issue 9
- 1-13 Decentralized Mechanism for Edge Node Allocation in Access Network: An Experimental Evaluation
by Jesus Calle-Cancho & Carlos Cañada & Rafael Pastor-Vargas & Mercedes E. Paoletti & Juan M. Haut - 1-15 Machine Learning for Blockchain and IoT Systems in Smart Cities: A Survey
by Elias Dritsas & Maria Trigka - 1-17 Privacy-Preserving Authentication Based on PUF for VANETs
by Lihui Li & Hanwen Deng & Zhongyi Zhai & Sheng-Lung Peng - 1-17 Traffic Classification in Software-Defined Networking Using Genetic Programming Tools
by Spiridoula V. Margariti & Ioannis G. Tsoulos & Evangelia Kiousi & Eleftherios Stergiou - 1-19 Workflow Trace Profiling and Execution Time Analysis in Quantitative Verification
by Guoxin Su & Li Liu - 1-19 Determinants to Adopt Industrial Internet of Things in Small and Medium-Sized Enterprises
by Abdullah Khanfor - 1-19 Industry 4.0 and Beyond: The Role of 5G, WiFi 7, and Time-Sensitive Networking (TSN) in Enabling Smart Manufacturing
by Jobish John & Md. Noor-A-Rahim & Aswathi Vijayan & H. Vincent Poor & Dirk Pesch - 1-20 Application of Fuzzy Logic for Horizontal Scaling in Kubernetes Environments within the Context of Edge Computing
by Sérgio N. Silva & Mateus A. S. de S. Goldbarg & Lucileide M. D. da Silva & Marcelo A. C. Fernandes - 1-20 A New Framework for Enhancing VANETs through Layer 2 DLT Architectures with Multiparty Threshold Key Management and PETs
by Haitham Y. Adarbah & Mehmet Sabir Kiraz & Suleyman Kardas & Ali H. Al-Bayatti & Hilal M. Y. Al-Bayatti - 1-20 Time-Efficient Neural-Network-Based Dynamic Area Optimization Algorithm for High-Altitude Platform Station Mobile Communications
by Wataru Takabatake & Yohei Shibata & Kenji Hoshino & Tomoaki Ohtsuki - 1-20 A Task Offloading and Resource Allocation Strategy Based on Multi-Agent Reinforcement Learning in Mobile Edge Computing
by Guiwen Jiang & Rongxi Huang & Zhiming Bao & Gaocai Wang - 1-20 Implementation of White-Hat Worms Using Mirai Source Code and Its Optimization through Parameter Tuning
by Yudai Yamamoto & Aoi Fukushima & Shingo Yamaguchi - 1-22 A Novel Framework for Cross-Cluster Scaling in Cloud-Native 5G NextGen Core
by Oana-Mihaela Dumitru-Guzu & Vlădeanu Călin & Robert Kooij - 1-22 Optimizing Network Performance: A Comparative Analysis of EIGRP, OSPF, and BGP in IPv6-Based Load-Sharing and Link-Failover Systems
by Kamal Shahid & Saleem Naseer Ahmad & Syed Tahir Hussain Rizvi - 1-24 Developing a Secure Service Ecosystem to Implement the Intelligent Edge Environment for Smart Cities
by Gayathri Karthick & Glenford Mapp - 1-24 A Micro-Segmentation Method Based on VLAN-VxLAN Mapping Technology
by Di Li & Zhibang Yang & Siyang Yu & Mingxing Duan & Shenghong Yang - 1-24 Enhancing Elderly Care through Low-Cost Wireless Sensor Networks and Artificial Intelligence: A Study on Vital Sign Monitoring and Sleep Improvement
by Carolina Del-Valle-Soto & Ramon A. Briseño & Ramiro Velázquez & Gabriel Guerra-Rosales & Santiago Perez-Ochoa & Isaac H. Preciado-Bazavilvazo & Paolo Visconti & José Varela-Aldás - 1-25 Internet of Conscious Things: Ontology-Based Social Capabilities for Smart Objects
