Content
May 2022, Volume 14, Issue 5
- 1-14 Distributed Bandwidth Allocation Strategy for QoE Fairness of Multiple Video Streams in Bottleneck Links
by Yazhi Liu & Dongyu Wei & Chunyang Zhang & Wei Li - 1-15 Low-Complexity GSM Detection Based on Maximum Ratio Combining
by Xinhe Zhang & Wenbo Lv & Haoran Tan - 1-16 Enhancing Short-Term Sales Prediction with Microblogs: A Case Study of the Movie Box Office
by Jie Zhao & Fangwei Xiong & Peiquan Jin - 1-16 Missing Data Imputation in the Internet of Things Sensor Networks
by Benjamin Agbo & Hussain Al-Aqrabi & Richard Hill & Tariq Alsboui - 1-18 A Review of Blockchain Technology Applications in Ambient Assisted Living
by Alexandru-Ioan Florea & Ionut Anghel & Tudor Cioara - 1-19 Lightweight Blockchain-Based Scheme to Secure Wireless M2M Area Networks
by Karam Eddine Bilami & Pascal LORENZ - 1-20 Security in Wireless Sensor Networks: A Cryptography Performance Analysis at MAC Layer
by Mauro Tropea & Mattia Giovanni Spina & Floriano De Rango & Antonio Francesco Gentile - 1-20 Medical Internet-of-Things Based Breast Cancer Diagnosis Using Hyperparameter-Optimized Neural Networks
by Roseline Oluwaseun Ogundokun & Sanjay Misra & Mychal Douglas & Robertas Damaševičius & Rytis Maskeliūnas - 1-21 Modeling User Acceptance of In-Vehicle Applications for Safer Road Environment
by Siti Fatimah Abdul Razak & Sumendra Yogarayan & Mohd Fikri Azli Abdullah & Afizan Azman - 1-21 QoE Models for Adaptive Streaming: A Comprehensive Evaluation
by Duc Nguyen & Nam Pham Ngoc & Truong Cong Thang - 1-22 Positioning Energy-Neutral Devices: Technological Status and Hybrid RF-Acoustic Experiments
by Bert Cox & Chesney Buyle & Daan Delabie & Lieven De Strycker & Liesbet Van der Perre - 1-24 Adaptive User Profiling in E-Commerce and Administration of Public Services
by Kleanthis G. Gatziolis & Nikolaos D. Tselikas & Ioannis D. Moscholios - 1-24 A Versatile MANET Experimentation Platform and Its Evaluation through Experiments on the Performance of Routing Protocols under Diverse Conditions
by Ioannis Manolopoulos & Dimitrios Loukatos & Kimon Kontovasilis - 1-24 Quality-of-Service-Linked Privileged Content-Caching Mechanism for Named Data Networks
by Shrisha H. S. & Uma Boregowda - 1-26 MeVer NetworkX: Network Analysis and Visualization for Tracing Disinformation
by Olga Papadopoulou & Themistoklis Makedas & Lazaros Apostolidis & Francesco Poldi & Symeon Papadopoulos & Ioannis Kompatsiaris - 1-28 A Survey on Memory Subsystems for Deep Neural Network Accelerators
by Arghavan Asad & Rupinder Kaur & Farah Mohammadi - 1-32 A Framework to Model Bursty Electronic Data Interchange Messages for Queueing Systems
by Sonya Leech & Jonathan Dunne & David Malone
April 2022, Volume 14, Issue 5
- 1-13 Enriching Artificial Intelligence Explanations with Knowledge Fragments
by Jože Rožanec & Elena Trajkova & Inna Novalija & Patrik Zajec & Klemen Kenda & Blaž Fortuna & Dunja Mladenić - 1-14 Bringing Digital Innovation Strategies and Entrepreneurship: The Business Model Canvas in Open Data Ecosystem and Startups
by Maria Kamariotou & Fotis Kitsios - 1-16 On the Use of the Multi-Agent Environment for Mobility Applications
by Mahdi Zargayouna - 1-16 A Bidirectional Trust Model for Service Delegation in Social Internet of Things
by Lijun Wei & Yuhan Yang & Jing Wu & Chengnian Long & Yi-Bing Lin - 1-16 Co-Simulation of Multiple Vehicle Routing Problem Models
by Sana Sahar Guia & Abdelkader Laouid & Mohammad Hammoudeh & Ahcène Bounceur & Mai Alfawair & Amna Eleyan - 1-17 Channel Characterization and SC-FDM Modulation for PLC in High-Voltage Power Lines
by Jose Alberto Del Puerto-Flores & José Luis Naredo & Fernando Peña-Campos & Carolina Del-Valle-Soto & Leonardo J. Valdivia & Ramón Parra-Michel - 1-18 A Fairness-Aware Peer-to-Peer Decentralized Learning Framework with Heterogeneous Devices
by Zheyi Chen & Weixian Liao & Pu Tian & Qianlong Wang & Wei Yu - 1-19 Fast Library Recommendation in Software Dependency Graphs with Symmetric Partially Absorbing Random Walks
by Emmanouil Krasanakis & Andreas Symeonidis - 1-19 Blockchain Technology Applied in IoV Demand Response Management: A Systematic Literature Review
