| Persistence of Backdoor-based Watermarks for Neural Networks: A Comprehensive Evaluation | Jan 6, 2025 | Cloud Computing | CodeCode Available | 0 |
| Combined Hyper-Extensible Extremely-Secured Zero-Trust CIAM-PAM architecture | Jan 3, 2025 | Cloud ComputingManagement | —Unverified | 0 |
| Deep Reinforcement Learning for Job Scheduling and Resource Management in Cloud Computing: An Algorithm-Level Review | Jan 2, 2025 | Cloud ComputingDeep Reinforcement Learning | —Unverified | 0 |
| Plug-and-Play Versatile Compressed Video Enhancement | Jan 1, 2025 | Cloud ComputingVideo Compression | —Unverified | 0 |
| Enhancing Wireless Sensor Network Security through Integration with the ServiceNow Cloud Platform | Dec 31, 2024 | Cloud ComputingManagement | —Unverified | 0 |
| Dynamic Scheduling Strategies for Resource Optimization in Computing Environments | Dec 23, 2024 | Cloud ComputingFairness | —Unverified | 0 |
| A Tutorial on Non-Terrestrial Networks: Towards Global and Ubiquitous 6G Connectivity | Dec 21, 2024 | Cloud ComputingDeep Reinforcement Learning | —Unverified | 0 |
| MAIDS: Malicious Agent Identification-based Data Security Model for Cloud Environments | Dec 19, 2024 | Cloud Computing | —Unverified | 0 |
| Latency Minimization for Movable Antennas-Enabled Relay-aided D2D Mobile Edge Computing Communication Systems | Dec 16, 2024 | Cloud ComputingEdge-computing | —Unverified | 0 |
| Cloud Platforms for Developing Generative AI Solutions: A Scoping Review of Tools and Services | Dec 8, 2024 | Cloud ComputingEdge-computing | —Unverified | 0 |