Abstract is missing.
- Building a Privacy Web with SPIDEr - Secure Pipeline for Information De-Identification with End-To-End EncryptionNovoneel Chakraborty, Anshoo Tandon, Kailash Reddy, Kaushal Kirpekar, Paul Robert Bryan, Hari Dilip Kumar, Abhilash Venkatesh, Abhay Sharma. 1-3 [doi]
- Enhancing Privacy and Trust in Societal Surveillance through Attribute-Based EncryptionKasturi Routray, Aditya Das, Padmalochan Bera. 1-6 [doi]
- Hate Speech Detection in Low-Resource Languages Hindi, Gujarati, Marathi, and SinhalaEnduri Jahnavi, Animesh Chaturvedi 0001. 7-12 [doi]
- Evaluating Kubernetes Distributions: Insights from Stress Testing ScenariosIbrahim Mohamed Ramadan, Carlo Centofanti, Andrea Marotta, Fabio Graziosi. 13-18 [doi]
- Study of 5G NR Network Against Mixed TrafficChinmay Naik, Shrirang Patil, Mohan Mali, Satish Kumbhar, Sachin Patil. 19-24 [doi]
- NURPS: NUMA- and Reliability-aware Parallelized SFC Deployment in Multi-Core ServersShaik Sameer, Venkatarami Reddy Chintapalli. 25-30 [doi]
- mmTCP: An Adaptive Congestion Control Algorithm for 5G mmWave NetworksDanam Yashwanth Kumar, Veerendra Kumar Gautam, Sangeeta Sharma, Mukesh Giluka. 31-35 [doi]
- ODoQ: Oblivious DNS-over-QUICAditya Kulkarni, Tamal Das, Vivek Balachandran. 36-41 [doi]
- Neural Network-Driven Base Station Selection in Next-Generation Cellular NetworksHarrithha B, Vijeth J. Kotagi, Rahul Thakur. 42-47 [doi]
- Integrated LLM Based Reasoning for safe and Efficient Decision Modeling in Assisted DrivingJaswanth Nidamanuri, Akash Kalasagond, Kasam Rohith Reddy, Sunke Durgaprasad. 48-53 [doi]
- Deep Digital Twin Services for Personalized MPX TreatmentCephas Iko-Ojo Gabriel, Randhir Kumar, Krishna Prasad. 54-59 [doi]
- Use of Agent-based Modeling to Gauge Impact of Lockdown Strategies on Spread of COVID-19 on an Educational CampusVibha Patil, Vinayak Naik. 60-65 [doi]
- Patrol: An Intelligent Surveillance System for Mobile-Free EnvironmentsAritra Dutta Banik, Trisagni Mandal, Anubhab Mukherjee, Sharnabho Chatterjee, Raja Karmakar. 66-71 [doi]
- Resource-Aware Monkeypox Diagnosis: Leveraging High-Capacity and Lightweight Models with Knowledge DistillationAvi Deb Raha, Mrityunjoy Gain, Sudip Kumar Saha, Md Shohanur Rahman, Apurba Adhikary, Rameswar Debnath, Anupam Kumar Bairagi, Sujit Biswas. 72-77 [doi]
- Enhancing Sensor Perception: Integrating Multi-Sensor Data for Robust Sensor PerceptionKajal Gupta, Adit Singhal, Ajit Kumar, Pallab Maji. 78-83 [doi]
- Hybrid Quantum-Classical Transfer Learning for Real-Time Data ProcessingMahesh Babu Chittem, Ashok Kumar Pradhan. 84-89 [doi]
- Limited Training Approach To Model Latent Fingerprint Data For Time-Constrained SolutionsKiran Kumar Ravulakollu, Gottam Sai Nithin Reddy, Mayur Jadhav, Varshith Batti, Varshtih Kumar Vupputuri, Rohith Kumar Polishetty. 90-95 [doi]
- Graph based Conflict-Free Scheduling of Autonomous Vehicles at Unsignalized IntersectionsShraddha Dulera, Ram Narayan Yadav, Manish Chaturvedi. 96-101 [doi]
- Online payment fraud monitoring and detection: Performance analysis of tree-based Ensemble Machine Learning modelsSomnath Bhowmik, Jaydeep Howlader. 102-107 [doi]
- XDATE: eXplainable Deep belief network-based Auto-encoder with exTended Garson AlgorithmSatyam Kumar 0006, Vadlamani Ravi. 108-113 [doi]
- Explainable One Class Classification for ATM Fraud DetectionYelleti Vivek, Vadlamani Ravi, Abhay Anand Mane, Laveti Ramesh Naidu. 114-119 [doi]
- Maximizing Utility and Quality in Smart Healthcare with Incentive Driven Hierarchical Federated LearningHimanshu Singh 0003, Sourabh Patidar, Ajay Pratap, Keiichi Yasumoto. 120-125 [doi]
- Unmasking Rumors on Social Media by Combining Affective Patterns Flow with User BehaviorsAsimul Haque, Muhammad Abulaish. 126-131 [doi]
- Enhanced Controller Placement Strategies in SDN: A Gravitational Search Algorithm PerspectiveKhushi Kalra, Abha Kumari, Akash Yadav, Susham Biswas. 132-137 [doi]
- DBSCAN Clustering for User Pairing in Wireless NetworksSharan Mourya, M. Pavan Reddy, SaiDhiraj Amuru, Kiran Kumar Kuchi. 138-143 [doi]
- Automated IoT Device Identification Based on Full Packet Information Using Real-Time Network TrafficSwaroop Dora, Brijesh Peshvani, Ashutosh Kumar, Piyush Tiwari, S. Venkatesan 0002, Sandeep Kumar Shukla, Rahamatullah Khondoker. 144-149 [doi]
- Fourier Feature Extraction with Ensemble Approach for Image based Malware ClassificationAshwini Chikkenakoppa, J. Manish Kumar, M. S. Bhargavi, Pavan Kumar C. 150-155 [doi]
