Manuscripts
A Communication-efficient Federated Learning Approach for Intrusion Detection in IoT
A Design of High-Order APSK Constellations With PAPR Constraints for Single-Carrier BICM Systems
A Feature-aware Adaptive Ensemble Framework for IoT Intrusion Detection Systems
A Meta Learning Framework for Intrusion Detection in Connected Vehicles
A Multi-Agent Framework for Natural Language-Driven Network Simulation
A Novel Routing Protocol for MANET-Based Smart Indoor Environments
A RAG-assisted DRL Framework for Microservices Deployment in 6G vehicular Networks
A Reinforcement Learning Framework for Mobility Control of gNBs in Dynamic Radio Access Networks
A Rendez-Vous in Time: Frequency-Domain Precoding for LoS Alignment in Distributed MISO
Adaptive Communication for Joint Trajectory and RRM in MADRL-Based UAV Networks
Adaptive Mobility Control in LoRaWAN via Reinforcement Learning
AI-Driven Optimisation for Mobile Behavioural Biometrics Continuous Authentication
An enhanced authentication solution for infrastructureless vehicle environments
An Indoor Experimental Testbed for 5G-Based UAV Control and Communication
Bridging the Gap: Integrating Heterogeneous Clinical Data into HL7 FHIR
Comparative Analysis of KNN, RNG and K-RNG for Inter-Robot Communication
Comparative Study of Packet Loss Models for Flooding Protocols in Dense Wireless Networks
Cooperative MEC-enabled HAPS and UAV-RIS Assisted Task Offloading in ITS Systems
Decentralized Oracles with Threshold Signatures: A Discrete Public Goods Game Model
Design and Evaluation of an Orchestrated E2E Cloud-Native Mobile Network with O-RAN
Detecting Privacy Non-Compliance in Wearable Apps via Knowledge Graphs and LLMs
Dilated Causal CNNs for Energy Forecasting and Optimization in LoRaWAN Networks
Distributed Hierarchical Slack-reduction in Slicing for railways FRMCS
Distributed Resource Allocation and Application Deployment in Mesh Edge Networks
Distributed Task Offloading Using Federated Reinforcement Learning in VEC
Energy Budget Distribution in Mobile Edge Computing Applications
Enhanced Adversarial Domain Adaptation for Intrusion Detection Systems
Enhancing IoT Security: A Meta-Learning Approach to Adversarial Robustness
Enhancing UAV Communication Security through HSM-based Cryptographic Key Protection
Enhancing UAV Swarm Security through an RSSI-based Protocol for GNSS-Compromised Environments
Enhancing Vehicular Communication with Predictive Quality of Service: A Real-World Proof of Concept
Evaluating Bi-directional Connectionless BLE for Bike-to-Everything Wireless Communications
Expert Fusion with Meta-Adaptation for Signal Technology Recognition
Explainable Machine Learning for Environment-Aware Channel State Prediction in UAV-Based 6G Networks
Exploring Depression Severity During Lockdown Through Explainable AI
Fairness-Aware Secure Communication in ISAC Systems with STAR-RIS and RSMA
Federated Learning for Spectrum Sensing in THz Bands
Flow-Based Anomaly Intrusion Detection Systems using Recurrent Neural Networks
FlowPicClip: Improving Network Traffic Classification Using Language Supervision
ForensicsData: a Digital Forensics Dataset for Large Language Models
From Measurement to Materials: Cost-Aware Right-Sizing of Multi-Tier Edge Computing Infrastructures
Generative-AI based Health Management System for CKD Patients
Indoor Drone Propeller Speed Estimation Using Wi-Fi Channel State Information
Integrated UWB and LIDAR Assisted Localization and Navigation System for Automated Platooning
Integrating Ground Communication for Extended Drone Visual Line of Sight
Inverted BER Trends for Energy-Detected GRSM-MQAM Massive MIMO Downlink
IRS-Assisted DECT-2020 NR framework for Ensuring URLLC Constraints in Industrial IoT
Joint Optimization of Task Offloading and Multicast Transmission Scheduling in MEC Networks
Lightweight Fine-Tuning of LLMs for Explainable Intrusion Detection in SDN
MAC-Layer Protocol for Ultra-Reliable Multi-Hop Communication in DECT-2020 NR IIoT Networks
Model-Agnostic Poisoning Attacks on Recommender Systems via PPO
Multi-party Consensus-based Blockchain for Chain of Custody in IoT Forensic Investigations
NA-AEKF: A NLOS-Aware Adaptive Extended Kalman Filter for robust indoor localization
Privacy-Enhanced Secure Neighbor Discovery for Wireless Networks
ReLEaRN: Reinforcement Learning Enhanced Profitable Rebalancing in Payment Channel Networks
Secure Group Key Dissemination Protocol in Cooperative Vehicular Platooning
Secure V2P Risk Prediction: A Decentralized Federated Deep Learning Approach
Securing Connected and Autonomous Vehicles with Sliding Window-based False Information Tracing
Security-Oriented Load Distribution in MQTTv5: A Token Bucket and Trust Evaluation Approach
SG-VAE: Explainable Semi-Generative Model for Attack Detection in IoT Healthcare Systems
SPARK: A Kripke-Based Formal Analysis of the SN-MPR Routing Protocol in Wireless Sensor Networks
SPARKS: A Serverless Protocol for Authentication and Resilient Key Sharing in UAV Networks
Stability-Driven Quantization-Aware Training for Low-Bit Models
TCHIA-FedPer: An Edge Online Federated Learning and IoT Based for High Precision Smart Agriculture
Telemedicine for the Management of Nasal Obstruction: An Innovative Approach to Remote Monitoring
Understanding What Federated Learning Models Learn: a Comparative Study with Traditional Models
Unseen Attacks Identification in Intrusion Systems Using BERT and Logit Normalization
WiFiQnA: a WiFi Dataset for Large Language Models
XFL-Q: Communication-Efficient Federated Learning with Layer-wise Quantization for IoT
Your Health in the Mirror: A Critical Analysis of Health and Well-being Monitoring by Smart Mirrors
Zero-day GPS Attack Detection and Classification in UAV Networks