by Evgenia Kapassa & Marinos Themistocleous - 1-20 Deterring Deepfake Attacks with an Electrical Network Frequency Fingerprints Approach
by Deeraj Nagothu & Ronghua Xu & Yu Chen & Erik Blasch & Alexander Aved - 1-20 ReSQoV: A Scalable Resource Allocation Model for QoS-Satisfied Cloud Services
by Hassan Mahmood Khan & Fang-Fang Chua & Timothy Tzen Vun Yap - 1-20 A System Proposal for Information Management in Building Sector Based on BIM, SSI, IoT and Blockchain
by Luisanna Cocco & Roberto Tonelli & Michele Marchesi - 1-21 The Whole Is Greater than the Sum of the Parts: A Multilayer Approach on Criminal Networks
by Annamaria Ficara & Giacomo Fiumara & Salvatore Catanese & Pasquale De Meo & Xiaoyang Liu - 1-22 Virtual Power Plant Optimization in Smart Grids: A Narrative Review
by Bianca Goia & Tudor Cioara & Ionut Anghel - 1-24 An ICN-Based IPFS High-Availability Architecture
by Ruibin Zeng & Jiali You & Yang Li & Rui Han - 1-24 Building Semantic Knowledge Graphs from (Semi-)Structured Data: A Review
by Vetle Ryen & Ahmet Soylu & Dumitru Roman - 1-26 Clinical Trial Classification of SNS24 Calls with Neural Networks
by Hua Yang & Teresa Gonçalves & Paulo Quaresma & Renata Vieira & Rute Veladas & Cátia Sousa Pinto & João Oliveira & Maria Cortes Ferreira & Jéssica Morais & Ana Raquel Pereira & Nuno Fernandes & Carolina Gonçalves - 1-27 A Review of Digital Era Governance Research in the First Two Decades: A Bibliometric Study
by Dejan Ravšelj & Lan Umek & Ljupčo Todorovski & Aleksander Aristovnik - 1-28 Measuring Ethical Values with AI for Better Teamwork
by Erkin Altuntas & Peter A. Gloor & Pascal Budner
April 2022, Volume 14, Issue 4
- 1-11 A Lightweight Certificateless Group Key Agreement Method without Pairing Based on Blockchain for Smart Grid
by Zhihao Wang & Ru Huo & Shuo Wang - 1-14 Creating Honeypots to Prevent Online Child Exploitation
by Joel Scanlan & Paul A. Watters & Jeremy Prichard & Charlotte Hunn & Caroline Spiranovic & Richard Wortley - 1-19 Interoperable Data Analytics Reference Architectures Empowering Digital-Twin-Aided Manufacturing
by Attila Csaba Marosi & Márk Emodi & Ákos Hajnal & Róbert Lovas & Tamás Kiss & Valerie Poser & Jibinraj Antony & Simon Bergweiler & Hamed Hamzeh & James Deslauriers & József Kovács - 1-19 Ransomware-Resilient Self-Healing XML Documents
by Mahmoud Al-Dwairi & Ahmed S. Shatnawi & Osama Al-Khaleel & Basheer Al-Duwairi - 1-20 Multi-Layer Feature Fusion-Based Community Evolution Prediction
by Zhao Wang & Qingguo Xu & Weimin Li - 1-22 HealthFetch: An Influence-Based, Context-Aware Prefetch Scheme in Citizen-Centered Health Storage Clouds
by Chrysostomos Symvoulidis & George Marinos & Athanasios Kiourtis & Argyro Mavrogiorgou & Dimosthenis Kyriazis - 1-28 ML-Based 5G Network Slicing Security: A Comprehensive Survey
by Ramraj Dangi & Akshay Jadhav & Gaurav Choudhary & Nicola Dragoni & Manas Kumar Mishra & Praveen Lalwani - 1-32 Future Wireless Networking Experiments Escaping Simulations
by Sachin Sharma & Saish Urumkar & Gianluca Fontanesi & Byrav Ramamurthy & Avishek Nag - 1-35 From 5G to 6G—Challenges, Technologies, and Applications
by Ahmed I. Salameh & Mohamed El Tarhuni - 1-46 Deep Learning for Vulnerability and Attack Detection on Web Applications: A Systematic Literature Review
by Rokia Lamrani Alaoui & El Habib Nfaoui
March 2022, Volume 14, Issue 4
- 1-3 Special Issue “Natural Language Engineering: Methods, Tasks and Applications”
by Massimo Esposito & Giovanni Luca Masala & Aniello Minutolo & Marco Pota - 1-14 Decorrelation-Based Deep Learning for Bias Mitigation
by Pranita Patil & Kevin Purcell - 1-15 A Dynamic Cache Allocation Mechanism (DCAM) for Reliable Multicast in Information-Centric Networking
by Yingjie Duan & Hong Ni & Xiaoyong Zhu - 1-16 Predicting Dog Emotions Based on Posture Analysis Using DeepLabCut
by Kim Ferres & Timo Schloesser & Peter A. Gloor - 1-16 Deep Regression Neural Networks for Proportion Judgment
by Mario Milicevic & Vedran Batos & Adriana Lipovac & Zeljka Car - 1-16 Performance Analysis of DF Relay-Assisted D2D Communication in a 5G mmWave Network
