Abstract is missing.
- SPRLP: Spatial-aware Pathfinding Routing for Aeronautical Ad-Hoc Networks based on Location PredictionMeng Yue, Hongwei Chen, Baoxu Chen, Zhijun Wu 0001. 1-7 [doi]
- SwappingBoost: Optimizing Entanglement Routing by Mitigating Bottlenecks in Quantum NetworksBing Yang, ZhongHui Li, Kaiping Xue, Lutong Chen, Qibin Sun, Jun Lu 0001. 1-6 [doi]
- A Reference Architecture for Agricultural Data Spaces: Case Study from DIVINE ProjectSoumya Kanti Datta, Tomaz Bokan, Lara Resman. 8-13 [doi]
- P4LoWPAN: Transforming IoT Networks with a Programmable Data plane and In-band TelemetryTiago Souza, Augusto J. V. Neto, Denis do Rosário, Ramon R. Fontes, Eduardo Cerqueira. 14-19 [doi]
- Automated Analysis of Swimming Pool Water Quality Using Image ProcessingRaiza Dimapilis-Borreo. 20-24 [doi]
- Privacy-Preserving Cooperative Visible Light Positioning for Nonstationary Environment: A Federated Learning PerspectiveSicong Liu, Tiankuo Wei, Bin Chen. 25-30 [doi]
- Cooperative localization algorithm for multiple AUVs under communication DelayQicheng Guo, Xiaozhen Yan, Qinghua Luo, Jiaqi Lin. 31-36 [doi]
- Few-Shot Specific Emitter Identification Based on Multi-Domain Fusion and Metric LearningJianhao Guo, Haoge Jia, Ailing Xiao, Sheng Wu 0001, Ting Jiang. 37-42 [doi]
- Breaking New Ground in Pneumonia Classification: YOLOv11 Nano vs. ResNet-50Rawan Elabyad, Ahmad Jasim Jasmy, Abdulmalik Alwarafy. 43-48 [doi]
- An Efficient Timer-Expanded Multi-variate Time Series Forecasting Foundation ModelChang Lu, Yuan Chang, Aobo Liang, Hong Luo, Yan Sun 0004. 49-54 [doi]
- Predictive Disaster Recovery for Multi-Redundant Operations and Maintenance 5G Network SystemsCharles H. F. dos Santos, Augusto Neto 0001, Ramon R. Fontes, Roger Immich, Vicente Sousa, Helber Wagner da Silva. 55-60 [doi]
- Radio Frequency Fingerprinting: Models, Methodologies and PerformanceMuhammad Irfan, Maryam Al-Malki, Savio Sciancalepore, Gabriele Oligeri. 61-66 [doi]
- Enabling High-Order Modulation Over Fading Channels Using E2E Deep Learning-Based Transceiver OptimizationManel Allani, Georges Kaddoum, Hazem Barka. 67-72 [doi]
- Assessing Contiki-NG's Reliability for RPL-based Trickle Algorithm in IoT NetworksMohammed Mahyoub, Ashraf Mahmoud. 73-78 [doi]
- TopoDT: Digital Twin-Assisted UAV Topology Optimization for Targets TrackingLongyu Zhou, Supeng Leng, Zonghang Li, Tony Q. S. Quek. 79-84 [doi]
- Dense IoT Deployments with LoRaWAN: Performance Evaluation and Scalability InsightsLeila Aissaoui Ferhi, Sawsan Selmi, Manel Ben Amar, Fethi Choubani, Ridha Bouallègue. 85-90 [doi]
- A Generalized Deep Hierarchical Reinforcement Learning for HAPS Resource SchedulerHesam Khoshkbari, Georges Kaddoum, Majid Altamimi. 91-96 [doi]
- Energy Efficiency Optimization Method for Heterogeneous Networks in Smart FactoriesDan Xia, Pengpeng Xu. 97-102 [doi]
- The networking scheme of 5G connected UAV : At 3.5 GHz frequency bandXiaoyin Zhao. 103-107 [doi]
- Study of Interference Coexistence between Space-Air-Ground integrated NR system and High-Orbit Satellite SystemLei Liu, Dan Tu. 108-113 [doi]
- GPS Spoofing on UAV Simulation using ArdupilotDavid Li, Houbing Herbert Song. 114-119 [doi]
- VindSec-Llama - Fine-Tuned Meta's Llama-3 LLM, Federated Learning, Blockchain and PBOM-enabled Data Security Architecture for Wind Energy Data PlatformsEranga Bandara, Safdar H. Bouk, Sachin Shetty, Ross Gore, Sastry Kompella, Ravi Mukkamala, Abdul-Rahman, Peter Foytik, Xueping Liang, Ng Wee Keong, Kasun De Zoysa. 120-126 [doi]
- Distributed Resource Allocation and Task Offloading for Vehicular Edge of Things ComputingGhada Afifi, Bassem Mokhtar. 127-132 [doi]
- Research and Practice on Integrated Satellite-Terrestrial Network for Maritime Voice CommunicationHeng Wang, Xiong Xiong, Jing Jia, Jiaying Zong, Xu Xia. 133-137 [doi]
- Intent-Driven Segment Routing Design for Large-Scale LEO Satellite NetworksSong Mao, Ying Ouyang, Chungang Yang, Zhenzi Wang. 138-143 [doi]
- A network architecture for 5G and 6G satellites based on Integrated access and backhaulJing Jia, Heng Wang, Xu Xia, Menghan Yu. 144-148 [doi]
- Efficient and Reliable Predictive Maintenance in Trains based on BiLSTM ModelLydia Yahiaoui, Mohamed Mohammedi, Khaled Hamouid. 149-154 [doi]
- Proactive Failure Prediction in Train Air Production Units Using XGBoost for Enhanced SafetyLydia Yahiaoui, Anouar Aggoune, Khalil Amrani, Mohamed Mohammedi, Khaled Hamouid. 155-160 [doi]
- A Blockchain-Based Verifiable Data Quality Assessment SchemeKeqi Xiong, Zehua Liu, Jiayong Wei, Huimin Gong. 161-167 [doi]
- Multi-Satellite Collaboration Task Planning Based On Behavior TreeMingji Wu, Bo Bai, Ying Ouyang, Chungang Yang, Yao Wang. 168-173 [doi]
- AI-Enabled Dynamic Load Balancing and Mobility Management for Internet of Vehicles in SDN 6G NetworksMohamed Amine Hechmi, Sonia Ben Rejeb, Nidal Nasser, Sami Tabbane. 174-179 [doi]
- Diversity Achieving IRS-Assisted Full-Duplex Relaying under CCI with Dynamic Antenna Mode DesignMahsa Shirzadian Gilan, Behrouz Maham. 180-185 [doi]
- Evaluating Real-Time Object Detection Models for Autonomous Vehicular Vision applicationsSurbhi Bahri, Hussein T. Mouftah. 186-191 [doi]
- GAIA-FL: Generative AI-Augmented Federated Learning for Intrusion Detection SystemOns Aouedi, Alexandre Boissel, Kandaraj Piamrat. 192-197 [doi]
- Research on Non-Binary Raptor-Like Codes in Application Layer of 6G Data BroadcastingRui Fu, Shufeng Li, Jianbo Liu, Qiang Wang, Xin Jin, Xiaoqiang Guo. 198-203 [doi]
- Low-Complexity Neural Belief Propagation Algorithm for LDPC DecodingHaojia Zhang, Shuai Han, Hao Chen. 204-208 [doi]
- Dynamic UAV Swarm Networking: A Two-Stage Adaptive Learning-Based ApproachQingyu Huo, Zunliang Wang, Haipeng Yao, Tianle Mai, Yuan He, Yunhao Liu. 209-215 [doi]
- ESC: An Efficient Semantic Communication Architecture with Feature Selection and Adaptive InferenceKaifeng Song, Guanyu Xu, Caiqing Liao, Rongfei Fan, Cheng Zhan, Xin Wei. 216-221 [doi]
