Abstract is missing.
- NegBLEURT Forest: Leveraging Inconsistencies for Detecting Jailbreak AttacksLama Sleem, Jérôme François, Lujun Li, Nathan Foucher, Niccolò Gentile, Radu State. 1-7 [doi]
- AttestaChain: A Chiplet-aware attestation system based on Blockchain and Zero-Trust ArchitectureAbdellah Kaci, Sylvain Guilley. 1-8 [doi]
- AI/ML Based Blockage Prediction Using Beam Measurement Reports for mmWave V2X Communication SystemsNoboru Osawa, Masaaki Ito, Taishi Watanabe, Shunsuke Kamiwatari, Issei Kanno, Hiroyuki Shinbo. 1-6 [doi]
- Optimizing Multi-UAV 3D Deployment for Energy-Efficient Sensing over Uneven TerrainsRushi Moliya, Dhaval K. Patel, Brijesh Soni, Miguel López-Benítez. 1-2 [doi]
- Multi-scale Graph Neural Network for Low-SNR Wireless Signal ClassificationFahmida Afrin, Neda Moghim, Safdar Hussain Bouk, Sandip Roy 0001, Sachin S. Shetty. 1-7 [doi]
- Coded-Cache-Aware Multipath Transport for Efficient Trusted-Node-Based QKD NetworksKazuhisa Matsuzono, Masahide Sasaki, Mikio Fujiwara. 1-7 [doi]
- SC-MII: Infrastructure LiDAR-based 3D Object Detection on Edge Devices for Split Computing with Multiple Intermediate Outputs IntegrationTaisuke Noguchi, Takayuki Nishio, Takuya Azumi. 1-6 [doi]
- Channel-Wise Masked Deep Joint Source-Channel Coding for Rateless Size-Independent Image TransmissionDaisuke Hisano. 1-6 [doi]
- Explainable Reward Shaping via SHAP for Double-DQN in UAV-Assisted WSNsAli Alfayly, Nadine Abbas. 1-6 [doi]
- RESCUE: Real-Time Sensing and Computation for Safe Evacuation in BuildingsMd. Ismail Hossain, Nasim Uddin, Ragib Hasan. 1-4 [doi]
- eHashPipe: Lightweight Top-K and Per-PID Resource Monitoring with eBPFYuanjun Dai, Qingzhe Guo, Xiangren Wang. 1-6 [doi]
- FLEET: A Federated Learning Emulation and Evaluation Testbed for Holistic ResearchOsama Abu Hamdan, Hao Che, Engin Arslan, Md. Arifuzzaman. 1-6 [doi]
- Lightweight Adaptive Data Rate Adjustment for Cost-Aware Industrial IoT MonitoringAryan Morteza, Mohammad Hossein Anisi, Morteza Varasteh, Faiyaz Doctor, Mark Hadaway, Andy Dowell. 1-2 [doi]
- WPTrack: A Wi-Fi and Pressure Insole Fusion System for Single Target TrackingWei Guo, Shunsei Yamagishi, Lei Jing 0001. 1-6 [doi]
- A Scalable Edge Architecture for Cross-Regional Face Recognition Access ManagementYi-Chi Lin, Daniel Oquendo, Nazli Siasi. 1-6 [doi]
- Demo: RALA-PSO, Intelligent Scheduling of Cloud-Native ApplicationsTomás Dias, Karima Velasquez, Luís Ferreira, Diogo Fevereiro, Luís Rosa 0001, Luís Cordeiro. 1-2 [doi]
- Fast and Secure Selective Homomorphic Encryption for Federated LearningAbdulkadir Korkmaz, Praveen Rao 0001. 1-4 [doi]
- A Mechanical Wi-Fi Antenna Device for Automatic Orientation Tuning with Bayesian OptimizationAkihito Taya, Yuuki Nishiyama, Kaoru Sezaki. 1-2 [doi]
- AI-Enhanced CW Radar for Vital Sign Monitoring in ISAC ApplicationsWoo Jin Kim, Eunsung Jang, Jae-Woo Park, Minjun Cho, Sang-Jun Park, Jeong-Wook Kim. 1-6 [doi]
- Accelerating Anomaly Detection in Industrial Control Systems Using SmartNICs and DPDKSergio Elizalde, Samia Choueiri, Ali Mazloum, Jose Gomez, Elie F. Kfoury, Jorge Crichigno. 1-6 [doi]
- Routing Construction for Wi-SUN FAN Using ZDD-Based Graph EnumerationReo Gakumi, Ryuichi Nagao, Hiroko Masaki, Hiroshi Harada. 1-6 [doi]
- Cyber-Physical Windowed Feature Learning for Unsupervised Anomaly Detection in Smart Grid SubstationsMomodou Lamin Barrow, Arafat Asim, Alex Howe, Mauricio Papa. 1-6 [doi]
- Identifying Critical Failure Chains for Resilience in Cyber-Physical Systems using Symbolic ExecutionChristopher Scherb, Mischa Jahn, Alexander Trapp, Nico Bachmann, Ruben Hutter, Luc Bryan Heitz. 1-6 [doi]
- Joint Resource Allocation and Trajectory Planning for eMBB and URLLC Communication in UAV-assisted 5G NetworksElham Hosseinpourhamzehkolaei, Abraham O. Fapojuwo. 1-6 [doi]
- QoE-Based Scene Adaptation Scheme of Distributed XR ApplicationsEtienne Faivre D'Arcier, Sofiene Jelassi, Patrice Hirtzlin, Ahmed Hamza. 1-2 [doi]
- Spatial ID-Driven Edge-Cloud Architecture for Real-Time Urban Digital TwinsYanru Chen, Sami Brahim Djelloul, Alex Orsholits, Manabu Tsukada, Hiroshi Esaki. 1-4 [doi]
- Vendor-Independent Data Platform Architecture in Smart BuildingsKazushi Matsukura, Kentaro Noda, Yuki Hashimoto, Haruki Ishimaru, Manato Fujimoto, Shingo Ata. 1-4 [doi]
- Janus Streamer: A Scalable WebRTC Media Streaming ServerJaehyeong Park, Seongyeop Jeong, Seung Min Kim, Jin-Soo Kim. 1-6 [doi]
- FEXT-DP: An Approach for Differentially Private and Explainable Federated LearningJulio Oliveira, Rodrigo Ferreira, André Riker, Glaucio H. S. Carvalho, Eirini Eleni Tsilopoulou. 1-4 [doi]
- Compact multi-functional MIMO Antenna with SRR-Enhanced Isolation for B5G/6G SystemsNouri Omheni, Rihen Laifii, Chafai Abdelhamid, Faouzi Zarai. 1-6 [doi]
- Improving Schedulability in TAS through Inter-Switch Coordinated SchedulingHironao Abe, Hideo Kawata, Takashi Nakanishi, Tatsuya Shimada. 1-6 [doi]
- Towards Sustainable 6G Compute Continuum: Energy-aware Zero-Touch Network and Service Management used for Dynamic Vehicular Service DeploymentsRaúl Cuervo Bello, Miguel Camelo, Johann Marquez-Barja, Nina Slamnik-Krijestorac. 1-6 [doi]
- Dynamic Content Recommendation Considering Cache State and Preference Using Reinforcement LearningShota Ochiai, Noriaki Kamiyama. 1-2 [doi]
- Improving Generalization with Harmonic Aggregation in Personalized Federated LearningAngel Peredo, Sergei Chuprov. 1-2 [doi]
- Joint Deployment Optimization of RIS and AF Relay-Assisted Communication SystemsFan-Shuo Tseng, Tsang-Yi Wang, Di-Wen Liu. 1-5 [doi]
- Hierarchical Multi-Agent DQN for Joint Resource Allocation and Position Control of Movable-GS-Mounted TUAV-BSsEunseo Park, Yerin Lee, Howon Lee. 1-2 [doi]
- Toward Efficient Health Data Access for Mobile Applications Leveraging Human Digital TwinsFrancesco Franco, Lorenzo Lamazzi, Francesco Poggi, Luca Bedogni. 1-6 [doi]
- TSKAN: Interpretable Machine Learning for QoE modeling over Time Series DataKamal Singh, Priyanka Rawat, Sami Marouani, Baptiste Jeudy. 1-6 [doi]
- An Auditable Decentralized Anonymous Payment Complying with The Least-Privilege PrincipleI-Hsun Chuang, Xi Chen, Yau-Hwang Kuo. 1-6 [doi]
- Transfer Learning-Based Classification of Cyber Attacks Against Power GridsJoshua Foster, Abdulrahman Takiddin, Muhammad Ismail 0001, Shady S. Refaat. 1-6 [doi]
- Multi-Objective BS Energy and QoS Optimization with Prediction-based Safe DRLArim Cho, Jaeyoung Yun, Howon Lee. 1-6 [doi]
- Study on an Automatic Correction Mechanism for Urban Infrastructure Location Information Based on Operational and Movement DataShota Homma, Tastuya Abe, Hidekazu Suzuki. 1-6 [doi]
- Industrial Case Study of Aerial Systems Using Ray-Tracing and Antenna OptimisationKrishnakanth Mohanta, Saba Al-Rubaye, Antonios Tsourdos. 1-6 [doi]
- Waveform Characteristics of OTFS and OFDM Modulated with Zadoff-Chu SequencesYi Zhang, Kazutoshi Yoshii, Tu Dac Ho, Shigeru Shimamoto. 1-6 [doi]
- Implementation and Evaluation of the iHAC Hub Leveraging the Web of Things for Interoperability Between Matter and ECHONET Lite DevicesRyosei Takaki, Kohei Yamashita, Hidekazu Suzuki. 1-6 [doi]
- Semantic THz-Enabled Federated Learning for Collaborative Mission Planning in UAV SwarmsZihong Li, Zhenni Pan, Jun Wu 0001. 1-5 [doi]
