{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,8]],"date-time":"2026-05-08T07:19:29Z","timestamp":1778224769770,"version":"3.51.4"},"reference-count":193,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Commun. Surv. Tutorials"],"published-print":{"date-parts":[[2026]]},"DOI":"10.1109\/comst.2025.3564333","type":"journal-article","created":{"date-parts":[[2025,4,25]],"date-time":"2025-04-25T13:43:34Z","timestamp":1745588614000},"page":"527-566","source":"Crossref","is-referenced-by-count":55,"title":["A Survey on Large Language Models for Communication, Network, and Service Management: Application Insights, Challenges, and Future Directions"],"prefix":"10.1109","volume":"28","author":[{"given":"Gordon Owusu","family":"Boateng","sequence":"first","affiliation":[{"name":"Department of Computer Science, KU 6G Research Center, Khalifa University, Abu Dhabi, UAE"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6925-1006","authenticated-orcid":false,"given":"Hani","family":"Sami","sequence":"additional","affiliation":[{"name":"Department of Software and IT Engineering, Ecole de Technologie Superieure, Montreal, QC, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9275-2677","authenticated-orcid":false,"given":"Ahmed","family":"Alagha","sequence":"additional","affiliation":[{"name":"Concordia Institute for Information Systems Engineering, Concordia University, Montreal, QC, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-5187-0810","authenticated-orcid":false,"given":"Hanae","family":"Elmekki","sequence":"additional","affiliation":[{"name":"Concordia Institute for Information Systems Engineering, Concordia University, Montreal, QC, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0283-9913","authenticated-orcid":false,"given":"Ahmad","family":"Hammoud","sequence":"additional","affiliation":[{"name":"Department of CSM, Artificial Intelligence and Cyber Systems Research Center, Lebanese American University, Beirut, Lebanon"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6915-3759","authenticated-orcid":false,"given":"Rabeb","family":"Mizouni","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Center of Cyber-Physical Systems, Khalifa University, Abu Dhabi, UAE"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9434-5322","authenticated-orcid":false,"given":"Azzam","family":"Mourad","sequence":"additional","affiliation":[{"name":"Department of Computer Science, KU 6G Research Center, Khalifa University, Abu Dhabi, UAE"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9574-5384","authenticated-orcid":false,"given":"Hadi","family":"Otrok","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Center of Cyber-Physical Systems, Khalifa University, Abu Dhabi, UAE"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3136-4849","authenticated-orcid":false,"given":"Jamal","family":"Bentahar","sequence":"additional","affiliation":[{"name":"Department of Computer Science, KU 6G Research Center, Khalifa University, Abu Dhabi, UAE"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4649-9399","authenticated-orcid":false,"given":"Sami","family":"Muhaidat","sequence":"additional","affiliation":[{"name":"Department of Computer and Information Engineering, KU 6G Research Center, Khalifa University, Abu Dhabi, UAE"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2264-8265","authenticated-orcid":false,"given":"Chamseddine","family":"Talhi","sequence":"additional","affiliation":[{"name":"Department of Software and IT Engineering, Ecole de Technologie Superieure, Montreal, QC, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7259-0570","authenticated-orcid":false,"given":"Zbigniew","family":"Dziong","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, Ecole de Technologie Superieure, Montreal, QC, Canada"}]},{"given":"Mohsen","family":"Guizani","sequence":"additional","affiliation":[{"name":"Department of ML, Mohamed Bin Zayed University of Artificial Intelligence, Abu Dhabi, UAE"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2018.2864423"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2016.7462480"},{"key":"ref3","volume-title":"5G Networks: Fundamental Requirements, Enabling Technologies, and Operations Management","author":"Al-Dulaimi","year":"2018"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3182988"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.2300824"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3205341"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2021.05.021"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.011.2000505"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2024.3390613"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1800084"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2881008"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2016.2551747"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2019.1800624"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/UBMK50275.2020.9219456"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3281348"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2012.6503647"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2532458"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3077895"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700560"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3015616"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-019-03032-z"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2019.2918005"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2022.3172658"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ASPDAC.2018.8297294"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2021.3123165"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3365742"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICCA59364.2023.10401518"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/WACVW60836.2024.00106"},{"key":"ref29","article-title":"XLM for autonomous driving systems: A comprehensive