- Non-Terrestrial Networks in 6G on Standardization, Key Technologies and ChallengesJiaxiang Liu, Shuo Peng, Xin Tong. 222-226 [doi]
- A Lightweight Deep Learning Model for Retinopathy of Prematurity Classification in eHealth ApplicationsNeazmul Mowla, Md. Najmul Mowla, Khaled M. Rabie, Belal Alsinglawi. 227-232 [doi]
- Path and Cycle Decoupled Deterministic Routing for Wide-Area Precision Load Control Services in New Power SystemsZiwen Yi, Peng Yu, Ying Wang, Yutong Ji, Ran Yu, Sirui Pang, Yue Ma. 233-238 [doi]
- Automating Healthcare Practitioner's Indoor Mobility Detection Using Mobile ApplicationMuztaba Fuad, Nancy Smith, Debzani Deb, Tiffany N. Adams, Anthony Smith, Tameron Hill, Mavis Grace Moree. 239-245 [doi]
- Verifiable Predicate-based Access Control Encryption with Dynamic RevocationChi Zhang, Peng Jiang 0007, Zijian Zhang 0001, Liehuang Zhu. 246-251 [doi]
- Trustworthy Management of Network Resources Based on BlockchainMeng Yue, Hanwen Xu, Zhijun Wu 0001, Yanrong Lu. 252-256 [doi]
- Learning-based Power Control for Secure Covert Semantic CommunicationYansheng Liu, Jinbo Wen, Zongyao Zhang, Kun Zhu 0001, Yang Zhang 0025, Jiangtian Nie, Jiawen Kang 0001. 257-262 [doi]
- Repairing Inconsistent-Data Errors in Cyber-Physical System Based on the Petri Net with DataYike Wang, Ningkang Qin, Min Wang. 263-268 [doi]
- Hybrid Noise and Jamming Modulation For Efficient Anti-JammingYuxin Shi, Cheng Li, Yusi Zhang, Chen Han, Fanggang Wang. 269-274 [doi]
- ComFLEX: A Communication efficient FL training framework for Edge computing environmentsSatya Srinivasa Arun Kumar Chavali, Akarsh K. Nair, Jayakrushna Sahoo. 275-280 [doi]
- Terahertz Communication Channel Measurement for Indoor and Outdoor Scenario Using Wireless InsiteEnhao Wang, Yun Xiao, Yunfei Chen. 281-286 [doi]
- Sub-THz Sensing Channel Modeling in Indoor and Outdoor EnvironmentsYun Xiao, Enhao Wang, Yunfei Chen. 287-292 [doi]
- Constellation Design Strategies for Effective Inter-Satellite Interference SuppressionQihang Cao, Ruisong Wang, Ruofei Ma, Gongliang Liu, Jing Meng. 293-298 [doi]
- An Efficient Hand Grasping Method Based on CVAE for Target Pose EstimationPengpeng Xu, Dan Xia, Huaxi Zhang, Wenlong Qin, Jianxin Pang, Jun Cheng. 299-304 [doi]
- SeQaM: A Service Quality Manager for Edge ComputingJaime Sebastian Burbano, Yuriy Pigovskyi, Eldiyar Zhantileuov, Ivan Dokuchaev, Mohan Liyanage, Ali Kadhum Idrees, Rolf Schuster. 305-311 [doi]
- Communication RSSI Prediction and Validation Framework for Advanced Air MobilityHae-In Lee, Quoc-Vinh Lai-Dang, Hong-Woo Seok, Hyo-Sang Shin, Tingyu Gong, Arthur Mendez, Robin Gojon. 312-317 [doi]
- Towards Green Communication in VANETs: A Metaheuristic-Based Clustering FrameworkRejab Hajlaoui, Meshari Alazmi, François Spies. 318-323 [doi]
- B2CAR: Behavioural Biometrics for Continuous Authentication with Regularisation TechniquesMustafa Al Samara, Marc Glig, Abdelhafid Abouaissa, Ismail Bennis, Pascal Lorenz. 324-329 [doi]
- Bassa-Llama - Fine-Tuned Meta's Llama LLM, Blockchain and NFT Enabled Real-Time Network Attack Detection Platform for Wind Energy Power PlantsEranga Bandara, Safdar H. Bouk, Sachin Shetty, Ross Gore, Sastry Kompella, Ravi Mukkamala, Abdul-Rahman, Peter Foytik, Xueping Liang, Ng Wee Keong, Kasun De Zoysa. 330-336 [doi]
- Toward Large-Scale Distributed Quantum Long Short-Term Memory with Modular Quantum ComputersKuan-Cheng Chen, Samuel Yen-Chi Chen, Chen-yu Liu, Kin K. Leung. 337-342 [doi]
- A Distributed Personalized Federated Learning Method based on Siamese Neural NetworksKai Yan, Yuanfang Chen, Xing Fang, Guangxu Bian, Noël Crespi. 343-348 [doi]
- Enhancing Security of Over-the-Air Updates in Connected and Autonomous Vehicles using Blockchain: Proof of ConceptZeeman Memon, Ikjot Saini. 349-354 [doi]
- Unveiling 5G Performance Variance In the WildJingqi Huang, Chunyi Peng. 355-360 [doi]
- Trust-centric Detection of Roadside Unit Misbehaviour in VANETsLavanya Nagaraju, Ikjot Saini. 361-366 [doi]
- Machine Learning Strategies for Reconfigurable Intelligent Surface: An OverviewWafa Abid, Moufida Hajjaj, Hanene Zormati, Ridha Bouallegue. 367-372 [doi]
- Distributed Intelligent Endogenous Design for 6G: A DOICT Fusion ApproachDong Wang 0047, Shenhu Zhang, Ruiran Su. 373-378 [doi]
- Multimodal Reinforcement Learning Aided Dynamic Service Function Chain Deployment in Satellite-Terrestrial NetworkYuanfeng Li, Qi Zhang, Haipeng Yao, Xiangjun Xin 0001, Gao Ran, Fu Wang. 379-385 [doi]
- A CP-Free DCWFRFT Based OTFS Framework in High Mobility Scenario: Design and Performance AnalysisYusi Zhang, Ke Shi, Yuxin Shi, Wanyu Xiang, Han Liao, Chen Han. 386-391 [doi]
- Lightweight Lattice-Based Secure Communication Framework for Forward and Backward Secrecy in IoD SystemsAndreas Andreou, Constandinos X. Mavromoustakis, Evangelos K. Markakis, Athina Bourdena, George Mastorakis. 392-397 [doi]
- Deep Reinforcement Learning for Dynamic Network Slice Security Using Moving Target DefenseAndreas Andreou, Constandinos X. Mavromoustakis, Houbing Song, Evangelos K. Markakis, Athina Bourdena, George Mastorakis. 398-403 [doi]
- Implementing A Dynamic and Context-Aware Trust Evaluation Model for Zero Trust Architecture (ZTA): A Fuzzy Logic ApproachSanaz Amanlou, Robin Doss, Jack Li. 404-411 [doi]
- Research on Low Altitude Network Coverage SolutionsMingshuo Wei, Yong Zhao, Jinyang Yu. 412-417 [doi]
- Machine Learning assisted in-device tasks scheduling optimization in context of IoT ecosystemsMikhail Tishin, Constandinos X. Mavromoustakis, Jordi Mongay Batalla, George Mastorakis, Evangelos K. Markakis, Athina Bourdena. 418-423 [doi]
- Semi-Blind Multi-Modulus Algorithm for Joint CFO Estimation and Symbol Detection in MIMO-OFDMKabiru Nasiru Aliyu, Karim Abed-Meraim, Azzedine Zerguine, Abdulmajid Lawal. 424-428 [doi]
- Error Bound for Two-Dimensional DOA Estimation in RIS-Aided Wireless LocalizationCuimin Pan, Xiangbin Yu, Han Zhang. 429-434 [doi]
- Development of an Artificial Intelligence-Based Companion cloneMaroua Belkneni, Khaled Guedria, Skander Chamakhi, Wiem Hjiri, Nouha Ben Slimen. 435-440 [doi]
