Content
July 2022, Volume 14, Issue 7
- 1-15 Mapping Art to a Knowledge Graph: Using Data for Exploring the Relations among Visual Objects in Renaissance Art
by Alexandros Kouretsis & Iraklis Varlamis & Laida Limniati & Minas Pergantis & Andreas Giannakoulopoulos - 1-15 N-Trans: Parallel Detection Algorithm for DGA Domain Names
by Cheng Yang & Tianliang Lu & Shangyi Yan & Jianling Zhang & Xingzhan Yu - 1-15 Multifractal Cross-Correlations of Bitcoin and Ether Trading Characteristics in the Post-COVID-19 Time
by Marcin Wątorek & Jarosław Kwapień & Stanisław Drożdż - 1-18 Research on Routing Equalization Algorithm of Inter-Satellite Partition for Low-Orbit Micro-Satellites
by Hengfei Cheng & Zhaobin Xu & Xiaoxu Guo & Jia Yang & Kedi Xu & Shuqin Liu & Zhonghe Jin & Xiaojun Jin - 1-21 Intuitively Searching for the Rare Colors from Digital Artwork Collections by Text Description: A Case Demonstration of Japanese Ukiyo-e Print Retrieval
by Kangying Li & Jiayun Wang & Biligsaikhan Batjargal & Akira Maeda - 1-23 Analytical Modeling and Empirical Analysis of Binary Options Strategies
by Gurdal Ertek & Aysha Al-Kaabi & Aktham Issa Maghyereh - 1-24 Blockchain for Doping Control Applications in Sports: A Conceptual Approach
by Flavio Pinto & Yogachandran Rahulamathavan & James Skinner - 1-24 Enhanced Geographic Routing with One- and Two-Hop Movement Information in Opportunistic Ad Hoc Networks
by Mohd-Yaseen Mir & Hengbing Zhu & Chih-Lin Hu - 1-26 A Survey on Monitoring Quality Assessment for Wireless Visual Sensor Networks
by Thiago C. Jesus & Daniel G. Costa & Paulo Portugal & Francisco Vasques - 1-48 Internet of Things and Blockchain Integration: Security, Privacy, Technical, and Design Challenges
by Yehia Ibrahim Alzoubi & Ahmad Al-Ahmad & Hasan Kahtan & Ashraf Jaradat
June 2022, Volume 14, Issue 7
- 1-10 Polarity and Subjectivity Detection with Multitask Learning and BERT Embedding
by Ranjan Satapathy & Shweta Rajesh Pardeshi & Erik Cambria - 1-12 A Public Infrastructure for a Trusted Wireless World
by Renee Carnley & Sikha Bagui - 1-13 First Steps of Asthma Management with a Personalized Ontology Model
by Hicham Ajami & Hamid Mcheick & Catherine Laprise - 1-13 Correlation between Human Emotion and Temporal·Spatial Contexts by Analyzing Environmental Factors
by Minwoo Park & Euichul Lee - 1-14 Designing an Interactive Communication Assistance System for Hearing-Impaired College Students Based on Gesture Recognition and Representation
by Yancong Zhu & Juan Zhang & Zhaoxi Zhang & Gina Clepper & Jingpeng Jia & Wei Liu - 1-16 Cooperative D-GNSS Aided with Multi Attribute Decision Making Module: A Rigorous Comparative Analysis
by Thanassis Mpimis & Theodore T. Kapsis & Athanasios D. Panagopoulos & Vassilis Gikas - 1-16 Real-Time Detection of Vine Trunk for Robot Localization Using Deep Learning Models Developed for Edge TPU Devices
by Khadijeh Alibabaei & Eduardo Assunção & Pedro D. Gaspar & Vasco N. G. J. Soares & João M. L. P. Caldeira - 1-17 Misuse Patterns from the Threat of Modification of Non-Control Data in Network Function Virtualization
by Abdulrahman K. Alnaim - 1-18 Characterization of Dynamic Blockage Probability in Industrial Millimeter Wave 5G Deployments
by Anastasia Kondratyeva & Daria Ivanova & Vyacheslav Begishev & Ekaterina Markova & Evgeni Mokrov & Yuliya Gaidamaka & Konstantin Samouylov - 1-18 A Novel Text Classification Technique Using Improved Particle Swarm Optimization: A Case Study of Arabic Language
by Yousif A. Alhaj & Abdelghani Dahou & Mohammed A. A. Al-qaness & Laith Abualigah & Aaqif Afzaal Abbasi & Nasser Ahmed Obad Almaweri & Mohamed Abd Elaziz & Robertas Damaševičius - 1-18 Insights from the Experimentation of Named Data Networks in Mobile Wireless Environments
by Luís Gameiro & Carlos Senna & Miguel Luís - 1-19 Securing the Smart City Airspace: Drone Cyber Attack Detection through Machine Learning
by Zubair Baig & Naeem Syed & Nazeeruddin Mohammad - 1-21 Towards Strengthening the Resilience of IoV Networks—A Trust Management Perspective