by Michele Ruta & Floriano Scioscia & Giuseppe Loseto & Agnese Pinto & Corrado Fasciano & Giovanna Capurso & Eugenio Di Sciascio - 1-25 A Complete EDA and DL Pipeline for Softwarized 5G Network Intrusion Detection
by Abdallah Moubayed - 1-25 Measuring the Effectiveness of Carbon-Aware AI Training Strategies in Cloud Instances: A Confirmation Study
by Roberto Vergallo & Luca Mainetti - 1-25 Parallel and Distributed Frugal Tracking of a Quantile
by Italo Epicoco & Marco Pulimeno & Massimo Cafaro - 1-26 Recommendation-Based Trust Evaluation Model for the Internet of Underwater Things
by Abeer Almutairi & Xavier Carpent & Steven Furnell - 1-28 Edge Computing in Healthcare: Innovations, Opportunities, and Challenges
by Alexandru Rancea & Ionut Anghel & Tudor Cioara - 1-28 Alquist 5.0: Dialogue Trees Meet Generative Models, a Novel Approach for Enhancing SocialBot Conversations
by Ondrej Kobza & David Herel & Jan Cuhel & Tommaso Gargiani & Petr Marek & Jan Sedivy - 1-31 Efficient Data Exchange between WebAssembly Modules
by Lucas Silva & José Metrôlho & Fernando Ribeiro - 1-31 An Improved Routing Protocol for Optimum Quality of Service in Device-to-Device and Energy Efficiency in 5G/B5G
by Sanusi Mohammad Bunu & Omar Younis Alani & Mohammad Saraee - 1-32 Are Strong Baselines Enough? False News Detection with Machine Learning
by Lara Aslan & Michal Ptaszynski & Jukka Jauhiainen - 1-33 On the Fairness of Internet Congestion Control over WiFi with Deep Reinforcement Learning
by Shyam Kumar Shrestha & Shiva Raj Pokhrel & Jonathan Kua - 1-33 Artificial Intelligence to Reshape the Healthcare Ecosystem
by Gianluca Reali & Mauro Femminella - 1-34 Graph Attention Networks: A Comprehensive Review of Methods and Applications
by Aristidis G. Vrahatis & Konstantinos Lazaros & Sotiris Kotsiantis - 1-35 Vulnerability Detection and Classification of Ethereum Smart Contracts Using Deep Learning
by Raed M. Bani-Hani & Ahmed S. Shatnawi & Lana Al-Yahya - 1-40 A Review on Millimeter-Wave Hybrid Beamforming for Wireless Intelligent Transport Systems
by Waleed Shahjehan & Rajkumar Singh Rathore & Syed Waqar Shah & Mohammad Aljaidi & Ali Safaa Sadiq & Omprakash Kaiwartya
August 2024, Volume 16, Issue 9
- 1-14 AI Services-Oriented Dynamic Computing Resource Scheduling Algorithm Based on Distributed Data Parallelism in Edge Computing Network of Smart Grid
by Jing Zou & Peizhe Xin & Chang Wang & Heli Zhang & Lei Wei & Ying Wang - 1-15 Personalized Visualization of the Gestures of Parkinson’s Disease Patients with Virtual Reality
by Konstantinos Sakkas & Eirini Georgia Dimitriou & Niki Eleni Ntagka & Nikolaos Giannakeas & Konstantinos Kalafatakis & Alexandros T. Tzallas & Evripidis Glavas - 1-16 A Survey on Data Availability in Layer 2 Blockchain Rollups: Open Challenges and Future Improvements
by Muhammad Bin Saif & Sara Migliorini & Fausto Spoto - 1-18 Evaluation of a New-Concept Secure File Server Solution
by Gábor Arányi & Ágnes Vathy-Fogarassy & Veronika Szücs - 1-18 Predictive Maintenance Based on Identity Resolution and Transformers in IIoT
by Zhibo Qi & Lei Du & Ru Huo & Tao Huang - 1-19 PrismParser: A Framework for Implementing Efficient P4-Programmable Packet Parsers on FPGA
