Content
August 2024, Volume 16, Issue 8
- 1-25 Overlay and Virtual Private Networks Security Performances Analysis with Open Source Infrastructure Deployment
by Antonio Francesco Gentile & Davide Macrì & Emilio Greco & Peppino Fazio - 1-25 Multi-Class Intrusion Detection Based on Transformer for IoT Networks Using CIC-IoT-2023 Dataset
by Shu-Ming Tseng & Yan-Qi Wang & Yung-Chung Wang - 1-27 Beat the Heat: Syscall Attack Detection via Thermal Side Channel
by Teodora Vasilas & Claudiu Bacila & Remus Brad - 1-28 FIVADMI: A Framework for In-Vehicle Anomaly Detection by Monitoring and Isolation
by Khaled Mahbub & Antonio Nehme & Mohammad Patwary & Marc Lacoste & Sylvain Allio - 1-29 A Survey on the Use of Large Language Models (LLMs) in Fake News
by Eleftheria Papageorgiou & Christos Chronis & Iraklis Varlamis & Yassine Himeur - 1-33 Artificial Intelligence of Things as New Paradigm in Aviation Health Monitoring Systems
by Igor Kabashkin & Leonid Shoshin - 1-37 Early Ransomware Detection with Deep Learning Models
by Matan Davidian & Michael Kiperberg & Natalia Vanetik
July 2024, Volume 16, Issue 8
- 1-15 Performance Evaluation of Lightweight Stream Ciphers for Real-Time Video Feed Encryption on ARM Processor
by Mohsin Khan & Håvard Dagenborg & Dag Johansen - 1-15 A Low-Complexity Solution for Optimizing Binary Intelligent Reflecting Surfaces towards Wireless Communication
by Santosh A. Janawade & Prabu Krishnan & Krishnamoorthy Kandasamy & Shashank S. Holla & Karthik Rao & Aditya Chandrasekar - 1-16 Optimal Weighted Voting-Based Collaborated Malware Detection for Zero-Day Malware: A Case Study on VirusTotal and MalwareBazaar
by Naonobu Okazaki & Shotaro Usuzaki & Tsubasa Waki & Hyoga Kawagoe & Mirang Park & Hisaaki Yamaba & Kentaro Aburada - 1-16 Leveraging Medical Knowledge Graphs and Large Language Models for Enhanced Mental Disorder Information Extraction
by Chaelim Park & Hayoung Lee & Ok-ran Jeong - 1-17 Enhancing Recognition of Human–Object Interaction from Visual Data Using Egocentric Wearable Camera
by Danish Hamid & Muhammad Ehatisham Ul Haq & Amanullah Yasin & Fiza Murtaza & Muhammad Awais Azam - 1-17 A Risk Assessment Framework for Mobile Apps in Mobile Cloud Computing Environments
by Noah Oghenefego Ogwara & Krassie Petrova & Mee Loong Yang & Stephen G. MacDonell - 1-18 Power-Efficient Resource Allocation for Active STAR-RIS-Aided SWIPT Communication Systems
by Chuanzhe Gao & Shidang Li & Yixuan Wu & Siyi Duan & Mingsheng Wei & Bencheng Yu - 1-18 Modeling Trust in IoT Systems for Drinking-Water Management
by Aicha Aiche & Pierre-Martin Tardif & Mohammed Erritali - 1-19 Software-Defined Named Data Networking in Literature: A Review
by Albatool Alhawas & Abdelfettah Belghith - 1-19 Energy Efficiency and Load Optimization in Heterogeneous Networks through Dynamic Sleep Strategies: A Constraint-Based Optimization Approach
by Amna Shabbir & Muhammad Faizan Shirazi & Safdar Rizvi & Sadique Ahmad & Abdelhamied A. Ateya - 1-19 Ontology in Hybrid Intelligence: A Concise Literature Review
by Salvatore Flavio Pileggi - 1-20 MIMA: Multi-Feature Interaction Meta-Path Aggregation Heterogeneous Graph Neural Network for Recommendations
by Yang Li & Shichao Yan & Fangtao Zhao & Yi Jiang & Shuai Chen & Lei Wang & Li Ma - 1-21 Empowering Clinical Engineering and Evidence-Based Maintenance with IoT and Indoor Navigation
by Alessio Luschi & Giovanni Luca Daino & Gianpaolo Ghisalberti & Vincenzo Mezzatesta & Ernesto Iadanza - 1-23 Towards Collaborative Edge Intelligence: Blockchain-Based Data Valuation and Scheduling for Improved Quality of Service
by Yao Du & Zehua Wang & Cyril Leung & Victor C. M. Leung - 1-31 A Novel Deep Learning Framework for Intrusion Detection Systems in Wireless Network
by Khoa Dinh Nguyen Dang & Peppino Fazio & Miroslav Voznak - 1-37 Active Queue Management in L4S with Asynchronous Advantage Actor-Critic: A FreeBSD Networking Stack Perspective
by Deol Satish & Jonathan Kua & Shiva Raj Pokhrel
June 2024, Volume 16, Issue 7
- 1-4 Edge Cloud Computing and Federated–Split Learning in Internet of Things
by Qiang Duan & Zhihui Lu - 1-14 Digital Transformation in the Construction Sector: Blockchain, BIM and SSI for a More Sustainable and Transparent System
