


default search action
IEEE Internet of Things Journal, Volume 12
Volume 12, Number 1, January 2025
- Hao Han

, Yuhua Xu
, Wen Li
, Ximing Wang
, Yifan Xu
, Xiaokai Zhang
, Yong Gao:
Robust Spectrum Access Scheme Against Diverse Jamming Policies: A Prioritized Fictitious Rival-Play-Based Approach. 1-17 - Fan Yang

, Jinfang Jiang
, Guangjie Han
:
A Trust Management Method Based on Ensemble Learning for Ocean-Oriented Cloud-Edge Collaborative Networks. 18-29 - Lijuan Xu

, Baolong An
, Xin Li
, Dawei Zhao
, Haipeng Peng
, Weizhao Song
, Fenghua Tong
, Xiaohui Han:
TFHSVul: A Fine-Grained Hybrid Semantic Vulnerability Detection Method Based on Self-Attention Mechanism in IoT. 30-44 - Adam Piaseczny

, Eric Ruzomberka
, Rohit Parasnis
, Christopher G. Brinton
:
Adversarial Node Placement in Decentralized Federated Learning: Maximum Spanning-Centrality Strategy and Performance Analysis. 45-60 - Chenbin Ma

, Lishuang Guo
, Haonan Zhang
, Zhenchang Liu
, Guanglei Zhang
:
DiffCNBP: Lightweight Diffusion Model for IoMT-Based Continuous Cuffless Blood Pressure Waveform Monitoring Using PPG. 61-80 - Bing Li

, Jianfeng Lu
, Shuqin Cao
, Lijuan Hu, Qing Dai, Shasha Yang
, Zhiwei Ye
:
RATE: Game-Theoretic Design of Sustainable Incentive Mechanism for Federated Learning. 81-96 - Muhammad Irfan Mushtaq, Omer Chughtai

, Muhammad Naeem
, Muhammad Iqbal
, Chau Yuen:
Service Priority-Driven Resource Management in Multiuser, Multiservice, and Multidevice 6G Wireless Networks. 97-109 - Rui Chen

, Zeqing Chen, Shouzhi Xu
, Kai Ma, Xiaojun Liu, Liping Fan:
Greedy Degree and Jamming-Aided Covert Uplink Transmission in Cell-Free IoT Networks. 110-123 - Wanqing Wu, Feixiang Ye

:
A Secure and Efficient Certificateless Aggregate Signature Authentication Scheme With Pseudonyms for VANETs. 124-139 - Ze Wei

, Rongxi He
, Haotian Liu, Chengzhi Song
:
Joint Computation Offloading and Resource Allocation in Green MEC-Assisted Software-Defined Island Internet of Things. 140-162 - Mohammad Manzurul Islam

, Gour C. Karmakar
, Joarder Kamruzzaman
, M. Manzur Murshed
, Abdullahi Chowdhury
:
Trustworthiness of IoT Images Leveraging With Other Modal Sensor's Data. 163-173 - Yanbin Li

, Yuxin Huang, Yikang Guo, Chunpeng Ge
, Fanyu Kong
, Yongjun Ren
:
Adaptive Chosen-Plaintext Deep-Learning-Based Side-Channel Analysis. 174-185 - Yuanhua Fu

, Zhiming He:
Energy-Efficient Joint Spectrum Sensing and Power Allocation in Cognitive IoT Under SSDF Attack. 186-197 - Caihong Yan

, Xiaofeng Lu
, Pietro Lio
, Pan Hui
, Daojing He
:
Self-Simulation and Meta-Model Aggregation-Based Heterogeneous-Graph-Coupled Federated Learning. 198-212 - Wengang Li

, Mohan Liu
, Yichen Wu
, Jincheng Shi, Hongyu Zhu, Mingyang Jiang, Fei Teng:
An Opportunistic Positioning Algorithm for Internet of Vehicles Under Intermittent and GNSS-Degraded Environment. 213-223 - Yong Liu, Mengtian Kang

, Shuo Gao
, Chi Zhang, Ying Liu, Shiming Li
, Yue Qi, Arokia Nathan
, Wenjun Xu, Chenyu Tang
, Edoardo Occhipinti
, Mayinuer Yusufu
, Ningli Wang, Weiling Bai, Luigi G. Occhipinti
:
Diagnosis of Multiple Fundus Disorders Amidst a Scarcity of Medical Experts via Self-Supervised Machine Learning. 224-235 - Zhuohang Chen