- Intelligent Algorithm for Optimizing Delivery Time in Electric Vehicle Fleet SystemsChanakya Vasantha, Jaishree Mayank, Aman Agrawal, Arijit Mondal. 156-161 [doi]
- Smart-Wi-Cache: A Deep Learning Framework for Online Content Caching at the Wireless EdgeLalfakzuala, Lalhruaizela Chhangte, K. Vanlalawmpuia, Lalengmawia Chhangte. 162-167 [doi]
- TinyAP: A Smart Access Point to detect KRACK on WPA2 Handshake in Wi-Fi using TinyMLAnand Agrawal, Rajib Ranjan Maiti. 168-173 [doi]
- Learning-Based Sensing Mode Selection for ISAC in Intelligent Transportation SystemsRoshan S. Sam, Abhinaba Dey, Sreenath Ramanath. 174-178 [doi]
- Automated Detection of Roadway and Traffic Control Conditions Using On-Board Image ProcessingAshmitha Jaysi Sivakumar, L. Pragati, Sambhavi Roy, Lelitha Devi Vanajakshi. 179-185 [doi]
- Leveraging Edge-cloud for Compute Efficient and Safer Autonomous NavigationPrashanth P. S, Hrushikesh S, Amrit Kumar, Yuvraj Chowdary Makkena, Praveen Tammana. 186-191 [doi]
- Software-Defined Vehicles: The Future of Automobile IndustryTanuku SaiLakshmi Madhuri, J. Bala Vishnu. 192-197 [doi]
- Controllers for Edge-Cloud Cyber-Physical SystemsTingan Zhu, Prateek Ganguli, Arkaprava Gupta, Shengjie Xu, Luigi Capogrosso, Enrico Fraccaroli, Marco Cristani, Franco Fummi, Samarjit Chakraborty. 198-206 [doi]
- Secured and Privacy-Preserving GPU-Based Machine Learning Inference in Trusted Execution Environment: A Comprehensive SurveyArunava Chaudhuri, Shubhi Shukla, Sarani Bhattacharya, Debdeep Mukhopadhyay. 207-216 [doi]
- Murmur: A Secure and Low-Energy Audio Communication for the Internet of BodiesPhani Pavan K, Jagan P, Kurian Polachan, Madhav Rao. 217-224 [doi]
- Investigating WebRTC BBR as an alternative to GCC for live video streamingRebecca Drucker, Aruna Balasubramanian, Anshul Gandhi. 225-232 [doi]
- Biomimetic Robotic System for Efficient Larva Removal in Paddy Fields: A Simulation-Based StudyM. Prasanna Kumari, Jaswanth Nidamanuri. 233-240 [doi]
- Regret-Optimal Policies for Rental CachesRudrabhotla Sri Prakash, Nikhil Karamchandani, Sharayu Moharir. 241-249 [doi]
- PyBlkSim: An Open-Source Block-Based Discrete-Time SimulatorKurian Polachan, Bijeet Basak. 250-257 [doi]
- Energy Harvesting in Multi-Hop UAV-Assisted FSO Communication SystemsPrashant Sharma, Manda Sarvani, Swaminathan Ramabadran. 258-265 [doi]
- Adaptive Load Balancing for Distributed Multi-Controller SDNs through Switch Migration StrategyAllu Sudharshan Rao, Bipal Khanal, Md. Sarfaraj Alam Ansari. 266-274 [doi]
- RETO: Energy-Efficient and Reliable Task Offloading Scheme with Deadline in Fog-Enabled IoT NetworksDasari Rajasekhar, Sanjeet Kumar Nayak. 275-283 [doi]
- Simulating Application Driven Mobile D2D underlay Networks using Gym APISuvadip Batabyal. 284-291 [doi]
- ReputeStream: Mitigating Free-Riding through Reputation-Based Multi-Layer P2P Live StreamingRashmi Kushwaha, Rahul Bhattacharyya, Yatindra Nath Singh. 292-300 [doi]
- Exploiting O-RAN as an Effective Solution for Malicious User LocalizationSteve Azarsh Ratti, Antonio Tuzi, Alex Piccioni, Andrea Marotta, Dajana Cassioli, Fabio Graziosi. 301-307 [doi]
- Adaptive Numerology-based Rate Optimization for enhanced-Vehicle-to-Everything Use Cases in Beyond 5G NetworksNadine Hasan, Abhinav Kumar, Kotaro Kataoka. 308-315 [doi]
- ReLVaaS: Verification-as-a-Service to Analyze Trustworthiness of RL-based Solutions in 6G NetworksXin Tao, Irene Vilà , Swarup Kumar Mohalik, Jordi Pérez-Romero, Oriol Sallent. 316-323 [doi]
- A Lightweight QoS-Aware Resource Allocation Method for NR-V2X NetworksChitranshi Saxena, Deb Mukherjee, Krishna Pal Thakur, Sadananda Behera, Basabdatta Palit. 324-331 [doi]
- Smart Sensing Framework Using Kolmogorov-Arnold Networks for Enhanced Detection in 5G EnvironmentsPrapti Patel, Dhaval K. Patel. 332-339 [doi]
- Location Assisted Beamforming for LEO-Satellite based 6G Direct-to-Cell ConnectivityChaithanya Velampalli, B. V. Sudhakar Reddy, Suvra Sekhar Das. 340-347 [doi]
- Leveraging Benford's Law for Effective Intrusion Detection in MQTT-IoT NetworksMunmun Swain, Charugundla Lakshmi Nishitha, Meghana Maganti, Kamalakanta Sethi, Nikhil Tripathi. 348-355 [doi]
- IRS-Assisted SWIPT: Power Optimization Strategies for Green CommunicationsPradeep Vishwakarma, Samarendra Nath Sur, Sourav Dhar, Dipanjan Bhattacharjee. 356-364 [doi]
- Impact of Receiver Orientation on the QoS of the VLC- Enabled Flying Base Station NetworkAnkana Das, Kirtan Gopal Panda, Murala Laxmi Naresh Kumar, Debarati Sen, Sandip Chakraborty 0001. 365-372 [doi]