by Yingxun Wang & Hushairi Zen & Mohamad Faizrizwan Mohd Sabri & Xiang Wang & Lee Chin Kho - 1-21 Aesthetic Trends and Semantic Web Adoption of Media Outlets Identified through Automated Archival Data Extraction
by Aristeidis Lamprogeorgos & Minas Pergantis & Michail Panagopoulos & Andreas Giannakoulopoulos - 1-24 Energy-Optimized Content Refreshing of Age-of-Information-Aware Edge Caches in IoT Systems
by Martina Pappalardo & Antonio Virdis & Enzo Mingozzi - 1-31 Convergence of Information-Centric Networks and Edge Intelligence for IoV: Challenges and Future Directions
by Salahadin Seid Musa & Marco Zennaro & Mulugeta Libsie & Ermanno Pietrosemoli
May 2022, Volume 14, Issue 6
- 1-13 Time Series Prediction of Sea Surface Temperature Based on an Adaptive Graph Learning Neural Model
by Tingting Wang & Zhuolin Li & Xiulin Geng & Baogang Jin & Lingyu Xu - 1-14 Fraud Detection Using Neural Networks: A Case Study of Income Tax
by Belle Fille Murorunkwere & Origene Tuyishimire & Dominique Haughton & Joseph Nzabanita - 1-15 What Is Coming across the Horizon and How Can We Handle It? Bitcoin Scenarios as a Starting Point for Rigorous and Relevant Research
by Horst Treiblmaier - 1-16 An Indoor and Outdoor Multi-Source Elastic Fusion Navigation and Positioning Algorithm Based on Particle Filters
by Guangwei Fan & Chuanzhen Sheng & Baoguo Yu & Lu Huang & Qiang Rong - 1-17 Analysis of Electric Vehicles with an Economic Perspective for the Future Electric Market
by Sofana Reka S & Prakash Venugopal & Ravi V & Hassan Haes Alhelou & Amer Al-Hinai & Pierluigi Siano - 1-18 Detection of Students’ Problems in Distance Education Using Topic Modeling and Machine Learning
by Huda Alhazmi - 1-19 Quantum Key Distribution in Kubernetes Clusters
by Ignazio Pedone & Antonio Lioy - 1-19 Optimization of the System of Allocation of Overdue Loans in a Sub-Saharan Africa Microfinance Institution
by Andreia Araújo & Filipe Portela & Filipe Alvelos & Saulo Ruiz - 1-20 The Robustness of Detecting Known and Unknown DDoS Saturation Attacks in SDN via the Integration of Supervised and Semi-Supervised Classifiers
by Samer Khamaiseh & Abdullah Al-Alaj & Mohammad Adnan & Hakam W. Alomari - 1-20 Optimal Proactive Caching for Multi-View Streaming Mobile Augmented Reality
by Zhaohui Huang & Vasilis Friderikos - 1-20 Data Anonymization: An Experimental Evaluation Using Open-Source Tools
by Joana Tomás & Deolinda Rasteiro & Jorge Bernardino - 1-28 On End-to-End Intelligent Automation of 6G Networks
by Abdallah Moubayed & Abdallah Shami & Anwer Al-Dulaimi - 1-32 Charting Past, Present, and Future Research in the Semantic Web and Interoperability
by Abderahman Rejeb & John G. Keogh & Wayne Martindale & Damion Dooley & Edward Smart & Steven Simske & Samuel Fosso Wamba & John G. Breslin & Kosala Yapa Bandara & Subhasis Thakur & Kelly Liu & Bridgette Crowley & Sowmya Desaraju & Angela Ospina & Horia Bradau
June 2022, Volume 14, Issue 6
- 1-12 IoT Group Membership Management Using Decentralized Identifiers and Verifiable Credentials
by Nikos Fotiou & Vasilios A. Siris & George Xylomenos & George C. Polyzos - 1-12 Evaluation of Online Teaching Quality Based on Facial Expression Recognition
by Changbo Hou & Jiajun Ai & Yun Lin & Chenyang Guan & Jiawen Li & Wenyu Zhu - 1-13 An Indoor Smart Parking Algorithm Based on Fingerprinting
by Silvia Stranieri - 1-13 6G to Take the Digital Divide by Storm: Key Technologies and Trends to Bridge the Gap
by Chiara Suraci & Sara Pizzi & Federico Montori & Marco Di Felice & Giuseppe Araniti - 1-15 Co-Authorship Networks Analysis to Discover Collaboration Patterns among Italian Researchers
by Vincenza Carchiolo & Marco Grassia & Michele Malgeri & Giuseppe Mangioni - 1-16 EBBA: An Enhanced Binary Bat Algorithm Integrated with Chaos Theory and Lévy Flight for Feature Selection
by Jinghui Feng & Haopeng Kuang & Lihua Zhang - 1-20 A Long Short-Term Memory Network-Based Radio Resource Management for 5G Network
by Kavitha Rani Balmuri & Srinivas Konda & Wen-Cheng Lai & Parameshachari Bidare Divakarachari & Kavitha Malali Vishveshwarappa Gowda & Hemalatha Kivudujogappa Lingappa - 1-21 Toward Semi-Supervised Graphical Object Detection in Document Images
