


default search action
ACM Transactions on Internet Technology, Volume 26
Volume 26, Number 1, February 2026
Special Issue on Reliable Infrastructure and Edge Analytics for IoT, Edited by Wenqi Wei, Balaji Palanisamy, and Jun Wang
- Wenqi Wei

, Balaji Palanisamy
, Jun Wang
:
Introduction to the Special Issue on Reliable Infrastructure and Edge Analytics for IoT. 1:1-1:2 - Yan Wang

, Yubin He
, Gang Liu
, Keqin Li
:
Cost-Optimized Periodic DAG-Structured Task Offloading in Multi-User MEC Systems Using Reinforcement Learning. 2:1-2:27 - Shengheng Liu

, Ningning Fu
, Zhonghao Zhang
, Yongming Huang
, Tony Q. S. Quek:
Integrated User Scheduling and Beam Steering in Over-the-Air Federated Learning for Mobile IoT. 3:1-3:23 - Zimeng Fan

, Min Peng
:
AGF: Adaptive GNN Framework via Subgraph and Model Partitioning for Edge Analysis. 4:1-4:30 - Wangbo Shen

, Weiwei Lin
, Tiansheng Huang
, Xinyi Hu
, Mian Guo
, Haijie Wu
:
BlockEdge: A Hybrid Blockchain Framework for Secure and Efficient Collaboration in EEC Environments. 5:1-5:29 - Tre' R. Jeter

, Truc D. T. Nguyen
, Raed Alharbi
, Jung Taek Seo
, My T. Thai
:
Securing Federated Learning Against Active Reconstruction Attacks. 6:1-6:27 - Berkay Kemal Balioglu

, Mehmet Emre Gürsoy
:
Budget Inference Attacks and Countermeasures in Locally Differentially Private Data Collection. 7:1-7:32 - Jiayuan Huang

, Mingzhe Chen
, Yuchen Liu
:
Achieving Resilient and Self-Adaptive Topology Configuration in 3D UAV Networks. 8:1-8:30 - Luis Miguel García-Sáez

, Sergio Ruiz-Villafranca
, José Roldán Gómez
, Javier Carrillo Mondéjar
, José Luis Martínez
:
Poisoning-Resilient Federated Learning for MEC-IoT Environments Using Blockchain. 9:1-9:30 - M. Kokila

, Srinivasa Reddy Konda
:
DeepSDN: Deep Learning Based Software Defined Network Model for Cyberthreat Detection in IoT Network. 10:1-10:29 - Sihao Hu

, Tiansheng Huang
, Gaowen Liu
, Ramana Kompella
, Ling Liu
:
PokéLLMon: A Grounding and Reasoning Benchmark for Large Language Models in Pokémon Battles. 11:1-11:23 - Xiupu Lang

, Lin Sun
, Peiqi Huang
, Jinming Liu
, Boming Zhu
, Xiaojian Gao
, Lin Gui
, Haopeng Chen
:
Incentivizing Cooperation for Handover Strategies in LEO Constellations via Fairness-guided MARL. 12:1-12:30 - Marco Barletta

, Marcello Cinque
, Luigi De Simone
:
SLO-aware Prioritization of Orchestration Times for Containerized Services. 13:1-13:29 - Simone Gazza

, Roberto Amadini
, Antonio Brogi
, Andrea D'Iapico
, Stefano Forti
, Saverio Giallorenzo
, Pierluigi Plebani
, Francisco Ponce
, Jacopo Soldani
, Monica Vitali
, Gianluigi Zavattaro
:
A Constraint-Based Approach to Optimise QoS- and Energy-Aware Cloud-Edge Application Deployments. 14:1-14:30 - Christian Rondanini

, Barbara Carminati
, Elena Ferrari
, Ashish Kundu
, Antonio Gaudiano
:
Malware Detection at the Edge with Lightweight LLMs: A Performance Evaluation. 15:1-15:24 - Hongliang Sun

, Xiaofeng Bi
, Zhiying Tu
, Bohai Zhao
, Kai Zhang
, Dianhui Chu
, Xiaofei Xu
:
Enhancing Privacy-Preserving Knowledge Graph Embeddings with Federated Learning for IoT Services. 16:1-16:24

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














