Pub Date : 2025-09-18DOI: 10.1109/JPROC.2025.3603823
{"title":"IEEE Membership","authors":"","doi":"10.1109/JPROC.2025.3603823","DOIUrl":"https://doi.org/10.1109/JPROC.2025.3603823","url":null,"abstract":"","PeriodicalId":20556,"journal":{"name":"Proceedings of the IEEE","volume":"113 5","pages":"C3-C3"},"PeriodicalIF":25.9,"publicationDate":"2025-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11169398","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145078589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-09-18DOI: 10.1109/jproc.2025.3603777
{"title":"Scanning the Issue","authors":"","doi":"10.1109/jproc.2025.3603777","DOIUrl":"https://doi.org/10.1109/jproc.2025.3603777","url":null,"abstract":"","PeriodicalId":20556,"journal":{"name":"Proceedings of the IEEE","volume":"4 1","pages":""},"PeriodicalIF":20.6,"publicationDate":"2025-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145083781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-09-12DOI: 10.1109/JPROC.2025.3605535
Maitreyi Ashok;Ruicong Chen;Taehoon Jeong;Anantha P. Chandrakasan;Hae-Seung Lee
Analog-to-digital converters (ADCs) are a standard building block of most Internet of Things (IoT) devices, used to convert between analog signals of the physical world and digital values for efficient storage and computation. While decades of research have explored methods to optimize the traditional power, performance, and area parameters of these circuits, a new requirement has emerged in the last five years for ADCs—security. Due to the deployment of these devices at the edge outside of a trusted computing base, there is a potential for various eavesdropping and tampering attacks. This can have a severe impact on the privacy and integrity of sensor data, which cannot be corrected for through the secure design of other blocks that follow the front end. In this article, we explore the recent work in ADC security and analyze what has been accomplished as well as what remains to be done for the successful deployment of secure ADCs in commercial systems.
{"title":"Protecting the Mixed-Signal Domain: Secure ADCs for Internet of Things Devices","authors":"Maitreyi Ashok;Ruicong Chen;Taehoon Jeong;Anantha P. Chandrakasan;Hae-Seung Lee","doi":"10.1109/JPROC.2025.3605535","DOIUrl":"10.1109/JPROC.2025.3605535","url":null,"abstract":"Analog-to-digital converters (ADCs) are a standard building block of most Internet of Things (IoT) devices, used to convert between analog signals of the physical world and digital values for efficient storage and computation. While decades of research have explored methods to optimize the traditional power, performance, and area parameters of these circuits, a new requirement has emerged in the last five years for ADCs—security. Due to the deployment of these devices at the edge outside of a trusted computing base, there is a potential for various eavesdropping and tampering attacks. This can have a severe impact on the privacy and integrity of sensor data, which cannot be corrected for through the secure design of other blocks that follow the front end. In this article, we explore the recent work in ADC security and analyze what has been accomplished as well as what remains to be done for the successful deployment of secure ADCs in commercial systems.","PeriodicalId":20556,"journal":{"name":"Proceedings of the IEEE","volume":"113 6","pages":"586-604"},"PeriodicalIF":25.9,"publicationDate":"2025-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145072994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-09-10DOI: 10.1109/JPROC.2025.3594513
{"title":"Future Special Issues/Special Sections of the Proceedings","authors":"","doi":"10.1109/JPROC.2025.3594513","DOIUrl":"https://doi.org/10.1109/JPROC.2025.3594513","url":null,"abstract":"","PeriodicalId":20556,"journal":{"name":"Proceedings of the IEEE","volume":"113 4","pages":"411-411"},"PeriodicalIF":25.9,"publicationDate":"2025-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11156164","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145027940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-09-10DOI: 10.1109/JPROC.2025.3603826
Summary form only: Abstracts of articles presented in this issue of the publication.