by Goutham Kallempudi & Khurram Azeem Hashmi & Alain Pagani & Marcus Liwicki & Didier Stricker & Muhammad Zeshan Afzal - 1-21 High-Frequency Direction Forecasting of the Futures Market Using a Machine-Learning-Based Method
by Shangkun Deng & Yingke Zhu & Xiaoru Huang & Shuangyang Duan & Zhe Fu - 1-22 Gamifying Community Education for Enhanced Disaster Resilience: An Effectiveness Testing Study from Australia
by Nayomi Kankanamge & Tan Yigitcanlar & Ashantha Goonetilleke - 1-22 An In-Depth Review on Blockchain Simulators for IoT Environments
by Jason Zheng & Chidinma Dike & Stefan Pancari & Yi Wang & George C. Giakos & Wafa Elmannai & Bingyang Wei - 1-23 A Multi-View Framework to Detect Redundant Activity Labels for More Representative Event Logs in Process Mining
by Qifan Chen & Yang Lu & Charmaine S. Tam & Simon K. Poon - 1-23 Multilayer Backbones for Internet of Battlefield Things
by Evangelia Fragkou & Dimitrios Papakostas & Theodoros Kasidakis & Dimitrios Katsaros - 1-27 Investigating the Country of Origin and the Role of the .eu TLD in External Trade of European Union Member States
by Andreas Giannakoulopoulos & Minas Pergantis & Laida Limniati & Alexandros Kouretsis - 1-27 A BLE-Connected Piezoresistive and Inertial Chest Band for Remote Monitoring of the Respiratory Activity by an Android Application: Hardware Design and Software Optimization
by Roberto De Fazio & Massimo De Vittorio & Paolo Visconti - 1-33 Browser Forensic Investigations of Instagram Utilizing IndexedDB Persistent Storage
by Furkan Paligu & Cihan Varol - 1-38 Overview of Blockchain Oracle Research
by Giulio Caldarelli
May 2022, Volume 14, Issue 5
- 1-2 Editorial for the Special Issue on Blockchain: Applications, Challenges, and Solutions
by Ahad ZareRavasan & Taha Mansouri & Michal Krčál & Saeed Rouhani - 1-13 Tell Me More: Automating Emojis Classification for Better Accessibility and Emotional Context Recognition
by Muhammad Atif & Valentina Franzoni - 1-14 Distributed Bandwidth Allocation Strategy for QoE Fairness of Multiple Video Streams in Bottleneck Links
by Yazhi Liu & Dongyu Wei & Chunyang Zhang & Wei Li - 1-15 Low-Complexity GSM Detection Based on Maximum Ratio Combining
by Xinhe Zhang & Wenbo Lv & Haoran Tan - 1-16 Enhancing Short-Term Sales Prediction with Microblogs: A Case Study of the Movie Box Office
by Jie Zhao & Fangwei Xiong & Peiquan Jin - 1-16 Missing Data Imputation in the Internet of Things Sensor Networks
by Benjamin Agbo & Hussain Al-Aqrabi & Richard Hill & Tariq Alsboui - 1-18 A Review of Blockchain Technology Applications in Ambient Assisted Living
by Alexandru-Ioan Florea & Ionut Anghel & Tudor Cioara - 1-19 Lightweight Blockchain-Based Scheme to Secure Wireless M2M Area Networks
by Karam Eddine Bilami & Pascal LORENZ - 1-20 Security in Wireless Sensor Networks: A Cryptography Performance Analysis at MAC Layer
by Mauro Tropea & Mattia Giovanni Spina & Floriano De Rango & Antonio Francesco Gentile - 1-20 Medical Internet-of-Things Based Breast Cancer Diagnosis Using Hyperparameter-Optimized Neural Networks
by Roseline Oluwaseun Ogundokun & Sanjay Misra & Mychal Douglas & Robertas Damaševičius & Rytis Maskeliūnas - 1-21 Modeling User Acceptance of In-Vehicle Applications for Safer Road Environment
by Siti Fatimah Abdul Razak & Sumendra Yogarayan & Mohd Fikri Azli Abdullah & Afizan Azman - 1-21 QoE Models for Adaptive Streaming: A Comprehensive Evaluation
by Duc Nguyen & Nam Pham Ngoc & Truong Cong Thang - 1-22 Positioning Energy-Neutral Devices: Technological Status and Hybrid RF-Acoustic Experiments
by Bert Cox & Chesney Buyle & Daan Delabie & Lieven De Strycker & Liesbet Van der Perre - 1-24 Adaptive User Profiling in E-Commerce and Administration of Public Services
by Kleanthis G. Gatziolis & Nikolaos D. Tselikas & Ioannis D. Moscholios - 1-24 A Versatile MANET Experimentation Platform and Its Evaluation through Experiments on the Performance of Routing Protocols under Diverse Conditions
by Ioannis Manolopoulos & Dimitrios Loukatos & Kimon Kontovasilis - 1-24 Quality-of-Service-Linked Privileged Content-Caching Mechanism for Named Data Networks
