Abstract is missing.
- An Approximation Algorithm for Minimizing the Number of Distance Constrained Mobile Sinks for Data Collection from Static and Mobile SensorsRohit Kumar 0004, Joy Chandra Mukherjee. 1-9 [doi]
- IRS Aided Integrated Sensing and Communication Under Bistatic ConfigurationRishitha Pulluru, Salil Kashyap. 10-18 [doi]
- RIS-Enhanced Roadside Infrastructure for Robust Non-Line-of-Sight Vehicle-to-Everything CommunicationPallati Narsimhulu, Rajanikanth Aluvalu, Premkumar Chithaluru. 19-27 [doi]
- Sparse Regression Codes for Coherent SIMO ChannelsArpit Kumar, Sai Dinesh Kancharana, Madhusudan Kumar Sinha, Arun Pachai Kannu. 28-32 [doi]
- FAPL-DM-BC: Adaptive Privacy-Aware, Blockchain-Backed FL Framework with Dual-Model XAI for the IoVsSathwik Narkedimilli, Sujith Makam, Narendra Kumar Dewangan, Shrinivas Kulkarni, Chengappa Munjandira. 33-41 [doi]
- A Causal Inference Approach to Optimising Internet Peering AttractivenessMartin Thodi, Amreesh Phokeer, Josiah Chavula. 42-50 [doi]
- Memory-aware Hierarchical Scheduling of ML Tasks in Heterogeneous Clusters of Edge Computing Devices with GPUsSaumya Mathkar, Pinki, Vinayak Naik. 51-59 [doi]
- A Bid-Driven Optimization Framework for Real-Time Electric Vehicle Charging SchedulingAryan Jaiswal, Pranay Ch., Vinay Jain, Malay Kumar. 60-66 [doi]
- Tsetlin Machine-based Network Anomaly Detection SystemBhumika Salvi, Sreenivasa Reddy Yeduri, Ole-Christoffer Granmo, Linga Reddy Cenkeramaddi. 67-74 [doi]
- Joint Cooperative Positioning and Sum Rate Maximization in D2D Enabled NOMA SystemsAbdul Rahim V. C, Chris Prema S. 75-79 [doi]
- Balancing the Edge: Multi-Service Request Allocation in Urban 5G-MEC EnvironmentSupriya Dilip Tambe, A. Antony Franklin. 80-88 [doi]
- Zero-Trust Stealth Authentication for Networked Systems via Port Knocking and TLS FingerprintingGoutami Sooda, S. Chandana, Deepamala N.. 89-97 [doi]
- Energy Efficiency Maximization of Cell-free based THz Cooperative Communication SystemAnupam Shome, Chittotosh Ganguly, Amit Kumar Dutta. 98-103 [doi]
- Dynamic Hybrid Resource Utilisation and MCS-based Intelligent LayeringDhrumil Bhatt. 104-111 [doi]
- Enhancing User Authentication with Wearable Data: Evaluating Sampling Strategies and Classifiers Using Apple Watch Sensor LogsMaharage Nisansala Sevwandi Perera, Allam Shehata, Chi Xu 0003, Xiang Li 0028, Franziska Zimmer, Ryosuke Kobayashi, Mhd Irvan, Rie Shigetomi Yamaguchi, Yasushi Yagi. 112-120 [doi]
- Less is More: Improving WiFi Localization Accuracy with Fewer ScansYamini Shankar, Aravindh Sriram Kumar, Ayon Chakraborty. 121-129 [doi]
- Proactive Self-Aware Multi-Agent Reinforcement Learning for Resource Management in NR-V2X PlatooningRaj Koticha, Dhaval K. Patel, Kirtan Kalaria, Harsh A. Patel. 130-138 [doi]
- In-Orbit On demand AI Model update for Geo Imaging platformsVanukuru Hari Rohit, Raghavendra Kune, D. Mallikharjuna Rao. 139-146 [doi]
- MBT: Multi-Beam Strategy for Best Transmit Beamforming in mmWave CommunicationsDebamita Ghosh, Manjesh Kumar Hanawal, Nikola Zlatanov. 147-155 [doi]
- QPhase: An Extensible Simulator for Phased Entanglement Routing Protocols in Multi-Hop Quantum NetworksManan Patel, Sreyash Mohanty, M. V. Panduranga Rao. 156-164 [doi]
- Context Based Routing using Imitation and Reinforcement Learning for IoT networkPreeth Raguraman, Srinithi N. S, Rajathi Sankaralingam. 165-173 [doi]
- Enhanced Audio Steganography: Audio-in-Audio Steganography with Multi-Bin Phase Coding and Adaptive Post-ProcessingR. Deraj Yojith, Kamalakanta Sethi. 174-182 [doi]
- A Load Balancing Algorithm for multi-IRS aided 6G SystemPreksha Shah, Prasanna Chaporkar. 183-191 [doi]
- Lightweight and Decoupled Distributed Authentication for Multihop IoT NetworksSreeparna Das, Manas Khatua. 192-200 [doi]
- BeatWave: Contactless Drum Generation from Ambient Wireless SensingSrachet Rai, Anirban Das. 201-209 [doi]
- Are today's web pages designed for poor network conditions?Abhijeet Vijay Salunke, Bhaskaran Raman, Abhilash Jindal. 210-218 [doi]
- Distributed Inference on Mobile Edge and Cloud: A Data-Cartography based Clustering ApproachDivya Jyoti Bajpai, Manjesh Kumar Hanawal. 219-227 [doi]
- Adaptive Beam Steering in WPCNs under Slotted ALOHA via Deep Q-LearningSamannaya Adhikari, Siddhartha Sarma. 228-236 [doi]
- On the Deployment of RIS-mounted UAV NetworksAnupam Mondal, Priyadarshi Mukherjee, Sasthi C. Ghosh 0001. 237-242 [doi]
- Nonlinear Energy Harvesting Based Relaying for Efficient Multi-Rate SWIPT in Energy-Constrained NetworksSneha Choudhury, Atul Banotra, Sudhakar Modem. 243-248 [doi]
