


default search action
Future Internet, Volume 17
Volume 17, Number 1, January 2024
- Aviral Goel

, Yogachandran Rahulamathavan
:
A Comparative Survey of Centralised and Decentralised Identity Management Systems: Analysing Scalability, Security, and Feasibility. 1 - Sakshi Patni

, Joohyung Lee
:
EdgeGuard: Decentralized Medical Resource Orchestration via Blockchain-Secured Federated Learning in IoMT Networks. 2 - Álvaro D. Guillén Cava, Antonio Ruiz-Martínez

:
WebTrackingScore: A Combined Web Tracking Risk Score System for Websites. 3 - Mohamed Baqer

:
Energy-Efficient Federated Learning for Internet of Things: Leveraging In-Network Processing and Hierarchical Clustering. 4 - M. Francisca Hinarejos

, Josep Lluís Ferrer-Gomila
, Andreu Pere Isern-Deyà
, Gerardo-Francisco Chévez-Alvarado
:
A Blockchain-Based Protocol for Fair Delivery for Receipts. 5 - Antonio Pinizzotto

, Raffaele Bruno
:
A Fluid Model for Mobile Data Offloading Based on Device-to-Device Communications with Time Constraints. 6 - Yimika Erinle

, Yebo Feng
, Jiahua Xu
, Nikhil Vadgama, Paolo Tasca
:
Shared-Custodial Wallet for Multi-Party Crypto-Asset Management. 7 - Vahid Babaey, Arun Ravindran

:
GenSQLi: A Generative Artificial Intelligence Framework for Automatically Securing Web Application Firewalls Against Structured Query Language Injection Attacks. 8 - Muhammad Dilshad

, Madiha Haider Syed
, Semeen Rehman
:
Efficient Distributed Denial of Service Attack Detection in Internet of Vehicles Using Gini Index Feature Selection and Federated Learning. 9 - Salvador López-Barajas

, Pedro J. Sanz
, Raúl Marín Prades
, Juan Echagüe
, Sebastian Realpe
:
Network Congestion Control Algorithm for Image Transmission - HRI and Visual Light Communications of an Autonomous Underwater Vehicle for Intervention. 10 - Nemat Hazrati, Sajjad Pirahesh

, Bahman Arasteh, Seyed Salar Sefati
, Octavian Fratu
, Simona Halunga
:
Cache Aging with Learning (CAL): A Freshness-Based Data Caching Method for Information-Centric Networking on the Internet of Things (IoT). 11 - Xiaozheng Du, Shijing Hu, Feng Zhou

, Cheng Wang, Binh Minh Nguyen:
FI-NL2PY2SQL: Financial Industry NL2SQL Innovation Model Based on Python and Large Language Model. 12 - Innocent Boakye Ababio, Jan Bieniek

, Mohamed Rahouti
, Thaier Hayajneh
, Mohammed Aledhari, Dinesh C. Verma
, Abdellah Chehri
:
A Blockchain-Assisted Federated Learning Framework for Secure and Self-Optimizing Digital Twins in Industrial IoT. 13 - Sergio Cibecchini

, Francesco Chiti
, Laura Pierucci
:
A Lightweight AI-Based Approach for Drone Jamming Detection. 14 - Luca Petrillo

, Fabio Martinelli
, Antonella Santone
, Francesco Mercaldo
:
Explainable Security Requirements Classification Through Transformer Models. 15 - Georgios Fevgas

, Thomas Lagkas
, Panagiotis G. Sarigiannidis
, Vasileios Argyriou:
Advances in Remote Sensing and Propulsion Systems for Earth Observation Nanosatellites. 16 - Yichao Chao, Rui Han:

A Hierarchical Cache Architecture-Oriented Cache Management Scheme for Information-Centric Networking. 17 - Chen Qiu

, Ziang Wu
, Haoda Wang, Qinglin Yang
, Yu Wang
, Chunhua Su:
Hierarchical Aggregation for Federated Learning in Heterogeneous IoT Scenarios: Enhancing Privacy and Communication Efficiency. 18 - Wei Zhou

, Shandian Shen
, Peng Liu:
IoT Firmware Emulation and Its Security Application in Fuzzing: A Critical Revisit. 19 - Aryan Sharma

, Haoming Wang
, Deepak Mishra
, Aruna Seneviratne:
Conservative Interference Injection to Minimize Wi-Fi Sensing Privacy Risks and Bandwidth Loss. 20 - Antonia-Maria Pazakou, Stylianos Mystakidis

, Ioannis Kazanidis
:
Collaboration in a Virtual Reality Serious Escape Room in the Metaverse Improves Academic Performance and Learners' Experiences. 21 - Niroshinie Fernando

, Samir Shrestha, Seng W. Loke
, Kevin Lee
:
On Edge-Fog-Cloud Collaboration and Reaping Its Benefits: A Heterogeneous Multi-Tier Edge Computing Architecture. 22 - Elmin Marevac

, Esad Kadusic
, Natasa Zivic
, Nevzudin Buzadija
, Samir Lemes
:
Framework Design for the Dynamic Reconfiguration of IoT-Enabled Embedded Systems and "On-the-Fly" Code Execution. 23 - Daegyeom Kim

, Sehwan O
, Younghoon Ban
, Jungsoo Park
, Kyungho Joo
, Haehyun Cho
:
Ventinel: Automated Detection of Android Vishing Apps Using Optical Character Recognition. 24 - Maiada M. Mahmoud

, Yasser Omar Youssef
, Ayman A. Abdel-Hamid
:
XI2S-IDS: An Explainable Intelligent 2-Stage Intrusion Detection System. 25 - Konstantinos Kalodanis

, Panagiotis Rizomiliotis
, Georgios Feretzakis
, Charalampos Papapavlou
, Dimosthenis Anagnostopoulos:
High-Risk AI Systems - Lie Detection Application. 26 - Lalan Mishra

, Naima Kaabouch:
Impact of Weather Factors on Unmanned Aerial Vehicles' Wireless Communications. 27 - Konstantinos I. Roumeliotis

, Nikolaos D. Tselikas
, Dimitrios K. Nasiopoulos
:
Fake News Detection and Classification: A Comparative Study of Convolutional Neural Networks, Large Language Models, and Natural Language Processing Models. 28 - Francesco Morgan Bono

, Alessio Polinelli, Luca Radicioni
, Lorenzo Benedetti
, Francesco Castelli-Dezza
, Simone Cinquemani
, Marco Belloli
:
Wireless Accelerometer Architecture for Bridge SHM: From Sensor Design to System Deployment. 29 - Elias Dritsas

, Maria Trigka
:
A Survey on Cybersecurity in IoT. 30 - Alessio Ferone

, Stefano Verrilli:
Exploiting Blockchain Technology for Enhancing Digital Twins' Security and Transparency. 31 - Zhiyuan Wang, Yuezhi Zhou

:
Analysis and Evaluation of Intel Software Guard Extension-Based Trusted Execution Environment Usage in Edge Intelligence and Internet of Things Scenarios. 32 - Pablo Corona-Fraga

, Aldo Hernandez-Suarez
, Gabriel Sanchez-Perez
, Linda Karina Toscano-Medina
, Héctor M. Pérez Meana, José Portillo-Portillo
, Jesus Olivares-Mercado
, Luis Javier García-Villalba
:
Question-Answer Methodology for Vulnerable Source Code Review via Prototype-Based Model-Agnostic Meta-Learning. 33 - Matthew Boeding

, Michael Hempel
, Hamid Sharif
:
End-to-End Framework for Identifying Vulnerabilities of Operational Technology Protocols and Their Implementations in Industrial IoT. 34 - Mian Qian

, Abubakar Ahmad Musa
, Milon Biswas
, Yifan Guo
, Weixian Liao
, Wei Yu:
Survey of Artificial Intelligence Model Marketplace. 35 - Orestis Spyrou, William Hurst

, Caspar Krampe:
A Reference Architecture for Virtual Human Integration in the Metaverse: Enhancing the Galleries, Libraries, Archives, and Museums (GLAM) Sector with AI-Driven Experiences. 36 - Sumaiah Algarni, Fathi E. Abd El-Samie

:
Energy-Efficient Distributed Edge Computing to Assist Dense Internet of Things. 37 - Daniela Gifu

, Covaci Silviu-Vasile:
Artificial Intelligence vs. Human: Decoding Text Authenticity with Transformers. 38 - Giuseppe Baruffa

, Luca Rugini
:
Resource Assignment Algorithms for Autonomous Mobile Robots with Task Offloading. 39 - Yang Yang, Min Lin, Yangfei Lin, Chen Zhang, Celimuge Wu

:
A Survey of Blockchain Applications for Management in Agriculture and Livestock Internet of Things. 40 - Italo Cesidio Fantozzi

, Annalisa Santolamazza
, Giancarlo Loy, Massimiliano M. Schiraldi
:
Digital Twins: Strategic Guide to Utilize Digital Twins to Improve Operational Efficiency in Industry 4.0. 41 - Marica Amadeo

, Giuseppe Ruggeri
:
Exploring In-Network Computing with Information-Centric Networking: Review and Research Opportunities. 42 - Chung-Wei Kuo

, Wei Wei, Chun-Chang Lin, Yu-Yi Hong, Jia-Ruei Liu, Kuo-Yu Tsai:
Dynamic Key Replacement Mechanism for Lightweight Internet of Things Microcontrollers to Resist Side-Channel Attacks. 43 - Víctor Pérez-Cano, Francisco Jurado

:
Fraud Detection in Cryptocurrency Networks - An Exploration Using Anomaly Detection and Heterogeneous Graph Transformers. 44 - Yuansong Qiao

:
Blockchain and Artificial Intelligence for Decentralized Edge Environments. 45 - Teguh Indra Bayu

, Yung-Fa Huang
, Jeang-Kuo Chen
, Cheng-Hsiung Hsieh, Budhi Kristianto
, Erwien Christianto, Suharyadi Suharyadi:
Advanced Optimization Algorithm Combining a Fuzzy Inference System for Vehicular Communications. 46 - Ahmad A. Al-Oqaily

, Emad E. Abdallah
, Rahaf Alzyoud
, Esraa Abu Elsoud
, Malak Al-Hassan
, Alaa Eddien Abdallah
:
Deep Learning Framework for Advanced De-Identification of Protected Health Information. 47 - Jan Ferrer i Picó

, Michelle Catta-Preta
, Alex Trejo Omeñaca
, Marc Vidal, Josep María Monguet Fierro
:
The Time Machine: Future Scenario Generation Through Generative AI Tools. 48 - Tamai Ramírez-Gordillo

, Antonio Maciá-Lillo
, Francisco A. Pujol
, Nahuel E. Garcia-D'Urso
, Jorge Azorín López
, Higinio Mora
:
Decentralized Identity Management for Internet of Things (IoT) Devices Using IOTA Blockchain Technology. 49
Volume 17, Number 2, February 2025
- Emmanuel Ekene Okere

, Vipin Balyan
:
Sixth Generation Enabling Technologies and Machine Learning Intersection: A Performance Optimization Perspective. 50 - Hadeel Amjed Saeed, Sufyan T. Faraj Al-Janabi

, Esam Taha Yassen
, Omar A. Aldhaibani
:
Survey on Secure Scientific Workflow Scheduling in Cloud Environments. 51 - Casey C. Bennett

, Young-Ho Bae
, Jun Hyung Yoon
, Say Young Kim
, Benjamin Weiss
:
Enhancing Human-Agent Interaction via Artificial Agents That Speculate About the Future. 52 - David Ortiz-Perez, Pablo Ruiz-Ponce, David Mulero-Pérez, Manuel Benavent-Lledó

, Javier Rodríguez-Juan, Hugo G. González-Hernández, Anatoli Iarovikov, Srdjan Krco, Daliborka Nedic, Dejan Vukobratovic, José García Rodríguez:
Optimizing IoT Video Data: Dimensionality Reduction for Efficient Deep Learning on Edge Computing. 53 - Brahim Benaissa

, Filip Hendrichovsky, Mansur As
, Kaori Yoshida:
BLE Signal Reception and Localization Performance with Varying Receiver and Beacon Setups. 54 - Ana Cassia Cruz

, Rogério Luís de C. Costa
, Leonel Santos
, Carlos Rabadão
, Anabela Marto
, Alexandrino Gonçalves
:
Assessing User Perceptions and Preferences on Applying Obfuscation Techniques for Privacy Protection in Augmented Reality. 55 - Huu Dang Quoc

, Loc Nguyen The
, Truong Bui Quang
, Phuong Han Minh:
IoT-Driven Intelligent Scheduling Solution for Industrial Sewing Based on Real-RCPSP Model. 56 - Md. Monjurul Karim

, Dong Hoang Van, Sangeen Khan
, Qiang Qu
, Yaroslav Kholodov
:
AI Agents Meet Blockchain: A Survey on Secure and Scalable Collaboration for Multi-Agents. 57 - Georgios Lampropoulos

:
Intelligent Virtual Reality and Augmented Reality Technologies: An Overview. 58 - Douglas Farias Cordeiro

, Carlos Lopezosa
, Javier Guallar
:
A Methodological Framework for AI-Driven Textual Data Analysis in Digital Media. 59 - Gianmarco Baldini

:
On the Application of a Sparse Data Observers (SDOs) Outlier Detection Algorithm to Mitigate Poisoning Attacks in UltraWideBand (UWB) Line-of-Sight (LOS)/Non-Line-of-Sight (NLOS) Classification. 60 - Jannatul Ferdush

, Joarder Kamruzzaman
, Gour C. Karmakar
, Iqbal Gondal
, Rajkumar Das:
Cross-Domain Fake News Detection Through Fusion of Evidence from Multiple Social Media Platforms. 61 - Evangelos D. Spyrou

, Vassilios A. Kappatos
, Chrysostomos D. Stylios
:
Transmission Power Control in Multi-Hop Communications of THz Communication Using a Potential Game Approach. 62 - Leyli Nouraei Yeganeh

, Nicole Scarlett Fenty
, Yu Chen
, Amber Simpson
, Mohsen Hatami
:
The Future of Education: A Multi-Layered Metaverse Classroom Model for Immersive and Inclusive Learning. 63 - Abeer Alabbas

, Khalid Alomar:
A Weighted Composite Metric for Evaluating User Experience in Educational Chatbots: Balancing Usability, Engagement, and Effectiveness. 64 - Chengjun Li, Liguo Yao, Yao Lu

, Songsong Zhang, Taihua Zhang:
DTL-GNN: Digital Twin Lightweight Method Based on Graph Neural Network. 65 - Kilbert Amorim Maciel

, David Martins Leite
, Guilherme Alves de Araújo
, Flávia Coimbra Delicato, Atslands Rego da Rocha
:
Ubunye: An MEC Orchestration Service Based on QoE, QoS, and Service Classification Using Machine Learning. 66 - George Alex Stelea

, Livia Sângeorzan, Nicoleta Enache-David
:
When Cybersecurity Meets Accessibility: A Holistic Development Architecture for Inclusive Cyber-Secure Web Applications and Websites. 67 - Azita Pourghasem

, Raimund Kirner
, Athanasios Tsokanos, Iosif Mporas
, Alexios Mylonas
:
Machine Learning and Deep Learning-Based Multi-Attribute Physical-Layer Authentication for Spoofing Detection in LoRaWAN. 68 - Abimbola Efunogbon, Enjie Liu

, Renxie Qiu, Taiwo Efunogbon:
Optimal 5G Network Sub-Slicing Orchestration in a Fully Virtualised Smart Company Using Machine Learning. 69 - Tahesin Samira Delwar

, Sayak Mukhopadhyay
, Akshay Kumar, Mangal Singh
, Yang-Won Lee
, Jee-Youl Ryu, A. S. M. Sanwar Hosen
:
Real-Time Farm Surveillance Using IoT and YOLOv8 for Animal Intrusion Detection. 70 - Patrizia Marti