by Subhra Sankha Sarma & Ranjay Hazra & Peter Han Joo Chong - 1-16 Evaluation of Contextual and Game-Based Training for Phishing Detection
by Joakim Kävrestad & Allex Hagberg & Marcus Nohlberg & Jana Rambusch & Robert Roos & Steven Furnell - 1-17 Using Satellite Imagery to Improve Local Pollution Models for High-Voltage Transmission Lines and Insulators
by Peter Krammer & Marcel Kvassay & Ján Mojžiš & Martin Kenyeres & Miloš Očkay & Ladislav Hluchý & Ľuboš Pavlov & Ľuboš Skurčák - 1-17 Detecting IoT Attacks Using an Ensemble Machine Learning Model
by Vikas Tomer & Sachin Sharma - 1-17 Cross-Domain Transfer Learning Prediction of COVID-19 Popular Topics Based on Knowledge Graph
by Xiaolin Chen & Qixing Qu & Chengxi Wei & Shudong Chen - 1-18 Adaptative Perturbation Patterns: Realistic Adversarial Learning for Robust Intrusion Detection
by João Vitorino & Nuno Oliveira & Isabel Praça - 1-22 Location Transparency Call (LTC) System: An Intelligent Phone Dialing System Based on the Phone of Things (PoT) Architecture
by Haytham Khalil & Khalid Elgazzar - 1-24 Bitcoin as a Safe Haven during COVID-19 Disease
by Luisanna Cocco & Roberto Tonelli & Michele Marchesi - 1-25 TalkRoBots: A Middleware for Robotic Systems in Industry 4.0
by Marwane Ayaida & Nadhir Messai & Frederic Valentin & Dimitri Marcheras - 1-28 A Multi-Service Adaptive Semi-Persistent LTE Uplink Scheduler for Low Power M2M Devices
by Nusrat Afrin & Jason Brown & Jamil Y. Khan
March 2022, Volume 14, Issue 3
- 1-14 Neural Network-Based Price Tag Data Analysis
by Pavel Laptev & Sergey Litovkin & Sergey Davydenko & Anton Konev & Evgeny Kostyuchenko & Alexander Shelupanov - 1-14 CPU-GPU-Memory DVFS for Power-Efficient MPSoC in Mobile Cyber Physical Systems
by Somdip Dey & Samuel Isuwa & Suman Saha & Amit Kumar Singh & Klaus McDonald-Maier - 1-15 Weighted-CAPIC Caching Algorithm for Priority Traffic in Named Data Network
by Leanna Vidya Yovita & Nana Rachmana Syambas & Ian Joseph Matheus Edward - 1-16 Time Series Surface Temperature Prediction Based on Cyclic Evolutionary Network Model for Complex Sea Area
by Jiahao Shi & Jie Yu & Jinkun Yang & Lingyu Xu & Huan Xu - 1-17 Deep Anomaly Detection Based on Variational Deviation Network
by Junwen Lu & Jinhui Wang & Xiaojun Wei & Keshou Wu & Guanfeng Liu - 1-17 Unsupervised Anomaly Detection and Segmentation on Dirty Datasets
by Jiahao Guo & Xiaohuo Yu & Lu Wang - 1-18 Addressing Syntax-Based Semantic Complementation: Incorporating Entity and Soft Dependency Constraints into Metonymy Resolution
by Siyuan Du & Hao Wang - 1-19 Survey on Videos Data Augmentation for Deep Learning Models
by Nino Cauli & Diego Reforgiato Recupero - 1-19 A Data-Driven Approach to Improve Customer Churn Prediction Based on Telecom Customer Segmentation
by Tianyuan Zhang & Sérgio Moro & Ricardo F. Ramos - 1-20 A Density-Based Random Forest for Imbalanced Data Classification
by Jia Dong & Quan Qian - 1-20 The Time Machine in Columnar NoSQL Databases: The Case of Apache HBase
by Chia-Ping Tsai & Che-Wei Chang & Hung-Chang Hsiao & Haiying Shen - 1-21 Investigation of Using CAPTCHA Keystroke Dynamics to Enhance the Prevention of Phishing Attacks
by Emtethal K. Alamri & Abdullah M. Alnajim & Suliman A. Alsuhibany - 1-22 Bot-Based Emergency Software Applications for Natural Disaster Situations
by Gabriel Ovando-Leon & Luis Veas-Castillo & Veronica Gil-Costa & Mauricio Marin - 1-23 High-Performance Computing and ABMS for High-Resolution COVID-19 Spreading Simulation
by Mattia Pellegrino & Gianfranco Lombardo & Stefano Cagnoni & Agostino Poggi - 1-24 Solar Radiation Forecasting by Pearson Correlation Using LSTM Neural Network and ANFIS Method: Application in the West-Central Jordan
by Hossam Fraihat & Amneh A. Almbaideen & Abdullah Al-Odienat & Bassam Al-Naami & Roberto De Fazio & Paolo Visconti - 1-27 A Survey on Intrusion Detection Systems for Fog and Cloud Computing
by Victor Chang & Lewis Golightly & Paolo Modesti & Qianwen Ariel Xu & Le Minh Thao Doan & Karl Hall & Sreeja Boddu & Anna Kobusińska - 1-30 Self-Organizing Networks for 5G and Beyond: A View from the Top