- QIEA-RTO: Quantum-Inspired Evolutionary Algorithm for Resilient Task Offloading in UAV-Assisted IoT NetworksTushar Barai, Dipankar Ch. Barman, Nayanjit Talukdar, Nabajyoti Mazumdar, Pavan Chakraborty. 249-256 [doi]
- BERT-Based Multi-Scale CNN-LSTM Fusion Attention Model for Phishing URL DetectionCheemaladinne Kondaiah, Layona Sanjana DMello, Alwyn Roshan Pais, Routhu Srinivasa Rao. 257-265 [doi]
- Optimal Node Deployment in Multi-Hop Underwater Acoustics Communication NetworksAryan Bansal, Akash Gupta 0003, Isha Khirwar, Parul Garg. 266-271 [doi]
- Dual Hop RSMA Aided RF-THz Uplink System For Vehicular NetworkIsha Khirwar, Akash Gupta 0003, Aryan Bansal, Parul Garg, Bharat Verma. 272-278 [doi]
- Efficient Beam Prediction for 6G V2I Networks using Liquid Time-Constant Neural NetworksKirtan Kalaria, Dhaval K. Patel, Mehul S. Raval, Mukesh A. Zaveri. 279-287 [doi]
- Curiosity-Driven Deep-RL for Adaptive Handover Optimization in O-RAN on the NH-47 CorridorDevashree K. Parikh, Dhaval K. Patel, Kashish D. Shah, Harsh A. Patel. 288-296 [doi]
- Sustainable Beam Hopping and Resource Allocation for Guaranteed QoS in Multi-beam LEO SatellitePradnya Kiri Taksande, Shubham Kumar Raj, Prasanna Chaporkar. 297-304 [doi]
- PrecoderNet: A Feedback Framework for Massive MIMO-OFDM SystemsRahul Pal, Vikram Singh, Shikha Maurya. 305-310 [doi]
- Performance Analysis of Cognitive Two-Way Relay Networks with Multi-Rate SWIPTParesh Kalsotra, Atul Banotra, Sudhakar Modem, Shankar Prakriya. 311-316 [doi]
- An Ubiquitous Two-factor Authentication (2FA) Platform for IoT ApplicationsLakshmi Poola, Mani Sharan Kosiga, Kosuru Ganesh Venkata Sai Nadh, Prabhakar T. V 0001. 317-325 [doi]
- A Novel Image Encryption and Decryption Framework Using Graph Neural NetworksAtin Chowdhury, Piyush Joshi, Mrinmoy Ghorai, Nikhil Tripathi. 326-333 [doi]
- Graph-Guided Data Generation for Deep Learning based Scheduling in Wireless Access NetworksPoorvi Deshpande, Sayan Kisku, Prathosh A P, Anurag Kumar. 342-350 [doi]
- Optimal Antenna Tilt Configurations in Hybrid Terrestrial/ Non-Terrestrial NetworkShashwat Yadav, Abhishek K. Gupta. 366-374 [doi]
- Stochastic Multi-Armed Bandits with Limited Control VariatesArun Verma, Manjesh Kumar Hanawal, Arun Rajkumar. 375-383 [doi]
- Leveraging V2V Technology to Mitigate GPS Spoofing Attacks in Autonomous DrivingK. Saravanan, Sai Sree Laya Chukkapalli, Antony Franklin. 384-392 [doi]
- Discrete Time Credit-Based Shaping for Time-Sensitive Applications in 5G/6G NetworksAnudeep Karnam, Kishor Chandra Joshi, Jobish John, George Exarchakos, Sonia M. Heemstra de Groot, Ignas G. Niemegeers. 393-401 [doi]
- Robust Performance Analysis of STAR-RIS Aided OTFS-NOMA with User Fairness and Practical SICRakesh Sharma, Ankur Bansal, Ankit Dubey. 402-408 [doi]
- A mechanism for TCP-aware adaptive management of queues in Internet routersSwarnarup Bhunia, Somit Gond, Sreelakshmi Manjunath, Padmanabhan Rajan. 409-415 [doi]
- Context-Aware Machine Learning Framework for ADR Optimization in LoRaWAN IoT NetworksJ. Uma Mahesh, Judhistir Mahapatro. 416-423 [doi]
- Design of a Kinesthetic Perception-Based Sampler for Haptic ApplicationSyed Majed Ashraf, Sarthak S. Dambare, Arzad Alam Kherani, Brejesh Lall. 424-432 [doi]
- Experience: From Sensors to Service: Advancing Ambient Living with an AIoT Community TestbedGarvit Chugh, Ananya Mondal, Osho, Suchetana Chakraborty. 433-441 [doi]
- A Unified Causal Reinforcement Learning Framework for Efficient Resource Allocation in Next Generation NetworksAbhishek Sarkar, Sathiyanarayanan Sampath, Satheesh Kumar Perepu, Georgios P. Koudouridis, Thirumaran Ekambaram. 449-456 [doi]
- On the Optimality of STARS-Embedded Sensors for NOMA-ISAC: A Sensing Centric DesignMaroof Bashir Bhat, Ankur Bansal. 457-463 [doi]
- Deep Learning Based Channel Estimator for Non-gaussian Channel StatisticsSree Harsha A, Nidhin Koshy Vaidhiyan, Sriram Rajagopal. 464-472 [doi]
- Future Mining: Learning for Safety and SecurityMd Sazedur Rahman, Mizanur Rahman Jewel, Sanjay Madria. 473-481 [doi]
- RF-AttenNet: A Hybrid Attention-Enhanced Network for Mixed Signal Classification in UAV Swarm DetectionPrajoy Podder, Mohammad Atikur Rahman, Maciej Zawodniok, Sanjay Madria. 482-490 [doi]
- Attention Accelerates Learning of Proximal Policy Optimization Reinforcement Learning in Distributed and Uncoordinated Cognitive Radio NetworksAnkita Tondwalkar, Andres Kwasinski. 491-497 [doi]
- Authentication Technique in the Emerging Cybernetic Avatar EraRie Shigetomi Yamaguchi, Maharage Nisansala Sevwandi Perera, Franziska Zimmer, Ryosuke Kobayashi, Mhd Irvan. 498-501 [doi]
- HERO: A Novel Cryptographic Scheme for Secure and Efficient Data Exchange Over Future NetworksAvnith Mishra, Arsh Singh, Sharda Tripathi. 502-507 [doi]