, Giulia Teverini, Cecilia Goracci
, Lorenzo Franchi
:
Correction: Marti et al. Gamification of Orthodontic Treatment with Personalised Facemasks: Enhancing Patient Compliance Through Playful Engagement. Future Internet 2024, 16, 446. 71 - Oleksandr Kuznetsov

, Emanuele Frontoni
, Kateryna Kuznetsova, Marco Arnesano
:
Optimizing Merkle Proof Size Through Path Length Analysis: A Probabilistic Framework for Efficient Blockchain State Verification. 72 - Ran Yang

, Zhaonan Li, Junhao Qian, Zhihua Li:
Task-Driven Virtual Machine Optimization Placement Model and Algorithm. 73 - Hemin Sardar Abdulla

, Aso M. Aladdin
:
Enhancing Design and Authentication Performance Model: A Multilevel Secure Database Management System. 74 - Peng Liu, Lili Jia, Yang Xiao:

Participant Selection for Efficient and Trusted Federated Learning in Blockchain-Assisted Hierarchical Federated Learning Architectures. 75 - Vincenza Carchiolo

, Michele Malgeri
:
Trends, Challenges, and Applications of Large Language Models in Healthcare: A Bibliometric and Scoping Review. 76 - Henrich C. Pöhls

, Fabian Kügler, Emiliia Gelóczi
, Felix Klement
:
Segmentation and Filtering Are Still the Gold Standard for Privacy in IoT - An In-Depth STRIDE and LINDDUN Analysis of Smart Homes. 77 - Manuel Cheminod

, Ivan Cibrario Bertolotti
, Adriano Valenzano
, Luca Durante
:
Low-Cost Software Evaluation of Communication Delays in Networked Industrial Systems. 78 - Navdeep Bohra

, Ashish Kumari, Vikash Kumar Mishra
, Pramod Kumar Soni
, Vipin Balyan
:
Intelligence-Based Strategies with Vehicle-to-Everything Network: A Review. 79 - Cheng-Chi Lee

, Dinh-Thuan Do, Agbotiname Lucky Imoize
:
Machine Learning for Blockchain and IoT Systems in Smart City. 80 - Saverio Piccininni

, Mine Dastan
, Fabio Vangi
, Michele Fiorentino
:
MAGIC: Multi-User Advanced Graphic Immersive Configurator for Sustainable Customization of Complex Design Products - A Sailing Yacht Case Study. 81 - Tiago Bastos

, Cármen Guimarães, Leonor Teixeira
:
Framework of Best Practices to Drive the Digital Transition: Towards a 4.0 Paradigm Based on Evidence from Case Studies. 82 - Carolina Pereira

, Anabela Marto
, Roberto Ribeiro
, Alexandrino Gonçalves
, Nuno Rodrigues
, Carlos Rabadão
, Rogério Luís de Carvalho Costa
, Leonel Santos
:
Security and Privacy in Physical-Digital Environments: Trends and Opportunities. 83 - Alfredo Cuzzocrea

, Mst. Shapna Akter, Hossain Shahriar, Pablo García Bringas
:
Cyberbullying Detection, Prevention, and Analysis on Social Media via Trustable LSTM-Autoencoder Networks over Synthetic Data: The TLA-NET Approach. 84 - Vlad-Eusebiu Baciu

, An Braeken
, Laurent Segers
, Bruno da Silva
:
Secure Tiny Machine Learning on Edge Devices: A Lightweight Dual Attestation Mechanism for Machine Learning. 85 - Rodrigo Asensio Garriga

, Alejandro Molina Zarca
, Jordi Ortiz
, Ana Hermosilla
, Hugo Ramón Pascual, Antonio Pastor
, Antonio F. Skarmeta
:
ZSM Framework for Autonomous Security Service Level Agreement Life-Cycle Management in B5G Networks. 86 - Zhanyi Hu, Tianchen Zhou, Bingzhe Wu, Cen Chen

, Yanhao Wang
:
A Review and Experimental Evaluation on Split Learning. 87 - Abdulrahman A. Alshdadi

, Abdulwahab Ali Almazroi
, Nasir Ayub
, Miltiadis D. Lytras
, Eesa Alsolami, Faisal S. Alsubaei
, Riad Alharbey:
Federated Deep Learning for Scalable and Privacy-Preserving Distributed Denial-of-Service Attack Detection in Internet of Things Networks. 88 - Salwa Fakhfakh Sahnoun, Mahdi Mnif

, Bilel Ghoul
, Mohamed Jemal
, Ahmed Fakhfakh
, Olfa Kanoun
:
Hybrid Solution Through Systematic Electrical Impedance Tomography Data Reduction and CNN Compression for Efficient Hand Gesture Recognition on Resource-Constrained IoT Devices. 89 - Gaetanino Paolone

, Romolo Paesani
, Francesco Pilotti
, Jacopo Camplone
, Andrea Piazza
, Paolino Di Felice
:
Smart Lighting Systems: State-of-the-Art in the Adoption of the EdgeML Computing Paradigm. 90 - Behrouz Zolfaghari

, Jacob Krzciok, Khodakhast Bibak
:
From Bottom of Sea to Space: Quo Vadis IoT? So What About Security? 91 - Mo Adda

, Nancy Scheidt
:
Investigation of Smart Machines with DNAs in SpiderNet. 92 - Saif Al-Dean Qawasmeh

, Ali Abdullah S. AlQahtani
:
Beyond Firewall: Leveraging Machine Learning for Real-Time Insider Threats Identification and User Profiling. 93 - Abderrahim Lakehal

, Adel Alti
, Boubakeur Annane
:
CORES: Context-Aware Emotion-Driven Recommendation System-Based LLM to Improve Virtual Shopping Experiences. 94 - Francesco Bruni Prenestino

, Enrico Barbierato
, Alice Gatti
:
Robust Synthetic Data Generation for Sequential Financial Models Using Hybrid Variational Autoencoder-Markov Chain Monte Carlo Architectures. 95
Volume 17, Number 3, March 2025
- Joachim de Curtò

, Irene de Zarzà, Leandro Sebastián Fervier
, Victoria Sanagustín-Fons
, Carlos T. Calafate
:
An Institutional Theory Framework for Leveraging Large Language Models for Policy Analysis and Intervention Design. 96 - Tal Gaon, Yovel Gabay, Miri Weiss-Cohen

:
Optimizing Electric Vehicle Routing Efficiency Using K-Means Clustering and Genetic Algorithms. 97 - Wata Kanjanapruthipong

, Sirapat Boonkrong
:
Blockchain-Based Decentralised Authentication in Closed Environments. 98 - Nicoletta González-Cancelas

, Javier Vaca-Cabrero
, Alberto Camarero-Orive
:
IoV and Blockchain for Traffic Optimization in Ro-Ro Terminals: A Case Study in the Spanish Port System. 99 - Jinying Li, Ananda Maiti

:
Applying Large Language Model Analysis and Backend Web Services in Regulatory Technologies for Continuous Compliance Checks. 100 - Yuezhi Zhou

, Xu Chen:
Edge Intelligence: Edge Computing for 5G and the Internet of Things. 101 - Rashmi N. Muralinath

, Vishwambhar Pathak
, Prabhat K. Mahanti:
Metastable Substructure Embedding and Robust Classification of Multichannel EEG Data Using Spectral Graph Kernels. 102 - Jakub Swacha

, Artur Kulpa
:
Gamitest: A Game-like Online Student Assessment System. 103 - Oleksii Chalyi

, Kestutis Driaunys
, Vytautas Rudzionis
:
Assessing Browser Security: A Detailed Study Based on CVE Metrics. 104 - Eva Correia Ramos, Célia M. Q. Ramos:

User-Generated Content and Its Impact on Purchase Intent for Tourism Products: A Comparative Analysis of Millennials and Centennials on TikTok. 105 - Mario Martínez Morfa

, Carlos Ruiz De Mendoza
, Cristina Cervelló-Pastor
, Sebastià Sallent Ribes
:
Federated Learning System for Dynamic Radio/MEC Resource Allocation and Slicing Control in Open Radio Access Network. 106 - John Mulo, Hengshuo Liang

, Mian Qian
, Milon Biswas
, Bharat S. Rawal
, Yifan Guo
, Wei Yu:
Navigating Challenges and Harnessing Opportunities: Deep Learning Applications in Internet of Medical Things. 107 - Juan D. Morillo Reina

, Tomás de Jesús Mateo Sanguino
:
Decentralized and Secure Blockchain Solution for Tamper-Proof Logging Events. 108 - Rana Albelaihi

:
Mobility Prediction and Resource-Aware Client Selection for Federated Learning in IoT. 109 - Vincenzo Barrile

, Emanuela Genovese
, Clemente Maesano, Sonia Calluso
, Maurizio Pasquale Manti:
Developing an Urban Digital Twin for Environmental and Risk Assessment: A Case Study on Public Lighting and Hydrogeological Risk. 110 - Shuaib K. Memon, Md. Akbar Hossain

, Nurul I. Sarkar
:
Frame Aggregation with Simple Block Acknowledgement Mechanism to Provide Strict Quality of Service Guarantee to Emergency Traffic in Wireless Networks. 111 - Stanimir Stoyanov

, Emil Doychev
, Asya Stoyanova-Doycheva
, Veneta Tabakova-Komsalova
, Ivan Stoyanov
, Iliya Nedelchev:
A Regional Multi-Agent Air Monitoring Platform. 112 - Nicholas Jones

, Md Whaiduzzaman
, Tony Jan
, Amr Adel
, Ammar Alazab
, Afnan Alkreisat:
A CIA Triad-Based Taxonomy of Prompt Attacks on Large Language Models. 113 - Tieqi Xi, Qiuhua Zheng, Chuanhui Cheng, Ting Wu, Guojie Xie, Xuebiao Qian, Haochen Ye, Zhenyu Sun:

SwiftSession: A Novel Incremental and Adaptive Approach to Rapid Traffic Classification by Leveraging Local Features. 114 - Daneesha Ranasinghe

, Nayomi Kankanamge
, Chathura de Silva
, Nuwani Kangana
, Rifat Mahamood
, Tan Yigitcanlar
:
CityBuildAR: Enhancing Community Engagement in Placemaking Through Mobile Augmented Reality. 115 - Fabrizio Messina

, Domenico Rosaci, Giuseppe M. L. Sarnè
:
A Neural-Symbolic Approach to Extract Trust Patterns in IoT Scenarios. 116 - Ojilvie Avila-Cortés

, Saúl E. Pomares Hernández, Julio César Pérez Sansalvador
, Lil María Rodríguez-Henríquez:
Emergency Messaging System for Urban Vehicular Networks Inspired by Social Insects' Stigmergic Communication. 117 - Maria Trigka

, Elias Dritsas
:
Edge and Cloud Computing in Smart Cities. 118 - Konstantinos C. Giotopoulos

, Dimitrios Michalopoulos, Gerasimos Vonitsanos
, Dimitris Papadopoulos
, Ioanna Giannoukou
, Spyros Sioutas
:
Dynamic Workload Management System in the Public Sector: A Comparative Analysis. 119 - Amanda Thomson

, Leandros Maglaras
, Naghmeh Moradpoor
:
A Novel TLS-Based Fingerprinting Approach That Combines Feature Expansion and Similarity Mapping. 120 - Agorakis Bompotas

, Nikitas-Rigas Kalogeropoulos
, Christos Makris
:
CommC: A Multi-Purpose COMModity Hardware Cluster. 121 - Bharat S. Chaudhari

:
Enabling Tactile Internet via 6G: Application Characteristics, Requirements, and Design Considerations. 122 - Yanxuan Li

, Vatcharapol Sukhotu:
How Does Digital Capability Shape Resilient Supply Chains? - Evidence from China's Electric Vehicle Manufacturing Industry. 123 - Andri Santoso

, Samsul Huda
, Yuta Kodera
, Yasuyuki Nogami
:
Facial Privacy Protection with Dynamic Multi-User Access Control for Online Photo Platforms. 124 - Ashraf Aldabbas

, Zaid Mustafa, Zoltán Gál
:
Advanced Trajectory Analysis of NASA's Juno Mission Using Unsupervised Machine Learning: Insights into Jupiter's Orbital Dynamics. 125 - Shaoyu Ye

, Kevin K. W. Ho
:
University Students' Subjective Well-Being in Japan Between 2021 and 2023: Its Relationship with Social Media Use. 126 - Li Wang, Heming Zhang, Changyuan Wang:

Deep Neural Network-Based Modeling of Multimodal Human-Computer Interaction in Aircraft Cockpits. 127 - Yulin Kang, Wuzheng Tan, Linlin Fan, Yinuo Chen, Xinbin Lai, Jian Weng:

GHEFL: Grouping Based on Homomorphic Encryption Validates Federated Learning. 128 - Vasiliki Papanikou

, Panagiotis Papadakos
, Theodora Karamanidou
, Thanos G. Stavropoulos
, Evaggelia Pitoura
, Panayiotis Tsaparas
:
Health Misinformation in Social Networks: A Survey of Information Technology Approaches. 129 - Mohammad Munzurul Islam, Mohammed Alawad:

Resource-Aware ECG Classification with Heterogeneous Models in Federated Learning. 130 - Hani M. Alnami

, Imad Mahgoub
, Hamzah Al Najada, Easa Alalwany
:
A Distributed Machine Learning-Based Scheme for Real-Time Highway Traffic Flow Prediction in Internet of Vehicles. 131 - Qizhong Zheng, Xiujie Huang

:
FedRecI2C: A Novel Federated Recommendation Framework Integrating Communication and Computation to Accelerate Convergence Under Communication Constraints. 132
Volume 17, Number 4, April 2025
- Oladele Afolalu

, Mohohlo Samuel Tsoeu
:
Enterprise Networking Optimization: A Review of Challenges, Solutions, and Technological Interventions. 133 - Tenzin Norbu

, Joo-Yeon Park
, Kok Wai Wong, Hui Cui
:
Understanding Consumer Acceptance for Blockchain-Based Digital Payment Systems in Bhutan. 134 - Akhil Joshi, Sai Teja Erukude

, Lior Shamir
:
Explainable Identification of Similarities Between Entities for Discovery in Large Text. 135 - Ali Zaman, Salman A. Khan

, Nazeeruddin Mohammad
, Abdelhamied A. Ateya
, Sadique Ahmad
, Mohammed Ahmed El-Affendi
:
Distributed Denial of Service Attack Detection in Software-Defined Networks Using Decision Tree Algorithms. 136 - Fragkiskos Ninos, Konstantinos Karalas, Dimitrios Dechouniotis

, Michael L. Polemis
:
On Microservice-Based Architecture for Digital Forensics Applications: A Competition Policy Perspective. 137 - Ali Nemati

, Mohammad Assadi Shalmani
, Qiang Lu
, Jake Luo
:
Benchmarking Large Language Models from Open and Closed Source Models to Apply Data Annotation for Free-Text Criteria in Healthcare. 138 - Ivan Nedyalkov

:
Studying the Impact of a UDP DoS Attack on the Parameters of VoIP Voice and Video Streams. 139 - Chaimae Kanzouai

, Soukaina Bouarourou
, Abderrahim Zannou
, Abdelhak Boulaalam
, El Habib Nfaoui
:
Enhancing IoT Scalability and Interoperability Through Ontology Alignment and FedProx. 140 - Dimitrios Dechouniotis

, Ioannis Dimolitsas
:
Scalable and Distributed Cloud Continuum Orchestration for Next-Generation IoT Applications: Latest Advances and Prospects. 141 - Paul Scalise

, Michael Hempel
, Hamid Sharif
:
A Survey of 5G Core Network User Identity Protections, Concerns, and Proposed Enhancements for Future 6G Technologies. 142 - Jaehwan Lee

, Youngjun Sim
, Jinyou Kim
, Young-Joo Suh
:
EmoSDS: Unified Emotionally Adaptive Spoken Dialogue System Using Self-Supervised Speech Representations. 143 - Yonit Rusho