by Luisanna Cocco & Roberto Tonelli - 1-16 INFLUTRUST : Trust-Based Influencer Marketing Campaigns in Online Social Networks
by Adedamola Adesokan & Aisha B Rahman & Eirini Eleni Tsiropoulou - 1-16 Exploring the Architectural Composition of Cyber Ranges: A Systematic Review
by Dionysios Stamatopoulos & Menelaos Katsantonis & Panagiotis Fouliras & Ioannis Mavridis - 1-17 Evaluating Quantized Llama 2 Models for IoT Privacy Policy Language Generation
by Bhavani Malisetty & Alfredo J. Perez - 1-18 Trusted Composition of Internet of Medical Things over Imperfect Networks
by Ehsan Ahmad & Brian Larson & Abdulbasid Banga - 1-19 Digital Identity in the EU: Promoting eIDAS Solutions Based on Biometrics
by Pietro Ruiu & Salvatore Saiu & Enrico Grosso - 1-20 Differential Private Federated Learning in Geographically Distributed Public Administration Processes
by Mirwais Ahmadzai & Giang Nguyen - 1-20 Performance Impact of Nested Congestion Control on Transport-Layer Multipath Tunneling
by Marcus Pieska & Andreas Kassler & Anna Brunstrom & Veselin Rakocevic & Markus Amend - 1-21 Transforming Network Management: Intent-Based Flexible Control Empowered by Efficient Flow-Centric Visibility
by Aris Cahyadi Risdianto & Muhammad Usman & Muhammad Ahmad Rathore - 1-23 A Systematic Review and Comprehensive Analysis of Pioneering AI Chatbot Models from Education to Healthcare: ChatGPT, Bard, Llama, Ernie and Grok
by Ketmanto Wangsa & Shakir Karim & Ergun Gide & Mahmoud Elkhodr - 1-23 Combining Advanced Feature-Selection Methods to Uncover Atypical Energy-Consumption Patterns
by Lucas Henriques & Felipe Prata Lima & Cecilia Castro - 1-23 Smart Irrigation Systems from Cyber–Physical Perspective: State of Art and Future Directions
by Mian Qian & Cheng Qian & Guobin Xu & Pu Tian & Wei Yu - 1-27 Building Information Modeling and Digital Twins for Functional and Technical Design of Smart Buildings with Distributed IoT Networks—Review and New Challenges Discussion
by Gabriela Walczyk & Andrzej Ożadowicz - 1-33 Mapping How Artificial Intelligence Blends with Healthcare: Insights from a Bibliometric Analysis
by Loukas Triantafyllopoulos & Evgenia Paxinou & Georgios Feretzakis & Dimitris Kalles & Vassilios S. Verykios - 1-36 Enhancing Network Slicing Security: Machine Learning, Software-Defined Networking, and Network Functions Virtualization-Driven Strategies
by José Cunha & Pedro Ferreira & Eva M. Castro & Paula Cristina Oliveira & Maria João Nicolau & Iván Núñez & Xosé Ramon Sousa & Carlos Serôdio
July 2024, Volume 16, Issue 7
- 1-15 Explainable Artificial Intelligence Methods to Enhance Transparency and Trust in Digital Deliberation Settings
by Ilias Siachos & Nikos Karacapilidis - 1-15 Intrusion Detection in IoT Using Deep Residual Networks with Attention Mechanisms
by Bo Cui & Yachao Chai & Zhen Yang & Keqin Li - 1-16 Software-Bus-Toolchain (SBT): Introducing a Versatile Method for Quickly Implementing (I)IoT-Scenarios
by Simon D. Duque Anton - 1-16 Enhancing Autonomous Driving Navigation Using Soft Actor-Critic
by Badr Ben Elallid & Nabil Benamar & Miloud Bagaa & Yassine Hadjadj-Aoul - 1-16 The Use of Virtual Reality in the Countries of the Central American Bank for Economic Integration (CABEI)
by Álvaro Antón-Sancho & Pablo Fernández-Arias & Edwan Anderson Ariza & Diego Vergara - 1-17 Evaluating Convolutional Neural Networks and Vision Transformers for Baby Cry Sound Analysis
by Samir A. Younis & Dalia Sobhy & Noha S. Tawfik - 1-17 Emotion Recognition from Videos Using Multimodal Large Language Models
by Lorenzo Vaiani & Luca Cagliero & Paolo Garza - 1-17 SD-GPSR: A Software-Defined Greedy Perimeter Stateless Routing Method Based on Geographic Location Information
by Shaopei Gao & Qiang Liu & Junjie Zeng & Li Li - 1-18 A Packet Content-Oriented Remote Code Execution Attack Payload Detection Model
by Enbo Sun & Jiaxuan Han & Yiquan Li & Cheng Huang - 1-18 Optimizing Drone Energy Use for Emergency Communications in Disasters via Deep Reinforcement Learning
by Wen Qiu & Xun Shao & Hiroshi Masui & William Liu - 1-20 Dynamic SNR, Spectral Efficiency, and Rate Characterization in 5G/6G mmWave/sub-THz Systems with Macro- and Micro-Mobilities