- Broadband Customer Complaint Prediction Using Data-centric AI: A Comparative Analysis of Data Synthesis AlgorithmsAdita Kulkarni. 1-2 [doi]
- QuRA: Reinforcement Learning Based Routing for Quantum NetworksTasdiqul Islam, Engin Arslan, Md. Arifuzzaman. 1-6 [doi]
- Network Efficiency of Centralized and Decentralized Health Data SystemsFrancesco Franco, Alessandro Bogliolo, Sara Montagna, Luca Bedogni, Stefano Ferretti. 1-5 [doi]
- Distinguishing Sensor Faults and Malicious Attacks in Connected Vehicles Using Machine LearningRakesh Das, Henry Griffith, Heena Rathore. 1-7 [doi]
- Stress-Triggered Slice Switching for QoE Enhancement in Beyond 5G NetworksKoki Kawaguchi, Daiki Nobayashi, Kazuya Tsukamoto, Takeshi Ikenaga. 1-2 [doi]
- Adaptive Federated Reinforcement Learning for Network Management in Complex Communication NetworksChristina Alhachem, Mounir Kellil, Abdelmadjid Bouabdallah. 1-2 [doi]
- Confidence-Aware Real-Time Mobile Application Identification with Resource-Efficient Inference SchedulingTeru Kimura, Akihiro Nakao. 1-6 [doi]
- Language-Driven Autonomy for Sustainable Consumer Robotics: Toward Energy- and Data-Efficient LLM ReasoningKelvin Olaiya, Chan-Tong Lam, Silvia Mirri, Giovanni Pau 0001, Paola Salomoni. 1-6 [doi]
- Measuring and Understanding Visualization Latency Performance for Smart City ApplicationsAlessio Masola, Paolo Burgio, Carlo Augusto Grazia, Luca Bedogni. 1-6 [doi]
- Joint Clustering and Beamforming Design for Energy-Efficient Scalable Network-Assisted Full-Duplex Cell-Free Massive MIMOYuya Mito, Koushi Okui, Kohei Ueda, Koji Ishibashi. 1-6 [doi]
- See and Beam: LiDAR-Guided Passive Reflection for Reliable Indoor mmWave ConnectivityRaj Sai Sohel Bandari, Amod Ashtekar, Omar Ibrahim, Mohammed E. Eltayeb. 1-2 [doi]
- Industrial Semantics-Aware Digital Twins: A Hybrid Graph Matching Approach for Asset Administration ShellsAriana Metovic, Nicolai Maisch, Samed Ajdinovic, Armin Lechler, Andreas Wortmann 0001, Oliver Riedel. 1-6 [doi]
- Benchmarking Machine Learning Models for IoT Malware Detection under Data Scarcity and DriftJake Lyon, Ehsan Saeedizade, Shamik Sengupta. 1-6 [doi]
- A Glass-to-Glass Testbed: Towards effective Latency AnalysisAnna Semeraro, Carlo Augusto Grazia, Luca Bedogni. 1-6 [doi]
- Assessing the Impact of Cybersecurity Attacks on Digital Twin Metrics: An Experimental StudyMarco Picone, Erwan Bouquillon, Marcello Pietri, Marco Mamei. 1-4 [doi]
- Boosting CUBIC for Bandwidth-Dynamic LEO Satellite Communication EnvironmentsWoochan Yoon, Hyogon Kim. 1-4 [doi]
- A Wildlife Monitoring System with Wireless Video Transfer over VHF BandHiroyuki Yomo, Natsuki Ikeda, Taichi Nagatani, Yoshihisa Kondo, Arata Kato, Shugo Kajita, Mineo Takai, Hiroshi Yamamoto. 1-2 [doi]
- Coordinated UL/DL Multi-Beam Scheduling for Latency-Reduced Satellite Data RelayKohei Yoshida, Yohei Hasegawa, Kazushi Sugyo, Kazushi Muraoka, Masayuki Ariyoshi. 1-6 [doi]
- Cross-Layer Channel Sounding Optimization Towards Next-Gen Wi-FiLyutianyang Zhang, Liu Cao, Dongyu Wei, Mingzhe Chen, Zhengchuan Chen, Vanlin Sathya. 1-6 [doi]
- Multimedia over Satellite with QUIC-Wave: An Experimental Evaluation of PerformanceArmir Bujari, Michele Luglio, Claudio E. Palazzi, Simon Pietro Romano, Cesare Roseti, Domenico Verde, Francesco Zampognaro. 1-6 [doi]
- AI-Driven Resource Allocation for Secrecy Rate Maximization in RIS-Assisted Cell-Free MIMOGloria Mollah, Imtiaz Ahmed 0001, Danda B. Rawat. 1-6 [doi]
- How to Discover Knowledge for FutureG: Contextual RAG and LLM Prompting for O-RANNathan Conger, Nathan Scollar, Kemal Davaslioglu, Yalin E. Sagduyu, Sastry Kompella. 1-6 [doi]
- End-to-End Evaluation of a Virtualized Terminal with Wearable Terahertz Relays for 6G Uplink under Practical ConditionsSatoshi Ito, Taishi Watanabe, Yoshiki Sugimoto, Kunio Sakakibara, Akihiko Nishio, Yasuaki Yuda, Kenichi Kashima, Yuto Mizuno. 1-6 [doi]
- Low-Latency Point Cloud Video Streaming Using User Adaptive Point-Wise CompressionShunsuke Yagi, Akihiro Kuwabara, Hinata Kirihara, Tatsuya Fukui, Tsubasa Okamoto, Toshihito Fujiwara, Satoshi Narikawa, Takumasa Ishioka, Shunsuke Saruwatari, Takuya Fujihashi. 1-4 [doi]
- Paragraph-Level Hallucination Detection and Correction for Trustworthy Large Language Models in Networked SystemsShivangi Tripathi, Teancy Jennifer, Henry Griffith, Heena Rathore. 1-6 [doi]
- SkyLock: A Unified Multi-Layer Authentication and Key Management Framework for 6G Non-Terrestrial NetworksQuazi Mamun, Tu Dac Ho, Zhenni Pan, Shigeru Shimamoto. 1-6 [doi]
- Erasing Digital Divide Leveraging Software-Defined Network Slicing: A Cost-aware Game Theoretic ApproachDeborsi Basu, Vaibhavi Meena, Uttam Ghosh, Raja Datta. 1-6 [doi]
- Secure Distributed Overtaking and Lane Change Maneuvers for Cooperative AVsEranda Harshanath Jayatunga, Anupa De Silva, Anca Delia Jurcut, Nima Afraz. 1-2 [doi]
- Software Defined Radio Prototyping of Direct Detection OTFS for Optical Wireless LinksNikolajs Tihomorskis, Sandis Migla, Darja Cirjulina, Arturs Aboltins. 1-5 [doi]
- Demonstration of an Ultra-Low Latency Secure Deterministic Industrial Internet of Things (IIoT)Ted H. Szymanski. 1-4 [doi]
- Reliable Edge Control over 5G-TSN: Demonstrating End-to-End Prioritization with Inverted PendulumsTobias Scheinert, Hosein K. Nazari, How-Hang Liu, Stefan Senk, Giang Nguyen 0002, Maciej Muehleisen, Frank H. P. Fitzek. 1-2 [doi]
- Vision-Based Autonomous MM-Wave Reflector Using ArUco-Driven Angle-of-Arrival EstimationJosue Marroquin, Nan Inzali, Miles Dillon Lantz, Campbell Freeman, Amod Ashtekar, Ajinkya Umesh Mulik, Mohammed E. Eltayeb. 1-6 [doi]
- PP-CLS-FL: Privacy-Preserving CLS-Transfer Federated Learning on Heterogeneous ClientsFeras Shoukeir, Liang Hong, Kamrul Hasan 0008. 1-6 [doi]
- Experimental Trajectory Deviation Detection and Correction for UAV Passing through mmWave Ultra-Spot Using Space-Time SynchronizationPhuc Duc Nguyen, Ryosuke Isogai, Keitarou Kondou, Satoshi Yasuda, Nobuyasu Shiga, Yozo Shoji. 1-6 [doi]
- Interpretable Reinforcement Learning for Load Balancing using Kolmogorov-Arnold NetworksKamal Singh, Sami Marouani, Ahmad Al Sheikh, Pham Tran Anh Quang, Amaury Habrard. 1-4 [doi]
- Mitigating Retransmission Attack in MQTTv5 Shared Subscription via Trust-Based Message SchedulingGraziano Rizzo, Mattia Giovanni Spina, Floriano De Rango. 1-6 [doi]
- FPGA as a Function: A Low-Code Framework for Edge ComputingAyuna Takashi, Hiroaki Nishi. 1-6 [doi]
- A TinyML Framework for Quantifying Artifacts' Holding Power in Smart MuseumsRafiq Ul Islam, Claudio Savaglio, Giancarlo Fortino, Pietro Manzoni. 1-6 [doi]
- PTLM: A Passive TCP Latency Monitor for Enterprise and Living Lab NetworksAntonio Solida, Gaetano Orazio Cauchi, Salvatore Iandolo, Martin Klapez, Maurizio Casoni, Carlo Augusto Grazia. 1-6 [doi]
- RAID: A Reputation-Based Aggregation for Intrusion Detection in Federated LearningNazanin Parvizi, Sajal Saha, Nashid Shahriar. 1-6 [doi]
- Indoor Performance Comparison between Outdoor Macro, DAS, Wi-Fi and Neutral HostVanlin Sathya, Lyutianyang Zhang, Mehmet Yavuz. 1-2 [doi]
- Implementation Evaluation of Dynamic Token DS-TWR in SmartFinder with IR-UWBTomoki Nitta, Yasuhisa Takizawa. 1-4 [doi]