by Shrisha H. S. & Uma Boregowda - 1-26 MeVer NetworkX: Network Analysis and Visualization for Tracing Disinformation
by Olga Papadopoulou & Themistoklis Makedas & Lazaros Apostolidis & Francesco Poldi & Symeon Papadopoulos & Ioannis Kompatsiaris - 1-28 A Survey on Memory Subsystems for Deep Neural Network Accelerators
by Arghavan Asad & Rupinder Kaur & Farah Mohammadi - 1-32 A Framework to Model Bursty Electronic Data Interchange Messages for Queueing Systems
by Sonya Leech & Jonathan Dunne & David Malone
April 2022, Volume 14, Issue 5
- 1-13 Enriching Artificial Intelligence Explanations with Knowledge Fragments
by Jože Rožanec & Elena Trajkova & Inna Novalija & Patrik Zajec & Klemen Kenda & Blaž Fortuna & Dunja Mladenić - 1-14 Bringing Digital Innovation Strategies and Entrepreneurship: The Business Model Canvas in Open Data Ecosystem and Startups
by Maria Kamariotou & Fotis Kitsios - 1-16 On the Use of the Multi-Agent Environment for Mobility Applications
by Mahdi Zargayouna - 1-16 A Bidirectional Trust Model for Service Delegation in Social Internet of Things
by Lijun Wei & Yuhan Yang & Jing Wu & Chengnian Long & Yi-Bing Lin - 1-16 Co-Simulation of Multiple Vehicle Routing Problem Models
by Sana Sahar Guia & Abdelkader Laouid & Mohammad Hammoudeh & Ahcène Bounceur & Mai Alfawair & Amna Eleyan - 1-17 Channel Characterization and SC-FDM Modulation for PLC in High-Voltage Power Lines
by Jose Alberto Del Puerto-Flores & José Luis Naredo & Fernando Peña-Campos & Carolina Del-Valle-Soto & Leonardo J. Valdivia & Ramón Parra-Michel - 1-18 A Fairness-Aware Peer-to-Peer Decentralized Learning Framework with Heterogeneous Devices
by Zheyi Chen & Weixian Liao & Pu Tian & Qianlong Wang & Wei Yu - 1-19 Fast Library Recommendation in Software Dependency Graphs with Symmetric Partially Absorbing Random Walks
by Emmanouil Krasanakis & Andreas Symeonidis - 1-19 Blockchain Technology Applied in IoV Demand Response Management: A Systematic Literature Review
by Evgenia Kapassa & Marinos Themistocleous - 1-20 Deterring Deepfake Attacks with an Electrical Network Frequency Fingerprints Approach
by Deeraj Nagothu & Ronghua Xu & Yu Chen & Erik Blasch & Alexander Aved - 1-20 ReSQoV: A Scalable Resource Allocation Model for QoS-Satisfied Cloud Services
by Hassan Mahmood Khan & Fang-Fang Chua & Timothy Tzen Vun Yap - 1-20 A System Proposal for Information Management in Building Sector Based on BIM, SSI, IoT and Blockchain
by Luisanna Cocco & Roberto Tonelli & Michele Marchesi - 1-21 The Whole Is Greater than the Sum of the Parts: A Multilayer Approach on Criminal Networks
by Annamaria Ficara & Giacomo Fiumara & Salvatore Catanese & Pasquale De Meo & Xiaoyang Liu - 1-22 Virtual Power Plant Optimization in Smart Grids: A Narrative Review
by Bianca Goia & Tudor Cioara & Ionut Anghel - 1-24 An ICN-Based IPFS High-Availability Architecture
by Ruibin Zeng & Jiali You & Yang Li & Rui Han - 1-24 Building Semantic Knowledge Graphs from (Semi-)Structured Data: A Review
by Vetle Ryen & Ahmet Soylu & Dumitru Roman - 1-26 Clinical Trial Classification of SNS24 Calls with Neural Networks
by Hua Yang & Teresa Gonçalves & Paulo Quaresma & Renata Vieira & Rute Veladas & Cátia Sousa Pinto & João Oliveira & Maria Cortes Ferreira & Jéssica Morais & Ana Raquel Pereira & Nuno Fernandes & Carolina Gonçalves - 1-27 A Review of Digital Era Governance Research in the First Two Decades: A Bibliometric Study
by Dejan Ravšelj & Lan Umek & Ljupčo Todorovski & Aleksander Aristovnik - 1-28 Measuring Ethical Values with AI for Better Teamwork
by Erkin Altuntas & Peter A. Gloor & Pascal Budner
April 2022, Volume 14, Issue 4
- 1-11 A Lightweight Certificateless Group Key Agreement Method without Pairing Based on Blockchain for Smart Grid
by Zhihao Wang & Ru Huo & Shuo Wang - 1-14 Creating Honeypots to Prevent Online Child Exploitation
by Joel Scanlan & Paul A. Watters & Jeremy Prichard & Charlotte Hunn & Caroline Spiranovic & Richard Wortley - 1-19 Interoperable Data Analytics Reference Architectures Empowering Digital-Twin-Aided Manufacturing