仅以摘要形式提供:本刊发表的文章摘要。
{"title":"Scanning the Issue","authors":"","doi":"10.1109/JPROC.2025.3603826","DOIUrl":"https://doi.org/10.1109/JPROC.2025.3603826","url":null,"abstract":"Summary form only: Abstracts of articles presented in this issue of the publication.","PeriodicalId":20556,"journal":{"name":"Proceedings of the IEEE","volume":"113 4","pages":"314-316"},"PeriodicalIF":25.9,"publicationDate":"2025-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11156181","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145028011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-09-10DOI: 10.1109/JPROC.2025.3594509
{"title":"Proceedings of the IEEE Publication Information","authors":"","doi":"10.1109/JPROC.2025.3594509","DOIUrl":"https://doi.org/10.1109/JPROC.2025.3594509","url":null,"abstract":"","PeriodicalId":20556,"journal":{"name":"Proceedings of the IEEE","volume":"113 4","pages":"C2-C2"},"PeriodicalIF":25.9,"publicationDate":"2025-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11156175","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145028015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-09-10DOI: 10.1109/JPROC.2025.3594515
{"title":"IEEE Membership","authors":"","doi":"10.1109/JPROC.2025.3594515","DOIUrl":"https://doi.org/10.1109/JPROC.2025.3594515","url":null,"abstract":"","PeriodicalId":20556,"journal":{"name":"Proceedings of the IEEE","volume":"113 4","pages":"C3-C3"},"PeriodicalIF":25.9,"publicationDate":"2025-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11156176","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145028007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-09-10DOI: 10.1109/JPROC.2025.3594517
{"title":"Proceedings of the IEEE: Stay Informed. Become Inspired.","authors":"","doi":"10.1109/JPROC.2025.3594517","DOIUrl":"https://doi.org/10.1109/JPROC.2025.3594517","url":null,"abstract":"","PeriodicalId":20556,"journal":{"name":"Proceedings of the IEEE","volume":"113 4","pages":"C4-C4"},"PeriodicalIF":25.9,"publicationDate":"2025-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11156169","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145027981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-09-10DOI: 10.1109/JPROC.2025.3604207
{"title":"IEEE Connects You to a Universe of Information","authors":"","doi":"10.1109/JPROC.2025.3604207","DOIUrl":"https://doi.org/10.1109/JPROC.2025.3604207","url":null,"abstract":"","PeriodicalId":20556,"journal":{"name":"Proceedings of the IEEE","volume":"113 4","pages":"412-412"},"PeriodicalIF":25.9,"publicationDate":"2025-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11156177","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145027979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-08-29DOI: 10.1109/JPROC.2025.3600903
Tao Huang;Jianan Liu;Xi Zhou;Dinh C. Nguyen;Mostafa Rahimi Azghadi;Yuxuan Xia;Qing-Long Han;Sumei Sun
Achieving fully autonomous driving with enhanced safety and efficiency relies on vehicle-to-everything (V2X) cooperative perception (CP), which enables vehicles to share perception data, thereby enhancing situational awareness and overcoming the limitations of the sensing ability of individual vehicles. V2X CP plays a crucial role in extending the perception range, increasing detection accuracy, and supporting more robust decision-making and control in complex environments. This article provides a comprehensive survey of recent developments in V2X CP, introducing mathematical models that characterize the perception process under different collaboration strategies. Key techniques for enabling reliable perception sharing, such as agent selection, data alignment, and feature fusion, are examined in detail. In addition, major challenges are discussed, including differences in agents and models, uncertainty in perception outputs, and the impact of communication constraints such as transmission delay and data loss. This article concludes by outlining promising research directions, including privacy-preserving artificial intelligence methods, collaborative intelligence, and integrated sensing frameworks to support future advancements in V2X CP.
{"title":"Vehicle-to-Everything Cooperative Perception for Autonomous Driving","authors":"Tao Huang;Jianan Liu;Xi Zhou;Dinh C. Nguyen;Mostafa Rahimi Azghadi;Yuxuan Xia;Qing-Long Han;Sumei Sun","doi":"10.1109/JPROC.2025.3600903","DOIUrl":"10.1109/JPROC.2025.3600903","url":null,"abstract":"Achieving fully autonomous driving with enhanced safety and efficiency relies on vehicle-to-everything (V2X) cooperative perception (CP), which enables vehicles to share perception data, thereby enhancing situational awareness and overcoming the limitations of the sensing ability of individual vehicles. V2X CP plays a crucial role in extending the perception range, increasing detection accuracy, and supporting more robust decision-making and control in complex environments. This article provides a comprehensive survey of recent developments in V2X CP, introducing mathematical models that characterize the perception process under different collaboration strategies. Key techniques for enabling reliable perception sharing, such as agent selection, data alignment, and feature fusion, are examined in detail. In addition, major challenges are discussed, including differences in agents and models, uncertainty in perception outputs, and the impact of communication constraints such as transmission delay and data loss. This article concludes by outlining promising research directions, including privacy-preserving artificial intelligence methods, collaborative intelligence, and integrated sensing frameworks to support future advancements in V2X CP.","PeriodicalId":20556,"journal":{"name":"Proceedings of the IEEE","volume":"113 5","pages":"443-477"},"PeriodicalIF":25.9,"publicationDate":"2025-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144919435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}