
2025-07-02 09:43:40
A Domain-specific Language and Architecture for Detecting Process Activities from Sensor Streams in IoT
Ronny Seiger, Daniel Locher, Marco Kaufmann, Aaron F. Kurz
https://arxiv.org/abs/2507.00686
A Domain-specific Language and Architecture for Detecting Process Activities from Sensor Streams in IoT
Ronny Seiger, Daniel Locher, Marco Kaufmann, Aaron F. Kurz
https://arxiv.org/abs/2507.00686
Zero-Trust Foundation Models: A New Paradigm for Secure and Collaborative Artificial Intelligence for Internet of Things
Kai Li, Conggai Li, Xin Yuan, Shenghong Li, Sai Zou, Syed Sohail Ahmed, Wei Ni, Dusit Niyato, Abbas Jamalipour, Falko Dressler, Ozgur B. Akan
https://arxiv.org/abs/2505.23792
"The Hague Declaration on Knowledge Discovery in the Digital Age" was published around 10 years ago. Very interesting, how things have changed since then. TDM for research is still in its infancy, and reuse in the context of #ai has caused a backlash against most of the 6 principles of the Declaration. Tellingly, the Declaration is only accessible via the internet archive:
Distributed Intelligence in the Computing Continuum with Active Inference
Victor Casamayor Pujol, Boris Sedlak, Tommaso Salvatori, Karl Friston, Schahram Dustdar
https://arxiv.org/abs/2505.24618
There's another layer to this as well, I think. Any social media feed interlaces horrible things with wonderful things in a completely contextually devoid list. A funny cat picture and a traumatic picture or video of violence are both "rated" in the same way, with the same imaginary internet points, without any differentiation between good and bad.
I feel like this is also cooking our brains a bit.
Optimizing Server Load Distribution in Multimedia IoT Environments through LSTM-Based Predictive Algorithms
Somaye Imanpour, Ahmadreza Montazerolghaem, Saeed Afshari
https://arxiv.org/abs/2505.24806
Distributed gradient methods under heavy-tailed communication noise
Manojlo Vukovic, Dusan Jakovetic, Dragana Bajovic, Soummya Kar
https://arxiv.org/abs/2505.24464
The Internet needs more of this, and fewer Nazis. That would truly be a better world.
I appreciate that he hired a real person, rather than AI slop.
https://ericwbailey.website/published/you-must-listen-to-rfc-2119/
E-WAN: Efficient Communication in Energy Harvesting Low-Power Networks
Naomi Stricker, David Blaser, Andres Gomez, Lothar Thiele
https://arxiv.org/abs/2506.23788
This https://arxiv.org/abs/2406.15119 has been replaced.
initial toot: https://mastoxiv.page/@arXiv_csSD_…
Performance Measurements in the AI-Centric Computing Continuum Systems
Praveen Kumar Donta, Qiyang Zhang, Schahram Dustdar
https://arxiv.org/abs/2506.22884
Our company sells products to test internet protocol implementations under unusual, but possible, situations. (Many fail.)
We sell worldwide, so we have to attach various code numbers to identify the type of product to the import/export (tariff/duty) government agents who make sure that things coming into their countries pay the proper fees.
Well, that list of code numbers appears to have been created in the 1970s and not updated since. So if you are selling a VHS VCR or a Fax m…
Wireless Home Automation Using Social Networking Websites
Divya Alok Gupta, Dwith Chenna, B. Aditya Vighnesh Ramakanth
https://arxiv.org/abs/2506.22482 htt…
A Mixed-Signal Photonic SRAM-based High-Speed Energy-Efficient Photonic Tensor Core with Novel Electro-Optic ADC
Md Abdullah-Al Kaiser, Sugeet Sunder, Ajey P. Jacob, Akhilesh R. Jaiswal
https://arxiv.org/abs/2506.22705
Distributed Iterative ML and Message Passing for Grant-Free Cell-Free Massive MIMO Systems
Zilu Zhao, Christian Forsch, Laura Cottatellucci, Dirk Slock
https://arxiv.org/abs/2507.21363
Shilling Like It’s 1999: Ars, Anthropic, and the Internet of Other People’s Things https://musictechpolicy.com/2025/08/16/shilling-like-its-1999-ars-anthropic-and-the-internet-of-other-peoples-things/
Securing the Internet of Medical Things (IoMT): Real-World Attack Taxonomy and Practical Security Measures
Suman Deb, Emil Lupu, Emm Mic Drakakis, Anil Anthony Bharath, Zhen Kit Leung, Guang Rui Ma, Anupam Chattopadhyay
https://arxiv.org/abs/2507.19609
Google Workspace is full of dire warnings about how you can try things but they won't work for a long time (maybe). Sometimes that's because of DNS and Internet caching problems. Sometimes it's because Google made a decision in 2001 it was OK to store data in databases that didn't commit immediately and they thought it was OK to show the user inconsistent state. Twenty-four years later that awful decision persists, even if my data doesn't.
Innovative Research on IoT Architecture and Robotic Operating Platforms: Applications of Large Language Models and Generative AI
Huiwen Han
https://arxiv.org/abs/2506.22477
Movable Antennas-aided Wireless Energy Transfer for the Internet of Things
Osmel Mart\'inez Rosabal, Onel Alcaraz L\'opez, Marco Di Renzo, Richard Demo Souza, Hirley Alves
https://arxiv.org/abs/2506.21966
On the Role of Color Temperature and Color Rendering Index of White-Light LEDs on the Theoretical Efficiency Limit of Indoor Photovoltaics
Aditi Sharma, Alexander A. Guaman, Jason A. R\"ohr
https://arxiv.org/abs/2506.20811
A Knowledge Distillation-empowered Adaptive Federated Reinforcement Learning Framework for Multi-Domain IoT Applications Scheduling
Zhiyu Wang, Mohammad Goudarzi, Mingming Gong, Rajkumar Buyya
https://arxiv.org/abs/2508.21328
An object-centric core metamodel for IoT-enhanced event logs
Yannis Bertrand, Christian Imenkamp, Lukas Malburg, Matthias Ehrendorfer, Marco Franceschetti, Joscha Gr\"uger, Francesco Leotta, J\"urgen Mangler, Ronny Seiger, Agnes Koschmider, Stefanie Rinderle-Ma, Barbara Weber, Estefania Serral
https://arxiv.org/abs/250…
FAST-LoRa: An Efficient Simulation Framework for Evaluating LoRaWAN Networks and Transmission Parameter Strategies
Laura Acosta Garc\'ia, Juan Aznar Poveda, Fabian Margreiter, Antonio-Javier Garc\'ia S\'anchez, Joan Garc\'ia Haro, Thomas Fahringer, Jos\'e Lorente L\'opez, Jos\'e-V\'ictor Rodr\'iguez
https://
The unsettling rise of athlete stalkers, plus an NFL QB debate https://www.nytimes.com/athletic/6548086/2025/08/12/the-unsettling-rise-of-athlete-stalkers-plus-an-nfl-qb-debate/
Enhancing IoT Intrusion Detection Systems through Adversarial Training
Karma Gurung, Ashutosh Ghimire, Fathi Amsaad
https://arxiv.org/abs/2507.19739 https://
Protect your privacy – browsers and search engines
Surveillance has always been a core part of fascist regimes. This is still true today, but is even more dangerous due to new data aggregation and AI technologies. The Internet sites you visit and the things you search for become a part of the larger surveillance database of your activities. You can take action now to reduce the risk to yourself, your friends and your loved ones while you browse the Internet. You should start now …
Digital Twin Technologies in Predictive Maintenance: Enabling Transferability via Sim-to-Real and Real-to-Sim Transfer
Sizhe Ma, Katherine A. Flanigan, Mario Berg\'es
https://arxiv.org/abs/2507.18449
Optimizing Indoor RIS-Aided Physical-Layer Security: A Codebook-Generation Methodology and Measurement-Based Analysis
Dimitris Kompostiotis, Dimitris Vordonis, Vassilis Paliouras, George C. Alexandropoulos
https://arxiv.org/abs/2506.22082
The Internet IS a *set* of physical things that can be blown up by bombs.
However, where there used to be about a dozen places where you’d need to plant a substantial bomb to wreck the Internet, while now there are hundreds you’d need to hit simultaneously to affect most users. It isn’t even really feasible to figure out where those places all are, because the live interconnections are so complex and the fallback links are entirely invisible normally.
AdapSCA-PSO: An Adaptive Localization Algorithm with AI-Based Hybrid SCA-PSO for IoT WSNs
Ze Zhang, Qian Dong, Wenhan Wang
https://arxiv.org/abs/2507.22317 https://
An Efficient Recommendation Filtering-based Trust Model for Securing Internet of Things
Muhammad Ibn Ziauddin, Rownak Rahad Rabbi, SM Mehrab, Fardin Faiyaz, Mosarrat Jahan
https://arxiv.org/abs/2508.17304
STL-GO: Spatio-Temporal Logic with Graph Operators for Distributed Systems with Multiple Network Topologies
Yiqi Zhao, Xinyi Yu, Bardh Hoxha, Georgios Fainekos, Jyotirmoy V. Deshmukh, Lars Lindemann
https://arxiv.org/abs/2507.15147
So farewell then Pinetime Watch 🪦.
It isn't showing any signs of charging. even after a completely-flat battery reset. Last hope gone.
Now nobody at all is running my custom software I think, and I have no way to fix the bugs.
Could replace it, but I'm not really paying any attention to the things it measures anyway. Heartrate is too unreliable to be useful and steps seems likely to be counting my leg-jiggles since I tend to hit 10,000 most days without trying or leaving the flat.
The software which tracks my time and mood is probably better running on the phone really. Easier to add notes and detail. Can't really input text from a watch. Location data can be added in ways the watch couldn't.
So back to not wearing a watch at all I think. Who needs it now we all carry pocket watches with internet and telephony.
#pineTime #smartWatch
GroupNL: Low-Resource and Robust CNN Design over Cloud and Device
Chuntao Ding, Jianhang Xie, Junna Zhang, Salman Raza, Shangguang Wang, Jiannong Cao
https://arxiv.org/abs/2506.12335
AirBreath Sensing: Protecting Over-the-Air Distributed Sensing Against Interference
Zhanwei Wang, Mingyao Cui, Huiling Yang, Qunsong Zeng, Min Sheng, Kaibin Huang
https://arxiv.org/abs/2508.11267
Exploring the Convergence of HCI and Evolving Technologies in Information Systems
Rajan Das Gupta, Ashikur Rahman, Md Imrul Hasan Showmick, Md. Yeasin Rahat, Md. Jakir Hossen
https://arxiv.org/abs/2506.08549
Communicating Smartly in Molecular Communication Environments: Neural Networks in the Internet of Bio-Nano Things
Jorge Torres G\'omez, Pit Hofmann, Lisa Y. Debus, Osman Tugay Ba\c{s}aran, Sebastian Lotter, Roya Khanzadeh, Stefan Angerbauer, Bige Deniz Unluturk, Sergi Abadal, Werner Haselmayr, Frank H. P. Fitzek, Robert Schober, Falko Dressler
ht…
Energy Management and Wake-up for IoT Networks Powered by Energy Harvesting
David Ernesto Ruiz-Guirola, Samuel Montejo-Sanchez, Israel Leyva-Mayorga, Zhu Han, Petar Popovski, Onel L. A. Lopez
https://arxiv.org/abs/2508.13825
An Efficient Lightweight Blockchain for Decentralized IoT
Faezeh Dehghan Tarzjani, Mostafa Salehi
https://arxiv.org/abs/2508.19219 https://arxiv.org/pdf/25…
An Efficient Hardware Implementation of Elliptic Curve Point Multiplication over $GF(2^m)$ on FPGA
Ruby Kumari, Tapas Rout, Babul Saini, Jai Gopal Pandey, Abhijit Karmakar
https://arxiv.org/abs/2506.12359
Co-Design of Sensing, Communications, and Control for Low-Altitude Wireless Networks
Haijia Jin, Jun Wu, Weijie Yuan, Fan Liu, Yuanhao Cui
https://arxiv.org/abs/2506.20970
RL-based Adaptive Task Offloading in Mobile-Edge Computing for Future IoT Networks
Ziad Qais Al Abbasi, Khaled M. Rabie, Senior Member, Xingwang Li, Senior Member, Wali Ullah Khan, Asma Abu Samah
https://arxiv.org/abs/2506.22474
Joint UAV Trajectory Planning and LEO Satellite Selection for Data Offloading in Space-Air-Ground Integrated Networks
Boran Wang, Ziye Jia, Can Cui, Qihui Wu
https://arxiv.org/abs/2506.12750
A Language-Agnostic Logical Relation for Message-Passing Protocols
Tesla Zhang, Sonya Simkin, Rui Li, Yue Yao, Stephanie Balzer
https://arxiv.org/abs/2506.10026
This https://arxiv.org/abs/2501.07148 has been replaced.
initial toot: https://mastoxiv.page/@arXiv_csCY_…
NIST is done standardizing #ASCON, an encryption and hashing algorithm. I count that as a big win for #IoT security, in particular because the last review round's raised concerns were heeded and there is now a 32-bit tag mode usable for applications such as 802.15.4 link-layer security.
Congratulations…
A Computer Vision and Depth Sensor-Powered Smart Cane for Real-Time Obstacle Detection and Navigation Assistance for the Visually Impaired
Sunkalp Chandra, Umang Sharma, Devesh Khilnani
https://arxiv.org/abs/2508.16698
Energy-Efficient Index and Code Index Modulations for Spread CPM Signals in Internet of Things
Long Yuan, Wenkun Wen, Junlin Liu, Peiran Wu, Minghua Xia
https://arxiv.org/abs/2508.10290
CITADEL: Continual Anomaly Detection for Enhanced Learning in IoT Intrusion Detection
Elvin Li, Onat Gungor, Zhengli Shang, Tajana Rosing
https://arxiv.org/abs/2508.19450 https:…
Spatially Correlated Blockage Aware Placement of RIS in IIoT Networks
Rashmi Kumari, Gourab Ghatak, Abhishek K. Gupta
https://arxiv.org/abs/2508.16946 https://
Constant Modulus Waveforms for IoT-Centric Integrated Sensing and Communications
Tian Han, Shalanika Dayarathna, Rajitha Senanayake, Peter Smith, Aryan Kaushik, Alain Mourad, Richard A. Stirling-Gallacher, Jamie Evans
https://arxiv.org/abs/2506.21078
$AutoGuardX$: A Comprehensive Cybersecurity Framework for Connected Vehicles
Muhammad Ali Nadeem, Bishwo Prakash Pokharel, Naresh Kshetri, Achyut Shankar, Gokarna Sharma
https://arxiv.org/abs/2508.18155
QTCAJOSA: Low-Complexity Joint Offloading and Subchannel Allocation for NTN-Enabled IoMT
Alejandro Flores C., Konstantinos Ntontin, Ashok Bandi, Symeon Chatzinotas
https://arxiv.org/abs/2507.13242
A Survey on Cloud-Edge-Terminal Collaborative Intelligence in AIoT Networks
Jiaqi Wu, Jing Liu, Yang Liu, Lixu Wang, Zehua Wang, Wei Chen, Zijian Tian, Richard Yu, Victor C. M. Leung
https://arxiv.org/abs/2508.18803
Temperature-Resilient Reconfigurable PUF with Dual-Pulse Modulation based on SOT-MRAM Chip
Min Wang, Chuanpeng Jiang, Zhaohao Wang, Zhengyi Hou, Zhongkui Zhang, Yuanfu Zhao, Hongxi Liu, Weisheng Zhao
https://arxiv.org/abs/2508.16405
Optimized Arithmetic Coding for Efficient Data Compression in the Resource-Constrained Internet of Things(IoT)
Vatsala Upadhyay, J. Kokila, Abhishek Vaish
https://arxiv.org/abs/2508.08840
MOHAF: A Multi-Objective Hierarchical Auction Framework for Scalable and Fair Resource Allocation in IoT Ecosystems
Kushagra Agrawal, Polat Goktas, Anjan Bandopadhyay, Debolina Ghosh, Junali Jasmine Jena, Mahendra Kumar Gourisaria
https://arxiv.org/abs/2508.14830
Dynamic Temporal Positional Encodings for Early Intrusion Detection in IoT
Ioannis Panopoulos, Maria-Lamprini A. Bartsioka, Sokratis Nikolaidis, Stylianos I. Venieris, Dimitra I. Kaklamani, Iakovos S. Venieris
https://arxiv.org/abs/2506.18114
A Contemporary Survey on Fluid Antenna Systems: Fundamentals and Networking Perspectives
Hanjiang Hong, Kai-Kit Wong, Hao Xu, Xinghao Guo, Farshad Rostami Ghadi, Yu Chen, Yin Xu, Chan-Byoung Chae, Baiyang Liu, Kin-Fai Tong, Yangyang Zhang
https://arxiv.org/abs/2506.13317
LoRaIN: A Constructive Interference-Assisted Reliable and Energy-Efficient LoRa Indoor Network
Mahbubur Rahman, Abusayeed Saifullah
https://arxiv.org/abs/2506.16409
SAFER-D: A Self-Adaptive Security Framework for Distributed Computing Architectures
Marco Stadler, Michael Vierhauser, Michael Riegler, Daniel Waghubinger, Johannes Sametinger
https://arxiv.org/abs/2506.16545
Talk with the Things: Integrating LLMs into IoT Networks
Alakesh Kalita
https://arxiv.org/abs/2507.17865 https://arxiv.org/pdf/2507.17865
A Model Aware AIGC Task Offloading Algorithm in IIoT Edge Computing
Xin Wang, Xiao Huan Li, Xun Wang
https://arxiv.org/abs/2507.11560 https://
Toward Edge General Intelligence with Agentic AI and Agentification: Concepts, Technologies, and Future Directions
Ruichen Zhang, Guangyuan Liu, Yinqiu Liu, Changyuan Zhao, Jiacheng Wang, Yunting Xu, Dusit Niyato, Jiawen Kang, Yonghui Li, Shiwen Mao, Sumei Sun, Xuemin Shen, Dong In Kim
https://arxiv.org/abs/2508.18725
Towards Sustainable Computing: Exploring Energy Consumption Efficiency of Alternative Configurations and Workloads in an Open Source Messaging System
Maria Voreakou, George Kousiouris, Mara Nikolaidou
https://arxiv.org/abs/2506.10693
How To Mitigate And Defend Against DDoS Attacks In IoT Devices
Ifiyemi Leigha, Basak Comlekcioglu, Maria Pilar Bezanilla
https://arxiv.org/abs/2507.11772 h…
Spatio-Temporal Information Freshness for Remote Source Monitoring in IoT Systems
Andrea Munari, Federico Chiariotti, Leonardo Badia, Petar Popovski
https://arxiv.org/abs/2506.04804
RIS-assisted ISAC Systems for Industrial Revolution 6.0: Exploring the Near-field and Far-field Coexistence
Seonghoon Yoo, Jaemin Jung, Seongah Jeong, Jinkyu Kang, Markku Juntti, Joonhyuk Kang
https://arxiv.org/abs/2507.07643
Distributed system perspective on Backscatter systems
Jincheng Guan, Jun Zhang
https://arxiv.org/abs/2506.04833 https://arxiv.org/pdf…
Load-Altering Attacks Against Power Grids: A Case Study Using the GB-36 Bus System Open Dataset
Syed Irtiza Maksud, Subhash Lakshminarayana
https://arxiv.org/abs/2508.08945 http…
A Grant-free Coded Random Access Scheme for Near-field Communications
Enrico Testi, Giulia Torcolacci, Nicol\`o Decarli, Davide Dardari, Enrico Paolini
https://arxiv.org/abs/2508.15673
Lightweight and High-Throughput Secure Logging for Internet of Things and Cold Cloud Continuum
Saif E. Nouma, Attila A. Yavuz
https://arxiv.org/abs/2506.08781
Energy-Efficient Real-Time Job Mapping and Resource Management in Mobile-Edge Computing
Chuanchao Gao, Niraj Kumar, Arvind Easwaran
https://arxiv.org/abs/2506.12686
Low-Power and Accurate IoT Monitoring Under Radio Resource Constraint
Takaho Shimokasa, Hiroyuki Yomo, Federico Chiariotti, Junya Shiraishi, Petar Popovski
https://arxiv.org/abs/2507.15338
Reporte de vulnerabilidades en IIoT. Proyecto DEFENDER
Pedro Almansa Jim\'enez, Lorenzo Fern\'andez Maim\'o, \'Angel Luis Per\'ales G\'omez
https://arxiv.org/abs/2507.10819
Reinforcement Learning-Based Policy Optimisation For Heterogeneous Radio Access
Anup Mishra, \v{C}edomir Stefanovi\'c, Xiuqiang Xu, Petar Popovski, Israel Leyva-Mayorga
https://arxiv.org/abs/2506.15273
Physical Layer Challenge-Response Authentication between Ambient Backscatter Devices
Yifan Zhang, Yongchao Dang, Masoud Kaveh, Zheng Yan, Riku J\"antti, Zhu Han
https://arxiv.org/abs/2506.18767
6G Infrastructures for Edge AI: An Analytical Perspective
Kurt Horvath, Shpresa Tuda, Blerta Idrizi, Stojan Kitanov, Fisnik Doko, Dragi Kimovski
https://arxiv.org/abs/2506.10570
The Trip to ZigBee Backscatter across a Decade, a Systematic Review
Yang Liu
https://arxiv.org/abs/2506.13822 https://arxiv.org/pdf/2…
Decoding and Engineering the Phytobiome Communication for Smart Agriculture
Fatih Gulec, Hamdan Awan, Nigel Wallbridge, Andrew W. Eckford
https://arxiv.org/abs/2508.03584 https:…
A Robust Cross-Domain IDS using BiGRU-LSTM-Attention for Medical and Industrial IoT Security
Afrah Gueriani, Hamza Kheddar, Ahmed Cherif Mazari, Mohamed Chahine Ghanem
https://arxiv.org/abs/2508.12470 …
Backscattering-Based Security in Wireless Power Transfer Applied to Battery-Free BLE Sensors
Taki Eddine Djidjekh (INSA Toulouse, LAAS-MINC), Ga\"el Loubet (LAAS-MINC, INSA Toulouse), Alexandru Takacs (LAAS-MINC, UT)
https://arxiv.org/abs/2507.13042
Qualitative Assessment of Low Power Wide Area Network Protocols and their Security Aspect
Wesley dos Reis Bezerra, Lais Machado Bezerra, Carlos Becker Westphal
https://arxiv.org/abs/2507.08677
Optimizing Federated Learning for Scalable Power-demand Forecasting in Microgrids
Roopkatha Banerjee, Sampath Koti, Gyanendra Singh, Anirban Chakraborty, Gurunath Gurrala, Bhushan Jagyasi, Yogesh Simmhan
https://arxiv.org/abs/2508.08022
Data-driven Trust Bootstrapping for Mobile Edge Computing-based Industrial IoT Services
Prabath Abeysekara, Hai Dong
https://arxiv.org/abs/2508.12560 https://
Duty-Cycling is Not Enough in Constrained IoT Networking: Revealing the Energy Savings of Dynamic Clock Scaling
Michel Rottleuthner, Thomas C. Schmidt, Matthias W\"ahlisch
https://arxiv.org/abs/2508.09620
Toward a Lightweight, Scalable, and Parallel Secure Encryption Engine
Rasha Karakchi, Rye Stahle-Smith, Nishant Chinnasami, Tiffany Yu
https://arxiv.org/abs/2506.15070
Age of Information Optimization in Laser-charged UAV-assisted IoT Networks: A Multi-agent Deep Reinforcement Learning Method
Geng Sun, Likun Zhang, Jiahui Li, Jing Wu, Jiacheng Wang, Zemin Sun, Changyuan Zhao, Victor C. M. Leung
https://arxiv.org/abs/2507.08429
Extreme Learning Machine Based System for DDoS Attacks Detections on IoMT Devices
Nelly Elsayed, Lily Dzamesi, Zag ElSayed, Murat Ozer
https://arxiv.org/abs/2507.05132
This https://arxiv.org/abs/2501.03465 has been replaced.
initial toot: https://mastoxiv.page/@arXiv_csNI_…
Age of Information in Unreliable Tandem Queues
Muthukrishnan Senthilkumar, Aresh Dadlani, Hina Tabassum
https://arxiv.org/abs/2506.09245 https://
Physical Layer-Based Device Fingerprinting for Wireless Security: From Theory to Practice
Junqing Zhang, Francesco Ardizzon, Mattia Piana, Guanxiong Shen, Stefano Tomasin
https://arxiv.org/abs/2506.09807
User Head Movement-Predictive XR in Immersive H2M Collaborations over Future Enterprise Networks
Sourav Mondal, Elaine Wong
https://arxiv.org/abs/2507.15254
Spectral Feature Extraction for Robust Network Intrusion Detection Using MFCCs
HyeYoung Lee, Muhammad Nadeem, Pavel Tsoi
https://arxiv.org/abs/2507.10622 h…
Arbiter PUF: Uniqueness and Reliability Analysis Using Hybrid CMOS-Stanford Memristor Model
Tanvir Rahman, A. B. M. Harun-ur Rashid
https://arxiv.org/abs/2507.04461
Self-Sustaining Multi-Sensor LoRa-Based Activity Monitoring for Community Workout Parks
Victor Luder, Michele Magno
https://arxiv.org/abs/2506.03203 https:…
System Security Framework for 5G Advanced /6G IoT Integrated Terrestrial Network-Non-Terrestrial Network (TN-NTN) with AI-Enabled Cloud Security
Sasa Maric, Rasil Baidar, Robert Abbas, Sam Reisenfeld
https://arxiv.org/abs/2508.05707
Hybrid LLM-Enhanced Intrusion Detection for Zero-Day Threats in IoT Networks
Mohammad F. Al-Hammouri, Yazan Otoum, Rasha Atwa, Amiya Nayak
https://arxiv.org/abs/2507.07413