by Darya Ostrikova & Elizaveta Golos & Vitalii Beschastnyi & Egor Machnev & Yuliya Gaidamaka & Konstantin Samouylov - 1-21 Towards an Optimized Blockchain-Based Secure Medical Prescription-Management System
by Imen Ahmed & Mariem Turki & Mouna Baklouti & Bouthaina Dammak & Amnah Alshahrani - 1-22 Behind the Code: Identifying Zero-Day Exploits in WordPress
by Mohamed Azarudheen Mohamed Mohideen & Muhammad Shahroz Nadeem & James Hardy & Haider Ali & Umair Ullah Tariq & Fariza Sabrina & Muhammad Waqar & Salman Ahmed - 1-23 Watch the Skies: A Study on Drone Attack Vectors, Forensic Approaches, and Persisting Security Challenges
by Amr Adel & Tony Jan - 1-24 Achieving Accountability and Data Integrity in Message Queuing Telemetry Transport Using Blockchain and Interplanetary File System
by Sara Lazzaro & Francesco Buccafurri - 1-25 Multi-Agent Dynamic Fog Service Placement Approach
by Nerijus Šatkauskas & Algimantas Venčkauskas - 1-27 Does Anyone Care about the Opinion of People on Participating in a “Social” Metaverse? A Review and a Draft Proposal for a Surveying Tool
by Stefano Mottura - 1-29 A Novel Hybrid Unsupervised Learning Approach for Enhanced Cybersecurity in the IoT
by Prabu Kaliyaperumal & Sudhakar Periyasamy & Manikandan Thirumalaisamy & Balamurugan Balusamy & Francesco Benedetto - 1-32 Human–AI Collaboration for Remote Sighted Assistance: Perspectives from the LLM Era
by Rui Yu & Sooyeon Lee & Jingyi Xie & Syed Masum Billah & John M. Carroll - 1-34 Microservice-Based Vehicular Network for Seamless and Ultra-Reliable Communications of Connected Vehicles
by Mira M. Zarie & Abdelhamied A. Ateya & Mohammed S. Sayed & Mohammed ElAffendi & Mohammad Mahmoud Abdellatif - 1-35 TWIN-ADAPT: Continuous Learning for Digital Twin-Enabled Online Anomaly Classification in IoT-Driven Smart Labs
by Ragini Gupta & Beitong Tian & Yaohui Wang & Klara Nahrstedt - 1-36 Blockchain Financial Statements: Innovating Financial Reporting, Accounting, and Liquidity Management
by Natalia Dashkevich & Steve Counsell & Giuseppe Destefanis - 1-44 NFT Technology for Enhanced Global Digital Registers: A Novel Approach to Tokenization
by Oleksandr Kuznetsov & Emanuele Frontoni & Kateryna Kuznetsova & Ruslan Shevchuk & Mikolaj Karpinski
May 2024, Volume 16, Issue 6
- 1-14 Object and Event Detection Pipeline for Rink Hockey Games
by Jorge Miguel Lopes & Luis Paulo Mota & Samuel Marques Mota & José Manuel Torres & Rui Silva Moreira & Christophe Soares & Ivo Pereira & Feliz Ribeiro Gouveia & Pedro Sobral - 1-14 Research on Multi-Modal Pedestrian Detection and Tracking Algorithm Based on Deep Learning
by Rui Zhao & Jutao Hao & Huan Huo - 1-15 Tracing Student Activity Patterns in E-Learning Environments: Insights into Academic Performance
by Evgenia Paxinou & Georgios Feretzakis & Rozita Tsoni & Dimitrios Karapiperis & Dimitrios Kalles & Vassilios S. Verykios - 1-16 Urban Green Spaces and Mental Well-Being: A Systematic Review of Studies Comparing Virtual Reality versus Real Nature
by Liyuan Liang & Like Gobeawan & Siu-Kit Lau & Ervine Shengwei Lin & Kai Keng Ang - 1-16 Enhancing Sensor Data Imputation: OWA-Based Model Aggregation for Missing Values
by Muthana Al-Amidie & Laith Alzubaidi & Muhammad Aminul Islam & Derek T. Anderson - 1-16 Prophet–CEEMDAN–ARBiLSTM-Based Model for Short-Term Load Forecasting
by Jindong Yang & Xiran Zhang & Wenhao Chen & Fei Rong - 1-17 Enhanced Beacons Dynamic Transmission over TSCH
by Erik Ortiz Guerra & Mario Martínez Morfa & Carlos Manuel García Algora & Hector Cruz-Enriquez & Kris Steenhaut & Samuel Montejo-Sánchez - 1-19 Exploiting Autoencoder-Based Anomaly Detection to Enhance Cybersecurity in Power Grids
by Fouzi Harrou & Benamar Bouyeddou & Abdelkader Dairi & Ying Sun - 1-19 Data Collection in Areas without Infrastructure Using LoRa Technology and a Quadrotor
by Josué I. Rojo-García & Sergio A. Vera-Chavarría & Yair Lozano-Hernández & Victor G. Sánchez-Meza & Jaime González-Sierra & Luz N. Oliva-Moreno - 1-19 Studying the Quality of Source Code Generated by Different AI Generative Engines: An Empirical Evaluation
by Davide Tosi - 1-19 GreenLab, an IoT-Based Small-Scale Smart Greenhouse
by Cristian Volosciuc & Răzvan Bogdan & Bianca Blajovan & Cristina Stângaciu & Marius Marcu - 1-20 MADDPG-Based Offloading Strategy for Timing-Dependent Tasks in Edge Computing