review","author":"Fourati","year":"2024","journal-title":"arXiv:2409.10484"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/OJVT.2024.3446799"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2024.3522103"},{"key":"ref32","article-title":"Integration of mixture of experts and multimodal generative AI in Internet of Vehicles: A survey","author":"Xu","year":"2024","journal-title":"arXiv:2404.16356"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2024.3465447"},{"key":"ref34","article-title":"A survey of large language models","author":"Zhao","year":"2024","journal-title":"arXiv:2303.18223"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2024.3420120"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/IV55156.2024.10588835"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1186\/s13643-021-01626-4"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3641289"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3701716.3715528"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v38i17.29823"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-024-60210-7"},{"key":"ref42","first-page":"38","article-title":"LLM-based control code generation using image recognition","volume-title":"Proc. 1st Int. Workshop Large Lang. Models Code","author":"Koziolek"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-024-02214-4"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.03762"},{"key":"ref45","article-title":"GPT-4 technical report","volume-title":"arXiv:2303.08774","author":"Achiam","year":"2023"},{"key":"ref46","article-title":"Mistral 7B","author":"Jiang","year":"2023","journal-title":"arXiv:2310.06825"},{"key":"ref47","article-title":"The LLAMA 3 herd of models","author":"Dubey","year":"2024","journal-title":"arXiv:2407.21783"},{"key":"ref48","article-title":"Using DeepSpeed and megatron to train megatron-turing NLG 530B","author":"Smith","year":"2022","journal-title":"arXiv:2201.11990"},{"key":"ref49","article-title":"Gemini: A family of highly capable multimodal models","author":"Team","year":"2023","journal-title":"arXiv:2312.11805"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/tmlcn.2025.3593184"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/LRA.2024.3440097"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.7759\/cureus.40895"},{"key":"ref53","article-title":"BloombergGPT: A large language model for finance","author":"Wu","year":"2023","journal-title":"arXiv:2303.17564"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.23919\/JCIN.2024.10582827"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2024.3435752"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1177\/0278364913491297"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01164"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2024.3421306"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2024.3376419"},{"key":"ref60","article-title":"Amuro & char: Analyzing the relationship between pre-training and fine-tuning of large language models","author":"Sun","year":"2024","journal-title":"arXiv:2408.06663"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-6576-5_6"},{"key":"ref62","first-page":"233","article-title":"Web text corpus for natural language processing","volume-title":"Proc. 11th Conf. Eur. Assoc. Comput. Linguist.","author":"Liu"},{"key":"ref63","article-title":"BERT: Pre-training of deep bidirectional transformers for language understanding","author":"Devlin","year":"2018","journal-title":"arXiv:1810.04805"},{"key":"ref64","article-title":"Megatron-LM: Training multi-billion parameter language models using model parallelism","author":"Shoeybi","year":"2019","journal-title":"arXiv:1909.08053"},{"key":"ref65","first-page":"6543","article-title":"TeraPipe: Token-level pipeline parallelism for training large-scale language models","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Li"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1145\/3545008.3545087"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/SC41405.2020.00024"},{"key":"ref68","article-title":"MistralBSM: Leveraging mistral-7B for vehicular networks Misbehavior detection","author":"Hamhoum","year":"2024","journal-title":"arXiv:2407.18462"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/tiv.2024.3418522"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1145\/3651890.3672268"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/ICCC62479.2024.10681712"},{"key":"ref72","article-title":"Supervised fine-tuning in turn improves visual foundation models","author":"Jiang","year":"2024","journal-title":"arXiv:2401.10222"},{"key":"ref73","first-page":"33816","article-title":"POUF: Prompt-oriented unsupervised fine-tuning for large pre-trained models","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Tanwisuth"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00780"},{"key":"ref75","article-title":"Parameter-efficient fine-tuning for large models: A comprehensive survey","author":"Han","year":"2024","journal-title":"arXiv:2403.14608"},{"key":"ref76","article-title":"Dense reward for free in reinforcement learning from human feedback","author":"Chan","year":"2024","journal-title":"arXiv:2402.00782"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/CloudIntelligence52565.2021.00013"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/NetSoft60951.2024.10588943"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1145\/3663529.3663861"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.23919\/CNSM59352.2023.10327837"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/mcom.001.2400368"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1016\/j.trc.2025.105457"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE48619.2023.00149"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1145\/3603287.3651205"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/VTC2024-Fall63153.2024.10757657"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.016.2300600"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2024.3395748"},{"key":"ref88","article-title":"Aladdin: Joint placement and scaling for SLO-aware LLM serving","author":"Nie","year":"2024","journal-title":"arXiv:2405.06856"},{"key":"ref89","article-title":"Large