Future Internet
2009 - 2025
Current editor(s): Ms. Grace You From MDPI Bibliographic data for series maintained by MDPI Indexing Manager (indexing@mdpi.com). Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.
Volume 14, issue 12, 2022
- Recursive Feature Elimination for Improving Learning Points on Hand-Sign Recognition pp. 1-18

- Rung-Ching Chen, William Eric Manongga and Christine Dewi
- Analysis and Prediction of the IPv6 Traffic over Campus Networks in Shanghai pp. 1-18

- Zhiyang Sun, Hui Ruan, Yixin Cao, Yang Chen and Xin Wang
- SAUSA: Securing Access, Usage, and Storage of 3D Point CloudData by a Blockchain-Based Authentication Network pp. 1-18

- Ronghua Xu, Yu Chen, Genshe Chen and Erik Blasch
- A Low-Cost Open-Source Architecture for a Digital Signage Emergency Evacuation System for Cruise Ships, Based on IoT and LTE/4G Technologies pp. 1-18

- Vasileios Cheimaras, Athanasios Trigkas, Panagiotis Papageorgas, Dimitrios Piromalis and Emmanouil Sofianopoulos
- Examining Gender Bias of Convolutional Neural Networks via Facial Recognition pp. 1-18

- Tony Gwyn and Kaushik Roy
- Detection of Malicious Websites Using Symbolic Classifier pp. 1-30

- Nikola Anđelić, Sandi Baressi Šegota, Ivan Lorencin and Matko Glučina
- 6G Wireless Communication Systems: Applications, Opportunities and Challenges pp. 1-4

- Kelvin Anoh, Chan Hwang See, Yousef Dama, Raed A. Abd-Alhameed and Simeon Keates
- Smart Objects and Technologies for Social Good pp. 1-3

- Ivan Miguel Pires
- LSSDNF: A Lightweight Secure Software Defined Network Framework for Future Internet in 5G–6G pp. 1-19

- Surjit Singh, Vivek Mehla and Srete Nikolovski
- Comparative Analysis of Skeleton-Based Human Pose Estimation pp. 1-19

- Jen-Li Chung, Lee-Yeng Ong and Meng-Chew Leow
- NextDet: Efficient Sparse-to-Dense Object Detection with Attentive Feature Aggregation pp. 1-16

- Priyank Kalgaonkar and Mohamed El-Sharkawy
- Gamification with Scratch or App Inventor in Higher Education: A Systematic Review pp. 1-16

- David Pérez-Jorge and María Carmen Martínez-Murciano
- Integrating ISA and Part-of Domain Knowledge into Process Model Discovery pp. 1-29

- Alessio Bottrighi, Marco Guazzone, Giorgio Leonardi, Stefania Montani, Manuel Striani and Paolo Terenziani
- QuickFaaS: Providing Portability and Interoperability between FaaS Platforms pp. 1-29

- Pedro Rodrigues, Filipe Freitas and José Simão
- A Systematic Literature Review on Applications of GAN-Synthesized Images for Brain MRI pp. 1-33

- Sampada Tavse, Vijayakumar Varadarajan, Mrinal Bachute, Shilpa Gite and Ketan Kotecha
- Cumulative Impact of Testing Factors in Usability Tests for Human-Centered Web Design pp. 1-26

- Alexander V. Yakunin and Svetlana S. Bodrunova
- Joint Random Forest and Particle Swarm Optimization for Predictive Pathloss Modeling of Wireless Signals from Cellular Networks pp. 1-26

- Okiemute Roberts Omasheye, Samuel Azi, Joseph Isabona, Agbotiname Lucky Imoize, Chun-Ta Li and Cheng-Chi Lee
- Evolutionary Computation for Sparse Synthesis Optimization of CCAAs: An Enhanced Whale Optimization Algorithm Method pp. 1-15

- Bohao Tang, Lihua Cai, Shuai Yang, Jiaxing Xu and Yi Yu
- A Game-Theoretic Approach for Network Security Using Honeypots pp. 1-15

- Răzvan Florea and Mitică Craus
- Single-Shot Global and Local Context Refinement Neural Network for Head Detection pp. 1-15

- Jingyuan Hu and Zhouwang Yang
- Internet Video Delivery Improved by Super-Resolution with GAN pp. 1-23

- Joao da Mata Liborio, Cesar Melo and Marcos Silva
- Professionals as Change Agents or Instruments of Reproduction? Medical Residents’ Reasoning for Not Sharing the Electronic Health Record Screen with Patients pp. 1-14

- Celeste Campos-Castillo, Noelle Chesley and Onur Asan
- FedCO: Communication-Efficient Federated Learning via Clustering Optimization pp. 1-27

- Ahmed A. Al-Saedi, Veselka Boeva and Emiliano Casalicchio
- TinyML for Ultra-Low Power AI and Large Scale IoT Deployments: A Systematic Review pp. 1-45

- Nikolaos Schizas, Aristeidis Karras, Christos Karras and Spyros Sioutas
- rl4dtn: Q-Learning for Opportunistic Networks pp. 1-17

- Jorge Visca and Javier Baliosian
- The Application of Artificial Intelligence in Magnetic Hyperthermia Based Research pp. 1-17

- Magdalena Osial and Agnieszka Pregowska
- Enhancing the Lifetime and Energy Efficiency of Wireless Sensor Networks Using Aquila Optimizer Algorithm pp. 1-17

- Ashraf A. Taha, Hagar O. Abouroumia, Shimaa A. Mohamed and Lamiaa A. Amar
- A Novel Strategy for VNF Placement in Edge Computing Environments pp. 1-20

- Anselmo Luiz Éden Battisti, Evandro Luiz Cardoso Macedo, Marina Ivanov Pereira Josué, Hugo Barbalho, Flávia C. Delicato, Débora Christina Muchaluat-Saade, Paulo F. Pires, Douglas Paulo de Mattos and Ana Cristina Bernardo de Oliveira
- YOLO-DFAN: Effective High-Altitude Safety Belt Detection Network pp. 1-12

- Wendou Yan, Xiuying Wang and Shoubiao Tan
- Implementation of the Canny Edge Detector Using a Spiking Neural Network pp. 1-12

- Krishnamurthy V. Vemuru
- ERGCN: Enhanced Relational Graph Convolution Network, an Optimization for Entity Prediction Tasks on Temporal Knowledge Graphs pp. 1-12

- Yinglin Wang and Xinyu Xu
- A Multi-Sensory In-Store Virtual Reality Customer Journey for Retailing: A Field Study in a Furniture Flagship Store pp. 1-12

- Michele Fiorentino, Marina Ricci, Alessandro Evangelista, Vito Modesto Manghisi and Antonio Emmanuele Uva
- Holistic Utility Satisfaction in Cloud Data Centre Network Using Reinforcement Learning pp. 1-21

- Pejman Goudarzi, Mehdi Hosseinpour, Roham Goudarzi and Jaime Lloret
- Cloud-Native Applications and Services pp. 1-2

- Nane Kratzke
- Information and Future Internet Security, Trust and Privacy pp. 1-2

- Weizhi Meng, Thanassis Giannetsos and Christian D. Jensen
- Cyber-Physical Systems: Prospects, Challenges and Role in Software-Defined Networking and Blockchains pp. 1-2

- Uttam Ghosh, Deepak Tosh, Nawab Muhammad Faseeh Qureshi, Ali Kashif Bashir, Al-Sakib Khan Pathan and Zhaolong Ning
- COVID-Related Misinformation Migration to BitChute and Odysee pp. 1-22

- Olga Papadopoulou, Evangelia Kartsounidou and Symeon Papadopoulos
- Integrated SDN-NFV 5G Network Performance and Management-Complexity Evaluation pp. 1-22

- Nico Surantha and Noffal A. Putra
- Graph-Based Taxonomic Semantic Class Labeling pp. 1-22

- Tajana Ban Kirigin, Sanda Bujačić Babić and Benedikt Perak
Volume 14, issue 11, 2022
- Decision Support Using Machine Learning Indication for Financial Investment pp. 1-17

- Ariel Vieira de Oliveira, Márcia Cristina Schiavi Dazzi, Anita Maria da Rocha Fernandes, Rudimar Luis Scaranto Dazzi, Paulo Ferreira and Valderi Reis Quietinho Leithardt
- Privacy-Preserving Object Detection with Secure Convolutional Neural Networks for Vehicular Edge Computing pp. 1-17

- Tianyu Bai, Song Fu and Qing Yang
- IoT-Based System for Improving Vehicular Safety by Continuous Traffic Violation Monitoring pp. 1-17

- Yousef-Awwad Daraghmi, Mamoun Abu Helou, Eman-Yasser Daraghmi and Waheeb Abu-ulbeh
- A Spectrum Management Platform Architecture to Enable a Sharing Economy in 6G pp. 1-13

- Faycal Bouhafs, Alessandro Raschellà, Michael Mackay and Frank den Hartog
- Integrating Chatbot Media Automations in Professional Journalism: An Evaluation Framework pp. 1-23

- Efthimis Kotenidis, Nikolaos Vryzas, Andreas Veglis and Charalampos Dimoulas
- Identification of Risk Factors Using ANFIS-Based Security Risk Assessment Model for SDLC Phases pp. 1-21

- Rasheed Gbenga Jimoh, Olayinka Olufunmilayo Olusanya, Joseph Bamidele Awotunde, Agbotiname Lucky Imoize and Cheng-Chi Lee
- LoRaWAN Network Downlink Routing Control Strategy Based on the SDN Framework and Improved ARIMA Model pp. 1-21

- Qi Qian, Liang Shu, Yuxiang Leng and Zhizhou Bao
- EduTVA: Metadata Schema for Educational Audiovisual Contents in Digital Television Environments pp. 1-21

- Angela M. Vargas-Arcila, Julian A. Caicedo-Muñoz, Felipe Estrada-Solano, Carlos González-Amarillo, Armando Ordonez and Jose L. Arciniegas
- Toward Vulnerability Detection for Ethereum Smart Contracts Using Graph-Matching Network pp. 1-21