- Cross-Compatible Encryption Adapter for Securing Legacy Modbus DevicesAditya Patil, T. S. Sreeram. 373-380 [doi]
- DAFLB: Dynamic Adaptive Fuzzy Based Load Balancing with Genetic Optimization for Enhanced Cloud PerformanceMadhav Khatri, Faisal Ahmed, Mushtaq Ahmed. 381-388 [doi]
- Physical Layer Security for Amplify-and-Forward Relay Aided Cognitive Radio NetworksAbhilash Goswami, Shilpa Rao 0001, Salil Kashyap. 389-396 [doi]
- A Robust Framework for Online Fault Detection in Environmental Monitoring Using Pretrained Probabilistic ModelsRitwik Dash, Kasturi Gyanaguna Sagar, Mamata Jenamani. 397-404 [doi]
- Physics Driven Analysis of STAR-RIS Based CommunicationDurga Prasad Purbey, Sandip Ghosal, Arijit De. 405-412 [doi]
- RAG-inspired Intent-Based Solution for Intelligent Autonomous NetworksUma Maheswari Natarajan, Raghuram Bharadwaj Diddigi, Jyotsna Bapat. 413-421 [doi]
- FedLabeling: A Federated Framework for Handling Noisy Labeled Data for Efficient Alarm DetectionSatheesh K. Perepu, M. Saravanan. 422-429 [doi]
- Optimized UAV Trajectory Design within Multi-Charging Station Scenario in the ISAC FrameworkKunj Kanzariya, Dhaval K. Patel. 430-438 [doi]
- Scheduling Big Machine Learning Tasks on Clusters of Heterogeneous Edge DevicesSaumya Mathkar, Shreya Aiyer, Yashovardhan Bapat, Pinki Pinki, Arnab K. Paul, Vinayak Naik. 439-447 [doi]
- Performance Analysis and Predictive Modeling of MPI Collective Algorithms in Multi-Core Clusters: A Comparative StudyManideep Raya V. S. R. S. Reddy, Sanjay Ramapogu Raju, Girish K. K, Biswajit Bhowmik. 448-455 [doi]
- Ranking-based Diversified Influence Maximization for Dynamic Social NetworksSunil Kumar Meena, Shashank Sheshar Singh, Kuldeep Singh 0003. 456-464 [doi]
- An FL-based Energy-Efficient Opportunistic Intelligent Node Selection Scheme for Healthcare IoV ApplicationsPallati Narsimhulu, Rashmi Sahay. 465-472 [doi]
- Analysis of Analogue-Domain Energy-Based Low-Power Wake-Up Receivers in Coloured NoiseGanesan Thiagarajan, Sanjeev Gurugopinath. 473-480 [doi]
- Phish-Blitz: Advancing Phishing Detection with Comprehensive Webpage Resource Collection and Visual Integrity PreservationDuddu Hriday, Aditya Kulkarni, Vivek Balachandran, Tamal Das. 481-488 [doi]
- Performance Analysis of Resource Allocation Algorithms for Vehicle Platoons over 5G eV2X CommunicationGulabi Mandal, Anik Roy, Basabdatta Palit. 489-497 [doi]
- IoT enabled Battery Monitoring System (BMS) for Industrial, Commercial and Home ApplicationsShubham Madane, Priyusha K. R, Ashutosh Singh, T. Praveen Kumar, Vishal J. Rathod, Kaushik Nanda, Hari Babu Pasupuleti, S. D. Sudarsan. 498-506 [doi]
- RIS-assisted OFDM-based SWIPT SystemEmani N. S. S. Anjana, Neha Sharma, Sumit Gautam. 507-513 [doi]
- Advancing Software-Defined Vehicles: An End-to-End Framework with Digital Twin Based Attestation for OTA UpdatesKrish Agrawal, Rohan Jha, Nishkarsh Luthra, Pilla Venkata Sekhar, Hrishesh Sharma, Gourinath Banda. 514-522 [doi]
- TEIMA - Telecom Equipment Installation Multimodal AssistantNarayana Sastry, Balvinder Singh, Sujoy Roychowdhury, Avantika Sharma, Anushka Gupta, Sourav Mazumdar. 523-530 [doi]
- Efficient Downlink Channel Allocation in 6G HetNet: An Auction-Based ApproachLinuskrishna Rajbongshi, Sanjib K. Deka. 531-539 [doi]
- CrossTenet: Enforcing Validity Rules across BlockchainsAditya Ahuja, Sachin Lodha. 540-548 [doi]
- Deep Learning-based Randomness Assessment of Quantum Random Number GeneratorsHamid Tebyanian. 549-556 [doi]
- Efficient Human Activity Recognition using Deep Unfolding in 802.11bf Wi-Fi SensingRaj N. Dave, Dhaval K. Patel. 557-565 [doi]
- Towards Generating a Robust, Scalable and Dynamic Provenance Graph for Attack Investigation over Distributed Microservice ArchitectureUtkalika Satapathy, Harsh Borse, Sandip Chakraborty 0001. 566-574 [doi]
- DACC-Comm: DNN-Powered Adaptive Compression and Flow Control for Robust Communication in Network-Constrained EnvironmentEmon Dey, Anuradha Ravi, Jared Lewis, Vinay Krishna Kumar, Jade Freeman, Timothy Gregory, Niranjan Suri, Carl E. Busart, Nirmalya Roy. 575-583 [doi]
- Performance Evaluation of 5G Core Network Control-Plane Using Open5GS and KubernetesSooraj Subramanian M. S, Madhan Raj Kanagarathinam, Krishna M. Sivalingam. 584-592 [doi]
- ParaDSP: Parallelism-aware Dynamic SFC Placement in NFV-based NetworksVenkatarami Reddy Chintapalli, Rajat Partani, Balaprakasa Rao Killi, Bheemarjuna Reddy Tamma. 593-601 [doi]