, Daphne Ruth Raban
, David Simantov, Gilad Ravid
:
Knowledge Sharing in Security-Sensitive Communities. 144 - Francesco Branda

, Massimo Stella
, Cecilia Ceccarelli
, Federico Cabitza
, Giancarlo Ceccarelli
, Antonello Maruotti
, Massimo Ciccozzi
, Fabio Scarpa
:
The Role of AI-Based Chatbots in Public Health Emergencies: A Narrative Review. 145 - Carlos Andrés Mesa-Montoya

, Néstor Iván Marín Peláez, Kevin David Ortega-Quiñones
, German Andrés Holguín-Londoño
, Libardo Vicente Vanegas-Useche
, Gian Carlo Daraviña-Peña
, Edwan Anderson Ariza-Echeverri
, Diego Vergara
:
Integration of a Digital Twin Framework for Trajectory Control of a 2RRR Planar Parallel Manipulator Using ROS/Gazebo and MATLAB. 146 - Deborah Maffezzoni

, Enrico Barbierato
, Alice Gatti
:
Data-Driven Diagnostics for Pediatric Appendicitis: Machine Learning to Minimize Misdiagnoses and Unnecessary Surgeries. 147 - Saad Qamar

, Nesar Ahmad
, Parvez Mahmood Khan:
Task Scheduling for Public Clouds Using a Fuzzy Controller-Based Priority- and Deadline-Aware Approach. 148 - Saad Belcaid

, Mostapha Zbakh, Siham Aouad
, Abdellah Touhafi
, An Braeken
:
A Cross-Chain-Based Access Control Framework for Cloud Environment. 149 - Danial Ahmadzadeh, Mehrdad Jalali

, Reza Ghaemi, Maryam Kheirabadi:
GraphDBSCAN: Optimized DBSCAN for Noise-Resistant Community Detection in Graph Clustering. 150 - Georgios Feretzakis

, Evangelia Vagena, Konstantinos Kalodanis
, Paraskevi Peristera
, Dimitris Kalles
, Athanasios Anastasiou
:
GDPR and Large Language Models: Technical and Legal Obstacles. 151 - Bernhard Neumayer

, Stefan Sauermann
, Sten Hanke
:
eHealth and mHealth. 152 - Vladislav Manolov, Daniela Gotseva, Nikolay Hinov

:
Practical Comparison Between the CI/CD Platforms Azure DevOps and GitHub. 153 - Madhav Mukherjee

, John Le
, Yang-Wai Chow
:
Generative AI-Enhanced Intelligent Tutoring System for Graduate Cybersecurity Programs. 154 - Hamed Khalili

, Hannes Frey, Maria A. Wimmer
:
Balancing Prediction Accuracy and Explanation Power of Path Loss Modeling in a University Campus Environment via Explainable AI. 155 - Ade Dotun Ajasa, Hassan Chizari

, Abu Alam
:
Database Security and Performance: A Case of SQL Injection Attacks Using Docker-Based Virtualisation and Its Effect on Performance. 156 - Aristidis G. Anagnostakis

, Euripidis Glavas
:
The New CAP Theorem on Blockchain Consensus Systems. 157 - Sunan Wang, Rong Song, Xiangyu Zheng, Wanwei Huang

, Hongchang Liu:
A3C-R: A QoS-Oriented Energy-Saving Routing Algorithm for Software-Defined Networks. 158 - Chrisbel Simisterra-Batallas

, Pablo Pico-Valencia
, Jaime Sayago-Heredia, Xavier Quiñónez-Ku
:
Internet of Things and Deep Learning for Citizen Security: A Systematic Literature Review on Violence and Crime. 159 - Jiayi Wang, Tianyou Zheng, Yang Zhang, Tianli Zheng, Weiwei Fu:

Comparative Feature-Guided Regression Network with a Model-Eye Pretrained Model for Online Refractive Error Screening. 160 - Radheshyam Singh

, Line M. P. Larsen
, Eder Ollora Zaballa
, Michael Stübert Berger
, Christian Kloch
, Lars Dittmann
:
Enabling Green Cellular Networks: A Review and Proposal Leveraging Software-Defined Networking, Network Function Virtualization, and Cloud-Radio Access Network. 161 - Ágata Palma

, Mário Antunes
, Jorge Bernardino
, Ana Alves
:
Multi-Class Intrusion Detection in Internet of Vehicles: Optimizing Machine Learning Models on Imbalanced Data. 162 - Dimitris Kostadimas

, Vlasios Kasapakis
, Konstantinos Kotis
:
A Systematic Review on the Combination of VR, IoT and AI Technologies, and Their Integration in Applications. 163 - Ahshanul Haque

, Hamdy S. Soliman:
A Transformer-Based Autoencoder with Isolation Forest and XGBoost for Malfunction and Intrusion Detection in Wireless Sensor Networks for Forest Fire Prediction. 164 - Junchao Wang

, Honglin Li, Yan Sun
, Chris Phillips, Alexios Mylonas
, Dimitris Gritzalis
:
CPCROK: A Communication-Efficient and Privacy-Preserving Scheme for Low-Density Vehicular Ad Hoc Networks. 165 - Christos Troussas

, Akrivi Krouska
, Phivos Mylonas, Cleo Sgouropoulou:
Reinforcement Learning-Based Dynamic Fuzzy Weight Adjustment for Adaptive User Interfaces in Educational Software. 166 - Ivan Cibrario Bertolotti

, Luca Durante
, Enrico Cambiaso
:
Analyzing Impact and Systemwide Effects of the SlowROS Attack in an Industrial Automation Scenario. 167 - Peng Li, Chen Qing, Hao Liu

:
NUDIF: A Non-Uniform Deployment Framework for Distributed Inference in Heterogeneous Edge Clusters. 168 - Ali Vaziri

, Pardis Sadatian Moghaddam, Mehrdad Shoeibi
, Masoud Kaveh
:
Energy-Efficient Secure Cell-Free Massive MIMO for Internet of Things: A Hybrid CNN-LSTM-Based Deep-Learning Approach. 169 - Edson Ramiro Lucas Filho

, George Savva
, Lun Yang
, Ke-Bo Fu
, Jianqiang Shen
, Herodotos Herodotou
:
Employing Streaming Machine Learning for Modeling Workload Patterns in Multi-Tiered Data Storage Systems. 170 - Adrian Alexandrescu

, Delia-Elena Barbuta
, Cristian Nicolae Butincu
, Alexandru Archip
, Silviu-Dumitru Paval
, Catalin Mironeanu
, Gabriel-Alexandru Scînteie:
Design Analysis for a Distributed Business Innovation System Employing Generated Expert Profiles, Matchmaking, and Blockchain Technology. 171 - Efstratios Chatzoglou

, Georgios Kambourakis
:
C3: Leveraging the Native Messaging Application Programming Interface for Covert Command and Control. 172 - Jungpil Shin

, Abu Saleh Musa Miah
, Rei Egawa, Najmul Hassan
, Koki Hirooka
, Yoichi Tomioka
:
Multimodal Fall Detection Using Spatial-Temporal Attention and Bi-LSTM-Based Feature Fusion. 173 - Dimah Almani

, Tim Muller
, Steven Furnell
:
Distributed Reputation for Accurate Vehicle Misbehavior Reporting (DRAMBR). 174 - Abdul Manan Sheikh

, Md. Rafiqul Islam
, Mohamed Hadi Habaebi
, Suriza Ahmad Zabidi
, Athaur Rahman Bin Najeeb, Adnan Kabbani
:
A Survey on Edge Computing (EC) Security Challenges: Classification, Threats, and Mitigation Strategies. 175 - Hajar Zaidani

, Rim Koulali
, Abderrahim Maizate, Mohamed Ouzzif:
Augmentation and Classification of Requests in Moroccan Dialect to Improve Quality of Public Service: A Comparative Study of Algorithms. 176 - Ilaisaane Falevai, Farkhondeh Hassandoust

:
Enhancing Transplantation Care with eHealth: Benefits, Challenges, and Key Considerations for the Future. 177 - Igor Ljubi, Zdravko Grgic, Marin Vukovic

, Gordan Gledec
:
Detecting Disinformation in Croatian Social Media Comments. 178 - Manuel J. C. S. Reis

, Carlos Serôdio
:
Edge AI for Real-Time Anomaly Detection in Smart Homes. 179 - Adel Alti

, Abderrahim Lakehal:
AI-MDD-UX: Revolutionizing E-Commerce User Experience with Generative AI and Model-Driven Development. 180 - Abhilasha Gautam

, Prabhat Thakur, Ghanshyam Singh
:
Analysis of Universal Decoding Techniques for 6G Ultra-Reliable and Low-Latency Communication Scenario. 181 - Mohammed Salem Atoum, Ala Abdulsalam Alarood

, Eesa Alsolami
, Adamu I. Abubakar, Ahmad K. Al Hwaitat
, Izzat Alsmadi
:
Cybersecurity Intelligence Through Textual Data Analysis: A Framework Using Machine Learning and Terrorism Datasets. 182 - Md Kamrul Siam

, Bilash Saha, Md. Golam Moula Mehedi Hasan, Md. Jobair Hossain Faruk
, Nafisa Anjum
, Sharaban Tahora, Aiasha Siddika, Hossain Shahriar:
Securing Decentralized Ecosystems: A Comprehensive Systematic Review of Blockchain Vulnerabilities, Attacks, and Countermeasures and Mitigation Strategies. 183 - Swarnadeep Bagchi

, Ruairí de Fréin
:
Big-Delay Estimation for Speech Separation in Assisted Living Environments. 184 - Jaewoo Yang

, Hayun Kim
, Junyung Ji, Younghoon Kim
:
Mitigating Quantization Errors Due to Activation Spikes in Gated Linear Unit-Based Large Language Models. 185
Volume 17, Number 5, 2025
- Michael N. Johnstone

, Wencheng Yang
, Mohiuddin Ahmed
:
Using Machine Learning to Detect Vault (Anti-Forensic) Apps. 186 - Raiyen Z. Rakin

, Mahmudur Rahman
, Kanij F. Borsa
, Fahmid Al Farid
, Shakila Rahman
, Jia Uddin
, Hezerul Abdul Karim
:
Towards Safer Cities: AI-Powered Infrastructure Fault Detection Based on YOLOv11. 187 - Raju Anand

, Sathishkumar Samiappan
:
Feature Extraction in 5G Wireless Systems: A Quantum Cat Swarm and Wavelet-Based Approach. 188 - Mingjun Wang, Xuezhi Zhang, Feng Jing, Mei Gao:

Ad-BBR: Enhancing Round-Trip Time Fairness and Transmission Stability in TCP-BBR. 189 - Avnish Kishor Malde

, Vishnunarayan Girishan Prabhu
, Dishant Banga
, Michael Hsieh
, Chaithanya Renduchintala
, Ronald G. Pirrallo
:
A Machine Learning Approach for Predicting Maternal Health Risks in Lower-Middle-Income Countries Using Sparse Data and Vital Signs. 190 - Rosario Giuseppe Garroppo

, Pietro G. Giardina, Giada Landi
, Marco Ruta
:
Trustworthy AI and Federated Learning for Intrusion Detection in 6G-Connected Smart Buildings. 191 - Ivaylo Atanasov, Dragomira Dimitrova, Evelina Pencheva

, Ventsislav G. Trifonov:
Railway Cloud Resource Management as a Service. 192 - Guobin Xu

, Oluwole Adetifa, Jianzhou Mao, Eric Sakk, Shuangbao Wang:
Developing Quantum Trusted Platform Module (QTPM) to Advance IoT Security. 193 - Wanwei Huang

, Huicong Yu, Yingying Li, Xi He, Rui Chen:
BPDM-GCN: Backup Path Design Method Based on Graph Convolutional Neural Network. 194 - Tresna Maulana Fahrudin

, Nobuo Funabiki, Komang Candra Brata
, Inzali Naing
, Soe Thandar Aung
, Amri Muhaimin
, Dwi Arman Prasetya
:
An Improved Reference Paper Collection System Using Web Scraping with Three Enhancements. 195 - Gregor Haywood

, Saleem N. Bhatti
:
Ephemeral Node Identifiers for Enhanced Flow Privacy. 196 - Cristina Regueiro

, Santiago de Diego
, Borja Urkizu
:
Leveraging Blockchain Technology for Secure 5G Offloading Processes. 197 - Negin Jahanbakhsh

, Mario Vega-Barbas
, Iván Pau
, Lucas Elvira-Martín
, Hirad Moosavi, Carolina García Vázquez
:
Leveraging Retrieval-Augmented Generation for Automated Smart Home Orchestration. 198 - Fahmida Wazed Tina

, Nasrin Afsarimanesh, Anindya Nag
, Md Eshrat E. Alahi
:
Integrating AIoT Technologies in Aquaculture: A Systematic Review. 199 - Ioana-Livia Stefan, Andrei Mateescu, Ionut Lentoiu, Silviu Raileanu, Florin Daniel Anton, Dragos Constantin Popescu

, Ioan Stefan Sacala
:
Implementation and Performance Analysis of an Industrial Robot's Vision System Based on Cloud Vision Services. 200 - Hanen Ben Rjeb, Layth Sliman

, Hela Zorgati, Raoudha Ben Djemaa
, Amine Dhraief
:
Optimizing Internet of Things Services Placement in Fog Computing Using Hybrid Recommendation System. 201 - Emiliia Gelóczi

, Felix Klement
, Patrick Struck
, Stefan Katzenbeisser
:
SoK: Delegated Security in the Internet of Things. 202 - Marcello Artioli

, Andrea Borghesi
, Marta Chinnici
, Anna Ciampolini
, Michele Colonna
, Davide De Chiara
, Daniela Loreti
:
C6EnPLS: A High-Performance Computing Job Dataset for the Analysis of Linear Solvers' Power Consumption. 203 - Marta Narigina

, Agris Vindecs
, Dusanka Boskovic
, Yuri Merkuryev, Andrejs Romanovs
:
AI-Powered Stroke Diagnosis System: Methodological Framework and Implementation. 204 - Mohammad Jaminur Islam, Saminur Islam, Md. Mahmud Hossain, Shahid Noor, S. M. Riazul Islam:

Securing Blockchain Systems: A Layer-Oriented Survey of Threats, Vulnerability Taxonomy, and Detection Methods. 205 - Liang Liu

, Weiqing Yu, Zhijun Wu
, Silin Peng:
XGBoost-Based Detection of DDoS Attacks in Named Data Networking. 206 - Theodoros Giannilias, Andreas E. Papadakis

, Nikolaos P. Nikolaou, Theodore B. Zahariadis
:
Classification of Hacker's Posts Based on Zero-Shot, Few-Shot, and Fine-Tuned LLMs in Environments with Constrained Resources. 207 - Jiawei Ye

, Yanting Chen, Aierpanjiang Simayi, Yu Liu
, Zhihui Lu
, Jie Wu:
A Network Traffic Characteristics Reconstruction Method for Mitigating the Impact of Packet Loss in Edge Computing Scenarios. 208 - R. G. Gayathri, Atul Sajjanhar

, Yong Xiang:
Adversarial Training for Mitigating Insider-Driven XAI-Based Backdoor Attacks. 209 - Daniele Marletta

, Alessandro Midolo
, Emiliano Tramontana
:
A Blockchain-Based Strategy for Certifying Timestamps in a Distributed Healthcare Emergency Response Systems. 210 - Hardi Sabah Talabani

, Zrar Kh. Abdul
, Hardi M. Mohammed
:
DNS over HTTPS Tunneling Detection System Based on Selected Features via Ant Colony Optimization. 211 - Pir Noman Ahmad

, Adnan Muhammad Shah, Kangyoon Lee
:
Enhanced Propaganda Detection in Public Social Media Discussions Using a Fine-Tuned Deep Learning Model: A Diffusion of Innovation Perspective. 212 - Zhihao Liu

, Franco Davoli
, Davide Borsatti:
Industrial Internet of Things (IIoT): Trends and Technologies. 213 - Cristian Bua

