Content
November 2024, Volume 16, Issue 11
- 1-13 Towards a Decentralized Collaborative Framework for Scalable Edge AI
by Ahmed M. Abdelmoniem & Mona Jaber & Ali Anwar & Yuchao Zhang & Mingliang Gao - 1-16 Design and Evaluation of Steganographic Channels in Fifth-Generation New Radio
by Markus Walter & Jörg Keller - 1-16 Automatically Injecting Robustness Statements into Distributed Applications
by Daniele Marletta & Alessandro Midolo & Emiliano Tramontana - 1-16 Eye Tracking and Human Influence Factors’ Impact on Quality of Experience of Mobile Gaming
by Omer Nawaz & Siamak Khatibi & Muhammad Nauman Sheikh & Markus Fiedler - 1-18 A Secure Auditable Remote Registry Pattern for IoT Systems
by Antonio Maña & Francisco J. Jaime & Lucía Gutiérrez - 1-19 A Methodological Approach to Securing Cyber-Physical Systems for Critical Infrastructures
by Antonello Calabrò & Enrico Cambiaso & Manuel Cheminod & Ivan Cibrario Bertolotti & Luca Durante & Agostino Forestiero & Flavio Lombardi & Giuseppe Manco & Eda Marchetti & Albina Orlando & Giuseppe Papuzzo - 1-20 SBNNR: Small-Size Bat-Optimized KNN Regression
by Rasool Seyghaly & Jordi Garcia & Xavi Masip-Bruin & Jovana Kuljanin - 1-21 AI-Driven Neuro-Monitoring: Advancing Schizophrenia Detection and Management Through Deep Learning and EEG Analysis
by Elena-Anca Paraschiv & Lidia Băjenaru & Cristian Petrache & Ovidiu Bica & Dragoș-Nicolae Nicolau - 1-23 An Explainable Deep Learning-Enhanced IoMT Model for Effective Monitoring and Reduction of Maternal Mortality Risks
by Sherine Nagy Saleh & Mazen Nabil Elagamy & Yasmine N. M. Saleh & Radwa Ahmed Osman - 1-24 An Effective Ensemble Approach for Preventing and Detecting Phishing Attacks in Textual Form
by Zaher Salah & Hamza Abu Owida & Esraa Abu Elsoud & Esraa Alhenawi & Suhaila Abuowaida & Nawaf Alshdaifat - 1-26 Machine Learning-Based Resource Allocation Algorithm to Mitigate Interference in D2D-Enabled Cellular Networks
by Md Kamruzzaman & Nurul I. Sarkar & Jairo Gutierrez - 1-26 Capacity and Coverage Dimensioning for 5G Standalone Mixed-Cell Architecture: An Impact of Using Existing 4G Infrastructure
by Naba Raj Khatiwoda & Babu Ram Dawadi & Sashidhar Ram Joshi - 1-27 Approaches to Identifying Emotions and Affections During the Museum Learning Experience in the Context of the Future Internet
by Iana Fominska & Stefano Di Tore & Michele Nappi & Gerardo Iovane & Maurizio Sibilio & Angela Gelo - 1-28 A Joint Survey in Decentralized Federated Learning and TinyML: A Brief Introduction to Swarm Learning
by Evangelia Fragkou & Dimitrios Katsaros - 1-30 Visualisation Design Ideation with AI: A New Framework, Vocabulary, and Tool
by Aron E. Owen & Jonathan C. Roberts - 1-30 Privacy-Preserving Data Analytics in Internet of Medical Things
by Bakhtawar Mudassar & Shahzaib Tahir & Fawad Khan & Syed Aziz Shah & Syed Ikram Shah & Qammer Hussain Abbasi - 1-30 Real-Time Evaluation of the Improved Eagle Strategy Model in the Internet of Things
by Venushini Rajendran & R Kanesaraj Ramasamy - 1-30 Advancing Additive Manufacturing Through Machine Learning Techniques: A State-of-the-Art Review
by Shaoping Xiao & Junchao Li & Zhaoan Wang & Yingbin Chen & Soheyla Tofighi - 1-33 Enhancing Communication Security in Drones Using QRNG in Frequency Hopping Spread Spectrum
by J. de Curtò & I. de Zarzà & Juan-Carlos Cano & Carlos T. Calafate - 1-35 6G Use Cases and Scenarios: A Comparison Analysis Between ITU and Other Initiatives
by Alessandro Vizzarri & Franco Mazzenga - 1-41 Recent Advancements in Federated Learning: State of the Art, Fundamentals, Principles, IoT Applications and Future Trends
by Christos Papadopoulos & Konstantinos-Filippos Kollias & George F. Fragulis
October 2024, Volume 16, Issue 11
- 1-2 Key Enabling Technologies for Beyond 5G Networks
by Dania Marabissi & Lorenzo Mucchi - 1-3 Editorial for the Special Issue on Moving Towards 6G Wireless Technologies
by Alessandro Raschella & Michael Mackay - 1-14 Empowering Healthcare: TinyML for Precise Lung Disease Classification
