Abstract is missing.
- A Framework to Optimize the Energy Cost of Securing Neural Network InferenceTanjina Islam, Ana Oprescu, Zoltán Ádám Mann, Sander Klous. 1-8 [doi]
- A Containerized IoT Simulation Environment for Network Warfare TrainingRuihao Chen, Chengcheng Lyu, Wenzhao Wang, Hui Lin 0007, Qingxin Lin. 1-8 [doi]
- A Framework for BMC Firmware Vulnerability Analysis and ExploitationJiapeng Wang, Zhihan Zheng, Kefan Qiu, Yu-an Tan 0001, Chen Liang, Wenjuan Li. 9-16 [doi]
- A Novel Diversified API Recommendation for Power System SensorsMinhao Zhu, Huanhuan Gu, Xun Che, Jingfei Chen, Qian Zhao, Fan Liu, Yu Zheng. 17-22 [doi]
- A Secure Ethernet Passive Optical Network Protocol for Industrial Internet of ThingsHuanhuan Gu, Jing Shang, Xun Che, Qian Zhao, Pengchuan Wang, Jingfei Chen, Fan Liu. 23-30 [doi]
- A Trusted and Decentralized Federated Learning Framework for IoT devices in Smart CitySheng Wang, Chun Chen, Bing Han, Jun Zhu. 31-37 [doi]
- A Walk-through Type Authentication System using Real-Time Gaze & Motion DetectionYanmei Jiao, Kiminori Sato, Bo Wu 0007. 38-43 [doi]
- Bridging IoT Protocols with the Web of Things: A Path to Enhanced InteroperabilityZakaria Benomar, Marco Garofalo, Nikolaos Georgantas, Francesco Longo 0001, Giovanni Merlino, Antonio Puliafito. 44-51 [doi]
- Civil Engineering Design in IoT: Leveraging Improved Swarm Intelligence OptimizationWeiheng Fu, Rongzhong Chen, Kaiwen Chen, Xiaojun Xie. 52-59 [doi]
- Cubic-DUCAG: A New Modeling and Probabilistic Computing Approach for Cyclic Network AttacksChunling Dong, Yu Feng. 60-66 [doi]
- Deep Reinforcement Learning for Energy-efficient Selection of Embedded Services at the EdgeHugo Hadjur, Doreid Ammar, Laurent Lefèvre. 67-74 [doi]
- Deep Reinforcement Learning-Based AoI Minimization in UAV-Assisted Multi-Platoon Vehicular NetworksBochun Du, Long Qu. 75-81 [doi]
- Digital Microfluidic Biochips Test Path Planning Based on Swarm Intelligence Optimization and Internet of Things TechnologyZhongliao Yang, Zhengye Xie, Chen Dong, Xinmin Fan, Zhenyi Chen. 82-89 [doi]
- Elevating Smart Contract Defenses: A Coordinated NLP-Based Strategy for Vulnerability DetectionChengyu Lin 0007, Xiaoding Wang 0001, Hui Lin 0007. 90-97 [doi]
- Energy Efficient and Low Latency Computation Offloading via Truly PPO in Mobile Edge Computing Networks with Multi-UAVShuang Fu, Xiangping Bryce Zhai, Changyan Yi, Lei Pang, Chee-Wei Tan 0001. 98-104 [doi]
- Enhancing Sales Forecasting Accuracy in the Presence of Missing DataJun Tang, Jingpeng Sun, Bing Guo, Yan Shen, Shengxin Dai, Peng Wang. 105-111 [doi]
- Enhancing Visual Inertial Odometry Performance using Deep Learning-based Sensor FusionRaoof Doorshi, Hajira Saleem, Reza Malekian. 112-117 [doi]
- IoT Meets Computer Vision: An Improved Detection of Tomato Pests and DiseasesJunling Wang, Dongyang Wu, Yupeng Wang. 118-123 [doi]
- Local-GAN: An Anomaly Detection Method Based on Local Key Features and GAN for IoTHuixia Lai, Fan Zhou, Bo Wang, Hongrui Chen, Shi Zhang. 124-132 [doi]
- malDetect: Malware Classification Using API Sequence and Comparison with Transformer EncoderJingjing Lin, Jingsong Lin, Chenxi Lyu, Xinmin Fan, Chen Dong 0002. 133-140 [doi]
- Minimizing Data Transmission Delay in Vehicular Networks through Network Coding-based BroadcastingJiali Hu, Long Qu, Qinglin Song, Ran Zhu. 141-148 [doi]