by Attila Csaba Marosi & Márk Emodi & Ákos Hajnal & Róbert Lovas & Tamás Kiss & Valerie Poser & Jibinraj Antony & Simon Bergweiler & Hamed Hamzeh & James Deslauriers & József Kovács - 1-19 Ransomware-Resilient Self-Healing XML Documents
by Mahmoud Al-Dwairi & Ahmed S. Shatnawi & Osama Al-Khaleel & Basheer Al-Duwairi - 1-20 Multi-Layer Feature Fusion-Based Community Evolution Prediction
by Zhao Wang & Qingguo Xu & Weimin Li - 1-22 HealthFetch: An Influence-Based, Context-Aware Prefetch Scheme in Citizen-Centered Health Storage Clouds
by Chrysostomos Symvoulidis & George Marinos & Athanasios Kiourtis & Argyro Mavrogiorgou & Dimosthenis Kyriazis - 1-28 ML-Based 5G Network Slicing Security: A Comprehensive Survey
by Ramraj Dangi & Akshay Jadhav & Gaurav Choudhary & Nicola Dragoni & Manas Kumar Mishra & Praveen Lalwani - 1-32 Future Wireless Networking Experiments Escaping Simulations
by Sachin Sharma & Saish Urumkar & Gianluca Fontanesi & Byrav Ramamurthy & Avishek Nag - 1-35 From 5G to 6G—Challenges, Technologies, and Applications
by Ahmed I. Salameh & Mohamed El Tarhuni - 1-46 Deep Learning for Vulnerability and Attack Detection on Web Applications: A Systematic Literature Review
by Rokia Lamrani Alaoui & El Habib Nfaoui
March 2022, Volume 14, Issue 4
- 1-3 Special Issue “Natural Language Engineering: Methods, Tasks and Applications”
by Massimo Esposito & Giovanni Luca Masala & Aniello Minutolo & Marco Pota - 1-14 Decorrelation-Based Deep Learning for Bias Mitigation
by Pranita Patil & Kevin Purcell - 1-15 A Dynamic Cache Allocation Mechanism (DCAM) for Reliable Multicast in Information-Centric Networking
by Yingjie Duan & Hong Ni & Xiaoyong Zhu - 1-16 Predicting Dog Emotions Based on Posture Analysis Using DeepLabCut
by Kim Ferres & Timo Schloesser & Peter A. Gloor - 1-16 Deep Regression Neural Networks for Proportion Judgment
by Mario Milicevic & Vedran Batos & Adriana Lipovac & Zeljka Car - 1-16 Performance Analysis of DF Relay-Assisted D2D Communication in a 5G mmWave Network
by Subhra Sankha Sarma & Ranjay Hazra & Peter Han Joo Chong - 1-16 Evaluation of Contextual and Game-Based Training for Phishing Detection
by Joakim Kävrestad & Allex Hagberg & Marcus Nohlberg & Jana Rambusch & Robert Roos & Steven Furnell - 1-17 Using Satellite Imagery to Improve Local Pollution Models for High-Voltage Transmission Lines and Insulators
by Peter Krammer & Marcel Kvassay & Ján Mojžiš & Martin Kenyeres & Miloš Očkay & Ladislav Hluchý & Ľuboš Pavlov & Ľuboš Skurčák - 1-17 Detecting IoT Attacks Using an Ensemble Machine Learning Model
by Vikas Tomer & Sachin Sharma - 1-17 Cross-Domain Transfer Learning Prediction of COVID-19 Popular Topics Based on Knowledge Graph
by Xiaolin Chen & Qixing Qu & Chengxi Wei & Shudong Chen - 1-18 Adaptative Perturbation Patterns: Realistic Adversarial Learning for Robust Intrusion Detection
by João Vitorino & Nuno Oliveira & Isabel Praça - 1-22 Location Transparency Call (LTC) System: An Intelligent Phone Dialing System Based on the Phone of Things (PoT) Architecture
by Haytham Khalil & Khalid Elgazzar - 1-24 Bitcoin as a Safe Haven during COVID-19 Disease
by Luisanna Cocco & Roberto Tonelli & Michele Marchesi - 1-25 TalkRoBots: A Middleware for Robotic Systems in Industry 4.0
by Marwane Ayaida & Nadhir Messai & Frederic Valentin & Dimitri Marcheras - 1-28 A Multi-Service Adaptive Semi-Persistent LTE Uplink Scheduler for Low Power M2M Devices
by Nusrat Afrin & Jason Brown & Jamil Y. Khan
March 2022, Volume 14, Issue 3
- 1-14 Neural Network-Based Price Tag Data Analysis
by Pavel Laptev & Sergey Litovkin & Sergey Davydenko & Anton Konev & Evgeny Kostyuchenko & Alexander Shelupanov - 1-14 CPU-GPU-Memory DVFS for Power-Efficient MPSoC in Mobile Cyber Physical Systems
by Somdip Dey & Samuel Isuwa & Suman Saha & Amit Kumar Singh & Klaus McDonald-Maier - 1-15 Weighted-CAPIC Caching Algorithm for Priority Traffic in Named Data Network
by Leanna Vidya Yovita & Nana Rachmana Syambas & Ian Joseph Matheus Edward - 1-16 Time Series Surface Temperature Prediction Based on Cyclic Evolutionary Network Model for Complex Sea Area