language models meet network slicing management and orchestration","author":"Dandoush","year":"2024","journal-title":"arXiv:2403.13721"},{"key":"ref90","article-title":"LanguageMPC: Large language models as decision makers for autonomous driving","author":"Sha","year":"2023","journal-title":"arXiv:2310.03026"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/CNS62487.2024.10735607"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM52923.2024.10901312"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2024.103645"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM52923.2024.10901317"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/MeditCom61057.2024.10621076"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS59830.2024.10575237"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/NetSoft60951.2024.10588879"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/NetSoft60951.2024.10588924"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/DRCN60692.2024.10539172"},{"key":"ref100","article-title":"Large language models for base station siting: Intelligent deployment based on prompt or agent","author":"Wang","year":"2024","journal-title":"arXiv:2408.03631"},{"key":"ref101","article-title":"Tele-LLMs: A series of specialized large language models for telecommunications","author":"Maatouk","year":"2024","journal-title":"arXiv:2409.05314"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/NetSoft60951.2024.10588921"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC61514.2024.10592370"},{"key":"ref104","article-title":"Large language model (LLM)-enabled in-context learning for wireless network optimization: A case study of power control","author":"Zhou","year":"2024","journal-title":"arXiv:2408.00214"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2024.3384013"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3198656"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3089688"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3129079"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/IV55156.2024.10588373"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA57147.2024.10610578"},{"key":"ref111","article-title":"SecureBERT and LLAMA 2 empowered control area network intrusion detection and classification","author":"Li","year":"2023","journal-title":"arXiv:2311.12074"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA55696.2022.00048"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-84186-7_31"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/AICCSA56895.2022.10017800"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2019.100198"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3110524"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2024.3402366"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.05.041"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2024.3461855"},{"key":"ref121","article-title":"QWEN2 technical report","volume-title":"arXiv:2407.10671","author":"Yang","year":"2024"},{"key":"ref122","volume-title":"CICIDS 2018 dataset","author":"for Cybersecurity","year":"2024"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/ICC40277.2020.9149132"},{"key":"ref124","article-title":"Self-refined generative foundation models for wireless traffic prediction","author":"Hu","year":"2024","journal-title":"arXiv:2408.10390"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.004.2200723"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.006.2400132"},{"key":"ref127","article-title":"Multi-attribute auction-based resource allocation for twins migration in vehicular metaverses: A GPT-based DRL approach","author":"Tong","year":"2024","journal-title":"arXiv:2406.05418"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1109\/lwc.2025.3539638"},{"key":"ref129","article-title":"Large language model (LLM)-enabled graphs in dynamic networking","author":"Sun","year":"2024","journal-title":"arXiv:2407.20840"},{"key":"ref130","volume-title":"Multi-UAV placement for integrated access and Backhauling using LLM-driven optimization","author":"Wang","year":"2023"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/lwc.2025.3529082"},{"key":"ref132","article-title":"BERTScore: Evaluating text generation with BERT","author":"Zhang","year":"2020","journal-title":"arXiv:1904.09675"},{"key":"ref133","first-page":"28","article-title":"NUBIA: Neural based interchangeability assessor for text generation","volume-title":"Proc. 1st Workshop Eval. NLG Eval.","author":"Kane"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1145\/3663529.3663858"},{"key":"ref135","article-title":"On the design and analysis of LLM-based algorithms","author":"Chen","year":"2024","journal-title":"arXiv:2407.14788"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1145\/3663529.3663841"},{"key":"ref137","first-page":"1","article-title":"ReAct: Synergizing reasoning and acting in language models","volume-title":"Proc. 11th Int. Conf. Learn. Rep.","author":"Yao"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1145\/3627703.3629553"},{"issue":"1","key":"ref139","first-page":"1","article-title":"Leveraging large language models for intelligent cloud network management","volume":"1","author":"Nunes","year":"2024","journal-title":"MZ J. Artif. Intell."},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1145\/3663529.3663826"},{"issue":"4","key":"ref141","first-page":"1","article-title":"Leveraging LLM for zero-day exploit detection in cloud networks","volume":"1","author":"Patil","year":"2024","journal-title":"Asian Amer. Res. Lett. J."