- Multi-Domain and Multi-View Oriented Deep Neural Network for Sentiment Analysis in Large Language ModelsKeito Inoshita, Xiaokang Zhou, Shohei Shimizu. 149-156 [doi]
- Prediction of Social Influence in Social NetworksShiyu Chen, Qianmu Li. 157-162 [doi]
- Priority-Considered Channel Access for Registration-Backoff-Time (RBT) -based IEEE 802.11ah IOT NetworkChung-Ming Huang, Chia-Hsiang Chen, Jianhua Ma 0002. 163-170 [doi]
- RADIO: Reinforcement Learning-Aided Deployment of Wi-Fi Routers in 5G Networks for Indoor Drone OrchestratingAlireza Famili, Amin Tabrizian, Tolga O. Atalay, Angelos Stavrou. 171-178 [doi]
- Recommendation Algorithm Based on Social Influence DiffusionXin Jin 0005, Shiyu Chen. 179-184 [doi]
- TGIEN: An Interpretable Image Editing Method for IoT Applications Based on Text GuidanceYifei Wang, Mengzhu Pan, Qianmu Li. 185-192 [doi]
- The Pipeline of VAE base Network Traffic Anomaly Detection AlgorithmHonglei Fu, Pan Wang, Xuejiao Chen. 193-199 [doi]
- TinyML on Mobile Devices for Hybrid Energy Management SystemsOlha Boiko, Anton Komin, Vira Shendryk, Reza Malekian, Paul Davidsson. 200-207 [doi]
- Unsupervised Real-Time Flow Data Drift Detection Based on Model Logits for Internet of Things Network Traffic ClassificationPan Wang, Minyao Liu, Zeyi Li, Zixuan Wang, Xuejiao Chen. 208-215 [doi]
- A Comparative Analysis of Query Generation Methods for IoT Middleware EvaluationRavindi de Silva, Arkady B. Zaslavsky, Seng W. Loke, Prem Prakash Jayaraman. 216-223 [doi]
- A Domain-Adaptive Large Language Model With Refinement Framework For IoT CybersecurityXun Che, Yu Zheng, Minhao Zhu, Qianmu Li, Xu Dong. 224-229 [doi]
- The integrated monitoring system for rail transit and the switching method for the main and backup control centersJing Song, Changkai Zhang, Xun Che. 230-234 [doi]
- A Dynamic Risk-aware Routing Recommendation Using Deep Reinforcement LearningDifeng Zhu, Hang Zhou, Anchen Lin, Binbin Zhou. 235-240 [doi]
- A Framework for Privacy-Preserving Efficient Collaborative LearningJianxiang Cao, Xing Song, Wenqian Shang. 241-245 [doi]
- A Machine Learning Model for Prediction of Malaria from Microscopic Blood Cell ImagesSamson Otieno Ooko, Charles Theuri Kagwi. 246-251 [doi]
- Ambient Intelligence Ecosystem for Elderly Pattern Detection and Care Using Social RobotsRaúl Gómez Ramos, Jaime Duque Domingo, Eduardo Zalama, Jaime Gómez García-Bermejo. 252-259 [doi]
- An Architectural Reference Model for IoT Device ManagementDominik Grüdl, Thomas Wieland, Daniela Nicklas. 260-267 [doi]
- Analyzing and Predicting the Power Consumption of a Publish/Subscribe IoT-BrokerFranc Pouhela, Maryam Arabshahi, Hans D. Schotten. 268-275 [doi]
- Building a First Prototype of a Multi-scale Modular Distributed DisplayFrédéric Lassabe, Dominique Dhoutaut, Benoît Piranda, Olga Kouchnarenko, Julien Bourgeois. 276-281 [doi]
- Combatting the TrickBot Threat: Analysis, Impact, and Defensive Strategies in CybersecurityJintao Cao, Allie Null, Marissa Stewart, Suman Bhunia, Mohammad Salman. 282-287 [doi]
- Development of a User-Friendly and Efficient Control System for Smart HomePushpendu Kar, Puttipatt Ingkasit. 288-293 [doi]
- DEVS-RPL: Design Formal Discrete Event Model of Routing Protocol over LLNHussah Albinali, Farag Azzedin, Muhammad Riaz. 294-299 [doi]