by Jiahao Shi & Jie Yu & Jinkun Yang & Lingyu Xu & Huan Xu - 1-17 Deep Anomaly Detection Based on Variational Deviation Network
by Junwen Lu & Jinhui Wang & Xiaojun Wei & Keshou Wu & Guanfeng Liu - 1-17 Unsupervised Anomaly Detection and Segmentation on Dirty Datasets
by Jiahao Guo & Xiaohuo Yu & Lu Wang - 1-18 Addressing Syntax-Based Semantic Complementation: Incorporating Entity and Soft Dependency Constraints into Metonymy Resolution
by Siyuan Du & Hao Wang - 1-19 Survey on Videos Data Augmentation for Deep Learning Models
by Nino Cauli & Diego Reforgiato Recupero - 1-19 A Data-Driven Approach to Improve Customer Churn Prediction Based on Telecom Customer Segmentation
by Tianyuan Zhang & Sérgio Moro & Ricardo F. Ramos - 1-20 A Density-Based Random Forest for Imbalanced Data Classification
by Jia Dong & Quan Qian - 1-20 The Time Machine in Columnar NoSQL Databases: The Case of Apache HBase
by Chia-Ping Tsai & Che-Wei Chang & Hung-Chang Hsiao & Haiying Shen - 1-21 Investigation of Using CAPTCHA Keystroke Dynamics to Enhance the Prevention of Phishing Attacks
by Emtethal K. Alamri & Abdullah M. Alnajim & Suliman A. Alsuhibany - 1-22 Bot-Based Emergency Software Applications for Natural Disaster Situations
by Gabriel Ovando-Leon & Luis Veas-Castillo & Veronica Gil-Costa & Mauricio Marin - 1-23 High-Performance Computing and ABMS for High-Resolution COVID-19 Spreading Simulation
by Mattia Pellegrino & Gianfranco Lombardo & Stefano Cagnoni & Agostino Poggi - 1-24 Solar Radiation Forecasting by Pearson Correlation Using LSTM Neural Network and ANFIS Method: Application in the West-Central Jordan
by Hossam Fraihat & Amneh A. Almbaideen & Abdullah Al-Odienat & Bassam Al-Naami & Roberto De Fazio & Paolo Visconti - 1-27 A Survey on Intrusion Detection Systems for Fog and Cloud Computing
by Victor Chang & Lewis Golightly & Paolo Modesti & Qianwen Ariel Xu & Le Minh Thao Doan & Karl Hall & Sreeja Boddu & Anna Kobusińska - 1-30 Self-Organizing Networks for 5G and Beyond: A View from the Top
by Andreas G. Papidas & George C. Polyzos - 1-42 Handover Management in 5G Vehicular Networks
by Ioannis Kosmopoulos & Emmanouil Skondras & Angelos Michalas & Emmanouel T. Michailidis & Dimitrios D. Vergados
February 2022, Volume 14, Issue 3
- 1-14 Forecasting Students Dropout: A UTAD University Study
by Diogo E. Moreira da Silva & Eduardo J. Solteiro Pires & Arsénio Reis & Paulo B. de Moura Oliveira & João Barroso - 1-17 A Vote-Based Architecture to Generate Classified Datasets and Improve Performance of Intrusion Detection Systems Based on Supervised Learning
by Diogo Teixeira & Silvestre Malta & Pedro Pinto - 1-17 A Prototype Web Application to Support Human-Centered Audiovisual Content Authentication and Crowdsourcing
by Nikolaos Vryzas & Anastasia Katsaounidou & Lazaros Vrysis & Rigas Kotsakis & Charalampos Dimoulas - 1-17 Utilizing Blockchain for IoT Privacy through Enhanced ECIES with Secure Hash Function
by Yurika Pant Khanal & Abeer Alsadoon & Khurram Shahzad & Ahmad B. Al-Khalil & Penatiyana W. C. Prasad & Sabih Ur Rehman & Rafiqul Islam - 1-18 Business Models for the Internet of Services: State of the Art and Research Agenda
by Jacqueline Zonichenn Reis & Rodrigo Franco Gonçalves & Marcia Terra da Silva & Nikolai Kazantsev - 1-19 A Survey on the Use of Graph Convolutional Networks for Combating Fake News
by Iraklis Varlamis & Dimitrios Michail & Foteini Glykou & Panagiotis Tsantilas - 1-22 Adjacency-Information-Entropy-Based Cooperative Name Resolution Approach in ICN
by Jiaqi Li & Jiali You & Haojiang Deng - 1-22 Design of Relay Switching to Combat an Eavesdropper in IoT-NOMA Wireless Networks
by Thanh-Nam Tran & Van-Cuu Ho & Thoai Phu Vo & Khanh Ngo Nhu Tran & Miroslav Voznak - 1-25 Transformer-Based Abstractive Summarization for Reddit and Twitter: Single Posts vs. Comment Pools in Three Languages
by Ivan S. Blekanov & Nikita Tarasov & Svetlana S. Bodrunova - 1-28 Quantum Key Distribution for 5G Networks: A Review, State of Art and Future Directions
