Abstract is missing.
- Cyber Security Risks of Technical Components in Industry 4.0Wataru Matsuda, Mariko Fujimoto, Yoshihiro Hashimoto, Takuho Mitsunaga. 1-7 [doi]
- sEMG-based Regression of Hand Kinematics with Temporal Convolutional Networks on a Low-Power Edge MicrocontrollerMarcello Zanghieri, Simone Benatti, Alessio Burrello, Victor Javier Kartsch Morinigo, Roberto Meattini, Gianluca Palli, Claudio Melchiorri, Luca Benini. 1-6 [doi]
- Inductive Conformal Out-of-distribution Detection based on Adversarial AutoencodersFeiyang Cai, Ali Irmak Ozdagli, Nicholas Potteiger, Xenofon D. Koutsoukos. 1-6 [doi]
- Secure IoT Development: A Maker's PerspectiveOoi Sian En, Razvan Beuran, Yasuo Tan. 1-6 [doi]
- CISCAV: Consensus-based Intersection Scheduling for Connected Autonomous VehiclesEmanuel Regnath, Markus Birkner, Sebastian Steinhorst. 1-7 [doi]
- An Edge AI based Robot System for Search and Rescue ApplicationsChun-Hsian Huang, Shao-Yu Yang, Wei-Ting Huang, Pei-Rong Wu. 1-6 [doi]
- Similarity-Based Clustering For IoT Device ClassificationGuillaume Dupont, Cristoffer Leite, Daniel Ricardo Dos Santos, Elisa Costante, Jerry den Hartog, Sandro Etalle. 1-7 [doi]
- Two Ways Gas Price Oracles Miss The MarkKemal Turksonmez, Marcin Furtak, Mike P. Wittie, David L. Millman. 1-7 [doi]
- Enabling Geospatial Context in an IoT Decentralised Reputation Management System using Ethereum Smart ContractsPonlawat Weerapanpisit, Sergio Trilles, Joaquín Huerta, Marco Painho. 1-6 [doi]
- A Blockchain cloud architecture deployment for an industrial IoT use caseLuc Gerrits, Edouard Kilimou, Roland Kromes, Lionel Faure, François Verdier. 1-6 [doi]
- Baseline Features Extraction from Microelectrode Array Recordings in an in vitro model of Acute Seizures using Digital Signal Processing for Electronic ImplementationGabriel Galeote-Checa, Gabriella Panuccio, Bernabé Linares-Barranco, Teresa Serrano-Gotarredona. 1-6 [doi]
- Utilizing Policy Machine for Attribute-Based Access Control in Permissioned BlockchainSherifdeen Lawal, Ram Krishnan. 1-6 [doi]
- Blind Calibration of Air Quality Wireless Sensor Networks Using Deep Neural NetworksTiago Veiga, Erling Ljunggren, Kerstin Bach, Sigmund Akselsen. 1-6 [doi]
- Secure Cloud Control Using Verifiable ComputationRouhollah Mahfouzi, Amir Aminifar, Soheil Samii, Petru Eles, Zebo Peng. 1-6 [doi]
- Defective Wafer Detection Using Sensed Numerical FeaturesKotcharat Kitchat, Ching-Yu Lin, Min-Te Sun. 1-6 [doi]
- A Replication Study for IoT Privacy PreferencesAhmed Alhazmi, Ghassen Kilani, William Allen, T. J. OConnor. 1-8 [doi]
- An Error Correction Approach to Memristors PUF-based Key EncapsulationAshwija Reddy Korenda, Sareh Assiri, Fatemeh Afghah, Bertrand Cambou. 1-6 [doi]
- Malicious URL Detection using Logistic RegressionRupa Chiramdasu, Gautam Srivastava, Sweta Bhattacharya, M. Praveen Kumar Reddy, Thippa Reddy Gadekallu. 1-6 [doi]
- Runtime Deployment, Management and Monitoring of Web of Things SystemsEge Korkan, Miguel Romero Karam, Sebastian Kaebisch, Sebastian Steinhorst. 1-6 [doi]
- Deriving Smart City Security From the Analysis of Their Technological Levels: a Case StudyVita Santa Barletta, Paolo Buono, Danilo Caivano, Giovanni Dimauro, Antonio Pontrelli. 1-6 [doi]
- A Decentralised Authentication and Access Control Mechanism for Medical Wearable Sensors DataMwrwan Abubakar, Zakwan Jaroucheh, Ahmed Al-Dubai 0001, Bill Buchanan 0001. 1-7 [doi]
- Design of a Reference Architecture for Serverless IoT SystemsNeel Pradip Shah. 1-6 [doi]
- Towards reliable and transparent vaccine phase III trials with smart contractsIvan da Silva Sendin, Rodrigo Sanches Miani. 1-6 [doi]
