- BitFL: Bitstream-based Lightweight Federated Learning with Differential Privacy for Radio Frequency Fingerprint Identification of Drones
- Direct and indirect relationship reconstruction to address network risk propagation
- Comprehensive Performance Analysis of Security Applications on the BlueField-3 SmartNIC
- The Pulse of MQTT in the Wild: a Large-Scale Traffic Analysis
- Dynamic Network Intrusion Detection Model Based on Transformer and Adversarial Autoencoder
- Transformer based Framework for Nuclei Segmentation and Cell Counting on Microscopic Images of Multiple Organs
- Design and Research of Multi-Heterogeneous Network Security Intrusion Detection System Based on TensorFlow Framework
- A Novel Multi-path Routing Optimization Scheme for Deterministic Computing Power Network in Industrial Internet of Things
- TrafficT5: Multi-Stage Self-Correcting Framework for Traffic Generation
- A Multi-Layer based Collaborative Optimization (MCO) for Multiple UAVs’ Task Allocation and Scheduling
- Evolutionary Multi-Task Based Microservice Resource Allocation
- Computer Network Optimization Using the Power Metric for Multiple Flows: Part II — Extension to Continuous Priority Queueing Disciplines
- AI-Driven Spectrum Sensing: An In-Depth Meta-Analysis of Trends, Challenges and Opportunities
- EO-ZT: Economically Informed Zero-Trust for Secure Spectrum Trading in Open Radio Access Networks (O-RAN)
- Exploiting Age of Information in Network Digital Twins for AI-driven Real-Time Link Blockage Detection
- A Performance-Adjustable Encryption Scheme for Balancing Security and Efficiency in Matrix Multiplication Outsourcing
- TrafficLLM: LLMs for Improved Open-Set Encrypted Traffic Analysis
- GIIDS-AR: End-to-end Generalized Intelligent Intrusion Detection System with Adversarial Robustness for Heterogeneous UAVs in UAM
- Digital Twin-Empowered Task Offloading in VEC: Attention-augmented DRL for Mobility-Resilient Optimization
- The ILLcipher Family of Low-Latency Block Ciphers for Industrial Internet of Things
- Implicit Dynamic Incentives Mechanism based on Anchoring Effects in Mobile Crowd Sensing
- Analysis and Implementation of Lightweight Key Exchange Algorithms for MQTT Security
- ByteDance: Let Bytes Perform Brilliantly in Multi-View Encrypted Traffic Classification
- A blind signature-based Authorization Scheme for Enhancing the Privacy of Cloud-Assisted Private Set Intersection
- A Hybrid Deep Reinforcement Learning and Genetic Algorithm Approach for Optimized Resource Allocation and Reconfigurable Intelligent Surface Deployment in 6G Holographic Communication.
- Transfer function-guided mixed-variable optimization for joint mining decisions and resource allocation in mobile edge computing-integrated blockchain networks
- Location-based early detection and prevention of DDoS attacks in mMTC networks
- Robust attribute-based access control protocol over data-centric IoT-NDN networking
- Efficient Multi-UAV Coordination via RL: Joint Path Planning and Task Scheduling for Post-Disaster UAV-Assisted MEC Systems
- Integrating Topology and Traffic Engineering to Maximize Throughput in Reconfigurable Networks
- Artificial Immune System-based Congestion Control Routing for Satellite Networks
- Editorial Board
- Artificial Intelligence based Approaches for Vehicular Cloud and Vehicular Fog Networks: An Overview
- Optimization for Dynamic Multi-RIS-assisted SWIPT-Enabled V2I Networks: A Deep Learning Approach
- Orchestrating Trajectory, Active Jamming, and Antenna Selection for Energy-Efficient Secure Aerial IRS Communications
- Success Stories From ITSS Conferences in 2025 [Its Conference Activities]
- ITSS Strategic Planning [President’s Message]
- Pursuing Excellence in Intelligent Transportation Systems: A Personal Journey [Its People]
- Radio Frequency Identification and Real-Time Security of LoRa Devices with Deep Learning on Embedded GPU
- Lyapunov-enabled Attention-inspired DRL approach for R2X offloading in Vehicular Edge Network
- Next-Gen IoT Localization: When Quantum-SSA-Markov Hybridization Meets Energy Efficiency for Robust, Accurate, and Sustainable Positioning in Smart Environments
- When Vulnerable Groups Gain a Digital Voice
- Masthead
- Table of Contents
- IEEE Tech Rxiv
- Front Cover
- IEEE Connect
- IEEE Moving
- IEEE App
- IEEE Feedback
- UrbanMITS Lab at C2SMART [Its Research Lab]
- Calendar
- [Its PH.D.s]
- A Dual-Mode Framework for Indoor Localization via Temporal Learning and Knowledge Distillation
- ADMZ: Adaptive Dynamic Mix Zone pseudonym change strategy for location privacy in Vehicular Ad-hoc Networks
- Cache-assisted task offloading in Vehicular Edge Computing: A spatio-temporal deep reinforcement learning approach
- Enhancement of fuzzy trust evaluation via autoencoders in game-theory based security distributed wireless sensor networks
- Bi-functional glucose Sensing-Transmission (Sens-Tra) sensor for IoT-based applications
- Stochastic fractal search with reinforcement learning for dynamic routing in resource-constrained IoT networks
- PrivBoost: A Federated Learning Framework for Differentially Private Tree Boosting
- EMSA-CRP:A cluster based routing Protocol for Wireless Sensor Networks based on Enhanced Mantis Search Algorithm
- 6Decoder: A Neural Network Model for IPv6 Target Generation
- FedSHE–CQ: A Communication-Efficient Homomorphic Encryption Framework for Federated Learning
- Macroscopic diffusion prediction in social networks based on spatio-temporal and trend features
- A verifiable and efficient chained federated learning scheme for privacy protection
- Game Theory based Incentive mechanism for a Bi-tiered Public Blockchain System
- An Adaptive Intrusion Detection System for the Internet of Things using Large Language Models and Post-Quantum-Secure Blockchain
- 3D Map and mmWave Radar-Based Self-Localization for UAVs in GNSS-Denied Environments
- Advancing intelligent transportation through digital twin: Challenges, models, and future prospects
- Collaborative deployment of Large AI Models on the edge: A microservice approach to heterogeneous training and quantized inference
- Editorial Board
- CNN-MHBiGRU: A two-stage deep learning framework with multi-attention mechanisms for IoT intrusion detection
- GMM-cGAN: Mitigating Data Scarcity and Label Noise for Robust Encrypted Malicious Traffic Classification
- Corporate Programs
- IEEE Access
- ComSoc Membership
- 2025 Conference Calendar
- Cover 4
- IEEE What If
- Global Communications Newsletter
- Series Editorial: Cybersecurity
- ComSoc Training
- ODS: A Self-Reporting System for Radio Telescopes to Coexist with Adaptive Satellite Constellations
- Charting the Future: A Review Of Comsoc's Strategic TC Restructuring
- IEEE Collabratec
- ComSoc Publications
- Series Editorial: Mobile Communications and Networks
- Table of Contents
- TechRxiv
- Guest Editorial: Direct Satellite-to-Device Communications: Technologies, Connectivity, and Spectrum Management
- Women in Engineering
- IEEE Foundation
- Cover 2
- Advertisers Index
- Cover 3
- Front cover
- A Look Back
- IEEE App
- IEEE Innovation Testbed
- ComSoc Technical Committees