- Adaptive Moving Target Defense in Web Applications and Networks using Factored MDPMegha Bose, Praveen Paruchuri, Akshat Kumar. 602-613 [doi]
- TCP-Cubiwood: Enhanced Cubic Congestion Control for mmWave and Future NetworksUjjayant Prakash, Anand M. Baswade. 614-622 [doi]
- PolluSenseCheck: Cost Effective TinyML-based Air Quality Monitoring System with In-Built Sensor Fault DetectionArko Datta, Joyita Chakraborty, Pabitra Majhi, Astom Mondal, Satyaki Roy, Subrata Nandi, Sujoy Saha. 623-631 [doi]
- Trust-Based Security Solution for Attack Detection in Cognitive Radio Sensor NetworksPrathana Saikia, Sanjib Kumar Deka, Monisha Devi. 632-640 [doi]
- Incidence Detection and Communication with Intelligent Transport Network Digital TwinM. Saravanan, Ahmet Cihat Baktir. 641-649 [doi]
- IoT-based Water Disaggregation in IWS System using ML and DL TechniquesS. Padole, P. S. Reddy, R. Yelekar, N. Nilesh, S. Chaudhari. 650-657 [doi]
- A Scalable and Fault-Tolerant 5G Core on KubernetesSourav Paul, Tanvi Keluskar, Mythili Vutukuru. 658-666 [doi]
- AutoPAC: Exploring LLMs for Automating Policy to Code Conversion in Business OrganizationsNeha Chowdhary, Tanmoy Dutta, Subhrendu Chattopadhyay, Sandip Chakraborty 0001. 667-675 [doi]
- Active Rule Mining for Multivariate Anomaly Detection in Radio Access NetworksEbenezer R. H. P. Isaac, Joseph H. R. Isaac. 676-684 [doi]
- Physical Resource block Allocation in Private 5G Network for handoff Free operationsAlok Mathur, Amrutur Bharadwaj. 685-693 [doi]
- Few-Shot Learning for Structure Extraction from Heterogeneous Log DataPranjal Gupta, Debanjana Kar, Harshit Kumar, Prateeti Mohapatra, Pooja Aggarwal. 694-702 [doi]
- Improving VR Performance in WiFi-6 using Deep Reinforcement Learning based Spatial ReuseAyush N. Patel, Dhaval K. Patel. 703-711 [doi]
- Delay and Energy Efficient Multipath Selection for Achieving Hard Reliability in MC-IoT NetworkSoumya Nandan Mishra, Manas Khatua. 712-720 [doi]
- Towards Secure AI-driven Industrial Metaverse with NFT Digital TwinsRavi Prakash, Tony Thomas. 721-729 [doi]
- Flexiswap: A Cross-Chain Decentralized Exchange ProtocolKirti Singh, Vinay J. Ribeiro, Susmita Mandal. 730-738 [doi]
- Achieving time-critical control in Edge Robotics Systems over 5GAmit S. Baxi, Vincent Mageshkumar, Girish S. Murthy, Arvind Merwaday, Arvind Raju, Gowtham Hosamane, Sugnan Prabhu, Venkat Natarajan, Susruth Sudhakaran, Dave Cavalcanti 0001, Atul N. Hatalkar, Christian Maciocco, Ravishankar Iyer, Rath Vannithamby. 739-747 [doi]
- Fixed Budget Bayesian Best Arm Identification in Unimodal BanditsDebamita Ghosh, Manjesh Kumar Hanawal, Nikola Zlatanov. 748-756 [doi]
- BeeGuard: Explainability-based Policy Enforcement of eBPF Codes for Cloud-native EnvironmentsNeha Chowdhary, Utkalika Satapathy, Theophilus Benson, Subhrendu Chattopadhyay, Palani Kodeswaran, Sayandeep Sen, Sandip Chakraborty 0001. 757-765 [doi]
- Dynamic Load Balancing on Switches of Software Defined Network Managed by OpenDayLight ControllerManasa Kulkarni, Bhargavi Goswami, Muhammad Furqan, Joy Paulose. 766-773 [doi]
- Digital Twin-based Dynamic Resource Provisioning Using Deep Q-Network on 6G-enabled Mobile Edge NetworksSuja A. Alex, Neha Singh, Mainak Adhikari. 774-781 [doi]
- A link-quality-aware grouping-based efficient routing scheme in Software-Defined Vehicular NetworksMadhuri Malakar, Judhistir Mahapatro. 782-789 [doi]
- Temporal Deepfake Detection using CNN with Spatio-Temporal FeaturesSoundarya B. C, H. L. Gururaj. 790-792 [doi]
- PulmoWave: Pulmonary Disease Detection Using mmWave SensingSagnik Ghosh, Sandip Chakraborty 0001. 793-795 [doi]
- Integrated IoT Framework for Robust Data Transfer using Drones and VAMAN in Sensitive EnvironmentJayati Dutta, Mustafa Shaik, Ram Sai Tangallamudi. 796-798 [doi]
- Intel-Switch: Optimized Adaptive Protocol Selection Mechanism for Video Streaming ApplicationSapna Chaudhary, Sandip Chakraborty 0001, Mukulika Maity. 799-801 [doi]
- Indian Sign Language recognition and translation: An Encoder-Decoder ApproachVibhor Sharma, Anurag Singh 0001, Sabrina Gaito. 802-804 [doi]
- Missing Value Imputation for IoT data: With Applications to Reefer Container MonitoringSourav Bagchi, Mamata Jenamani, Aurobinda Routray. 805-807 [doi]
- Detection of Phishing Activities Using Deep Learning ApproachesGurushankar H. B, H. L. Gururaj. 808-810 [doi]
- SlidEar: Exploring eSense in-Ear Wearable for Voice-Assisted Smart Slide SupervisionSusmita Mondal, Sameeran Ravishankar Zingre, Suchetana Chakraborty. 811-813 [doi]