- CLASA : a Cross-Layer Agent Security Architecture for networked embedded systemsRomain Liévin, Jean-Paul Jamont, David Hély. 1-8 [doi]
- CryptoVault - A Secure Hardware Wallet for Decentralized Key ManagementNiko Lehto, Kimmo Halunen, Outi-Marja Latvala, Anni Karinsalo, Jarno Salonen. 1-4 [doi]
- RL-IoT: Reinforcement Learning to Interact with IoT DevicesGiulia Milan, Luca Vassio, Idilio Drago, Marco Mellia. 1-6 [doi]
- Feasibility study for the implementation of RFID technology in CFRPs componentDaniele Ambrosini, Alessandro Pirondi, Luca Vescovi, Fabrizio Arbucci, Federico Gabba. 1-6 [doi]
- Customer Interaction of a Future Convenience Store with a Mobile Manipulation Service RobotIvanna Kramer, Raphael Memmesheimer, Dietrich Paulus. 1-7 [doi]
- Reliable Probability Intervals For Classification Using Inductive Venn Predictors Based on Distance LearningDimitrios Boursinos, Xenofon D. Koutsoukos. 1-7 [doi]
- A Unipolar-based Stochastic LIF Neuron Design for Low-cost Spiking Neural NetworkKun-Chih Jimmy Chen, Tze-Ling Kuo. 1-6 [doi]
- Data Augmentation of Kinematic Time-Series From Rehabilitation Exercises Using GANsJustin Amadeus Albert, Pawel Glöckner, Bjarne Pfitzner, Bert Arnrich. 1-6 [doi]
- Reinforcement-Learning-based Control of an Industrial Robotic Arm for Following a Randomly-Generated 2D-TrajectoryAtae Jafari-Tabrizi, Dieter P. Gruber. 1-6 [doi]
- SmartSSO - A Deep Learning Platform for Automated Account Linkage in Federated Identity ManagementShirin Dabbaghi Varnosfaderani, Piotr Kasprzak, Christof Pohl, Ramin Yahyapour. 1-8 [doi]
- On automatic extraction of on-street parking spaces using park-out events dataJ.-Emeterio Navarro-B., Martin Gebert, Ralf Bielig. 1-7 [doi]
- A Preliminary Analysis of Hospitalized Covid-19 Patients in Alessandria Area: a machine learning approachMarta Betti, Marinella Bertolotti, Tatiana Bolgeo, Alessio Bottrighi, Antonella Cassinari, Antonio Maconi, Costanza Massarino, Marzio Pennisi, Emanuele Rava, Annalisa Roveta. 1-6 [doi]
- Instruction Extension of RV32I and GCC Back End for Ascon Lightweight Cryptography AlgorithmÖzlem Altinay, Berna Örs. 1-6 [doi]
- Bottlenecks in Blockchain Consensus ProtocolsSalem Alqahtani, Murat Demirbas. 1-8 [doi]
- TEACHING - Trustworthy autonomous cyber-physical applications through human-centred intelligenceDavide Bacciu, Siranush Akarmazyan, Eric Armengaud, Manlio Bacco, George Bravos, Calogero Calandra, Emanuele Carlini, Antonio Carta, Pietro Cassarà, Massimo Coppola, Charalampos Davalas, Patrizio Dazzi, Maria Carmela Degennaro, Daniele Di Sarli, Juergen Dobaj, Claudio Gallicchio, Sylvain Girbal, Alberto Gotta, Riccardo Groppo, Vincenzo Lomonaco, Georg Macher, Daniele Mazzei, Gabriele Mencagli, Dimitrios Michail 0001, Alessio Micheli, Roberta Peroglio, Salvatore Petroni, Rosaria Potenza, Farank Pourdanesh, Christos Sardianos, Konstantinos Tserpes, Fulvio Tagliabo, Jakob Valtl, Iraklis Varlamis, Omar Veledar. 1-6 [doi]
- Task Offloading for Edge-Fog-Cloud Interplay in the Healthcare Internet of Things (IoT)Farshad Firouzi, Bahar J. Farahani, Ehsan Panahi, Mojtaba Barzegari. 1-8 [doi]
- A Microcontroller is All You Need: Enabling Transformer Execution on Low-Power IoT EndnodesAlessio Burrello, Moritz Scherer, Marcello Zanghieri, Francesco Conti 0001, Luca Benini. 1-6 [doi]
- D-MQTT: design and implementation of a pub/sub broker for distributed environmentsLeonardo Staglianò, Edoardo Longo, Alessandro E. C. Redondi. 1-6 [doi]
- Quantification of Uncertainties in Deep Learning-based Environment PerceptionMarco Braun, Moritz Luszek, Jan Siegemund, Kevin Kollek, Anton Kummert. 1-8 [doi]