32 articles in this issue
Kunlin Liu, Ping Wang, Wenbo Zhou, Zhenyu Zhang, Yanhao Ge, Honggu Liu, Weiming Zhang and Nenghai Yu
Deepfake aims to swap a face of an image with someone else’s likeness in a reasonable manner. Existing methods usually perform deepfake frame by frame, thus ignoring video consistency and producing incoherent results. To address such a problem, we propose... see more
Dmitrii Gavra, Ksenia Namyatova and Lidia Vitkova
This paper examines the problem of social media special operations and especially induced support in social media during political election campaigns. The theoretical background of the paper is based on the study fake activity in social networks during pr... see more
Franco Bagnoli, Guido de Bonfioli Cavalcabo’, Banedetto Casu and Andrea Guazzini
We investigate the problem of the formation of communities of users that selectively exchange messages among them in a simulated environment. This closed community can be seen as the prototype of the bubble effect, i.e., the isolation of individuals from ... see more
Ivan Blekanov, Svetlana S. Bodrunova and Askar Akhmetov
The community-based structure of communication on social networking sites has long been a focus of scholarly attention. However, the problem of discovery and description of hidden communities, including defining the proper level of user aggregation, remai... see more
Jianhua Liu and Zibo Wu
The cloud-based Internet of Things (IoT-Cloud) combines the advantages of the IoT and cloud computing, which not only expands the scope of cloud computing but also enhances the data processing capability of the IoT. Users always seek affordable and effici... see more
Elisabeth Vogel, Zoya Dyka, Dan Klann and Peter Langendörfer
Resilience is a feature that is gaining more and more attention in computer science and computer engineering. However, the definition of resilience for the cyber landscape, especially embedded systems, is not yet clear. This paper discusses definitions pr... see more
Kiomi Matsumoto-Royo, Maria Soledad Ramírez-Montoya and Paulette Conget
Education 4.0 prepares new generations to develop the skills required to perform in a technological, dynamic, and unpredictable world. The main barrier to implementing Education 4.0 in schools is that teachers have not been trained for it. Given the advan... see more
Qian Qu, Ronghua Xu, Yu Chen, Erik Blasch and Alexander Aved
Blockchain technology has been recognized as a promising solution to enhance the security and privacy of Internet of Things (IoT) and Edge Computing scenarios. Taking advantage of the Proof-of-Work (PoW) consensus protocol, which solves a computation inte... see more
Jing Mei, Huahu Xu, Yang Li, Minjie Bian and Yuzhe Huang
RGB–IR cross modality person re-identification (RGB–IR Re-ID) is an important task for video surveillance in poorly illuminated or dark environments. In addition to the common challenge of Re-ID, the large cross-modality variations between RGB and IR imag... see more
Xingyuan Chen, Huahu Xu, Yang Li and Minjie Bian
Person re-identification (Re-ID) has attracted attention due to its wide range of applications. Most recent studies have focused on the extraction of deep features, while ignoring color features that can remain stable, even for illumination variations and... see more
Li Fan, Wei Li and Xiaohui Cui
Many deepfake-image forensic detectors have been proposed and improved due to the development of synthetic techniques. However, recent studies show that most of these detectors are not immune to adversarial example attacks. Therefore, understanding the im... see more
Lopamudra Hota, Biraja Prasad Nayak, Arun Kumar, G. G. Md. Nawaz Ali and Peter Han Joo Chong
Traffic density around the globe is increasing on a day-to-day basis, resulting in more accidents, congestion, and pollution. The dynamic vehicular environment induces challenges in designing an efficient and reliable protocol for communication. Timely de... see more
Andrea Guazzini, Maria Fiorenza, Gabriele Panerai and Mirko Duradoni
Together with vaccines, contact tracing systems (CTS) have proved to be one of the best strategies to deal with the current COVID-19 pandemic. However, the adoption of such systems has been quite limited in EU countries, and Italy was no exception. The pr... see more
Nur Arifin Akbar, Amgad Muneer, Narmine ElHakim and Suliman Mohamed Fati
Blockchain technology is a sustainable technology that offers a high level of security for many industrial applications. Blockchain has numerous benefits, such as decentralisation, immutability and tamper-proofing. Blockchain is composed of two processes,... see more
Qigang Zhu, Yifan Liu, Ming Liu, Shuaishuai Zhang, Guangyang Chen and Hao Meng
For large and medium-sized cities, the planning and development of urban road networks may not keep pace with the growth of urban vehicles, resulting in traffic congestion on urban roads during peak hours. Take Jinan, a mid-sized city in China’s Shandong ... see more
Michael Alicea and Izzat Alsmadi
Firewalls and network access controls play important roles in security control and protection. Those firewalls may create an incorrect sense or state of protection if they are improperly configured. One of the major configuration problems in firewalls is ... see more