- ZTAAC : Zero Trust Adaptive Authorization with CP-ABE for Context-Aware Data ProtectionKasturi Routray, Padmalochan Bera. 814-816 [doi]
- A Game-Theoretic Approach for Cost-Effective and Reliable Task Offloading in Fog-enabled IoT NetworksDasari Rajasekhar, Sanjeet Kumar Nayak. 817-819 [doi]
- Distributed learning with partial information sharingP. Raghavendra Rao, Pooja Vyavahare. 820-822 [doi]
- Adapt3D: Lightweight and Adaptive 3D Detection Framework for Mobile GPUsPengcheng Wang, Shayok Bagchi, Yin Li 0003, Somali Chaterji. 823-827 [doi]
- Unlocking Eye Gestures with Earable Inertial Sensing for Accessible HCIGarvit Chugh, Suchetana Chakraborty 0001, Sandip Chakraborty. 828-832 [doi]
- Monitoring of Speed Breaker Violations with RoadHAWKRudhir Chandra Mahalik, Prasant Misra, Punit Rathore. 833-836 [doi]
- Flood and Loot Attack in Distributed Routing Protocols in PCNsNeeraj Sharma, Kalpesh Kapoor. 837-841 [doi]
- Efficiency Redefined: Impact of Reducing Data Acquisition Rate for Optimized TinyML in Resource-Constrained IoT DevicesBidyut Saha, Riya Samanta, Soumya K. Ghosh 0001, Ram Babu Roy. 842-846 [doi]
- QBSD: Quartile-Based Seasonality Decomposition for Cost-Effective RAN KPI ForecastingEbenezer R. H. P. Isaac, Bulbul Singh. 847-851 [doi]
- Reputation-Based Classification for Malicious User Detection in Cognitive Radio NetworksAshutosh Nath Tiwari, Ankit Chouhan, Ashok Parmar, Kamal M. Captain. 852-856 [doi]
- OFDM Signal Modulation Classification using Dilated CNN ModelShah Riddhi, Ashok Parmar, Ankit Chouhan, Kamal M. Captain. 857-861 [doi]
- LP-GRU Model: A Graph Analytics Approach to Detect Misinformation Infiltrators in Online CommunitiesDevlina Karmakar, Mariana Curado Malta, Giridhar Maji, Animesh Dutta. 862-866 [doi]
- Identifying CIP-centric Attacks in CPSPraneeta Maganti, Rajib Ranjan Maiti, Sridhar Adepu. 867-870 [doi]
- GenCPruneX: Adaptive Channel-wise Pruning for Efficient TinyML Deployment with Genetic Multi-Objective OptimizationBidyut Saha, Riya Samanta, Soumya K. Ghosh 0001, Ram Babu Roy. 871-875 [doi]
- Learning Non-cooperative Driving Practices and its Impact on Road Traffic DynamicsOsho, Suchetana Chakraborty. 876-880 [doi]
- TruChain: A Blockchain-based Access Control to Improve the Security of Smart Water Grid SystemsSusmita Mondal, Suchetana Chakraborty. 881-885 [doi]
- Robust Entropy-Based Detectors for Cooperative Wideband Compressive Spectrum Sensing under Laplacian NoiseBandaru Bhavana, Samrat L. Sabat, Namburu Swetha, Trilochan Panigrahi. 886-890 [doi]
- MARM-HyLiWi: Mobility-Aware Rate Maximization in Link Aggregation Enabled Hybrid Li-Fi/Wi-Fi NetworksSaswati Paramita, Rajorshi Mondal, Arani Bhattacharya, Vivek Ashok Bohara, Anand Srivastava. 891-894 [doi]
- IrriSmart-An IoT Testbed for a Resilient Smart Indoor Irrigation SystemShakti Prasad Maharana, Siba Prasad Maharana, Sadananda Behera, Basabdatta Palit. 895-898 [doi]
- Intelligent Cost-Effective Electric Vehicle Charging Solutions for Cities and Highway NetworksAkshat Lohia, Aadesh Pochhi, Shivansh Mishra, Nilotpal Chakraborty. 899-902 [doi]
- Multi-Arm Bandits with Path-Dependent RewardsPrathamesh Karandikar, Sharayu Moharir. 903-906 [doi]
- A Low-Power Low-cost System for Disaster Locations Detection using ESP32 CAM and TinyMLRiya Samanta, Bidyut Saha, Soumya K. Ghosh 0001. 907-910 [doi]
- TGNN-Bet: Approximation of Temporal Betweenness Centrality using Temporal Graph Neural NetworkSrestha Sadhu, Kusum Kumari, Amrita Namtirtha, Mariana Curado Malta, Animesh Dutta. 911-915 [doi]
- Robust Angle of Arrival Estimation in Multi UE TransmissionRoshan S. Sam, Sreenath Ramanath. 916-920 [doi]
- Function Scheduling with Data Security in Serverless Computing SystemsSrestha Saha, Arvind Pandey, Sourav Kanti Addya, Shubha Brata Nath. 921-925 [doi]
- Identification of Phishing Mechanism of the Mastermind of Anomaly Community in the Social NetworksSarjita Soo, Nilanjana Saha, Amrita Namtirtha, Animesh Dutta. 926-930 [doi]
- Outage Analysis of Hybrid VLC/Multi-IRS-aided RF Communication SystemKishan Tripathi, Swaminathan Ramabadran. 931-935 [doi]
- Low-Complex Frame Synchronization in Narrowband OFDM SystemsPankaj Kumar Roy, Roshan S. Sam, Vishal Kalkundrikar, Sreenath Ramanath. 936-939 [doi]
- Fortifying the 5G Core: Analysing and Detecting DoS Attack from Compromised NFs using HTMMeenu Rani Dey, Ashish Bharti, Moumita Patra. 940-944 [doi]
- Quantum Convolutional Neural Networks based Human Activity Recognition using CSISyed Mohammed Danish, Sudhir Kumar. 945-949 [doi]