- An Encryption-Aware Deduplication Approach for IoT SystemsSurya Pavan Devarapalli, Jay Dave, Paarth Prakash, Sujal Jindal, Divya Daga, Anakhi Hazarika. 508-512 [doi]
- Automated Cyber Attack Anatomy and Timeline Visualization with Retrieval-Augmented Generation (RAG) pipelineRajalakshmi Ravindran, Ghanshyam S. Bopche. 513-518 [doi]
- A Service Provider Recommendation System for Verifiable Credential EcosystemR. Vigneswaran, Harshita Vani Nallagonda, Batsayan Das, Siddhasagar Pani, Srujana Kanchanapalli, Praveen Gauravaram. 519-524 [doi]
- Post-Quantum DLT Framework for Secure Financial Transactions in Banking ApplicationsAbhishek Kumar Pandey, Debnath Ghosh, Prithwi Bagchi, Ashok Kumar Das, Ravi Kumar Kappagantu, Srinivas V. Katakam, Jitendra Chougala. 525-530 [doi]
- AMQP Under Siege: Characterizing and Measuring Slow Rate DoS AttacksSushant Kuril, Nikhil Tripathi, Munmun Swain, Kamalakanta Sethi, Priyambada Subudhi. 531-536 [doi]
- A Phase-Encoded Quantum One-Time Pad for Sender-Deniable EncryptionSougata Jana, Jaydeep Howlader. 537-542 [doi]
- Decision Framework for Selection of Post Quantum Cryptographic Algorithms and LibrariesPankaj Sahu, Shubhro Roy, Mangesh S. Gharote, Sutapa Mondal, M. A. Rajan, Sachin Lodha. 543-548 [doi]
- TPACS: A Novel Trust-Aware Proactive Adaptive Caching Strategy for Named Data NetworkingMatta Krishna Kumari, Nikhil Tripathi, Piyush Joshi. 549-554 [doi]
- SrcTCAM-Def : A Source-based Detection System against Slow-Rate TCAM DDoS Attacks in SDNMitali Sinha, Padmalochan Bera, Manoranjan Satpathy. 555-560 [doi]
- eQUIC: A Resource-friendly Encryption-based Framework to Secure QUIC Handshake Process from MITM AttacksDebasmita Dey, Sayan Pal, Nirnay Ghosh. 561-566 [doi]
- Leveraging Quantum Kernel Methods for Enhanced Intrusion DetectionAnuj Tiwari, Sameer G. Kulkarni. 567-572 [doi]
- Quantum Wasserstein GAN: A Novel Approach for Generating Anomalous Timeseries DataShashi Kumar, Sameer G. Kulkarni. 573-578 [doi]
- Log-Based Authentication as a Promising Method for Detecting Cooperative Impersonation from Temporal and Spatial PerspectivesRyosuke Kobayashi, Mhd Irvan, Franziska Zimmer, Maharage Nisansala Sevwandi Perera, Rie Shigetomi Yamaguchi. 579-584 [doi]
- AAPSCH: Adaptive AI-Powered Smart Contract Honeypots with Reinforcement Learning for Blockchain SecurityMahesh Babu Chittem, Ashok Kumar Pradhan. 585-590 [doi]
- Red Flags in the Browser: Detecting Impulsive Clicks for Adaptive CybersecurityShubham Malaviya, Manish Shukla 0001, Anuj Bagad, Sachin Lodha. 597-602 [doi]
- Rethinking Website Fingerprinting: A Critical StudyAditi Aralkar, Pankaj Chaudhary, Neminath Hubballi, Manjesh Kumar Hanawal. 603-608 [doi]
- Replace Traditional FORV Scanning Systems with a MEMS-based High Actuation Angle Mirror in ToF lidarsAruni Basu, Satyajit Lingras. 609-614 [doi]
- A Deep Reinforcement Learning Approach for Dynamic Microservice Placement in Vehicular Edge ComputingSurayya A, Md. Muzakkir Hussain. 615-620 [doi]
- Evaluating Time-to-Collision Models and Steering Feasibility for Autonomous Emergency BrakingMadhav Rajadurai, Sai Abhinav Jammi, Pavel Vijay Gaurkar, Mahesh V. Shridhare, Sriram Sivaram, Shankar C. Subramanian. 621-626 [doi]
- Q-Learning-Based Multi-UAV Path Planning with Dynamic Obstacle AvoidanceAmala Sonny, Linga Reddy Cenkeramaddi. 627-632 [doi]
- High-Bandwidth Hybrid Brake Control for Enhanced Stopping of Heavy Electric VehiclesAneesh V. A., Shravan S. Devadiga, Pavel Vijay Gaurkar, R. Rajesh, Gunasekaran Vivekanandan, Sriram Sivaram, Shankar C. Subramanian. 633-638 [doi]
- Risk Assessment of Connected Heavy Commercial Road Vehicles under Cyber AttacksPrincy Philip, Koonthalakadu B. Devika, Shankar C. Subramanian. 639-644 [doi]
- Identifying Relevant Witnesses Using a BEV-Based Query Technique for Vehicle Collision InvestigationSiriboon Chaisawat, Hye-Young Paik, Salil S. Kanhere. 645-650 [doi]
- Driver Emotion Detection and Behavior Analysis During Peak and Off-peak Traffic ConditionsSai Sesidhar Vullapu, Madhumita Paul, Arkopal Kishore Goswami. 651-656 [doi]
- Interpretable Traffic Flow Prediction with LSTM and Graph Convolutional NetworksOm Chiddarwar, Priyanka Mandal, Praveen Kumar Chandaliya, Shriniwas Arkatkar. 657-662 [doi]
- NARMAD: A Novel Aerial Road Dataset with Oriented Annotations for Granular Traffic AnalysisVatsal Maheshkumar Prajapati, Harshal Janardan Dave, Vishal Patel, Shrinivas Arkatkar. 663-668 [doi]
- ML-Based Perception and Control for Semi-Autonomous Electric Buggy in Smart Campus EnvironmentsAnand Kumar, Tharun Kumar Reddy Bollu. 669-674 [doi]
- Offloading Compute-Heavy Workloads of an Agricultural Robot to Edge-CloudAmit Kumar Patel, Vidya Vepoori, Yuvraj Chowdary Makkena, Praveen Tammana, Praveen Chandrahas. 675-680 [doi]