, Jinglong Chen
, Tongyang Pan
, Jingsong Xie
:
Uncertainty Estimation Pseudo-Label-Guided Source-Free Domain Adaptation for Cross-Domain Remaining Useful Life Prediction in IIoT. 236-249 - Dingchen She

, Wei Wang
, Zhisheng Yin
, Jiaqi Wang
, Haifeng Shan:
GPS Spoofing Attack Recognition for UAVs With Limited Samples. 250-261 - Ting Lyu, Yueqiang Xu, Feifei Liu, Haitao Xu

, Zhu Han
:
Task Offloading and Resource Allocation for Satellite-Terrestrial Integrated Networks. 262-275 - Tianci Yang

, Carlos Murguia
, Dragan Nesic
, Chau Yuen
:
Toward Crash-Free Autonomous Driving: Anomaly Detection and Control for Resilience to Stealthy Sensor Attacks. 276-287 - Roopesh Kumar Polaganga

, Qilian Liang
:
Extending Causal Discovery to Live 5G NR Network With Novel Proportional Fair Scheduler Enhancements. 288-296 - Van Lic Tran

, Souebou Bouro
, Manh Thao Nguyen
, Fabien Ferrero
:
A Novel Localization Technique in LoRa-Based Low-Power Relay Using Machine Learning. 297-308 - Hongyang Zhao

, Yanan Guo
, Xingdong Li, Yi Liu
, Jing Jin:
Hierarchical Control Framework for Path Planning of Mobile Robots in Dynamic Environments Through Global Guidance and Reinforcement Learning. 309-333 - Xinyu Shang, Jie Shang

, Zheng Jiang, Chen Jiang, Haobo Qiu
, Liang Gao
:
A Multitask Learning Approach With Meta Auxiliary Generation Network for Remaining Useful Life Estimation. 334-344 - Zijian Chen

, Hong Zhang
, Miao Wang, Liqiang Wang
, Lei Zhang:
Onboard Edge Computing: Optimizing Resource Allocation and Offloading in Mobile Scenarios. 345-361 - Kyungchang Jeong

, Hongseok Oh
, Yeongyu Lee
, Hanbit Seo
, Gyuchang Jo
, Jaemin Jeong
, Gyutae Park
, Jungseok Choi
, Young-Duk Seo
, Ji-Hoon Jeong
, Euijong Lee
:
IoT and AI Systems for Enhancing Bee Colony Strength in Precision Beekeeping: A Survey and Future Research Directions. 362-389 - Waqas Khalid

, Alexandros-Apostolos A. Boulogeorgos
, Trinh Van Chien
, Junse Lee, Howon Lee
, Heejung Yu
:
Optimal Operation of Active RIS-Aided Wireless Powered Communications in IoT Networks. 390-401 - Xiaoyang Hao

, Zhixi Feng
, Tongqing Peng
, Shuyuan Yang
:
Meta-Learning Guided Label Noise Distillation for Robust Signal Modulation Classification. 402-418 - Wenbo Yang, Hao Wang

, Zhi Li
, Ziyu Niu, Lei Wu
, Xiaochao Wei
, Ye Su
, Willy Susilo
:
Privacy-Preserving Machine Learning in Cloud-Edge-End Collaborative Environments. 419-434 - Yuan Gao

, Zhongya Zhang
, Zhiyong Zhang
:
Differential Fault Attack of Lightweight Cipher GIFT Based on Byte Model. 435-444 - Xinzhong Liu

, Ting Yuan
, Ji Wang
, Xingwang Li
, Wenwu Xie
:
Range-Free Localization Approach Based on Triple-Anchor Centroid and QAGWO for Anisotropic WSNs. 445-457 - Weihan Zhang

, Shaohua Wu
, Siqi Meng
, Jinghang He
, Qinyu Zhang
:
Engineering a Lightweight Deep Joint Source-Channel-Coding-Based Semantic Communication System. 458-471 - Xiaoxu Wang

, Min Hao
, Maoqiang Wu
, Chen Shang, Rong Yu
, Jiawen Kang
, Zehui Xiong
, Yuan Wu:
Digital-Twin-Assisted Safety Control for Connected Automated Vehicles in Mixed-Autonomy Traffic. 472-487 - Xuechen Chen

, Aixiang Wang, Xiaoheng Deng
, Jinsong Gui
:
Latency-Efficient Wireless Federated Learning With Spasification and Quantization for Heterogeneous Devices. 488-501 - Anis Elgabli