, Francesco Fiorini
, Michele Pagano
, Davide Adami
, Stefano Giordano
:
Low-Complexity Microclimate Classification in Smart Greenhouses: A Fuzzy-Neural Approach. 214 - Valeriya V. Tynchenko, Ivan P. Malashin

, Sergei Olegovich Kurashkin
, Vadim Tynchenko
, Andrei P. Gantimurov, Vladimir A. Nelyub
, Aleksey S. Borodulin
:
Multi-Criteria Genetic Algorithm for Optimizing Distributed Computing Systems in Neural Network Synthesis. 215 - Jing Li

, Wei Zong
, Yang-Wai Chow
, Willy Susilo
:
Mitigating Class Imbalance in Network Intrusion Detection with Feature-Regularized GANs. 216 - Panagiotis Karampakakis

, Despoina Ioakeimidou
, Periklis Chatzimisios
, Konstantinos A. Tsintotas
:
A Web-Based Application for Smart City Data Analysis and Visualization. 217 - Jiawei Ye

, Ming Yan, Shenglin Wu, Jingxuan Tan, Jie Wu:
U-SCAD: An Unsupervised Method of System Call-Driven Anomaly Detection for Containerized Edge Clouds. 218 - Konstantinos Kalodanis

, Panagiotis Rizomiliotis
, Georgios Feretzakis
, Charalampos Papapavlou
, Dimosthenis Anagnostopoulos:
Correction: Kalodanis et al. High-Risk AI Systems - Lie Detection Application. Future Internet 2025, 17, 26. 219 - Rui Lu, Lei Shi, Yinlong Liu, Zhongkai Dang:

A Novel Crowdsourcing-Assisted 5G Wireless Signal Ranging Technique in MEC Architecture. 220 - Anubhav Kumar

, Rajamani Radhakrishnan, Mani Sumithra, Prabu Kaliyaperumal
, Balamurugan Balusamy
, Francesco Benedetto
:
A Scalable Hybrid Autoencoder-Extreme Learning Machine Framework for Adaptive Intrusion Detection in High-Dimensional Networks. 221 - Raju Sethupatu Bala

, Salaheddin Hosseinzadeh
, Farhad Sadeghineko
, Craig Scott Thomson, Rohinton Emmanuel
:
A Portable Non-Motorized Smart IoT Weather Station Platform for Urban Thermal Comfort Studies. 222 - Bahar Uddin Mahmud

, Guan Y. Hong
, Virinchi Ravindrakumar Lalwani, Nicholas E. Brown, Zachary D. Asher
:
Real-Time Identification of Look-Alike Medical Vials Using Mixed Reality-Enabled Deep Learning. 223 - Tomoroh Takahashi, Gia Khanh Tran

:
Research on Advancing Radio Wave Source Localization Technology Through UAV Path Optimization. 224 - Lingfeng Shen, Jiangtao Nie, Ming Li, Guanghui Wang

, Qiankun Zhang, Xin He
:
Trajectory Optimization for UAV-Aided IoT Secure Communication Against Multiple Eavesdroppers. 225 - Navneet Kaur

, Lav Gupta:
Explainable AI Assisted IoMT Security in Future 6G Networks. 226 - Alexander E. Gegov

, Boriana Vatchova
, Yordanka Boneva
, Alexandar Ichtev:
Heuristic Fuzzy Approach to Traffic Flow Modelling and Control on Urban Networks. 227
Volume 17, Number 6, 2025
- Kvitoslava Obelovska, Andrii Abziatov

, Anastasiya Doroshenko
, Ivanna Dronyuk
, Oleh Liskevych, Rostyslav Liskevych:
Analysis of Digital Skills and Infrastructure in EU Countries Based on DESI 2024 Data. 228 - Francesco Valente

, Francesco Giacinto Lavacca
, Marco Polverini
, Tiziana Fiori
, Vincenzo Eramo
:
Optimization of Ground Station Energy Saving in LEO Satellite Constellations for Earth Observation Applications. 229 - Ali Abdi Seyedkolaei

, Fatemeh Mahmoudi, José García
:
A Deep Learning Approach for Multiclass Attack Classification in IoT and IIoT Networks Using Convolutional Neural Networks. 230 - Zeinab Shahbazi

, Rezvan Jalali, Zahra Shahbazi
:
AI-Driven Framework for Evaluating Climate Misinformation and Data Quality on Social Media. 231 - Funa Fukui, Tomotaka Kimura

, Yutaka Fukuchi, Kouji Hirata
:
Grouping-Based Dynamic Routing, Core, and Spectrum Allocation Method for Avoiding Spectrum Fragmentation and Inter-Core Crosstalk in Multi-Core Fiber Networks. 232 - Mohammed Elhajj

:
Secure and Trustworthy Open Radio Access Network (O-RAN) Optimization: A Zero-Trust and Federated Learning Framework for 6G Networks. 233 - Kazi Fatema

, Samrat Kumar Dey
, Mehrin Anannya, Risala Tasin Khan
, Mohammad Mamunur Rashid
, Chunhua Su, Rashed Mazumder
:
Federated XAI IDS: An Explainable and Safeguarding Privacy Approach to Detect Intrusion Combining Federated Learning and SHAP. 234 - Alexandros Tassios

, Stergios Tegos
, Christos Bouas
, Konstantinos Manousaridis
, Maria Papoutsoglou
, Maria Kaltsa
, Eleni Dimopoulou
, Thanassis Mavropoulos
, Stefanos Vrochidis
, Georgios Meditskos
:
LLM Performance in Low-Resource Languages: Selecting an Optimal Model for Migrant Integration Support in Greek. 235 - José Casca, Prabhat Gupta

, Marco Gomes
, Vítor Silva, Rui Dinis
:
Position Accuracy and Distributed Beamforming Performance in WSNs: A Simulation Study. 236 - Rasendram Muralitharan, Upul Jayasinghe

, Roshan G. Ragel
, Gyu Myoung Lee
:
Machine Learning and Deep Learning-Based Atmospheric Duct Interference Detection and Mitigation in TD-LTE Networks. 237 - Tobias Rødahl Thingnes

, Per Håkon Meland
:
Security Challenges for Users of Extensible Smart Home Hubs: A Systematic Literature Review. 238 - Claudiu Constantin Tcaciuc, Daniele Rege Cambrin

, Paolo Garza
:
Multi Stage Retrieval for Web Search During Crisis. 239 - Fabricio Miguel Moreno-Menéndez

, Victoriano Eusebio Zacarías-Rodríguez, Sara Ricardina Zacarías-Vallejos, Vicente González-Prida
, Pedro Emil Torres-Quillatupa, Hilario Romero-Girón, José Francisco Vía y Rada-Vittes, Luis Ángel Huaynate-Espejo:
Enhancing Customer Quality of Experience Through Omnichannel Digital Strategies: Evidence from a Service Environment in an Emerging Context. 240 - Qi Liu

, Wanjing Ma:
Navigating Data Corruption in Machine Learning: Balancing Quality, Quantity, and Imputation Strategies. 241 - Xiaoying Huang, Jingwei Wang:

Inter-Data Center RDMA: Challenges, Status, and Future Directions. 242 - Xubo Zhang

, Yang Luo
:
Resource Allocation for Federated Learning with Heterogeneous Computing Capability in Cloud-Edge-Client IoT Architecture. 243 - Alberto Moccardi

, Claudia Conte
, Rajib Chandra Ghosh
, Francesco Moscato
:
A Robust Conformal Framework for IoT-Based Predictive Maintenance. 244 - Abid Ali Fareedi

, Stéphane Gagnon
, Ahmad Ghazawneh, Raul Valverde
:
Semantic Fusion of Health Data: Implementing a Federated Virtualized Knowledge Graph Framework Leveraging Ontop System. 245 - Mahmoud Elkhodr:

An AI-Driven Framework for Integrated Security and Privacy in Internet of Things Using Quantum-Resistant Blockchain. 246 - Sangita Baruah, Vaskar Deka

, Dulumani Das
, Utpal Barman, Manob Jyoti Saikia
:
Enhanced Peer-to-Peer Botnet Detection Using Differential Evolution for Optimized Feature Selection. 247 - Tobias Amft, Kalman Graffi

:
A Tale of Many Networks: Splitting and Merging of Chord-like Overlays in Partitioned Networks. 248 - Dimitrios G. Arnaoutoglou

, Tzichat M. Empliouk
, Theodoros N. F. Kaifas, Constantinos L. Zekios
, George A. Kyriacou:
Perspectives and Research Challenges in Wireless Communications Hardware for the Future Internet and Its Applications Services. 249 - Rene Francisco Santana-Cruz

, Martin Moreno-Guzman
, Daniel Aguilar-Torres
, Román Arturo Valverde-Domínguez
, Rubén Vázquez-Medina
:
Signal Preprocessing for Enhanced IoT Device Identification Using Support Vector Machine. 250 - Naveed Ahmed

, Md. Asri Ngadi
, Abdulaleem Ali Almazroi
, Nouf Atiahallah Alghanmi
:
Hybrid Model for Novel Attack Detection Using a Cluster-Based Machine Learning Classification Approach for the Internet of Things (IoT). 251 - Sarama Shehmir

, Rasha F. Kashef
:
LLM4Rec: A Comprehensive Survey on the Integration of Large Language Models in Recommender Systems - Approaches, Applications and Challenges. 252 - Haixu Niu, Yonghai Li, Shuaixin Hou, Tianfei Chen

, Lijun Sun, Mingyang Gu
, Muhammad Irsyad Abdullah:
Topology-Aware Anchor Node Selection Optimization for Enhanced DV-Hop Localization in IoT. 253 - Momotaz Begum

, ABM Kamrul Islam Riad
, Abdullah Al Mamun
, Thofazzol Hossen
, Salah Uddin
, Md. Nurul Absur
, Hossain Shahriar
:
Internet of Things (IoT)-Based Solutions for Uneven Roads and Balanced Vehicle Systems Using YOLOv8. 254 - Bowen Cui, Jianwei Zhang

:
Exact and Approximation Algorithms for Task Offloading with Service Caching and Dependency in Mobile Edge Computing. 255 - Dragos Lazea

, Anca Hangan
, Tudor Cioara
:
Building Equi-Width Histograms on Homomorphically Encrypted Data. 256 - Leandro Antonio Pazmiño Ortiz

, Ivonne Fernanda Maldonado Soliz, Vanessa Katherine Guevara Balarezo
:
Advancing TinyML in IoT: A Holistic System-Level Perspective for Resource-Constrained AI. 257 - Pardis Sadatian Moghaddam, Ali Vaziri

, Sarvenaz Sadat Khatami, Francisco Hernando-Gallego
, Diego Martín
:
Generative Adversarial and Transformer Network Synergy for Robust Intrusion Detection in IoT Environments. 258 - Pilleriin Lillemets

, Nabaa Bashir Jawad, Joseph Kashi, Ahmad Sabah, Nicola Dragoni
:
A Systematic Review of Cyber Range Taxonomies: Trends, Gaps, and a Proposed Taxonomy. 259 - Hui Tian, Haibao Chen, Yuyan Zhao, Jiawei Zhang:

Joint Exploitation of Physical-Layer and Artificial Features for Privacy-Preserving Distributed Source Camera Identification. 260 - Ali M. Baydoun

, Ahmed Sherif Zekri
:
Network-, Cost-, and Renewable-Aware Ant Colony Optimization for Energy-Efficient Virtual Machine Placement in Cloud Datacenters. 261 - Hany F. Atlam

, Yifu Yang
:
Enhancing Healthcare Security: A Unified RBAC and ABAC Risk-Aware Access Control Approach. 262 - Tzung-Her Chen:

A Grover Search-Based Quantum Key Agreement Protocol for Secure Internet of Medical Things Communication. 263 - Yiannis Kiouvrekis

, Katerina Gkirtzou
, Sotiris Zikas
, Dimitris Kalatzis
, Theodor Panagiotakopoulos
, Zoran Lajic, Dimitris Papathanasiou, Ioannis Filippopoulos:
An Explainable Machine Learning Approach for IoT-Supported Shaft Power Estimation and Performance Analysis for Marine Vessels. 264 - Jorge Cisneros-González

, Natalia Gordo-Herrera
, Iván Barcia-Santos
, Javier Sánchez-Soriano
:
JorGPT: Instructor-Aided Grading of Programming Assignments with Large Language Models (LLMs). 265 - Mohammed N. Alenezi

:
Significance of Machine Learning-Driven Algorithms for Effective Discrimination of DDoS Traffic Within IoT Systems. 266 - Sikha Bagui

, Germano Correa Silva De Carvalho, Asmi Mishra, Dustin Mink
, Subhash C. Bagui
, Stephanie Eager:
Detecting Cyber Threats in UWF-ZeekDataFall22 Using K-Means Clustering in the Big Data Environment. 267 - Iftikhar Hussain

, Manuel J. C. S. Reis
, Carlos Serôdio
, Frederico Branco
:
A Bibliometric Analysis and Visualization of In-Vehicle Communication Protocols. 268 - Ivan Cibrario Bertolotti

:
A C-Based Framework for Low-Cost Real-Time Embedded Systems. 269
Volume 17, Number 7, 2025
- Lucas Sakurada

, Fernando De la Prieta
, Paulo Leitao
:
The Role of Multi-Agent Systems in Realizing Asset Administration Shell Type 3. 270 - Xinmin Jin

, Jian Teng
, Jiaji Chen:
IoT-Edge Hybrid Architecture with Cross-Modal Transformer and Federated Manifold Learning for Safety-Critical Gesture Control in Adaptive Mobility Platforms. 271 - Seema G. Aarella

, Venkata P. Yanambaka
, Saraju P. Mohanty
, Elias Kougianos
:
Fortified-Edge 2.0: Advanced Machine-Learning-Driven Framework for Secure PUF-Based Authentication in Collaborative Edge Computing. 272 - Veronica Rodriguez

, Christian Tipantuña
, Diego Javier Reinoso Chisaguano
, Jorge Carvajal-Rodriguez
, Carlos Egas Acosta
, Pablo Proaño, Xavier Hesselbach
:
An Experimental Tethered UAV-Based Communication System with Continuous Power Supply. 273 - George Alex Stelea

, Livia Sângeorzan
, Nicoleta Enache-David
:
Accessible IoT Dashboard Design with AI-Enhanced Descriptions for Visually Impaired Users. 274 - Abdul Manan Sheikh

, Md. Rafiqul Islam
, Mohamed Hadi Habaebi
, Suriza Ahmad Zabidi
, Athaur Rahman Bin Najeeb, Adnan Kabbani
:
Integrating Physical Unclonable Functions with Machine Learning for the Authentication of Edge Devices in IoT Networks. 275 - Bosen Li, Rui Li

, Junhao Wang
, Aihong Song:
Tourism Sentiment Chain Representation Model and Construction from Tourist Reviews. 276 - Hazem Abdel Majid Hatamleh

, As'ad Mahmoud As'ad Alnaser
, Roba Mahmoud Ali Aloglah, Tomader Jamil Bani-Ata
, Awad Mohamed Ramadan, Omar Radhi Aqeel Alzoubi:
Intelligent Transmission Control Scheme for 5G mmWave Networks Employing Hybrid Beamforming. 277 - Qichen Wang, Guozheng Yang, Yongyu Liang

, Chiyu Chen
, Qingsong Zhao, Sugai Chen:
SatScope: A Data-Driven Simulator for Low-Earth-Orbit Satellite Internet. 278 - Ahmad Salehiyan, Pardis Sadatian Moghaddam

, Masoud Kaveh
:
An Optimized Transformer-GAN-AE for Intrusion Detection in Edge and IIoT Systems: Experimental Insights from WUSTL-IIoT-2021, EdgeIIoTset, and TON_IoT Datasets. 279 - Ammar Abdallah