- Offloading Real-Time Collision Avoidance to the Edge-Cloud: Improving Energy Efficiency in Autonomous SystemsMohana Bathula, Prashanth P. S, Yuvraj Chowdary Makkena, Praveen Tammana. 681-686 [doi]
- A Meta Learning Framework for Dynamic Sensor Fusion in Autonomous SystemsAbhay Nayak, Aditi S. K, Gautami Mokashi, Nalini C. Iyer. 687-690 [doi]
- Analysing Spatiotemporal Mobility Trends of Public Bicycle Sharing Scheme Using Big Data: A Metropolitan City in IndiaRohit Rathod, Parth Jhaveri, Aninda Bijoy Paul, Shriniwas Arkatkar. 691-696 [doi]
- Longitudinal Speed and Wheel Slip Estimation During Combined Cornering and Braking for Heavy Commercial Road VehiclesKausik Giri, Shravan S. Devadiga, Indra Mandal, Pavel Vijay Gaurkar, Mahesh V. Shridhare, Sriram Sivaram, Shankar C. Shubramanian. 697-702 [doi]
- URLLC-Aware Bi-Objective User Scheduling for D2D Enabled V2X NetworksJagadeesha R. Bhat, Omar Alfandi, Khyati Shivakumar Salgar, Hanusha K. 703-708 [doi]
- TRIP-AV: Transformer-Powered Vehicle Prediction for Autonomous VehiclesRajeev K. K, Satyaranjan Patra, Sourav Kanti Addya. 709-714 [doi]
- Impact of Variable Speed Limit Concept at Bottleneck using Microsimulation Technique: A Case Study of ExpresswayRiya Thomas, Atif Badashah Shaikh, Shriniwas Arkatkar. 715-720 [doi]
- Time Series Forecasting of Public Bicycle Demand Using Neural Networks in an Indian Tier-II CityPragya Verma, Shriniwas Arkatkar, Chetan R. Patel. 721-726 [doi]
- Integrated V2I-V2V Data Offloading for FiWi based Vehicular CommunicationAkshita Gupta, Vivek Ashok Bohara, Anand Srivastava. 727-732 [doi]
- Relative View of a Multi-Drone Swarm: An IoT-based ApproachSatwik Mondal, Sudipta Saha. 733-738 [doi]
- Constraint-Driven Optimization Framework for Camera Calibration and Vehicle Trajectory Extraction in Heterogeneous TrafficAnuj Kishor Budhkar, Kanishka Bandopadhyay, Sharif Hossain. 739-744 [doi]
- Intelligent Road Surface Assessment: A Comparative Deep Learning Approach using YOLOv12 and RF-DETRSuraj Pal Kurrey, Monika Rai, Tharun Kumar Reddy Bollu. 745-750 [doi]
- DQN-Augmented V2X Communication with AoI-Based Data Freshness for Safer Autonomous DrivingPragati Nayak, Suresh Chavhan. 751-756 [doi]
- A Comprehensive Investigation of Security Vulnerabilities in Distributed Multi-Robot SystemsRubal Sagwal, Vishal Gupta. 757-761 [doi]
- Towards Byzantine-Robust Federated Graph Learning for Secure IoT Intrusion DetectionBommy M, Karthik N. 762-766 [doi]
- TACG: A Topic-Aware Community-Guided Framework for Context-Aware Influence MaximizationJayshree Bhattacharya, Amrita Namtirtha, Animesh Dutta. 767-771 [doi]
- EvoRoute: An Evolutionary Multi-Agent Framework for Sustainable and Congestion-Aware Routing in Intelligent Transportation SystemsSubha Sankar Chakraborty, Parag Kumar Guha Thakurta. 772-776 [doi]
- Enhancing Execution in Kubernetes for Optimized Resource UtilizationArham Jain, Suchi Kumari, Indrajeet Gupta. 777-781 [doi]
- Correlation and Classification of Physiological Signs for Sudden Cardiac Arrest Prediction in Sports Using Machine LearningM. Vinodhini, Karthik N. 782-786 [doi]
- MoSE-XAI: A Lightweight MobileNetV2-Squeeze-and-Excitation Model For Crop Disease Detection with XAI visualizationAbhinandan Mandal, Yashwant Singh Patel, Anurag Choubey, Anil Singh. 787-791 [doi]
- MCP-Diag: A Deterministic, Protocol-Driven Architecture for AI-Native Network DiagnosticsDevansh Lodha, Mohit Panchal, Sameer G. Kulkarni. 792-796 [doi]
- Anomaly Detection using Directed Motif and Node AttributesSarjita Soo, Amrita Namtirtha, Animesh Dutta. 797-801 [doi]
- Understanding Cache-Level Profiling of 5GC NFsAyushman Singh, Sameer G. Kulkarni. 802-806 [doi]
- Memory Bottlenecks in Quantum Simulation: Cache Contention and Adaptive Allocation PolicyMallika Chouhan, Sameer G. Kulkarni. 807-811 [doi]
- PFSA: A Predictive Fair Slot Allocation Mechanism for Dynamic IoT EnvironmentsDipika Jha, Jay Dave, Nikumani Choudhury. 812-816 [doi]
- An Explainable Attention-Driven CNN Architecture for Reliable Infectious Disease DiagnosisCephas Iko-Ojo Gabriel, Randhir Kumar, Prabhat Kumar 0003. 817-822 [doi]
- A Hybrid Reinforcement Learning Based Intrusion Detection And Mitigation System for Encrypted Network TrafficSai Akshita Dimpu Pagoti, Teja Sri Pacharu, Kamalakanta Sethi. 823-828 [doi]
- SWiSS: Self-supervised Vision Transformer for Wideband Spectrum SegmentationShrutika S. Sawant, Noel Jander, Adela Vagollari, Theresa Götz, Sahana Raghunandan. 829-834 [doi]
- Intent2Vec: Contrastive Learning for Predictive and Interpretable Intent Violation Detection in SDNAnjana Jimmington, Sabu M. Thampi. 835-840 [doi]