- Scaling MLFFN-based Lexicon Generation for Trustworthy and Explainable Cyber Physical SystemsRoopika Ganesh, Heena Rathore. 1-6 [doi]
- Group-based Session Management of Massive Communication for 6G Mobile NetworkTetsu Joh, Takahiko Kato, Shota Ono, Chikara Sasaki, Atsushi Tagami, Akihiro Nakao. 1-2 [doi]
- Autonomous Point-to-Multipoint Multi-Hop Network Using Mobile Robot SwarmKouichi Genda. 1-2 [doi]
- Senior Safety Monitoring in Microverse using Fuzzy Neural Network Enhanced Action RecognitionHan Sun, Qian Qu, Lhamo Dorje, Yu Chen 0002, Xiaohua Li. 1-2 [doi]
- Population Modeling for the Simulation of Satellite ConstellationsLouis Barbier, Oana Hotescu, Jérôme Lacan, Emmanuel Lochin. 1-2 [doi]
- Geometry-Aware Time-Window Conditional Handover for Non-Terrestrial NetworksJongtae Lee, Yujeong Ahn, Jae-Hyun Kim. 1-6 [doi]
- AI Based 6G Aerial Networks with Sensing Assisted Communications for Connected and Automated VehiclesMohammad Shah Alamgir, Brian Kelley. 1-6 [doi]
- Demonstration of Fabric Deformation Estimation Using a Battery-Free IMU Module ArrayAkihito Noda. 1-2 [doi]
- Delay-Aware Hierarchical Distributed DQN for Resource Management in IAB SystemsMiso Lee, Howon Lee. 1-2 [doi]
- Energy-Efficient Censoring Strategy for Distributed Multi-View Sparse Signal Recovery in WSNsYen-Nung Liao, Ming-Hsun Yang, Yu-Jun Kuo, Ling-Hua Chang. 1-2 [doi]
- A Workflow for Cost- and Time-Aware Refueling Itinerary OptimizationMarco Savarese, Carmine Zaccagnino, Antonio de Blasi, Giacomo Salici, Silvia Cascianelli, Roberto Vezzani, Carlo Augusto Grazia. 1-2 [doi]
- Unified Control of Network and Compute Toward 6G In-Network Computing ServiceHiroki Baba, Kentaro Hayashi 0001, Shiku Hirai, Tomonori Takeda. 1-6 [doi]
- Customizing Human Machine Interfaces leveraging Digital Twins and Large Language ModelsFrancesco Franco, Lorenzo Lamazzi, Marco Picone, Marco Savarese, Carlo Augusto Grazia, Luca Bedogni. 1-6 [doi]
- Evaluation of Cell ID Detection by Phase Rotation with Fast Beam SteeringHideya So, Kazuki Maruta. 1-2 [doi]
- A Lightweight Interference Estimation Method for Sub-6GHz Private 5G Using 3D City MapsTakuma Matsumoto, Takeo Fujii. 1-2 [doi]
- Rethinking HTTP API Rate Limiting: A Client-Side ApproachBehrooz Farkiani, Fan Liu, Patrick Crowley. 1-7 [doi]
- Lyapunov-Optimized Traffic Splitting in TN-NTN using QMIX for Enhanced Network StabilitySeoyeong Park, Junyoung Kim 0006, Huiyeon Jang, Soyi Jung. 1-6 [doi]
- Safe Reinforcement Learning Based Fixed-Wing UAV Trajectory Optimization and Collision AvoidanceTaewook Kim, Homin Park, Howon Lee. 1-6 [doi]
- GADCA: A MARL-Based Graph-Attentive Decentralized Collision Avoidance Framework for UAV in UTMAsma Hamissi, Amine Dhraief, Layth Sliman. 1-8 [doi]
- VirtShield: A Security Evaluation Framework for Virtualized and Containerized SystemsFaiz Alam, Mohammed Mubeen Mifthak, Sahil Purohit, Md Shadab, Gregory T. Byrd, Khaled Harfoush. 1-6 [doi]
- Optimizing Decentralized Congestion Control: Performance Evaluation on IEEE 802.11p NetworksAntonio Solida, Carlo Augusto Grazia, Martin Klapez, Maurizio Casoni. 1-6 [doi]
- Dynamic Certification of Industrial Digital Twins via Blockchain for Trusted Lifecycle ManagementMarcello Pietri, Matteo Martinelli, Fabio Turazza, Roberto Cavicchioli, Marco Picone, Marco Mamei. 1-6 [doi]
- Frequency-Power Slicing for QoS-Aware Resource Optimization in UAV-Assisted NOMA NetworksHao Xue, Junlong Wang, Zhenni Pan, Shigeru Shimamoto, Tu Dac Ho. 1-6 [doi]
- Adaptive Code Rate Selection for Polar-Coded OFDM Systems With Specified Reliability ConstraintsGinga Hashimoto, Takumi Takahashi, Hideki Ochiai. 1-6 [doi]
- FedSkipTwin: Digital-Twin-Guided Client Skipping for Communication-Efficient Federated LearningDaniel Commey, Kamel Abbad, Lyes Khoukhi, Garth V. Crosby. 1-4 [doi]
- Bridging Edge and Cloud for Smart City Data and Service Continuity: The MASA ApproachEnrico Rossini, Marcello Pietri, Marco Picone, Luca Bedogni, Carlo Augusto Grazia, Marco Mamei. 1-6 [doi]
- LiDAR Backscatter-Driven mmWave Beam Alignment in Indoor NLoS EnvironmentsAmod Ashtekar, Mohammed E. Eltayeb. 1-6 [doi]
- Dual-Layer Intrusion Detection for EVSE Networks: A TinyML-Driven Security FrameworkGowtham Raj Rachakonda, Madhuri Siddula, Om Prakash Yadav, Olusola Tolulope Odeyomi, Xiaohong Yuan. 1-4 [doi]
- Personalized Federated Learning-Driven Beamforming Optimization for Integrated Sensing and Communication SystemsZhou Ni, Sravan Reddy Chintareddy, Peiyuan Guan, Morteza Hashemi. 1-6 [doi]
- How Energy is Consumed by LLM-enabled Smart Home Assistant Systems on Low-Cost Devices: An Empirical StudyKrishna Sruthi Velaga, Anik Mallik, Yifan Guo. 1-6 [doi]
- Evaluating Bluetooth Low Energy Connection Reliability for Mobile Health ApplicationsFrancesco Franco, Lorenzo Lamazzi, Francesco Poggi, Luca Bedogni. 1-6 [doi]
- HarmoniKt: a Unifying Middleware for Heterogeneous Robot FleetsManuel Andruccioli, Angela Cortecchia, Davide Domini, Nicolas Farabegoli, Giovanni Delnevo, Danilo Pianini, Riccardo Venanzi, Mirko Viroli. 1-6 [doi]
- POLYNIX: A Hybrid Policy Enforcement Framework for Zero-Trust Security in Virtualized SystemsKarthikeyan Arunachalam, Abhilash Kayyidavazhiyil, Pranesh Santikellur. 1-6 [doi]
- Service Provisioning in Digital Twin Networks with Semantic-Aware Information Centric NetworkingMarica Amadeo, Giuseppe Ruggeri, Antonella Molinaro, Michele Nitti, Salvatore Serrano. 1-4 [doi]
- Handover Control Method for Multiple Base Stations in Millimeter-Wave V2X CommunicationRyoichi Nori, Jin Nakazato, Sojin Ozawa, Yuki Sasaki, Haruki Osaki, Tetsuya Iye, Kazuki Maruta, Mikio Hasegawa. 1-6 [doi]
- Privacy-Preserving Digital Twin Framework for Autonomous and Connected VehiclesRahanatu Suleiman, Akshita Maradapu Vera Venkata Sai. 1-6 [doi]
- Crafting Adversarial Attacks to MU-MIMO OFDMA Transmissions in Wi-Fi NetworksLinda Traverso, Francesco Gringoli, Francesco Restuccia 0001, Francesca Meneghello 0001. 1-6 [doi]
- Secure mmWave Beamforming with Proactive-ISAC Defense Against Beam-Stealing AttacksSeyed Bagher Hashemi Natanzi, Hossein Mohammadi, Bo Tang 0011, Vuk Marojevic. 1-4 [doi]
- Millimeter-Wave Body-Centric Radar Sensing for Continuous Monitoring of Human Gait DynamicsZahra Najafi, Mohammed E. Eltayeb. 1-2 [doi]
- Digital Twin-Based Security Function in the Space DomainMasataka Nakahara, Keizo Sugiyama, Yasuaki Kobayashi, Ayumu Kubota. 1-2 [doi]
- Power models for O-RAN O-DU planning and optimisationGodlove Suila Kuaban, Tadeusz Czachórski, Tülin Atmaca, Piotr Czekalski. 1-4 [doi]
- Entropy-Driven Inconsistencies in Shared Secrets with CRYSTALS-Kyber on Heterogeneous PlatformsMohamed Amine Mighri, Ahmed Benfarah, Aref Meddeb. 1-2 [doi]
- TinyFusion-NAS: Hardware-Aware Neural Architecture Search with Lightweight Attention for Multimodal Sensor FusionRavi Gupta, Vrushabh Sanghvi, Shabista Haider. 1-2 [doi]
- Real-Time Cryptographic Agility for Autonomous UAV Swarms: A Performance-Driven Approach to Post-Quantum MigrationAbdullah Aydeger, Marco Carvalho. 1-6 [doi]
- SmartMove:Context-Aware Deep Reinforcement Learning for Service Discovery in Wireless NetworksChaithanya Sai G, Shrinithi Tensingh, Chandan Kumar, Prasad Basavaraj Dandra, Sivasankar C, Shreedhar KVM, Chetan Ganig. 1-6 [doi]