, Chaouki Ben Issaid
, Mohamed Badi
, Mehdi Bennis
:
Quantized FedPD (QFedPD): Beyond Conventional Wisdom - The Energy Benefits of Frequent Communication. 502-514 - Kyeongwon Lee

, Sangmin Jeon
, Kangju Lee
, Woojoo Lee
, Massoud Pedram
:
Radar-PIM: Developing IoT Processors Utilizing Processing-in-Memory Architecture for Ultrawideband-Radar-Based Respiration Detection. 515-530 - Xinming Li, Meng Li, Jiawei Gu, Yanxue Wang, Jiachi Yao, Jianbo Feng:

Energy-Propagation Graph Neural Networks for Enhanced Out-of-Distribution Fault Analysis in Intelligent Construction Machinery Systems. 531-543 - Haosen Yang

, Zipeng Liang
, Xin Shi
, Joseph Cheng, Jian Liang
, Hanjiang Dong
, C. Y. Chung
:
Adversarial Data Anomaly Detection and Calibration for Nonintrusive Load Monitoring. 544-555 - Huu Sang Nguyen

, Duc Hai Nguyen
, Duy Anh Nguyen Duc
, Nguyen Cong Luong
, Van-Dinh Nguyen
, Shimin Gong
, Dusit Niyato
, Dong In Kim
:
Wireless Power Transfer Meets Semantic Communication for Resource-Constrained IoT Networks: A Joint Transmission Mode Selection and Resource Management Approach. 556-568 - Jinghai Duan

, Jun Tao
, Dingwen Chi
, Xiaoqian Li, Yifan Xu
:
Toward Energy Variations for IoT Lightweight Authentication in Backscatter Communication. 569-581 - Zhuofan Liao

, Xiyu Han
, Xiaoyong Tang
, Chaochao Feng
:
An Adaptable Pricing-Based Resource Allocation Scheme Considering User Offloading Needs in Edge Computing. 582-594 - Akarsh Yadav

, Ajit Kumar
, Ethungshan Shitiri
, Sudhir Kumar
, Ho-Shin Cho
:
Non-Data-Aided SNR Estimation for Molecular Communication Systems in Internet of Bio-Nano Things. 595-604 - Jehad Ali

, Houbing Herbert Song
, Byeong-Hee Roh
:
An SDN-Based Framework for E2E QoS Guarantee in Internet of Things Devices. 605-622 - Soumen Mondal

, Keshav Singh
, Chih-Peng Li
, Zhiguo Ding
:
Mixed FSO/Active IRS-Aided MISO NOMA Communication With Imperfect CSI and SIC. 623-636 - Jianwei Chen

, Lu Yu
, Yufan Chen
, Xiang Zheng, Pu Chen, Kaixin Cheng
:
Prototype-Driven Unsupervised Domain Adaptation for Specific Emitter Identification. 637-649 - Ye Tao

, Shaolin Tan
, Rongen Yan
, Nian Liu, Wei Wang
, Jinhu Lü
:
CBWF+: Collaboratively Enhanced Lightweight Circular-Boundary-Based WiFi Fingerprinting. 650-662 - Jau-Yang Chang

, Zhe-Xuan Xu:
Enhanced Water Puddle Segmentation and Detection Using DCU-Net. 663-672 - Han Wang

, Qiulin Chen
, Xianpeng Wang
, Wencai Du
, Xingwang Li
, Arumugam Nallanathan
:
Adaptive Block Sparse Backtracking-Based Channel Estimation for Massive MIMO-OTFS Systems. 673-682 - Yihang Li

, Xiaozheng Gao
, Minwei Shi
, Jiawen Kang
, Dusit Niyato
, Kai Yang
:
Dynamic Weighted Energy Minimization for Aerial Edge Computing Networks. 683-697 - Zhenyu Kuang

, Lidong Cheng, Hongyang Zhang
, Yue Huang
, Xinghao Ding
:
Generalizable Prompts Guided by Image-Redundant Separation for Vehicle Reidentification. 698-712 - Zichen Wang

, Zhijun Meng
, Tuo Tian
, Weiqi Gai
, Guodong Zhao
, Jingjing Wang
, Chunxiao Jiang
:
Efficient Autonomous UAV Exploration Framework With Limited FOV Sensors for IoT Applications. 713-725 - Miao Wang