- Meta-agentic Framework for Software bug detection using Large Language ModelsSrita Padmanabhuni, Bhargavi Karuturi, Jerusha Karen Indupalli, Santhan Reddy Chilla, Vivek Yelleti. 841-846 [doi]
- Enhanced Channel Estimation in Near-Field XL-MIMO Using Deep Denoising NetworksSalihath P, Mohammed Shadhil A V, Vani Devi M. 847-852 [doi]
- How Far is too Far? Fixing Vision of Autonomous Vehicles using Selective Super-ResolutionNajiya Naj, Ritik Vaishnav, Arani Bhattacharya. 853-858 [doi]
- Differentially Private Federated Autoencoder Framework for Securing Internet of Medical ThingsThumma Umamaheswari, Santosh S. Patil, Pavan Kumar C. 859-864 [doi]
- Private and Public 5G Networks for XR Use Cases: A Proof of Concept implementationsRathinamala Vijay, Vinay Kumar, Ramavath Pranathi, Bhaskar Rajkumar, Bharadwaj Amrutur. 865-870 [doi]
- Performance comparison of 802.11mc and 802.11az Wi-Fi Fine Time Measurement protocolsGovind Rajendran, Kushagra Sharma, Vijayalakshmi Chetlapalli, Jatin Parekh. 871-876 [doi]
- Nishpaksh: TEC Standard-Compliant Framework for Fairness Auditing and Certification of AI ModelsShashank Prakash, Ranjitha Prasad, Avinash Agarwal. 877-882 [doi]
- BER-Conscious PAPR Mitigation Techniques for Downlink CP-OFDM SystemAbhinaba Dey, Sreenath Ramanath. 883-887 [doi]
- ToothLess: A Bluetooth Multi-Hop Architecture for Ubiquitous Smartphone Internet Provisioning in Constrained EnvironmentsSpaarsh Thakkar, Kaustubh Dhondge. 888-892 [doi]
- Disaggregated and Federated Public Wi-Fi Network ArchitectureSandeep Agrawal. 893-898 [doi]
- Tiny Yet Mighty: Quantized Deep Learning for Edge Plant Disease DetectionSaud Masaud Alam, Aniruddh Jain, Patel Mahekkumar Ghelabhai, Nikhil Tiwari, Sourajit Behera. 899-904 [doi]
- Edge Intelligence for Speech: Evaluating Model Performance, Feature Extraction and Signal Fidelity on Commodity HardwareLoukik Darsi, Shubham, Avaneesh Pothuri, Ponnalagu Ramanathan Nagarajan, Manik Gupta. 905-910 [doi]
- Low-Cost IoT-Based Downtime Detection For UPS and Behaviour AnalysisSannidhya Gupta, Prakash Nayak, Sachin Chaudhari. 917-922 [doi]
- Green AI Orchestration Bridging Trustworthy AI and Edge AI through tinyML for Frugal IntelligenceJoao Pita Costa, Ioana Ntinou, Marco Zennaro, John Shawe-Taylor. 923-928 [doi]
- FedVAD: A Privacy-Preserving Federated Voice Anomaly Detection Framework for Child SafetyYagyansh Gupta, Modi Shyam Navinkumar, Neha Agrawal. 929-934 [doi]
- IoT-Assisted Estimation of Vehicular Traffic Status over Wide-AreaAnwesha Patel, Sudipta Saha. 935-940 [doi]
- Multimodal Reinforcement Learning for Game Recommendation using Dual-Discriminator PPO FrameworkAyush Deshmukh, Siddharth Kelkar, Anand Kumar M. 941-946 [doi]
- DP-EMAR: A Differentially Private Framework for Autonomous Model Weight Repair in Federated IoT SystemsChethana Prasad Kabgere, Shylaja S. S. 947-952 [doi]
- Human Activity Recognition Using 5G RF Sensing and Interpretable Tsetlin MachinesCharitha Gadari, Sreenivasa Reddy Yeduri, Ole-Christoffer Granmo, Linga Reddy Cenkeramaddi. 953-958 [doi]
- Real-Time Big Data Analytics for Predictive Healthcare Monitoring using IoT and Cloud IntegrationChitiz Tayal. 959-964 [doi]
- Fast Domain Adaption and Model Compression for IoT devices using Meta-Learning and Federated Knowledge DistillationNelson Sharma, Nirmit Chaurasia, Lavanya Bhadani, Rajiv Misra, Supratik Mukhopadhyay. 965-969 [doi]
- Static Multicast Route and Just-in-Time Any Source Multicast: A Hybrid Framework for Enterprise NetworksTathagata Nandy, Anil Raj. 970-974 [doi]
- Are We There Yet? Insights from Delhi-NCR and Beyond Reveal Gaps in Readiness for V2X Based IoT Rollout in Emerging MarketsGourab Ghatak, Neetu R. R. 975-979 [doi]
- Tag-to-Tag Range Estimation for Passive Backscattering TagsManavjeet Singh, Yang Xie, Abeer Ahmad, Milutin Stanacevic, Samir R. Das, Petar M. Djuric. 980-984 [doi]
- A Graphical User Interface Driven Method for Static and Dynamic Parameter Extraction of Solar Panels for Optical CommunicationNaman Singhal, Rahul, Ankit Kumar Pal, Abhijit Mitra, Vivek Ashok Bohara. 985-988 [doi]
- Graph Neural Network-based framework for predicting top Betweenness Centrality Nodes across Unseen GraphsGargee Handique, Rohit Tripathi 0001. 989-993 [doi]
- Joint Recognition of RS Code with Interleaver Parameters using GFFT TechniquePranshu Singh, Sucharitha Chanda, Swaminathan R.. 994-998 [doi]
- Hybrid Frequency-Selective Round Robin Scheduler for Next-Generation Wireless SystemsAbhinaba Dey, Sreenath Ramanath. 999-1002 [doi]
- An NS-3/mmWave-Based Simulation Framework for Real-Time Anomaly Detection in UAV-Assisted 6G NetworksPaarth Bahety, Prasad Chopade, Krishnendu T. S, Moumita Patra, Renuka Pawar. 1003-1007 [doi]