- TMGCN-ATT: A Traffic Prediction Model with Multi-Hop GCN and Self-Attention MechanismsSrestha Sadhu, Deepanwita Mallick, Amrita Namtirtha, Animesh Dutta. 950-954 [doi]
- DyPSS: Dynamic Priority Signalling System for Emergency Vehicles using Fog and YOLOv8Anuj Kakde, Shubha Brata Nath, Soumya K. Ghosh 0001. 955-959 [doi]
- Cloud-Assisted Autonomous Driving over Wireless NetworkNajiya Naj, Debopam Bhattacherjee, Arani Bhattacharya. 960-964 [doi]
- Next-Level Intrusion Detection: Multilayered Security for Future Generation 6G NetworksMisbah Shafi, Rakesh Kumar Jha, Sanjeev Jain. 965-968 [doi]
- A Knowledge Discovery Framework for Maritime Intelligence on Dark VesselsBharat Jayaswal, Soumya K. Ghosh 0001. 969-973 [doi]
- Drone-Assisted Load Distribution Framework for Traffic Optimization in IoT NetworksPriyanka Soni, Omkar Manohar Mense, Sourav Kanti Addya. 974-978 [doi]
- Collaborative Deadline-sensitive Multi-task Offloading in Vehicular-Cloud NetworksPrasanna Kumar, Sushma S. A, K. Chandrasekaran, Sourav Kanti Addya. 979-983 [doi]
- A Multi-Modal Smart Switching Based Image Transmission Using Semantic CommunicationSanjana Tiwari, Sharda Tripathi, Sandeep Joshi, Priyanshu Bhatt, Balasubramaniam Natarajan. 984-988 [doi]
- Optimizing RIS Block Selection for Power ConsumptionIshaan Sharma, Rohit Kumar 0003, Sumit Jagdish Darak. 989-993 [doi]
- Pilot-Enhanced RNN-Aided Channel Estimation for Vehicular CommunicationSyed Asrar ul Haq, Sumit Jagdish Darak. 994-997 [doi]
- Performance Analysis of an Underwater Partitioned IRS-Assisted VLC Link With Energy HarvestingHimani Mehta, Rohit Kumar, Shankar Prakriya. 998-1002 [doi]
- QoS-Driven Cellular Offloading via IRS in UAV-Assisted 6G NetworksShubham Mourya, Krishnendu T. S, Moumita Patra. 1003-1007 [doi]
- A Joint PSS Detection and Frequency Offset Estimation Algorithm for 5G NR CommunicationSrinivasan Kannan, Sandeep Joshi, Amrith Aathmaram, Gayathri Srinidhi, Rohit Pandey. 1008-1012 [doi]
- Unveiling the Trade-offs: A Parameter-Centric Comparison of Synchronous and Asynchronous Federated LearningSatvik Rajesh, Ishaan Gakhar, Rajeev Shorey, Rohit Verma. 1013-1017 [doi]
- Exploring emerging spreaders through GCN-based link prediction and a novel centrality methodSuman Nandi, Giridhar Maji, Animesh Dutta. 1018-1022 [doi]
- The Concept of Genetic Reverse-Engineering to Restore the Program's Source Code from a Binary Code: Theory and Applying PracticeKonstantin E. Izrailov, Igor V. Kotenko. 1023-1026 [doi]
- Real-time Air Quality Monitoring and Context-aware Alert SystemAnuj Kakde, Yashwant Krishna Pagoti, Sarthak Nikumbh, Prasenjit Karmakar, Sandip Chakraborty 0001. 1027-1031 [doi]
- mmWave Based User Identification using Gait SignaturesDeepraj Das, Soumik Mandal, Ashutosh Golande, Argha Sen, Sandip Chakraborty 0001. 1032-1036 [doi]
- Distributed Sensing and Collaborative Edge Computing for LEO ConstellationsSaumya Jaipuria, Ansuman Banerjee, Himadri Sekhar Paul. 1037-1041 [doi]
- Sustainable Drone Surveillance System Using Eternal Vertex Cover and Periodic ChargingNavya Dhawde, Nilotpal Chakraborty, Mirza Galib Anwarul Husain Baig. 1042-1046 [doi]
- Efficient Collision-Free Motion Planning in Distributed Multi-Robot SystemsOm Sharma, Nilotpal Chakraborty. 1047-1050 [doi]
- Characterizing quantum dynamics using multipartite entanglement generationGaurav Rudra Malik, Rohit Kumar Shukla, S. Aravinda, Sunil Kumar Mishra. 1051-1055 [doi]
- Quantum Network Routing with Heterogeneous NodesAnoop Kumar Pandey, Bheemarjuna Reddy Tamma, M. V. Panduranga Rao. 1056-1061 [doi]
- Software tool-set for automated quantum system identification and device bring upAnurag Saha Roy, Kevin Pack, Nicolas Wittler, Shai Machnes. 1062-1067 [doi]
- Quantum Variational Singular Value Decomposition: A new hybrid approach towards quantum image compressionBritant, Abhishek Tiwari. 1068-1073 [doi]
- Variational Quantum Factorization (VQF) using Different Variations of Quantum Approximate Optimization Algorithm (QAOA)Janhavi Hatwar, Nakul Aggarwal, Debanjan Bhowmik. 1074-1079 [doi]
- Evolutionary Quantum Cournot duopoly game in the purview of the modified EWL schemeA. V. S. Kameshwari, S. Balakrishnan 0001. 1080-1084 [doi]
- New Multi-Qubit CHSH Games and their application to Device-Independent Quantum Key Distribution protocolsVenugopal S, Kunwar Singh. 1085-1090 [doi]
- Exploring Optimal and Suboptimal Beamforming Solutions Using Weighted Subspace-Search-VQEBidisha Dhara, Monika Agrawal 0002, Sumantra Dutta Roy. 1091-1095 [doi]