, Zhenfu Cao
, Xiaolei Dong
, Runmeng Du
, Jiasheng Chen:
Decentralized Multiauthority KP-ABE Scheme Without Bilinear Pairings. 726-738 - Jiamin Li

, Chenyu Zhang
, Jie Wang, Pengcheng Zhu
, Dongming Wang
, Xiaohu You
:
HARQ-Assisted Grant-Free Access Scheme in Cell-Free Massive MIMO System. 739-749 - Qian Zhang

, Shangping Wang
, Duo Zhang
:
Adaptive Access and Tracking Method for Supply Chain Data Based on Sharding Blockchain. 750-763 - Kangwei Qi, Qiong Wu

, Pingyi Fan
, Nan Cheng
, Wen Chen, Khaled Ben Letaief
:
Reconfigurable-Intelligent-Surface-Aided Vehicular Edge Computing: Joint Phase-Shift Optimization and Multiuser Power Allocation. 764-777 - Bin Xiao

, Burak Kantarci
, Jiawen Kang
, Dusit Niyato
, Mohsen Guizani
:
Efficient Prompting for LLM-Based Generative Internet of Things. 778-791 - Yuan Yuan

, Bin Yang
, Wei Su
, Haoru Li
, Chang Wang
, Qi Liu, Tarik Taleb
:
AoI and Energy-Driven Dynamic Cache Updates for Wireless Edge Networks. 792-807 - Xinyi Yao

, Fengye Hu
, Zhuang Ling
, Hongliang Zhang
:
Robust Beamforming Design for IOS-Assisted Multiuser MISO Systems With Imperfect CSI. 808-821 - Fangxiao Li

, Leyi Shi
, Yuchen Zhao
, Haoyu Zhang
, Zhihao Zhao
, Qiang Han
:
CMTD: A Fast Moving Target Defense Scheme Based on CFL Authentication. 822-833 - Yiheng He

, Dengpan Ye
, Long Tang
, Ziyi Liu
, Chuanxi Chen
:
AdvLUT: Cloaking Geographic Location With Semantic-Based Adversarial 3-D Lookup Tables. 834-842 - Seifu Birhanu Tadele

, Binayak Kar
, Frezer Guteta Wakgra
, Asif Uddin Khan
:
Optimization of End-to-End AoI in Edge-Enabled Vehicular Fog Systems: A Dueling-DQN Approach. 843-853 - Peng Zhao

, Jinyang Huang
, Xiang Zhang
, Zhi Liu
, Huan Yan
, Meng Wang
, Guohang Zhuang, Yutong Guo, Xiao Sun
, Meng Li
:
Wi-Pulmo: Commodity WiFi Can Capture Your Pulmonary Function Without Mouth Clinging. 854-868 - Xin Yan, Jiucheng Xie

, Mengqi Liu, Haolun Li
, Hao Gao
:
Hierarchical Local Temporal Network for 2D-to-3D Human Pose Estimation. 869-880 - Sakila S. Jayaweera

, Sai Deepika Regani
, Yuqian Hu, Beibei Wang
, K. J. Ray Liu:
HRNet: High-Resolution Neural Network for Human Imaging Using mmWave Radar. 881-893 - Hui Yin

, Yin Zhu
, Hua Deng, Lu Ou
, Zheng Qin
, Keqin Li
:
Privacy-Preservation Enhanced and Efficient Attribute-Based Access Control for Smart Health in Cloud-Assisted Internet of Things. 894-903 - Jeng-Shyang Pan

, Qingyong Yang
, Shu-Chuan Chu
, Han-Chieh Chao
:
A Joint Edge Server and Service Deployment Method in C-RAN With Multilayer MEC for Multicommunities. 904-918 - Pengjin Zhu

, Hongxiang Wang
, Yuefeng Ji
:
A Novel Optical Transmitter With Chaotic Fingerprint for Identity Authentication in Physical-Layer Security of Optical Networks. 919-930 - Shimaa A. El-Meadawy

, Ping Zhu
, Haitham S. Khallaf
:
Multilayer Irregular RIS-Assisted Wireless Communication System Performance Optimization. 931-949 - Jian Sun, Wei Sun, Jin Zheng, Xu Fang, Jian Liu, Ajmal Mian:

UWB-IMU-Odometer Fusion for Simultaneous Calibration and Localization. 950-963 - Yanzhuo Lin