- FedTID: A Taxonomy Aware Federated Intrusion Detection Framework for non-IID IoT EnvironmentNityananda Basumatary, Angshuman Jana. 1008-1012 [doi]
- PQC Planner: Post-Quantum Cryptographic Migration PlannerMangesh S. Gharote, Pankaj Sahu, Shubhro Roy, Kumar Vidhani, Sutapa Mondal, Rajan Ma, Sachin Lodha. 1013-1017 [doi]
- User-Space PQ Key Exchange in WireGuard Using ML-KEM-768Anurag Krishna Sharma, Hari Om Prakash, J. Jayachandran, D. Mallikharjuna Rao. 1018-1022 [doi]
- Secure and Efficient Lightweight Authentication Mechanism for Constrained IoT NetworksAdil Hussain Seh, Atul Dattatray Dubal, Santosh Laxmiprasad Dhamala, Manasi Ajit Patil, Mansi Siddharth Subhedar, John Jose. 1023-1027 [doi]
- AI-Driven Intent-based Layer 2 Time SchedulerAtharva Ramesh Nimje, Satheesh K. Perepu. 1028-1032 [doi]
- NIRVANA: Nature-Inspired Resilience for UAV Agents via Distributed CoordiNAtionPartha Pratim Sarmah, Satyaki Roy, Krishnandu Hazra. 1033-1037 [doi]
- ADaRES: Adaptive Data Reallocation and Epoch Scheduling in Federated Learning Under Network and Resource ConstraintsSkanda M. Bhairava, Gururaj H. L. 1038-1042 [doi]
- Clickbait Detection Using Contextual Embeddings and Deep Learning TechniquesBojja Revanth Reddy, Bolli Chamith Kalyan, Ahammed Yasin Mohammed Shafi, Narra Nirikshan Kumar, Balasubramanian Palani. 1043-1047 [doi]
- Multi-Objective Edge Resource Optimization with D3QN-PER in Quantum-Classical IoT Edge NetworksPanchadip Bhattacharjee, Somyajeet Arukh, Advithiya Duddu, Nishanth Shet, Induj Gupta, Gururaj H. L. 1048-1052 [doi]
- Fusing Bistatic Measurements for Simultaneous Communication and TrackingAvinash M, Srikrishna Bhashyam. 1053-1057 [doi]
- Lightweight Mutual Authentication between IoT Devices using One-way AccumulatorManas Khatua, Pradoom Sanjay Varma, Nihal Shaikh, Sreeparna Das. 1058-1062 [doi]
- FedAsyncM: A Hybrid Asynchronous Federated Learning Aggregation AlgorithmVedic Chawla, Bhumil Rangholiya, Sachin D. Patil, Rajeev Shorey. 1063-1067 [doi]
- Fast and Accurate Flow Priority Detection in Encrypted Networks using Reinforcement LearningS. Varun, Sadanand Vishwas, Uday Trivedi, Raviraj Bhat, Kuldeepsinh Dilipsinh Rana, Priyadarsan Patra. 1068-1072 [doi]
- SecQR Scan: A Secure Scanning Framework to Protect Against Malicious QR CodesOjaswa Varshney, Kaustubh Dhondge. 1073-1076 [doi]
- Impact of Human Blockages on Link-Aggregated Hybrid THz/VLC Communication SystemsHanshita Prabhakar, Vivek Ashok Bohara. 1077-1080 [doi]
- CrypticRoute: Covert Data Transmission Ensuring Confidentiality and Integrity in Local Area NetworkSridhar Tuli, Swyam Sharma, Shubha Brata Nath, Arijit Nath. 1085-1089 [doi]
- Efficient Utilization of the Communal Strength at the Edge of IoTAnwesha Patel, Sudipta Saha, Tyll Krüger. 1090-1094 [doi]
- Decentralized Multi-Drone Delivery System: Efficient Resource UtilizationSatwik Mondal, Sudipta Saha. 1095-1099 [doi]
- A Survey of Security, Privacy, and Ethics of Large Language Models in TelecomJoy Bose, Srinivas Adyapak. 1100-1104 [doi]
- AHEAD-N2: Accelerating N2 Handovers in 5G and Beyond using Early Adaptive Decisions for Improved Availability and ResilienceSiddhesh Pratim Sovitkar, Shwetha Vittal, A. Antony Franklin. 1105-1109 [doi]
- A Secure UAV Integrated ULA Trajectory Model for Spoofing Attack Localization using Power Sectoring TechniqueShilpa A S, Chris Prema S. 1110-1114 [doi]
- Joint User Association and Orientation Optimization based Reliability Aware OIRS VLC SystemVishal Kumar, Rohit Kumar, Shankar Prakriya. 1115-1119 [doi]
- Jammer-based Secure IRS-Aided Underwater Lightwave Communication SystemHimani Mehta, Rohit Kumar, Shankar Prakriya. 1120-1124 [doi]
- NL2SQL for Cybersecurity: Automating Osquery Threat Hunting via Natural Language QueriesAnubhav Binit, Nitish Kumar, Manjesh Kumar Hanawal. 1130-1134 [doi]
- Evaluating Combinatorial Anti-Spoofing Strategies for IoT GNSS Receivers Under Dynamic Meaconing AttacksKanagavarshini B, Poorna Pushkala S. S, P. G. S. Velmurugan. 1135-1139 [doi]
- Sparse Channel Estimation for Next Generation Wireless Communication Systems Using GANsD. Abheeshek, Sandeep Joshi. 1145-1149 [doi]
- Deadline-Aware Adaptive Fuzzification for Task Offloading in Vehicle-to-Vehicle NetworksVishesh Kothari, Supriya Dilip Tambe, A. Antony Franklin. 1150-1154 [doi]
- PRET (प्रेत): Passive RADAR Engagement TrickerySarthak S. Dambare, Pradeep Kumar, Anurag Jaiswal, Divit Sharma, Arzad Alam Kherani. 1155-1159 [doi]
- QoS-Driven User Offloading via IRS in UEC-6G NetworksKrishnendu T. S, Moumita Patra, T. Venkatesh. 1160-1164 [doi]
- Deserialization Attacks in Federated LearningSpaarsh Thakkar, Dev Gupta, Rajeev Shorey. 1170-1174 [doi]