by Parisa Mashreghi-Moghadam & Tarek Ould-Bachir & Yvon Savaria - 1-22 Increasing the Security of Network Data Transmission with a Configurable Hardware Firewall Based on Field Programmable Gate Arrays
by Marco Grossi & Fabrizio Alfonsi & Marco Prandini & Alessandro Gabrielli - 1-23 The Digital Footprints on the Run: A Forensic Examination of Android Running Workout Applications
by Fabian Nunes & Patrício Domingues & Miguel Frade - 1-24 Improved Adaptive Backoff Algorithm for Optimal Channel Utilization in Large-Scale IEEE 802.15.4-Based Wireless Body Area Networks
by Mounib Khanafer & Mouhcine Guennoun & Mohammed El-Abd & Hussein T. Mouftah - 1-27 A Multiparty Quantum Private Equality Comparison Scheme Relying on | GHZ 3 〉 States
by Theodore Andronikos & Alla Sirokofskich - 1-29 User Mobility Modeling in Crowdsourcing Application to Prevent Inference Attacks
by Farid Yessoufou & Salma Sassi & Elie Chicha & Richard Chbeir & Jules Degila - 1-32 Artificial Intelligence Applications in Smart Healthcare: A Survey
by Xian Gao & Peixiong He & Yi Zhou & Xiao Qin - 1-33 CrossDeFi: A Novel Cross-Chain Communication Protocol
by Shezon Saleem Mohammed Abdul & Anup Shrestha & Jianming Yong
August 2024, Volume 16, Issue 8
- 1-12 Establishing a Model for the User Acceptance of Cybersecurity Training
by Wesam Fallatah & Joakim Kävrestad & Steven Furnell - 1-13 Dynamic Storage Optimization for Communication between AI Agents
by Andrei Tara & Hjalmar K. Turesson & Nicolae Natea - 1-15 Advanced Denoising and Meta-Learning Techniques for Enhancing Smart Health Monitoring Using Wearable Sensors
by Minyechil Alehegn Tefera & Amare Mulatie Dehnaw & Yibeltal Chanie Manie & Cheng-Kai Yao & Shegaw Demessie Bogale & Peng-Chun Peng - 1-16 Masketeer: An Ensemble-Based Pseudonymization Tool with Entity Recognition for German Unstructured Medical Free Text
by Martin Baumgartner & Karl Kreiner & Fabian Wiesmüller & Dieter Hayn & Christian Puelacher & Günter Schreier - 1-16 Cross-Domain Fake News Detection Using a Prompt-Based Approach
by Jawaher Alghamdi & Yuqing Lin & Suhuai Luo - 1-16 Multi-Agent Deep-Q Network-Based Cache Replacement Policy for Content Delivery Networks
by Janith K. Dassanayake & Minxiao Wang & Muhammad Z. Hameed & Ning Yang - 1-16 Development of a Novel Open Control System Implementation Method under Industrial IoT
by Lisi Liu & Zijie Xu & Xiaobin Qu - 1-17 Dynamic Graph Representation Learning for Passenger Behavior Prediction
by Mingxuan Xie & Tao Zou & Junchen Ye & Bowen Du & Runhe Huang - 1-18 Leveraging Internet News-Based Data for Rockfall Hazard Susceptibility Assessment on Highways
by Kieu Anh Nguyen & Yi-Jia Jiang & Chiao-Shin Huang & Meng-Hsun Kuo & Walter Chen - 1-19 TRUST-ME : Trust-Based Resource Allocation and Server Selection in Multi-Access Edge Computing
by Sean Tsikteris & Aisha B Rahman & Md. Sadman Siraj & Eirini Eleni Tsiropoulou - 1-19 A Survey on Emerging Blockchain Technology Platforms for Securing the Internet of Things
by Yunus Kareem & Djamel Djenouri & Essam Ghadafi - 1-19 An Innovative Recompression Scheme for VQ Index Tables
by Yijie Lin & Jui-Chuan Liu & Ching-Chun Chang & Chin-Chen Chang - 1-20 Explainable Artificial Intelligence Approach for Improving Head-Mounted Fault Display Systems