, Yu Wang
, Mingquan Zhang
, Hongrui Cao
, Liwei Ma
, Jiankun Wang, Junwei Gu
:
Toward Efficient Multidomain Knowledge Fusion Adaptation via Low-Rank Reparameterization and Noisy Label Learning: Application to Source-Free Cross-Domain Fault Diagnosis in IIoT. 964-977 - Khalid Mahmood

, Zahid Ghaffar
, Lata Nautiyal
, Muhammad Wahid Akram
, Ashok Kumar Das
, Mohammed J. F. Alenazi
:
A Privacy-Preserving Access Control Protocol for Consumer Flying Vehicles in Smart City Applications. 978-985 - Kaifei Tu

, Xuehe Wang
, Xiping Hu:
EntroCFL: Entropy-Based Clustered Federated Learning With Incentive Mechanism. 986-1001 - Yanli Qi

, Shaoyang Li, Yiqing Zhou
, Jinglin Shi:
Communication-Efficient Participant Selection for Crowdsensing in Internet of Vehicles With Heterogeneous Sensing, Communication, and Computing Resources. 1002-1015 - Ziyang Lu

, Yubin Zhao
, Cheng-Zhong Xu
:
RCSIL: RIS-Assisted Cooperative Channel State Information Localization for V2X System. 1016-1031 - Yingxiao Wu

, Zhongmin Jiang
, Haocheng Ni
, Changlin Mao
, Zhiyuan Zhou, Wenxiang Wang
, Jianping Han
:
mmHPE: Robust Multiscale 3-D Human Pose Estimation Using a Single mmWave Radar. 1032-1046 - Yubo Wang

, Xiaolong Xu
, Zeyuan Zhao
, Fu Xiao
:
Multisensors Time-Series Change Point Detection in Wireless Sensor Networks Based on Deep Evidential Fusion and Self-Distillation Learning. 1047-1063 - Lun Tang

, Zhoulin Pu
, Qiang Hou
, Dongxu Fang
, Qianbin Chen
:
Deterministic Delay of Digital-Twin-Assisted End-to-End Network Slicing in Industrial IoT via Multiagent Deep Reinforcement Learning. 1064-1080 - Changdong Wang

, Jingli Yang
, Huamin Jie
, Zhenyu Zhao
, Wensong Wang
:
An Energy-Efficient Mechanical Fault Diagnosis Method Based on Neural-Dynamics-Inspired Metric SpikingFormer for Insufficient Samples in Industrial Internet of Things. 1081-1097 - Shuying Xu

, Ji-Hwei Horng
, Ching-Chun Chang, Chin-Chen Chang:
Reversible Data Hiding in Encrypted JPEG Images With Polynomial Secret Sharing for IoT Security. 1098-1108
Volume 12, Number 2, January 2025
- Zhicheng Bao

, Haotai Liang
, Chen Dong
, Cong Li, Xiaodong Xu
, Ping Zhang
:
MDVSC - Efficient Wireless Model Division Video Semantic Communication. 1109-1124 - Mengjing Liu

, Mohammed Elbadry, Yindong Hua
, Zongxing Xie
, Suvab Baral
, Isac Park, Fan Ye
:
Proteus: An Easily Managed Home-Based Health Monitoring Infrastructure. 1125-1136 - Renan M. Silva

, Aellison Cassimiro T. dos Santos
, Iguatemi E. Fonseca
, Vivek Nigam:
Fault Injection and Reliability Analysis on Time-Sensitive Networking. 1153-1164 - Zizhi Jin

, Xiaoyu Ji
, Yushi Cheng
, Bo Yang, Chen Yan
, Wenyuan Xu
:
Laser-Based LiDAR Spoofing: Effects Validation, Capability Quantification, and Countermeasures. 1165-1181 - Junjian Ye

, Xavier de Carné de Carnavalet
, Lianying Zhao
, Mengyuan Zhang, Lifa Wu
, Wei Zhang
:
Exposed by Default: A Security Analysis of Home Router Default Settings and Beyond. 1182-1199 - Harshpreet Kaur

, Munish Bhatia
:
Scientometric Analysis of Digital Twin in Industry 4.0. 1200-1221 - Shamsher Ullah

, Jianqiang Li
, Jie Chen
, Ikram Ali
, Salabat Khan
, Muhammad Tanveer Hussain
, Farhan Ullah
, Victor C. M. Leung
:
Homomorphic Encryption Applications for IoT and Light-Weighted Environments: A Review. 1222-1246 - A. S. M. Kayes