- Subscription-Based Integrated 5G-Radar Tracking System With Dynamic Resource Management Using Reinforcement LearningYukang Fu, Alex R. Chiriyath, Andrew Herschfelt, Daniel W. Bliss. 1-6 [doi]
- Deep Reinforcement Learning-Based Data Download Scheduling Algorithm for Internet of Drones SystemsImage Bhattarai, Cong Pu. 1-6 [doi]
- Forging Industry 5.0 DevOps: Towards Secure and Scalable OT Orchestration Powered by KubernetesNicole Giulianelli, Andrea Sabbioni, Sofia Montebugnoli, Armir Bujari, Antonio Corradi. 1-2 [doi]
- Deployment Strategies for AI-based Computer Vision in Industrial Quality ControlA. Kaceli, M. Zenadocchio, Carlo Centofanti, Fabio Graziosi, Andrea Marotta. 1-2 [doi]
- Path Loss Classification Using Time-Series Features in Open RAN Key Performance MetricsRajendra Upadhyay, Rajendra Paudyal, Al Nahian Bin Emran, Duminda Wijesekera. 1-2 [doi]
- Aerial Base Station enabled the Rocket Communication SystemKabore Wendenda Nathanael, Rong-Terng Juang, Hsin-Piao Lin, Belayneh Abebe Tesfaw, Shiann Shiun Jeng, Jen-Yeu Chen. 1-6 [doi]
- DECPA-FL: Dynamic Ensemble Clustering for Poison-Aware Federated Learning under Adversarial ConditionsAhad Bin Islam Shoeb, Kamrul Hasan 0008, Liang Hong, Tariqul Islam 0001, Imtiaz Ahmed 0001, Zoheb Hasan, Sumit Chakravarty. 1-6 [doi]
- Energy-Aware Ensemble Learning for Coffee Leaf Disease ClassificationLarissa Ferreira Rodrigues Moreira, Rodrigo Moreira, Leonardo Gabriel Ferreira Rodrigues. 1-6 [doi]
- PUF-Based Reconfigurable QAM Modulation for Secure CommunicationAfia Zuhaira, Mohamed Younis. 1-6 [doi]
- Thermal-aware Energy-efficient Workload Scheduling for Data CentersJosh Penaojas, Kousha Salimkhan, Mark Fullton, Henry Locke, Matthew Smith, Chongye Wang, Xiaojun Ruan, Mahdi Ebrihimi, Xunfei Jiang. 1-6 [doi]
- Modeling and Optimizing Reliability in LR-FHSS Networks with Successive Interference CancellationJuliana El Rayess, Kinda Khawam, Samer Lahoud, Melhem El Helou. 1-6 [doi]
- Towards Declarative Deployment and Lifecycle Orchestration of Digital Twin EcosystemsManuel Andruccioli, Roberto Girau, Silvia Mirri, Paola Salomoni. 1-6 [doi]
- Predictive Calibration of Phase Impairments across Access Points for Coherent Joint Transmission in Cell-Free Massive MIMOTakahide Murakami, Amr Amrallah, Yu Tsukamoto, Akio Ikami. 1-2 [doi]
- DISCOV.ER the Biodiversity of a Unique Wetland Site Combining Citizen Science, Gamification, and Generative AIGianni Tumedei, Riccardo Gardenghi, Silvia Mirri, Catia Prandi. 1-6 [doi]
- RSMA-Aided Full-Duplex Networks Under Imperfect CSI and SIC: Performance EvaluationFarjam Karim, Nurul Huda Mahmood, Deepak Kumar, Arthur Sousa de Sena, Matti Latva-aho. 1-7 [doi]
- LLMAC: A Global and Explainable Access Control Framework with Large Language ModelSharif Noor Zisad, Ragib Hasan. 1-6 [doi]
- Characterizing the Performance Limits of OAI-Based O-RAN Digital TwinMd Fahad Monir, Nishith D. Tripathi, Jeffrey H. Reed, Md. Zoheb Hassan, Imtiaz Ahmed 0001, Tarem Ahmed. 1-4 [doi]
- Kerberos-Authenticated Classical Channel for Quantum Key Distribution: A Symmetric-Key Approach to Quantum-Safe AuthenticationHannes Künstner, Ashutosh Dhar Dwivedi, Jens Myrup Pedersen. 1-6 [doi]
- Evaluation of WLAN Communication Characteristics In-Metal-Pipes with Non-Metallic SectionsYuki Endo, Daiki Nobayashi, Takeshi Ikenaga. 1-4 [doi]
- PTLM: Passive RTT Measurement for TCP FlowsGaetano Orazio Cauchi, Antonio Solida, Salvatore Iandolo, Martin Klapez, Maurizio Casoni, Carlo Augusto Grazia. 1-2 [doi]
- UAV-Enabled ISAC System for Fish School Detection Using Vision Transformer and Deep Reinforcement LearningBelayneh Abebe Tesfaw, Rong-Terng Juang, Hsin-Piao Lin, Kabore Wendenda Nathanael, Shiann Shiun Jeng, Jen-Yeu Chen. 1-4 [doi]
- Impact of Reflectors and MIMO on ML-Aided mmWave/sub-THz Blockage PredictionRoghieh Mahdavihaji, Alexandra Duel-Hallen, Hans Hallen. 1-6 [doi]
- Machine Learning-Based Decision Support for Hospital Selection in Emergency Ambulance OperationsAyano Naito, Keisuke Ota, Takaya Yamazato. 1-2 [doi]
- Resource-Aware Clustered Federated Learning for Industrial Digital Twins: A Reproducible Benchmark on Fashion-MNISTUzma Hamid, David Sung, Daniel Commey, Garth V. Crosby. 1-7 [doi]
- IPBAC: Interaction Provenance-Based Access Control for Secure and Privacy-Aware SystemsSharif Noor Zisad, Ragib Hasan. 1-2 [doi]
- RI-PIENO - Revised and Improved Petrol-filling Itinerary Estimation aNd OptimizationMarco Savarese, Antonio de Blasi, Carmine Zaccagnino, Giacomo Salici, Silvia Cascianelli, Roberto Vezzani, Carlo Augusto Grazia. 1-6 [doi]
- Performance Analysis of RIS-Assisted UAV Communication in NOMA NetworksMasoud Ghazikor, Van Ly Nguyen, Morteza Hashemi. 1-6 [doi]
- GEO-Relayed Inter LEO Satellite Constellations Connection Scheduling with Hybrid FSO/RF CommunicationsKazuma Mashiko, Hiroaki Hashida, Yuichi Kawamoto, Yohei Hasegawa, Masayuki Ariyoshi. 1-6 [doi]
- RepCache: Content Producer Reputation based Caching in Named Data NetworksPankaj Chaudhary, Neminath Hubballi. 1-4 [doi]
- History-Aware Trajectory k-Anonymization Using an FPGA-Based Hardware Accelerator for Real-Time Location ServicesHiroshi Nakano, Hiroaki Nishi. 1-2 [doi]
- Ciao: Cross-architecture IoT Malware Family Classification with Code ReuseMinhajul Alam Rahat, Vijay Banerjee, Gedare Bloom, Yanyan Zhuang. 1-6 [doi]
- A Location-Aware Time-to-Exit Metric for Reliable Conditional Handover in 6G NTNShama Noreen, Hans D. Schotten. 1-4 [doi]
- Comparison of 5G Wireless Backhaul TechnologiesCatarina Barroqueiro, Victor T. M. Souza, Tiago R. Santos, Arnaldo S. R. Oliveira, Germano Capela. 1-2 [doi]
- Unlocking Resilience and Load Balancing: Toward Hop-By-Hop Routing for LEO Mega-ConstellationsLouis Barbier, Oana Hotescu, Jérôme Lacan, Emmanuel Lochin. 1-2 [doi]
- Demonstration of Blind Adaptive Array Signal Processing for LTE-WLAN Spectrum SuperposingTakeshi Kazama, Kotaro Fukue, Hideya So, Kazuki Maruta. 1-2 [doi]
- On the Vulnerability of Deep Automatic Modulation Classifiers to Explainable Backdoor ThreatsYounes Salmi, Hanna Bogucka. 1-4 [doi]
- Practical Multi-Panel Beam Selection for Higher Rank LoS-MIMO with Joint Phase-Time ArrayMasahiro Takigawa, Issei Kanno. 1-2 [doi]
- Adaptive Intrusion Detection for Evolving RPL IoT Attacks Using Incremental LearningSumeyye Bas, Kiymet Kaya, Elif Ak, Sule Gündüz Ögüdücü. 1-6 [doi]
- Vision Transformer Based User Equipment PositioningParshwa Shah, Dhaval K. Patel, Brijesh Soni, Miguel López-Benítez, Siddhartan Govindasamy. 1-2 [doi]
- Millimeter-Wave Gesture Recognition in ISAC: Does Reducing Sensing Airtime Hamper Accuracy?Jakob Struye, Nabeel Nisar Bhat, Siddhartha Kumar, Mohammad Hossein Moghaddam, Jeroen Famaey. 1-6 [doi]
- Quantum-Safe and Cross-Layer Authentication and Key Agreement Protocol for Smart Grid CommunicationsCong Pu, Muhammad Abdullah Bilal, Sunho Lim. 1-6 [doi]
- Quality of Experience Prediction for First-Person Shooter Online Gaming: The Case Study of Call of DutyYehonatan Zion, Eyal Paz, Ran Dubin, Amit Dvir, Chen Hajaj. 1-6 [doi]
- Projection Approximation Subspace Tracking-Based Channel Estimation for IRS ControlKensuke Okabe, Norisato Suga. 1-2 [doi]