, Alain Abran
, Munthir Qasaimeh, Malik Qasaimeh
, Bashar Abdallah:
Measurement of the Functional Size of Web Analytics Implementation: A COSMIC-Based Case Study Using Machine Learning. 280 - Rodger Lea

, Toni Adame
, Alexandre Berne
, Selma Azaiez
:
The Internet of Things, Fog, and Cloud Continuum: Integration Challenges and Opportunities for Smart Cities. 281 - Theresa May Sobb

, Nour Moustafa
, Benjamin P. Turnbull
:
Responsible Resilience in Cyber-Physical-Social Systems: A New Paradigm for Emergent Cyber Risk Modeling. 282 - Cemile Boztas

, Essam Ghadafi
, Rasha Ibrahim:
Metaverse Architectures: A Comprehensive Systematic Review of Definitions and Frameworks. 283 - Germán Rodríguez-Galán, Eduardo Benavides-Astudillo

, Daniel Nuñez-Agurto
, Pablo Puente-Ponce
, Sonia Cárdenas-Delgado, Mauricio Loachamín-Valencia
:
Strategies and Challenges in Detecting XSS Vulnerabilities Using an Innovative Cookie Collector. 284 - Prabin Dahal

, Saptadi Nugroho
, Claudia Schmidt
, Volker Sänger
:
AI-Based Learning Recommendations: Use in Higher Education. 285 - Matthew Boeding

, Paul Scalise
, Michael Hempel
, Hamid Sharif
, Juan Lopez Jr.
:
Exponential Backoff and Its Security Implications for Safety-Critical OT Protocols over TCP/IP Networks. 286 - Eliana Providel, Marcelo Mendoza

, Mauricio Solar
:
Cross-Lingual Cross-Domain Transfer Learning for Rumor Detection. 287 - Haoming Wang

, Aryan Sharma
, Deepak Mishra
, Aruna Seneviratne, Eliathamby Ambikairajah:
Empirical Investigation on Practical Robustness of Keystroke Recognition Using WiFi Sensing for Future IoT Applications. 288 - Hisham Ali

, William J. Buchanan
, Jawad Ahmad
, Marwan Abubakar
, Muhammad Shahbaz Khan
, Isam Wadhaj:
TrustShare: Secure and Trusted Blockchain Framework for Threat Intelligence Sharing. 289 - Juan Ochoa-Aldeán

, Carlos Silva Cárdenas, Renato Torres, Jorge Ivan Gonzalez, Sergio Fortes
:
Algorithms for Load Balancing in Next-Generation Mobile Networks: A Systematic Literature Review. 290 - Wanwei Huang

, Hongchang Liu, Yingying Li, Linlin Ma:
ERA-MADDPG: An Elastic Routing Algorithm Based on Multi-Agent Deep Deterministic Policy Gradient in SDN. 291 - Santiago Ibañez Caturla

, Juan de Dios Berná Mestre, Óscar Martínez Mozos
:
Towards Automatic Detection of Pneumothorax in Emergency Care with Deep Learning Using Multi-Source Chest X-ray Data. 292 - Talal S. Almuzaini

, Andrey V. Savkin
:
AUV Trajectory Planning for Optimized Sensor Data Collection in Internet of Underwater Things. 293 - Yage Jin, Hongming Chen, Rui Ma, Yanhua Wu, Qingxin Li:

ICRSSD: Identification and Classification for Railway Structured Sensitive Data. 294 - Bruno Ramos-Cruz

, Francisco J. Quesada-Real
, Javier Andréu-Pérez
, Jessica Zaqueros-Martinez
:
FODIT: A Filter-Based Module for Optimizing Data Storage in B5G IoT Environments. 295 - Ashraf Sharifi

, Sara Migliorini
, Davide Quaglia
:
Optimizing Trajectories for Rechargeable Agricultural Robots in Greenhouse Climatic Sensing Using Deep Reinforcement Learning with Proximal Policy Optimization Algorithm. 296 - Nooshin Eghbal

, Paul Lu
:
Lower-Latency Screen Updates over QUIC with Forward Error Correction. 297 - Saud Alharbi, Wasan Awad, David Bell:

HECS4MQTT: A Multi-Layer Security Framework for Lightweight and Robust Encryption in Healthcare IoT Communications. 298 - Ma Viet Duc

, Pham Minh Dang
, Tran Thu Phuong
, Truong Duc Truong
, Hai Vu
, Nguyen Huu Thanh
:
Detecting Emerging DGA Malware in Federated Environments via Variational Autoencoder-Based Clustering and Resource-Aware Client Selection. 299 - Yeqiang Zheng, An Li, Yihu Wen, Gaocai Wang

:
A UAV Trajectory Optimization and Task Offloading Strategy Based on Hybrid Metaheuristic Algorithm in Mobile Edge Computing. 300 - Kenan Honore Robacky Mbongo, Kanwal Ahmed

, Orken Mamyrbayev
, Guanghui Wang
, Fang Zuo, Ainur Akhmediyarova
, Nurzhan Mukazhanov, Assem Ayapbergenova:
Conv1D-GRU-Self Attention: An Efficient Deep Learning Framework for Detecting Intrusions in Wireless Sensor Networks. 301 - Vatsal Mehta, Glenford Mapp

, Vaibhav Gandhi
:
The Investigation of Queuing Models to Calculate Journey Times to Develop an Intelligent Transport System for Smart Cities. 302 - Rokin Maharjan

, Korn Sooksatra
, Tomás Cerný
, Yudeep Rajbhandari
, Sakshi Shrestha:
A Case Study on Monolith to Microservices Decomposition with Variational Autoencoder-Based Graph Neural Network. 303 - Sridhar Varadala, Hao Xu:

A Biologically Inspired Cost-Efficient Zero-Trust Security Approach for Attacker Detection and Classification in Inter-Satellite Communication Networks. 304 - Yudeep Rajbhandari

, Rokin Maharjan
, Sakshi Shrestha, Tomás Cerný
:
Attack Surface Score for Software Systems. 305 - Gabriel Sepúlveda-Cervantes

, Eduardo Vega-Alvarado
, Edgar Alfredo Portilla-Flores
, Eduardo Vivanco-Rodríguez:
Cyber-Physical System and 3D Visualization for a SCADA-Based Drinking Water Supply: A Case Study in the Lerma Basin, Mexico City. 306 - Vidhya Prakash Rajendran

, Deepalakshmi Perumalsamy
, Ponnusamy Chinnasamy
, Ezhil Kalaimannan
:
An Efficient Continuous-Variable Quantum Key Distribution with Parameter Optimization Using Elitist Elk Herd Random Immigrants Optimizer and Adaptive Depthwise Separable Convolutional Neural Network. 307 - Xing Zhang

, Yuexiang Luo, Tianning Li:
A Review of Research on Secure Aggregation for Federated Learning. 308 - Chibuzor Udokwu

, Roxana Voicu-Dorobantu
, Abiodun Afolayan Ogunyemi
, Alex Norta, Nata Sturua, Stefan Craß:
Leveraging Blockchain for Ethical AI: Mitigating Digital Threats and Strengthening Societal Resilience. 309 - Isra Mahmoudi, Djallel Eddine Boubiche

, Samir Athmani, Homero Toral-Cruz
, Freddy I. Chan-Puc:
Toward Generative AI-Based Intrusion Detection Systems for the Internet of Vehicles (IoV). 310 - Mazen Gazzan

, Bader Alobaywi, Mohammed Almutairi
, Frederick T. Sheldon
:
A Deep Learning Framework for Enhanced Detection of Polymorphic Ransomware. 311 - Konstantinos Kalodanis

, Charalampos Papapavlou
, Georgios Feretzakis
:
Enhancing Security in 5G and Future 6G Networks: Machine Learning Approaches for Adaptive Intrusion Detection and Prevention. 312 - Shruti Kulkarni, Alexios Mylonas

, Stilianos Vidalis:
Using the Zero Trust Five-Step Implementation Process with Smart Environments: State-of-the-Art Review and Future Directions. 313 - Béatrix-May Balaban

, Ioan Sacala
, Claudia Alina Petrescu-Nita:
TriagE-NLU: A Natural Language Understanding System for Clinical Triage and Intervention in Multilingual Emergency Dialogues. 314 - Fateme Mazloomi

, Shahram Shah-Heydari
, Khalil El-Khatib:
A Novel Multi-Server Federated Learning Framework in Vehicular Edge Computing. 315 - Manuel Manriquez, Veronica Gil-Costa, Mauricio Marín:

Parallel Agent-Based Framework for Analyzing Urban Agricultural Supply Chains. 316 - Manal Alharthi, Faiza Medjek

, Djamel Djenouri
:
Ensemble Learning Approaches for Multi-Class Intrusion Detection Systems for the Internet of Vehicles (IoV): A Comprehensive Survey. 317 - Jean-Paul A. Yaacoub, Hassan N. Noura

, Ola Salman
, Khaled Chahine
:
Toward Secure Smart Grid Systems: Risks, Threats, Challenges, and Future Directions. 318 - Xinyu Li

, Xiaoying Wang, Guoqing Yang, Jinsha Zhang, Chunhui Li, Fangfang Cui
, Ruize Gu
:
An Improved Approach to DNS Covert Channel Detection Based on DBM-ENSec. 319 - Marilena Ianculescu

, Lidia Bajenaru
, Ana-Mihaela Vasilevschi
, Maria Gheorghe-Moisii
, Cristina-Gabriela Gheorghe
:
Advancing Neurodegenerative Disease Management: Technical, Ethical, and Regulatory Insights from the NeuroPredict Platform. 320
Volume 17, Number 8, 2025
- Chengwei Zhang

, Yun Wang
:
Scalable and Efficient GCL Scheduling for Time-Aware Shaping in Autonomous and Cyber-Physical Systems. 321 - Yaqin Shaheen

, Miguel J. Hornos
, Carlos Rodríguez-Domínguez
:
Privacy Framework for the Development of IoT-Based Systems. 322 - Jian Tang, Zhao Huang, Chunqiang Li:

MT-FBERT: Malicious Traffic Detection Based on Efficient Federated Learning of BERT. 323 - Eugenia Tîrziu

, Ana-Mihaela Vasilevschi
, Adriana Alexandru
, Eleonora Tudora
:
Real-Time Fall Monitoring for Seniors via YOLO and Voice Interaction. 324 - Benjamin Ascoli, Ram Kandikonda

, Jinho D. Choi
:
ETM: Modern Insights into Perspective on Text-to-SQL Evaluation in the Age of Large Language Models. 325 - Ndukwe Ukeje

, Jairo A. Gutiérrez
, Krassie Petrova
, Ugochukwu Chinonso Okolie
:
An Exploratory Factor Analysis Approach on Challenging Factors for Government Cloud Service Adoption Intention. 326 - Dimitris Kastoris, Dimitris Papadopoulos

, Konstantinos C. Giotopoulos
:
Neural Network-Informed Lotka-Volterra Dynamics for Cryptocurrency Market Analysis. 327 - Sikha Bagui

, Mohammad Pale Khan, Chedlyne Valmyr, Subhash C. Bagui
, Dustin Mink
:
Model Retraining upon Concept Drift Detection in Network Traffic Big Data. 328 - Manuel J. C. S. Reis

:
Edge-FLGuard+: A Federated and Lightweight Anomaly Detection Framework for Securing 5G-Enabled IoT in Smart Homes. 329 - Wenqi Shi

, Huiling Shi, Hao Hao
, Qiuyu Guan:
An Efficient Internet-Wide Scan Approach Based on Location Awareness. 330 - Saif Safaa Shakir, Leyli Mohammad Khanli, Hojjat Emami

:
Convolutional Graph Network-Based Feature Extraction to Detect Phishing Attacks. 331 - Georgios Lampropoulos

, Theofylaktos Anastasiadis
, Juan Garzón
:
Augmented Reality and Virtual Reality in Exergaming. 332 - Pin-Chieh Hsieh, Tzu-Lun Fang, Shaobo Jin, Yuyan Wang, Nobuo Funabiki, Yu-Cheng Fan

:
A Verilog Programming Learning Assistant System Focused on Basic Verilog with a Guided Learning Method. 333 - John Byrd, Kritagya Upadhyay

, Samir Poudel
, Himanshu Sharma
, Yi Gu
:
A Blockchain and IoT-Enabled Framework for Ethical and Secure Coffee Supply Chains. 334 - Naglaa E. Ghannam

, Esraa A. Mahareek
:
Privacy-Preserving Federated Unlearning with Ontology-Guided Relevance Modeling for Secure Distributed Systems. 335 - Hassan N. Noura

, Zaid Allal, Ola Salman
, Khaled Chahine
:
Efficient Machine Learning-Based Prediction of Solar Irradiance Using Multi-Site Data. 336 - Konstantinos Tsioutas

, George Xylomenos
, Ioannis Doumanis
:
Impact of Audio Delay and Quality in Network Music Performance. 337 - Zhonghao Zhai

, Junyi Liu, Xinying Liu, Yanqin Mao, Xinjun Zhang, Jialin Ma, Chunhua Jin:
A Lightweight Authentication Method for Industrial Internet of Things Based on Blockchain and Chebyshev Chaotic Maps. 338 - Mohamed Sayed Farghaly

, Heba Kamal Aslan
, Islam Tharwat Abdel-Halim
:
A Hybrid Human-AI Model for Enhanced Automated Vulnerability Scoring in Modern Vehicle Sensor Systems. 339 - Ksenia Kharitonova

, David Pérez-Fernández
, Javier Gutiérrez-Hernando, Asier Gutiérrez-Fandiño
, Zoraida Callejas
, David Griol
:
EsCorpiusBias: The Contextual Annotation and Transformer-Based Detection of Racism and Sexism in Spanish Dialogue. 340 - Amir Raza Khan, Umar Shoaib, Hannan Bin Liaqat:

SARAC4N: Socially and Resource-Aware Caching in Clustered Content-Centric Networks. 341 - Ali Louati

, Hassen Louati, Elham Kariri
:
Harmonized Autonomous-Human Vehicles via Simulation for Emissions Reduction in Riyadh City. 342 - Anja Tanovic

, Ivan Mezei
:
Lightweight Anomaly Detection in Digit Recognition Using Federated Learning. 343 - Abdullah Mohammed Alharthi

, Fahad S. Altuwaijri
, Mohammed Alsaadi, Mourad Elloumi
, Ali A. M. Al-Kubati
:
Cross-Layer Controller Tasking Scheme Using Deep Graph Learning for Edge-Controlled Industrial Internet of Things (IIoT). 344 - Jatinder Pal Singh, Aqsa Aqsa, Imran Ghani, Raj Sonani, Vijay Govindarajan

:
Privacy-Aware Hierarchical Federated Learning in Healthcare: Integrating Differential Privacy and Secure Multi-Party Computation. 345 - Enrique Chavarriaga, Luis A. Rojas, Francy D. Rodríguez

, Katrina Sorbello
, Francisco Jurado
:
RestRho: A JSON-Based Domain-Specific Language for Designing and Developing RESTful APIs to Validate RhoArchitecture. 346 - Roemi Fernández, Eduardo Navas

, Daniel Rodríguez-Nieto
, Alain A. Rodriguez-Gonzalez, Luis Emmi
:
DigiHortiRobot: An AI-Driven Digital Twin Architecture for Hydroponic Greenhouse Horticulture with Dual-Arm Robotic Automation. 347 - Rajganesh Nagarajan

, Vinothiyalakshmi P., Ramkumar Thirunavukarasu
, Arun Pandian J.
:
A Trusted Multi-Cloud Brokerage System for Validating Cloud Services Using Ranking Heuristics. 348 - Sara Beschi

, Daniela Fogli
, Luigi Gargioni
, Angela Locoro
:
AI-Supported EUD for Data Visualization: An Exploratory Case Study. 349 - Dung T. Nguyen

, Trinh Luong Mien
, Minh Tuan Nguyen
, Thang C. Vu, Tao V. Nguyen, Long Q. Dinh, Mui Nguyen
:
Security Issues in IoT-Based Wireless Sensor Networks: Classifications and Solutions. 350 - Daniel Sernández-Iglesias