by Andreas G. Papidas & George C. Polyzos - 1-42 Handover Management in 5G Vehicular Networks
by Ioannis Kosmopoulos & Emmanouil Skondras & Angelos Michalas & Emmanouel T. Michailidis & Dimitrios D. Vergados
February 2022, Volume 14, Issue 3
- 1-14 Forecasting Students Dropout: A UTAD University Study
by Diogo E. Moreira da Silva & Eduardo J. Solteiro Pires & Arsénio Reis & Paulo B. de Moura Oliveira & João Barroso - 1-17 A Vote-Based Architecture to Generate Classified Datasets and Improve Performance of Intrusion Detection Systems Based on Supervised Learning
by Diogo Teixeira & Silvestre Malta & Pedro Pinto - 1-17 A Prototype Web Application to Support Human-Centered Audiovisual Content Authentication and Crowdsourcing
by Nikolaos Vryzas & Anastasia Katsaounidou & Lazaros Vrysis & Rigas Kotsakis & Charalampos Dimoulas - 1-17 Utilizing Blockchain for IoT Privacy through Enhanced ECIES with Secure Hash Function
by Yurika Pant Khanal & Abeer Alsadoon & Khurram Shahzad & Ahmad B. Al-Khalil & Penatiyana W. C. Prasad & Sabih Ur Rehman & Rafiqul Islam - 1-18 Business Models for the Internet of Services: State of the Art and Research Agenda
by Jacqueline Zonichenn Reis & Rodrigo Franco Gonçalves & Marcia Terra da Silva & Nikolai Kazantsev - 1-19 A Survey on the Use of Graph Convolutional Networks for Combating Fake News
by Iraklis Varlamis & Dimitrios Michail & Foteini Glykou & Panagiotis Tsantilas - 1-22 Adjacency-Information-Entropy-Based Cooperative Name Resolution Approach in ICN
by Jiaqi Li & Jiali You & Haojiang Deng - 1-22 Design of Relay Switching to Combat an Eavesdropper in IoT-NOMA Wireless Networks
by Thanh-Nam Tran & Van-Cuu Ho & Thoai Phu Vo & Khanh Ngo Nhu Tran & Miroslav Voznak - 1-25 Transformer-Based Abstractive Summarization for Reddit and Twitter: Single Posts vs. Comment Pools in Three Languages
by Ivan S. Blekanov & Nikita Tarasov & Svetlana S. Bodrunova - 1-28 Quantum Key Distribution for 5G Networks: A Review, State of Art and Future Directions
by Mohd Hirzi Adnan & Zuriati Ahmad Zukarnain & Nur Ziadah Harun - 1-29 Graphol : A Graphical Language for Ontology Modeling Equivalent to OWL 2
by Domenico Lembo & Valerio Santarelli & Domenico Fabio Savo & Giuseppe De Giacomo
January 2022, Volume 14, Issue 2
- 1-13 A Hybrid Robust-Learning Architecture for Medical Image Segmentation with Noisy Labels
by Jialin Shi & Chenyi Guo & Ji Wu - 1-14 Controlling the Trade-Off between Resource Efficiency and User Satisfaction in NDNs Based on Naïve Bayes Data Classification and Lagrange Method
by Abdelkader Tayeb Herouala & Chaker Abdelaziz Kerrache & Benameur Ziani & Carlos T. Calafate & Nasreddine Lagraa & Abdou el Karim Tahari - 1-16 Modelling and Analysis of Performance Characteristics in a 60 Ghz 802.11ad Wireless Mesh Backhaul Network for an Urban 5G Deployment
by Michael Mackay & Alessandro Raschella & Ogeen Toma - 1-16 Efficient Next-Hop Selection in Multi-Hop Routing for IoT Enabled Wireless Sensor Networks
by Saleh M. Altowaijri - 1-16 The Framework of Cross-Domain and Model Adversarial Attack against Deepfake
by Haoxuan Qiu & Yanhui Du & Tianliang Lu - 1-17 Graph Representation-Based Deep Multi-View Semantic Similarity Learning Model for Recommendation
by Jiagang Song & Jiayu Song & Xinpan Yuan & Xiao He & Xinghui Zhu - 1-17 Topology Inference and Link Parameter Estimation Based on End-to-End Measurements
by Grigorios Kakkavas & Vasileios Karyotis & Symeon Papavassiliou - 1-18 An Active Path-Associated Cache Scheme for Mobile Scenes
by Tianchi Zhou & Peng Sun & Rui Han - 1-18 A Single-Rate Multicast Congestion Control (SRMCC) Mechanism in Information-Centric Networking
by Yingjie Duan & Hong Ni & Xiaoyong Zhu & Xu Wang - 1-19 Task Offloading Based on LSTM Prediction and Deep Reinforcement Learning for Efficient Edge Computing in IoT
by Youpeng Tu & Haiming Chen & Linjie Yan & Xinyan Zhou - 1-19 Coarse-to-Fine Entity Alignment for Chinese Heterogeneous Encyclopedia Knowledge Base
by Meng Wu & Tingting Jiang & Chenyang Bu & Bin Zhu - 1-19 An IoT-Based COVID-19 Prevention and Control System for Enclosed Spaces