by Abdelaziz Bouzidi & Lala Rajaoarisoa & Luka Claeys - 1-20 A Microservice-Based Smart Agriculture System to Detect Animal Intrusion at the Edge
by Jinpeng Miao & Dasari Rajasekhar & Shivakant Mishra & Sanjeet Kumar Nayak & Ramanarayan Yadav - 1-21 Dynamic Fashion Video Synthesis from Static Imagery
by Tasin Islam & Alina Miron & Xiaohui Liu & Yongmin Li - 1-22 Estimating Interception Density in the BB84 Protocol: A Study with a Noisy Quantum Simulator
by Francesco Fiorini & Michele Pagano & Rosario Giuseppe Garroppo & Antonio Osele - 1-22 Blockchain Technology and Its Potential to Benefit Public Services Provision: A Short Survey
by Giorgio Piccardo & Lorenzo Conti & Alessio Martino - 1-22 Wireless and Fiber-Based Post-Quantum-Cryptography-Secured IPsec Tunnel
by Daniel Christian Lawo & Rana Abu Bakar & Abraham Cano Aguilera & Filippo Cugini & José Luis Imaña & Idelfonso Tafur Monroy & Juan Jose Vegas Olmos - 1-22 A Method to Optimize Deployment of Directional Sensors for Coverage Enhancement in the Sensing Layer of IoT
by Peng Wang & Yonghua Xiong - 1-23 Virtual Reality in the Classroom: Transforming the Teaching of Electrical Circuits in the Digital Age
by Diego Alejandro Albarracin-Acero & Fidel Alfonso Romero-Toledo & Claudia Esperanza Saavedra-Bautista & Edwan Anderson Ariza-Echeverri - 1-24 Machine Learning-Assisted Dynamic Proximity-Driven Sorting Algorithm for Supermarket Navigation Optimization: A Simulation-Based Validation
by Vincent Abella & Johnfil Initan & Jake Mark Perez & Philip Virgil Astillo & Luis Gerardo Cañete & Gaurav Choudhary - 1-24 Testing Stimulus Equivalence in Transformer-Based Agents
by Alexis Carrillo & Moisés Betancort - 1-25 Overlay and Virtual Private Networks Security Performances Analysis with Open Source Infrastructure Deployment
by Antonio Francesco Gentile & Davide Macrì & Emilio Greco & Peppino Fazio - 1-25 Multi-Class Intrusion Detection Based on Transformer for IoT Networks Using CIC-IoT-2023 Dataset
by Shu-Ming Tseng & Yan-Qi Wang & Yung-Chung Wang - 1-27 Beat the Heat: Syscall Attack Detection via Thermal Side Channel
by Teodora Vasilas & Claudiu Bacila & Remus Brad - 1-28 FIVADMI: A Framework for In-Vehicle Anomaly Detection by Monitoring and Isolation
by Khaled Mahbub & Antonio Nehme & Mohammad Patwary & Marc Lacoste & Sylvain Allio - 1-29 A Survey on the Use of Large Language Models (LLMs) in Fake News
by Eleftheria Papageorgiou & Christos Chronis & Iraklis Varlamis & Yassine Himeur - 1-33 Artificial Intelligence of Things as New Paradigm in Aviation Health Monitoring Systems
by Igor Kabashkin & Leonid Shoshin - 1-37 Early Ransomware Detection with Deep Learning Models
by Matan Davidian & Michael Kiperberg & Natalia Vanetik
July 2024, Volume 16, Issue 8
- 1-15 Performance Evaluation of Lightweight Stream Ciphers for Real-Time Video Feed Encryption on ARM Processor
by Mohsin Khan & Håvard Dagenborg & Dag Johansen - 1-15 A Low-Complexity Solution for Optimizing Binary Intelligent Reflecting Surfaces towards Wireless Communication
by Santosh A. Janawade & Prabu Krishnan & Krishnamoorthy Kandasamy & Shashank S. Holla & Karthik Rao & Aditya Chandrasekar