Abstract is missing.
- Optimization of the Modified Gaussian Filter for Mobile GPU Usage in Game WorkloadsJieui Kang, Jaehyeong Sim, Hyokyung Bahn. 1-8 [doi]
- Predicted Improvement Aggregation Adjustment Search for Parallel Multi-Objective Bayesian OptimizationChenglong Lin, Tianli Xiao, Yizhong Ma, Chen Du. 1-6 [doi]
- Enhancing Secrecy in UAV RSMA Networks: Deep Unfolding Meets Deep Reinforcement LearningAbuzar B. M. Adam, Mohammed A. M. Elhassan. 1-5 [doi]
- Blockchain-Based Energy Trading Scheme for EVs Coordination: A Smart Contract ApproachSachi Chaudhary, Riya Kakkar, Mohammad S. Obaidat, Rajesh Gupta 0007, Sudeep Tanwar, Balqies Sadoun. 1-8 [doi]
- Developing Energy Autonomous and Cable-less Multi-gateway LoRa NetworksAnastasios Valkanis, Georgia A. Beletsioti, Konstantinos F. Kantelis, Petros Nicopolitidis, Georgios Papadimitriou 0001, Malamati D. Louta. 1-8 [doi]
- Outlier-based Anomaly Detection in Firewall LogsXiu-Ru Liang, Huei-Tang Li, Chiung-Ying Huang, Wei-An Chen, Yi Feng Chen, Zhi-Jia Gao, Meng-Wei Sun, Hao-Cheng Chia. 1-10 [doi]
- A Multimodal Fusion Depression Recognition Assisted Decision-Making System Based on EEG and Speech SignalsXiaojie Wang, Xin Wan, Zhaolong Ning, Zihan Qie, Jiameng Li, Yulong Xiao. 1-8 [doi]
- Deep Reinforcement Learning based Joint Optimization for Energy-efficient ITE and Cooling Units in Data CentersLina Yang, Peng Zhao, Yong Zhang. 1-8 [doi]
- Research on Routing Algorithm Based on Low Orbit Satellite Link HandoverJiafeng Xu, Tao Zhang. 1-5 [doi]
- SLA-SCA: Secure and Lightweight Authentication and Key Agreement Mechanism for Smart City ApplicationsBhairvi Pant, Mohammad S. Obaidat, Shreya Singh, Mudita Pant, Mohammad Wazid, Ashok Kumar Das, Kuei-Fang Hsiao. 1-7 [doi]
- A Novel Collaborative Representation Method for Hyperspectral Image ClassificationGuifeng Zheng, Qi Guo, Juan Xi, Shouze Tang, Ziyi Liu, Xuanrui Xiong. 1-6 [doi]
- A Robust Remote Client Password Authentication Technique for Smart Cities E-Governance ApplicationsMohammad S. Obaidat, Chandrashekhar Meshram, Deepak Kartikey, Kuei-Fang Hsiao, Agbotiname Lucky Imoize, Sharad Kumar Barve. 1-6 [doi]
- A Graph-Based Network with Attention for Stock Price PredictionHaiwei Fu. 1-8 [doi]
- Scheduling Different Types of Linear Workflows with Partial Computations in a Distributed SystemHelen D. Karatza. 1-7 [doi]
- Out-of-Distribution Detection with Confidence Deep Reinforcement LearningDi Wang. 1-7 [doi]
- Efficient ISM Band Rectenna for RF Energy Harvesting in IoT Healthcare DevicesYosra Bouchoucha, Dorsaf Omri, Taoufik Aguili. 1-8 [doi]
- Platform Construction to Protect Portraits of OthersHui-Jun Cheng, Sheng-Fu Zeng, Chun-Yuan Lin. 1-4 [doi]
- MalwareCLIP: Towards a Scalable and Explainable Image-Based Malware ClassificationYi Xiang Marcus Tan, Koh Ting Yew, Joon Sern Lee. 1-8 [doi]
- Design of a Secure Machine Learning-Based Malware Detection and Analysis SchemePankaj Kumar, Mohammad S. Obaidat, Piyush Pandey, Mohammad Wazid, Ashok Kumar Das, Devesh Pratap Singh. 1-8 [doi]
- Blockchain and AI-based Engine Fault Detection Scheme for Autonomous VehiclesYogi Patel, Shivang Patel, Rajesh Gupta 0007, Mohammad S. Obaidat, Riya Kakkar, Nilesh Kumar Jadav, Sudeep Tanwar. 1-8 [doi]
- A Dynamic Evolution Method for Digital Twins Based on RDD-RNNHongbo Cheng, Lin Zhang, Kunyu Wang. 1-4 [doi]
- The Influence of Gray Scale on Image Recognition Under Simulated Prosthetic VisionYan Zhang, Ying Zhao, Yang He, Guangmiao Jiang. 1-5 [doi]
- Adaptive Swapping for Variable Workloads in Real-time Task SchedulingSunhwa Annie Nam, Hyokyung Bahn. 1-6 [doi]
- Cryptanalysis and Improvement of a Blockchain Based Lightweight Authentication and Key Agreement Scheme for Internet of VehiclesMohammad Abdussami, Sanjeev Kumar Dwivedi, Mohammad S. Obaidat, Ruhul Amin, Satyanarayana Vollala, Balqies Sadoun. 1-6 [doi]