- PTP time synchronization method in networks with large packet delay jitterDaisuke Nakamura, Naoya Niwa, Hiroe Iwasaki. 1175-1179 [doi]
- Mirror-Based Optical RIS Aided NOMA Enabled VLC SystemHari Shanker O. K, Abhay Kumar Sah. 1180-1184 [doi]
- ChainSEAL: A Blockchain-based Secure and Adaptive Evidence LedgerAarav Mahajan, Bhavya Manchanda, Hardik Aggarwal, Hemanshu Mandhana, Khyati Bhatt, Neeraj Sharma, Jaspinder Kaur, Anil Singh. 1185-1189 [doi]
- Event Sourcing with Kafka Streams: A Comprehensive Benchmark Against CRUD for Financial WorkloadsAkshay R, Akshaya Prakasha, Akhil H. V, Prafullata K. Auradkar, Ranjitha Rani. 1190-1194 [doi]
- Secrecy Outage Probability Analysis for Optimal RIS Selection Scheme with Phase ErrorsYasin Khan, Ankit Dubey, Sudhir Kumar 0002. 1195-1199 [doi]
- Beyond Melody: A Complex Network Framework for Cross-Cultural Music Plagiarism AnalysisAvijit Gayen, Shrayan Misra, Ritu Raj, Angshuman Jana. 1200-1203 [doi]
- Adaptive Threshold Learning for Robust First-Path Detection in UWB RangingShrishti Bekal Mudiakal, Akash Kumar Paul, Arko Datta, Ayon Chakraborty. 1204-1208 [doi]
- Performance Analysis of Hybrid Switching NOMA System with ML-based Clustering TechniqueAyush Anand, Yasin Khan, Avnish Aryan, Pawan Kumar Barnwal, Sudhir Kumar 0002. 1209-1213 [doi]
- Multi-Horizon Engine Fault Prediction Using Lightweight Deep Learning and Transformer ModelsAnand Sekhar S, Balasubramanian Palani. 1214-1218 [doi]
- Indoor Dual-Band Experimental Evaluation of RIS-Aided Wireless Links at 5.2 GHz and 28 GHz under NLoS ConditionsPujitha Mamillapalli, Takumi Yoneda, Yoghitha Ramamoorthi, Abhinav Kumar 0001, Tomoki Murakami, Tomoaki Ogawa, Yasushi Takatori. 1219-1222 [doi]
- Unsupervised Neural Network for Joint Optimization of RIS Phase Shift and Resource Allocation in mmWave NetworkPujitha Mamillapalli, Yoghitha Ramamoorthi, Abhinav Kumar 0001, Tomoki Murakami, Tomoaki Ogawa, Yasushi Takatori. 1223-1227 [doi]
- RIS-Aided NOMA with Imperfect Phase Alignment: A Deep Learning-Based DesignKshitij Pankaj Agarkar, Swaraj Srivastava, Abhinav Kumar 0001. 1228-1232 [doi]
- Real-Time Topology-Aware Log-Metric Correlation for LLM-based Root Cause Analysis in Distributed SystemsPreetham M., Rahul Singh, Jit Gupta, Tarun Banka. 1233-1237 [doi]
- Efficient Sound Classification Model using Raw Audio Waveforms in Resource Constrained Devices: Design, Implementation, and EvaluationDebolina Chowdhury, Chawan Vinod, Suman Samui, Mousumi Saha, Sujoy Saha. 1238-1241 [doi]
- Smart Hybrid Intelligence for Day-Ahead Energy Forecasting and Demand Response in Smart GridPrajwal P, Nilotpal Chakraborty. 1242-1246 [doi]
- Robust Automatic Modulation Classification in OTFS Using Isolation Forest Based Outlier Removal and CNN-LSTMAshok Parmar, Kshitija Thete, Devanshi Tandel, Kamal M. Captain. 1247-1251 [doi]
- RFSoC-Based Integrated Navigation and Sensing Using NavICRiya Sachdeva, Aakanksha Tewari, Sumit Jagdish Darak, Shobha Sundar Ram, Sanat K. Biswas. 1252-1254 [doi]
- Mirror-Assisted Non-Line-of-Sight Voice Communication Over Solar Panels as Receivers for Long-Range Low-Power LinksAnkit Kumar Pal, Rahul, Vivek Ashok Bohara, Abhijit Mitra. 1255-1257 [doi]
- Automated Revival Disaster Recovery Management for Data CentersShreya Bokare, Shivhar Admane, Pritesh Patil, Shashank Gajbhiye. 1258-1260 [doi]
- CrowdLense: A Serverless, Privacy-Preserving Edge AI Framework for Sustainable Crowd-Sourced Real-Time Traffic MonitoringShubham Bhunia, Arghadeep Pakhira, Ankita Chanda, Deep Das, Bidyut Saha. 1261-1263 [doi]
- FOCAL: A Novel Benchmarking Technique for Multi-modal AgentsAditya Choudhary, Anupam Purwar. 1264-1266 [doi]
- Biomimetic Semantic Communication with LLM Integration for IoT SystemsLakshmi Poola, Sahana N, Aditi Abhijeet Khedkar, T. V. Prabhakar. 1267-1269 [doi]
- High Resolution Range Estimation Using Millimeter Wave Integrated Sensing and Communication on RFSoCJai Mangal, Antriksh Choudhary, Sumit Darak, Shobha Sundar Ram. 1270-1272 [doi]
- MyCloudControl-Blockchain-based personal cloud with granular access controlI V. Uttam Muthanna, Sinchana A V, Desh Bopaya M. B, C. P. Nishchay, Swathi B. H. 1273-1275 [doi]
- Load Balancing in ORAN-Based 5G NR with UE Management rApp and Handover xAppRonak Kanthaliya, Sreeram M, Venkatareddy Akumalla. 1276-1278 [doi]
- XR-Assisted Facility Tour: A Proof of Concept DemonstrationsVinay Kumar, Ramavath Pranathi, Rathinamala Vijay. 1279-1281 [doi]
- A Practical Demo of Mirror-Assisted NLOS Li-Fi for Overcoming LoS LimitationsSaswati Paramita, Ankit Kumar Pal, Vivek Ashok Bohara. 1282-1284 [doi]