- Yujian Zhang and Daifu Liu
- A Cost-Aware Framework for QoS-Based and Energy-Efficient Scheduling in Cloud–Fog Computing pp. 1-21

- Husam Suleiman
- Data Synchronization: A Complete Theoretical Solution for Filesystems pp. 1-21

- Elod P. Csirmaz and Laszlo Csirmaz
- The Role of Users’ Demographic and Social Attributes for Accepting Biometric Systems: A Greek Case Study pp. 1-31

- Angeliki Kitsiou, Charikleia Despotidi, Christos Kalloniatis and Stefanos Gritzalis
- Comparison of Distributed Tamper-Proof Storage Methods for Public Key Infrastructures pp. 1-18

- Fabian Honecker, Julian Dreyer and Ralf Tönjes
- Ambient Environmental Parameter Estimation for Reliable Diffusive Molecular Communications pp. 1-15

- Shota Toriyama, Shoma Hasegawa, Jens Kirchner, Georg Fischer and Daisuke Anzai
- A Multi-Gateway Behaviour Study for Traffic-Oriented LoRaWAN Deployment pp. 1-15

- Kerima Saleh Abakar, Ismail Bennis, Abdelhafid Abouaissa and Pascal Lorenz
- BERT- and BiLSTM-Based Sentiment Analysis of Online Chinese Buzzwords pp. 1-15

- Xinlu Li, Yuanyuan Lei and Shengwei Ji
- Multimodel Phishing URL Detection Using LSTM, Bidirectional LSTM, and GRU Models pp. 1-15

- Sanjiban Sekhar Roy, Ali Ismail Awad, Lamesgen Adugnaw Amare, Mabrie Tesfaye Erkihun and Mohd Anas
- Protecting Sensitive Data in the Information Age: State of the Art and Future Prospects pp. 1-43

- Christoph Stach, Clémentine Gritti, Julia Bräcker, Michael Behringer and Bernhard Mitschang
- Privacy Goals for the Data Lifecycle pp. 1-25

- Jane Henriksen-Bulmer, Cagatay Yucel, Shamal Faily and Ioannis Chalkias
- Evaluation of the Factors That Impact the Perception of Online Content Trustworthiness by Income, Political Affiliation and Online Usage Time pp. 1-55

- Matthew Spradling and Jeremy Straub
- Exploring the Design of a Mixed-Reality 3D Minimap to Enhance Pedestrian Satisfaction in Urban Exploratory Navigation pp. 1-24

- Yiyi Zhang and Tatsuo Nakajima
- Generating Indicators of Disruptive Innovation Using Big Data pp. 1-24

- Roger C. Brackin, Michael J. Jackson, Andrew Leyshon, Jeremy G. Morley and Sarah Jewitt
- A Machine Learning Predictive Model to Detect Water Quality and Pollution pp. 1-14

- Xiaoting Xu, Tin Lai, Sayka Jahan, Farnaz Farid and Abubakar Bello
- Financial Market Correlation Analysis and Stock Selection Application Based on TCN-Deep Clustering pp. 1-14

- Yuefeng Cen, Mingxing Luo, Gang Cen, Cheng Zhao and Zhigang Cheng
- Collaborative and Intelligent Networks and Decision Systems and Services for Supporting Engineering and Production Management pp. 1-6

- Leonilde Varela and Goran D. Putnik
- Analysis of Data from Surveys for the Identification of the Factors That Influence the Migration of Small Companies to eCommerce pp. 1-22

- William Villegas-Ch., Santiago Criollo-C, Walter Gaibor-Naranjo and Xavier Palacios-Pacheco
- Blockchain Technology: Benefits, Challenges, Applications, and Integration of Blockchain Technology with Cloud Computing pp. 1-22

- Gousia Habib, Sparsh Sharma, Sara Ibrahim, Imtiaz Ahmad, Shaima Qureshi and Malik Ishfaq
- Hate and False Metaphors: Implications to Emerging E-Participation Environment pp. 1-10

- Sreejith Alathur, Naganna Chetty, Rajesh R. Pai, Vishal Kumar and Sahraoui Dhelim
- A Comparison of Blockchain Recovery Time in Static and Mobile IoT-Blockchain Networks pp. 1-20

- Yue Su, Kien Nguyen and Hiroo Sekiya
- Real-Time Image Detection for Edge Devices: A Peach Fruit Detection Application pp. 1-12

- Eduardo Assunção, Pedro D. Gaspar, Khadijeh Alibabaei, Maria P. Simões, Hugo Proença, Vasco N. G. J. Soares and João M. L. P. Caldeira
- Key Competences for Lifelong Learning through the “Animal Crossing: New Horizons” Video Game pp. 1-12

- Beatriz Villarejo-Carballido, Cristina M. Pulido and Santiago Tejedor
- The Future of Cybersecurity in the Age of Quantum Computers pp. 1-12

- Fazal Raheman
- Editorial for the Special Issue on “Software Engineering and Data Science” pp. 1-2

- Davide Tosi
- Internet of Things and Cyber–Physical Systems pp. 1-2

- Iwona Grobelna
- Editorial for the Special Issue on 5G Enabling Technologies and Wireless Networking pp. 1-2

- Michael Mackay
- Special Issue on Security and Privacy in Blockchains and the IoT pp. 1-4

- Christoph Stach
- Editorial for the Special Issue “Selected Papers from the 9th Annual Conference ‘Comparative Media Studies in Today’s World’ (CMSTW’2021)” pp. 1-3

- Svetlana S. Bodrunova
- Real-Time Flood Monitoring with Computer Vision through Edge Computing-Based Internet of Things pp. 1-19

- Obaid Rafiq Jan, Hudyjaya Siswoyo Jo, Riady Siswoyo Jo and Jonathan Kua
- A Dynamic Federated Identity Management Using OpenID Connect pp. 1-19

- Ahmad Alsadeh, Nasri Yatim and Yousef Hassouneh
- Assessing Latency of Packet Delivery in the 5G 3GPP Integrated Access and Backhaul Architecture with Half-Duplex Constraints pp. 1-19

- Nikita Polyakov and Anna Platonova
- What Is Metaverse?—A Definition Based on Qualitative Meta-Synthesis pp. 1-16

- Markus Weinberger
- Users’ Perceptions of Key Blockchain Features in Games pp. 1-16

- Iikka Paajala, Jesse Nyyssölä, Juho Mattila and Pasi Karppinen
- Reliable Application Layer Routing Using Decentralized Identifiers pp. 1-16

- Khalid Alsubhi, Bander Alzahrani, Nikos Fotiou, Aiiad Albeshri and Mohammed Alreshoodi
- SHFL: K-Anonymity-Based Secure Hierarchical Federated Learning Framework for Smart Healthcare Systems pp. 1-16

- Muhammad Asad, Muhammad Aslam, Syeda Fizzah Jilani, Saima Shaukat and Manabu Tsukada
Volume 14, issue 10, 2022
- Author Identification from Literary Articles with Visual Features: A Case Study with Bangla Documents pp. 1-20

- Ankita Dhar, Himadri Mukherjee, Shibaprasad Sen, Md Obaidullah Sk, Amitabha Biswas, Teresa Gonçalves and Kaushik Roy
- The Combined Use of UAV-Based RGB and DEM Images for the Detection and Delineation of Orange Tree Crowns with Mask R-CNN: An Approach of Labeling and Unified Framework pp. 1-20

- Felipe Lucena, Fabio Marcelo Breunig and Hermann Kux
- ReFuse: Generating Imperviousness Maps from Multi-Spectral Sentinel-2 Satellite Imagery pp. 1-20

- Giovanni Giacco, Stefano Marrone, Giuliano Langella and Carlo Sansone
- Complex Cases of Source Code Authorship Identification Using a Hybrid Deep Neural Network pp. 1-20

- Anna Kurtukova, Aleksandr Romanov, Alexander Shelupanov and Anastasia Fedotova
- Study of the Organization and Implementation of E-Learning in Wartime Inside Ukraine pp. 1-20

- Liudmyla Matviichuk, Stefano Ferilli and Nataliia Hnedko
- An Efficient Location-Based Forwarding Strategy for Named Data Networking and LEO Satellite Communications pp. 1-12

- Pablo Iglesias-Sanuy, José Carlos López-Ardao, Miguel Rodríguez-Pérez, Sergio Herrería-Alonso, Andrés Suárez-González and Raúl F. Rodríguez-Rubio
- A Unified PUF and Crypto Core Exploiting the Metastability in Latches pp. 1-12

- Ronaldo Serrano, Ckristian Duran, Marco Sarmiento, Tuan-Kiet Dang, Trong-Thuc Hoang and Cong-Kha Pham
- Modeling and Validating a News Recommender Algorithm in a Mainstream Medium-Sized News Organization: An Experimental Approach pp. 1-21

- Paschalia (Lia) Spyridou, Constantinos Djouvas and Dimitra Milioni
- A Comparative Study on Traffic Modeling Techniques for Predicting and Simulating Traffic Behavior pp. 1-21

- Taghreed Alghamdi, Sifatul Mostafi, Ghadeer Abdelkader and Khalid Elgazzar
- A Survey of Wi-Fi 6: Technologies, Advances, and Challenges pp. 1-52

- Erfan Mozaffariahrar, Fabrice Theoleyre and Michael Menth
- Minimization of n th Order Rate Matching in Satellite Networks with One to Many Pairings pp. 1-11

- Anargyros J. Roumeliotis, Christos N. Efrem and Athanasios D. Panagopoulos
- Cloud-Native Observability: The Many-Faceted Benefits of Structured and Unified Logging—A Multi-Case Study pp. 1-23

- Nane Kratzke
- Towards Reliable Baselines for Document-Level Sentiment Analysis in the Czech and Slovak Languages pp. 1-23

- Ján Mojžiš, Peter Krammer, Marcel Kvassay, Lenka Skovajsová and Ladislav Hluchý
- Deep Learning Based Semantic Image Segmentation Methods for Classification of Web Page Imagery pp. 1-14

- Ramya Krishna Manugunta, Rytis Maskeliūnas and Robertas Damaševičius
- Smart Preliminary Channel Access to Support Real-Time Traffic in Wi-Fi Networks pp. 1-14

- Kirill Chemrov, Dmitry Bankov, Evgeny Khorov and Andrey Lyakhov
- Analysis and Correlation between a Non-Invasive Sensor Network System in the Room and the Improvement of Sleep Quality pp. 1-27

- Eduardo Morales-Vizcarra, Carolina Del-Valle-Soto, Paolo Visconti and Fabiola Cortes-Chavez
- An Enhanced ELECTRE II Method for Multi-Attribute Ontology Ranking with Z-Numbers and Probabilistic Linguistic Term Set pp. 1-36

- Ameeth Sooklall and Jean Vincent Fonou-Dombeu
- Distributed Big Data Storage Infrastructure for Biomedical Research Featuring High-Performance and Rich-Features pp. 1-13

- Xingjian Xu, Lijun Sun and Fanjun Meng
- Improving Quality Indicators of the Cloud-Based IoT Networks Using an Improved Form of Seagull Optimization Algorithm pp. 1-13

- Hamza Mohammed Ridha Al-Khafaji
- Latency Analysis of Blockchain-Based SSI Applications pp. 1-13

- Tamas Pflanzner, Hamza Baniata and Attila Kertesz
- Playful Meaning-Making as Prosocial Fun pp. 1-13

- John M. Carroll, Fanlu Gui, Srishti Gupta and Tiffany Knearem
- Information Technologies for Real-Time Mapping of Human Well-Being Indicators in an Urban Historical Garden pp. 1-17

- Francesco Pirotti, Marco Piragnolo, Marika D’Agostini and Raffaele Cavalli
- FakeNewsLab: Experimental Study on Biases and Pitfalls Preventing Us from Distinguishing True from False News pp. 1-24

- Giancarlo Ruffo and Alfonso Semeraro
- Unreachable Peers Communication Scheme in Decentralized Networks Based on Peer-to-Peer Overlay Approaches pp. 1-34

- Gengxian Li, Chundong Wang and Huaibin Wang
- Modelling Analysis of a Novel Frameless Slotted-ALOHA Protocol Based on the Number of Detectable Conflicting Users pp. 1-16

- Sa Yang, Suoping Li, Nana Yang and Ying Lin
- A Self-Supervised Learning Model for Unknown Internet Traffic Identification Based on Surge Period pp. 1-16

- Dawei Wei, Feifei Shi and Sahraoui Dhelim
- Improved Dragonfly Optimization Algorithm for Detecting IoT Outlier Sensors pp. 1-16

- Maytham N. Meqdad, Seifedine Kadry and Hafiz Tayyab Rauf
- Modeling and Analyzing Preemption-Based Service Prioritization in 5G Networks Slicing Framework pp. 1-16

- Yves Adou, Ekaterina Markova and Yuliya Gaidamaka
- A Hybrid Deep Learning Model with Self-Improved Optimization Algorithm for Detection of Security Attacks in IoT Environment pp. 1-15

- Amit Sagu, Nasib Singh Gill, Preeti Gulia, Jyotir Moy Chatterjee and Ishaani Priyadarshini
- Automated Penetration Testing Framework for Smart-Home-Based IoT Devices pp. 1-18

- Rohit Akhilesh, Oliver Bills, Naveen Chilamkurti and Mohammad Jabed Morshed Chowdhury
- Natural Language Processing and Cognitive Networks Identify UK Insurers’ Trends in Investor Day Transcripts pp. 1-18

- Stefan Claus and Massimo Stella
- Experimenting with Routing Protocols in the Data Center: An ns-3 Simulation Approach pp. 1-28

- Leonardo Alberro, Felipe Velázquez, Sara Azpiroz, Eduardo Grampin and Matías Richart
Volume 14, issue 9, 2022
- Determining the Role of Social Identity Attributes to the Protection of Users’ Privacy in Social Media pp. 1-18

- Katerina Vgena, Angeliki Kitsiou, Christos Kalloniatis and Stefanos Gritzalis
- Intelligent Reflecting Surface-Aided Device-to-Device Communication: A Deep Reinforcement Learning Approach pp. 1-18

- Ajmery Sultana and Xavier Fernando
- Retrieving Adversarial Cliques in Cognitive Communities: A New Conceptual Framework for Scientific Knowledge Graphs pp. 1-18

- Renaud Fabre, Otmane Azeroual, Patrice Bellot, Joachim Schöpfel and Daniel Egret
- Assistance System for the Teaching of Natural Numbers to Preschool Children with the Use of Artificial Intelligence Algorithms pp. 1-18

- William Villegas-Ch., Angel Jaramillo-Alcázar and Aracely Mera-Navarrete
- Joint Scalable Video Coding and Transcoding Solutions for Fog-Computing-Assisted DASH Video Applications pp. 1-18

- Majd Nafeh, Arash Bozorgchenani and Daniele Tarchi
- Approaches and Challenges in Internet of Robotic Things pp. 1-30

- Aqsa Sayeed, Chaman Verma, Neerendra Kumar, Neha Koul and Zoltán Illés
- Mathematical and Machine Learning Models for Groundwater Level Changes: A Systematic Review and Bibliographic Analysis pp. 1-31

- Stephen Afrifa, Tao Zhang, Peter Appiahene and Vijayakumar Varadarajan
- Leveraging Explainable AI to Support Cryptocurrency Investors pp. 1-19

- Jacopo Fior, Luca Cagliero and Paolo Garza
- A Novel Machine Learning Prediction Model for Aerosol Transport in Upper 17-Generations of the Human Respiratory Tract pp. 1-16

- Mohammad S. Islam, Shahid Husain, Jawed Mustafa and Yuantong Gu
- Framework for Video Steganography Using Integer Wavelet Transform and JPEG Compression pp. 1-16

- Urmila Pilania, Rohit Tanwar, Mazdak Zamani and Azizah Abdul Manaf
- Smart Classroom Teaching Strategy to Enhance Higher Order Thinking Skills (HOTS)—An Agile Approach for Education 4.0 pp. 1-15

- Sitalakshmi Venkatraman, Fahri Benli, Ye Wei and Fiona Wahr
- Use of Data Augmentation Techniques in Detection of Antisocial Behavior Using Deep Learning Methods pp. 1-15

- Viera Maslej-Krešňáková, Martin Sarnovský and Júlia Jacková
- Trade-offs between Risk and Operational Cost in SDN Failure Recovery Plan pp. 1-15

- Saeed A. Astaneh, Shahram Shah Heydari, Sara Taghavi Motlagh and Alireza Izaddoost
- Design Technology and AI-Based Decision Making Model for Digital Twin Engineering pp. 1-14

- Ekaterina V. Orlova
- A VPN Performances Analysis of Constrained Hardware Open Source Infrastructure Deploy in IoT Environment pp. 1-27

- Antonio Francesco Gentile, Davide Macrì, Floriano De Rango, Mauro Tropea and Emilio Greco
- Forecasting the Risk Factor of Frontier Markets: A Novel Stacking Ensemble of Neural Network Approach pp. 1-23

- Mst. Shapna Akter, Hossain Shahriar, Reaz Chowdhury and M. R. C. Mahdy
- A Game-Theoretic Rent-Seeking Framework for Improving Multipath TCP Performance pp. 1-23

- Shiva Raj Pokhrel and Carey Williamson
- Translating Speech to Indian Sign Language Using Natural Language Processing pp. 1-17

- Purushottam Sharma, Devesh Tulsian, Chaman Verma, Pratibha Sharma and Nancy Nancy
- Facial Expression Recognition Using Dual Path Feature Fusion and Stacked Attention pp. 1-17

- Hongtao Zhu, Huahu Xu, Xiaojin Ma and Minjie Bian
- Low Power Blockchained E-Vote Platform for University Environment pp. 1-17

- Faten Chaabane, Jalel Ktari, Tarek Frikha and Habib Hamam
- A Fairness Index Based on Rate Variance for Downlink Non-Orthogonal Multiple Access System pp. 1-12

- Jie Yang, Jiajia Zhu and Ziyu Pan
- Blockchain-Based Cloud-Enabled Security Monitoring Using Internet of Things in Smart Agriculture pp. 1-20

- Rajasekhar Chaganti, Vijayakumar Varadarajan, Venkata Subbarao Gorantla, Thippa Reddy Gadekallu and Vinayakumar Ravi
- An Efficient Blockchain Transaction Retrieval System pp. 1-21

- Hangwei Feng, Jinlin Wang and Yang Li
- Federated Learning and Its Role in the Privacy Preservation of IoT Devices pp. 1-22

- Tanweer Alam and Ruchi Gupta
- Artificial Intelligence in Adaptive and Intelligent Educational System: A Review pp. 1-11

- Jingwen Dong, Siti Nurulain Mohd Rum, Khairul Azhar Kasmiran, Teh Noranis Mohd Aris and Raihani Mohamed
Volume 14, issue 8, 2022
- A New Scheme for Detecting Malicious Nodes in Vehicular Ad Hoc Networks Based on Monitoring Node Behavior pp. 1-11

- Muhsen Alkhalidy, Atalla Fahed Al-Serhan, Ayoub Alsarhan and Bashar Igried
- Seeing through Wavy Water–Air Interface: A Restoration Model for Instantaneous Images Distorted by Surface Waves pp. 1-21

- Bijian Jian, Chunbo Ma, Dejian Zhu, Yixiao Sun and Jun Ao
- Will Zero Vulnerability Computing (ZVC) Ever Be Possible? Testing the Hypothesis pp. 1-20

- Fazal Raheman, Tejas Bhagat, Brecht Vermeulen and Peter Van Daele
- A Blockchain-Based Framework to Enhance Anonymous Services with Accountability Guarantees pp. 1-20

- Francesco Buccafurri, Vincenzo De Angelis and Sara Lazzaro
- A Smart Parking Solution by Integrating NB-IoT Radio Communication Technology into the Core IoT Platform pp. 1-35

- Esad Kadusic, Natasa Zivic, Christoph Ruland and Narcisa Hadzajlic
- Understanding Learners’ Perception of MOOCs Based on Review Data Analysis Using Deep Learning and Sentiment Analysis pp. 1-17

- Xieling Chen, Fu Lee Wang, Gary Cheng, Man-Kong Chow and Haoran Xie
- Research on Urban Traffic Incident Detection Based on Vehicle Cameras pp. 1-17

- Zhuofei Xia, Jiayuan Gong, Hailong Yu, Wenbo Ren and Jingnan Wang
- A Novel Logo Identification Technique for Logo-Based Phishing Detection in Cyber-Physical Systems pp. 1-17

- Padmalochan Panda, Alekha Kumar Mishra and Deepak Puthal
- Multi-Agent-Based Traffic Prediction and Traffic Classification for Autonomic Network Management Systems for Future Networks pp. 1-23

- Sisay Tadesse Arzo, Zeinab Akhavan, Mona Esmaeili, Michael Devetsikiotis and Fabrizio Granelli
- Hybrid Sensing Platform for IoT-Based Precision Agriculture pp. 1-23

- Hamid Bagha, Ali Yavari and Dimitrios Georgakopoulos
- On the Potential of Enhancing Delay-Tolerant Routing Protocols via Age of Information pp. 1-23

- Georgios Kallitsis, Vasileios Karyotis and Symeon Papavassiliou
- Machine Learning for Bankruptcy Prediction in the American Stock Market: Dataset and Benchmarks pp. 1-23

- Gianfranco Lombardo, Mattia Pellegrino, George Adosoglou, Stefano Cagnoni, Panos M. Pardalos and Agostino Poggi
- Digital Qualitative and Quantitative Analysis of Arabic Textbooks pp. 1-14

- Francesca Fallucchi, Bouchra Ghattas, Riem Spielhaus and Ernesto William De Luca
- Data-Driven Analysis of Outdoor-to-Indoor Propagation for 5G Mid-Band Operational Networks pp. 1-27

- Usman Ali, Giuseppe Caso, Luca De Nardis, Konstantinos Kousias, Mohammad Rajiullah, Özgü Alay, Marco Neri, Anna Brunstrom and Maria-Gabriella Di Benedetto
- Exploring Distributed Deep Learning Inference Using Raspberry Pi Spark Cluster pp. 1-26

- Nicholas James, Lee-Yeng Ong and Meng-Chew Leow
- Detection of Obfuscated Malicious JavaScript Code pp. 1-15

- Ammar Alazab, Ansam Khraisat, Moutaz Alazab and Sarabjot Singh
- Automatic Detection of Sensitive Data Using Transformer- Based Classifiers pp. 1-15

- Michael Petrolini, Stefano Cagnoni and Monica Mordonini
- Analysis and Visualization of New Energy Vehicle Battery Data pp. 1-16

- Wenbo Ren, Xinran Bian, Jiayuan Gong, Anqing Chen, Ming Li, Zhuofei Xia and Jingnan Wang
- Deep Learning Forecasting for Supporting Terminal Operators in Port Business Development pp. 1-19

- Marco Ferretti, Ugo Fiore, Francesca Perla, Marcello Risitano and Salvatore Scognamiglio
- Energy Saving Strategy of UAV in MEC Based on Deep Reinforcement Learning pp. 1-19

- Zhiqiang Dai, Gaochao Xu, Ziqi Liu, Jiaqi Ge and Wei Wang
- Microblog Sentiment Analysis Based on Dynamic Character-Level and Word-Level Features and Multi-Head Self-Attention Pooling pp. 1-19

- Shangyi Yan, Jingya Wang and Zhiqiang Song
- An Intelligent Multimodal Biometric Authentication Model for Personalised Healthcare Services pp. 1-28

- Farhad Ahamed, Farnaz Farid, Basem Suleiman, Zohaib Jan, Luay A. Wahsheh and Seyed Shahrestani
- Augmenting Industrial Control Rooms with Multimodal Collaborative Interaction Techniques pp. 1-18

- Jessica Rubart, Valentin Grimm and Jonas Potthast
- CCrFS: Combine Correlation Features Selection for Detecting Phishing Websites Using Machine Learning pp. 1-18

- Jimmy Moedjahedy, Arief Setyanto, Fawaz Khaled Alarfaj and Mohammed Alreshoodi
- Post-Processing for Shadow Detection in Drone-Acquired Images Using U-NET pp. 1-18

- Siti-Aisyah Zali, Shahbe Mat-Desa, Zarina Che-Embi and Wan-Noorshahida Mohd-Isa
- Integrating Elliptic Curve Cryptography with the Modbus TCP SCADA Communication Protocol pp. 1-18

- Despoina Chochtoula, Aristidis Ilias, Yannis C. Stamatiou and Christos Makris
- A CSI Fingerprint Method for Indoor Pseudolite Positioning Based on RT-ANN pp. 1-18

- Yaning Li, Hongsheng Li, Baoguo Yu and Jun Li
- Improved DDoS Detection Utilizing Deep Neural Networks and Feedforward Neural Networks as Autoencoder pp. 1-18

- Ahmed Latif Yaser, Hamdy M. Mousa and Mahmoud Hussein
Volume 14, issue 7, 2022
- Convergence of Information-Centric Networks and Edge Intelligence for IoV: Challenges and Future Directions pp. 1-31

- Salahadin Seid Musa, Marco Zennaro, Mulugeta Libsie and Ermanno Pietrosemoli
- Characterization of Dynamic Blockage Probability in Industrial Millimeter Wave 5G Deployments pp. 1-18

- Anastasia Kondratyeva, Daria Ivanova, Vyacheslav Begishev, Ekaterina Markova, Evgeni Mokrov, Yuliya Gaidamaka and Konstantin Samouylov
- A Novel Text Classification Technique Using Improved Particle Swarm Optimization: A Case Study of Arabic Language pp. 1-18

- Yousif A. Alhaj, Abdelghani Dahou, Mohammed A. A. Al-qaness, Laith Abualigah, Aaqif Afzaal Abbasi, Nasser Ahmed Obad Almaweri, Mohamed Abd Elaziz and Robertas Damaševičius
- Insights from the Experimentation of Named Data Networks in Mobile Wireless Environments pp. 1-18

- Luís Gameiro, Carlos Senna and Miguel Luís
- Research on Routing Equalization Algorithm of Inter-Satellite Partition for Low-Orbit Micro-Satellites pp. 1-18

- Hengfei Cheng, Zhaobin Xu, Xiaoxu Guo, Jia Yang, Kedi Xu, Shuqin Liu, Zhonghe Jin and Xiaojun Jin
- A Survey on Monitoring Quality Assessment for Wireless Visual Sensor Networks pp. 1-26

- Thiago C. Jesus, Daniel G. Costa, Paulo Portugal and Francisco Vasques
- Mapping Art to a Knowledge Graph: Using Data for Exploring the Relations among Visual Objects in Renaissance Art pp. 1-15

- Alexandros Kouretsis, Iraklis Varlamis, Laida Limniati, Minas Pergantis and Andreas Giannakoulopoulos
- N-Trans: Parallel Detection Algorithm for DGA Domain Names pp. 1-15

- Cheng Yang, Tianliang Lu, Shangyi Yan, Jianling Zhang and Xingzhan Yu
- Multifractal Cross-Correlations of Bitcoin and Ether Trading Characteristics in the Post-COVID-19 Time pp. 1-15

- Marcin Wątorek, Jarosław Kwapień and Stanisław Drożdż
- Securing the Smart City Airspace: Drone Cyber Attack Detection through Machine Learning pp. 1-19

- Zubair Baig, Naeem Syed and Nazeeruddin Mohammad
- Cooperative D-GNSS Aided with Multi Attribute Decision Making Module: A Rigorous Comparative Analysis pp. 1-16

- Thanassis Mpimis, Theodore T. Kapsis, Athanasios D. Panagopoulos and Vassilis Gikas
- Real-Time Detection of Vine Trunk for Robot Localization Using Deep Learning Models Developed for Edge TPU Devices pp. 1-16

- Khadijeh Alibabaei, Eduardo Assunção, Pedro D. Gaspar, Vasco N. G. J. Soares and João M. L. P. Caldeira
- First Steps of Asthma Management with a Personalized Ontology Model pp. 1-13

- Hicham Ajami, Hamid Mcheick and Catherine Laprise
- Correlation between Human Emotion and Temporal·Spatial Contexts by Analyzing Environmental Factors pp. 1-13

- Minwoo Park and Euichul Lee
- Misuse Patterns from the Threat of Modification of Non-Control Data in Network Function Virtualization pp. 1-17

- Abdulrahman K. Alnaim
- Energy-Optimized Content Refreshing of Age-of-Information-Aware Edge Caches in IoT Systems pp. 1-24

- Martina Pappalardo, Antonio Virdis and Enzo Mingozzi
- Blockchain for Doping Control Applications in Sports: A Conceptual Approach pp. 1-24

- Flavio Pinto, Yogachandran Rahulamathavan and James Skinner
- Enhanced Geographic Routing with One- and Two-Hop Movement Information in Opportunistic Ad Hoc Networks pp. 1-24

- Mohd-Yaseen Mir, Hengbing Zhu and Chih-Lin Hu
- Analytical Modeling and Empirical Analysis of Binary Options Strategies pp. 1-23

- Gurdal Ertek, Aysha Al-Kaabi and Aktham Maghyereh
- Designing an Interactive Communication Assistance System for Hearing-Impaired College Students Based on Gesture Recognition and Representation pp. 1-14

- Yancong Zhu, Juan Zhang, Zhaoxi Zhang, Gina Clepper, Jingpeng Jia and Wei Liu
- Polarity and Subjectivity Detection with Multitask Learning and BERT Embedding pp. 1-10

- Ranjan Satapathy, Shweta Rajesh Pardeshi and Erik Cambria
- Zero-Inflated Patent Data Analysis Using Generating Synthetic Samples pp. 1-11

- Daiho Uhm and Sunghae Jun
- Internet of Things and Blockchain Integration: Security, Privacy, Technical, and Design Challenges pp. 1-48

- Yehia Ibrahim Alzoubi, Ahmad Al-Ahmad, Hasan Kahtan and Ashraf Jaradat
- A Public Infrastructure for a Trusted Wireless World pp. 1-12

- Renee Carnley and Sikha Bagui
- Towards Strengthening the Resilience of IoV Networks—A Trust Management Perspective pp. 1-21

- Yingxun Wang, Hushairi Zen, Mohamad Faizrizwan Mohd Sabri, Xiang Wang and Lee Chin Kho
- Aesthetic Trends and Semantic Web Adoption of Media Outlets Identified through Automated Archival Data Extraction pp. 1-21

- Aristeidis Lamprogeorgos, Minas Pergantis, Michail Panagopoulos and Andreas Giannakoulopoulos
- Intuitively Searching for the Rare Colors from Digital Artwork Collections by Text Description: A Case Demonstration of Japanese Ukiyo-e Print Retrieval pp. 1-21

- Kangying Li, Jiayun Wang, Biligsaikhan Batjargal and Akira Maeda
Volume 14, issue 6, 2022
- An Indoor and Outdoor Multi-Source Elastic Fusion Navigation and Positioning Algorithm Based on Particle Filters pp. 1-16

- Guangwei Fan, Chuanzhen Sheng, Baoguo Yu, Lu Huang and Qiang Rong
- EBBA: An Enhanced Binary Bat Algorithm Integrated with Chaos Theory and Lévy Flight for Feature Selection pp. 1-16

- Jinghui Feng, Haopeng Kuang and Lihua Zhang
- Quantum Key Distribution in Kubernetes Clusters pp. 1-19

- Ignazio Pedone and Antonio Lioy
- Optimization of the System of Allocation of Overdue Loans in a Sub-Saharan Africa Microfinance Institution pp. 1-19

- Andreia Araújo, Filipe Portela, Filipe Alvelos and Saulo Ruiz
- What Is Coming across the Horizon and How Can We Handle It? Bitcoin Scenarios as a Starting Point for Rigorous and Relevant Research pp. 1-15

- Horst Treiblmaier
- Co-Authorship Networks Analysis to Discover Collaboration Patterns among Italian Researchers pp. 1-15

- Vincenza Carchiolo, Marco Grassia, Michele Malgeri and Giuseppe Mangioni
- Browser Forensic Investigations of Instagram Utilizing IndexedDB Persistent Storage pp. 1-33

- Furkan Paligu and Cihan Varol
- Detection of Students’ Problems in Distance Education Using Topic Modeling and Machine Learning pp. 1-18

- Huda Alhazmi
- Charting Past, Present, and Future Research in the Semantic Web and Interoperability pp. 1-32

- Abderahman Rejeb, John G. Keogh, Wayne Martindale, Damion Dooley, Edward Smart, Steven Simske, Samuel Fosso Wamba, John G. Breslin, Kosala Yapa Bandara, Subhasis Thakur, Kelly Liu, Bridgette Crowley, Sowmya Desaraju, Angela Ospina and Horia Bradau
- On End-to-End Intelligent Automation of 6G Networks pp. 1-28

- Abdallah Moubayed, Abdallah Shami and Anwer Al-Dulaimi
- Overview of Blockchain Oracle Research pp. 1-38

- Giulio Caldarelli
- Toward Semi-Supervised Graphical Object Detection in Document Images pp. 1-21

- Goutham Kallempudi, Khurram Azeem Hashmi, Alain Pagani, Marcus Liwicki, Didier Stricker and Muhammad Zeshan Afzal
- High-Frequency Direction Forecasting of the Futures Market Using a Machine-Learning-Based Method pp. 1-21

- Shangkun Deng, Yingke Zhu, Xiaoru Huang, Shuangyang Duan and Zhe Fu
- The Robustness of Detecting Known and Unknown DDoS Saturation Attacks in SDN via the Integration of Supervised and Semi-Supervised Classifiers pp. 1-20

- Samer Khamaiseh, Abdullah Al-Alaj, Mohammad Adnan and Hakam W. Alomari
- Optimal Proactive Caching for Multi-View Streaming Mobile Augmented Reality pp. 1-20

- Zhaohui Huang and Vasilis Friderikos
- Data Anonymization: An Experimental Evaluation Using Open-Source Tools pp. 1-20

- Joana Tomás, Deolinda Rasteiro and Jorge Bernardino
- A Long Short-Term Memory Network-Based Radio Resource Management for 5G Network pp. 1-20

- Kavitha Rani Balmuri, Srinivas Konda, Wen-Cheng Lai, Parameshachari Bidare Divakarachari, Kavitha Malali Vishveshwarappa Gowda and Hemalatha Kivudujogappa Lingappa
- IoT Group Membership Management Using Decentralized Identifiers and Verifiable Credentials pp. 1-12

- Nikos Fotiou, Vasilios A. Siris, George Xylomenos and George C. Polyzos
- Evaluation of Online Teaching Quality Based on Facial Expression Recognition pp. 1-12

- Changbo Hou, Jiajun Ai, Yun Lin, Chenyang Guan, Jiawen Li and Wenyu Zhu
- Gamifying Community Education for Enhanced Disaster Resilience: An Effectiveness Testing Study from Australia pp. 1-22

- Nayomi Kankanamge, Tan Yigitcanlar and Ashantha Goonetilleke
- An In-Depth Review on Blockchain Simulators for IoT Environments pp. 1-22

- Jason Zheng, Chidinma Dike, Stefan Pancari, Yi Wang, George C. Giakos, Wafa Elmannai and Bingyang Wei
- Investigating the Country of Origin and the Role of the.eu TLD in External Trade of European Union Member States pp. 1-27

- Andreas Giannakoulopoulos, Minas Pergantis, Laida Limniati and Alexandros Kouretsis
- A BLE-Connected Piezoresistive and Inertial Chest Band for Remote Monitoring of the Respiratory Activity by an Android Application: Hardware Design and Software Optimization pp. 1-27

- Roberto De Fazio, Massimo De Vittorio and Paolo Visconti
- Fraud Detection Using Neural Networks: A Case Study of Income Tax pp. 1-14

- Belle Fille Murorunkwere, Origene Tuyishimire, Dominique Haughton and Joseph Nzabanita
- A Multi-View Framework to Detect Redundant Activity Labels for More Representative Event Logs in Process Mining pp. 1-23

- Qifan Chen, Yang Lu, Charmaine S. Tam and Simon K. Poon
- Multilayer Backbones for Internet of Battlefield Things pp. 1-23

- Evangelia Fragkou, Dimitrios Papakostas, Theodoros Kasidakis and Dimitrios Katsaros
- Analysis of Electric Vehicles with an Economic Perspective for the Future Electric Market pp. 1-17

- Sofana Reka S, Prakash Venugopal, Ravi V, Hassan Haes Alhelou, Amer Al-Hinai and Pierluigi Siano
- Time Series Prediction of Sea Surface Temperature Based on an Adaptive Graph Learning Neural Model pp. 1-13

- Tingting Wang, Zhuolin Li, Xiulin Geng, Baogang Jin and Lingyu Xu
- An Indoor Smart Parking Algorithm Based on Fingerprinting pp. 1-13

- Silvia Stranieri
- 6G to Take the Digital Divide by Storm: Key Technologies and Trends to Bridge the Gap pp. 1-13

- Chiara Suraci, Sara Pizzi, Federico Montori, Marco Di Felice and Giuseppe Araniti
Volume 14, issue 5, 2022
- Measuring Ethical Values with AI for Better Teamwork pp. 1-28

- Erkin Altuntas, Peter A. Gloor and Pascal Budner
- A Survey on Memory Subsystems for Deep Neural Network Accelerators pp. 1-28

- Arghavan Asad, Rupinder Kaur and Farah Mohammadi
- A Fairness-Aware Peer-to-Peer Decentralized Learning Framework with Heterogeneous Devices pp. 1-18

- Zheyi Chen, Weixian Liao, Pu Tian, Qianlong Wang and Wei Yu
- A Review of Blockchain Technology Applications in Ambient Assisted Living pp. 1-18

- Alexandru-Ioan Florea, Ionut Anghel and Tudor Cioara
- A Framework to Model Bursty Electronic Data Interchange Messages for Queueing Systems pp. 1-32

- Sonya Leech, Jonathan Dunne and David Malone
- Low-Complexity GSM Detection Based on Maximum Ratio Combining pp. 1-15

- Xinhe Zhang, Wenbo Lv and Haoran Tan
- Clinical Trial Classification of SNS24 Calls with Neural Networks pp. 1-26

- Hua Yang, Teresa Gonçalves, Paulo Quaresma, Renata Vieira, Rute Veladas, Cátia Sousa Pinto, João Oliveira, Maria Cortes Ferreira, Jéssica Morais, Ana Raquel Pereira, Nuno Fernandes and Carolina Gonçalves
- MeVer NetworkX: Network Analysis and Visualization for Tracing Disinformation pp. 1-26

- Olga Papadopoulou, Themistoklis Makedas, Lazaros Apostolidis, Francesco Poldi, Symeon Papadopoulos and Ioannis Kompatsiaris
- On the Use of the Multi-Agent Environment for Mobility Applications pp. 1-16

- Mahdi Zargayouna
- A Bidirectional Trust Model for Service Delegation in Social Internet of Things pp. 1-16

- Lijun Wei, Yuhan Yang, Jing Wu, Chengnian Long and Yi-Bing Lin
- Co-Simulation of Multiple Vehicle Routing Problem Models pp. 1-16

- Sana Sahar Guia, Abdelkader Laouid, Mohammad Hammoudeh, Ahcène Bounceur, Mai Alfawair and Amna Eleyan
- Enhancing Short-Term Sales Prediction with Microblogs: A Case Study of the Movie Box Office pp. 1-16

- Jie Zhao, Fangwei Xiong and Peiquan Jin
- Missing Data Imputation in the Internet of Things Sensor Networks pp. 1-16

- Benjamin Agbo, Hussain Al-Aqrabi, Richard Hill and Tariq Alsboui
- Fast Library Recommendation in Software Dependency Graphs with Symmetric Partially Absorbing Random Walks pp. 1-19

- Emmanouil Krasanakis and Andreas Symeonidis
- Blockchain Technology Applied in IoV Demand Response Management: A Systematic Literature Review pp. 1-19

- Evgenia Kapassa and Marinos Themistocleous
- Lightweight Blockchain-Based Scheme to Secure Wireless M2M Area Networks pp. 1-19

- Karam Eddine Bilami and Pascal Lorenz
- Channel Characterization and SC-FDM Modulation for PLC in High-Voltage Power Lines pp. 1-17

- Jose Alberto Del Puerto-Flores, José Luis Naredo, Fernando Peña-Campos, Carolina Del-Valle-Soto, Leonardo J. Valdivia and Ramón Parra-Michel
- An ICN-Based IPFS High-Availability Architecture pp. 1-24

- Ruibin Zeng, Jiali You, Yang Li and Rui Han
- Building Semantic Knowledge Graphs from (Semi-)Structured Data: A Review pp. 1-24

- Vetle Ryen, Ahmet Soylu and Dumitru Roman
- Adaptive User Profiling in E-Commerce and Administration of Public Services pp. 1-24

- Kleanthis G. Gatziolis, Nikolaos D. Tselikas and Ioannis D. Moscholios
- A Versatile MANET Experimentation Platform and Its Evaluation through Experiments on the Performance of Routing Protocols under Diverse Conditions pp. 1-24

- Ioannis Manolopoulos, Dimitrios Loukatos and Kimon Kontovasilis
- Quality-of-Service-Linked Privileged Content-Caching Mechanism for Named Data Networks pp. 1-24

- Shrisha H. S. and Uma Boregowda
- Enriching Artificial Intelligence Explanations with Knowledge Fragments pp. 1-13

- Jože Rožanec, Elena Trajkova, Inna Novalija, Patrik Zajec, Klemen Kenda, Blaž Fortuna and Dunja Mladenić
- Tell Me More: Automating Emojis Classification for Better Accessibility and Emotional Context Recognition pp. 1-13

- Muhammad Atif and Valentina Franzoni
- A Review of Digital Era Governance Research in the First Two Decades: A Bibliometric Study pp. 1-27

- Dejan Ravšelj, Lan Umek, Ljupčo Todorovski and Aleksander Aristovnik
- Bringing Digital Innovation Strategies and Entrepreneurship: The Business Model Canvas in Open Data Ecosystem and Startups pp. 1-14

- Maria Kamariotou and Fotis Kitsios
- Distributed Bandwidth Allocation Strategy for QoE Fairness of Multiple Video Streams in Bottleneck Links pp. 1-14

- Yazhi Liu, Dongyu Wei, Chunyang Zhang and Wei Li
- Virtual Power Plant Optimization in Smart Grids: A Narrative Review pp. 1-22

- Bianca Goia, Tudor Cioara and Ionut Anghel
- Positioning Energy-Neutral Devices: Technological Status and Hybrid RF-Acoustic Experiments pp. 1-22

- Bert Cox, Chesney Buyle, Daan Delabie, Lieven De Strycker and Liesbet Van der Perre
- Editorial for the Special Issue on Blockchain: Applications, Challenges, and Solutions pp. 1-2

- Ahad ZareRavasan, Taha Mansouri, Michal Krčál and Saeed Rouhani
- The Whole Is Greater than the Sum of the Parts: A Multilayer Approach on Criminal Networks pp. 1-21

- Annamaria Ficara, Giacomo Fiumara, Salvatore Catanese, Pasquale De Meo and Xiaoyang Liu
- Modeling User Acceptance of In-Vehicle Applications for Safer Road Environment pp. 1-21

- Siti Fatimah Abdul Razak, Sumendra Yogarayan, Mohd Fikri Azli Abdullah and Afizan Azman
- QoE Models for Adaptive Streaming: A Comprehensive Evaluation pp. 1-21

- Duc Nguyen, Nam Pham Ngoc and Truong Cong Thang
- Deterring Deepfake Attacks with an Electrical Network Frequency Fingerprints Approach pp. 1-20

- Deeraj Nagothu, Ronghua Xu, Yu Chen, Erik Blasch and Alexander Aved
- ReSQoV: A Scalable Resource Allocation Model for QoS-Satisfied Cloud Services pp. 1-20

- Hassan Mahmood Khan, Fang-Fang Chua and Timothy Tzen Vun Yap
- A System Proposal for Information Management in Building Sector Based on BIM, SSI, IoT and Blockchain pp. 1-20

- Luisanna Cocco, Roberto Tonelli and Michele Marchesi
- Security in Wireless Sensor Networks: A Cryptography Performance Analysis at MAC Layer pp. 1-20

- Mauro Tropea, Mattia Giovanni Spina, Floriano De Rango and Antonio Francesco Gentile
- Medical Internet-of-Things Based Breast Cancer Diagnosis Using Hyperparameter-Optimized Neural Networks pp. 1-20

- Roseline Oluwaseun Ogundokun, Sanjay Misra, Mychal Douglas, Robertas Damaševičius and Rytis Maskeliūnas
Volume 14, issue 4, 2022
- A Dynamic Cache Allocation Mechanism (DCAM) for Reliable Multicast in Information-Centric Networking pp. 1-15

- Yingjie Duan, Hong Ni and Xiaoyong Zhu
- Deep Regression Neural Networks for Proportion Judgment pp. 1-16

- Mario Milicevic, Vedran Batos, Adriana Lipovac and Zeljka Car
- Performance Analysis of DF Relay-Assisted D2D Communication in a 5G mmWave Network pp. 1-16

- Subhra Sankha Sarma, Ranjay Hazra and Peter Han Joo Chong
- Evaluation of Contextual and Game-Based Training for Phishing Detection pp. 1-16

- Joakim Kävrestad, Allex Hagberg, Marcus Nohlberg, Jana Rambusch, Robert Roos and Steven Furnell
- Predicting Dog Emotions Based on Posture Analysis Using DeepLabCut pp. 1-16

- Kim Ferres, Timo Schloesser and Peter A. Gloor
- TalkRoBots: A Middleware for Robotic Systems in Industry 4.0 pp. 1-25

- Marwane Ayaida, Nadhir Messai, Frederic Valentin and Dimitri Marcheras
- Interoperable Data Analytics Reference Architectures Empowering Digital-Twin-Aided Manufacturing pp. 1-19

- Attila Csaba Marosi, Márk Emodi, Ákos Hajnal, Róbert Lovas, Tamás Kiss, Valerie Poser, Jibinraj Antony, Simon Bergweiler, Hamed Hamzeh, James Deslauriers and József Kovács
- Ransomware-Resilient Self-Healing XML Documents pp. 1-19

- Mahmoud Al-Dwairi, Ahmed S. Shatnawi, Osama Al-Khaleel and Basheer Al-Duwairi
- Special Issue “Natural Language Engineering: Methods, Tasks and Applications” pp. 1-3

- Massimo Esposito, Giovanni Luca Masala, Aniello Minutolo and Marco Pota
- A Multi-Service Adaptive Semi-Persistent LTE Uplink Scheduler for Low Power M2M Devices pp. 1-28

- Nusrat Afrin, Jason Brown and Jamil Y. Khan
- ML-Based 5G Network Slicing Security: A Comprehensive Survey pp. 1-28

- Ramraj Dangi, Akshay Jadhav, Gaurav Choudhary, Nicola Dragoni, Manas Kumar Mishra and Praveen Lalwani
- Adaptative Perturbation Patterns: Realistic Adversarial Learning for Robust Intrusion Detection pp. 1-18

- João Vitorino, Nuno Oliveira and Isabel Praça
- Future Wireless Networking Experiments Escaping Simulations pp. 1-32

- Sachin Sharma, Saish Urumkar, Gianluca Fontanesi, Byrav Ramamurthy and Avishek Nag
- A Lightweight Certificateless Group Key Agreement Method without Pairing Based on Blockchain for Smart Grid pp. 1-11

- Zhihao Wang, Ru Huo and Shuo Wang
- Location Transparency Call (LTC) System: An Intelligent Phone Dialing System Based on the Phone of Things (PoT) Architecture pp. 1-22

- Haytham Khalil and Khalid Elgazzar
- HealthFetch: An Influence-Based, Context-Aware Prefetch Scheme in Citizen-Centered Health Storage Clouds pp. 1-22

- Chrysostomos Symvoulidis, George Marinos, Athanasios Kiourtis, Argyro Mavrogiorgou and Dimosthenis Kyriazis
- Multi-Layer Feature Fusion-Based Community Evolution Prediction pp. 1-20

- Zhao Wang, Qingguo Xu and Weimin Li
- From 5G to 6G—Challenges, Technologies, and Applications pp. 1-35

- Ahmed I. Salameh and Mohamed El Tarhuni
- Detecting IoT Attacks Using an Ensemble Machine Learning Model pp. 1-17

- Vikas Tomer and Sachin Sharma
- Cross-Domain Transfer Learning Prediction of COVID-19 Popular Topics Based on Knowledge Graph pp. 1-17

- Xiaolin Chen, Qixing Qu, Chengxi Wei and Shudong Chen
- Using Satellite Imagery to Improve Local Pollution Models for High-Voltage Transmission Lines and Insulators pp. 1-17

- Peter Krammer, Marcel Kvassay, Ján Mojžiš, Martin Kenyeres, Miloš Očkay, Ladislav Hluchý, Ľuboš Pavlov and Ľuboš Skurčák
- Bitcoin as a Safe Haven during COVID-19 Disease pp. 1-24

- Luisanna Cocco, Roberto Tonelli and Michele Marchesi
- Deep Learning for Vulnerability and Attack Detection on Web Applications: A Systematic Literature Review pp. 1-46

- Rokia Lamrani Alaoui and El Habib Nfaoui
- Decorrelation-Based Deep Learning for Bias Mitigation pp. 1-14

- Pranita Patil and Kevin Purcell
- Creating Honeypots to Prevent Online Child Exploitation pp. 1-14

- Joel Scanlan, Paul A. Watters, Jeremy Prichard, Charlotte Hunn, Caroline Spiranovic and Richard Wortley
Volume 14, issue 3, 2022
- Transformer-Based Abstractive Summarization for Reddit and Twitter: Single Posts vs. Comment Pools in Three Languages pp. 1-25

- Ivan S. Blekanov, Nikita Tarasov and Svetlana S. Bodrunova
- Time Series Surface Temperature Prediction Based on Cyclic Evolutionary Network Model for Complex Sea Area pp. 1-16

- Jiahao Shi, Jie Yu, Jinkun Yang, Lingyu Xu and Huan Xu
- A Survey on the Use of Graph Convolutional Networks for Combating Fake News pp. 1-19

- Iraklis Varlamis, Dimitrios Michail, Foteini Glykou and Panagiotis Tsantilas
- Survey on Videos Data Augmentation for Deep Learning Models pp. 1-19

- Nino Cauli and Diego Reforgiato Recupero
- A Data-Driven Approach to Improve Customer Churn Prediction Based on Telecom Customer Segmentation pp. 1-19

- Tianyuan Zhang, Sérgio Moro and Ricardo F. Ramos
- Weighted-CAPIC Caching Algorithm for Priority Traffic in Named Data Network pp. 1-15

- Leanna Vidya Yovita, Nana Rachmana Syambas and Ian Joseph Matheus Edward
- Graphol: A Graphical Language for Ontology Modeling Equivalent to OWL 2 pp. 1-29

- Domenico Lembo, Valerio Santarelli, Domenico Fabio Savo and Giuseppe De Giacomo
- Handover Management in 5G Vehicular Networks pp. 1-42

- Ioannis Kosmopoulos, Emmanouil Skondras, Angelos Michalas, Emmanouel T. Michailidis and Dimitrios D. Vergados
- Business Models for the Internet of Services: State of the Art and Research Agenda pp. 1-18

- Jacqueline Zonichenn Reis, Rodrigo Franco Gonçalves, Marcia Terra da Silva and Nikolai Kazantsev
- Addressing Syntax-Based Semantic Complementation: Incorporating Entity and Soft Dependency Constraints into Metonymy Resolution pp. 1-18

- Siyuan Du and Hao Wang
- Quantum Key Distribution for 5G Networks: A Review, State of Art and Future Directions pp. 1-28

- Mohd Hirzi Adnan, Zuriati Ahmad Zukarnain and Nur Ziadah Harun
- Self-Organizing Networks for 5G and Beyond: A View from the Top pp. 1-30

- Andreas G. Papidas and George C. Polyzos
- Investigation of Using CAPTCHA Keystroke Dynamics to Enhance the Prevention of Phishing Attacks pp. 1-21

- Emtethal K. Alamri, Abdullah M. Alnajim and Suliman A. Alsuhibany
- A Density-Based Random Forest for Imbalanced Data Classification pp. 1-20

- Jia Dong and Quan Qian
- The Time Machine in Columnar NoSQL Databases: The Case of Apache HBase pp. 1-20

- Chia-Ping Tsai, Che-Wei Chang, Hung-Chang Hsiao and Haiying Shen
- Adjacency-Information-Entropy-Based Cooperative Name Resolution Approach in ICN pp. 1-22

- Jiaqi Li, Jiali You and Haojiang Deng
- Design of Relay Switching to Combat an Eavesdropper in IoT-NOMA Wireless Networks pp. 1-22

- Thanh-Nam Tran, Ho Van-Cuu, Thoai Phu Vo, Khanh Ngo Nhu Tran and Miroslav Voznak
- Bot-Based Emergency Software Applications for Natural Disaster Situations pp. 1-22

- Gabriel Ovando-Leon, Luis Veas-Castillo, Veronica Gil-Costa and Mauricio Marin
- Forecasting Students Dropout: A UTAD University Study pp. 1-14

- Diogo E. Moreira da Silva, Eduardo J. Solteiro Pires, Arsénio Reis, Paulo B. de Moura Oliveira and João Barroso
- Neural Network-Based Price Tag Data Analysis pp. 1-14

- Pavel Laptev, Sergey Litovkin, Sergey Davydenko, Anton Konev, Evgeny Kostyuchenko and Alexander Shelupanov
- CPU-GPU-Memory DVFS for Power-Efficient MPSoC in Mobile Cyber Physical Systems pp. 1-14

- Somdip Dey, Samuel Isuwa, Suman Saha, Amit Kumar Singh and Klaus McDonald-Maier
- A Survey on Intrusion Detection Systems for Fog and Cloud Computing pp. 1-27

- Victor Chang, Lewis Golightly, Paolo Modesti, Qianwen Ariel Xu, Le Minh Thao Doan, Karl Hall, Sreeja Boddu and Anna Kobusińska
- High-Performance Computing and ABMS for High-Resolution COVID-19 Spreading Simulation pp. 1-23

- Mattia Pellegrino, Gianfranco Lombardo, Stefano Cagnoni and Agostino Poggi
- A Vote-Based Architecture to Generate Classified Datasets and Improve Performance of Intrusion Detection Systems Based on Supervised Learning pp. 1-17

- Diogo Teixeira, Silvestre Malta and Pedro Pinto
- A Prototype Web Application to Support Human-Centered Audiovisual Content Authentication and Crowdsourcing pp. 1-17

- Nikolaos Vryzas, Anastasia Katsaounidou, Lazaros Vrysis, Rigas Kotsakis and Charalampos Dimoulas
- Utilizing Blockchain for IoT Privacy through Enhanced ECIES with Secure Hash Function pp. 1-17

- Yurika Pant Khanal, Abeer Alsadoon, Khurram Shahzad, Ahmad B. Al-Khalil, Penatiyana W. C. Prasad, Sabih Ur Rehman and Rafiqul Islam
- Deep Anomaly Detection Based on Variational Deviation Network pp. 1-17

- Junwen Lu, Jinhui Wang, Xiaojun Wei, Keshou Wu and Guanfeng Liu
- Unsupervised Anomaly Detection and Segmentation on Dirty Datasets pp. 1-17

- Jiahao Guo, Xiaohuo Yu and Lu Wang
- Solar Radiation Forecasting by Pearson Correlation Using LSTM Neural Network and ANFIS Method: Application in the West-Central Jordan pp. 1-24

- Hossam Fraihat, Amneh A. Almbaideen, Abdullah Al-Odienat, Bassam Al-Naami, Roberto De Fazio and Paolo Visconti
Volume 14, issue 2, 2022
- Modelling and Analysis of Performance Characteristics in a 60 Ghz 802.11ad Wireless Mesh Backhaul Network for an Urban 5G Deployment pp. 1-16

- Michael Mackay, Alessandro Raschella and Ogeen Toma
- Efficient Next-Hop Selection in Multi-Hop Routing for IoT Enabled Wireless Sensor Networks pp. 1-16

- Saleh M. Altowaijri
- The Framework of Cross-Domain and Model Adversarial Attack against Deepfake pp. 1-16

- Haoxuan Qiu, Yanhui Du and Tianliang Lu
- JoSDW: Combating Noisy Labels by Dynamic Weight pp. 1-16

- Yaojie Zhang, Huahu Xu, Junsheng Xiao and Minjie Bian
- Personalizing Environmental Awareness through Smartphones Using AHP and PROMETHEE II pp. 1-16

- Akrivi Krouska, Katerina Kabassi, Christos Troussas and Cleo Sgouropoulou
- Task Offloading Based on LSTM Prediction and Deep Reinforcement Learning for Efficient Edge Computing in IoT pp. 1-19

- Youpeng Tu, Haiming Chen, Linjie Yan and Xinyan Zhou
- Coarse-to-Fine Entity Alignment for Chinese Heterogeneous Encyclopedia Knowledge Base pp. 1-19

- Meng Wu, Tingting Jiang, Chenyang Bu and Bin Zhu
- An IoT-Based COVID-19 Prevention and Control System for Enclosed Spaces pp. 1-19

- Cunwei Yang, Weiqing Wang, Fengying Li and Degang Yang
- Flow Scheduling in Data Center Networks with Time and Energy Constraints: A Software-Defined Network Approach pp. 1-26

- Martin Fraga, Matías Micheletto, Andrés Llinás, Rodrigo Santos and Paula Zabala
- Multi-Attribute Decision Making for Energy-Efficient Public Transport Network Selection in Smart Cities pp. 1-29

- Rashmi Munjal, William Liu, Xuejun Li, Jairo Gutierrez and Peter Han Joo Chong
- Securing IoT Devices against Differential-Linear (DL) Attack Used on Serpent Algorithm pp. 1-32

- Khumbelo Muthavhine and Mbuyu Sumbwanyambe
- A Performance Comparison of Different Cloud-Based Natural Language Understanding Services for an Italian e-Learning Platform pp. 1-20

- Matteo Zubani, Luca Sigalini, Ivan Serina, Luca Putelli, Alfonso E. Gerevini and Mattia Chiari
- Towards Crowdsourcing Internet of Things (Crowd-IoT): Architectures, Security and Applications pp. 1-50

- Kenneth Li Minn Ang, Jasmine Kah Phooi Seng and Ericmoore Ngharamike
- Selecting Workers Wisely for Crowdsourcing When Copiers and Domain Experts Co-exist pp. 1-22

- Xiu Fang, Suxin Si, Guohao Sun, Quan Z. Sheng, Wenjun Wu, Kang Wang and Hang Lv
- Anomalous Vehicle Recognition in Smart Urban Traffic Monitoring as an Edge Service pp. 1-22

- Ning Chen and Yu Chen
- Open-Source MQTT-Based End-to-End IoT System for Smart City Scenarios pp. 1-22

- Cristian D’Ortona, Daniele Tarchi and Carla Raffaelli
- Controlling the Trade-Off between Resource Efficiency and User Satisfaction in NDNs Based on Naïve Bayes Data Classification and Lagrange Method pp. 1-14

- Abdelkader Tayeb Herouala, Chaker Abdelaziz Kerrache, Benameur Ziani, Carlos T. Calafate, Nasreddine Lagraa and Abdou el Karim Tahari
- Improved Eagle Strategy Algorithm for Dynamic Web Service Composition in the IoT: A Conceptual Approach pp. 1-14

- Venushini Rajendran, R Kanesaraj Ramasamy and Wan-Noorshahida Mohd-Isa
- Exploring the Benefits of Combining DevOps and Agile pp. 1-14

- Fernando Almeida, Jorge Simões and Sérgio Lopes
- Network Function Virtualization and Service Function Chaining Frameworks: A Comprehensive Review of Requirements, Objectives, Implementations, and Open Research Challenges pp. 1-39

- Haruna Umar Adoga and Dimitrios P. Pezaros
- Acknowledgment to Reviewers of Future Internet in 2021 pp. 1-6

- Future Internet Editorial Office
- Research on Progress of Blockchain Consensus Algorithm: A Review on Recent Progress of Blockchain Consensus Algorithms pp. 1-24

- Huanliang Xiong, Muxi Chen, Canghai Wu, Yingding Zhao and Wenlong Yi
- A Strategy-Based Formal Approach for Fog Systems Analysis pp. 1-25

- Souad Marir, Faiza Belala and Nabil Hameurlain
- Digital Twin—Cyber Replica of Physical Things: Architecture, Applications and Future Research Directions pp. 1-25

- Cheng Qian, Xing Liu, Colin Ripley, Mian Qian, Fan Liang and Wei Yu
- Safety Verification of Driving Resource Occupancy Rules Based on Functional Language pp. 1-15

- Zhixi Hu, Yi Zhu, Xiaoying Chen and Yu Zhao
- An Active Path-Associated Cache Scheme for Mobile Scenes pp. 1-18

- Tianchi Zhou, Peng Sun and Rui Han
- A Single-Rate Multicast Congestion Control (SRMCC) Mechanism in Information-Centric Networking pp. 1-18

- Yingjie Duan, Hong Ni, Xiaoyong Zhu and Xu Wang
- CNN for User Activity Detection Using Encrypted In-App Mobile Data pp. 1-18

- Madushi H. Pathmaperuma, Yogachandran Rahulamathavan, Safak Dogan and Ahmet Kondoz
- Estimation on the Importance of Semantic Web Integration for Art and Culture Related Online Media Outlets pp. 1-28

- Andreas Giannakoulopoulos, Minas Pergantis, Nikos Konstantinou, Alexandros Kouretsis, Aristeidis Lamprogeorgos and Iraklis Varlamis
- Evaluation of a Reputation Management Technique for Autonomous Vehicles pp. 1-21

- Darius Kianersi, Suraj Uppalapati, Anirudh Bansal and Jeremy Straub
- IoT Nodes Authentication and ID Spoofing Detection Based on Joint Use of Physical Layer Security and Machine Learning pp. 1-21

- Dania Marabissi, Lorenzo Mucchi and Andrea Stomaci
- DA-GAN: Dual Attention Generative Adversarial Network for Cross-Modal Retrieval pp. 1-23

- Liewu Cai, Lei Zhu, Hongyan Zhang and Xinghui Zhu
- Flow-Based Programming for Machine Learning pp. 1-23

- Tanmaya Mahapatra and Syeeda Nilofer Banoo
- Intelligent Traffic Management in Next-Generation Networks pp. 1-35

- Ons Aouedi, Kandaraj Piamrat and Benoît Parrein
- Graph Representation-Based Deep Multi-View Semantic Similarity Learning Model for Recommendation pp. 1-17

- Jiagang Song, Jiayu Song, Xinpan Yuan, Xiao He and Xinghui Zhu
- Topology Inference and Link Parameter Estimation Based on End-to-End Measurements pp. 1-17

- Grigorios Kakkavas, Vasileios Karyotis and Symeon Papavassiliou
- Indoor Localization System Using Fingerprinting and Novelty Detection for Evaluation of Confidence pp. 1-17

- Helmer Augusto de Souza Mourão and Horácio Antonio Braga Fernandes de Oliveira
- A Hybrid Robust-Learning Architecture for Medical Image Segmentation with Noisy Labels pp. 1-13

- Jialin Shi, Chenyi Guo and Ji Wu
Volume 14, issue 1, 2021
- Authorship Attribution of Social Media and Literary Russian-Language Texts Using Machine Learning Methods and Feature Selection pp. 1-24

- Anastasia Fedotova, Aleksandr Romanov, Anna Kurtukova and Alexander Shelupanov
- An Automated Behaviour-Based Clustering of IoT Botnets pp. 1-17

- Tolijan Trajanovski and Ning Zhang
- The Impact of a Number of Samples on Unsupervised Feature Extraction, Based on Deep Learning for Detection Defects in Printed Circuit Boards pp. 1-17

- Ihar Volkau, Abdul Mujeeb, Wenting Dai, Marius Erdt and Alexei Sourin
- Key Points’ Location in Infrared Images of the Human Body Based on Mscf-ResNet pp. 1-14

- Shengguo Ge and Siti Nurulain Mohd Rum
- SMYOLO: Lightweight Pedestrian Target Detection Algorithm in Low-Altitude Scenarios pp. 1-14

- Weiwei Zhang, Xin Ma, Yuzhao Zhang, Ming Ji and Chenghui Zhen
- Security and Privacy in Cloud Computing: Technical Review pp. 1-27

- Yunusa Simpa Abdulsalam and Mustapha Hedabou
- Global Contextual Dependency Network for Object Detection pp. 1-10

- Junda Li, Chunxu Zhang and Bo Yang
- S4 Features and Artificial Intelligence for Designing a Robot against COVID-19—Robocov pp. 1-22

- Pedro Ponce, Omar Mata, Esteban Perez, Juan Roberto Lopez, Arturo Molina and Troy McDaniel
- Experimentation Environments for Data Center Routing Protocols: A Comprehensive Review pp. 1-22

- Leonardo Alberro, Alberto Castro and Eduardo Grampin
- Application of Machine Learning Techniques to Predict a Patient’s No-Show in the Healthcare Sector pp. 1-21

- Luiz Henrique A. Salazar, Valderi R. Q. Leithardt, Wemerson Delcio Parreira, Anita M. da Rocha Fernandes, Jorge Luis Victória Barbosa and Sérgio Duarte Correia
- Mobility in Unsupervised Word Embeddings for Knowledge Extraction—The Scholars’ Trajectories across Research Topics pp. 1-21

- Gianfranco Lombardo, Michele Tomaiuolo, Monica Mordonini, Gaia Codeluppi and Agostino Poggi
- Improved Classification of Blockchain Transactions Using Feature Engineering and Ensemble Learning pp. 1-12

- Chandrashekar Jatoth, Rishabh Jain, Ugo Fiore and Subrahmanyam Chatharasupalli
- Real-Time Nanoscopic Rider Safety System for Smart and Green Mobility Based upon Varied Infrastructure Parameters pp. 1-12

- Faheem Ahmed Malik, Laurent Dala and Krishna Busawon
- CacheHawkeye: Detecting Cache Side Channel Attacks Based on Memory Events pp. 1-12

- Hui Yan and Chaoyuan Cui
- Enhancing Reactive Ad Hoc Routing Protocols with Trust pp. 1-20

- Yelena Trofimova and Pavel Tvrdík
- Query Processing in Blockchain Systems: Current State and Future Challenges pp. 1-31

- Dennis Przytarski, Christoph Stach, Clémentine Gritti and Bernhard Mitschang
- Machine Learning-Based Lie Detector Applied to a Novel Annotated Game Dataset pp. 1-18

- Nuria Rodriguez-Diaz, Decky Aspandi, Federico M. Sukno and Xavier Binefa
- Your Face Mirrors Your Deepest Beliefs—Predicting Personality and Morals through Facial Emotion Recognition pp. 1-18

- Peter A. Gloor, Andrea Fronzetti Colladon, Erkin Altuntas, Cengiz Cetinkaya, Maximilian F. Kaiser, Lukas Ripperger and Tim Schaefer
- A Queueing-Based Model Performance Evaluation for Internet of People Supported by Fog Computing pp. 1-18

- Laécio Rodrigues, Joel J. P. C. Rodrigues, Antonio de Barros Serra and Francisco Airton Silva
- Dis-Cover AI Minds to Preserve Human Knowledge pp. 1-15

- Leonardo Ranaldi, Francesca Fallucchi and Fabio Massimo Zanzotto
- Three Layered Architecture for Driver Behavior Analysis and Personalized Assistance with Alert Message Dissemination in 5G Envisioned Fog-IoCV pp. 1-29

- Mazen Alowish, Yoshiaki Shiraishi, Masami Mohri and Masakatu Morii
- A Survey on Big IoT Data Indexing: Potential Solutions, Recent Advancements, and Open Issues pp. 1-44

- Zineddine Kouahla, Ala-Eddine Benrazek, Mohamed Amine Ferrag, Brahim Farou, Hamid Seridi, Muhammet Kurulay, Adeel Anjum and Alia Asheralieva
- The Important Role of Global State for Multi-Agent Reinforcement Learning pp. 1-9

- Shuailong Li, Wei Zhang, Yuquan Leng and Xiaohui Wang
- The Car-Following Model and Its Applications in the V2X Environment: A Historical Review pp. 1-34

- Junyan Han, Huili Shi, Longfei Chen, Hao Li and Xiaoyuan Wang
- DD-FoG: Intelligent Distributed Dynamic FoG Computing Framework pp. 1-19

- Volkov Artem, Kovalenko Vadim, Ibrahim A. Elgendy, Ammar Muthanna and Andrey Koucheryavy
- An In-Network Cooperative Storage Schema Based on Neighbor Offloading in a Programmable Data Plane pp. 1-19

- Shoujiang Dang and Rui Han
- No Perfect Outdoors: Towards a Deep Profiling of GNSS-Based Location Contexts pp. 1-19

- Jin Wang and Jun Luo
- Utilizing Half Convolutional Autoencoder to Generate User and Item Vectors for Initialization in Matrix Factorization pp. 1-19

- Tan Nghia Duong, Nguyen Nam Doan, Truong Giang Do, Manh Hoang Tran, Duc Minh Nguyen and Quang Hieu Dang
- A Semantic Preprocessing Framework for Breaking News Detection to Support Future Drone Journalism Services pp. 1-19

- Michail Niarchos, Marina Eirini Stamatiadou, Charalampos Dimoulas, Andreas Veglis and Andreas Symeonidis
| |