, Wenny Rahayu
, Tharam S. Dillon
, Ahmad Salehi Shahraki, Hooman Alavizadeh:
Safeguarding Individuals and Organizations From Privacy Breaches: A Comprehensive Review of Problem Domains, Solution Strategies, and Prospective Research Directions. 1247-1265 - Thai-Hoc Vu

, Senthil Kumar Jagatheesaperumal
, Minh-Duong Nguyen
, Nguyen Van Huynh
, Sunghwan Kim
, Quoc-Viet Pham
:
Applications of Generative AI (GAI) for Mobile and Wireless Networking: A Survey. 1266-1290 - Emanuele Tavanti

, Paolo Nepa
, Roberto Gabbrielli
, Marco Pirozzi:
Review on Systems Combining Computer Vision and Radio Frequency Identification. 1291-1319 - Norah Ahmed Almubairik

, Fakhri Alam Khan
:
Systematic Literature Review on Wearable Digital Forensics: Acquisition Methods, Analysis Techniques, Tools, and Future Directions. 1320-1342 - Muhammad Adil

, Ahmed Farouk
, Hussein Abulkasim
, Aitizaz Ali
, Houbing Song
, Zhanping Jin
:
NG-ICPS: Next Generation Industrial-CPS, Security Threats in the Era of Artificial Intelligence, and Open Challenges With Future Research Directions. 1343-1367 - Aajid Khan, Satanand Mishra

, Shivani Pandey
, Tanmay Sardar
, Aayush Mishra
, Manish Mudgal, Sandeep Singhai
:
A Critical Review of IoT-Based Structural Health Monitoring for Dams. 1368-1379 - Lameya Aldhaheri

, Noor Alshehhi
, Irfana Ilyas Jameela Manzil
, Ruhul Amin Khalil
, Shumaila Javaid, Nasir Saeed
, Mohamed-Slim Alouini
:
LoRa Communication for Agriculture 4.0: Opportunities, Challenges, and Future Directions. 1380-1407 - Mohammad Abuyaghi

, Samir Si-Mohammed
, George Shaker
, Catherine Rosenberg
:
Positioning in 5G Networks: Emerging Techniques, Use Cases, and Challenges. 1408-1427 - Yong Ma, Long Liu, Zhiquan Liu, Fagen Li, Qilin Xie, Kaiwei Chen, Chenyang Lv, Ying He, Fan Li:

A Survey of DDoS Attack and Defense Technologies in Multiaccess Edge Computing. 1428-1452 - Lei Tang

, Ruijie Wang
, Zhanwen Liu
, Yunji Liang
, Yuanyuan Niu, Wei Zhu, Zongtao Duan
:
Scenario-Based Accelerated Testing for SOTIF in Autonomous Driving: A Review. 1453-1470 - Zhi Lian

, Peng Shi
, Mou Chen
:
A Survey on Cyber-Attacks for Cyber-Physical Systems: Modeling, Defense, and Design. 1471-1483 - Saeid Alirezazadeh

, Luís A. Alexandre
:
A Survey on Task Allocation and Scheduling in Robotic Network Systems. 1484-1508 - Hualong Chen

, Yuanqiao Wen, Yamin Huang, Changshi Xiao, Zhongyi Sui
:
Edge Computing Enabling Internet of Ships: A Survey on Architectures, Emerging Applications, and Challenges. 1509-1528 - Jie Guo

, Meiting Wang
, Hang Yin, Bin Song
, Yuhao Chi
, Fei Richard Yu
, Chau Yuen
:
Large Language Models and Artificial Intelligence Generated Content Technologies Meet Communication Networks. 1529-1553 - Yunzhong Chen

, Jiadi Yu
, Linghe Kong
, Yanmin Zhu
:
A Comprehensive Survey of Side-Channel Sound-Sensing Methods. 1554-1578 - Lei Fu, Runyu Pan, Tianbo Gu, Xiuzhen Cheng

, Huanle Zhang
:
IoT-Enabled Supply Chain Management From a Customer Perspective: Challenges and Opportunities. 1579-1589 - Xiang Chen, Changlin Yang

, Yuhong Nan
, Zibin Zheng
:
An Empirical Study of High-Risk Vulnerabilities in IoT Systems. 1590-1601 - Zhaoping Yan