by Cunwei Yang & Weiqing Wang & Fengying Li & Degang Yang - 1-21 Evaluation of a Reputation Management Technique for Autonomous Vehicles
by Darius Kianersi & Suraj Uppalapati & Anirudh Bansal & Jeremy Straub - 1-22 Selecting Workers Wisely for Crowdsourcing When Copiers and Domain Experts Co-exist
by Xiu Fang & Suxin Si & Guohao Sun & Quan Z. Sheng & Wenjun Wu & Kang Wang & Hang Lv - 1-23 DA-GAN: Dual Attention Generative Adversarial Network for Cross-Modal Retrieval
by Liewu Cai & Lei Zhu & Hongyan Zhang & Xinghui Zhu - 1-24 Research on Progress of Blockchain Consensus Algorithm: A Review on Recent Progress of Blockchain Consensus Algorithms
by Huanliang Xiong & Muxi Chen & Canghai Wu & Yingding Zhao & Wenlong Yi - 1-28 Estimation on the Importance of Semantic Web Integration for Art and Culture Related Online Media Outlets
by Andreas Giannakoulopoulos & Minas Pergantis & Nikos Konstantinou & Alexandros Kouretsis & Aristeidis Lamprogeorgos & Iraklis Varlamis - 1-29 Multi-Attribute Decision Making for Energy-Efficient Public Transport Network Selection in Smart Cities
by Rashmi Munjal & William Liu & Xuejun Li & Jairo Gutierrez & Peter Han Joo Chong - 1-35 Intelligent Traffic Management in Next-Generation Networks
by Ons Aouedi & Kandaraj Piamrat & Benoît Parrein - 1-50 Towards Crowdsourcing Internet of Things (Crowd-IoT): Architectures, Security and Applications
by Kenneth Li Minn Ang & Jasmine Kah Phooi Seng & Ericmoore Ngharamike
February 2022, Volume 14, Issue 2
- 1-6 Acknowledgment to Reviewers of Future Internet in 2021
by Future Internet Editorial Office - 1-14 Improved Eagle Strategy Algorithm for Dynamic Web Service Composition in the IoT: A Conceptual Approach
by Venushini Rajendran & R Kanesaraj Ramasamy & Wan-Noorshahida Mohd-Isa - 1-14 Exploring the Benefits of Combining DevOps and Agile
by Fernando Almeida & Jorge Simões & Sérgio Lopes - 1-15 Safety Verification of Driving Resource Occupancy Rules Based on Functional Language
by Zhixi Hu & Yi Zhu & Xiaoying Chen & Yu Zhao - 1-16 JoSDW: Combating Noisy Labels by Dynamic Weight
by Yaojie Zhang & Huahu Xu & Junsheng Xiao & Minjie Bian - 1-16 Personalizing Environmental Awareness through Smartphones Using AHP and PROMETHEE II
by Akrivi Krouska & Katerina Kabassi & Christos Troussas & Cleo Sgouropoulou - 1-17 Indoor Localization System Using Fingerprinting and Novelty Detection for Evaluation of Confidence
by Helmer Augusto de Souza Mourão & Horácio Antonio Braga Fernandes de Oliveira - 1-18 CNN for User Activity Detection Using Encrypted In-App Mobile Data
by Madushi H. Pathmaperuma & Yogachandran Rahulamathavan & Safak Dogan & Ahmet Kondoz - 1-20 A Performance Comparison of Different Cloud-Based Natural Language Understanding Services for an Italian e-Learning Platform
by Matteo Zubani & Luca Sigalini & Ivan Serina & Luca Putelli & Alfonso E. Gerevini & Mattia Chiari - 1-21 IoT Nodes Authentication and ID Spoofing Detection Based on Joint Use of Physical Layer Security and Machine Learning
by Dania Marabissi & Lorenzo Mucchi & Andrea Stomaci - 1-22 Anomalous Vehicle Recognition in Smart Urban Traffic Monitoring as an Edge Service
by Ning Chen & Yu Chen - 1-22 Open-Source MQTT-Based End-to-End IoT System for Smart City Scenarios
by Cristian D’Ortona & Daniele Tarchi & Carla Raffaelli - 1-23 Flow-Based Programming for Machine Learning
by Tanmaya Mahapatra & Syeeda Nilofer Banoo - 1-25 A Strategy-Based Formal Approach for Fog Systems Analysis
by Souad Marir & Faiza Belala & Nabil Hameurlain - 1-25 Digital Twin—Cyber Replica of Physical Things: Architecture, Applications and Future Research Directions
by Cheng Qian & Xing Liu & Colin Ripley & Mian Qian & Fan Liang & Wei Yu - 1-26 Flow Scheduling in Data Center Networks with Time and Energy Constraints: A Software-Defined Network Approach
by Martin Fraga & Matías Micheletto & Andrés Llinás & Rodrigo Santos & Paula Zabala - 1-32 Securing IoT Devices against Differential-Linear (DL) Attack Used on Serpent Algorithm