- Context-Driven Need Detection in Home Care: A Hybrid Approach Leveraging BERT, OWL, and MEBN for Enhanced Personalized SupportAbdelweheb Gueddes, Wyssem Fathallah, Mohamed-Ali Mahjoub. 441-446 [doi]
- Performance Evaluation on Joint Beamforming for Distributed Massive MIMO System in Indoor SecenarioSen Xu, Yu Fu, Guanghui Zhang, Wei Si, Miao Wu, Hua Xu. 447-452 [doi]
- Motor Imagery-Based Brain-Computer Interfaces: Challenges, Methods, and Future DirectionsZaid Shuqfa, Abderrahmane Lakas. 453-460 [doi]
- BERT-Based Knowledge Graph Construction from Social MediaAbdelweheb Gueddes, Wyssem Fathallah, Mohamed-Ali Mahjoub. 461-466 [doi]
- FactoryTwin: Dual-Mode Scalable Digital Twin Software for Smart WorkshopZiang Lei, Jiafu Wan, Luo Fang. 467-472 [doi]
- A Comparative Study of Recent Advances in Internet of Intrusion Detection ThingsMarianna Rezk, Hassan Harb, Ismail Bennis, Sébastien Bindel, Abdelhafid Abouaissa. 473-478 [doi]
- Bringing Intelligence to Energy Consumption in Smart Buildings: Leveraging Fog Computing and Federated LearningJessica Al Achy, Hassan Harb, Abdallah Makhoul. 479-484 [doi]
- Blockchain-Driven SSI for Securing Privacy and Quality Assurance in Agri-Food Supply ChainsJihene Khoualdi, Nourhene Ellouze, Hella Kaffel Ben Ayed, Jean-Philippe Kokora. 485-490 [doi]
- Mutli-Level Autoencoder: Deep Learning Based Channel Coding and ModulationAhmad Abdel-Qader, Anas Chaaban, Mohamed S. Shehata. 491-496 [doi]
- Network Music Performance Beyond 4GKonstantinos Tsioutas, Yannis Thomas, Fotios Bistas, Ioannis Barous, George Xylomenos, George C. Polyzos. 497-502 [doi]
- UAV Anti-jamming Deployment with Power Control: A Game-Theoretical PerspectiveHan Liao, Wanyu Xiang, Yusi Zhang, Chen Han, Yusheng Li, Yuxin Shi. 503-508 [doi]
- *Chenguang He, Jian Zhang, Weixiao Meng, Hua Tan. 509-513 [doi]
- A 5G-enabled IoT-based Fatigue Driving Detection System using Proximal Policy OptimizationChen-Cheng Yo, Ching-Kuo Hsu. 514-519 [doi]
- A Double DQN Based Job-Shop Scheduling Method in IIoT Process Monitoring SystemChing-Kuo Hsu. 520-525 [doi]
- CL-MFTD: Enhanced Feature Representation with Contrastive Learning and Multiscale Filter for Tumor DetectionZiyi Deng, Yin Zhang, Jia Liu, Fang Hu 0001. 526-531 [doi]
- Study on the Performance of Low-Power Wake-up Receiver in Release 19Ke Liu, Wubin Zhou, Chenchen Zhang, Fei Xue, Kaibo Tian. 532-537 [doi]
- AI Agent Based Autonomous Cognitive Architecture for 6G Core NetworkMenghan Yu, Yanxia Xing, Xu Xia, Jing Jia. 538-542 [doi]
- Plant Disease Clustering System using Dynamic Auto-EncoderDorra Zaibi, Alya Alkameli, Riadh Ksantini. 543-548 [doi]
- AI-Enhanced IoT-Integrated Virtual Fencing: A Proof-of-Concept for Camel Monitoring and Collision MitigationMahmoud A. Elhaj, Sam Ansari, Natasa Kleanthous, Abdulla M. Alawadhi, Abdalla S. Alsuwaidi, Khawla A. Alnajjar, Soliman A. Mahmoud, Hayssam Dahrouj, Abir Hussain. 549-555 [doi]
- PCA and Failure Mechanism-driven Fault Sample Generation for Rotor Bearing Fault DiagnosisLiangni Chen, Jiafu Wan, Luo Fang. 556-561 [doi]
- RESTRAIN: Reinforcement Learning-Based Secure Framework for Trigger-Action IoT EnvironmentMd. Morshed Alam, Lokesh Chandra Das, Sandip Roy 0002, Sachin Shetty, Weichao Wang. 562-567 [doi]
- Enhancing Security in Vehicular Networks based on Blockchain TechnologyAhlem Bouafia, Amira Zrelli, Taoufik Aguili. 568-573 [doi]
- Context-Aware Client Selection and Security Protocol Identification in Federated Learning for Heterogeneous IoT NetworksLea Mansour, Nadine Abbas. 574-579 [doi]
- Intelligent Transportation Systems Utilizing UAVs: Integration with IoT and Machine LearningMohammad Fatin Fatihur Rahman, Ning Zhang 0007, Esam Abdel-Raheem. 580-586 [doi]
- A new BRAIN-based Approach to Resource Allocation using ConsortiumsRayan Gustavo O. J. Lima, Antonio A. de A. Rocha, Flávia Coimbra Delicato. 587-592 [doi]
- A Reinforcement Learning Approach for Multi-edge Task Offloading Through Bi-level OptimizationMohammed Dhyia Eddine Gouaouri, Miloud Bagaa, Oussama Bekkouche, Messaoud Ahmed-Ouameur, Adlen Ksentini. 593-599 [doi]
- Neurosymbolic Approach for Travel Demand Prediction: Integrating Decision Tree Rules into Neural NetworksKamal Acharya 0001, Mehul Lad, Liang Sun, Houbing Song. 600-605 [doi]
- Efficient Large-Scale IoT Network: Integrating Asynchronous Communication and Huffman Coding in LoRa/PLC SystemsHaoyu Zhang, Weizhuo Yao, Zhengyang Xu, Xianghan Hu. 606-611 [doi]
- Artificial Intelligence Use for intelligent AgricultureHend Fourati, Ichraf Ayari, Leïla Azouz Saïdane. 612-617 [doi]
- Artificial Intelligence use in Sign Recognition: a dataset in Tunisian Sign LanguageHend Fourati, Leïla Azouz Saïdane. 618-623 [doi]
- Robust Classification of Wi-Fi Network Saturation Condition with the Sparse Data Observers (SDO) Outlier Detection AlgorithmGianmarco Baldini, Kandeepan Sithamparanathan. 624-629 [doi]
- Adversary-Resilient Clustered Federated Learning for Secure AI-Driven Healthcare Data AnalyticsAbdullah Melhem, Ahmed AlEroud, Abdullah Al Mamun, George Karabatis, Mohamed I. Ibrahem. 630-636 [doi]
- DBSCAN-Based IoT Object Integrity Self-ManagementAbdelhamid Garah, Nader Mbarek, Sergey Kirgizov. 637-642 [doi]
- Evaluating Query Efficiency and Accuracy of Transfer Learning-based Model Extraction Attack in Federated LearningSayyed Farid Ahamed, Sandip Roy 0001, Soumya Banerjee 0001, Marc Vucovich, Kevin Choi, Abdul-Rahman, Alison Hu, Edward Bowen, Sachin Shetty. 643-648 [doi]
- P2Q-ASB: PUF-Secured Post Quantum Aggregate Signature Scheme using Public Blockchain for e-Healthcare SystemsSoumya Banerjee 0001, Sandip Roy 0001, Sachin Shetty. 649-654 [doi]
- SRRS: A Sustainable Route Recommendation System using Advanced YOLO and SUMOGunjan Bharti, Debasis Das, Yatindra Nath Singh. 655-660 [doi]
- An End-to-End Secure Blockchain-Based Architecture for Data Sharing in E-HealthManel Boujelben, Mohammed A. Mohammed, Mohamed Abid. 661-666 [doi]