by Yuchen Wang & Zishan Huang & Zhongcheng Wei & Jijun Zhao - 1-20 Dynamic Spatial–Temporal Self-Attention Network for Traffic Flow Prediction
by Dong Wang & Hongji Yang & Hua Zhou - 1-21 Using ChatGPT in Software Requirements Engineering: A Comprehensive Review
by Nuno Marques & Rodrigo Rocha Silva & Jorge Bernardino - 1-21 Cross-Layer Optimization for Enhanced IoT Connectivity: A Novel Routing Protocol for Opportunistic Networks
by Ayman Khalil & Besma Zeddini - 1-21 HP-LSTM: Hawkes Process–LSTM-Based Detection of DDoS Attack for In-Vehicle Network
by Xingyu Li & Ruifeng Li & Yanchen Liu - 1-22 Harnessing the Cloud: A Novel Approach to Smart Solar Plant Monitoring
by Mohammad Imran Ali & Shahi Dost & Khurram Shehzad Khattak & Muhammad Imran Khan & Riaz Muhammad
June 2024, Volume 16, Issue 6
- 1-12 Adapting Self-Regulated Learning in an Age of Generative Artificial Intelligence Chatbots
by Joel Weijia Lai - 1-13 IMTIBOT: An Intelligent Mitigation Technique for IoT Botnets
by Umang Garg & Santosh Kumar & Aniket Mahanti - 1-14 Reversible Data Hiding in Encrypted 3D Mesh Models Based on Multi-Group Partition and Closest Pair Prediction
by Xu Wang & Jui-Chuan Liu & Ching-Chun Chang & Chin-Chen Chang - 1-14 Improved Particle Filter in Machine Learning-Based BLE Fingerprinting Method to Reduce Indoor Location Estimation Errors
by Jingshi Qian & Jiahe Li & Nobuyoshi Komuro & Won-Suk Kim & Younghwan Yoo - 1-14 Discovery of Cloud Applications from Logs
by Ashot Harutyunyan & Arnak Poghosyan & Tigran Bunarjyan & Andranik Haroyan & Marine Harutyunyan & Lilit Harutyunyan & Nelson Baloian - 1-15 Metaverse and Fashion: An Analysis of Consumer Online Interest
by Carmen Ruiz Viñals & Marta Gil Ibáñez & José Luis Del Olmo Arriaga - 1-16 Enabling End-User Development in Smart Homes: A Machine Learning-Powered Digital Twin for Energy Efficient Management
by Luca Cotti & Davide Guizzardi & Barbara Rita Barricelli & Daniela Fogli - 1-17 The Use of Artificial Intelligence in eParticipation: Mapping Current Research
by Zisis Vasilakopoulos & Theocharis Tavantzis & Rafail Promikyridis & Efthimios Tambouris - 1-17 Learning Modality Consistency and Difference Information with Multitask Learning for Multimodal Sentiment Analysis
by Cheng Fang & Feifei Liang & Tianchi Li & Fangheng Guan - 1-17 Adaptive Framework for Maintenance Scheduling Based on Dynamic Preventive Intervals and Remaining Useful Life Estimation
by Pedro Nunes & Eugénio Rocha & José Santos - 1-18 In-Home Evaluation of the Neo Care Artificial Intelligence Sound-Based Fall Detection System
by Carol Maher & Kylie A. Dankiw & Ben Singh & Svetlana Bogomolova & Rachel G. Curtis - 1-18 Towards a New Business Model for Streaming Platforms Using Blockchain Technology
by Rendrikson Soares & André Araújo - 1-18 Optimizing Data Parallelism for FM-Based Short-Read Alignment on the Heterogeneous Non-Uniform Memory Access Architectures
by Shaolong Chen & Yunzi Dai & Liwei Liu & Xinting Yu - 1-19 Evaluation of Radio Access Protocols for V2X in 6G Scenario-Based Models
by Héctor Orrillo & André Sabino & Mário Marques da Silva - 1-22 Efficiency of Federated Learning and Blockchain in Preserving Privacy and Enhancing the Performance of Credit Card Fraud Detection (CCFD) Systems
by Tahani Baabdullah & Amani Alzahrani & Danda B. Rawat & Chunmei Liu - 1-22 Implementation of Lightweight Machine Learning-Based Intrusion Detection System on IoT Devices of Smart Homes
by Abbas Javed & Amna Ehtsham & Muhammad Jawad & Muhammad Naeem Awais & Ayyaz-ul-Haq Qureshi & Hadi Larijani - 1-23 Usability Evaluation of Wearable Smartwatches Using Customized Heuristics and System Usability Scale Score
by Majed A. Alshamari & Maha M. Althobaiti - 1-25 Visual Data and Pattern Analysis for Smart Education: A Robust DRL-Based Early Warning System for Student Performance Prediction
by Wala Bagunaid & Naveen Chilamkurti & Ahmad Salehi Shahraki & Saeed Bamashmos - 1-29 Metric Space Indices for Dynamic Optimization in a Peer to Peer-Based Image Classification Crowdsourcing Platform
by Fernando Loor & Veronica Gil-Costa & Mauricio Marin - 1-29 Enhancing Efficiency and Security in Unbalanced PSI-CA Protocols through Cloud Computing and Homomorphic Encryption in Mobile Networks