by Mohd Hirzi Adnan & Zuriati Ahmad Zukarnain & Nur Ziadah Harun - 1-29 Graphol : A Graphical Language for Ontology Modeling Equivalent to OWL 2
by Domenico Lembo & Valerio Santarelli & Domenico Fabio Savo & Giuseppe De Giacomo
January 2022, Volume 14, Issue 2
- 1-13 A Hybrid Robust-Learning Architecture for Medical Image Segmentation with Noisy Labels
by Jialin Shi & Chenyi Guo & Ji Wu - 1-14 Controlling the Trade-Off between Resource Efficiency and User Satisfaction in NDNs Based on Naïve Bayes Data Classification and Lagrange Method
by Abdelkader Tayeb Herouala & Chaker Abdelaziz Kerrache & Benameur Ziani & Carlos T. Calafate & Nasreddine Lagraa & Abdou el Karim Tahari - 1-16 Modelling and Analysis of Performance Characteristics in a 60 Ghz 802.11ad Wireless Mesh Backhaul Network for an Urban 5G Deployment
by Michael Mackay & Alessandro Raschella & Ogeen Toma - 1-16 Efficient Next-Hop Selection in Multi-Hop Routing for IoT Enabled Wireless Sensor Networks
by Saleh M. Altowaijri - 1-16 The Framework of Cross-Domain and Model Adversarial Attack against Deepfake
by Haoxuan Qiu & Yanhui Du & Tianliang Lu - 1-17 Graph Representation-Based Deep Multi-View Semantic Similarity Learning Model for Recommendation
by Jiagang Song & Jiayu Song & Xinpan Yuan & Xiao He & Xinghui Zhu - 1-17 Topology Inference and Link Parameter Estimation Based on End-to-End Measurements
by Grigorios Kakkavas & Vasileios Karyotis & Symeon Papavassiliou - 1-18 An Active Path-Associated Cache Scheme for Mobile Scenes
by Tianchi Zhou & Peng Sun & Rui Han - 1-18 A Single-Rate Multicast Congestion Control (SRMCC) Mechanism in Information-Centric Networking
by Yingjie Duan & Hong Ni & Xiaoyong Zhu & Xu Wang - 1-19 Task Offloading Based on LSTM Prediction and Deep Reinforcement Learning for Efficient Edge Computing in IoT
by Youpeng Tu & Haiming Chen & Linjie Yan & Xinyan Zhou - 1-19 Coarse-to-Fine Entity Alignment for Chinese Heterogeneous Encyclopedia Knowledge Base
by Meng Wu & Tingting Jiang & Chenyang Bu & Bin Zhu - 1-19 An IoT-Based COVID-19 Prevention and Control System for Enclosed Spaces
by Cunwei Yang & Weiqing Wang & Fengying Li & Degang Yang - 1-21 Evaluation of a Reputation Management Technique for Autonomous Vehicles
by Darius Kianersi & Suraj Uppalapati & Anirudh Bansal & Jeremy Straub - 1-22 Selecting Workers Wisely for Crowdsourcing When Copiers and Domain Experts Co-exist
by Xiu Fang & Suxin Si & Guohao Sun & Quan Z. Sheng & Wenjun Wu & Kang Wang & Hang Lv - 1-23 DA-GAN: Dual Attention Generative Adversarial Network for Cross-Modal Retrieval
by Liewu Cai & Lei Zhu & Hongyan Zhang & Xinghui Zhu - 1-24 Research on Progress of Blockchain Consensus Algorithm: A Review on Recent Progress of Blockchain Consensus Algorithms
by Huanliang Xiong & Muxi Chen & Canghai Wu & Yingding Zhao & Wenlong Yi - 1-28 Estimation on the Importance of Semantic Web Integration for Art and Culture Related Online Media Outlets
by Andreas Giannakoulopoulos & Minas Pergantis & Nikos Konstantinou & Alexandros Kouretsis & Aristeidis Lamprogeorgos & Iraklis Varlamis - 1-29 Multi-Attribute Decision Making for Energy-Efficient Public Transport Network Selection in Smart Cities
by Rashmi Munjal & William Liu & Xuejun Li & Jairo Gutierrez & Peter Han Joo Chong - 1-35 Intelligent Traffic Management in Next-Generation Networks
by Ons Aouedi & Kandaraj Piamrat & Benoît Parrein - 1-50 Towards Crowdsourcing Internet of Things (Crowd-IoT): Architectures, Security and Applications
by Kenneth Li Minn Ang & Jasmine Kah Phooi Seng & Ericmoore Ngharamike
February 2022, Volume 14, Issue 2
- 1-6 Acknowledgment to Reviewers of Future Internet in 2021
by Future Internet Editorial Office - 1-14 Improved Eagle Strategy Algorithm for Dynamic Web Service Composition in the IoT: A Conceptual Approach
by Venushini Rajendran & R Kanesaraj Ramasamy & Wan-Noorshahida Mohd-Isa - 1-14 Exploring the Benefits of Combining DevOps and Agile
by Fernando Almeida & Jorge Simões & Sérgio Lopes - 1-15 Safety Verification of Driving Resource Occupancy Rules Based on Functional Language
by Zhixi Hu & Yi Zhu & Xiaoying Chen & Yu Zhao - 1-16 JoSDW: Combating Noisy Labels by Dynamic Weight