- Securing UAV Communications: A Comparative Performance Analysis of Post-Quantum Cryptographic TechniquesPraveen Kumar Sandanamudi, Neha Agrawal, Nikhil Tripathi, Pavan Kumar B. N. 1096-1101 [doi]
- Quantum-Inspired Learning with Hybrid DPD Cost Function and Robust SVD for Noisy ScenariosSubhadeep Mondal, M. Saravanan, Abhik Ghosh. 1102-1107 [doi]
- Benchmarking Quantum Image Representations Algorithms for Hybrid-Quantum applicationsAbhishek Tiwari, Saiyam Sakhuja, Britant. 1108-1113 [doi]
- Laser frequency locking for quantum sensing applications using AI/ML techniquesSrikanth Mangipudi, Rama Theja Avvaru, Gopika Rao Chaganti, Sachin Barthwal. 1114-1117 [doi]
- Performance of DVQKD Protocol Over Gamma Gamma Turbulence ChannelAbhishek Mani Shukla, Neel Kanth Kundu. 1118-1123 [doi]
- Quantum-Enhanced Machine Learning for Precision Breast Cancer DiagnosisAgniva Banerjee. 1124-1129 [doi]
- Improved Performance of Multi-Angle Quantum Approximate Optimization Algorithm (ma-QAOA) Compared to QAOA On Simulation and Experimental Hardware PlatformsVandit Srivastava, Rohith P, Sanyam Singhal, Debanjan Bhowmik. 1130-1135 [doi]
- Implementing Hybrid Quantum Neural Networks for Accurate Wildfire DetectionAryaman Sarda. 1136-1141 [doi]
- Synergistic Beamforming in 6G: Dual-Agent Learning for Secure High-Power Transmission in PIRS-Empowered Wireless SystemsAmmar Summaq, Mukkara Prasanna Kumar, Sunil Chinnadurai. 1142-1147 [doi]
- Streamlined Data Pipeline for Real-Time Threat Detection and Model InferenceRajkanwar Singh, Aravindan V, Sanket Mishra, Sunil Kumar Singh 0001. 1148-1153 [doi]
- Lightweight 2D Chaos-Based Encryption Scheme for Secure Image Communication in UAV ApplicationsRavi Bhargav, Priyanka Singh, P. Vishnu Vardhan. 1154-1159 [doi]
- Self Organized Anchor Group based Routing Protocol for IoT Initial SetupNaveen Kumar Gupta, Apeksha Aggarwal, Rama Shankar Yadav, Rajendra Kumar Nagaria. 1160-1165 [doi]
- RISE: Modular Blockchain-Integrated Enhancements for Reducing Food Waste and Boosting Retail AccountabilityRishika Sharma, Gourinath Banda. 1166-1171 [doi]
- Phase Shift Optimization for Energy-Efficient Uplink Communication in IRS-Aided SystemMukkara Prasanna Kumar, Ammar Summaq, Sunil Chinnadurai. 1172-1177 [doi]
- Finding Influential Nodes using Mixed Centralities in Complex NetworksReddy Priya Madupuri, Sobin C. C, Murali Krishna Enduri, Satish Anamalamudi. 1178-1182 [doi]
- Energy-Efficient Multi-Path Selection to Achieve Hard Reliability for Mission-Critical Data Transmission in Industrial IoTSoumya Nandan Mishra, Manas Khatua. 1183-1188 [doi]
- Interoperability Between OPC-UA and MQTT in Hybrid Industrial IoT(IIoT) EnvironmentsV. D. Panduranga Sai Guptha, Satish Anamalamudi, Reddy Priya Madupuri, Sruthi Sivarajan. 1189-1194 [doi]
- DataDRILL: Resilience Testbed for Industrial Cyber-physical SystemsMurshedul Arifeen, Igor V. Kotenko, Andrei Petrovski 0001, Phil Hassard. 1195-1200 [doi]
- A Review of Energy Information Collection and Exposure in 3GPP Mobile NetworksRashmi Kamran, Pranav Jha, Shwetha Kiran, Pradnya Kiri Taksande, Prasanna Chaporkar, Abhay Karandikar, Manjesh Hanawal. 1201-1205 [doi]
- Enhancing O-RAN's Intent-based Management Standards for Seamless Cross-Layer MobilityNanjangud C. Narendra, Ronak Kanthaliya, Venkatareddy Akumalla. 1206-1210 [doi]
- Use of Channel Occupancy for Multi Link WiFi 7 Scheduler Design in ns-3Puneet Kumar, Jagrati Kulshrestha, Mukulika Maity, Sumit Roy. 1211-1215 [doi]
- Enhancements for Developing a Comprehensive AI Fairness Assessment StandardAvinash Agarwal, Mayashankar Kumar, Manisha J. Nene. 1216-1220 [doi]
- IEEE 802.11ba Frame Adaptations for Improving Power Efficiency in Semantic-SurveillanceA P. Vaideeswaran, Komaragiri Sai Pranav, Mohammed Zafar Ali Khan. 1221-1225 [doi]
- Integrated Terrestrial and Non-Terrestrial-Network Architecture for Edge Caching and Coded Delivery in 3GPP SystemLalhruaizela Chhangte, Ashish Singh Patel. 1226-1229 [doi]
- Zero-Trust Security in 5G and Beyond Networks: An OverviewK. Sowjanya, Dhiman Saha, Brejesh Lall. 1230-1234 [doi]
- Performance Enhancements of Control Channel in Non-Terrestrial Networks for 5G & BeyondM. Santhoshkumar, Abhijeet Abhimanyu Masal, Dony J. Muttath, J. Klutto Milleth. 1235-1239 [doi]
- Standardization aspects of Authentication Relay Attack using False Base StationK. Sowjanya, Soumen Jana, Vipin Kumar, Dhiman Saha, Brejesh Lall. 1240-1245 [doi]