by Wuzheng Tan & Shenglong Du & Jian Weng - 1-32 Impact, Compliance, and Countermeasures in Relation to Data Breaches in Publicly Traded U.S. Companies
by Gabriel Arquelau Pimenta Rodrigues & André Luiz Marques Serrano & Guilherme Fay Vergara & Robson de Oliveira Albuquerque & Georges Daniel Amvame Nze - 1-32 Development of a Theoretical Model for Digital Risks Arising from the Implementation of Industry 4.0 (TMR-I4.0)
by Vitor Hugo dos Santos Filho & Luis Maurício Martins de Resende & Joseane Pontes - 1-40 Authentication and Key Agreement Protocol in Hybrid Edge–Fog–Cloud Computing Enhanced by 5G Networks
by Jiayi Zhang & Abdelkader Ouda & Raafat Abu-Rukba
April 2024, Volume 16, Issue 5
- 1-13 Novel Approach towards a Fully Deep Learning-Based IoT Receiver Architecture: From Estimation to Decoding
by Matthew Boeding & Michael Hempel & Hamid Sharif - 1-15 Exploring Data Input Problems in Mixed Reality Environments: Proposal and Evaluation of Natural Interaction Techniques
by Jingzhe Zhang & Tiange Chen & Wenjie Gong & Jiayue Liu & Jiangjie Chen - 1-15 A Hybrid Multi-Agent Reinforcement Learning Approach for Spectrum Sharing in Vehicular Networks
by Mansoor Jamal & Zaib Ullah & Muddasar Naeem & Musarat Abbas & Antonio Coronato - 1-16 Effective Monoaural Speech Separation through Convolutional Top-Down Multi-View Network
by Aye Nyein Aung & Che-Wei Liao & Jeih-Weih Hung - 1-18 Median Absolute Deviation for BGP Anomaly Detection
by Maria Andrea Romo-Chavero & Jose Antonio Cantoral-Ceballos & Jesus Arturo Pérez-Díaz & Carlos Martinez-Cagnazzo - 1-19 Anticipating Job Market Demands—A Deep Learning Approach to Determining the Future Readiness of Professional Skills
by Albert Weichselbraun & Norman Süsstrunk & Roger Waldvogel & André Glatzl & Adrian M. P. Braşoveanu & Arno Scharl - 1-22 HSM4SSL: Leveraging HSMs for Enhanced Intra-Domain Security
by Yazan Aref & Abdelkader Ouda - 1-22 A Blockchain-Based Real-Time Power Balancing Service for Trustless Renewable Energy Grids
by Andrea Calvagna & Giovanni Marotta & Giuseppe Pappalardo & Emiliano Tramontana - 1-23 A Novel Traffic Classification Approach by Employing Deep Learning on Software-Defined Networking
by Daniel Nuñez-Agurto & Walter Fuertes & Luis Marrone & Eduardo Benavides-Astudillo & Christian Coronel-Guerrero & Franklin Perez - 1-25 A New Generation of Collaborative Immersive Analytics on the Web: Open-Source Services to Capture, Process and Inspect Users’ Sessions in 3D Environments
by Bruno Fanini & Giorgio Gosti - 1-27 A Method for the Rapid Propagation of Emergency Event Notifications in a Long Vehicle Convoy
by John David Sprunger & Alvin Lim & David M. Bevly - 1-27 A Fair Crowd-Sourced Automotive Data Monetization Approach Using Substrate Hybrid Consensus Blockchain
by Cyril Naves Samuel & François Verdier & Severine Glock & Patricia Guitton-Ouhamou - 1-37 Design and Implementation of a Low-Cost, Linear Robotic Camera System, Targeting Greenhouse Plant Growth Monitoring
by Zacharias Kamarianakis & Spyros Perdikakis & Ioannis N. Daliakopoulos & Dimitrios M. Papadimitriou & Spyros Panagiotakis
May 2024, Volume 16, Issue 5
- 1-13 Blockchain-Based Zero-Trust Supply Chain Security Integrated with Deep Reinforcement Learning for Inventory Optimization
by Zhe Ma & Xuhesheng Chen & Tiejiang Sun & Xukang Wang & Ying Cheng Wu & Mengjie Zhou - 1-15 AI-Empowered Multimodal Hierarchical Graph-Based Learning for Situation Awareness on Enhancing Disaster Responses
by Jieli Chen & Kah Phooi Seng & Li Minn Ang & Jeremy Smith & Hanyue Xu - 1-15 SmartDED: A Blockchain- and Smart Contract-Based Digital Electronic Detonator Safety Supervision System
by Na Liu & Wei-Tek Tsai - 1-16 Optimization of Wheelchair Control via Multi-Modal Integration: Combining Webcam and EEG
by Lassaad Zaway & Nader Ben Amor & Jalel Ktari & Mohamed Jallouli & Larbi Chrifi Alaoui & Laurent Delahoche - 1-16 Blockchain and Smart Contracts for Digital Copyright Protection
by Franco Frattolillo - 1-17 Realization of Authenticated One-Pass Key Establishment on RISC-V Micro-Controller for IoT Applications
by Tuan-Kiet Dang & Khai-Duy Nguyen & Binh Kieu-Do-Nguyen & Trong-Thuc Hoang & Cong-Kha Pham - 1-18 Optimizing Requirements Prioritization for IoT Applications Using Extended Analytical Hierarchical Process and an Advanced Grouping Framework
