


default search action
IEEE Internet of Things Magazine, Volume 8
Volume 8, Number 1, January 2025
- N. Kishor Narang:
Mentor's Musings on Standards, Regulations & Policies Imperatives for Ethics & Governance of Artificial Intelligence. 4-9 - Zhihan Lyu, James J. Park, Jun Shen, Houbing Song, Yi Zhang:
Guest Editorial: Generative Artificial Intelligence at the Edge in the Modern Internet of Things. 10-11 - Yi Rong, Yingchi Mao, Xiaoming He, Mingkai Chen:
Large-Scale Traffic Flow Forecast with Lightweight LLM in Edge Intelligence. 12-18 - Arun Kumar Sangaiah, Jayakrishnan Anandakrishnan, Meenakshisundaram Venkatesan, Mohd Amiruddin Abd Rahman, Padmapriya Arumugam, Mrinali Das:
Edge-IoT-UAV Adaptation Toward Precision Agriculture Using 3D-LiDAR Point Clouds. 19-25 - Zhipeng Yuan, Kang Liu, Ruoling Peng, Shunbao Li, Daniel Leybourne, Nasamu Musa, He Huang, Po Yang:
PestGPT: Leveraging Large Language Models and IoT for Timely and Customized Recommendation Generation in Sustainable Pest Management. 26-33 - Sana Sharif, Sherali Zeadally, Waleed Ejaz:
Resource Optimization in UAV-Assisted IoT Networks: The Role of Generative AI. 34-41 - Claudio Savaglio, Vincenzo Barbuto, Fabrizio Mangione, Giancarlo Fortino:
Generative Digital Twins: A Novel Approach in the IoT Edge-Cloud Continuum. 42-48 - Basudeb Bera, Ashok Kumar Das, Biplab Sikdar:
Securing Next-Generation Quantum IoT Applications using Quantum Key Distribution. 50-56 - Salah Abdeljabar, Mahmoud Wafik Eltokhey, Mohamed-Slim Alouini:
Reconfigurable Intelligent Surfaces for Outdoor Visible Light Communications. 58-64 - Joseph Khoury, Christelle Nader, Morteza Safaei Pour, Elias Bou-Harb:
An Internet-Scale Data-Driven Approach for Exploring Cyber Threats Amid Global Conflicts. 66-72 - Muna Al-Hawawreh, Zubair A. Baig, Sherali Zeadally:
Resilient Intrusion Detection Models for Closed Control-Loop in Cyber-Physical Systems: Combating Adversarial Examples. 73-80 - Jinbo Wen, Ruichen Zhang, Dusit Niyato, Jiawen Kang, Hongyang Du, Yang Zhang, Zhu Han:
Generative AI for Low-Carbon Artificial Intelligence of Things with Large Language Models. 82-91 - Mahsa Farahani, Mohammad Amin Rashid, Bardia Safaei:
From Kernel to Cloud: A Concise Comparative Study of Practical IoT Operating Systems. 92-100 - Matheus Valente da Silva, Eslam Eldeeb, Mohammad Shehab, Hirley Alves, Richard Demo Souza:
Distributed Learning Methodologies for Massive Machine Type Communication. 102-108 - Songzuo Liu, Irfan Ullah, Muhammad Muzzammil, Niaz Ahmed, Abdul Wahid, Shao Zhen:
Empowering Internet of Underwater Things: An Integrated Simulator for Underwater Magneto-Coupled Wireless Sensor Networks. 109-114

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.