},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMWKSHPS61880.2024.10620804"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2022.3215919"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2024.3392642"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN59985.2024.10572160"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1145\/3626111.3628176"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1145\/3292674"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2019.05.002"},{"key":"ref149","article-title":"Hackphyr: A local fine-tuned LLM agent for network security environments","author":"Rigaki","year":"2024","journal-title":"arXiv:2409.11276"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2019.2963643"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2021.3075988"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3066625"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1145\/3660605.3660941"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1145\/3281010"},{"issue":"1","key":"ref155","first-page":"1","article-title":"Adaptive load balancing in cloud networks using large language models","volume":"6","author":"McAuley","year":"2023","journal-title":"Adv. Comput. Sci."},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-024-69474-5"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2018.12.004"},{"key":"ref158","article-title":"A survey of using large language models for generating infrastructure as code","author":"Srivatsa","year":"2024","journal-title":"arXiv:2404.00227"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1109\/SecDev61143.2024.00008"},{"key":"ref160","first-page":"200","article-title":"ADARMA auto-detection and auto-remediation of microservice anomalies by leveraging large language models","volume-title":"Proc. 33rd Annu. Int. Conf. Comput. Sci. Softw. Eng.","author":"Sarda"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1109\/ISQED60706.2024.10528736"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC57260.2024.10571127"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2024.findings-acl.204"},{"key":"ref164","article-title":"VELO: A vector database-assisted cloud-edge collaborative LLM QoS optimization framework","author":"Yao","year":"2024","journal-title":"arXiv:2406.13399"},{"key":"ref165","article-title":"EdgeShard: Efficient LLM inference via collaborative edge computing","author":"Zhang","year":"2024","journal-title":"arXiv:2405.14371"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM52923.2024.10901542"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMWKSHPS61880.2024.10620716"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1109\/NetSoft60951.2024.10588881"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.13052\/jwe1540-9589.2263"},{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.3390\/sym16111470"},{"key":"ref171","article-title":"Characterizing disparity between edge models and high-accuracy base models for vision tasks","author":"Wang","year":"2024","journal-title":"arXiv:2407.10016"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1145\/3649329.3658473"},{"key":"ref173","article-title":"LLM-based knowledge pruning for time series data analytics on edge-computing devices","author":"Jin","year":"2024","journal-title":"arXiv:2406.08765"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1016\/j.smhl.2025.100577"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC61105.2024.00206"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMWKSHPS61880.2024.10620727"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.1109\/VTC2024-Spring62846.2024.10683673"},{"key":"ref178","doi-asserted-by":"crossref","DOI":"10.20944\/preprints202405.1169.v1","volume-title":"Application of open-source large language model (LLM) for simulation of a vulnerable IoT system and cybersecurity best practices assistance","author":"Yosifova","year":"2024"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.1016\/j.jclepro.2024.142272"},{"key":"ref180","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS62655.2024.00099"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2024.3415661"},{"key":"ref182","doi-asserted-by":"publisher","DOI":"10.1109\/ICAIRC64177.2024.10899941"},{"key":"ref183","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v38i17.29860"},{"key":"ref184","article-title":"Pathway to secure and trustworthy 6G for LLMs: Attacks, defense, and opportunities","author":"Khowaja","year":"2024","journal-title":"arXiv:2408.00722"},{"key":"ref185","doi-asserted-by":"publisher","DOI":"10.55662\/JST.2023.4605"},{"key":"ref186","article-title":"Configurable foundation models: Building LLMs from a modular perspective","author":"Xiao","year":"2024","journal-title":"arXiv:2409.02877"},{"key":"ref187","doi-asserted-by":"crossref","DOI":"10.21203\/rs.3.rs-4328966\/v1","volume-title":"Cross-domain knowledge transfer without retraining to facilitating seamless knowledge application in large language models","author":"Kim","year":"2024"},{"key":"ref188","article-title":"EdgeQAT: Entropy and distribution guided Quantization-aware training for the acceleration of lightweight LLMs on the edge","author":"Shen","year":"2024","journal-title":"arXiv:2402.10787"},{"key":"ref189","article-title":"HOBBIT: A mixed precision expert offloading system for fast MoE inference","author":"Tang","year":"2024","journal-title":"arXiv:2411.01433"},{"key":"ref190","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-68031-1_6"},{"key":"ref191","article-title":"Introducing a new hyper-parameter for RAG: Context window utilization","author":"Juvekar","year":"2024","journal-title":"arXiv:2407.19794"},{"key":"ref192","article-title":"LongRAG: Enhancing retrieval-augmented generation with long-context LLMs","author":"Jiang","year":"2024","journal-title":"arXiv:2406.15319"},{"key":"ref193","article-title":"Meta-chunking: Learning efficient text segmentation via logical perception","author":"Zhao","year":"2024","journal-title":"arXiv:2410.12788"}],"container-title":["IEEE Communications Surveys &amp; Tutorials"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/9739\/11321210\/10976701.pdf?arnumber=10976701","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T06:10:47Z","timestamp":1769494247000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10976701\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":193,"URL":"https:\/\/doi.org\/10.1109\/comst.2025.3564333","relation":{},"ISSN":["1553-877X","2373-745X"],"issn-type":[{"value":"1553-877X","type":"electronic"},{"value":"2373-745X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]}}}