by Sarah Kaleem & Muhammad Asim & Mohammed El-Affendi & Muhammad Babar - 1-18 pFedBASC: Personalized Federated Learning with Blockchain-Assisted Semi-Centralized Framework
by Yu Zhang & Xiaowei Peng & Hequn Xian - 1-18 Blockchain-Enabled Secure and Interoperable Authentication Scheme for Metaverse Environments
by Sonali Patwe & Sunil B. Mane - 1-18 MetaSSI: A Framework for Personal Data Protection, Enhanced Cybersecurity and Privacy in Metaverse Virtual Reality Platforms
by Faisal Fiaz & Syed Muhammad Sajjad & Zafar Iqbal & Muhammad Yousaf & Zia Muhammad - 1-19 BPET: A Unified Blockchain-Based Framework for Peer-to-Peer Energy Trading
by Caixiang Fan & Hamzeh Khazaei & Petr Musilek - 1-19 Chatbots in Airport Customer Service—Exploring Use Cases and Technology Acceptance
by Isabel Auer & Stephan Schlögl & Gundula Glowka - 1-20 Reconfigurable-Intelligent-Surface-Enhanced Dynamic Resource Allocation for the Social Internet of Electric Vehicle Charging Networks with Causal-Structure-Based Reinforcement Learning
by Yuzhu Zhang & Hao Xu - 1-20 Using Optimization Techniques in Grammatical Evolution
by Ioannis G. Tsoulos & Alexandros Tzallas & Evangelos Karvounis - 1-21 TQU-SLAM Benchmark Dataset for Comparative Study to Build Visual Odometry Based on Extracted Features from Feature Descriptors and Deep Learning
by Thi-Hao Nguyen & Van-Hung Le & Huu-Son Do & Trung-Hieu Te & Van-Nam Phan - 1-22 A Hybrid Semi-Automated Workflow for Systematic and Literature Review Processes with Large Language Model Analysis
by Anjia Ye & Ananda Maiti & Matthew Schmidt & Scott J. Pedersen - 1-23 Indoor Infrastructure Maintenance Framework Using Networked Sensors, Robots, and Augmented Reality Human Interface
by Alireza Fath & Nicholas Hanna & Yi Liu & Scott Tanch & Tian Xia & Dryver Huston - 1-24 Enhanced Multi-Task Traffic Forecasting in Beyond 5G Networks: Leveraging Transformer Technology and Multi-Source Data Fusion
by Ibrahim Althamary & Rubbens Boisguene & Chih-Wei Huang - 1-25 Teamwork Conflict Management Training and Conflict Resolution Practice via Large Language Models
by Sakhi Aggrawal & Alejandra J. Magana - 1-27 Validation of Value-Driven Token Economy: Focus on Blockchain Content Platform
by Young Sook Kim & Seng-Phil Hong & Marko Majer - 1-29 Machine Learning Strategies for Reconfigurable Intelligent Surface-Assisted Communication Systems—A Review
by Roilhi F. Ibarra-Hernández & Francisco R. Castillo-Soria & Carlos A. Gutiérrez & Abel García-Barrientos & Luis Alberto Vásquez-Toledo & J. Alberto Del-Puerto-Flores - 1-30 Evaluating Realistic Adversarial Attacks against Machine Learning Models for Windows PE Malware Detection
by Muhammad Imran & Annalisa Appice & Donato Malerba
March 2024, Volume 16, Issue 4
- 1-14 Exploring Universal Filtered Multi Carrier Waveform for Last Meter Connectivity in 6G: A Street-Lighting-Driven Approach with Enhanced Simulator for IoT Application Dimensioning
by Véronique Georlette & Anne-Carole Honfoga & Michel Dossou & Véronique Moeyaert - 1-16 MOLM: Alleviating Congestion through Multi-Objective Simulated Annealing-Based Load Balancing Routing in LEO Satellite Networks
by Yihu Zhou & Haiming Chen & Zhibin Dou - 1-16 Continuous Space Wireless Communication Tower Placement by Hybrid Simulated Annealing
by Maolin Tang & Wei Li - 1-17 Implementing Federated Governance in Data Mesh Architecture
by Anton Dolhopolov & Arnaud Castelltort & Anne Laurent - 1-17 Data Structure and Management Protocol to Enhance Name Resolving in Named Data Networking
by Manar Aldaoud & Dawood Al-Abri & Medhat Awadalla & Firdous Kausar - 1-17 Multi-Agent Deep Reinforcement Learning-Based Fine-Grained Traffic Scheduling in Data Center Networks
by Huiting Wang & Yazhi Liu & Wei Li & Zhigang Yang - 1-18 A Novel Edge Platform Streamlining Connectivity between Modern Edge Devices and the Cloud
by Anderson Carvalho & Daniel Riordan & Joseph Walsh - 1-19 Performance Evaluation of Graph Neural Network-Based RouteNet Model with Attention Mechanism
by Binita Kusum Dhamala & Babu R. Dawadi & Pietro Manzoni & Baikuntha Kumar Acharya - 1-20 A Method for Mapping V2X Communication Requirements to Highly Automated and Autonomous Vehicle Functions