- Performance Enhancement of Asynchronous Pulse Code Multiple Access in 1,000-Node ExperimentTakuya Fujiwara, Mayu Horiuchi, Ferdinand Peper, Kenji Leibnitz, Naoki Wakamiya, Maki Arai, Jin Nakazato, Mikio Hasegawa. 1-2 [doi]
- SkyMemory: A LEO Edge Cache for Transformer Inference Optimization and Scale OutThomas Sandholm, Lin Cheng 0006, Bernardo A. Huberman. 1-6 [doi]
- Obstacle-Aware Human Localization via Channel Impulse ResponseNoof Qassmi, Mohammad Hilou, Mhd Saria Allahham, Amr Mohamed 0001, Loay Ismail. 1-6 [doi]
- Edge ML vs. TinyML: A Comparative Analysis with Experimental Results on Power Efficiency and Model OptimizationMoez Altayeb, Marco Zennaro, Pietro Manzoni. 1-4 [doi]
- Adaptive BAA Switching by CNN-Based Spectrogram Learning in LTE-WLAN CoexistenceKotaro Fukue, Takeshi Kazama, Hideya So, Shun Kojima, Kazuki Maruta. 1-2 [doi]
- Goal-Oriented Multi-Agent Reinforcement Learning for Decentralized Agent TeamsHung Du, Hy Nguyen, Srikanth Thudumu, Rajesh Vasa, Kon Mouzakis. 1-2 [doi]
- A Benchmark Study of RF Anomaly Detection Models on NVIDIA Jetson Orin NanoNicholas D. Redmond, Mohd. Hasan Ali, Dipankar Dasgupta, Myounggyu Won. 1-2 [doi]
- Orbital Prediction Based Routing for ISL-Enabled LEO Satellite NetworksKeita Kashiwagi, Kazuya Tsukamoto. 1-6 [doi]
- Topology Matters: Evaluating Multi-Agent Organizations for Resilient Flood DetectionGaurav Avula, Hung Du, Nageswara Rao Pedasingu, Srikanth Thudumu, Suresh Vayira, Jason Fisher. 1-2 [doi]
- Practical Insights from Benchmarking Open-Source 5G Standalone MIMO in Indoor EnvironmentsXhulio Limani, Arno Troch, David Góez, Andreas Gavrielides, Miguel Camelo Botero, Johann Marquez-Barja, Nina Slamnik-Krijestorac. 1-6 [doi]
- 5G Downlink Resource Reservation Based on Resonant Frequency for RF HarvestingAkihiro Imae, Shinya Tamaki, Satoshi Narikawa. 1-6 [doi]
- Enabling Site-Specific Cellular Network Simulation Through Ray-Tracing-Driven ns-3Tanguy Ropitault, Matteo Bordin, Paolo Testolina, Michele Polese, Pedram Johari, Nada Golmie, Tommaso Melodia. 1-6 [doi]
- A Dynamic Entropy-Based Approach for DDoS Protection in Software-Defined NetworksMattia Giovanni Spina, Mauro Tropea, Floriano De Rango. 1-4 [doi]
- Weighted Reciprocal Rank Fusion RAG for Context-Aware DoS Attack MitigationAbdullahil Kafi, Sajal Saha, Nashid Shahriar. 1-6 [doi]
- LEAF: A Lightweight Explainable AI Framework for Mango Anthracnose Detection and Severity GradingPriya Verma, Priyal Kaler, Sandeep Verma, Neeraj Kumar. 1-2 [doi]
- Improving PID-Based Aggregation in Federated Learning for Consumer ApplicationsAdrian Peña, Sergei Chuprov. 1-2 [doi]
- Scalable Wide-Area Wearable Sensing via BLE-over-5G Tunneling and GNSS IntegrationMakoto Nomura, Akihiro Nakao. 1-6 [doi]
- Design Detailing of Machine Learning-based Estimation Method of Stable Communication Range for UAV FlightMao Kubota, Hideaki Miyaji, Hiroshi Yamamoto, Arata Kato, Taka Maeno, Daniel Chen, Lean Yao, Mineo Takai. 1-6 [doi]
- SIGMA: Sequence Index Grouping-based Multiple Access for 6G OFDM-ISAC Systems in Multipath EnvironmentsHa-Eun Lee, Young Seok Lee, Howon Lee 0001, Bang Chul Jung. 1-6 [doi]
- Coordinated Anti-Jamming Resilience in Swarm Networks via Multi-Agent Reinforcement LearningBahman Abolhassani, Tugba Erpek, Kemal Davaslioglu, Yalin E. Sagduyu, Sastry Kompella. 1-6 [doi]
- Hierarchical Edge AI for Cooperative DrivingKiminobu Makino, Hiroshi Miyata, Toru Furusawa, Atsushi Hayami, Hisayoshi Mizuno. 1-2 [doi]
- Performance Comparison of 5G NR Uplink MIMO and Uplink Carrier Aggregations on Commercial NetworkHenry Shao, Kasidis Arunruangsirilert. 1-4 [doi]
- Multi-sensor-robot Placement System using Reinforcement Learning for 3D Digital-twinsJo Kozen, Ryoichi Shinkuma, Gabriele Trovato, Narayan B. Mandayam. 1-2 [doi]
- Machine Learning for LiDAR-Based Indoor Surface Classification in Intelligent Wireless EnvironmentsParth Ashokbhai Shiroya, Swarnagowri Shashidhar, Amod Ashtekar, Krishna Aindrila Kar, Rafaela Lomboy, Dalton Davis, Mohammed E. Eltayeb. 1-6 [doi]
- NeuroPulse: AI Empowered Network Functions via AI-Native Multi-Stakeholders OrchestrationParsa Rajabzadeh, Abdelkader Outtagarts, Yassine Hadjadj Aoul, Soraya Ait Chellouche. 1-6 [doi]
- MambaVLA: A Scalable and Efficient Vision-Language-Action Model with State Space ArchitectureSai Navaneet Peddapalli, Manisha Lingala, Sangmoon Lee, Ju H. Park. 1-4 [doi]
- Hierarchical Verifiable Federated Learning with Recursive ProofsHoa V. Nguyen, Hoang D. Le, Anh T. Pham 0002. 1-6 [doi]
- Content-based Fine-grained Flow Management Supporting Out-of-Path Transparent Add-onsAnna Ishizaki, Takuma Fukui, Hiroaki Nishi. 1-2 [doi]
- Vision-Language Feature-Based Multimodal Semantic Communication SystemGwangyeon Ahn, Jiwan Seo, Joonhyuk Kang. 1-6 [doi]
- WebAssembly as a Lightweight Path to Sustainable and High-Performance Cloud-Native ComputingMarcin Ziólkowski, Ilhem Fajjari, Halina Tarasiuk. 1-6 [doi]
- Efficient UWB Localization with Slotted TWR and Relay-Based TDoA: Experimental ValidationTalha Duman, Talip Tolga Sari, Gökhan Seçinti. 1-6 [doi]
- Robust Vehicle Localization Based on Adaptive DOA Estimation and UKF under Varying Interference ConditionsDou Hu, Pengfei Lin 0005, Manabu Tsukada. 1-2 [doi]
- Safe RAN Slicing in O-RAN: Minimizing SLA Violations via Model-Based Reinforcement LearningAerman Tuerxun, Akihiro Nakao. 1-6 [doi]
- Statistical Analysis and Optimization of the MFA Protecting Private KeysMahafujul Alam, Julie Heynssens, Bertrand Cambou. 1-2 [doi]
- CacheFormer: User-Centric Cache Prediction for Personal Vehicles using AutoFormer NetworkSouleymane Dembele, Mohammed A. Jasim. 1-6 [doi]
- The Travel-and-Offload Problem for Energy-Efficient UAV-Assisted LoRaWAN Data CollectionLorenzo Perinello, Luigi De Giovanni, Claudio E. Palazzi. 1-6 [doi]
- Comparison of Congestion Controls for LEO Satellite Communications in the WildMotoyuki Ohmori, Kohichi Ogawa, Hiroki Kashiwazaki, Takeshi Ikenaga. 1-6 [doi]
- Reinforcement Learning-Based Joint Optimization of Transmit Power, CCA, and UAV-AP Deployment in Aerial Wi-Fi NetworkYounghoon Kim, Ji Min Park, Heejung Yu. 1-6 [doi]
- INR-Assisted Speculative Spatial Audio Transmission for Zero-Delay Cloud GamingTomoki Kamise, Sorachi Kato, Takumasa Ishioka, Tatsuya Fukui, Tsubasa Okamoto, Toshihito Fujiwara, Satoshi Narikawa, Shunsuke Saruwatari, Takuya Fujihashi. 1-6 [doi]
- FaithFL: Trust-Weighted Federated Learning under Byzantine Threats for Resource-Constrained IoTRavi Gupta, Guneet Bhatia, Rahul Pratap Singh. 1-2 [doi]
- MilliSARImageNet: A 2D High-Resolution Millimeter-Wave SAR Image DatasetLhamo Dorje, Nihal Poredi, Jordan Madden, Soamar Homsi, Yu Chen 0002, Xiaohua Li. 1-6 [doi]
- Beyond Sub-6 GHz: Leveraging mmWave Wi-Fi for Gait-Based Person IdentificationNabeel Nisar Bhat, Maksim Karnaukh, Jakob Struye, Rafael Berkvens, Jeroen Famaey. 1-6 [doi]
- Edge Computing for Resilient Critical Infrastructure: Concepts and Research DirectionsAnders Lindgren. 1-4 [doi]
- Comparative Advantage in Wireless Access NetworksLin Cheng 0006, Bernardo A. Huberman. 1-2 [doi]
- DRAGON: Powering RU-Switching for a Green, QoS-Guaranteed and Compute-aware O-RANAkanksha Sharma, Sharda Tripathi. 1-6 [doi]