, Llanos Tobarra
, Rafael Pastor Vargas
, Antonio Robles-Gómez
, Pedro Vidal-Balboa
, João Sarraipa:
Internet of Things Platform for Assessment and Research on Cybersecurity of Smart Rural Environments. 351 - Franco Frattolillo

:
Confidential Smart Contracts and Blockchain to Implement a Watermarking Protocol. 352 - Md. Monjurul Karim

, Sangeen Khan
, Dong Hoang Van
, Xinyue Liu, Chunhui Wang, Qiang Qu
:
Transforming Data Annotation with AI Agents: A Review of Architectures, Reasoning, Applications, and Impact. 353 - Diego Vergara

:
Editorial for the Special Issue "Virtual Reality and Metaverse: Impact on the Digital Transformation of Society - 2nd Edition". 354 - Soundes Oumaima Boufaida

, Abdelmadjid Benmachiche
, Makhlouf Derdour
, Majda Maâtallah
, Moustafa Sadek Kahil
, Mohamed Chahine Ghanem
:
TSA-GRU: A Novel Hybrid Deep Learning Module for Learner Behavior Analytics in MOOCs. 355 - Ivan Cibrario Bertolotti

:
Rethinking Modbus-UDP for Real-Time IIoT Systems. 356 - Simeon Ogunbunmi

, Yu Chen
, Qi Zhao, Deeraj Nagothu, Sixiao Wei, Genshe Chen
, Erik Blasch
:
Interest Flooding Attacks in Named Data Networking and Mitigations: Recent Advances and Challenges. 357 - Alba Miranda

, Aracely M. Vallejo, Paulina Ayala
, Marcelo V. Garcia
, José Ezequiel Naranjo
:
Enhancing Industrial Processes Through Augmented Reality: A Scoping Review. 358 - Vladislav Manolov

, Daniela Gotseva, Nikolay Hinov
:
Creating Automated Microsoft Bicep Application Infrastructure from GitHub in the Azure Cloud. 359 - Albin Uruqi

, Iosif Viktoratos
, Athanasios Tsadiras
:
A Novel Framework Leveraging Large Language Models to Enhance Cold-Start Advertising Systems. 360 - Qing Wang, Zhijun Wu

, Yanrong Lu:
A Multi-Layer Secure Sharing Framework for Aviation Big Data Based on Blockchain. 361 - Valeriy Ivanov

, Maxim Tereshonok
:
Parallel Algorithm for NP-Hard Problem of Channel Resource Allocation Optimization in Ad Hoc and Sensor Networks. 362 - Uwe M. Borghoff

, Paolo Bottoni
, Remo Pareschi
:
Beyond Prompt Chaining: The TB-CSPN Architecture for Agentic AI. 363 - Gabriele Spini

, Stephan Krenn
, Erich Teppan
, Christina Petschnigg
, Elena Wiegelmann:
Enabling Horizontal Collaboration in Logistics Through Secure Multi-Party Computation. 364 - Leandro Antonio Pazmiño Ortiz

, Ivonne Fernanda Maldonado Soliz, Vanessa Katherine Guevara Balarezo
:
The Adaptive Ecosystem of MaaS-Driven Cookie Theft: Dynamics, Anticipatory Analysis Concepts, and Proactive Defenses. 365 - Carmen del Rosario Navas Bonilla, Luis Miguel Viñan Carrasco

, Jhoanna Carolina Gaibor Pupiales, Daniel Eduardo Murillo Noriega:
The Future of Education: A Systematic Literature Review of Self-Directed Learning with AI. 366 - Shengmin Peng, Jialin Tian, Xiangyu Zheng, Shuwu Chen, Zhaogang Shu

:
DDoS Defense Strategy Based on Blockchain and Unsupervised Learning Techniques in SDN. 367 - Caiping Liang, Xiang Li, Wenxu Niu

, Yansong Zhang:
Internet of Things Driven Digital Twin for Intelligent Manufacturing in Shipbuilding Workshops. 368 - Zongliang Xu, Guicai Yu

, Yingcong Luo, Hao Jiang:
An Energy-Efficient Scheme for Waking Co-Channel TDMA in LoRa Networks via the Integration of Bidirectional Timestamp Correction and Address Recognition. 369 - Manan Khatri

, Manmita Sahoo, Sameer Sayyad
, Javed Sayyad
:
Adaptive and User-Friendly Framework for Image Classification with Transfer Learning Models. 370 - Shun Zhang

, Yaohui Xu, Xuebin Zhang, Boyang Cheng, Ke Wang:
Unsupervised Person Re-Identification via Deep Attribute Learning. 371 - Max Hashem Eiza

, Brian Akwirry
, Alessandro Raschellà
, Michael Mackay
, Mukesh Kumar Maheshwari
:
A Hybrid Zero Trust Deployment Model for Securing O-RAN Architecture in 6G Networks. 372 - Yonit Rusho

, Daphne Ruth Raban
, Michal Chalamish
, Vered Pnueli
:
Software Agents as Information-Sharing Enhancers in Security-Sensitive Organizations. 373 - Yaqoob Al-Zuhairi

, Prashanth Kannan, Alberto Bazán Guillén
, Luis J. de la Cruz Llopis
, Mónica Aguilar-Igartua
:
Efficient Charging Station Selection for Minimizing Total Travel Time of Electric Vehicles. 374 - Le-Hang Lim, Lee-Yeng Ong

, Meng Chew Leow
:
Federated Learning for Anomaly Detection: A Systematic Review on Scalability, Adaptability, and Benchmarking Framework. 375 - Rute Bastardo, João Pavão, Ana Isabel Martins

, Anabela G. Silva
, Nelson Pacheco da Rocha
:
Patient-Oriented Smart Applications to Support the Diagnosis, Rehabilitation, and Care of Patients with Parkinson's: An Umbrella Review. 376 - Yichuan Wang

, Jiazhao Han, Xi Deng, Xinhong Hei
:
A High-Acceptance-Rate VxWorks Fuzzing Framework Based on Protocol Feature Fusion and Memory Extraction. 377 - Yijie Lin, Chia-Chen Lin, Zhe-Min Yeh, Ching-Chun Chang, Chin-Chen Chang:

A High-Capacity Reversible Data Hiding Scheme for Encrypted Hyperspectral Images Using Multi-Layer MSB Block Labeling and ERLE Compression. 378
Volume 17, Number 9, 2025
- Jung-Shan Lin, Yen-Che Hsiao, Jeih-Weih Hung

:
Design and Implementation of an Autonomous Mobile Robot for Object Delivery via Homography-Based Visual Servoing. 379 - Kalsoom Panhwar

, Bushra Naz Soomro, Sania Bhatti
, Fawwad Hassan Jaskani:
Novel Encoder-Decoder Architecture with Attention Mechanisms for Satellite-Based Environmental Forecasting in Smart City Applications. 380 - Juan Carlos González-Quesada

, José Ramón Trillo
, Carlos Porcel
, Ignacio Javier Pérez
, Francisco Javier Cabrerizo
:
Modelling Large-Scale Group Decision-Making Through Grouping with Large Language Models. 381 - Fatima Bendaouch

, Hayat Zaydi, Safae Merzouk, Saliha Assoul:
Benchmarking IoT Simulation Frameworks for Edge-Fog-Cloud Architectures: A Comparative and Experimental Study. 382 - Saipunidzam Mahamad

, Yi Han Chin, Nur Izzah Nasuha Zulmuksah, Md Mominul Haque
, Muhammad Shaheen
, Kanwal Nisar:
Technical Review: Architecting an AI-Driven Decision Support System for Enhanced Online Learning and Assessment. 383 - Yong Li

, Zhongcheng Wu, Jinwei Li
, Liyang Xie:
A Multi-Scene Automatic Classification and Grading Method for Structured Sensitive Data Based on Privacy Preferences. 384 - Rahanatu Suleiman, Akshita Maradapu Vera Venkata Sai, Wei Yu, Chenyu Wang

:
Blockchain for Security in Digital Twins. 385 - Srinivasini Sasitharasarma

, Noor H. S. Alani
, Zazli Lily Wisker
:
Is the Healthcare Industry Ready for Digital Twins? Examining the Opportunities and Challenges. 386 - Chandan Kumar

, Pathan Shaheen Khan, Medandrao Srinivas, Sudhanshu Kumar Jha, Shiv Prakash
, Rajkumar Singh Rathore
:
Ensemble Learning for Software Requirement-Risk Assessment: A Comparative Study of Bagging and Boosting Approaches. 387 - Nasih Abdulkarim Muhammed, Bakhtiar Ibrahim Saeed

:
Design and Implementation of a Scalable LoRaWAN-Based Air Quality Monitoring Infrastructure for the Kurdistan Region of Iraq. 388 - Eman Yasser Daraghmi, Lour Atwe, Areej Jaber

:
A Comparative Study of PEGASUS, BART, and T5 for Text Summarization Across Diverse Datasets. 389 - Mauro Iacono

, Michele Mastroianni
, Christian Riccio
, Bruna Viscardi:
A Framework for Data Lifecycle Model Selection. 390 - Vishwas Chakranarayan

, Fadheela Hussain, Fayzeh Abdulkareem Jaber
, Redha J. Shaker, Ali Rizwan
:
Safeguarding Brand and Platform Credibility Through AI-Based Multi-Model Fake Profile Detection. 391 - Manuel Jesús-Azabal

, Meichun Zheng
, Vasco N. G. J. Soares
:
Hybrid B5G-DTN Architecture with Federated Learning for Contextual Communication Offloading. 392 - Shi Kuang, Jinyu Zheng, Shilin Liang, Yingying Li, Siyuan Liang, Wanwei Huang

:
RS-MADDPG: Routing Strategy Based on Multi-Agent Deep Deterministic Policy Gradient for Differentiated QoS Services. 393 - Akashdeep Bhardwaj

, Luxmi Sapra
, Shawon S. M. Rahman
:
Elasticsearch-Based Threat Hunting to Detect Privilege Escalation Using Registry Modification and Process Injection Attacks. 394 - Diana Macedo

, Miguel Loureiro
, Óscar Martins, Joana Sousa
, David Belo
, Marco Gomes
:
From CSI to Coordinates: An IoT-Driven Testbed for Individual Indoor Localization. 395 - ABM Kamrul Islam Riad

, Abdul Barek
, Hossain Shahriar
, Guillermo Francia
, Sheikh Iqbal Ahamed
:
Reinforcement Learning in Medical Imaging: Taxonomy, LLMs, and Clinical Challenges. 396 - Aura Cristina Udrea

, Stefan Ruseti
, Vlad Pojoga
, Stefan Baghiu
, Andrei Terian
, Mihai Dascalu
:
Identifying Literary Microgenres and Writing Style Differences in Romanian Novels with ReaderBench and Large Language Models. 397 - Zhenfei Wang, Jianxun Feng

, Longxiang Dun, Ziliang Bao, Chunfeng Du:
SwiftKV: A Metadata Indexing Scheme Integrating LSM-Tree and Learned Index for Distributed KV Stores. 398 - Olivier Markowitch

, Jean-Michel Dricot
:
IoT Security: Threat Detection, Analysis, and Defense. 399 - Peter Orosz

, Balázs Nagy
, Pál Varga:
Real-Time Detection and Mitigation Strategies Newly Appearing for DDoS Profiles. 400 - Takumi Sakamoto, Tomotaka Kimura

, Kouji Hirata
:
UAV Deployment Design Under Incomplete Information with a Connectivity Constraint for UAV-Assisted Networks. 401 - Krishnapriya V. Shaji, Srilakshmi S. Rethy, Simi Surendran

, Livya George, Namita Suresh, Hrishika Dayan:
Dynamic Resource Management in 5G-Enabled Smart Elderly Care Using Deep Reinforcement Learning. 402 - Ran Xin, Yapeng Wang

, Xiaohong Huang, Xu Yang, Sio Kei Im:
Cell-Sequence-Based Covert Signal for Tor De-Anonymization Attacks. 403 - Ajay Bandi

, Bhavani Kongari, Roshini Naguru, Sahitya Pasnoor, Sri Vidya Vilipala:
The Rise of Agentic AI: A Review of Definitions, Frameworks, Architectures, Applications, Evaluation Metrics, and Challenges. 404 - Radwa Ahmed Osman

:
1D-CNN-Based Performance Prediction in IRS-Enabled IoT Networks for 6G Autonomous Vehicle Applications. 405 - Junxia Ma

, Zixu Yang, Ming Chen:
3D Spatial Path Planning Based on Improved Particle Swarm Optimization. 406 - Loukas Triantafyllopoulos

, Dimitris Kalles
:
From Divergence to Alignment: Evaluating the Role of Large Language Models in Facilitating Agreement Through Adaptive Strategies. 407 - Theodore Andronikos

, Constantinos Bitsakos
, Konstantinos Nikas
, Georgios I. Goumas
, Nectarios Koziris
:
A GHZ-Based Protocol for the Dining Information Brokers Problem. 408 - Abin Kumbalapalliyil Tom

, Ansam Khraisat
, Tony Jan
, Md Whaiduzzaman
, Thien D. Nguyen
, Ammar Alazab
:
Survey of Federated Learning for Cyber Threat Intelligence in Industrial IoT: Techniques, Applications and Deployment Models. 409 - Waqas ur Rahman

:
Fuzzy-Based MEC-Assisted Video Adaptation Framework for HTTP Adaptive Streaming. 410 - Yu-Yong Luo, Yu-Hsun Chiu, Chia-Hsin Cheng

:
Detection and Mitigation in IoT Ecosystems Using oneM2M Architecture and Edge-Based Machine Learning. 411 - Nuno Fachada

, Daniel Fernandes
, Carlos M. Fernandes
, Bruno D. Ferreira-Saraiva
, João Pedro Matos-Carvalho
:
GPT-4.1 Sets the Standard in Automated Experiment Design Using Novel Python Libraries. 412 - Atomu Nakamura, Homari Matsumoto, Koharu Chiba, Shun Nishide

:
Improved Generation of Drawing Sequences Using Variational and Skip-Connected Deep Networks for a Drawing Support System. 413 - Hui-Hung Yu, Wei-Tsun Lin, Chih-Wei Kuan, Chao-Chi Yang

, Kuan-Min Liao:
GraphRAG-Enhanced Dialogue Engine for Domain-Specific Question Answering: A Case Study on the Civil IoT Taiwan Platform. 414 - Gayathri Karthick

, Glenford Mapp
, Jon Crowcroft
:
Toward Secure SDN Infrastructure in Smart Cities: Kafka-Enabled Machine Learning Framework for Anomaly Detection. 415 - Niklas Beuter

, André Drews, Nane Kratzke
:
Prompt-Driven and Kubernetes Error Report-Aware Container Orchestration. 416 - Sebastián A. Cajas Ordóñez, Jaydeep Samanta

, Andrés L. Suárez-Cetrulo
, Ricardo Simon Carbajo:
Intelligent Edge Computing and Machine Learning: A Survey of Optimization and Applications. 417 - Alessandro Midolo

, Emiliano Tramontana
:
Refactoring Loops in the Era of LLMs: A Comprehensive Study. 418 - Qian Qu, Yu Chen

, Erik Blasch
:
SAVE: Securing Avatars in Virtual Healthcare Through Environmental Fingerprinting for Elder Safety Monitoring. 419 - Mohammed Hawa

, Ramzi R. Saifan
, Talal A. Edwan
, Oswa M. Amro
:
Dynamic Channel Selection for Rendezvous in Cognitive Radio Networks. 420 - Nophea Sasaki

, Issei Abe
:
A Digital Twin Architecture for Forest Restoration: Integrating AI, IoT, and Blockchain for Smart Ecosystem Management. 421 - Rares-Mihail Visalom

, Maria-Elena Mihailescu
, Razvan Rughinis
, Dinu Turcanu
:
Intercepting and Monitoring Potentially Malicious Payloads with Web Honeypots. 422 - Jiajie Ren