- Wireless Channel classification with Entropy Enhanced Supervised Time Series Forest (EESTSF)Gianmarco Baldini, Kandeepan Sithamparanathan. 667-672 [doi]
- Re-Designed Algorithm to Obtain the Optimal Hypercube Constellation Mappings for BICM-ID SystemsMaciej Krasicki. 673-678 [doi]
- Tail-Latency Aware Scheduler For Inference WorkloadsSaif Eddine Khelifa, Miloud Bagaa, Sihem Ouahouah, Messaoud Ahmed-Ouameur, Adlen Ksentini. 679-684 [doi]
- OCSVM-Siamese Framework for Detecting Adversarial Attacks for Autonomous Driving CarsAhmad Fakhr Aldeen Sattout, Ali Chehab. 685-691 [doi]
- eMAVLink: Enhancing MAVLink for Secure and Robust UAV CommunicationAdel Merabet, Abderrahmane Lakas, Abdelkader Nasreddine Belkacem, Abdelmoumen Benamarouche, Pedro Silva. 692-697 [doi]
- Joint Optimization Design for Double Irregular IRS-Assisted Secure CommunicationsJinLong Wang, Ying Feng, Zhiquan Zhou, Chenxu Wang, Shaobo Jia, Di Zhang. 698-703 [doi]
- A Group-Based Fast Handover Authentication Scheme for 5G NetworksQianqian Wang. 704-709 [doi]
- A Coordinate-Attention-Based Path Loss Prediction Scheme for Indoor IoT ApplicationsZecheng Tian, Yan Zhang, Kaien Zhang, Jiupeng Song, Zunwen He, Hua Wang, Wancheng Zhang. 710-715 [doi]
- Undermining Federated Learning Accuracy in EdgeIoT via Variational Graph Auto-EncodersKai Li 0002, Shuyan Hu, Bochun Wu, Sai Zou, Wei Ni 0001, Falko Dressler. 716-721 [doi]
- Security and regulatory insights for 5G Network Slicing-enabled eHealth applicationsNelson I. Oliveira, Helber Wagner da Silva, Marcos M. Pinheiro, Augusto J. V. Neto. 722-727 [doi]
- Risk-Aware Slicing-Based Security Functions Allocation in LEO Satellite NetworksMohammed Mahyoub, Sami Muhaidat, Halim Yanikomeroglu, Gunes Karabulut Kurt. 728-733 [doi]
- Data-Driven Distributionally Robust Optimization for Energy-Efficient Offloading in UAV-Satellite Edge Computing NetworksJiachen Sun, Xu Chen, Jiawei Wang, Huanxi Cui, Haoge Jia, Sheng Wu. 734-739 [doi]
- Beamforming Optimization for STAR-RIS-Assisted Integrated Sensing and CommunicationFangce Zhao, Zhenglun Pan, Xiyue Xia, Minghao Yuan, Dongxuan He, Huazhou Hou. 740-745 [doi]
- A QoS-Aware Data Collection Protocol for the IoTMohamed redha Bouakouk, Abdelkrim Abdelli, Lynda Mokdad, Jalel Ben-Othman. 746-751 [doi]
- DL-based Framework for Malicious Node Detection in PoS Blockchains to Secure Telesurgery SystemsVidhi Ruparelia, Kanak Jain, Khushi Shah, Lakshit Pathak, Rajesh Gupta 0007, Sudeep Tanwar, Mohsen Guizani. 752-757 [doi]
- DL-based Attack Classification Framework for Robotic Sensor Communication in Industry 4.0Khushi Trivedi, Karm Dave, Jay Gor, Rajesh Gupta 0007, Sudeep Tanwar, Mohsen Guizani. 758-763 [doi]
- Open-FARI: An Open-source testbed for Federated Anomaly detection in the Railway Industrial Internet of ThingsAlessandra Rizzardi, Raffaele Della Corte, Jesús Fernando Cevallos Moreno, Simona De Vivo, Vittorio Orbinato, Sabrina Sicari, Domenico Cotroneo, Alberto Coen-Porisini. 764-769 [doi]
- Real-Time Beam Tracking Algorithm for UAVs in Millimeter-wave Networks with Adaptive Beamwidth AdjustmentJing Zhang, Dongyang Gao, Jiacheng Wang 0001, Zemin Sun, Shuang Liang 0003, Ruichen Zhang, Geng Sun 0001. 770-775 [doi]
- Complexity of Post-Quantum Cryptography in Embedded Systems and Its Optimization StrategiesOmar Alnaseri, Yassine Himeur, Shadi Atalla, Wathiq Mansoor. 776-781 [doi]
- A Novel Handover Management Scheme for LEO Satellite InternetXu Xia. 782-786 [doi]
- Enhancing Network Security: Machine Learning Meets Anomaly DetectionHanen Louati, Yaser Al Mtawa. 787-792 [doi]
- LTE and NR Inter-symbol Interference Optimization Analysis Based on OFDMA-RSMA Jointly MBSs Grouping and Power Allocation in Hybrid NetworkXiaochun Lu, Shangkun Xiong, Sen Xu, Yuefei Liao, Tao Yang, Jingyuan Nan. 793-798 [doi]
- MASTTN: A Multi-Feature Adaptive Spatio-Temporal Trend Network for Intelligent Cellular Traffic PredictionMengrui Guo, Xuanli Wu, Jing Li, Zifan Shi. 799-804 [doi]
- Securing Next-Generation Wireless Networks Against Native GenAI Attacks: An Evidence-Theoretic ApproachMd. Shirajum Munir, Sravanthi Proddatoori, Manjushree Muralidhara, Marco A. Gamarra, Walid Saad, Zhu Han 0001, Sachin Shetty. 805-811 [doi]
- A Low-Complexity Deep Learning Approach to Enhance Secret Key Generation for IoT NetworksAnas Alashqar, Ehsan Olyaei Torshizi, Raed Mesleh, Werner Henkel. 812-817 [doi]
- Secrecy Analysis of Distributed Null-Steering-Based Physical Layer Security Algorithm under Imperfect Channel EstimationUsman Iqbal, Haejoon Jung, Mohsen Guizani. 819-823 [doi]
- Energy-Aware IoT based solution for smart BeehivesNourhene Ellouze, Cyrine Bouallegue, Hella Kaffel Ben Ayed. 824-829 [doi]
- Federated Learning for User Identification Method from Biosignals in Wearable DevicesLucas Bastos, Rafael Veiga, Renan Morais, Augusto Neto 0001, Denis do Rosário, Eduardo Cerqueira. 830-835 [doi]
- Cluster-Based Low-Complexity Codebook Design for Hierarchical Beam Training in XL-MIMOJikun Zhu, Xiaochen Ma, Zheng Wang, Yongming Huang 0001. 836-840 [doi]
- Machine Learning for Cyber-Attack Identification from Traffic FlowsYujing Zhou, Marc L. Jacquet, Robel Dawit, Skyler Fabre, Dev Sarawat, Faheem Khan, Madison Newell, Yongxin Liu, Dahai Liu, Hongyun Chen, Jian Wang, Huihui Wang. 841-846 [doi]
- Training-Oriented Data Chunking and Transmission Method for Federated Learning in 6G ScenariosXuyang Yao. 847-852 [doi]
- Generative Diffusion Model-Enhanced Federated Fine-Tuning for Resource-Aware Edge IntelligenceHaiyan Wu, Wenji He, Lin Du, Xiaoxu Ren, Tianhao Ouyang, Haipeng Yao. 853-858 [doi]
- Attacks Detection in IoT-enabled 5G and beyond Networks: Performance Evaluation of Integrating Cutting-Edge TechnologiesZahraa Ghabriess, Hassan Harb, Ali Mansour, Koffi Clément Yao, Christophe Osswald. 859-864 [doi]
- Enhancing Digital Twins for Smart AgricultureLouay Tanazefti, Rihab Boussada, Leïla Azouz Saïdane. 865-870 [doi]
- Dynamic Trajectory-Based Adaptive Scheduling MAC Protocol for AUV-assisted Data Collection in UASNsWeinan Cao, Keyu Chen, Lvqingyun Xiao, En Cheng, Maode Ma. 871-876 [doi]