by Youssef Abadade & Nabil Benamar & Miloud Bagaa & Habiba Chaoui - 1-14 Streaming and Elastic Traffic Service in 5G-Sliced Wireless Networks and Mutual Utilization of Guaranteed Resource Units
by Yves Adou & Ekaterina Markova & Yuliya Gaidamaka - 1-14 Deep Reinforcement Learning for UAV-Based SDWSN Data Collection
by Pejman A. Karegar & Duaa Zuhair Al-Hamid & Peter Han Joo Chong - 1-16 A Modified TCP BBR to Enable High Fairness in High-Speed Wireless Networks
by Jinlin Xu & Wansu Pan & Haibo Tan & Longle Cheng & Xiru Li & Xiaofeng Li - 1-18 On Exploiting and Implementing Collaborative Virtual and Augmented Reality in a Cloud Continuum Scenario
by Beniamino Di Martino & Gennaro Junior Pezzullo & Vincenzo Bombace & Ling-Huey Li & Kuan-Ching Li - 1-19 Predicting the Duration of Forest Fires Using Machine Learning Methods
by Constantina Kopitsa & Ioannis G. Tsoulos & Vasileios Charilogis & Athanassios Stavrakoudis - 1-22 Accelerating and Compressing Transformer-Based PLMs for Enhanced Comprehension of Computer Terminology
by Jian Peng & Kai Zhong - 1-22 Connection-Aware Digital Twin for Mobile Adhoc Networks in the 5G Era
by Manuel Jesús-Azabal & Zheng Zhang & Bingxia Gao & Jing Yang & Vasco N. G. J. Soares - 1-23 A Decentralized Digital Watermarking Framework for Secure and Auditable Video Data in Smart Vehicular Networks
by Xinyun Liu & Ronghua Xu & Yu Chen - 1-23 Uncertainty-Aware Time Series Anomaly Detection
by Paul Wiessner & Grigor Bezirganyan & Sana Sellami & Richard Chbeir & Hans-Joachim Bungartz - 1-24 Lightweight Digit Recognition in Smart Metering System Using Narrowband Internet of Things and Federated Learning
by Vladimir Nikić & Dušan Bortnik & Milan Lukić & Dejan Vukobratović & Ivan Mezei - 1-25 Three-Dimensional Drone Cell Placement: Drone Placement for Optimal Coverage
by Aniket Basu & Hooman Oroojeni & Georgios Samakovitis & Mohammad Majid Al-Rifaie - 1-27 Optimizing Multi-Tier Scheduling and Secure Routing in Edge-Assisted Software-Defined Wireless Sensor Network Environment Using Moving Target Defense and AI Techniques
by As’ad Mahmoud As’ad Alnaser & Said S. Saloum & Ahmed A. M. Sharadqh & Hazem (Moh’d Said) Hatamleh - 1-27 Decentralizing Democracy: Secure and Transparent E-Voting Systems with Blockchain Technology in the Context of Palestine
by Eman Daraghmi & Ahmed Hamoudi & Mamoun Abu Helou - 1-32 Cybersecurity Maintenance in the Automotive Industry Challenges and Solutions: A Technology Adoption Approach
by Ignacio Fernandez de Arroyabe & Tim Watson & Iain Phillips - 1-33 Health IoT Threats: Survey of Risks and Vulnerabilities
by Samaneh Madanian & Tserendorj Chinbat & Maduka Subasinghage & David Airehrour & Farkhondeh Hassandoust & Sira Yongchareon - 1-42 Machine Learning and IoT-Based Solutions in Industrial Applications for Smart Manufacturing: A Critical Review
by Paolo Visconti & Giuseppe Rausa & Carolina Del-Valle-Soto & Ramiro Velázquez & Donato Cafagna & Roberto De Fazio
September 2024, Volume 16, Issue 10
- 1-13 An Intelligent System for Determining Driver Anxiety Level: A Comparison Study of Two Fuzzy-Based Models
by Yi Liu & Leonard Barolli - 1-17 Context-Driven Service Deployment Using Likelihood-Based Approach for Internet of Things Scenarios
by Nandan Banerji & Chayan Paul & Bikash Debnath & Biplab Das & Gurpreet Singh Chhabra & Bhabendu Kumar Mohanta & Ali Ismail Awad - 1-19 Predicting Missing Values in Survey Data Using Prompt Engineering for Addressing Item Non-Response
by Junyung Ji & Jiwoo Kim & Younghoon Kim - 1-19 AI Governance in Higher Education: Case Studies of Guidance at Big Ten Universities
by Chuhao Wu & He Zhang & John M. Carroll - 1-23 Generating Process Models by Interacting with Chatbots—A Literature Review
by Luca Franziska Hörner & Manfred Reichert - 1-23 Multi-User Optimal Load Scheduling of Different Objectives Combined with Multi-Criteria Decision Making for Smart Grid
by Yaarob Al-Nidawi & Haider Tarish Haider & Dhiaa Halboot Muhsen & Ghadeer Ghazi Shayea - 1-24 Automated Detection of Misinformation: A Hybrid Approach for Fake News Detection
by Fadi Mohsen & Bedir Chaushi & Hamed Abdelhaq & Dimka Karastoyanova & Kevin Wang - 1-25 A Secure Key Exchange and Authentication Scheme for Securing Communications in the Internet of Things Environment
by Ali Peivandizadeh & Haitham Y. Adarbah & Behzad Molavi & Amirhossein Mohajerzadeh & Ali H. Al-Badi - 1-27 Digital Transformation in Maritime Ports: Defining Smart Gates through Process Improvement in a Portuguese Container Terminal
by Juliana Basulo-Ribeiro & Carina Pimentel & Leonor Teixeira - 1-35 Blockchain-Driven Generalization of Policy Management for Multiproduct Insurance Companies
by Abraham Romero & Roberto Hernandez
October 2024, Volume 16, Issue 10
- 1-4 Correction: Vasilas et al. Beat the Heat: Syscall Attack Detection via Thermal Side Channel. Future Internet 2024, 16 , 301
by Teodora Vasilas & Claudiu Bacila & Remus Brad - 1-14 SPDepth: Enhancing Self-Supervised Indoor Monocular Depth Estimation via Self-Propagation
by Xiaotong Guo & Huijie Zhao & Shuwei Shao & Xudong Li & Baochang Zhang & Na Li - 1-15 Employing Huber and TAP Losses to Improve Inter-SubNet in Speech Enhancement
by Jeih-Weih Hung & Pin-Chen Huang & Li-Yin Li - 1-15 Healthiness and Safety of Smart Environments through Edge Intelligence and Internet of Things Technologies
by Rafiq Ul Islam & Pasquale Mazzei & Claudio Savaglio - 1-16 Stance Detection in the Context of Fake News—A New Approach
by Izzat Alsmadi & Iyad Alazzam & Mohammad Al-Ramahi & Mohammad Zarour - 1-17 Enhancing Heart Disease Prediction with Federated Learning and Blockchain Integration
by Yazan Otoum & Chaosheng Hu & Eyad Haj Said & Amiya Nayak - 1-18 Multi-Source Data Fusion for Vehicle Maintenance Project Prediction
by Fanghua Chen & Deguang Shang & Gang Zhou & Ke Ye & Guofang Wu - 1-19 Collision Avoidance Adaptive Data Rate Algorithm for LoRaWAN
by Rachel Kufakunesu & Gerhard P. Hancke & Adnan M. Abu-Mahfouz - 1-20 An IoT-Enhanced Traffic Light Control System with Arduino and IR Sensors for Optimized Traffic Patterns
by Kian Raheem Qasim & Noor M. Naser & Ahmed J. Jabur - 1-20 Securing the Edge: CatBoost Classifier Optimized by the Lyrebird Algorithm to Detect Denial of Service Attacks in Internet of Things-Based Wireless Sensor Networks
by Sennanur Srinivasan Abinayaa & Prakash Arumugam & Divya Bhavani Mohan & Anand Rajendran & Abderezak Lashab & Baoze Wei & Josep M. Guerrero - 1-21 A Systematic Review and Multifaceted Analysis of the Integration of Artificial Intelligence and Blockchain: Shaping the Future of Australian Higher Education
by Mahmoud Elkhodr & Ketmanto Wangsa & Ergun Gide & Shakir Karim - 1-22 An Intrusion Detection System for 5G SDN Network Utilizing Binarized Deep Spiking Capsule Fire Hawk Neural Networks and Blockchain Technology
by Nanavath Kiran Singh Nayak & Budhaditya Bhattacharyya - 1-22 Countering Social Media Cybercrime Using Deep Learning: Instagram Fake Accounts Detection
by Najla Alharbi & Bashayer Alkalifah & Ghaida Alqarawi & Murad A. Rassam - 1-22 A Performance Benchmark for the PostgreSQL and MySQL Databases
by Sanket Vilas Salunke & Abdelkader Ouda - 1-23 Combating Web Tracking: Analyzing Web Tracking Technologies for User Privacy
by Kyungmin Sim & Honyeong Heo & Haehyun Cho - 1-27 New Model for Defining and Implementing Performance Tests
by Marek Bolanowski & Michał Ćmil & Adrian Starzec - 1-28 Internet of Things Adoption in Technology Ecosystems Within the Central African Region: The Case of Silicon Mountain
by Godlove Suila Kuaban & Valery Nkemeni & Onyeka J. Nwobodo & Piotr Czekalski & Fabien Mieyeville - 1-28 Internet of Things and Distributed Computing Systems in Business Models
by Albérico Travassos Rosário & Ricardo Raimundo - 1-29 Decentralized Web3 Reshaping Internet Governance: Towards the Emergence of New Forms of Nation-Statehood?
by Igor Calzada - 1-29 Large Language Models Meet Next-Generation Networking Technologies: A Review
by Ching-Nam Hang & Pei-Duo Yu & Roberto Morabito & Chee-Wei Tan - 1-29 Malware Detection Based on API Call Sequence Analysis: A Gated Recurrent Unit–Generative Adversarial Network Model Approach
by Nsikak Owoh & John Adejoh & Salaheddin Hosseinzadeh & Moses Ashawa & Jude Osamor & Ayyaz Qureshi - 1-30 Decoding Urban Intelligence: Clustering and Feature Importance in Smart Cities
by Enrico Barbierato & Alice Gatti - 1-31 Advanced Optimization Techniques for Federated Learning on Non-IID Data
by Filippos Efthymiadis & Aristeidis Karras & Christos Karras & Spyros Sioutas - 1-37 A Survey of Security Strategies in Federated Learning: Defending Models, Data, and Privacy
by Habib Ullah Manzoor & Attia Shabbir & Ao Chen & David Flynn & Ahmed Zoha - 1-38 Towards Ensemble Feature Selection for Lightweight Intrusion Detection in Resource-Constrained IoT Devices
by Mahawish Fatima & Osama Rehman & Ibrahim M. H. Rahman & Aisha Ajmal & Simon Jigwan Park - 1-42 Mobility–Multihoming Duality
by Ryo Yanagida & Saleem Noel Bhatti - 1-52 A Survey of the Real-Time Metaverse: Challenges and Opportunities
by Mohsen Hatami & Qian Qu & Yu Chen & Hisham Kholidy & Erik Blasch & Erika Ardiles-Cruz
September 2024, Volume 16, Issue 9
- 1-13 Decentralized Mechanism for Edge Node Allocation in Access Network: An Experimental Evaluation
by Jesus Calle-Cancho & Carlos Cañada & Rafael Pastor-Vargas & Mercedes E. Paoletti & Juan M. Haut - 1-15 Machine Learning for Blockchain and IoT Systems in Smart Cities: A Survey
by Elias Dritsas & Maria Trigka - 1-17 Privacy-Preserving Authentication Based on PUF for VANETs
by Lihui Li & Hanwen Deng & Zhongyi Zhai & Sheng-Lung Peng - 1-17 Traffic Classification in Software-Defined Networking Using Genetic Programming Tools
by Spiridoula V. Margariti & Ioannis G. Tsoulos & Evangelia Kiousi & Eleftherios Stergiou - 1-19 Workflow Trace Profiling and Execution Time Analysis in Quantitative Verification
by Guoxin Su & Li Liu - 1-19 Determinants to Adopt Industrial Internet of Things in Small and Medium-Sized Enterprises
by Abdullah Khanfor - 1-19 Industry 4.0 and Beyond: The Role of 5G, WiFi 7, and Time-Sensitive Networking (TSN) in Enabling Smart Manufacturing
by Jobish John & Md. Noor-A-Rahim & Aswathi Vijayan & H. Vincent Poor & Dirk Pesch - 1-20 Application of Fuzzy Logic for Horizontal Scaling in Kubernetes Environments within the Context of Edge Computing
by Sérgio N. Silva & Mateus A. S. de S. Goldbarg & Lucileide M. D. da Silva & Marcelo A. C. Fernandes - 1-20 A New Framework for Enhancing VANETs through Layer 2 DLT Architectures with Multiparty Threshold Key Management and PETs
by Haitham Y. Adarbah & Mehmet Sabir Kiraz & Suleyman Kardas & Ali H. Al-Bayatti & Hilal M. Y. Al-Bayatti - 1-20 Time-Efficient Neural-Network-Based Dynamic Area Optimization Algorithm for High-Altitude Platform Station Mobile Communications
by Wataru Takabatake & Yohei Shibata & Kenji Hoshino & Tomoaki Ohtsuki - 1-20 A Task Offloading and Resource Allocation Strategy Based on Multi-Agent Reinforcement Learning in Mobile Edge Computing
by Guiwen Jiang & Rongxi Huang & Zhiming Bao & Gaocai Wang - 1-20 Implementation of White-Hat Worms Using Mirai Source Code and Its Optimization through Parameter Tuning
by Yudai Yamamoto & Aoi Fukushima & Shingo Yamaguchi - 1-22 A Novel Framework for Cross-Cluster Scaling in Cloud-Native 5G NextGen Core
by Oana-Mihaela Dumitru-Guzu & Vlădeanu Călin & Robert Kooij - 1-22 Optimizing Network Performance: A Comparative Analysis of EIGRP, OSPF, and BGP in IPv6-Based Load-Sharing and Link-Failover Systems
by Kamal Shahid & Saleem Naseer Ahmad & Syed Tahir Hussain Rizvi - 1-24 Developing a Secure Service Ecosystem to Implement the Intelligent Edge Environment for Smart Cities
by Gayathri Karthick & Glenford Mapp - 1-24 A Micro-Segmentation Method Based on VLAN-VxLAN Mapping Technology
by Di Li & Zhibang Yang & Siyang Yu & Mingxing Duan & Shenghong Yang - 1-24 Enhancing Elderly Care through Low-Cost Wireless Sensor Networks and Artificial Intelligence: A Study on Vital Sign Monitoring and Sleep Improvement
by Carolina Del-Valle-Soto & Ramon A. Briseño & Ramiro Velázquez & Gabriel Guerra-Rosales & Santiago Perez-Ochoa & Isaac H. Preciado-Bazavilvazo & Paolo Visconti & José Varela-Aldás - 1-25 Internet of Conscious Things: Ontology-Based Social Capabilities for Smart Objects
by Michele Ruta & Floriano Scioscia & Giuseppe Loseto & Agnese Pinto & Corrado Fasciano & Giovanna Capurso & Eugenio Di Sciascio - 1-25 A Complete EDA and DL Pipeline for Softwarized 5G Network Intrusion Detection
by Abdallah Moubayed - 1-25 Measuring the Effectiveness of Carbon-Aware AI Training Strategies in Cloud Instances: A Confirmation Study
by Roberto Vergallo & Luca Mainetti - 1-25 Parallel and Distributed Frugal Tracking of a Quantile
by Italo Epicoco & Marco Pulimeno & Massimo Cafaro - 1-26 Recommendation-Based Trust Evaluation Model for the Internet of Underwater Things
by Abeer Almutairi & Xavier Carpent & Steven Furnell - 1-28 Edge Computing in Healthcare: Innovations, Opportunities, and Challenges
by Alexandru Rancea & Ionut Anghel & Tudor Cioara - 1-28 Alquist 5.0: Dialogue Trees Meet Generative Models, a Novel Approach for Enhancing SocialBot Conversations
by Ondrej Kobza & David Herel & Jan Cuhel & Tommaso Gargiani & Petr Marek & Jan Sedivy - 1-31 Efficient Data Exchange between WebAssembly Modules
by Lucas Silva & José Metrôlho & Fernando Ribeiro - 1-31 An Improved Routing Protocol for Optimum Quality of Service in Device-to-Device and Energy Efficiency in 5G/B5G
by Sanusi Mohammad Bunu & Omar Younis Alani & Mohammad Saraee - 1-32 Are Strong Baselines Enough? False News Detection with Machine Learning
by Lara Aslan & Michal Ptaszynski & Jukka Jauhiainen - 1-33 On the Fairness of Internet Congestion Control over WiFi with Deep Reinforcement Learning
by Shyam Kumar Shrestha & Shiva Raj Pokhrel & Jonathan Kua - 1-33 Artificial Intelligence to Reshape the Healthcare Ecosystem
by Gianluca Reali & Mauro Femminella - 1-34 Graph Attention Networks: A Comprehensive Review of Methods and Applications
by Aristidis G. Vrahatis & Konstantinos Lazaros & Sotiris Kotsiantis - 1-35 Vulnerability Detection and Classification of Ethereum Smart Contracts Using Deep Learning
by Raed M. Bani-Hani & Ahmed S. Shatnawi & Lana Al-Yahya - 1-40 A Review on Millimeter-Wave Hybrid Beamforming for Wireless Intelligent Transport Systems
by Waleed Shahjehan & Rajkumar Singh Rathore & Syed Waqar Shah & Mohammad Aljaidi & Ali Safaa Sadiq & Omprakash Kaiwartya
August 2024, Volume 16, Issue 9
- 1-14 AI Services-Oriented Dynamic Computing Resource Scheduling Algorithm Based on Distributed Data Parallelism in Edge Computing Network of Smart Grid
by Jing Zou & Peizhe Xin & Chang Wang & Heli Zhang & Lei Wei & Ying Wang - 1-15 Personalized Visualization of the Gestures of Parkinson’s Disease Patients with Virtual Reality
by Konstantinos Sakkas & Eirini Georgia Dimitriou & Niki Eleni Ntagka & Nikolaos Giannakeas & Konstantinos Kalafatakis & Alexandros T. Tzallas & Evripidis Glavas - 1-16 A Survey on Data Availability in Layer 2 Blockchain Rollups: Open Challenges and Future Improvements
by Muhammad Bin Saif & Sara Migliorini & Fausto Spoto - 1-18 Evaluation of a New-Concept Secure File Server Solution
by Gábor Arányi & Ágnes Vathy-Fogarassy & Veronika Szücs - 1-18 Predictive Maintenance Based on Identity Resolution and Transformers in IIoT
by Zhibo Qi & Lei Du & Ru Huo & Tao Huang - 1-19 PrismParser: A Framework for Implementing Efficient P4-Programmable Packet Parsers on FPGA
by Parisa Mashreghi-Moghadam & Tarek Ould-Bachir & Yvon Savaria - 1-22 Increasing the Security of Network Data Transmission with a Configurable Hardware Firewall Based on Field Programmable Gate Arrays
by Marco Grossi & Fabrizio Alfonsi & Marco Prandini & Alessandro Gabrielli - 1-23 The Digital Footprints on the Run: A Forensic Examination of Android Running Workout Applications
by Fabian Nunes & Patrício Domingues & Miguel Frade - 1-24 Improved Adaptive Backoff Algorithm for Optimal Channel Utilization in Large-Scale IEEE 802.15.4-Based Wireless Body Area Networks
by Mounib Khanafer & Mouhcine Guennoun & Mohammed El-Abd & Hussein T. Mouftah - 1-27 A Multiparty Quantum Private Equality Comparison Scheme Relying on | GHZ 3 〉 States
by Theodore Andronikos & Alla Sirokofskich - 1-29 User Mobility Modeling in Crowdsourcing Application to Prevent Inference Attacks
by Farid Yessoufou & Salma Sassi & Elie Chicha & Richard Chbeir & Jules Degila - 1-32 Artificial Intelligence Applications in Smart Healthcare: A Survey
by Xian Gao & Peixiong He & Yi Zhou & Xiao Qin - 1-33 CrossDeFi: A Novel Cross-Chain Communication Protocol
by Shezon Saleem Mohammed Abdul & Anup Shrestha & Jianming Yong
August 2024, Volume 16, Issue 8
- 1-12 Establishing a Model for the User Acceptance of Cybersecurity Training
by Wesam Fallatah & Joakim Kävrestad & Steven Furnell - 1-13 Dynamic Storage Optimization for Communication between AI Agents
by Andrei Tara & Hjalmar K. Turesson & Nicolae Natea - 1-15 Advanced Denoising and Meta-Learning Techniques for Enhancing Smart Health Monitoring Using Wearable Sensors
by Minyechil Alehegn Tefera & Amare Mulatie Dehnaw & Yibeltal Chanie Manie & Cheng-Kai Yao & Shegaw Demessie Bogale & Peng-Chun Peng - 1-16 Masketeer: An Ensemble-Based Pseudonymization Tool with Entity Recognition for German Unstructured Medical Free Text
by Martin Baumgartner & Karl Kreiner & Fabian Wiesmüller & Dieter Hayn & Christian Puelacher & Günter Schreier - 1-16 Cross-Domain Fake News Detection Using a Prompt-Based Approach
by Jawaher Alghamdi & Yuqing Lin & Suhuai Luo - 1-16 Multi-Agent Deep-Q Network-Based Cache Replacement Policy for Content Delivery Networks
by Janith K. Dassanayake & Minxiao Wang & Muhammad Z. Hameed & Ning Yang - 1-16 Development of a Novel Open Control System Implementation Method under Industrial IoT
by Lisi Liu & Zijie Xu & Xiaobin Qu - 1-17 Dynamic Graph Representation Learning for Passenger Behavior Prediction
by Mingxuan Xie & Tao Zou & Junchen Ye & Bowen Du & Runhe Huang - 1-18 Leveraging Internet News-Based Data for Rockfall Hazard Susceptibility Assessment on Highways
by Kieu Anh Nguyen & Yi-Jia Jiang & Chiao-Shin Huang & Meng-Hsun Kuo & Walter Chen - 1-19 TRUST-ME : Trust-Based Resource Allocation and Server Selection in Multi-Access Edge Computing
by Sean Tsikteris & Aisha B Rahman & Md. Sadman Siraj & Eirini Eleni Tsiropoulou - 1-19 A Survey on Emerging Blockchain Technology Platforms for Securing the Internet of Things
by Yunus Kareem & Djamel Djenouri & Essam Ghadafi - 1-19 An Innovative Recompression Scheme for VQ Index Tables
by Yijie Lin & Jui-Chuan Liu & Ching-Chun Chang & Chin-Chen Chang - 1-20 Explainable Artificial Intelligence Approach for Improving Head-Mounted Fault Display Systems
by Abdelaziz Bouzidi & Lala Rajaoarisoa & Luka Claeys - 1-20 A Microservice-Based Smart Agriculture System to Detect Animal Intrusion at the Edge
by Jinpeng Miao & Dasari Rajasekhar & Shivakant Mishra & Sanjeet Kumar Nayak & Ramanarayan Yadav - 1-21 Dynamic Fashion Video Synthesis from Static Imagery
by Tasin Islam & Alina Miron & Xiaohui Liu & Yongmin Li - 1-22 Estimating Interception Density in the BB84 Protocol: A Study with a Noisy Quantum Simulator
by Francesco Fiorini & Michele Pagano & Rosario Giuseppe Garroppo & Antonio Osele - 1-22 Blockchain Technology and Its Potential to Benefit Public Services Provision: A Short Survey
by Giorgio Piccardo & Lorenzo Conti & Alessio Martino - 1-22 Wireless and Fiber-Based Post-Quantum-Cryptography-Secured IPsec Tunnel
by Daniel Christian Lawo & Rana Abu Bakar & Abraham Cano Aguilera & Filippo Cugini & José Luis Imaña & Idelfonso Tafur Monroy & Juan Jose Vegas Olmos - 1-22 A Method to Optimize Deployment of Directional Sensors for Coverage Enhancement in the Sensing Layer of IoT
by Peng Wang & Yonghua Xiong - 1-23 Virtual Reality in the Classroom: Transforming the Teaching of Electrical Circuits in the Digital Age
by Diego Alejandro Albarracin-Acero & Fidel Alfonso Romero-Toledo & Claudia Esperanza Saavedra-Bautista & Edwan Anderson Ariza-Echeverri - 1-24 Machine Learning-Assisted Dynamic Proximity-Driven Sorting Algorithm for Supermarket Navigation Optimization: A Simulation-Based Validation
by Vincent Abella & Johnfil Initan & Jake Mark Perez & Philip Virgil Astillo & Luis Gerardo Cañete & Gaurav Choudhary - 1-24 Testing Stimulus Equivalence in Transformer-Based Agents
by Alexis Carrillo & Moisés Betancort - 1-25 Overlay and Virtual Private Networks Security Performances Analysis with Open Source Infrastructure Deployment
by Antonio Francesco Gentile & Davide Macrì & Emilio Greco & Peppino Fazio - 1-25 Multi-Class Intrusion Detection Based on Transformer for IoT Networks Using CIC-IoT-2023 Dataset
by Shu-Ming Tseng & Yan-Qi Wang & Yung-Chung Wang - 1-27 Beat the Heat: Syscall Attack Detection via Thermal Side Channel
by Teodora Vasilas & Claudiu Bacila & Remus Brad - 1-28 FIVADMI: A Framework for In-Vehicle Anomaly Detection by Monitoring and Isolation
by Khaled Mahbub & Antonio Nehme & Mohammad Patwary & Marc Lacoste & Sylvain Allio - 1-29 A Survey on the Use of Large Language Models (LLMs) in Fake News
by Eleftheria Papageorgiou & Christos Chronis & Iraklis Varlamis & Yassine Himeur - 1-33 Artificial Intelligence of Things as New Paradigm in Aviation Health Monitoring Systems
by Igor Kabashkin & Leonid Shoshin - 1-37 Early Ransomware Detection with Deep Learning Models
by Matan Davidian & Michael Kiperberg & Natalia Vanetik
July 2024, Volume 16, Issue 8
- 1-15 Performance Evaluation of Lightweight Stream Ciphers for Real-Time Video Feed Encryption on ARM Processor
by Mohsin Khan & Håvard Dagenborg & Dag Johansen - 1-15 A Low-Complexity Solution for Optimizing Binary Intelligent Reflecting Surfaces towards Wireless Communication
by Santosh A. Janawade & Prabu Krishnan & Krishnamoorthy Kandasamy & Shashank S. Holla & Karthik Rao & Aditya Chandrasekar - 1-16 Optimal Weighted Voting-Based Collaborated Malware Detection for Zero-Day Malware: A Case Study on VirusTotal and MalwareBazaar
by Naonobu Okazaki & Shotaro Usuzaki & Tsubasa Waki & Hyoga Kawagoe & Mirang Park & Hisaaki Yamaba & Kentaro Aburada - 1-16 Leveraging Medical Knowledge Graphs and Large Language Models for Enhanced Mental Disorder Information Extraction
by Chaelim Park & Hayoung Lee & Ok-ran Jeong - 1-17 Enhancing Recognition of Human–Object Interaction from Visual Data Using Egocentric Wearable Camera
by Danish Hamid & Muhammad Ehatisham Ul Haq & Amanullah Yasin & Fiza Murtaza & Muhammad Awais Azam - 1-17 A Risk Assessment Framework for Mobile Apps in Mobile Cloud Computing Environments
by Noah Oghenefego Ogwara & Krassie Petrova & Mee Loong Yang & Stephen G. MacDonell - 1-18 Power-Efficient Resource Allocation for Active STAR-RIS-Aided SWIPT Communication Systems
by Chuanzhe Gao & Shidang Li & Yixuan Wu & Siyi Duan & Mingsheng Wei & Bencheng Yu - 1-18 Modeling Trust in IoT Systems for Drinking-Water Management
by Aicha Aiche & Pierre-Martin Tardif & Mohammed Erritali - 1-19 Software-Defined Named Data Networking in Literature: A Review
by Albatool Alhawas & Abdelfettah Belghith - 1-19 Energy Efficiency and Load Optimization in Heterogeneous Networks through Dynamic Sleep Strategies: A Constraint-Based Optimization Approach
by Amna Shabbir & Muhammad Faizan Shirazi & Safdar Rizvi & Sadique Ahmad & Abdelhamied A. Ateya - 1-19 Ontology in Hybrid Intelligence: A Concise Literature Review
by Salvatore Flavio Pileggi - 1-20 MIMA: Multi-Feature Interaction Meta-Path Aggregation Heterogeneous Graph Neural Network for Recommendations
by Yang Li & Shichao Yan & Fangtao Zhao & Yi Jiang & Shuai Chen & Lei Wang & Li Ma - 1-21 Empowering Clinical Engineering and Evidence-Based Maintenance with IoT and Indoor Navigation
by Alessio Luschi & Giovanni Luca Daino & Gianpaolo Ghisalberti & Vincenzo Mezzatesta & Ernesto Iadanza - 1-23 Towards Collaborative Edge Intelligence: Blockchain-Based Data Valuation and Scheduling for Improved Quality of Service
by Yao Du & Zehua Wang & Cyril Leung & Victor C. M. Leung - 1-31 A Novel Deep Learning Framework for Intrusion Detection Systems in Wireless Network
by Khoa Dinh Nguyen Dang & Peppino Fazio & Miroslav Voznak - 1-37 Active Queue Management in L4S with Asynchronous Advantage Actor-Critic: A FreeBSD Networking Stack Perspective
by Deol Satish & Jonathan Kua & Shiva Raj Pokhrel
June 2024, Volume 16, Issue 7
- 1-4 Edge Cloud Computing and Federated–Split Learning in Internet of Things
by Qiang Duan & Zhihui Lu - 1-14 Digital Transformation in the Construction Sector: Blockchain, BIM and SSI for a More Sustainable and Transparent System
by Luisanna Cocco & Roberto Tonelli - 1-16 INFLUTRUST : Trust-Based Influencer Marketing Campaigns in Online Social Networks
by Adedamola Adesokan & Aisha B Rahman & Eirini Eleni Tsiropoulou - 1-16 Exploring the Architectural Composition of Cyber Ranges: A Systematic Review
by Dionysios Stamatopoulos & Menelaos Katsantonis & Panagiotis Fouliras & Ioannis Mavridis - 1-17 Evaluating Quantized Llama 2 Models for IoT Privacy Policy Language Generation
by Bhavani Malisetty & Alfredo J. Perez - 1-18 Trusted Composition of Internet of Medical Things over Imperfect Networks
by Ehsan Ahmad & Brian Larson & Abdulbasid Banga - 1-19 Digital Identity in the EU: Promoting eIDAS Solutions Based on Biometrics