- INDiSI Standard for SOM module InterfaceHemant Jeevan Magadum, Lakshmaiah Alluri. 1246-1249 [doi]
- Requirements for the semantics of a Common User Profile used to personalize audiovisual mediaPradipta Biswas. 1250-1253 [doi]
- On Demand Transmissions of Common Signals for Network Energy SavingDeepak Agarwal, Deepak PM, Sheetal Kalyani, Ramya TR, J. Klutto Milleth. 1254-1258 [doi]
- Securing Legacy Interfaces of 5G Short Message Service Function (SMSF)Rashmi Kamran, Pradnya Taksande, Pranav Jha, Manjesh Hanawal, Prasanna Chaporkar. 1259-1263 [doi]
- Semantic Communication with Networked AI in 6G: Application Scenarios, Insights from Practical Experiments, Standardization AspectsAbhijan Bhattacharyya, Ashis Sau, Suraj Kumar Mahato. 1264-1268 [doi]
- Optimal Tree-Based Mechanisms for Differentially Private Approximate CDFsV Arvind Rameshwar 0001, Anshoo Tandon, Abhay Sharma. 1269-1274 [doi]
- On-Device AI Security Solutions: A Study on Lightweight Ensemble Learning TechniqueHuiyao Dong, Igor V. Kotenko. 1275-1280 [doi]
- Incident Investigation Methodology for Access Violations in Information SystemsMaxim Gorda, Andrey Chechulin, Igor V. Kotenko. 1281-1286 [doi]
- Revisiting Proof of Stake with Reward and Penalty MechanismPankaj Gugnani, Rahul Singh Dhakad, Debanjan Sadhya, W. Wilfred Godfrey. 1287-1292 [doi]
- Categorically Analyzing the Network Traffic in the Snowflake Bridge of TorSibashreeta Dash, Neetu Kumari, Debanjan Sadhya, Bodhi Chakraborty. 1293-1298 [doi]
- Phishing Email Detection Through Machine Learning and Word Error CorrectionDeeksha Kulal, Leul Shiferaw, Quamar Niyaz. 1299-1304 [doi]
- A Statistical Anomaly Detection Approach to Detect Induced Interest Flooding Attacks in NDNChirag Dhiwar, Matta Krishna Kumari, Nikhil Tripathi, Piyush Joshi. 1305-1310 [doi]
- Osmotic Computing Based Secure Resource Orchestration Scheme for Vehicular CommunicationDeepanshu Garg, Mohit Angurala, Rasmeet S. Bali, Neeraj Kumar 0001. 1311-1316 [doi]
- A Cyber-Risk Management Schema for Classifying Literature on Advanced Persistent ThreatsRajesh Kumar 0012, Swapnil Pandey. 1317-1322 [doi]
- LeARN: Leveraging eBPF and AI for Ransomware Nose OutArjun Sekar, Sameer G. Kulkarni, Joy Kuri. 1323-1328 [doi]
- Efficient privacy enabled data sharing in cloud using a novel Homomorphic Proxy Re-Encryption SchemeImtiyazuddin Shaik, Arinjita Paul, Rajan M. A, Divyesh Saglani. 1329-1334 [doi]
- TinyDevID: TinyML-Driven IoT Devices IDentification Using Network Flow DataPriyanka Rushikesh Chaudhary, Anand Agrawal, Rajib Ranjan Maiti. 1335-1340 [doi]
- Kmer_FHE: Secure and Private k-mer Abundance Estimation in GenomicsDivyesh Saglani, Naveen Sivadasan, Harika Narumanchi, Rajan Ma. 1341-1346 [doi]
- A Statistical approach to Event Suppression in Cloud EnvironmentsMudit Verma, Harshit Kumar, Pratibha Moogi. 1347-1349 [doi]
- Demonstration of Dynamic Logging Framework for Cloud Native EnvironmentsDivya Pathak, Mudit Verma, Aishwariya Chakraborty, Harshit Kumar. 1350-1352 [doi]
- Enabling Intelligent Observability Volume ManagementPriyanka Naik, Seep Goel, Eran Raichstein, Kalman Meth, Kavya Govindarajan, Aishwariya Chakraborty, Chander Govindarajan. 1353-1355 [doi]
- Demonstration of an Application Layer Omni-frequency IoT ProtocolNayancy Gupta, Lokesh Peddamalla, Veman Sai Prabhath Mendu, Gourinath Banda. 1356-1358 [doi]
- Sunlight to Signals: Solar Panel as Active Data ReceiverRahul, Vivek Ashok Bohara, Abhijit Mitra, Deepak Solanki, Anand Srivastava. 1359-1361 [doi]
- Demo: An RFSoC-Based Testbed for Over-the-Air Wireless Transceiver at Millimeter Wave FrequencyJeet Tekchandani, Jai Mangal, Sumit Jagdish Darak, Shobha Sundar Ram. 1362-1364 [doi]
- HiPer : An XDR Solution for High Performance Compute Clusters using Zeek and WazuhMaruthi Seshidhar Inukonda, Abhinav Yadav, Priyanka Narang, Bheemarjuna Reddy Tamma. 1365-1367 [doi]
- Eyes on You: TinyML-Powered On-Device Face Tracking for Low-Cost, Low-Power, Secure MCU EnvironmentsRiya Samanta, Bidyut Saha, Soumya K. Ghosh 0001, Ram Babu Roy. 1368-1370 [doi]
- An Interactive Augmented Reality Application for Agriculture using UnityManasvi J. Maasthi. 1371-1373 [doi]
- PResCon: Physiological Response Augmented Continuous Emotion Annotation ToolSwarnali Banik, Akhilesh Adithya, Bivas Mitra, Sougata Sen, Snehanshu Saha, Surjya Ghosh. 1374-1376 [doi]
- Mini Mapper: Cost-Effective Indoor Mapping and Navigation using Nano DroneTejaswi Samavedula, Satyajit Mohapatra, Sanjeet Kumar Nayak. 1377-1379 [doi]