- Task Allocation and Trajectory Scheduling for UAV Swarm-Assisted Aerial-Ground Collaborative Computing NetworksHan Hu 0006, Zuan Chen, Qun Wang, Qiang Wang, Chenming Zhu. 877-882 [doi]
- Secure Authentication for Remote Drone Identification using ASTM StandardsAmal Alhashmi, Kais Belwafi, Ashfaq Ahmed, Abdulhadi Shoufan. 883-889 [doi]
- Advanced Load Management for 6G Networks Using Multi-Agent Reinforcement LearningMohamed Amine Hechmi, Sonia Ben Rejeb, Nidal Nasser, Sami Tabbane. 890-895 [doi]
- A Newtonized Approach for Estimation of Doubly Spread Acoustic ChannelsYiran Wei, Zhipeng Li, Minhao Zhang, Hongjiang Chen, Yueyi Qiao, Yan Wei, Jiang Zhu 0004, Xingbin Tu, Fengzhong Qu. 902-907 [doi]
- Enhancing Image Compression through GAN-based Semantic CommunicationChenguang He, Hua Tan, Lin Ma, Jian Zhang. 908-913 [doi]
- ECG-Based Blood Pressure Estimation Using a Two-Stage Inception-Regression ModelElham Alaa Aldein, Mohamed Abdel-Raheem, Mohammad M. Abdellatif 0001, Usama Sayed Mohamed, Mohamed Atef. 914-919 [doi]
- YOLO-HERA: An Optimized Model for Efficient and Real-Time Termite Detection in Complex EnvironmentsYingquan Zou, Nan Yang, Jingfu Li. 920-925 [doi]
- Heuristic Scheduling for Secure and Efficient Robotic Data Transmission in Autonomous Decision Support SystemsMahdi Jemmali, Rena Ayham Housain, Mustafa Sami Abou Rakbe. 926-931 [doi]
- A Transformer-Based Approach for Enhanced Depressive Emotion Detection from Facial ExpressionsBoutheina Ben Ismail, Mohamed Hamroun 0001, Bassem Ben Salah, Hedi Sakli. 932-937 [doi]
- RAFID: A Hybrid ResNet50-ViT Framework for Arabic Sign Language Recognition in HealthcareIbtihel Mansour, Mohamed Hamroun 0001, Sonia Lajmi, Ryma Abassi. 938-943 [doi]
- USRP-Based 5G Testbed for Advanced Network Deployment: A Practical Implementation and Traffic Management StudyMuhammad Asif, Júlio Chilela, Driss Benhaddou. 944-949 [doi]
- Evaluating Distance-Induced Performance Trade-offs in IoT: Simple Automatic ReQuest vs. TCP and UDPManel Chahed, Aref Meddeb, Amine Boufaied. 950-955 [doi]
- Radio compatibility analysis of 5G systems with radio astronomy services in the 1800 MHz bandLei Liu, Bingxin Wang. 956-960 [doi]
- Multivariate Time Series Anomaly Detection in Cyber Security Systems via Stein DiscrepancyWang Ge, Lv Congyue, Shiwang Xing. 961-966 [doi]
- Ephemeris-Assisted Doppler Frequency Compensation in Satellite Communication SystemsSiyu Cheng, Zhiqiang Li, Shuai Han, Cheng Li. 967-972 [doi]
- Generative AI Based Data Augmentation for Integrated Sensing and Communications NetworksJiacheng Wang 0001, Changyuan Zhao, Ruichen Zhang, Yinqiu Liu, Geng Sun 0001, Nan Ma, Dusit Niyato. 973-978 [doi]
- Subarray Measurement Optimization Algorithm for Hybrid-Field Channel Estimation in UM-MIMO SystemsTianhui Zhang, Shuyi Chen, Weixiao Meng 0001. 979-984 [doi]
- Gated Temporal-Graph Attention Networks for Large-Scale Cellular Traffic Volume PredictionMario Bou Abboud, Oumaya Baala, Maroua Drissi, Sylvain Allio. 985-990 [doi]
- Polygon Mesh Recovery via Segmentation Priors and Neural Radiance FieldsJintong Cai, Huimin Lu, Yujie Li. 991-996 [doi]
- An Evolutionary Approach Towards Synthetic Data Empowered Hierarchical Federated LearningJer Shyuan Ng, Cyril Leung, Chunyan Miao. 997 [doi]
- Latency Analysis of Aerial Offloading for Command Prediction in Autonomous DrivingNoorAlhoda Elshawadfy, Loay Ismail, Nizar Zorba. 1003-1008 [doi]
- UAV-Assisted HAPS in Intelligent Transportation Systems under Wind DisturbancesMalek Chabbouh, Nizar Zorba, Tamer Khattab, Mohamed Mabrok. 1009-1014 [doi]
- Cross-Modal Saliency Prediction for Omnidirectional VideoHengfa Liu, Tong Wang, Shencheng Zhou, Yun Gao. 1015-1020 [doi]
- BlockCrowd: A Privacy-Preserving Trust Management Blockchain-Based System for CrowdsensingZaina Maqour, Hanan El Bakkali, Driss Benhaddou, Houda Benbrahim, Hajar Elgadi. 1021-1026 [doi]
- Securing Cooperative Vehicular Platooning with a Set of Reinforced ChecksFarah-Emma Braiteh, Francesca Bassi, Rida Khatoun. 1027-1033 [doi]
- The Impact of Perceived Competence on ISP Compliance in Flexible Work Settings: Strengthening Employee Security BehaviorRijo Joy. 1034-1040 [doi]
- On Defending against Label Flipping Poisoning Attack for Personalized Federated LearningYu-Chun Chen, Hui-Nien Hung, Shun-Ren Yang, Yu-Chen Chou, Phone Lin. 1041-1046 [doi]
- Low-Complexity Joint Range and Velocity Estimation for OFDM-Based Integrated Sensing and CommunicationYuang Cao, Dongxuan He, Tiancheng Yang, Hua Wang, Rongkun Jiang. 1047-1052 [doi]
- Blockchain-Powered Certificate Verification Enhanced by Self-Sovereign Identity and Off-Chain CachingSaoussen Cheikhrouhou, Mariem Turki, Slim Kallel, Amal Abid 0002, Mohamed Jmaiel. 1053-1058 [doi]
- Performance Evaluation of IAB-Assisted mmWave Mobile Radio Access in Dense Urban EnvironmentsInam Ullah 0003, Hesham El-Sayed, Alexis A. Dowhuszko, Abdulmalik Al Warafy, Manzoor Ahmed Khan, Jyri Hämäläinen. 1059-1064 [doi]
- A Hesitant Fuzzy Sets-Based Approach for SDN Security AssessmentAnass Sebbar, Mustapha Oudani, Ouassim Karrakchou, Mohammed Boulmalf. 1065-1071 [doi]
- UAV-Assisted Vehicular Trajectory Tracking Using HMM in Integrated Sensing and Communication SystemZhongmin Ma, Qinghe Du, Linzhong Xia, Jintao Zhang, Chen Lu. 1072-1077 [doi]
- Group Secret Key Generation for Vehicular Networks Based on Physical Layer SecurityRaghda Akasheh, Ahmed Badawy. 1078-1083 [doi]
- Codebook Design for Holographic MIMO: Near-Field Prospects and Road to StandardizationYuanbin Chen, Dongxuan He, Shunyu Li, Tianqi Mao. 1084-1090 [doi]
- Deep Learning-Driven Mobile Application for E-tourismMohammed Boulmalf, Anass Sebbar, Sara Mobsite, Ouassim Karrakchou, Mounir Ghogho. 1091-1096 [doi]
- Dynamic Spreading Factor and Power Allocation in LoRaWAN Networks Using Reinforcement LearningMohamed Sofiane Batta, Alexandre Moral, Rahim Kacimi. 1097-1102 [doi]
- Architecture and Procedure Enhancements for Store and Forward Satellite OperationsJiaying Zong, Heng Nie, Wen Qi, Heng Wang, Xu Xia. 1103-1107 [doi]