- Integrating Synthetic Data Modelling into an Adaptive Sampling Framework for IoT DevicesFaiga Alawad, Peter Herrmann, Vajira Thambawita. 300-307 [doi]
- Inverse-PID: A Mathematical Approach Towards Detecting Real-World Wear and Tear in Industrial MachinesSeverin Pang, Justas Katkus, Stefan Hild. 308-313 [doi]
- MMQP: A Lightweight, Secure and Scalable IoT Communication ProtocolFranc Pouhela, Sogo Pierre Sanon, Dennis Krummacker, Hans D. Schotten. 314-323 [doi]
- Monitoring of in-field risk of infection events by foliar pathogens using smart IoT nodesHassan Hammoud, Frédéric Weis, Christophe Langrume, Melen Leclerc, Jean-Marie Bonnin. 324-330 [doi]
- Privacy Threats and Countermeasures in Federated Learning for Internet of Things: A Systematic ReviewAdel Elzemity, Budi Arief. 331-338 [doi]
- A Review of Early Time Series Classification Methods on Machinery DatasetMohammad Ali Nemer, Joseph Azar, Abdallah Makhoul, Julien Bourgeois. 347-352 [doi]
- Achieving Asymptotically Optimal Throughput and Fairness for Energy Harvesting Sensors in IoT Network SystemsOmer Melih Gul. 353-360 [doi]
- Comparison of the Performance and Energy Efficiency Evaluation of 5G User-Plane FunctionsRaffaele Bolla, Roberto Bruschi, Franco Davoli, Paolo Ghiorzo, Lorenzo Ivaldi, Chiara Lombardo, Beatrice Siccardi. 361-368 [doi]
- Creation of Topological Maps of Energy Consumption for IP NetworksAlejandro Muñiz, Pablo Armingol, Luis M. Contreras 0001, Óscar González. 369-376 [doi]
- Design and Development of a Real-Time IoT Infrastructure for a future workspace - Energy efficiency and sustainabilityHamza Saadaoui, Hajer Rabii, Zeynep Tulumen. 377-385 [doi]
- Enhanced Pedestrian Detection and Tracking Using Multi-Person Pose Extraction and Deep Convolutional LSTM NetworkAshkan Tashk, M. A. Alavianmehr. 386-391 [doi]
- How much RF Energy can be Harvested from V2X Communications? An Experimental AssessmentFederico Librino, Francesca Martelli, Giovanni Resta, Glauco Cecchi, Andrea Motroni, Andrea Ria. 392-399 [doi]
- Low-Cost Green Computing-as-a-Service Testbed for SMEs: Leveraging AI and 6G for Enhanced ProductivityMohammad N. Patwary, Samiya Khan, Syed Junaid Nawaz. 400-407 [doi]
- On three fundamental graph enumeration problems and the corresponding graph generation algorithmsAntoine Bossard. 408-414 [doi]
- PowerHeat: A non-intrusive approach for estimating the power consumption of bare metal water-cooled serversMaxime Agusti, Eddy Caron, Benjamin Fichel, Laurent Lefèvre, Olivier Nicol, Anne-Cécile Orgerie. 415-421 [doi]
- Rivercare: Shaping the Decentralized Identity of Mother Nature on Blockchain through Care Activities of StewardsHung-Ming Sung, You-Shin Tsai, Timothy Chen, Ju-Chun Ko, Yi-Ping Hung. 422-429 [doi]
- A Number of Conceptual Scalable Node-Organizing Multi-Tiered Blockchain Architectures for IoTRiham Elsaadany, Guy Bégin. 430-437 [doi]
- An Ethereum Oracle-based solution for P2P Energy Trading MarketMatteo Vaccargiu, Roberto Tonelli. 438-445 [doi]
- Carbon-Aware Workload Shifting for Mitigating Environmental Impact of Generative AI ModelsEddie Zhang, Daniel Wu, Jeffrey Boman. 446-453 [doi]
- High-Bandwidth Node Selection in Compact Block RelayShinnosuke Masuda, Tsuyoshi Hasegawa, Taishi Nakai, Akira Sakurai, Kazuyuki Shudo. 454-458 [doi]
- Isolation Forest Algorithm Against UAV's GPS Spoofing AttackAhmed Burhan Mohammed, Lamia Chaari Fourati, Ahmed M. Fakhrudeen. 459-463 [doi]