- Automating the Deployment of 5G Testbeds Across Diverse Open-Source Software StacksSimeon Wuthier, Fernando J. Cintrón, Bin Hu, Doug Montgomery. 1-2 [doi]
- Protecting Popular Content in FIFO Cache on FPGA-Based ICN RouterYusaku Hayamizu, Takaya Miyazawa, Hitoshi Asaeda. 1-2 [doi]
- ECG-Based Biometric Authentication: A Comprehensive Survey of Methods, Challenges, and Future DirectionsMatthew Ogbe, Mehrab Hosain, Manki Min. 1-2 [doi]
- 3-LPWA: Chirp-Coded Coherent LPWAAkihiro Nakao. 1-7 [doi]
- Efficient Placement of Quantum Memory in Quantum NetworksSatoshi Morita, Noriaki Kamiyama. 1-6 [doi]
- Seeing is Believing? Understanding Truth in Synthetic MediaCamilla Totti, Roberto Cavicchioli, Marco Furini, Giacomo Tagliani. 1-4 [doi]
- Evaluating Effective Quantum PUF Circuits for Authentication ApplicationsFranco Cirillo, Christian Esposito 0001. 1-6 [doi]
- Frequency-Informed Encoder-Decoder Models with Expressivity for Time Series Anomaly DetectionDaichi Fushihara, Yuka Hashimoto, Yoichi Matsuo. 1-6 [doi]
- CAMNet: Leveraging Cooperative Awareness Messages for Vehicle Trajectory PredictionMattia Grasselli, Angelo Porrello, Carlo Augusto Grazia. 1-6 [doi]
- A Hybrid Machine Learning Framework for Enhancing Energy Efficiency in Cyber-Physical Cognitive Radio Sensor NetworksAmrit Mukherjee, Rudolf Vohnout, Milos Prokýsek, Pavan D. Paikrao. 1-6 [doi]
- PLS Analysis of NOMA-Aided STAR-RIS Network Under Colluding and Non-Colluding EavesdroppersAbdullah Al Mamun, Neji Mensi, Danda B. Rawat. 1-2 [doi]
- Adaptive Semantic Communications for Time-Critical 6G Wireless NetworksMd. Bokhtiar-Al-Zami, Atit Pokharel, Dinh C. Nguyen. 1-6 [doi]
- Ultra-Fast Throughput Estimation based on Intelligent Network SamplingRivka Buskila, Amit Waizman Israel, Ran Dubin. 1-6 [doi]
- Load-aware Ground Station Assignment for Low Earth Orbit Satellite NetworksSongshi Dou, Jinxian Wu, Zehua Guo 0001, Kwan L. Yeung. 1-2 [doi]
- Efficient Index-Based Multi-User Scheduling for Mobile mmWave Networks: Balancing Channel Quality and User ExperienceAndrew Stratmann, Morteza Hashemi. 1-6 [doi]
- An Exemplary Platform of Integrated sAV/sUAS System for VHF/UHF-Band Video-Based Navigation in Extreme-Terrain EnvironmentsWookwon Lee, Md Shahadat Hossen. 1-4 [doi]
- A Theoretically-Grounded Codebook for Digital Semantic CommunicationsLingyi Wang, Rashed Shelim, Walid Saad 0001, Naren Ramakrishnan. 1-6 [doi]
- A Graph-Based Optimization Approach for Resilient EV Rerouting in Disrupted Charging NetworksMd Rakibul Ahasan, Shahriar Rahman Fahim, Rachad Atat, Abdulrahman Takiddin. 1-6 [doi]
- Resource-and-Latency-Aware PSO - A novel algorithm for intelligent and contextual cloud native resource schedulingTomás Dias, Karima Velasquez, Luís Ferreira, Diogo Fevereiro, Luís Rosa 0001, Luís Cordeiro. 1-6 [doi]
- Dynamic End-to-End Network Slicing for Safe and Reliable Teleoperation Use CasesXhulio Limani, Miguel Camelo Botero, Joris Finck, Bart Lowyck, Johann M. Márquez-Barja, Nina Slamnik-Krijestorac. 1-2 [doi]
- Digital Twins and Federated Learning in Industrial IoT: Worker-Centric Safety PerspectivesMarcello Pietri, Matteo Martinelli, Fabio Turazza, Giorgia Bertacchini, Marco Picone, Marco Mamei. 1-6 [doi]
- Over-the-air Demonstration of Quantum-Annealing-Aided Multi-user Detection in MIMO-OFDM SystemsKouki Yonaga, Kenichi Takizawa. 1-2 [doi]
- How to Improve Federated Learning in Consumer Applications? Detect and Exclude Bad ClientsRaman Zatsarenko, Sergei Chuprov, Dmitrii Korobeinikov, Leon Reznik, Adrian Peña. 1-6 [doi]
- Exploring Consumer IoT for Cardiac Care: Lightweight ECG-Based AFib Screening on SmartphonesAngad Pal Dhanoa, Zahra Najafi, Mohammed Eltayeb. 1-4 [doi]
- Federated Learning Driven Multi-Modal User Scheduling for 5G Communication SystemsAi Kagawa, Imtiaz Ahmed. 1-6 [doi]
- Deep Reinforcement Learning-Based Beam Hopping Optimization in LEO Satellite NetworksYoubin Kim, Howon Lee. 1-6 [doi]
- Guardrailing LLM and Agentic Decisions for 6G AI-RANYun Tang 0003, Mengbang Zou, Weisi Guo, Syed Ali Raza Zaidi. 1-4 [doi]
- Investigation of effectiveness of unicast communication using NR-V2X communication in cooperative automated drivingShota Matsumoto, Onur Alparslan, Kenya Sato. 1-2 [doi]
- Zero-Knowledge Proof-based Verification Method for Reliable Spatial Information DistributionMasashi Kobayashi, Hideaki Miyaji, Hiroshi Yamamoto. 1-6 [doi]
- JKA-HT: A Provably Secure Replay-Resilient Authentication Protocol for IoDNavya Sivaraman, Niklas Carlsson, Simin Nadjm-Tehrani. 1-7 [doi]
- BIER-Star: Stateless Geographic Multicast for Scalable Satellite-Terrestrial IntegrationMostafa Abdollahi, Wenjun Yang, Jianping Pan 0001. 1-6 [doi]
- Game of Nodes: Securing the SCADA Realm through Optimized Network Sensor PlacementDouglas Healy, Karl M. Olson, Gedare Bloom. 1-6 [doi]
- Ultra-Low Latency Video Synthesis of Split-Screen Processing for Real-time Remote SessionsToshihito Fujiwara, Tatsuya Fukui, Satoshi Narikawa. 1-6 [doi]
- Let's get QUIC Securing IP-based Industrial Protocols by ProxyingJorge David de Hoz Diego, Ioannis Zografopoulos, Anca Jurcut. 1-4 [doi]
- Authenticated Key Agreement Protocol for Device-to-Gateway Communication in IoTCong Pu, Jongho Seol, Nohpill Park, Dragan Korac. 1-6 [doi]
- Transferrable Graphon-Based Detection of Adversarial Samples in Power Grid NetworksSalma Aboelmagd, Alyssa Traina, Rachad Atat, Abdulrahman Takiddin. 1-6 [doi]
- Passive Device Fingerprinting for OT Networks Using Byte HistogramsJack Nunnelee, Alex Howe, Mauricio Papa. 1-6 [doi]
- A Study on Timely Content Delivery with FEC for Streaming Services in ICNHikaru Fujinaka, Mikiya Yoshida, Hiroyuki Koga. 1-2 [doi]
- RFC 8981 and the EVPN Scaling: Managing IPv6 Host Route Proliferation in Data CentersVishal Singh, Vinay Tripathi, Mayank Shah. 1-4 [doi]
- Mapping Emotional Dynamics Through Music Consumption PatternsMattia Billa, Marco Furini, Manuela Montangero. 1-6 [doi]
- Is ENF a Good Physical Fingerprint?Mohsen Hatami, Lhamo Dorje, Xiaohua Li, Yu Chen 0002. 1-4 [doi]
- A Cybersecurity Paradox on Quantum Key Distribution (QKD) and a Deterministic Industrial Internet of Things (IIoT) with AI-based Zero TrustTed H. Szymanski. 1-8 [doi]
- Lightweight Blockchain Data Model for Provenance Tracking in Additive-Manufacturing Supply Chains: A Quantitative Performance AnalysisRaddad Almaayn, Henok B. Tsegaye, Ashok Karukutla, Petro Mushidi Tshakwanda, Yonatan Melese Worku, Harsh Kumar, Michael Devetsikiotis. 1-6 [doi]
- A System Model of Real-Time AI-Driven Perception Tasks for IoT DevicesLiam Gregory Worthington, Md. Shirajum Munir, Trinidad Mario Dena, Mostafizur Rahman. 1-2 [doi]
- Adaptive Pattern Reduction for Long-Term Speculative Cloud Gaming SystemsTakumasa Ishioka, Tatsuya Fukui, Toshihito Fujiwara, Satoshi Narikawa, Shunsuke Saruwatari, Takuya Fujihashi. 1-2 [doi]
- Toward a Unified Architecture for Smart Home Energy Monitoring: Requirements, Design, and Use-Case ValidationManuel Andruccioli, Kelvin Olaiya, Alex Testa, Salvatore Bennici, Rares Vasiliu, Cui Congwen, Lin Jingzhe, Lou Kuok Keon, Bao Rui, Wang Taoyuan, Cheng Xinyuan, Zhang Yi, Paola Salomoni, Vittorio Ghini, Chan-Tong Lam, Su-Kit Tang, Giovanni Delnevo. 1-6 [doi]