- Proactive Radio Resource Allocation for 6G In-Factory SubnetworksHossam M. Farag, Mohamed Ragab 0002, Gilberto Berardinelli, Cedomir Stefanovic. 1108-1113 [doi]
- A Low Complexity Expectation Propagation Algorithm for Active User Detection for Massive ConnectivityRui Ma, Yuanli Ma, Jikun Zhu, Zheng Wang, Yuekai Cai. 1114-1118 [doi]
- Indoor Human Posture Recognition: an ISAC Method based on Environmental MapHaojin Peng, Meng Lu, Wei Peng. 1119-1124 [doi]
- A Lightweight and Robust Security Mechanism for RPL-based Resource-Constrained IoT NetworksBaraq Ghaleb, Jawad Ahmad 0001, Ahmed Al-Dubai 0001, Imdad Ullah Khan, Iain Baird, Isam Wadhaj, Amar Almaini. 1125-1130 [doi]
- Effective ML Model Versioning in Edge NetworksFin Gentzen, Mounir Bensalem, Admela Jukan. 1131-1136 [doi]
- Efficient Semantic Segmentation via Advanced Prompt Tuning TechniquesRima Hasna Yamouni, Rim Trabelsi, Adnane Cabani, Fatma Abdelkefi. 1137-1143 [doi]
- ProtoMAML: A Hybrid Meta-Learning Approach Integrating Prototypical Networks for Data-Efficient DDoS Attack DetectionAli Alfatemi, Mohamed Rahouti, Zakirul Alam Bhuiyan, Aiman Solyman, Mohammed Aledhari. 1144-1149 [doi]
- Forecasting Oil Prices with Social Media Sentiment and Natural Language ProcessingMohammed Aledhari, Mohamed Rahouti. 1150-1155 [doi]
- Intelligent Task Offloading in VANETs: A Hybrid AI-Driven Approach for Low-Latency and Energy EfficiencyTariq Qayyum, Asadullah Tariq, Muhammad Ali, Mohamed Adel Serhani, Zouheir Trabelsi, Maite López-Sánchez. 1156-1161 [doi]
- Uncertainty Aware Indoor Localization: Deep Learning Regression for Predicting Mobile Device LocationsNishat Ara Nipa, Sachin Shetty. 1162-1167 [doi]
- Deep Learning-Based Task Offloading for Efficient and Reliable Computation in High-Mobility Vehicular NetworksMuhammad Ali, Usman Nazir, Mubashar Mushtaq, Faizad Ullah, Tariq Qayyam, Asadullah Tariq, Mohamed Adel Serhani, Irfanud Din. 1168-1173 [doi]
- Computer Aided Diagnosis CAD tool for lung and thoracic pathologies detection from chest X-ray imagesWyssem Fathallah, Hiba Mzoughi, Sawsan Selmi, Abdelbaki Souid, Hedi Sakli. 1174-1179 [doi]
- A Trust-based Client Selection Framework for Federated Learning in the Internet of VehiclesAbir Raza, Elarbi Badidi. 1180-1185 [doi]
- Towards A Secure Proactive Handover Mechanism Design for intelligent Connected VehiclesNoura Aljeri, Azzedine Boukerche. 1186-1191 [doi]
- Fast Power Allocation Technique for Downlink Transmission in Cell-Free Massive MIMO SystemsFatma Gamal, Mohamed Abdel-Raheem, Mohammad M. Abdellatif 0001, Mahmoud Elsaadany, Omar A. M. Aly. 1192-1197 [doi]
- LLM-based Continuous Intrusion Detection Framework for Next-Gen NetworksFrederic Adjewa, Moez Esseghir, Leïla Merghem-Boulahia, Cheikh Kacfah. 1198-1203 [doi]
- Efficient Downward Routing in IoT Networks: A Novel Leaf-Centric Mode for RPLBaraq Ghaleb, Ahmed Yassin Al-Dubai, Khaled El-Zayyat, Ammar Hawbani, Liang Zhao 0004, Jawad Ahmad 0001. 1204-1209 [doi]
- Optimal LoRaWAN Gateway Placement for Efficient Large-Scale IoT DeploymentsMarwa Said, Maher Jabberi, Akram Hakiri, Hella Kaffel Ben Ayed, Nédra Mellouli. 1210-1215 [doi]
- Path Loss Characterization for Vehicular Communication Inside Tunnel Under LOS and NLOS ConditionsHanene Zormati, Jalel Chebil, Wafa Abid, Jamel Bel Hadj Taher, Ridha Bouallegue. 1216-1220 [doi]
- MPUrge: Merge, Purge, and Urge Multipath Fingerprints into Virtual TransmittersMajdi Abdmoulah, Eckehard G. Steinbach. 1221-1228 [doi]
- Is Attention Mechanism Enough for Accurate Deep Learning-Based Image Forgery Detection Models?Wahiba Abou-Zbiba, Houda Benbrahim, Driss Benhaddou, Hanan El Bakkali. 1229-1234 [doi]
- FedEst: A Federated K-Means Based Load Balancing for Channel Estimation in Cell-Free Massive MIMO NetworksKaridja Dominique Christelle Adje, Oussama Habachi, Gérard Chalhoub, Asma Ben Letaifa, Majed Haddad. 1235-1240 [doi]
- RADEP: A Resilient Adaptive Defense Framework Against Model Extraction AttacksAmit Chakraborty, Sayyed Farid Ahamed, Sandip Roy 0001, Soumya Banerjee 0001, Kevin Choi, Abdul-Rahman, Alison Hu, Edward Bowen, Sachin Shetty. 1241-1246 [doi]
- Enhancing RAN Slicing Isolation and UAV Positioning in Tactical Networks with DRLAbderrahime Filali, Diala Naboulsi, Georges Kaddoum. 1247-1252 [doi]
- Optimizing UE-Satellite-UE Communication for 6G Emergency Scenarios: Challenges and Future SolutionsWen Qi, Xu Xia, Jiaying Zhong, Heng Wang, Heng Nie, Yanxia Xing. 1253-1257 [doi]
- Native AI-based Predictive Operational Resiliency in Cyber-Physical Energy SystemsSushmitha Halli Sudhakara, Md. Shirajum Munir, Mostafizur Rahman, Sachin Shetty. 1258-1263 [doi]
- Multi-Agent Deep Reinforcement Learning for Resource Management in On-Demand EnvironmentsMario Chahoud, Hani Sami, Rabeb Mizouni, Hadi Otrok, Jamal Bentahar, Azzam Mourad, Chamseddine Talhi. 1264-1269 [doi]
- Pilot Free Channel Prediction for 6G: Semi-deterministic Modeling and CalculationMeng Lu, Haojin Peng, Wei Peng. 1270-1275 [doi]
- CoGroup: Cooperative Quality Offloading with Worker Grouping using Hierarchical Multi-Agent Deep Reinforcement LearningAmr M. Zaki, Sara A. Elsayed, Khalid Elgazzar, Hossam S. Hassanein. 1276-1281 [doi]
- Towards Multi-Exposure Image Correction using Dynamic 3D Look-Up TablesMariam Ishtiaq, Eunseo Oh, Sungjoon Byun, Jong-Un Won. 1282-1287 [doi]
- From Outage to Opportunity: Building Robust Telecommunications Standards for Emergency ServicesAdam Bryant, Raymond Owen, Kathleen Silleri. 1288-1293 [doi]
- Transportation Failure Prediction Framework Using Explainable Artificial Intelligence and Quantum AlgorithmEunseo Oh, Mariam Ishtiaq, Junho Song, Jongun Won. 1294-1299 [doi]
- Multi-LEO Satellite Networks for Integrated Access and Backhaul: Delay AnalysisAbubakar Abdulkarim, Behrouz Maham, Refik Çaglar Kizilirmak. 1300-1305 [doi]
- On the Impact of Occupancy Characteristics on Multi-Step Spectrum Prediction: A Deep Learning StudyDinushika Chathurangani Alahakoon, Sithamparanathan Kandeepan, Fernando Moya Caceres, Xinghuo Yu 0001, Ke Wang, Gianmarco Baldini. 1306-1311 [doi]