by Arpad Takacs & Tamas Haidegger - 1-20 Research on Blockchain Transaction Privacy Protection Methods Based on Deep Learning
by Jun Li & Chenyang Zhang & Jianyi Zhang & Yanhua Shao - 1-23 NeXtFusion: Attention-Based Camera-Radar Fusion Network for Improved Three-Dimensional Object Detection and Tracking
by Priyank Kalgaonkar & Mohamed El-Sharkawy - 1-29 Optimizing Hybrid V2X Communication: An Intelligent Technology Selection Algorithm Using 5G, C-V2X PC5 and DSRC
by Ihtisham Khalid & Vasilis Maglogiannis & Dries Naudts & Adnan Shahid & Ingrid Moerman - 1-36 Cloud Security Using Fine-Grained Efficient Information Flow Tracking
by Fahad Alqahtani & Mohammed Almutairi & Frederick T. Sheldon
April 2024, Volume 16, Issue 4
- 1-1 Correction: Li et al. A Learning Game-Based Approach to Task-Dependent Edge Resource Allocation. Future Internet 2023, 15 , 395
by Zuopeng Li & Hengshuai Ju & Zepeng Ren - 1-13 Secure Data Sharing in Federated Learning through Blockchain-Based Aggregation
by Bowen Liu & Qiang Tang - 1-17 SDN-Based Secure Common Emergency Service for Railway and Road Co-Existence Scenarios
by Radheshyam Singh & Leo Mendiboure & José Soler & Michael Stübert Berger & Tidiane Sylla & Marion Berbineau & Lars Dittmann - 1-17 Multi-WiIR: Multi-User Identity Legitimacy Authentication Based on WiFi Device
by Zhongcheng Wei & Yanhu Dong - 1-17 SUDC: Synchronous Update with the Division and Combination of SRv6 Policy
by Yuze Liu & Weihong Wu & Ying Wang & Jiang Liu & Fan Yang - 1-18 Perspectives of Young Digital Natives on Digital Marketing: Exploring Annoyance and Effectiveness with Eye-Tracking Analysis
by Stefanos Balaskas & Georgia Kotsari & Maria Rigou - 1-18 Polling Mechanisms for Industrial IoT Applications in Long-Range Wide-Area Networks
by David Todoli-Ferrandis & Javier Silvestre-Blanes & Víctor Sempere-Payá & Salvador Santonja-Climent - 1-19 Congestion Control Mechanism Based on Backpressure Feedback in Data Center Networks
by Wei Li & Mengzhen Ren & Yazhi Liu & Chenyu Li & Hui Qian & Zhenyou Zhang - 1-19 Leveraging Digital Twin Technology for Enhanced Cybersecurity in Cyber–Physical Production Systems
by Yuning Jiang & Wei Wang & Jianguo Ding & Xin Lu & Yanguo Jing - 1-20 Task Allocation of Heterogeneous Multi-Unmanned Systems Based on Improved Sheep Flock Optimization Algorithm
by Haibo Liu & Yang Liao & Changting Shi & Jing Shen - 1-20 SeedChain: A Secure and Transparent Blockchain-Driven Framework to Revolutionize the Seed Supply Chain
by Rohit Ahuja & Sahil Chugh & Raman Singh - 1-20 Blockchain-Enabled Provenance Tracking for Sustainable Material Reuse in Construction Supply Chains
by Stanly Wilson & Kwabena Adu-Duodu & Yinhao Li & Ringo Sham & Mohammed Almubarak & Yingli Wang & Ellis Solaiman & Charith Perera & Rajiv Ranjan & Omer Rana - 1-20 A Comprehensive Review of Machine Learning Approaches for Anomaly Detection in Smart Homes: Experimental Analysis and Future Directions
by Md Motiur Rahman & Deepti Gupta & Smriti Bhatt & Shiva Shokouhmand & Miad Faezipour - 1-21 Metaverse Meets Smart Cities—Applications, Benefits, and Challenges
by Florian Maier & Markus Weinberger - 1-21 All about Delay-Tolerant Networking (DTN) Contributions to Future Internet
by Georgios Koukis & Konstantina Safouri & Vassilis Tsaoussidis - 1-21 Multi-Constraint and Multi-Policy Path Hopping Active Defense Method Based on SDN
by Bing Zhang & Hui Li & Shuai Zhang & Jing Sun & Ning Wei & Wenhong Xu & Huan Wang - 1-22 A Microservices-Based Control Plane for Time-Sensitive Networking
by Anna Agustí-Torra & Marc Ferré-Mancebo & Gabriel David Orozco-Urrutia & David Rincón-Rivera & David Remondo - 1-22 Research on Secure Community Opportunity Network Based on Trust Model
by Bing Su & Jiwu Liang - 1-23 Minimum-Cost-Based Neighbour Node Discovery Scheme for Fault Tolerance under IoT-Fog Networks
by Premalatha Baskar & Prakasam Periasamy - 1-23 Edge Federated Optimization for Heterogeneous Data
by Hsin-Tung Lin & Chih-Yu Wen - 1-24 Computation Offloading Based on a Distributed Overlay Network Cache-Sharing Mechanism in Multi-Access Edge Computing
by Yazhi Liu & Pengfei Zhong & Zhigang Yang & Wei Li & Siwei Li - 1-29 SRv6-Based Edge Service Continuity in 5G Mobile Networks