- Spatio-Temporal SSB Prediction Using Deep Neural Network in 5G Advanced NetworksDigvijay Katyal, Prince Arya, Kwangchul Kim, Nenavath Srinu, Sarvesha Anegundi Ganapathi, Hyunkuk Choi. 1-6 [doi]
- PRISM: Privacy-preserving Inference System with Homomorphic Encryption and Modular ActivationZeinab Elkhatib, Ali Sekmen, Kamrul Hasan. 1-7 [doi]
- Novel Cross-Link Interference-Aware Scheduling for In-Band Full-Duplex 6G Wireless NetworksJanghyuk Youn, Choul-Young Kim, Bang Chul Jung. 1-2 [doi]
- SmartFLow: A Communication-Efficient SDN Framework for Cross-Silo Federated LearningOsama Abu Hamdan, Hao Che, Engin Arslan, Md. Arifuzzaman. 1-6 [doi]
- Traffic Prediction-based Multi-Agent HDRL for Cooperative Resource Allocation in Heterogeneous LEO NetworksYoogyung Jin, Yerin Lee, Howon Lee. 1-6 [doi]
- Scalable Positioning via One-Way Ranging: Beyond Wi-Fi FTM in Dense EnvironmentsYounghun Ha, Hyeonseon An, Jonguk Lee, Joowon Kim, Jeongsik Choi. 1-6 [doi]
- Lightweight and Highly Portable Migration of Extreme Edge Workloads using WebAssemblyShu Sekigawa, Tetsu Joh, Chikara Sasaki, Atsushi Tagami. 1-2 [doi]
- Design of a Unified Monitoring Tool for Detecting Anomalies in High Performance Computing SystemsArin Rahman, Shirley V. Moore, Deepak K. Tosh. 1-2 [doi]
- Spatially Multiplexed Non-vortex OAM Beams for Long-Range High Data Rate CommunicationsFarhana Firdous, Ravi Kadlimatti. 1-2 [doi]
- Radio Jamming Against Device Fingerprinting in Power Line CommunicationsMuhammad Irfan, Maryam Al-Malki, Gabriele Oligeri, Savio Sciancalepore, Bechir Hamdaoui, Javier Hernandez Fernandez. 1-6 [doi]
- Multi-homed wireless networking for intermittently-powered embedded systemsKai Vogelgesang, Ishwar Mudraje, Thorsten Herfet. 1-6 [doi]
- Low-Complexity AFDM Signal Detection for High-Mobility and LEO Satellite CommunicationsCan Zheng, Chung Gu Kang 0001. 1-2 [doi]
- Decentralized Firmware Integrity Verification for Cyber-Physical Systems Using Ethereum BlockchainS. M. Mostaq Hossain, Amani Altarawneh. 1-6 [doi]
- A Novel Prediction-Based 6DoF MR Stream Provisioning Scheme for Layered-Encoded Volumetric VideosLi-Chin Siang, Wen-Hsing Kuo, Pei-Chieh Lin, Chih-Wei Huang, De-Nian Yang. 1-4 [doi]
- Vital Sign Detection and Clutter Discrimination Method Based on MIMO FMCW radarMinjun Cho, Woo Jin Kim, Sung-Ik Jang, Sang-Jun Park, Seung-Hyuk Choi, Jeong-Wook Kim. 1-4 [doi]
- A Semantic Coding Scheme for Robust Image Transmission over Noisy ChannelsAlp Seyhun Canoglu, Talip Tolga Sari, Gökhan Seçinti. 1-6 [doi]
- Bias-Free and Auto-Evolving Generative AI: Design Principles, Architectures, and Reinforcement IntegrationEngin Zeydan, Abdullah Aydeger. 1-6 [doi]
- Software-Controlled Analog Beamforming for Network-Controlled RepeaterJin Nakazato, Go Itami, Yuki Tanaka, Naoya Okubo, Yuki Sasaki, Arokia Nathan. 1-2 [doi]
- Hazard-Aware Multi-UAV Mission Coordination Using DQN for Disaster Relief Supply DeliveryAdam Abdel Karim, Hadi Majed, Nadine Abbas. 1-6 [doi]
- Field-validated Real-time Network-computing-integrated Quality Control with Robot-app Control Coordination for 400-km Remote OperationChe Huang, Karin Umeda, Tomoya Hatano, Tatsuya Shimada. 1-2 [doi]
- An Optical Video Transmission for a High-Resolution Power-over-Fiber Camera SystemYuto Sagae, Tatsuya Fukui, Satoshi Narikawa. 1-6 [doi]
- Demonstration of Distributing Actuators on Conductive Textile for Whole-body Haptic InteractionsTakuto Yoshimoto, Akihito Noda. 1-2 [doi]
- Frugal Ontology Alignment for WoT ServientsMohammed Dahmani, Alexandre Bento, Nadia Yacoubi Ayadi, Lionel Médini. 1-6 [doi]
- SPICE: Structured Pruning for Inference on Constrained Edge DevicesSubhransu Das, Jiaming Cheng, Aniruddha Rakshit, Brijesh Soni, Jayson Boubin, Rajiv Ramnath. 1-6 [doi]
- A Sub-Microsecond HuffYUV-Based FPGA Accelerator for Real-Time Video Compression over High-Bandwidth NetworksTakeo Kurosawa, Keisuke Sugiura, Yoshiki Yamaguchi, Ryouhei Tsugami, Toshihito Fujiwara, Tatsuya Fukui, Satoshi Narikawa. 1-6 [doi]
- Design and Deployment of a Testbed for SmartNIC and Programmable Data Plane ExperimentationJose Gomez, Samia Choueiri, Ali Mazloum, Sergio Elizalde, Amith GSPN, Ali AlSabeh, Elie F. Kfoury, Jorge Crichigno. 1-6 [doi]
- Information Acquisition from a Specific Number of Nodes with Designated Attributes in DTN EnvironmentsKaito Soeda, Yosuke Tanigawa, Hideki Tode. 1-2 [doi]
- MARL-based Traffic Management in Communication Networks: Randomized vs. Traffic-Based Agent DeploymentChristina Alhachem, Mounir Kellil, Abdelmadjid Bouabdallah. 1-6 [doi]
- Smartphones to the Rescue? Recovering Autonomous Vehicles Without Wheels or PedalsHyunseok Kim, Hyogon Kim. 1-6 [doi]
- GraphCue for SDN Configuration Code SynthesisHaomin Qi, Fengfei Yu, Chengbo Huang. 1-2 [doi]
- Adaptive Beamforming for Interference-Limited MU-MIMO using Spatio-Temporal Policy NetworksHossein Mohammadi, Seyed Bagher Hashemi Natanzi, Ramak Nassiri, Bo Tang 0011, Vuk Marojevic. 1-2 [doi]
- A Privacy Preserving Federated Learning-Based Authentication Scheme for Internet of Drones SystemsImage Bhattarai, Cong Pu. 1-6 [doi]
- Bayesian Active Inference for Intelligent UAV Anti-Jamming and Adaptive Trajectory PlanningAli Krayani, Seyedeh Fatemeh Sadati, Lucio Marcenaro, Carlo S. Regazzoni. 1-7 [doi]
- Private Inference at the Extreme Edge: Joint Mixed Precision Quantization and Model Splitting in Multi-Hop IoT NetworksAngelo Trotta, Alfonso Esposito, Luca Sciullo, Luciano Bononi, Marco Di Felice. 1-6 [doi]
- IAR: Multi-Round Cost-Aware Hardening for Endpoint Ransomware DetectionVahid Heydari, Kofi Nyarko. 1-2 [doi]
- Noisy Neighbor Influence in the Data Plane of Beyond 5G NetworksRodrigo Moreira, Larissa Ferreira Rodrigues Moreira, Tereza Cristina M. B. Carvalho, Flávio Oliveira Silva 0001. 1-6 [doi]
- Edge AI for Road Surface Classification: A Smartphone-Based ApproachKelvin Olaiya, Manuel Andruccioli, Giovanni Delnevo, Paola Salomoni, Pietro Manzoni. 1-4 [doi]
- An Adaptable Digital Twin Architecture for Smart and Interoperable Electrical RoadsGauthier Le Tat, Ilyes Ahmim, Abderrezak Rachedi, Ahmed Mebarki, Mohamed Chachoua, Fabrice Vienne. 1-6 [doi]
- Embedded Pilot Code Aided Delay Doppler Domain Channel EstimationTanay Agrawal, Ravi Kadlimatti. 1-4 [doi]
- A Hybrid Quantum-Classical Computing for Tracking Area Management for Future NetworksMbarka Soualhia, Muhammad Asad Ullah, Ping Yu. 1-7 [doi]
- Disaggregated Near-RT RIC for User-Centric RAN Management: A Multi-Agent Bandit ApproachAmr Amrallah, Takahide Murakami, Yu Tsukamoto, Yohei Konishi, Akio Ikami. 1-7 [doi]
- A LoRaWAN-VLC Edge Architecture for AIoT deploymentsSara Blanc, Pietro Manzoni. 1-4 [doi]
- Toward Cost-Efficient LLM Serving: A System-Level Memory Optimization ApproachGeunsik Lim. 1-8 [doi]
- Demonstrating Full End-to-End 5G Network Slicing with Secure Multi-Domain IsolationXhulio Limani, Andreas Gavrielides, Johann Marquez-Barja, Nina Slamnik-Krijestorac. 1-2 [doi]
- Cooperative Sensing and Communication Optimization in ISAC Networks: A Multi-Agent Deep Reinforcement Learning Framework for Tethered UAVsYerin Lee, Howon Lee. 1-6 [doi]