- 5G Under Siege: A Comprehensive Guide to Threats and Penetration Testing in 5G Campus NetworksAnna Triesch, Tim Barsch, Veelasha Moonsamy, Matteo Große-Kampmann. 1312-1317 [doi]
- Spectrum Sensing Using Semantic Segmentation for Hybrid Satellite-Terrestrial ApplicationsMichael Aygur, Sithamparanathan Kandeepan, Akram Al-Hourani, Edward Arbon, Zarko Kursevac. 1318-1323 [doi]
- Fault Diagnosis in Satellite System: A Federated Learning Approach with Communication ConstraintsHaoran Xie 0004, Yafeng Zhan, Yongsheng Cui, Daquan Liu. 1324-1329 [doi]
- Enhancing Control of Large Language Model-based AI Systems Through Declarative MemorySihem Omri, Manel Abdelkader, Mohamed Hamdi. 1330-1335 [doi]
- Compact MIMO Antenna Design with SRR-Enhanced Isolation for Wireless CommunicationAbdelilah Mansour, Wyssem Fathallah, Bassem Ben Salah, Hedi Sakli. 1336-1341 [doi]
- A Generalized Communication Complexity Analysis Model Based on 5G NR Classical NumerologyYongjun Ye, Changyong Pan, Chao Zhang, Jun Wang. 1342-1347 [doi]
- Towards Blockchain-Based GDPR-Compliant spontaneous and ephemeral social networkYoucef Yahiatene, Abderrezak Rachedi, Mohamed Amine Riahla. 1348-1353 [doi]
- FTM and PDR Based Dynamic Mapping for Indoor Localization Enhanced by Wi-Fi AwareLazaros S. Savvidis, Constandinos X. Mavromoustakis, Houbing Herbert Song, Evangelos K. Markakis, Jordi Mongay Batalla, George Mastorakis. 1354-1359 [doi]
- Attention-Enhanced Hybrid AI Model for IoT SecurityAkshat Gaurav, Varsha Arya, Brij B. Gupta, Kwok Tai Chui. 1360-1365 [doi]
- Q-CAST Mobility: Multipath Routing Protocol for Mobile Quantum NetworksDiego Medeiros de Abreu, Arthur Pimentel, Antônio J. G. Abelém. 1366-1371 [doi]
- 3MTL: A Multi-Modal Multi-Task Learning Approach for Plant Disease Detection and AnalysisFabrice Wansi, Thabet Kacem. 1372-1377 [doi]
- Joint Beamforming Design for Secure ISAC Systems with Target-Mounted RISChao Zhou, Zhengquan Zhang, Xiaoxu Zhang, Nan Li, Zheng Ma 0001, Ming Xiao 0001. 1378-1383 [doi]
- LWD-IUM: A Lightweight Detector for Advancing Robotic Grasp in VR-Based Industrial and Underwater MetaverseLiangfan Shi, Yufeng Gu, Yuchao Zheng, Shintaro Kameda, Huimin Lu. 1384-1391 [doi]
- Autonomous Cyber Incident Response Using Reasoning and ActionSudipto Baral, Sajal Saha, Anwar Haque. 1392-1397 [doi]
- Explainable Common Spatial Pattern to Improve the Design of Brain-Computer InterfacesSofien Gannouni, Kais Belwafi. 1398-1403 [doi]
- Privacy-Preserving Continuous User Authentication Using Federated LearningOussama Bouldjedri, Mohamad Wazzeh, Hani Sami, Chamseddine Talhi, Hakima Ould-Slimane. 1404-1409 [doi]
- High sensitive Diamond-shaped ring resonator Biosensor for Tuberculosis DiagnosisAbdelaziz Ould Bahammou, Monia Najjar. 1410-1415 [doi]
- GTFD Protocol for Fault-detection and Self-stabilization in Wireless Sensor NetworksAther Saeed, M. Arif Khan, Muhammad Imran. 1416-1421 [doi]
- A Multi-Degree-of-Freedom Wave Energy Harvester for Self-Powered IoT SystemBozhi Ding, Huimin Lu, Yujie Li. 1422-1427 [doi]
- Multi-User Frequency Synchronization and Performance Analysis for Massive MIMO Systems With One-Bit ADCsYunqi Feng, Mengru Wu, Yu Zhang, Huimei Han, Weidang Lu. 1428-1433 [doi]
- Quantum Network Routing Design with Dynamic Requests Scheduling in Multi-User EnvironmentsXinrui Liu, Ruidong Li. 1434-1439 [doi]
- An Adaptive and Energy-Efficient Edge Framework for Real-Time Fake News DetectionZineb Sadok. 1440-1447 [doi]
- Single Mobile Base Station Positioning Algorithm Designed for Disaster Emergency CommunicationHan-mei, Xiaofeng Zhong, Shidong Zhou, Jie Wei. 1448-1453 [doi]
- NOMA Aided Energy Efficient Cooperative U2U Communications System with Best UT SelectionSoham Guha Mazumder, Naveen Gupta. 1454-1459 [doi]
- A Fast Multi-Token Neighbor Discovery Strategy for Urban Asynchronous Directional Ad-Hoc NetworkYin Yu, Jie Wei, Xiaofeng Zhong. 1460-1465 [doi]
- Anomaly Detection in 6G Networks Using Large Language Models (LLMs)Ammar Kamal Abasi, Moayad Aloqaily, Mohsen Guizani. 1466-1471 [doi]
- SHIELD: Self-Healing IoT Networks with Automated Response and AI-Driven Detection of Node Compromising AttacksFloribert Katembo Vuseghesa, Mohamed-Lamine Messai, Fadila Bentayeb. 1472-1477 [doi]
- Enhancing Privacy and Performance in V2P Systems through Decentralized Federated LearningRihab Hmaied, Takoua Kefi, Ryma Abassi. 1478-1483 [doi]
- Fuzzy Learning-based Wireless Resource Scheduling for Distribution Grid: An Information-Energy Flow Integration PerspectiveHaijun Liao, Haoyu Ci, Wen Zhou, Zhenyu Zhou 0001, Xiaoyan Wang 0003, Muhammad Tariq. 1484-1488 [doi]
- Automated Quantification of the Immunoscore® in Colorectal Carcinomas Using Deep LearningFeriel Lamirem, Wyssem Fathallah, Imen Helal, Nizar Sakli, Hedia Bellali, Aschraf Chadli-Debbiche, Taoufik Aguili, Hedi Sakli. 1489-1494 [doi]
- Power Grid Protection Solution Against Load Altering Cyberattack via EV Charging StationsSamira Chouikhi, Lyes Khoukhi. 1495-1500 [doi]
- Vehicular Edge Computing: An Enhanced Vehicle Participant Selection System for Federated LearningSofiane Dahmane, Abdelmadjid Benarfa, Bouziane Brik, Zakaria Abou El Houda. 1501-1506 [doi]
- Face Recognition in the Encrypted Domain Using Homomorphic EncryptionAbderraouf Zaimen, Lubana Al Rayes, Nabil Hezil, Ahmed Bouridane, Raouf Dridi. 1507-1512 [doi]
- EDEN: Energy-aware Dynamic Genetic and Neural Network-based Path Predictive Routing and Clustering for Mobile SD-IoT NetworksNegar Javadzadeh No, Hossein Taghizadeh, Mohammad Parsa Sedighi, Bardia Safaei 0001, Jörg Henkel. 1513-1518 [doi]
- Anchor Node-Based Trust Management for Reliable Data Fusion in CrowdsensingSani Umar, Rabeb Mizouni, Shakti Singh, Hadi Otrok, Jamal Bentahar. 1519-1524 [doi]
- AHARP: An Adaptive Hybrid Agent-Based Routing Protocol for Internet of VehiclesMohamed Mazouzi, Omar Cheikhrouhou, Mohamed Mosbah. 1525-1532 [doi]