Laura Icela González-Pérez, María Soledad Ramírez-Montoya and Francisco José García-Peñalvo
User experience with intuitive and flexible digital platforms can be enjoyable and satisfying. A strategy to deliver such an experience is to place the users at the center of the design process and analyze their beliefs and perceptions to add appropriate ... see more
Ryan Suttle, Scott Hogan, Rachel Aumaugher, Matthew Spradling, Zak Merrigan and Jeremy Straub
Fake news is prevalent in society. A variety of methods have been used in an attempt to mitigate the spread of misinformation and fake news ranging from using machine learning to detect fake news to paying fact checkers to manually fact check media to ens... see more
Pedro R. Miranda, Daniel Pestana, João D. Lopes, Rui Policarpo Duarte, Mário P. Véstias, Horácio C. Neto and José T. de Sousa
Object detection is an important task for many applications, like transportation, security, and medical applications. Many of these applications are needed on edge devices to make local decisions. Therefore, it is necessary to provide low-cost, fast solut... see more
Siti Dhalila Mohd Satar, Masnida Hussin, Zurina Mohd Hanapi and Mohamad Afendee Mohamed
Managing and controlling access to the tremendous data in Cloud storage is very challenging. Due to various entities engaged in the Cloud environment, there is a high possibility of data tampering. Cloud encryption is being employed to control data access... see more
Jesús Fernando Cevallos Moreno, Rebecca Sattler, Raúl P. Caulier Cisterna, Lorenzo Ricciardi Celsi, Aminael Sánchez Rodríguez and Massimo Mecella
Video delivery is exploiting 5G networks to enable higher server consolidation and deployment flexibility. Performance optimization is also a key target in such network systems. We present a multi-objective optimization framework for service function chai... see more
Ghazal Faraj and András Micsik
In order to unify access to multiple heterogeneous sources of cultural heritage data, many datasets were mapped to the CIDOC-CRM ontology. CIDOC-CRM provides a formal structure and definitions for most cultural heritage concepts and their relationships. T... see more
Louiza Hamada, Pascal Lorenz and Marc Gilg
Although visible light communication (VLC) channels are more secure than radio frequency channels, the broadcast nature of VLC links renders them open to eavesdropping. As a result, VLC networks must provide security in order to safeguard the user’s data ... see more
Sevgi Arca and Rattikorn Hewett
Advancements in smart technology, wearable and mobile devices, and Internet of Things, have made smart health an integral part of modern living to better individual healthcare and well-being. By enhancing self-monitoring, data collection and sharing among... see more
Seid Muhie Yimam, Abinew Ali Ayele, Gopalakrishnan Venkatesh, Ibrahim Gashaw and Chris Biemann
The availability of different pre-trained semantic models has enabled the quick development of machine learning components for downstream applications. However, even if texts are abundant for low-resource languages, there are very few semantic models publ... see more
Malik Qasaimeh, Raad S. Al-Qassas and Mohammad Ababneh
IoT devices include RFID tags, microprocessors, sensors, readers, and actuators. Their main characteristics are their limited resources and computing capabilities, which pose critical challenges to the reliability and security of their applications. Encry... see more
Andrii Shalaginov and Muhammad Ajmal Azad
In recent years, the Internet of Things (IoT) devices have become an inseparable part of our lives. With the growing demand for Smart Applications, it becomes clear that IoT will bring regular automation and intelligent sensing to a new level thus improvi... see more
Artur Felipe da Silva Veloso, José Valdemir Reis Júnior, Ricardo de Andrade Lira Rabelo and Jocines Dela-flora Silveira
Seeking to solve problems in the power electric system (PES) related to exacerbated and uncontrolled energy consumption by final consumers such as residences, condominiums, public buildings and industries, electric power companies (EPC) are increasingly s... see more
Rhodney Simões, Kelvin Dias and Ricardo Martins
The expected huge amount of connected cars and applications with varying Quality of Service (QoS) demands still depend on agile/flexible networking infrastructure to deal with dynamic service requests to the control plane, which may become a bottleneck fo... see more
Manickam Murugappan, John Victor Joshua Thomas, Ugo Fiore, Yesudas Bevish Jinila and Subhashini Radhakrishnan
Theodoros Oikonomidis, Konstantinos Fouskas and Maro Vlachopoulou
The spread of coronavirus disease (COVID-19) has triggered a series of responses worldwide ranging from traveling restrictions and shelter-in-place orders to lockdowns, contact tracing, social distancing, and other mitigation measures. To assist with cont... see more
Yun Peng and Jianmei Wang
This study aims to explore the time series context and sentiment polarity features of rumors’ life cycles, and how to use them to optimize the CNN model parameters and improve the classification effect. The proposed model is a convolutional neural network... see more