, Chang Guo
:
A Game Theoretic Approach for D2D Assisted Uncoded Caching in IoT Networks. 423 - Olusola Tolulope Odeyomi

, Temitayo O. Olowu
:
Special Issue: Intrusion Detection and Resiliency in Cyber-Physical Systems and Networks. 424 - Nikolaos S. Korakianitis

, Panagiotis Papageorgas
, Georgios A. Vokas
, Dimitrios D. Piromalis
, Stavros D. Kaminaris, George Ch. Ioannidis, Ander Ochoa de Zuazola:
Design and Evaluation of a Research-Oriented Open-Source Platform for Smart Grid Metering: A Comprehensive Review and Experimental Intercomparison of Smart Meter Technologies. 425 - Ahmed Twabi

, Yepeng Ding
, Tohru Kondo
:
A Platform-Agnostic Publish-Subscribe Architecture with Dynamic Optimization. 426 - Tahani Ali Hakami

, Yasser M. Alginahi
, Omar Sabri
:
Exploring the Evolution of Big Data Technologies: A Systematic Literature Review of Trends, Challenges, and Future Directions. 427 - Hong Jia, Dalin Qian, Fanghua Chen

, Wei Zhou:
Collaborative Fusion Attention Mechanism for Vehicle Fault Prediction. 428 - Carlos Gómez-Pantoja

, Daniela Baeza-Rocha, Alonso Inostrosa-Psijas
:
A Behavior-Aware Caching Architecture for Web Applications Using Static, Dynamic, and Burst Segmentation. 429 - Andrés Fernández-Miguel

, Fernando García-Muiña
, Susana Ortíz-Marcos
, Mariano Jiménez-Calzado
, Alfonso P. Fernández del Hoyo
, Davide Settembre-Blundo
:
AI-Driven Transformations in Manufacturing: Bridging Industry 4.0, 5.0, and 6.0 in Sustainable Value Chains. 430 - Muhammad Adam

, Jianchao Song, Wei Yu, Qingqing Li:
Deep Learning Approaches for Automatic Livestock Detection in UAV Imagery: State-of-the-Art and Future Directions. 431
Volume 17, Number 10, 2025
- Andy Reed

, Laurence S. Dooley, Soraya Kouadri Mostéfaoui:
Minimal Overhead Modelling of Slow DoS Attack Detection for Resource-Constrained IoT Networks. 432 - Ahmed Hamdi, Hassan N. Noura

, Joseph Azar
:
Deep Learning-Based Approach to Automated Monitoring of Defects and Soiling on Solar Panels. 433 - Apostolos Angelis

, George Kousiouris
:
An Overview on the Landscape of Self-Adaptive Cloud Design and Operation Patterns: Goals, Strategies, Tooling, Evaluation, and Dataset Perspectives. 434 - Repede Stefan Emil

, Remus Brad
:
A Review of Automatic Fake News Detection: From Traditional Methods to Large Language Models. 435 - Luis-Dagoberto Gurrola-Mijares

, José Manuel Mejía Muñoz, Oliverio Cruz-Mejia
, Abraham-Leonel López-León
, Leticia Ortega Máynez
:
Evaluation Study of Pavement Condition Using Digital Twins and Deep Learning on IMU Signals. 436 - Henrique C. Ferreira, Ramiro S. Barbosa

:
Deep Reinforcement Learning for Adaptive Robotic Grasping and Post-Grasp Manipulation in Simulated Dynamic Environments. 437 - Liang Wu, Xiang Li

, Ping Ma, Yicheng Cai:
Research on a Dense Pedestrian-Detection Algorithm Based on an Improved YOLO11. 438 - Ashwaq Almalki, Safa Alsafari

, Noura M. Alotaibi:
Legal Judgment Prediction in the Saudi Arabian Commercial Court. 439 - Jingshi Qian

, Nobuyoshi Komuro
, Won-Suk Kim
, Younghwan Yoo
:
Enhanced Position Estimation via RSSI Offset Correction in BLE Fingerprinting-Based Indoor Positioning. 440 - Vasileios Charilogis, Ioannis G. Tsoulos

:
Healing Intelligence: A Bio-Inspired Metaheuristic Optimization Method Using Recovery Dynamics. 441 - Olha Kozina

, José Machado
, Maksym Volk
, Hennadii Heiko
, Volodymyr I. Panchenko
, Mykyta Kozin
, Maryna Ivanova
:
Opportunities for Adapting Data Write Latency in Geo-Distributed Replicas of Multicloud Systems. 442 - Apostolos Panagiotopoulos

, Vasileios Karyotis
:
Commercial Off-the-Shelf IoT-Based Infant Car Seat Application for Preventing the Forgotten Baby Syndrome. 443 - Abeer S. Al-Humaimeedy

:
Intellectual Property Protection Through Blockchain: Introducing the Novel SmartRegistry-IP for Secure Digital Ownership. 444 - Tomás Bernal-Beltrán

, Mario Andrés Paredes-Valverde
, María del Pilar Salas-Zárate
, José Antonio García-Díaz
, Rafael Valencia-García
:
Sentiment Analysis in Mexican Spanish: A Comparison Between Fine-Tuning and In-Context Learning with Large Language Models. 445 - Sanjay Segu Nagesh, Niroshinie Fernando

, Seng W. Loke
, Azadeh Ghari Neiat
, Pubudu N. Pathirana:
A Dependency-Aware Task Stealing Framework for Mobile Crowd Computing. 446 - Chathura Jayawardena

, Georgios Ntavazlis Katsaros, Konstantinos Nikitopoulos:
NL-COMM: Enabling High-Performing Next-Generation Networks via Advanced Non-Linear Processing. 447 - Maruf Farhan

, Usman Butt
, Rejwan Bin Sulaiman
, Mansour Naser Alraja
:
Self-Sovereign Identities and Content Provenance: VeriTrust - A Blockchain-Based Framework for Fake News Detection. 448 - Dalal Al Faia

, Khalid Alomar:
Evaluating Learning Success, Engagement, and Usability of Moalemy: An Arabic Rule-Based Chatbot. 449 - Mostafa Kira

, Zeyad Alajamy
, Ahmed Soliman
, Yusuf Mesbah
, Manuel Mazzara
:
Trustworthy Face Recognition as a Service: A Multi-Layered Approach for Mitigating Spoofing and Ensuring System Integrity. 450 - Eugenia Skepetari

, Sotiris Pelekis
, Hercules Koutalidis
, Alexandros Menelaos Tzortzis
, Georgios Kormpakis
, Christos Ntanos
, Dimitris Askounis
:
TwinP2G: A Software Application for Optimal Power-to-Gas Planning. 451 - Xu Zhu

, Litian Kang, Ming Zhao
:
Robust Optimization for IRS-Assisted SAGIN Under Channel Uncertainty. 452 - Abbirah Ahmed, Martin J. Hayes, Arash Joorabchi

:
Assessing Student Engagement: A Machine Learning Approach to Qualitative Analysis of Institutional Effectiveness. 453 - Jiajie Dong

, Yong Wang, Qingsong Zhao, Ruiqian Ma, Jiaxiong Yang:
Enhancing Two-Step Random Access in LEO Satellite Internet an Attack-Aware Adaptive Backoff Indicator (AA-BI). 454 - Andrés Fernández-Miguel

, Susana Ortíz-Marcos, Mariano Jiménez-Calzado
, Alfonso P. Fernández del Hoyo
, Fernando García-Muiña
, Davide Settembre-Blundo
:
Toward the Theoretical Foundations of Industry 6.0: A Framework for AI-Driven Decentralized Manufacturing Control. 455 - Chaoqun Guo

, Xihan Li
, Jubao Cheng
, Shunjie Yang
, Huiquan Gong
:
Continual Learning for Intrusion Detection Under Evolving Network Threats. 456 - Manuel J. C. S. Reis

, Frederico Branco
, Nishu Gupta
, Carlos Serôdio
:
An IoT Architecture for Sustainable Urban Mobility: Towards Energy-Aware and Low-Emission Smart Cities. 457 - Kuo-Yu Tsai, Ying-Hsuan Yang:

Lattice-Based Identity Authentication Protocol with Enhanced Privacy and Scalability for Vehicular Ad Hoc Networks. 458 - Min Li

, Yuansong Qiao
, Brian Lee
:
Adversarial Robustness Evaluation for Multi-View Deep Learning Cybersecurity Anomaly Detection. 459 - Konstantinos Panagiotis Fourkiotis

, Athanasios Tsadiras
:
Future Internet Applications in Healthcare: Big Data-Driven Fraud Detection with Machine Learning. 460 - Nikzad Chizari

, Keywan Tajfar
, María N. Moreno García
:
Measuring Inter-Bias Effects and Fairness-Accuracy Trade-Offs in GNN-Based Recommender Systems. 461 - Svetlana P. Moiseeva

, Evgeny Polin
, Alexander N. Moiseev
, János Sztrik
:
Performance Modeling of Cloud Systems by an Infinite-Server Queue Operating in Rarely Changing Random Environment. 462 - Ioannis Fragkiadakis

, Stefanos Gritzalis
, Costas Lambrinoudakis
:
Quantifying Website Privacy Posture Through Technical and Policy-Based Assessment. 463 - Muhammad Omer Farooq

:
Adaptive Cyber Defense Through Hybrid Learning: From Specialization to Generalization. 464 - Rodrigo de A. P. Andrade

, Helder Eiki Oshiro
, Gabriel Augusto Ginja, Eduardo Colombari, Maria Celeste Dias, José A. Afonso
, João Paulo Pereira do Carmo:
OptoBrain: A Wireless Sensory Interface for Optogenetics. 465 - Sagir Muhammad Ahmad

, Mohammad Samie
, Barmak Honarvar Shakibaei Asli
:
Building Trust in Autonomous Aerial Systems: A Review of Hardware-Rooted Trust Mechanisms. 466 - Efthimia Mavridou, Eleni Vrochidou

, Michail Selvesakis
, George A. Papakostas
:
Beyond Accuracy: Benchmarking Machine Learning Models for Efficient and Sustainable SaaS Decision Support. 467 - Ádám Francuz, Tamás Bányai

:
Intelligent Control Approaches for Warehouse Performance Optimisation in Industry 4.0 Using Machine Learning. 468 - Adriano N. Raposo

, Vasco N. G. J. Soares
:
Modular Microservices Architecture for Generative Music Integration in Digital Audio Workstations via VST Plugin. 469 - Stanislaw Drozdz

, Robert Kluszczynski
, Jaroslaw Kwapien
, Marcin Watorek
:
Multifractality and Its Sources in the Digital Currency Market. 470 - Sameer Mushtaq

, Marcello Trovati
, Nik Bessis
:
Explainable AI-Based Semantic Retrieval from an Expert-Curated Oncology Knowledge Graph for Clinical Decision Support. 471 - Mani Rajendran, Dharminder Chaudhary, S. A. Lakshmanan

, Cheng-Chi Lee
:
Security Analysis and Designing Advanced Two-Party Lattice-Based Authenticated Key Establishment and Key Transport Protocols for Mobile Communication. 472 - Abdelhamied A. Ateya

, Nguyen Duc Tu
, Ammar Muthanna
, Andrey Koucheryavy, Dmitry Kozyrev
, János Sztrik
:
QL-AODV: Q-Learning-Enhanced Multi-Path Routing Protocol for 6G-Enabled Autonomous Aerial Vehicle Networks. 473 - Nassim Aich

, Zakarya Oubrahim, Hachem Ait Talount
, Ahmed Abbou:
Bi-Scale Mahalanobis Detection for Reactive Jamming in UAV OFDM Links. 474 - Mohammed Asiri

, Maher Ali Khamakhem
, Reemah M. Alhebshi
, Bassma S. Alsulami, Fathy E. Eassa
:
Decentralized Federated Learning for IoT Malware Detection at the Multi-Access Edge: A Two-Tier, Privacy-Preserving Design. 475 - Yanet Sáez Iznaga

, Luís Rato
, Pedro D. Salgueiro
, Javier Lamar-León
:
Integrating Large Language Models into Automated Software Testing. 476 - Bahrad A. Sokhansanj

:
Uncensored AI in the Wild: Tracking Publicly Available and Locally Deployable LLMs. 477 - Carmen Ionela Rotuna, Ioan Stefan Sacala

, Adriana Alexandru
:
Towards Proactive Domain Name Security: An Adaptive System for .ro domains Reputation Analysis. 478 - Jing Wu, Yaoyi Cai

:
The Paradox of AI Knowledge: A Blockchain-Based Approach to Decentralized Governance in Chinese New Media Industry. 479 - Thananont Chevaphatrakul

, Han Wang
, Sukhpal Singh Gill
:
MambaNet0: Mamba-Based Sustainable Cloud Resource Prediction Framework Towards Net Zero Goals. 480 - Mahran Morsidi, Sharul Tajuddin, S. H. Shah Newaz

, Ravi Kumar Patchmuthu, Gyu Myoung Lee
:
A Review on Blockchain Sharding for Improving Scalability. 481
Volume 17, Number 11, 2025
- Justin Li Ting Lau, Ying Han Pang, Charilaos Zarakovitis, Heng Siong Lim, Dionysis Skordoulis, Shih Yin Ooi

, Kah-Yoong Chan
, Wai Leong Pang
:
BiTAD: An Interpretable Temporal Anomaly Detector for 5G Networks with TwinLens Explainability. 482 - Yan Guo, Lan Wei, Cunqun Fan, You Ma, Xiangang Zhao, Henghong He:

Joint Optimization of Container Resource Defragmentation and Task Scheduling in Queueing Cloud Computing: A DRL-Based Approach. 483 - Shi Kuang, Moshu Niu, Sunan Wang, Haoran Li, Siyuan Liang, Rui Chen:

SFC-GS: A Multi-Objective Optimization Service Function Chain Scheduling Algorithm Based on Matching Game. 484 - Jacinta Fue, Jairo A. Gutiérrez

, Yezid Donoso
:
Understanding Security Vulnerabilities in Private 5G Networks: Insights from a Literature Review. 485 - Yingduo Tong, Zhenyu Lu

, Yize Dong, Yonggang Lu
:
Class-Level Feature Disentanglement for Multi-Label Image Classification. 486 - Francisco Cordoba Otalora

, Marinos Themistocleous
:
Beyond the Polls: Quantifying Early Signals in Decentralized Prediction Markets with Cross-Correlation and Dynamic Time Warping. 487 - Vasileios Charilogis, Ioannis G. Tsoulos

, Anna Maria Gianni:
TRIDENT-DE: Triple-Operator Differential Evolution with Adaptive Restarts and Greedy Refinement. 488 - Yao-Liang Chung

:
Efficient Lightweight Image Classification via Coordinate Attention and Channel Pruning for Resource-Constrained Systems. 489 - Xinyun Liu

, Ronghua Xu
:
BIMW: Blockchain-Enabled Innocuous Model Watermarking for Secure Ownership Verification. 490 - Wolfram Luther

, Ekaterina Auer
:
Towards Fair Medical Risk Prediction Software. 491 - Laila AlTerkawi

, Mokhled Altarawneh
:
Federated Decision Transformers for Scalable Reinforcement Learning in Smart City IoT Systems. 492 - Saleh Alharbi

:
QuantumTrust-FedChain: A Blockchain-Aware Quantum-Tuned Federated Learning System for Cyber-Resilient Industrial IoT in 6G. 493 - Shahd Thabet, Abdelhamied A. Ateya

, Mohammed Ahmed El-Affendi, Mohammed Abo-Zahhad
:
MEC and SDN Enabling Technologies, Design Challenges, and Future Directions of Tactile Internet and Immersive Communications. 494 - Muhammad Asif Munir, Reehan Ali Shah, Urooj Waheed, Muhammad Aqeel Aslam, Zeeshan Rashid, Mohammed Aman, Muhammad I. Masud, Zeeshan Ahmad Arfeen:

Sparse Regularized Autoencoders-Based Radiomics Data Augmentation for Improved EGFR Mutation Prediction in NSCLC. 495 - Lamis Al-Qora'n

, Amro Al-Said Ahmad
:
Modular Monolith Architecture in Cloud Environments: A Systematic Literature Review. 496 - Ivan Radosavljevic

, Petar D. Bojovic
, Zivko Bojovic
:
RL-Based Resource Allocation in SDN-Enabled 6G Networks. 497 - Anjana Babu Sujatha

, Vinoth Babu Kumaravelu
:
Hybrid GOMP-ROMP Algorithm for Sparse Channel Estimation in mmWave MIMO: Enhancing Convergence and Reducing Computational Complexity. 498 - Zhenghao Qian

, Fengzheng Liu
, Mingdong He
, Bo Li
, Xuewu Li
, Chuangye Zhao, Gehua Fu, Yifan Hu:
A Three-Party Evolutionary Game Model and Stability Analysis for Network Defense Strategy Selection. 499 - Francesco Fiorini

, Rosario Giuseppe Garroppo
, Michele Pagano
, Rostyslav Schiavini Yadzhak:
Eavesdropper Detection in Six-State Protocol Against Partial Intercept-Resend Attack. 500 - Xuejun Tian, Jiadu Ke, Weiguo Wu, Jian Teng

:
Design of a Pill-Sorting and Pill-Grasping Robot System Based on Machine Vision. 501 - Ionut Muraretu

, Alexandra Vultureanu-Albisi
, Sorin Ilie
, Costin Badica
:
ABMS-Driven Reinforcement Learning for Dynamic Resource Allocation in Mass Casualty Incidents. 502 - Travis Quinn

, Faycal Bouhafs
, Frank T. H. den Hartog:
Securing the SDN Data Plane in Emerging Technology Domains: A Review. 503 - Angela Locoro

, Luigi Lavazza
:
Modeling Interaction Patterns in Visualizations with Eye-Tracking: A Characterization of Reading and Information Styles. 504 - Jian Li

, Chuntao Zheng, Ziyao Chen:
Resilient Federated Learning for Vehicular Networks: A Digital Twin and Blockchain-Empowered Approach. 505 - Mina Soltani Siapoush

, Jim Alves-Foss
:
Zero-Copy Messaging: Low-Latency Inter-Task Communication in CHERI-Enabled RTOS. 506 - Giuseppe Bisicchia

, Giuseppe Clemente
, José García-Alonso
, Juan Manuel Murillo, Massimo D'Elia
, Antonio Brogi
:
Distributing Quantum Computations, Shot-Wise. 507 - Elmin Marevac

, Esad Kadusic
, Natasa Zivic
, Dzenan Hamzic, Narcisa Hadzajlic:
Data-Driven Predictive Analytics for Dynamic Aviation Systems: Optimising Fleet Maintenance and Flight Operations Through Machine Learning. 508 - Seounghoon Byun

, Seok-Pil Lee
:
Frame and Utterance Emotional Alignment for Speech Emotion Recognition. 509 - Otilia Elena Dragomir

, Florin Dragomir
:
AI-Based Proactive Maintenance for Cultural Heritage Conservation: A Hybrid Neuro-Fuzzy Approach. 510 - Leena Mohammad Alzamil, Alawiayyah Mohammed Alhasani, Suhair Alshehri

:
Privacy Concerns in ChatGPT Data Collection and Its Impact on Individuals. 511 - Manel Mrabet

:
TrustFed-CTI: A Trust-Aware Federated Learning Framework for Privacy-Preserving Cyber Threat Intelligence Sharing Across Distributed Organizations. 512 - Yas Barzegar

, Atrin Barzegar, Francesco Bellini
, Fabrizio D'Ascenzo
, Irina Gorelova
, Patrizio Pisani:
Machine Learning Pipeline for Early Diabetes Detection: A Comparative Study with Explainable AI. 513 - Vitalii Beschastnyi

, Uliana Morozova
, Egor Machnev
, Darya Y. Ostrikova
, Yuliya Gaidamaka
, Konstantin E. Samouylov
:
Dynamic Topology Reconfiguration for Energy-Efficient Operation in 5G NR IAB Systems. 514 - Alexandru-Raul Matecas, Peter Kieseberg

, Simon Tjoa
:
Social Engineering with AI. 515 - Sridhar Varadala, Hao Xu:

A Blockchain-Enabled Decentralized Zero-Trust Architecture for Anomaly Detection in Satellite Networks via Post-Quantum Cryptography and Federated Learning. 516 - Viktor Matanski

, Anton I. Iliev
, Nikolay Kyurkchiev
, Todorka Terzieva
:
Ontology-Driven Multi-Agent System for Cross-Domain Art Translation. 517 - Hrant Khachatrian

, Aram Dovlatyan, Greta Grigoryan, Theofanis P. Raptis
:
Scalable Generation of Synthetic IoT Network Datasets: A Case Study with Cooja. 518 - Zile Xiang

, Thomas G. Robertazzi
:
A DLT-Aware Performance Evaluation Framework for Virtual-Core Speedup Modeling. 519 - Rahul Mishra

, Sudhanshu Kumar Jha, Shiv Prakash
, Rajkumar Singh Rathore
:
HEXADWSN: Explainable Ensemble Framework for Robust and Energy-Efficient Anomaly Detection in WSNs. 520 - Yuya Sugimoto

, Gia Khanh Tran
:
Hybrid Sensor Fusion Beamforming for UAV mmWave Communication. 521 - Samuele Rasetto, Giorgia Marullo

, Ludovica Adamo, Federico Bordin, Francesca Pavesi
, Chiara Innocente
, Enrico Vezzetti, Luca Ulrich
:
ReHAb Playground: A DL-Based Framework for Game-Based Hand Rehabilitation. 522 - Xavier Calle Heredia

, Xavier Hesselbach
:
Performance Evaluation Methodology for Federated XR Network Digital Twins in AI-Aware 6G Networks. 523 - Sergio Alloza-García, Iván García-Magariño

, Raquel Lacuesta Gilaberte
:
Explainable Artificial Intelligence System for Guiding Companies and Users in Detecting and Fixing Multimedia Web Vulnerabilities on MCS Contexts. 524 - Kuljaree Tantayakul

, Wasimon Panichpattanakul
, Adisak Intana
, Parin Sornlertlamvanich
:
Edge Caching Strategies for Seamless Handover in SDN-Enabled Connected Cars. 525 - Issam Alhadid

, Evon M. O. Abu-Taieh, Mohammad Al-Rawajbeh
, Suha Afaneh, Mohammed E. Daghbosheh, Rami S. Alkhawaldeh
, Sufian Khwaldeh
, Ala'aldin Alrowwad:
Optimizing Cloud Service Composition with Cuckoo Optimization Algorithm for Enhanced Resource Allocation and Energy Efficiency. 526 - Benjamin Ascoli, Jinho D. Choi

:
Advancing Conversational Text-to-SQL: Context Strategies and Model Integration with Large Language Models. 527 - Ahmed Hamdi, Hassan N. Noura

:
AI-Driven Damage Detection in Wind Turbines: Drone Imagery and Lightweight Deep Learning Approaches. 528 - Brou Médard Kouassi

, Abou Bakary Ballo, Kacoutchy Jean Ayikpa
, Diarra Mamadou, Minfonga Zié Jérôme Coulibaly:
Top-K Feature Selection for IoT Intrusion Detection: Contributions of XGBoost, LightGBM, and Random Forest. 529 - Mostafa Abbas Mollaei

, Tarek Ould-Bachir
, Yvon Savaria
:
A Stateful Extension to P4THLS for Advanced Telemetry and Flow Control. 530 - Yuan Yao, Yang Zhang:

Semantic Data Federated Query Optimization Based on Decomposition of Block-Level Subqueries. 531
Volume 17, Number 12, 2025
- Aysha Alfaw

, Mohsen Rouached
, Aymen Akremi
:
A Resilient Deep Learning Framework for Mobile Malware Detection: From Architecture to Deployment. 532 - Yunzhe Wang

, Minzheng Li:
RIS-Assisted Joint Communication, Sensing, and Multi-Tier Computing Systems. 533 - Gajasin Gamage Damith Sulochana

, Dilshan Indraraj De Silva
:
Blockchain-AI-Geolocation Integrated Architecture for Mobile Identity and OTP Verification. 534 - Giuseppe Trimigno

, Gianfranco Lombardo
, Michele Tomaiuolo
, Stefano Cagnoni
, Agostino Poggi
:
LLMs in Staging: An Orchestrated LLM Workflow for Structured Augmentation with Fact Scoring. 535 - Rodrigo Novelo, Rodrigo Rocha Silva

, Jorge Bernardino
:
A Literature Review of Personalized Large Language Models for Email Generation and Automation. 536 - Xiaoyong Song

, Danyuan Zhou, Kai Li, Jiayuan Chen, Hao Zhang, Xiaoguang Zhang, Xuxia Zhong:
Survey of Intra-Node GPU Interconnection in Scale-Up Network: Challenges, Status, Insights, and Future Directions. 537 - Fuqiang Li, Zhe Li, Lisai Gao, Chen Peng:

Design of an Improved IoT-Based PV-Powered Soil Remote Monitoring System with Low Data Acquisition Failure Rate. 538 - Wang Feier, Rongzuo Guo:

Research on a Blockchain Adaptive Differential Privacy Mechanism for Medical Data Protection. 539 - Zi Yang Chia, Pey Yun Goh

, Lee-Yeng Ong
, Shing Chiang Tan
:
The Challenge of Dynamic Environments in Regard to RSSI-Based Indoor Wi-Fi Positioning - A Systematic Review. 540 - Fernando M. Runzer-Colmenares

, Nelson Luis Cahuapaza-Gutierrez
, Cielo Cinthya Calderon-Hernandez
, Christian Loret de Mola:
Artificial Intelligence-Enabled Facial Expression Analysis for Mental Health Assessment in Older Adults: A Systematic Review and Research Agenda. 541 - Yitian Chen, Yinghua Tong

:
Computation Offloading in Space-Air-Ground Integrated Networks for Diverse Task Requirements with Integrated Reliability Mechanisms. 542 - Vijayalakshmi Mahanra Rao, R. Kanesaraj Ramasamy

, Md Shohel Sayeed
:
BERT-Based Approaches for Web Service Selection and Recommendation: A Systematic Review with a Focus on QoS Prediction. 543 - Haonan Yan, Xin Pang, Shaopeng Zhou, Honghui Fan:

Transformer-Based Intrusion Detection for Post-5G and 6G Telecommunication Networks Using Dynamic Semantic Embedding. 544 - Laila AlTerkawi

, Fadi K. Dib
:
Federated Learning for Smart Cities: A Thematic Review of Challenges and Approaches. 545 - Renatha Souza Vieira

, Álvaro Figueira
:
Emotional Sequencing as a Marker of Manipulation in Social Media Disinformation. 546 - Talgar Bayan

, Adnan Yazici
, Richard Banach
:
Permissionless Blockchain Recent Trends, Privacy Concerns, Potential Solutions and Secure Development Lifecycle. 547 - Labib Bayzid

, Tonny Shekha Kar, Mohammad Tariqul Islam
, Md. Islam, Firoz Ahmed
:
Defending the Distributed Skies: A Comprehensive Literature Review of the Arena of Multi-Cloud Environment. 548 - Fadele Ayotunde Alaba

, Álvaro Rocha
, Hakeem Adewale Sulaimon, Owamoyo Najeem:
IoT Applications and Challenges in Global Healthcare Systems: A Comprehensive Review. 549 - Babiker Mohamed Rahamtalla

, Isameldin Elamin Medani
, Mohammed Eltahir Abdelhag
, Sara Ahmed Eltigani
, Sudha K. Rajan
, Essam Falgy
, Nazik Mubarak Hassan
, Marwa Elfatih Fadailu
, Hayat Ahmad Khudhayr
, Abuzar Abdalla
:
The AI-Powered Healthcare Ecosystem: Bridging the Chasm Between Technical Validation and Systemic Integration - A Systematic Review. 550 - Han-Wen Huang, Chih-Hung Shih

, Chen-Yu Li, Hao-Yung Teng:
A Blockchain-Based Framework for OSINT Evidence Collection and Identification. 551 - Jesus Eduardo Hermosilla-Diaz

, Ericka-Janet Rechy-Ramírez
, Antonio Marín-Hernández
:
Robotic Motion Techniques for Socially Aware Navigation: A Scoping Review. 552 - Di Zhang, Xiaolong Qian, Chenyang Shi, Yuang Zhang, Yining Qian, Shengyue Zhou:

Iron Ore Image Recognition Through Multi-View Evolutionary Deep Fusion Method. 553 - Jakub Czaplicki, Mohamed Rahouti

, Abdellah Chehri
, Thaier Hayajneh
:
MalScore: A Quality Assessment Framework for Visual Malware Datasets Using No-Reference Image Quality Metrics. 554 - Luka Aime Atadet

, Richard Musabe, Eric Hitimana
, Omar Gatera
:
Optimizing LoRaWAN Performance Through Learning Automata-Based Channel Selection. 555 - Stefano Mottura

, Marta Mondellini
:
A Proposal of a Scale to Evaluate Attitudes of People Towards a Social Metaverse. 556 - Yousef K. Sanjalawe

, Budoor Allehyani
, Salam Al-E'mari
:
A Context-Aware Lightweight Framework for Source Code Vulnerability Detection. 557 - Jie Li

, Wei Guo
, Wenli Zhang
:
Graph-SENet: An Unsupervised Learning-Based Graph Neural Network for Skeleton Extraction from Point Cloud. 558 - Petra Vasanicová

, Zuzana Kostová
, Ivana Hodorová, Natália Kolková, Viliam Obsut, Michal Ceskovic:
Understanding Generation Z's Tourism Purchasing Decisions Through Internet Technologies: The Case of Influencer Marketing. 559 - Berenice Arguero, Mateo Leiva, Kevin Christopher Pozo Guerrero, Germán V. Arévalo

, Miltón N. Tipán, Christian Tipantuña
, Michela Meo
:
Hybrid PON-RoF LTE Video Transmission with Experimental BLER Analysis and Amplifier Trade-Off. 560 - Nikolaos Peppes

, Theodoros Alexakis
, Emmanouil Daskalakis
, Evgenia F. Adamopoulou
:
Evaluating Synthetic Malicious Network Traffic Generated by GAN and VAE Models: A Data Quality Perspective. 561 - Ana-Mihaela Vasilevschi

, Calin-Alexandru Coman, Marilena Ianculescu
, Oana Andreia Coman:
Artificial Intelligence for Pneumonia Detection: A Federated Deep Learning Approach in Smart Healthcare. 562 - Rima Grati

, Khouloud Boukadi
, Safa Elleuch:
MEC-Chain: Towards a New Framework for a MEC-Enabled Mobile Blockchain Network Under the PoS Consensus. 563 - Leyli Nouraei Yeganeh

, Yu Chen
, Nicole Scarlett Fenty
, Amber Simpson
, Mohsen Hatami
:
STREAM: A Semantic Transformation and Real-Time Educational Adaptation Multimodal Framework in Personalized Virtual Classrooms. 564 - Yao-Liang Chung

:
Transmission-Path Selection with Joint Computation and Communication Resource Allocation in 6G MEC Networks with RIS and D2D Support. 565 - Stefanos Balaskas

, Ioannis Stamatiou, George S. Androulakis
:
Explainability, Safety Cues, and Trust in GenAI Advisors: A SEM-ANN Hybrid Study. 566 - Manikandan Thirumalaisamy, Sumendra Yogarayan, Md Shohel Sayeed

, Siti Fatimah Abdul Razak
, Ramesh Shunmugam:
Fog-Aware Hierarchical Autoencoder with Density-Based Clustering for AI-Driven Threat Detection in Smart Farming IoT Systems. 567

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