- An Analytical Design Framework for Dimensioning Solar-powered Green IoT NodesGodlove Suila Kuaban. 1533-1539 [doi]
- Towards a Lightweight Edge AI-based Radio Frequency FingerprintingAhmed Mohamed Hussain, Nada Abughanam, Panos Papadimitratos. 1540-1545 [doi]
- Federated Large Language Models for Wireless NetworksYassine Himeur, Diana W. Dawoud, Omar Alnaseri, Shadi Atalla, Wathiq Mansoor, Hussain Al-Ahmad. 1546-1551 [doi]
- Adaptive P2P UAV-UGV Prototype for Ad Hoc Network-based Precision AgricultureDemirel Memet, Ionut Pirnog, Ana-Maria Dragulinescu, George Craioveanu, Ciprian Zamfirescu, Ioana M. Marcu. 1552-1557 [doi]
- Intelligent Spectral Efficient Communications Underlay 6G VHetnetsSawsan Selmi, Leila Aissaoui Ferhi, Wyssem Fathallah, Ali Hamdi, Dhaou Bouchouicha, Hedi Sakli, Ridha Bouallègue. 1558-1563 [doi]
- A Blockchain-Enabled Multi-Layered Zero-Trust Security Framework for O-RANAli Mehrban, Zakaria Abou El Houda, Hajar Moudoud, Bouziane Brik, Lyes Khoukhi. 1564-1569 [doi]
- Securing O-RAN Equipment Using Blockchain-Based Supply Chain VerificationAli Mehrban, Zakaria Abou El Houda, Hajar Moudoud, Bouziane Brik, Lyes Khoukhi. 1570-1575 [doi]
- Multi-Criteria Clustering and Client Selection for Heterogeneous Federated LearningMaryam Ben Driss, Essaid Sabir, Halima Elbiaze. 1576-1582 [doi]
- Metaheuristic Optimization of Controller Placement in Software Defined NetworksMd. Imtiaz Ahmed, Yaser Al Mtawa. 1583-1588 [doi]
- ChatGPT for Coding: User Insights and Challenges in Program GenerationManar Abu Talib, Anissa M. Bettayeb, Al Zahraa Sobhe Altayasinah, Fatima Mohamad Dakalbab. 1589-1596 [doi]
- A Comprehensive Multi-Layered Cybersecurity Framework for Internet of Vehicles: Securing Vulnerable Nodes of V2X Communication SystemsImen Loussaief, Sondes Ksibi, Faouzi Jaïdi, Khaled Nouri. 1597-1603 [doi]
- Privacy Analysis and Enhancement for Joint Communication and Sensing ApplicationsYevhen Zolotavkin, Prajnamaya Dass, Stefan Köpsell. 1604-1609 [doi]
- Phishing Attack Detection Through Recursive Feature Elimination Via Cross ValidationMasmoudi Salma, Habib M. Kammoun, Maha Charfeddine, Bechir Hamdaoui. 1610-1615 [doi]
- On the Convergence of Transmission Power Control in Multi-Microgrid SystemsAbdullah Othman, Joao V. C. Evangelista, Georges Kaddoum, Minh Au, Basile L. Agba. 1616-1621 [doi]
- Adaptive Modulation Selection in Wireless Communications: A Comparative Study of Reinforcement Learning, Deep Learning, Deep Reinforcement Learning, and Traditional PoliciesNader Khedhri, Monia Najar. 1622-1625 [doi]
- Selective Privacy-Preserving Federated Learning for Large Language Model Fine-TuningQianqian Pan, Jun Wu. 1626-1631 [doi]
- Threshold Anonymous Counting Tokens with Batch Proofs for Online PaywallsYanqi Zhao, Minghong Sun, Min Xie, Xiaoyi Yang, Yong Yu 0002. 1632-1637 [doi]
- FMCW Radar for Human Detection in Collapsed Structures for Post-Disaster Search and RescueMostafa Abdelhamid, Ali Safa, Loay Ismail, Amr Mohamed 0001. 1638-1643 [doi]
- Intelligent Power Management for Hybrid Energy Storage Clusters in EV Charging StationsWiem Fekih Hassen. 1644-1649 [doi]
- Resource Optimized Split Federated Learning: A Reinforcement Learning and Optimization ApproachMaher Guizani, Latif U. Khan, Waseem Ullah, Mohammad A. Islam. 1650-1655 [doi]
- Quality of Experience Enhancement in Wireless Metaverse: A Resource Optimization SchemeMaher Guizani, Latif U. Khan, Mohammad A. Islam. 1656-1660 [doi]
- Quantum-Aided Active User Detection for Energy-Efficient CD-NOMA in Cognitive Radio NetworksDeemah H. Tashman, Soumaya Cherkaoui. 1661-1666 [doi]
- Enhancing Network Anomaly Detection with Quantum GANs and Successive Data Injection for Multivariate Time SeriesWajdi Hammami, Soumaya Cherkaoui, Shengrui Wang. 1667-1672 [doi]
- Robust Federated Learning on Edge Devices with Domain HeterogeneityHuy Q. Le, Latif U. Khan, Choong Seon Hong. 1673-1677 [doi]
- A Multi-Agent Deep Reinforcement Learning Approach for Traffic Management in Complex Communication NetworksChristina Alhachem, Mounir Kellil, Abdelmadjid Bouabdallah. 1678-1685 [doi]
- Dust Detection on Solar Panels Using DINOv2 with Multi-Head Self-AttentionAhmed Hamdi, Hassan N. Noura, Joseph Azar. 1686-1693 [doi]
- Frugal Object Detection Models: Solutions, Challenges and Future DirectionsAhmed Hamdi, Hassan N. Noura, Joseph Azar, Guy Pujolle. 1694-1701 [doi]
- UAV DoS Attack Detection using a Hybrid Transformer-LSTM ApproachKensley Benjamin, Thabet Kacem. 1702-1708 [doi]
- Quishing Attack Detection and Mitigation Using Machine Learning and Deep Learning for Malicious URL IdentificationAhmad Tayachi, Bassem Ouni, Azzam Mourad, Aiman Erbad. 1709-1713 [doi]
- MobileSniper: Towards Automated Penetration Testing of 5G Campus Networks and IoT InfrastructuresTim Barsch, Anna Triesch, Matteo Große-Kampmann. 1714-1719 [doi]
- Pseudo-Doppler Aided Full-Duplex Communications for Self-Interference CancellationYuli Yang, Mohsen Guizani. 1720-1725 [doi]
- Transformer Based Architecture for Smart Grid Energy Consumption ForecastingSiem Hadish, Maher Guizani, Moayad Aloqaily, Latif U. Khan. 1726-1731 [doi]
- Efficient Aerial Fire Detection on Resource-Constrained Devices Using Cross-Architecture Knowledge DistillationSabina Jangirova, Branislava Jankovic, Waseem Ullah, Latif U. Khan, Mohsen Guizani. 1732-1737 [doi]
- Traffic Collision Severity on Highway: Characterization, Modeling, and AnalysisSifatul Mostafi, Khalid Elgazzar, Ahmed El Sayed. 1738-1743 [doi]
- Analyzing the Impact of Network Variability on the Performance of TelesurgeryHebatalla Ouda, Khalid Elgazzar, Hossam S. Hassanein. 1744-1750 [doi]
- RL-Driven Security-Aware Resource Allocation for UAV-Assisted O-RAN in SAR OperationsZaineh Abughazzah, Emna Baccour, Loay Ismail, Amr Mohamed 0001, Mounir Hamdi. 1751-1756 [doi]
- Federated Learning of Low-Rank One-Shot Image Detection Models in Edge Devices with Scalable Accuracy and Compute ComplexityAbdul Hannaan, Zubair Shah, Aiman Erbad, Amr Mohamed 0001, Ali Safa. 1757-1762 [doi]