by Laura Lemmi & Carlo Puliafito & Antonio Virdis & Enzo Mingozzi - 1-30 A Survey on Energy-Aware Security Mechanisms for the Internet of Things
by Peixiong He & Yi Zhou & Xiao Qin - 1-31 From Seek-and-Destroy to Split-and-Destroy: Connection Partitioning as an Effective Tool against Low-Rate DoS Attacks
by Vyron Kampourakis & Georgios Michail Makrakis & Constantinos Kolias
February 2024, Volume 16, Issue 3
- 1-4 The Electronic Medical Record—A New Look at the Challenges and Opportunities
by Reeva Lederman & Esther Brainin & Ofir Ben-Assuli - 1-15 A Lightweight Neural Network Model for Disease Risk Prediction in Edge Intelligent Computing Architecture
by Feng Zhou & Shijing Hu & Xin Du & Xiaoli Wan & Jie Wu - 1-16 Deep Learning for Intrusion Detection Systems (IDSs) in Time Series Data
by Konstantinos Psychogyios & Andreas Papadakis & Stavroula Bourou & Nikolaos Nikolaou & Apostolos Maniatis & Theodore Zahariadis - 1-17 A Transferable Deep Learning Framework for Improving the Accuracy of Internet of Things Intrusion Detection
by Haedam Kim & Suhyun Park & Hyemin Hong & Jieun Park & Seongmin Kim - 1-17 Edge-Enhanced TempoFuseNet: A Two-Stream Framework for Intelligent Multiclass Video Anomaly Recognition in 5G and IoT Environments
by Gulshan Saleem & Usama Ijaz Bajwa & Rana Hammad Raza & Fan Zhang - 1-18 Analyzing GPU Performance in Virtualized Environments: A Case Study
by Adel Belkhiri & Michel Dagenais - 1-19 Micro-FL: A Fault-Tolerant Scalable Microservice-Based Platform for Federated Learning
by Mikael Sabuhi & Petr Musilek & Cor-Paul Bezemer - 1-19 Multi-Level Split Federated Learning for Large-Scale AIoT System Based on Smart Cities
by Hanyue Xu & Kah Phooi Seng & Jeremy Smith & Li Minn Ang - 1-19 Security Threats and Promising Solutions Arising from the Intersection of AI and IoT: A Study of IoMT and IoET Applications
by Hadeel Alrubayyi & Moudy Sharaf Alshareef & Zunaira Nadeem & Ahmed M. Abdelmoniem & Mona Jaber - 1-20 Scheduling of Industrial Control Traffic for Dynamic RAN Slicing with Distributed Massive MIMO
by Emma Fitzgerald & Michał Pióro - 1-20 A Multi-Head LSTM Architecture for Bankruptcy Prediction with Time Series Accounting Data
by Mattia Pellegrino & Gianfranco Lombardo & George Adosoglou & Stefano Cagnoni & Panos M. Pardalos & Agostino Poggi - 1-22 SoK: Analysis Techniques for WebAssembly
by Håkon Harnes & Donn Morrison - 1-23 An Ontology-Based Cybersecurity Framework for AI-Enabled Systems and Applications
by Davy Preuveneers & Wouter Joosen - 1-23 A Synergistic Elixir-EDA-MQTT Framework for Advanced Smart Transportation Systems
by Yushan Li & Satoshi Fujita - 1-25 Enabling Vehicle-to-Vehicle Trust in Rural Areas: An Evaluation of a Pre-Signature Scheme for Infrastructure-Limited Environments
by Dimah Almani & Tim Muller & Xavier Carpent & Takahito Yoshizawa & Steven Furnell - 1-26 The Future of Healthcare with Industry 5.0: Preliminary Interview-Based Qualitative Analysis
by Juliana Basulo-Ribeiro & Leonor Teixeira - 1-29 A Review on Decentralized Finance Ecosystems
by Andry Alamsyah & Gede Natha Wijaya Kusuma & Dian Puteri Ramadhani - 1-38 A Systematic Survey on 5G and 6G Security Considerations, Challenges, Trends, and Research Areas
by Paul Scalise & Matthew Boeding & Michael Hempel & Hamid Sharif & Joseph Delloiacovo & John Reed - 1-45 Deterministic K-Identification for Future Communication Networks: The Binary Symmetric Channel Results
by Mohammad Javad Salariseddigh & Ons Dabbabi & Christian Deppe & Holger Boche
March 2024, Volume 16, Issue 3
- 1-2 Edge and Fog Computing for the Internet of Things
by Alessandro Pozzebon - 1-13 IMBA: IoT-Mist Bat-Inspired Algorithm for Optimising Resource Allocation in IoT Networks
by Ziyad Almudayni & Ben Soh & Alice Li - 1-13 Personalized Federated Learning with Adaptive Feature Extraction and Category Prediction in Non-IID Datasets
by Ying-Hsun Lai & Shin-Yeh Chen & Wen-Chi Chou & Hua-Yang Hsu & Han-Chieh Chao - 1-13 Efficient and Secure Distributed Data Storage and Retrieval Using Interplanetary File System and Blockchain
by Muhammad Bin Saif & Sara Migliorini & Fausto Spoto - 1-15 Advanced Techniques for Geospatial Referencing in Online Media Repositories
by Dominik Warch & Patrick Stellbauer & Pascal Neis