- Research on Recognition and Feature Extraction of SQL Attack ActionGuorui Chen, Jiyan Liu, Chaoliang Li, Chen Zhang, Sirui Jiang, Bin Zhang, Entao Luo. 464-470 [doi]
- Poster: Green Network Optimization with Multi-Agent Reinforcement Learning: Work in ProgressVladimir Marbukh. 471-472 [doi]
- AggreMark: Efficient Watermarking in Federated Learning via Weighted AveragingZhuotao Lian, Weiyu Wang, Chunhua Su, Kouichi Sakurai. 473-478 [doi]
- Assessing the Syllogistic Logic and Fact-Checking Capabilities of Large Language ModelsCecilia Delgado Solorzano, Manuel Delaflor, Carlos Toxtli. 479-488 [doi]
- CRT-Paillier Homomorphic Privacy Protection Scheme Based on BLS Signatures in Mobile Vehicular NetworksYuquan Zhou, Hejin Huang, Wenyu Liao, Jiyan Liu, Xiangdong Ying, Chen Zhang, Entao Luo. 489-496 [doi]
- Data-driven ship inspection planning based on evolutionary gameLe-Hong, Ran Yan, Ruihan Wang, Hao Chen, Weicheng Cui. 497-504 [doi]
- Defense Contrastive Poisoning: An Application of JPEG to Self-Supervised Contrastive Learning Indiscriminate Poisoning AttacksWeihao Guo, Xiaoji Ma, Pingyuan Ge, Ying Chen, Qiuling Yue, Yuqing Zhang. 505-510 [doi]
- Graph-CoRe: Graph Representation Learning with Contrastive Subgraph ReplacementJie Kang, Shixuan Liu, Kuihua Huang, Changjun Fan, Hua He, Chao Chen. 511-518 [doi]
- IoT-based Visual Crack Detection Based on Multi-scale Self-Attention Neural NetworkJohn Dian. 519-526 [doi]
- LLM4HIN: Discovering Meta-path with Large Language Model for Reasoning on Complex Heterogeneous Information NetworksHaoxiang Cheng, Shixuan Liu, Changjun Fan, Kuihua Huang, Hua He, Xianghan Wang, Zhong Liu. 527-534 [doi]
- Long-Term Time-Stamping Schemes Based on MACs, Archives, and Transient KeysLong Meng, Liqun Chen 0002. 535-542 [doi]
- On the Security and Privacy Implications of Large Language Models: In-Depth Threat AnalysisLuis Ruhländer, Emilian Popp, Maria Stylidou, Sajjad Khan, Davor Svetinovic. 543-550 [doi]
- PentraFormer: Learning Agents for Automated Penetration Testing via Sequence ModelingYunfei Wang, Shixuan Liu, Wenhao Wang, Cheng Zhu, Changjun Fan, Kuihua Huang, Chao Chen. 551-558 [doi]
- STIOS: A Novel Self-supervised Diffusion Model for Trajectory Imputation in Open Environment ScenariosZhijing Hu, Hao Yan, Yuhao Zheng, Hua He, Chao Chen, Changjun Fan, Kuihua Huang. 559-566 [doi]
- Enhancing Data-Free Robustness Stealing Attack via Boundary Data GenerationXiaoji Ma, Weihao Guo, Pingyuan Ge, Ying Chen, Qiuling Yue, Yuqing Zhang. 567-572 [doi]
- TimesInformer: An Approach to Predicting Urban Water Supply with Multi-Periodic FeaturesJiayu Zhang, Canyao Lu, Juan Xu 0004, Xiangping Bryce Zhai. 573-578 [doi]
- Analysis of Blockchain-IoT Connection Patterns based on Clients TypeShahid Abbas, Sana Amjad, Stefan Craß, Seyed Amid Moeinzadeh Mirhosseini. 579-586 [doi]
- Application for Electronic Signatures Using Blockchain Technology to Support Trust, Sovereignty and PrivacyMichael Hofmeier, Wolfgang Hommel. 587-594 [doi]
- Social Media Integration in Public Transportation: A Case Study of SwedenAzadeh Sarkheyli, Elnaz Sarkheyli. 595-600 [doi]
- The Use of AI-powered Language Tools in Crowdsourcing to reduce Language BarriersCecilia Delgado Solorzano, Carlos Toxtli. 601-608 [doi]
- Understanding Blockchain Trilemma, Causes and SolutionsMonu Chaudhary, Suman Bhunia. 609-616 [doi]