, Bo Xiang
, Dejian Yu, Jin Shi
:
Identification of the Knowledge Trajectory of Internet of Vehicles: From the Perspective of Main Path Analysis and Topic Analysis. 1602-1612 - Zhe Wang

, Jun Zheng
, Abbas Jamalipour
:
Mobility Performance Analyses of Base Station Cooperation for Cellular-Connected UAV Networks. 1613-1627 - Hanwen Zhang

, Peichun Li, Minghui Dai
, Yuan Wu, Li Ping Qian
:
Efficient Federated Learning With Quality-Aware Generated Models: An Incentive Mechanism. 1628-1642 - Muhammad Yahya

, Muhammad Naeem
, Zeeshan Kaleem
, Ali Hamdan Alenezi
, Waleed Ejaz
:
Robust Multicriterion Offloading in Digital-Twin-Assisted UAV Networks. 1643-1654 - Jing Zhang

, Jiaxuan Zhang
, Fei Shen
, Feng Yan
, Zhiyong Bu:
DOGS: Dynamic Task Offloading in Space-Air-Ground Integrated Networks With Game-Theoretic Stochastic Learning. 1655-1672 - Bicheng Guo

, Shibo He
, Miaojing Shi
, Kaicheng Yu, Jiming Chen
, Xuemin Shen
:
Semantic-DARTS: Elevating Semantic Learning for Mobile Differentiable Architecture Search. 1673-1687 - Houda Rafi

, Yannick Benezeth
, Fan Yang, Philippe Reynaud, Emmanuel Arnoux, Cédric Demonceaux
:
Tree-Based Personalized Clustered Federated Learning: A Driver Stress Monitoring Through Physiological Data Case Study. 1688-1698 - Eduardo Ortega

, Fei Su
, Rita Chattopadhyay, Krishnendu Chakrabarty
:
Discretized-Isolation Forest: Memory- and Compute-Efficient Unsupervised Anomaly Detection for Resource-Constrained Internet of Things Edge Devices. 1699-1717 - Yue Ma

, Ruiqian Ma
, Zhi Lin
, Ruoyu Zhang
, Yueming Cai
, Wen Wu
, Jiangzhou Wang
:
Improving Age of Information for Covert Communication With Time-Modulated Arrays. 1718-1731 - Chang Liu

, Zheng Xue
, Canliang Liao, Jiawen Kang
, Guojun Han
:
DRL-Enhanced Vehicular Edge Caching Addressing Content Dynamics and Complex Intersections. 1732-1745 - Chen He

, Huixu Luan
, Z. Jane Wang
:
Zero-Padding Space-Time Block Code for Dual-Antenna Backscatter Tag. 1746-1759 - Xinghan Wang

, Tingting Yang
:
Rank-Two Correction and Fine-Tuning for Adaptive Byzantine Recovery in Federated Learning. 1760-1773 - Xin Jian

, Lingkun Xie
, Xiaogang Zhu
, Shaokun Liu, Yangjie Li, Alireza Jolfaei
, Osama Alfarraj
, Keping Yu
:
High-Reliability Low-Latency Intelligent Geographic Routing Protocol for Vehicle Road Cooperation System. 1774-1788 - Xiaoyu Liu

, Haibo Zhou
, Zitian Zhang
, Qiangzhou Gao, Ting Ma:
Multipath Cooperative Routing in Ultradense LEO Satellite Networks: A Deep-Reinforcement-Learning-Based Approach. 1789-1804 - Zhiqing Luo

, Weiming Li, Yijie Wu, Huixin Dong, Luanjian Bian, Wei Wang
:
Accurate Indoor Localization for Bluetooth Low Energy Backscatter. 1805-1816 - Yongsoo Kim

, Jaehyeon So
, Chanwook Hwang
, Wencan Cheng
, Jaehyuk Choi
, Jong Hwan Ko
:
An FPGA-Based Energy-Efficient Real-Time Hand Pose Estimation System With an Integrated Image Signal Processor for Indirect 3-D Time-of-Flight Sensors. 1817-1830 - Kai-Dong Hong

, Wensong Wang
, Guanlin Jiang
, Zhou Shu
, Jinsheng Ji
, Minshan Lu, Yuanjin Zheng
:
Broadband 3-D Omnidirectional Magnetic Induction-Based Sensor Module for Partial Discharge Detection of High-Voltage Equipment in IIoT Application. 1831-1842 - Enrico Testi

