Selected Reading: 6G for Vehicle-to-Everything (V2X)After taking a break for a few weeks, I am excited to resume sharing selected academic papers from the latest cutting-edge research. These…Dec 3Dec 3
Selected Reading IoT andThe industry has been reshaped by the transition to the Internet of Things (IoT), and today, we actively consume services through…Aug 24Aug 24
Selected Reading: Malware Packing DetectionMalware is harmful software intentionally designed to damage or leak information on any system. It is usually hidden within an executable…Aug 5Aug 5
Selected Reading: Privacy-Enabled Blockchain ApplicationsA zero-knowledge (ZK) proof or protocol is a cryptographic technique where one party can verify another without revealing information. ZK…Jul 21Jul 21
Cyber Security Selected Reading: Homomorphic EncryptionClassic encryption schemes encrypt plain text with a key to obtain cipher text. The cipher text is then stored or transmitted and decrypted…Jul 7Jul 7
Signal Processing Selected Reading: Graph Signal Processing (GSP)Graph Signal Processing (GSP) is a mathematical framework that extends discrete signal processing (DSP) tools such as filtering and signal…Jun 9Jun 9
Edge Computing Selected Reading: MEC Task OffloadingCloud computing’s extensive data storage and processing capacities are designed to address the resource-intensive task requirements of…May 26May 26
Software-Defined Vehicular Networks Selected Reading: Digital Twin-Based SDVNInformation and Communication Technologies are transforming transportation systems through software-defined vehicles. Vehicles communicate…May 20May 20
Digital Twins Selected Reading: Predictive Modeling in Wind TurbinesDigital Twin (DT) is a technology that creates a virtual replica of physical entities and processes for real-time analysis. DT approach…May 12May 12
Cyber Security Selected Reading: Side Channel AttacksI have decided to start a microblog series featuring scientific papers I’ve read recently. These papers are connected to my current…May 5May 5