- On-The-Go Task Assignment for NanodronesShrutkirthi S. Godkhindi, Quazi Nashif Alam, Rajath S, T. V. Prabhakar 0001. 1285-1287 [doi]
- Towards Net-Zero Campuses: Simulation-Based Optimization of WSN Routing for Energy Reduction in Institutional BuildingsSandeep Verma, Inderveer Chana. 1288-1293 [doi]
- Privacy-Preserving Energy Anomaly Detection using Federated Deep AutoencodersBhanu Kumar, Naman Srivastava, Priyanka Nihalchandani, Pandarasamy Arjunan. 1294-1296 [doi]
- Identifying key relationships among electric vehicle adoption success factors in India: A DEMATEL-ISM-ANP approachRajesh Kumar, Swayam Shah, Moksha Modi, Ankita Vaishnobi Bisoi. 1297-1302 [doi]
- AI-Powered Intelligent System through context aware log scrutiny for Anomaly detectionShilpi Gupta, George Asirvatharaj, Ravi Teja Talluri. 1303-1307 [doi]
- Context-Aware Secure Prompt Engineering for Large Language Models Using ERP Metadata and Role-Based Data ConstraintsSagar Gupta, Chitta Ranjan Sahoo. 1308-1313 [doi]
- Cost-optimized Multi-Technology Gateway Placement for Heterogeneous IoT NetworksVijeth J. Kotagi, Vinay M. Talageri, Utkarsh Raj, Tamal Das. 1314-1319 [doi]
- Revisiting Queue Delay Estimation Techniques in PIE and FQ-PIE: An Empirical EvaluationArun Kumar R, Mohit P. Tahiliani. 1320-1325 [doi]
- Environment-Aware Real-Time Intelligent Central Unit-User Plane Migration in O-RANNaren Nandakumar, Manu Smitha Pradeep, Abhishek Bhattacharyya, Linqi Xiao, Aparaajitha Gomathinayakam Latha, Fazlur Rahman Bin Karim, Andrea Fumagalli, Koteswararao Kondepu. 1326-1331 [doi]
- Promoting Equitable Access to Glaucoma Screening Using Open-Source Multimodal Imaging ToolsGurnoor Singh Dang, Gloria Wu, Ivan Chim, Swara Tewari, Priyal Badala, Brian Hoang. 1332-1336 [doi]
- Smarter Grids Through Clearer Vision: AI for Predictive Fault DetectionGurnoor Singh Dang, Majid Rodgar, Michael Snyder 0001. 1337-1342 [doi]
- TagFlow: A Hybrid Control and P4 Data Plane for Scalable IoT Device Validation and ConnectivityKrish Kotak, Rohan Vachhani, Miraj Rambhiya, Prashanth PVN. 1343-1348 [doi]
- BloBS-FL: A Robust Architecture of Blockchain Based Decentralized Split Federated LearningShruti Mishra, Yashasav Prajapati, Keshav Aggarwal, Sujata Pal. 1349-1354 [doi]
- Post-Quantum Secure IoT-Enabled Crop Recommender System Using Machine LearningSnehal Jain, Abhishek Kumar Pandey, Ashok Kumar Das, Shantanu Pal. 1355-1360 [doi]
- Adaptive Model Selection using Meta Models and Drift AdaptationKarthikeya Maruvada, Houssam Hajj Hassan, Ajay Kattepur, Georgios Bouloukakis. 1361-1366 [doi]
- A Hybrid Geostatistical and Deep Learning Framework for Urban Pollutant Concentration Prediction from Sparse DataChinmay Gupta, Arhat Amitabh, Kapil Kumar Meena, Arkopal Kishore Goswami. 1367-1372 [doi]
- TinyFlame: Context-Aware Cooking Activity Detection Using Flame Sensing on Edge DevicesRuma Ghosh, Rima Gorai, Gokul Pal, Sneha Chand, Arindam Ghosh 0002, Sujoy Saha. 1373-1378 [doi]
- FusionPhishGuard: An Attention-Enhanced Multi-Branch Framework for Intelligent Phishing Detection on Mobile and Web PlatformsYashwanth Yallavula, Panigrahi Srikanth, Manoj Kumar Sunkara, Vishwanath Tangella. 1379-1384 [doi]
- Survival Classification of High-Grade Gliomas using an Interpretable 3D Multi-modal SystemSandeep Verma, Neeraj Kumar 0001. 1385-1390 [doi]
- PDFInspect: A Unified Feature Extraction Framework for Malicious Document DetectionS. P. Sharmila, Aruna Tiwari. 1391-1396 [doi]
- iAirGuard: A Modular IoT Architecture with Dynamic Sampling and TinyML-Based Fault Detection for Air Quality MonitoringMolay Mondal, Arko Datta, Prashanth Durgam, Astom Mondal, Khushi Shyam, Pabitra Majhi, Subrata Nandi, Sanghita Bhattacharjee, Sujoy Saha. 1397-1402 [doi]
- Energy-Efficient Coverage Path Planning for Multi-UAVs in Dynamic Threat EnvironmentsPranita Mahajan, Abdul Kayum Ali, Navya Dhawde, Nilotpal Chakraborty, Mirza Galib Anwarul Husain Baig. 1403-1408 [doi]
- DPNet: A Lightweight TinyML Model for Real-Time Bathroom Sound ClassificationDebolina Chowdhury, Chawan Vinod, Suman Samui, Mousumi Saha, Sujoy Saha. 1409-1414 [doi]
- Learning-Based Optimization of EV Routing with V2G Integration and On-the-Go Energy HarvestingRisshab Srinivas Ramesh, Prasant Misra, Pandarasamy Arjunan. 1415-1420 [doi]
- TinyMLAir: Indoor Air Quality of Domestic Activities through TinyMLPritisha Sarkar, Kushalava Reddy Jala, Mousumi Saha. 1421-1425 [doi]
- Leveraging Conditional Distribution Similarity for Task-Aware Personalization in Federated LearningFatema Huseni Vadnagarwala, Prashanth PVN. 1426-1431 [doi]
- ML-Based Refrigerator Scheduling for Energy Efficiency in Renewable-Integrated Smart HomesSanjiban Roy, Yamini Sisodia, Nilotpal Chakraborty, Preveen Kumar D. 1432-1437 [doi]