, Enrico Paolini
:
Packet Collision Probability of Direct-to-Satellite IoT Systems. 1843-1855 - Weizhi Meng

, Wenjuan Li
, Andrei Nicolae Calugar:
BANN-TMGuard: Toward Touch-Movement-Based Screen Unlock Patterns via Blockchain-Enabled Artificial Neural Networks on IoT Devices. 1856-1866 - Sicong Zhang

, Yang Xu
, Xiaoyao Xie:
Universal Adversarial Perturbations Against Machine-Learning-Based Intrusion Detection Systems in Industrial Internet of Things. 1867-1889 - Chaklam Cheong

, Yujie Song
, Yue Cao
, Yu'ang Zhang, Haoxiang Wang, Qiang Ni
:
DCACA: Dual-Model Consensus-Based Anti-Risk Confidence Allocation Trust Management in IoVs. 1890-1906 - Xiaodong Xu

, Zhuo Meng, Jingxuan Zhang
, Shujun Han
, Bizhu Wang
, Mengying Sun
, Weidong Wang
, Ping Zhang
:
Learning-Based Deterministic Delay Performance Guarantee Strategy in RIS-Assisted Communication Networks. 1907-1921 - Xiying Fan

, Di Liu, Mengxuan Qiu, Yingqi Li
, Jiahao Huo
, Haojin Li
, Chen Sun
:
Dynamic Prioritized Data Transmission Through Intersatellite Cooperation in LEO Constellations. 1922-1932 - Xiaoming Wang

, Jianwei Li
, Zhiquan Liu
, Quan Tang, Xixian Wang
:
Enabling Secure Cross-Modal Search Over Encrypted Data via Federated Learning. 1933-1945 - Lili Nie

, Huiqiang Wang
, Guangsheng Feng
, Hongwu Lv
, Hang Cui:
DRL-MURA: A Joint Optimization of High-Definition Map Updating and Wireless Resource Allocation in Vehicular Edge Computing Networks. 1946-1961 - Congming Wei

, Shulin He, An Wang
, Shaofei Sun
, Yaoling Ding
, Jingqi Zhang
, Liehuang Zhu
:
An Intelligent Framework for Cluster-Based Side-Channel Analysis on Public-Key Cryptosystems. 1962-1973 - Mohamad Arafeh

, Ahmad Hammoud
, Mohsen Guizani
, Azzam Mourad
, Hadi Otrok
, Hakima Ould-Slimane
, Zbigniew Dziong
, Chang-Dong Wang
, Di Wu
:
WFSL: Warmup-Based Federated Sequential Learning. 1974-1989 - Lin Chen, Yuxiang Chen

, Wei Liang
, Xiong Li
, Kuan-Ching Li
, Jin Wang, Naixue Xiong
:
MASS: A Multiattribute Sketch Secure Data Sharing Scheme for IoT Wearable Medical Devices Based on Blockchain. 1990-2001 - Jianhui Wu

, Yuanfa Ji
, Xiyan Sun
, Wentao Fu
, Songke Zhao:
Anonymous Flocking With Obstacle Avoidance via the Position of Obstacle Boundary Point. 2002-2013 - Wei Li

, Jun Chen
, Yucheng Zhang, Ruijin Sun, Shiming Xia, Zhisong Pan
, Jianxin Luo
:
MSGFormer: Revolutionizing Traffic Flow Prediction With Multiscale and Gated Transformer Architecture. 2014-2025 - Chenggang Shan

, Runze Gao
, Qinghua Han
, Tian Liu
, Zhen Yang, Jinhui Zhang
, Yuanqing Xia
:
KCES: A Workflow Containerization Scheduling Scheme Under Cloud-Edge Collaboration Framework. 2026-2042 - Zilin Song, Kwan-Wu Chin

, Changlin Yang
:
Optimizing Targets Coverage Quality in UAV-Aided IoT Networks. 2043-2059 - Weibo Hao

, Fang Ye
, Yuan Tian:
Design of Multiterm Spectrum Resource Trading Contracts in UAV-Enabled IoT. 2060-2078 - Ran Gong

, Chao Guo, Yi Xu, Jinxiao Li, Wei Jiang:
A Novel Interpretable Adversarial NMF Network for Compound Fault Decoupling in Planetary Transmission. 2079-2089 - Junke Duan

, Wei Wang
, Licheng Wang
, Lize Gu
:
Transitioning RingCT Accounts: From Classical to Post-Quantum Security. 2090-2105 


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID