- A fault tolerant node placement algorithm for WSNs and IoT networks
- Cognisseum: Cognitive radios on Colosseum facing adversaries
- NFTs for accessing, monetizing, and teleporting digital twins and digital artifacts in the metaverse
- Efficient multichannel energy harvesting with dedicated energy transmitters in CR-IoT networks
- Open set identification of malicious encrypted traffic based on multi-feature fusion
- Local differential privacy federated learning based on heterogeneous data multi-privacy mechanism
- A cache-aware congestion control mechanism using deep reinforcement learning for wireless sensor networks
- AI-optimized elliptic curve with Certificate-Less Digital Signature for zero trust maritime security
- Optimization of the age of correlated information in V2X networks with edge computing
- An on-demand collaborative edge caching strategy for edge-fog-cloud environment
- Towards coordinating self-healing instances: Policy-based and non-cooperative game theory-based approaches with location awareness
- Residual Multiscale Attention based Modulated Convolutional Neural Network for Radio Link Failure Prediction in 5G
- RIPPLE-WiN: An efficient protocol for loop-free multipath routing in wireless networks
- Analysis of SR-IOV in Docker containers using RTT measurements
- 5G Non-Terrestrial Networks: Technologies, Standards, and System Design
- A Potpourri on Wireless Advances: Part 3
- Cover 3
- Resource Allocation for Ris-Empowered Wireless Communications: Low-Complexity and Robust Designs
- When Federated Learning Meets Knowledge Distillation
- Intelligent Surface Empowered Integrated Sensing and Communication: From Coexistence to Reciprocity
- Call for Papers
- Comsoc AW Training
- IEEE Collabratec
- Women in Engineering
- Front Cover
- Cover 4
- Comsoc Publications
- Comsoc IWC Training
- Masthead
- Intelligible Protocol Learning for Resource Allocation in 6G O-RAN Slicing
- Wisense: A Dataset for WiFi-Based Human Activity Recognition
- Intelligent Reflecting Surface Assisted Physical Layer Security: A Deep Learning Approach
- New Frontier of Communication Security on Radio Frequency Fingerprints Concealment
- IEEE Globecom 2024
- Virtualized network functions resource allocation in network functions virtualization using mathematical programming
- Federated learning: A cutting-edge survey of the latest advancements and applications
- Comparison of energy conservation strategies for 5G NR RedCap service in industrial environment
- In-Vehicle Communication Cyber Security: A Comprehensive Review of Challenges and Solutions
- S-LDM: Server local dynamic map for 5G-based centralized enhanced collective perception
- Markov-reward based estimation of the idle-time in vehicular networks to improve multimetric routing protocols
- FedGen: Federated learning-based green edge computing for optimal route selection using genetic algorithm in Internet of Vehicular Things
- Vehicular network anomaly detection based on 2-step deep learning framework
- Multi-path serial tasks offloading strategy and dynamic scheduling optimization in vehicular edge computing networks
- Discharging driven energy sharing protocol for V2V communication in vehicular energy networks
- Fully distributed multi-agent processing strategy applied to vehicular networks
- An efficient heterogeneous online/offline anonymous certificateless signcryption with proxy re-encryption for Internet of Vehicles
- A lossless quantization approach for physical-layer key generation in vehicular ad hoc networks based on received signal strength
- Hybrid cryptography-based scheme with conditional privacy-preserving authentication and memory-based DOS resilience in V2X
- Cost-aware task offloading in vehicular edge computing: A Stackelberg game approach
- VESecure: Verifiable authentication and efficient key exchange for secure intelligent transport systems deployment
- Subchannel assignment for social-assisted UAV cellular networks using dynamic hypergraph coloring
- URLLC-aware and energy-efficient data offloading strategy in high-mobility vehicular mobile edge computing environments
- Broadcast signcryption scheme with equality test in smart transportation system
- A secure authentication framework for IoV based on blockchain and ensemble learning
- On a security scheme against collusive attacks in vehicular ad hoc networks
- State-of-the-art authentication and verification schemes in VANETs: A survey
- GASBO: User grouping–based gradient average subtraction–based optimisation for NOMA-based fog computing vehicular network
- A robust multi-stage intrusion detection system for in-vehicle network security using hierarchical federated learning
- Assessing the impact of communication delays for Autonomous Intersection Management systems
- HCFAIUN: A novel hyperelliptic curve and fuzzy extractor-based authentication for secure data transmission in IoT-based UAV networks
- Efficiency of UAV-assisted cellular networks under jamming scenarios
- Conditional privacy-preserving and efficient distributed IoV data sharing scheme based on a hierarchical and zonal blockchain
- Evaluating energy harvesting UAV-NOMA network with random user pairing in the finite blocklength regime
- IDS-DEC: A novel intrusion detection for CAN bus traffic based on deep embedded clustering
- Joint optimization for service-caching, computation-offloading, and UAVs flight trajectories over rechargeable UAV-aided MEC using hierarchical multi-agent deep reinforcement learning
- ASAP: IEEE 802.11ax-based seamless access point handover for moving vehicles
- Physical layer security in SWIPT-based cooperative vehicular relaying networks
- An adaptive and multi-path greedy perimeter stateless routing protocol in flying ad hoc networks
- LB-CLAS: Lattice-based conditional privacy-preserving certificateless aggregate signature scheme for VANET
- CANival: A multimodal approach to intrusion detection on the vehicle CAN bus
- Upper bound of outage probability in unmanned aerial vehicle-assisted cellular networks over fading channels
- An intelligent clustering scheme based on whale optimization algorithm in flying ad hoc networks
- Security situation assessment in UAV swarm networks using TransReSE: A Transformer-ResNeXt-SE based approach
- A novel Q-learning-based secure routing scheme with a robust defensive system against wormhole attacks in flying ad hoc networks
- Enhancing vehicular NOMA communication security through reconfigurable intelligent surfaces
- An identity authentication and key agreement protocol for the internet of vehicles based on trusted cloud-edge-terminal architecture
- Fairness-driven link scheduling approach for heterogeneous gateways for digital twin enabled industry 4.0
- Enhance cloud security and effectiveness using improved RSA-based RBAC with XACML technique
- Proposed artificial intelligence algorithm and deep learning techniques for development of higher education
- Intelligent prediction method for power generation based on deep learning and cloud computing in big data networks
- HNTSumm: Hybrid text summarization of transliterated news articles
- Face expression image detection and recognition based on big data technology
- Efficient breast cancer detection via cascade deep learning network
- Application of spatial data and 3S robotic technology in digital city planning
- ARTP: Anomaly based real time prevention of Distributed Denial of Service attacks on the web using machine learning approach
- Three-stage data generation algorithm for multiclass network intrusion detection with highly imbalanced dataset
- Unsupervised machine learning technique for classifying production zones in unconventional reservoirs
- A systematic review on early prediction of Mild cognitive impairment to alzheimers using machine learning algorithms
- Hierarchical energy efficient secure routing protocol for optimal route selection in wireless body area networks
- Classification of network slicing threats based on slicing enablers: A survey
- An inception V3 approach for malware classification using machine learning and transfer learning
- Solar irradiance forecasting models using machine learning techniques and digital twin: A case study with comparison
- A novel deep neural network heartbeats classifier for heart health monitoring
- Localization for V2X communication with noisy distance measurement
- Genetic algorithm with self adaptive immigrants for effective virtual machine placement in cloud environment
- Customer churning analysis using machine learning algorithms
- Quadratic ensemble weighted emphasis boosting based energy and bandwidth efficient routing in Underwater Sensor Network
- Prediction of floods using improved PCA with one-dimensional convolutional neural network
- PARouting: Prediction-supported adaptive routing protocol for FANETs with deep reinforcement learning
- Adaptive switching and routing protocol design and optimization in internet of things based on probabilistic models