by Khumbelo Muthavhine & Mbuyu Sumbwanyambe - 1-39 Network Function Virtualization and Service Function Chaining Frameworks: A Comprehensive Review of Requirements, Objectives, Implementations, and Open Research Challenges
by Haruna Umar Adoga & Dimitrios P. Pezaros
January 2022, Volume 14, Issue 1
- 1-10 Global Contextual Dependency Network for Object Detection
by Junda Li & Chunxu Zhang & Bo Yang - 1-12 CacheHawkeye: Detecting Cache Side Channel Attacks Based on Memory Events
by Hui Yan & Chaoyuan Cui - 1-14 SMYOLO: Lightweight Pedestrian Target Detection Algorithm in Low-Altitude Scenarios
by Weiwei Zhang & Xin Ma & Yuzhao Zhang & Ming Ji & Chenghui Zhen - 1-18 A Queueing-Based Model Performance Evaluation for Internet of People Supported by Fog Computing
by Laécio Rodrigues & Joel J. P. C. Rodrigues & Antonio de Barros Serra & Francisco Airton Silva - 1-19 Utilizing Half Convolutional Autoencoder to Generate User and Item Vectors for Initialization in Matrix Factorization
by Tan Nghia Duong & Nguyen Nam Doan & Truong Giang Do & Manh Hoang Tran & Duc Minh Nguyen & Quang Hieu Dang - 1-19 A Semantic Preprocessing Framework for Breaking News Detection to Support Future Drone Journalism Services
by Michail Niarchos & Marina Eirini Stamatiadou & Charalampos Dimoulas & Andreas Veglis & Andreas Symeonidis - 1-20 Enhancing Reactive Ad Hoc Routing Protocols with Trust
by Yelena Trofimova & Pavel Tvrdík - 1-21 Mobility in Unsupervised Word Embeddings for Knowledge Extraction—The Scholars’ Trajectories across Research Topics
by Gianfranco Lombardo & Michele Tomaiuolo & Monica Mordonini & Gaia Codeluppi & Agostino Poggi - 1-22 S4 Features and Artificial Intelligence for Designing a Robot against COVID-19—Robocov
by Pedro Ponce & Omar Mata & Esteban Perez & Juan Roberto Lopez & Arturo Molina & Troy McDaniel - 1-22 Experimentation Environments for Data Center Routing Protocols: A Comprehensive Review
by Leonardo Alberro & Alberto Castro & Eduardo Grampin
December 2021, Volume 14, Issue 1
- 1-9 The Important Role of Global State for Multi-Agent Reinforcement Learning
by Shuailong Li & Wei Zhang & Yuquan Leng & Xiaohui Wang - 1-12 Real-Time Nanoscopic Rider Safety System for Smart and Green Mobility Based upon Varied Infrastructure Parameters
by Faheem Ahmed Malik & Laurent Dala & Krishna Busawon - 1-12 Improved Classification of Blockchain Transactions Using Feature Engineering and Ensemble Learning
by Chandrashekar Jatoth & Rishabh Jain & Ugo Fiore & Subrahmanyam Chatharasupalli - 1-14 Key Points’ Location in Infrared Images of the Human Body Based on Mscf-ResNet
by Shengguo Ge & Siti Nurulain Mohd Rum - 1-15 Dis-Cover AI Minds to Preserve Human Knowledge
by Leonardo Ranaldi & Francesca Fallucchi & Fabio Massimo Zanzotto - 1-17 An Automated Behaviour-Based Clustering of IoT Botnets
by Tolijan Trajanovski & Ning Zhang - 1-17 The Impact of a Number of Samples on Unsupervised Feature Extraction, Based on Deep Learning for Detection Defects in Printed Circuit Boards
by Ihar Volkau & Abdul Mujeeb & Wenting Dai & Marius Erdt & Alexei Sourin - 1-18 Machine Learning-Based Lie Detector Applied to a Novel Annotated Game Dataset
by Nuria Rodriguez-Diaz & Decky Aspandi & Federico M. Sukno & Xavier Binefa - 1-18 Your Face Mirrors Your Deepest Beliefs—Predicting Personality and Morals through Facial Emotion Recognition
by Peter A. Gloor & Andrea Fronzetti Colladon & Erkin Altuntas & Cengiz Cetinkaya & Maximilian F. Kaiser & Lukas Ripperger & Tim Schaefer - 1-19 No Perfect Outdoors: Towards a Deep Profiling of GNSS-Based Location Contexts
by Jin Wang & Jun Luo - 1-19 DD-FoG: Intelligent Distributed Dynamic FoG Computing Framework
by Volkov Artem & Kovalenko Vadim & Ibrahim A. Elgendy & Ammar Muthanna & Andrey Koucheryavy - 1-19 An In-Network Cooperative Storage Schema Based on Neighbor Offloading in a Programmable Data Plane
by Shoujiang Dang & Rui Han - 1-21 Application of Machine Learning Techniques to Predict a Patient’s No-Show in the Healthcare Sector
by Luiz Henrique A. Salazar & Valderi R. Q. Leithardt & Wemerson Delcio Parreira & Anita M. da Rocha Fernandes & Jorge Luis Victória Barbosa & Sérgio Duarte Correia - 1-24 Authorship Attribution of Social Media and Literary Russian-Language Texts Using Machine Learning Methods and Feature Selection
by Anastasia Fedotova & Aleksandr Romanov & Anna Kurtukova & Alexander Shelupanov - 1-27 Security and Privacy in Cloud Computing: Technical Review
by Yunusa Simpa Abdulsalam & Mustapha Hedabou - 1-29 Three Layered Architecture for Driver Behavior Analysis and Personalized Assistance with Alert Message Dissemination in 5G Envisioned Fog-IoCV
by Mazen Alowish & Yoshiaki Shiraishi & Masami Mohri & Masakatu Morii - 1-31 Query Processing in Blockchain Systems: Current State and Future Challenges
by Dennis Przytarski & Christoph Stach & Clémentine Gritti & Bernhard Mitschang - 1-34 The Car-Following Model and Its Applications in the V2X Environment: A Historical Review
by Junyan Han & Huili Shi & Longfei Chen & Hao Li & Xiaoyuan Wang - 1-44 A Survey on Big IoT Data Indexing: Potential Solutions, Recent Advancements, and Open Issues
by Zineddine Kouahla & Ala-Eddine Benrazek & Mohamed Amine Ferrag & Brahim Farou & Hamid Seridi & Muhammet Kurulay & Adeel Anjum & Alia Asheralieva
November 2021, Volume 13, Issue 12
- 1-14 Time Optimization of Unmanned Aerial Vehicles Using an Augmented Path
by Abdul Quadir Md & Divyank Agrawal & Monark Mehta & Arun Kumar Sivaraman & Kong Fah Tee - 1-16 Adaptive Multi-Grained Buffer Management for Database Systems
by Xiaoliang Wang & Peiquan Jin - 1-16 An Advanced Deep Learning Approach for Multi-Object Counting in Urban Vehicular Environments
by Ahmed Dirir & Henry Ignatious & Hesham Elsayed & Manzoor Khan & Mohammed Adib & Anas Mahmoud & Moatasem Al-Gunaid - 1-18 Improving the Robustness of Model Compression by On-Manifold Adversarial Training
by Junhyung Kwon & Sangkyun Lee - 1-18 DNS Firewall Based on Machine Learning
by Claudio Marques & Silvestre Malta & João Magalhães - 1-19 Blockchain and Self Sovereign Identity to Support Quality in the Food Supply Chain
by Luisanna Cocco & Roberto Tonelli & Michele Marchesi - 1-19 Machine Learning Algorithm for Delay Prediction in IoT and Tactile Internet
by Ali R. Abdellah & Omar Abdulkareem Mahmood & Ruslan Kirichek & Alexander Paramonov & Andrey Koucheryavy - 1-19 Context-Induced Activity Monitoring for On-Demand Things-of-Interest Recommendation in an Ambient Intelligent Environment
by May Altulyan & Lina Yao & Chaoran Huang & Xianzhi Wang & Salil S. Kanhere - 1-19 An Efficient Deep Convolutional Neural Network Approach for Object Detection and Recognition Using a Multi-Scale Anchor Box in Real-Time
by Vijayakumar Varadarajan & Dweepna Garg & Ketan Kotecha - 1-19 SASLedger: A Secured, Accelerated Scalable Storage Solution for Distributed Ledger Systems
by Haoli Sun & Bingfeng Pi & Jun Sun & Takeshi Miyamae & Masanobu Morinaga - 1-22 Ontologies in Cloud Computing—Review and Future Directions
by JohnBosco Agbaegbu & Oluwasefunmi Tale Arogundade & Sanjay Misra & Robertas Damaševičius - 1-31 A Secure and Efficient Multi-Factor Authentication Algorithm for Mobile Money Applications
by Guma Ali & Mussa Ally Dida & Anael Elikana Sam
December 2021, Volume 13, Issue 12
- 1-12 Phubber’s Emotional Activations: The Association between PANAS and Phubbing Behavior
by Andrea Guazzini & Tommaso Raimondi & Benedetta Biagini & Franco Bagnoli & Mirko Duradoni - 1-12 An Experimental Performance Evaluation of Cloud-API-Based Applications
by Yara Abuzrieq & Amro Al-Said Ahmad & Maram Bani Younes - 1-15 The Machine-to-Everything (M2X) Economy: Business Enactments, Collaborations, and e-Governance
by Benjamin Leiding & Priyanka Sharma & Alexander Norta - 1-15 Implementation and Evaluation of Nodal Distribution and Movement in a 5G Mobile Network
by Dmitry Baranov & Alexandr Terekhin & Dmitry Bragin & Anton Konev - 1-16 Proposal and Investigation of a Convolutional and LSTM Neural Network for the Cost-Aware Resource Prediction in Softwarized Networks
by Vincenzo Eramo & Francesco Valente & Tiziana Catena & Francesco Giacinto Lavacca - 1-16 Fog-Based CDN Framework for Minimizing Latency of Web Services Using Fog-Based HTTP Browser
by Ahmed H. Ibrahim & Zaki T. Fayed & Hossam M. Faheem - 1-19 Securing Environmental IoT Data Using Masked Authentication Messaging Protocol in a DAG-Based Blockchain: IOTA Tangle
by Pranav Gangwani & Alexander Perez-Pons & Tushar Bhardwaj & Himanshu Upadhyay & Santosh Joshi & Leonel Lagos - 1-21 Reconstruction of a 3D Human Foot Shape Model Based on a Video Stream Using Photogrammetry and Deep Neural Networks
by Lev Shilov & Semen Shanshin & Aleksandr Romanov & Anastasia Fedotova & Anna Kurtukova & Evgeny Kostyuchenko & Ivan Sidorov - 1-22 Models versus Datasets: Reducing Bias through Building a Comprehensive IDS Benchmark
by Rasheed Ahmad & Izzat Alsmadi & Wasim Alhamdani & Lo’ai Tawalbeh - 1-24 FlockAI: A Testing Suite for ML-Driven Drone Applications
by Demetris Trihinas & Michalis Agathocleous & Karlen Avogian & Ioannis Katakis - 1-32 Blockchain Application in Internet of Vehicles: Challenges, Contributions and Current Limitations
by Evgenia Kapassa & Marinos Themistocleous & Klitos Christodoulou & Elias Iosif
October 2021, Volume 13, Issue 11
- 1-11 Security Challenges for Light Emitting Systems
by Louiza Hamada & Pascal Lorenz & Marc Gilg - 1-14 COVIDNet: Implementing Parallel Architecture on Sound and Image for High Efficacy
by Manickam Murugappan & John Victor Joshua Thomas & Ugo Fiore & Yesudas Bevish Jinila & Subhashini Radhakrishnan - 1-14 Securing Resource-Constrained IoT Nodes: Towards Intelligent Microcontroller-Based Attack Detection in Distributed Smart Applications
by Andrii Shalaginov & Muhammad Ajmal Azad - 1-15 Representing and Validating Cultural Heritage Knowledge Graphs in CIDOC-CRM Ontology
by Ghazal Faraj & András Micsik - 1-18 Rumor Detection Based on Attention CNN and Time Series of Context Information
by Yun Peng & Jianmei Wang - 1-18 Introducing Various Semantic Models for Amharic: Experimentation and Evaluation with Multiple Tasks and Datasets
by Seid Muhie Yimam & Abinew Ali Ayele & Gopalakrishnan Venkatesh & Ibrahim Gashaw & Chris Biemann - 1-18 Towards Virtuous Cloud Data Storage Using Access Policy Hiding in Ciphertext Policy Attribute-Based Encryption
by Siti Dhalila Mohd Satar & Masnida Hussin & Zurina Mohd Hanapi & Mohamad Afendee Mohamed - 1-20 A Multidimensional Analysis of Released COVID-19 Location-Based Mobile Applications
by Theodoros Oikonomidis & Konstantinos Fouskas & Maro Vlachopoulou - 1-20 Analytics on Anonymity for Privacy Retention in Smart Health Data
by Sevgi Arca & Rattikorn Hewett - 1-20 Configurable Hardware Core for IoT Object Detection
by Pedro R. Miranda & Daniel Pestana & João D. Lopes & Rui Policarpo Duarte & Mário P. Véstias & Horácio C. Neto & José T. de Sousa - 1-21 Software Design and Experimental Evaluation of a Reduced AES for IoT Applications
by Malik Qasaimeh & Raad S. Al-Qassas & Mohammad Ababneh - 1-24 Dynamic Allocation of SDN Controllers in NFV-Based MEC for the Internet of Vehicles
by Rhodney Simões & Kelvin Dias & Ricardo Martins - 1-28 Online Service Function Chain Deployment for Live-Streaming in Virtualized Content Delivery Networks: A Deep Reinforcement Learning Approach
by Jesús Fernando Cevallos Moreno & Rebecca Sattler & Raúl P. Caulier Cisterna & Lorenzo Ricciardi Celsi & Aminael Sánchez Rodríguez & Massimo Mecella - 1-39 University Community Members’ Perceptions of Labels for Online Media
by Ryan Suttle & Scott Hogan & Rachel Aumaugher & Matthew Spradling & Zak Merrigan & Jeremy Straub - 1-45 HyDSMaaS: A Hybrid Communication Infrastructure with LoRaWAN and LoraMesh for the Demand Side Management as a Service
by Artur Felipe da Silva Veloso & José Valdemir Reis Júnior & Ricardo de Andrade Lira Rabelo & Jocines Dela-flora Silveira
November 2021, Volume 13, Issue 11
- 1-11 Community Formation as a Byproduct of a Recommendation System: A Simulation Model for Bubble Formation in Social Media
by Franco Bagnoli & Guido de Bonfioli Cavalcabo’ & Banedetto Casu & Andrea Guazzini - 1-12 Person Re-Identification by Low-Dimensional Features and Metric Learning
by Xingyuan Chen & Huahu Xu & Yang Li & Minjie Bian - 1-13 Detection of Induced Activity in Social Networks: Model and Methodology
by Dmitrii Gavra & Ksenia Namyatova & Lidia Vitkova