by Pietro Ruiu & Salvatore Saiu & Enrico Grosso - 1-20 Differential Private Federated Learning in Geographically Distributed Public Administration Processes
by Mirwais Ahmadzai & Giang Nguyen - 1-20 Performance Impact of Nested Congestion Control on Transport-Layer Multipath Tunneling
by Marcus Pieska & Andreas Kassler & Anna Brunstrom & Veselin Rakocevic & Markus Amend - 1-21 Transforming Network Management: Intent-Based Flexible Control Empowered by Efficient Flow-Centric Visibility
by Aris Cahyadi Risdianto & Muhammad Usman & Muhammad Ahmad Rathore - 1-23 A Systematic Review and Comprehensive Analysis of Pioneering AI Chatbot Models from Education to Healthcare: ChatGPT, Bard, Llama, Ernie and Grok
by Ketmanto Wangsa & Shakir Karim & Ergun Gide & Mahmoud Elkhodr - 1-23 Combining Advanced Feature-Selection Methods to Uncover Atypical Energy-Consumption Patterns
by Lucas Henriques & Felipe Prata Lima & Cecilia Castro - 1-23 Smart Irrigation Systems from Cyber–Physical Perspective: State of Art and Future Directions
by Mian Qian & Cheng Qian & Guobin Xu & Pu Tian & Wei Yu - 1-28 Building Information Modeling and Digital Twins for Functional and Technical Design of Smart Buildings with Distributed IoT Networks—Review and New Challenges Discussion
by Gabriela Walczyk & Andrzej Ożadowicz - 1-34 Mapping How Artificial Intelligence Blends with Healthcare: Insights from a Bibliometric Analysis
by Loukas Triantafyllopoulos & Evgenia Paxinou & Georgios Feretzakis & Dimitris Kalles & Vassilios S. Verykios - 1-36 Enhancing Network Slicing Security: Machine Learning, Software-Defined Networking, and Network Functions Virtualization-Driven Strategies
by José Cunha & Pedro Ferreira & Eva M. Castro & Paula Cristina Oliveira & Maria João Nicolau & Iván Núñez & Xosé Ramon Sousa & Carlos Serôdio
July 2024, Volume 16, Issue 7
- 1-15 Explainable Artificial Intelligence Methods to Enhance Transparency and Trust in Digital Deliberation Settings
by Ilias Siachos & Nikos Karacapilidis - 1-15 Intrusion Detection in IoT Using Deep Residual Networks with Attention Mechanisms
by Bo Cui & Yachao Chai & Zhen Yang & Keqin Li - 1-16 Software-Bus-Toolchain (SBT): Introducing a Versatile Method for Quickly Implementing (I)IoT-Scenarios
by Simon D. Duque Anton - 1-16 Enhancing Autonomous Driving Navigation Using Soft Actor-Critic
by Badr Ben Elallid & Nabil Benamar & Miloud Bagaa & Yassine Hadjadj-Aoul - 1-16 The Use of Virtual Reality in the Countries of the Central American Bank for Economic Integration (CABEI)
by Álvaro Antón-Sancho & Pablo Fernández-Arias & Edwan Anderson Ariza & Diego Vergara - 1-17 Evaluating Convolutional Neural Networks and Vision Transformers for Baby Cry Sound Analysis
by Samir A. Younis & Dalia Sobhy & Noha S. Tawfik - 1-17 Emotion Recognition from Videos Using Multimodal Large Language Models
by Lorenzo Vaiani & Luca Cagliero & Paolo Garza - 1-17 SD-GPSR: A Software-Defined Greedy Perimeter Stateless Routing Method Based on Geographic Location Information
by Shaopei Gao & Qiang Liu & Junjie Zeng & Li Li - 1-18 A Packet Content-Oriented Remote Code Execution Attack Payload Detection Model
by Enbo Sun & Jiaxuan Han & Yiquan Li & Cheng Huang - 1-18 Optimizing Drone Energy Use for Emergency Communications in Disasters via Deep Reinforcement Learning
by Wen Qiu & Xun Shao & Hiroshi Masui & William Liu - 1-20 Dynamic SNR, Spectral Efficiency, and Rate Characterization in 5G/6G mmWave/sub-THz Systems with Macro- and Micro-Mobilities
by Darya Ostrikova & Elizaveta Golos & Vitalii Beschastnyi & Egor Machnev & Yuliya Gaidamaka & Konstantin Samouylov - 1-21 Towards an Optimized Blockchain-Based Secure Medical Prescription-Management System
by Imen Ahmed & Mariem Turki & Mouna Baklouti & Bouthaina Dammak & Amnah Alshahrani - 1-22 Behind the Code: Identifying Zero-Day Exploits in WordPress
by Mohamed Azarudheen Mohamed Mohideen & Muhammad Shahroz Nadeem & James Hardy & Haider Ali & Umair Ullah Tariq & Fariza Sabrina & Muhammad Waqar & Salman Ahmed - 1-23 Watch the Skies: A Study on Drone Attack Vectors, Forensic Approaches, and Persisting Security Challenges
by Amr Adel & Tony Jan - 1-24 Achieving Accountability and Data Integrity in Message Queuing Telemetry Transport Using Blockchain and Interplanetary File System
by Sara Lazzaro & Francesco Buccafurri - 1-25 Multi-Agent Dynamic Fog Service Placement Approach
by Nerijus Šatkauskas & Algimantas Venčkauskas