- AI-based Traffic Analysis Attack Mechanism for IoT SystemsHadjar Ould Slimane, Mohamed F. Younis, Yousef Ebrahimi. 1-2 [doi]
- Energy-Efficient Path Planning and Task Scheduling for UAV-Assisted Wireless Networks via Double Dueling Deep Q-Networks with LSTMAmin Ullah, Qazi Mazhar ul Haq, Sajid Ali. 1-4 [doi]
- Draughts: A Jump-Based Anonymous Communication System without Global Knowledge and with Built-In Anonymous RepliesKaiwen Wang, Jiali You 0001, Yang Li, Jun Chen. 1-6 [doi]
- Demo: WiPiCap: Real-time IEEE 802.11ac/ax Compressed Beamforming Report Decoding SystemYusuke Ikemura, Sorachi Kato, Tomoki Murakami, Takeru Fukushima, Takuya Fujihashi, Shunsuke Saruwatari. 1-2 [doi]
- Edge-Local Verification for Post-Quantum Cryptographic Agility in Autonomous UAV SwarmsAbdullah Aydeger. 1-6 [doi]
- Cost-Aware Cyber-Threat Mitigation Framework for Critical Infrastructure EnvironmentArin Rahman, Deepak K. Tosh. 1-6 [doi]
- FAN-F: A Fourier Analysis Network-based Framework for Efficient and Reliable Spectrum Sensing for 5G and BeyondPrapti Patel, Dhaval K. Patel, Brijesh Soni, Miguel López-Benítez. 1-4 [doi]
- TraplessPKE: A Selector-Based, Oracleless, Post-Quantum CryptosystemWai Yip Wong. 1-2 [doi]
- Impact of Query and Non-Query Black-Box Evasion Attacks on UAV Intrusion Detection SystemsSalma Aboelmagd, Layhan Mishra, Muhammad Ismail 0001, Abdulrahman Takiddin. 1-6 [doi]
- Logrα: A DRL-based MPQUIC Scheduler for Managing Periodicity and Heterogeneity in Satellite NetworksMinh Hai Vu, Akihiro Nakao. 1-4 [doi]
- Connectivity-Influence Weighting: A Structural Bias for Graph-Based MARLReda El Marhouch, Salah Chegri, Btissam El Khamlichi, Amal El Fallah-Seghrouchni. 1-6 [doi]
- Quantum Noise-Aware RIS-Aided Wireless Networks Using Variational Encoding and Signal StabilizationShakil Ahmed. 1-2 [doi]
- IDMA for Low-Latency and Massive Connectivity over 6G Non-Terrestrial NetworksYong-Jin Song, Young Seok Lee, Bang Chul Jung. 1-6 [doi]
- Outlier-Ratio Feature Augmentation for Graph-based Intrusion Detection in CAN NetworksAkari Sasaki, Ryo Kurachi, Yutaka Matsubara, Hiroaki Takada. 1-7 [doi]
- Applicability Evaluation of Semantic Communication towards User-Context-Aware Adaptive Content DeliveryYudai Taniguchi, Yuzo Taenaka, Kazuya Tsukamoto. 1-6 [doi]
- Cloudy with a Chance of Anomalies: Dynamic Graph Neural Network for Early Detection of Cloud Services' User AnomaliesRevital Marbel, Yanir Cohen, Ran Dubin, Amit Dvir, Chen Hajaj. 1-7 [doi]
- SCIoT: Design and Evaluation of a Split Computing Framework for Collaborative Inference in the IoTLorenzo Lamazzi, Jun Wu Wang, Francesco Franco, Luca Bedogni. 1-6 [doi]
- Hierarchical RL-Based Slotted ALOHA Protocol with Transmit Power ControlSangho Kim, Junseok Lee, Heejung Yu. 1-2 [doi]
- KAN-AE with Non-Linearity Score and Symbolic Regression for Energy-Efficient Channel CodingAnthony Joseph Perre, Parker Huggins, Alphan Sahin. 1-6 [doi]
- A Unified Lightweight Benchmark for Privacy-Preserving Federated Learning in Cyber-Physical Systems (Fashion-MNIST Case Study)Brice Ockman, Daniel Commey, Garth V. Crosby. 1-6 [doi]
- TRIP-B5G: Traffic classification and Resource allocation using Intelligent PPO in B5G O-RANGunasekaran Raja, Sanjeev A, Krithika Ravishankar, Karthikeyan Arunachalam. 1-4 [doi]
- Geographically Adaptive Fine-Tuning of Deep Learning based Propagation Models in Diverse EnvironmentsTatsuya Nagao, Takahiro Hayashi. 1-6 [doi]
- Indoor Sharing in the Mid-Band: A Testbed Evaluation of Neutral-Host, Cellular Macro & Wi-FiJoshua Roy Palathinkal, Muhammad Iqbal Rochman, Vanlin Sathya, Mehmet Yavuz, Monisha Ghosh. 1-6 [doi]
- Indoor Humidity Estimation Using Differential mmWave Backscatter MeasurementsDavid Robert Popescu, Ajinkya Umesh Mulik, Stijn Wielandt, Mohammed E. Eltayeb. 1-6 [doi]
- Similarity-based Frame Screening for Edge-Cloud In-Cabin MonitoringKenta Azuma, Hayato Itsumi, Koichi Nihei. 1-2 [doi]
- Digital Twin-based Blind Spot Visualization and Real-Time Hazard Notification in AR Glasses: Design and Proof-of-ConceptKaito Morita, Tao Yu, Kei Sakaguchi. 1-6 [doi]
- Efficient Anomaly Detection in Correlated Sensor Data Streams Using Living Correlation in Resource-Constrained EnvironmentsSrihari Varada, Tanish Baranwal, Santanu Das, Arnab Das 0002, Mohammad R. Haider. 1-4 [doi]
- Application of High-Speed Ising Machine based Optimization to Wireless Resource Allocation ProblemsJialu Xing, Jin Nakazato, Maki Arai, Hiroki Takesue, Kazuyuki Aihara, Mikio Hasegawa. 1-2 [doi]
- Demo: IMU-Assisted Flight-Dynamics-Aware AMC for UAVs over SDR-OFDM TestbedBüsra Bayram, Talip Tolga Sari, Debashri Roy, Gökhan Seçinti. 1-2 [doi]
- The impact of CSMA on LoRaWAN gateways' performance in IoT networksTadeusz Czachórski, Krzysztof Grochla, Piotr Pecka, Anna Strzoda, Jean-Michel Fourneau, Lynda Mokdad, Monika Nycz, Tomasz Nycz. 1-2 [doi]
- A Testbed to Evaluate Next-Generation Security Solutions in Cyber-Physical Systems using Hardware AccelerationJose Gomez, Ali AlSabeh, Ali Mazloum, Elie F. Kfoury, Ramy F. Harik, Thorsten Wuest, Jorge Crichigno. 1-6 [doi]
- Digital Over-the-Air Computation with Space-Time Processing for 6G Massive IoT NetworksSaebom Kim, Young Seok Lee, Bang Chul Jung. 1-2 [doi]
- Distributed DQN for Energy-Efficient Small Cell Networks With Traffic and Harvested-Energy PredictionJaeyoung Yun, Howon Lee. 1-2 [doi]
- LEO-CUBIC: TCP Congestion Control for Periodic Bandwidth Fluctuations in LEO Satellite NetworksAkane Suzuki, Akihiro Nakao. 1-7 [doi]
- Provenance of AI-Generated Images: A Vector Similarity and Blockchain-based ApproachJitendra Sharma, Arthur Carvalho, Suman Bhunia. 1-4 [doi]
- Resource-Efficient Distributed Quantum Learning over Wireless Networks with Qubit ReuseShaba Shaon, Atit Pokharel, Alexander Coutras, Avimanyu Sahoo, Dinh C. Nguyen. 1-6 [doi]
- Hexagonal QAM-Based Two-Way Generalized Code Index Modulation Over Nakagami-m Fading ChannelsFatih Cogen, Burak Ahmet Ozden, Erdogan Aydin, Nihat Kabaoglu. 1-4 [doi]
- Global-Local Knowledge-Assisted Joint Source-Channel CodingAkihiro Kuwabara, Yutaro Osako, Sorachi Kato, Toshiaki Koike-Akino, Takuya Fujihashi. 1-6 [doi]
- Lightweight IoT Device Fingerprinting Approach using Locality-Sensitive HashingRoya Taheri, Ehsan Saeedizade, Shamik Sengupta. 1-2 [doi]
- Cyclic Wrap-around Multi-Access Coded Caching with Private CachesDhruv Pratap Singh, Anjana Ambika Mahesh, B. Sundar Rajan. 1-4 [doi]
- Federated DDoS Detection with Clustered Quantization-Aware Training Models for IoRTMatilda Nkoom, Daniel Commey, Yousef Alsenani, Sena G. Hounsinou, Garth V. Crosby. 1-6 [doi]
- BBRv2-TI: A Utility-Guided Congestion Control Algorithm for Tactile Internet over QUICMuhammad Hanif Lashari, Shakil Ahmed 0001, Wafa Batayneh, Ashfaq Khokhar 0001. 1-4 [doi]
- A Real-Time AI-Enabled BLE Indoor Positioing System with Enhanced Accuracy and RobustnessFarzin Ferdowsi, Farzad Ahmadpour, Mehdi Ahmadpour, Navid Ostavar. 1-6 [doi]
- CsiFusionNet: CNN Transformer Fusion for Efficient CSI Feedback in FDD Massive MIMOSung-Uk Huh, Young-Chai Ko. 1-6 [doi]
- Post-Quantum Public Key Infrastructures: Hybrid Certificates, Cryptographic Combiners, and Migration StrategiesAbdullah Aydeger, Engin Zeydan, Awaneesh Kumar Yadav, Madhusanka Liyanage. 1-4 [doi]