by Yaojie Zhang & Huahu Xu & Junsheng Xiao & Minjie Bian - 1-16 Personalizing Environmental Awareness through Smartphones Using AHP and PROMETHEE II
by Akrivi Krouska & Katerina Kabassi & Christos Troussas & Cleo Sgouropoulou - 1-17 Indoor Localization System Using Fingerprinting and Novelty Detection for Evaluation of Confidence
by Helmer Augusto de Souza Mourão & Horácio Antonio Braga Fernandes de Oliveira - 1-18 CNN for User Activity Detection Using Encrypted In-App Mobile Data
by Madushi H. Pathmaperuma & Yogachandran Rahulamathavan & Safak Dogan & Ahmet Kondoz - 1-20 A Performance Comparison of Different Cloud-Based Natural Language Understanding Services for an Italian e-Learning Platform
by Matteo Zubani & Luca Sigalini & Ivan Serina & Luca Putelli & Alfonso E. Gerevini & Mattia Chiari - 1-21 IoT Nodes Authentication and ID Spoofing Detection Based on Joint Use of Physical Layer Security and Machine Learning
by Dania Marabissi & Lorenzo Mucchi & Andrea Stomaci - 1-22 Anomalous Vehicle Recognition in Smart Urban Traffic Monitoring as an Edge Service
by Ning Chen & Yu Chen - 1-22 Open-Source MQTT-Based End-to-End IoT System for Smart City Scenarios
by Cristian D’Ortona & Daniele Tarchi & Carla Raffaelli - 1-23 Flow-Based Programming for Machine Learning
by Tanmaya Mahapatra & Syeeda Nilofer Banoo - 1-25 A Strategy-Based Formal Approach for Fog Systems Analysis
by Souad Marir & Faiza Belala & Nabil Hameurlain - 1-25 Digital Twin—Cyber Replica of Physical Things: Architecture, Applications and Future Research Directions
by Cheng Qian & Xing Liu & Colin Ripley & Mian Qian & Fan Liang & Wei Yu - 1-26 Flow Scheduling in Data Center Networks with Time and Energy Constraints: A Software-Defined Network Approach
by Martin Fraga & Matías Micheletto & Andrés Llinás & Rodrigo Santos & Paula Zabala - 1-32 Securing IoT Devices against Differential-Linear (DL) Attack Used on Serpent Algorithm
by Khumbelo Muthavhine & Mbuyu Sumbwanyambe - 1-39 Network Function Virtualization and Service Function Chaining Frameworks: A Comprehensive Review of Requirements, Objectives, Implementations, and Open Research Challenges
by Haruna Umar Adoga & Dimitrios P. Pezaros
January 2022, Volume 14, Issue 1
- 1-10 Global Contextual Dependency Network for Object Detection
by Junda Li & Chunxu Zhang & Bo Yang - 1-12 CacheHawkeye: Detecting Cache Side Channel Attacks Based on Memory Events
by Hui Yan & Chaoyuan Cui - 1-14 SMYOLO: Lightweight Pedestrian Target Detection Algorithm in Low-Altitude Scenarios
by Weiwei Zhang & Xin Ma & Yuzhao Zhang & Ming Ji & Chenghui Zhen - 1-18 A Queueing-Based Model Performance Evaluation for Internet of People Supported by Fog Computing
by Laécio Rodrigues & Joel J. P. C. Rodrigues & Antonio de Barros Serra & Francisco Airton Silva - 1-19 Utilizing Half Convolutional Autoencoder to Generate User and Item Vectors for Initialization in Matrix Factorization
by Tan Nghia Duong & Nguyen Nam Doan & Truong Giang Do & Manh Hoang Tran & Duc Minh Nguyen & Quang Hieu Dang - 1-19 A Semantic Preprocessing Framework for Breaking News Detection to Support Future Drone Journalism Services
by Michail Niarchos & Marina Eirini Stamatiadou & Charalampos Dimoulas & Andreas Veglis & Andreas Symeonidis - 1-20 Enhancing Reactive Ad Hoc Routing Protocols with Trust
by Yelena Trofimova & Pavel Tvrdík - 1-21 Mobility in Unsupervised Word Embeddings for Knowledge Extraction—The Scholars’ Trajectories across Research Topics
by Gianfranco Lombardo & Michele Tomaiuolo & Monica Mordonini & Gaia Codeluppi & Agostino Poggi - 1-22 S4 Features and Artificial Intelligence for Designing a Robot against COVID-19—Robocov
by Pedro Ponce & Omar Mata & Esteban Perez & Juan Roberto Lopez & Arturo Molina & Troy McDaniel - 1-22 Experimentation Environments for Data Center Routing Protocols: A Comprehensive Review
by Leonardo Alberro & Alberto Castro & Eduardo Grampin
December 2021, Volume 14, Issue 1
- 1-9 The Important Role of Global State for Multi-Agent Reinforcement Learning
by Shuailong Li & Wei Zhang & Yuquan Leng & Xiaohui Wang