{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,20]],"date-time":"2025-11-20T19:00:10Z","timestamp":1763665210782,"version":"3.45.0"},"reference-count":41,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"23","license":[{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2025,12,1]]},"DOI":"10.1109\/jiot.2025.3615410","type":"journal-article","created":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T17:54:40Z","timestamp":1759168480000},"page":"51664-51676","source":"Crossref","is-referenced-by-count":2,"title":["LLM-Enabled In-Context Learning for Data Collection Scheduling in UAV-Assisted Sensor Networks"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8842-2616","authenticated-orcid":false,"given":"Yousef","family":"Emami","sequence":"first","affiliation":[{"name":"Real-Time and Embedded Computing Systems Research Centre (CISTER), Porto, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5511-4609","authenticated-orcid":false,"given":"Hao","family":"Zhou","sequence":"additional","affiliation":[{"name":"School of Computer Science, McGill University, Montreal, QC, Canada"}]},{"given":"Seyedsina","family":"Nabavirazavi","sequence":"additional","affiliation":[{"name":"Knight Foundation School of Computing and Information Sciences, Florida International University, Miami, FL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9544-3028","authenticated-orcid":false,"given":"Luis","family":"Almeida","sequence":"additional","affiliation":[{"name":"Faculdade de Engenharia, Universidade do Porto, Porto, Portugal"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCNT49239.2020.9225622"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/VTC2020-Spring48590.2020.9129495"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3110801"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2020.3039199"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICITIIT61487.2024.10580372"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SSRR50563.2020.9292613"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2023.3312221"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2022.3207346"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.002.2100681"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3365742"},{"key":"ref11","article-title":"Large language model (LLM)-enabled in-context learning for wireless network optimization: A case study of power control","author":"Zhou","year":"2024","journal-title":"arXiv:2408.00214"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2021.3049178"},{"key":"ref13","article-title":"Deep reinforcement learning for joint cruise control and intelligent data acquisition in UAVs-assisted sensor networks","author":"Emami","year":"2023","journal-title":"arXiv:2312.09953"},{"key":"ref14","article-title":"Large language models for wireless networks: An overview from the prompt engineering perspective","author":"Zhou","year":"2024","journal-title":"arXiv:2411.04136"},{"key":"ref15","article-title":"Jailbreak attacks and defenses against large language models: A survey","author":"Yi","year":"2024","journal-title":"arXiv:2407.04295"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2024.3497923"},{"key":"ref17","article-title":"CLONE: Customizing LLMs for efficient latency-aware inference at the edge","author":"Tian","year":"2025","journal-title":"arXiv:2506.02847"},{"key":"ref18","article-title":"Aero-LLM: A distributed framework for secure UAV communication and intelligent decision-making","author":"Dharmalingam","year":"2025","journal-title":"arXiv:2502.05220"},{"volume-title":"Gemini Nano: On-device Efficient Model","year":"2023","key":"ref19"},{"key":"ref20","article-title":"Large language model performance benchmarking on mobile platforms: A thorough evaluation","author":"Xiao","year":"2024","journal-title":"arXiv:2410.03613v1"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.3389\/frobt.2025.1518965"},{"issue":"3","key":"ref22","doi-asserted-by":"crossref","first-page":"61","DOI":"10.3390\/bdcc9030061","article-title":"Transitioning from TinyML to edge GenAI: A review","volume":"9","author":"Giorgetti","year":"2025","journal-title":"Big Data Cognit. Comput."},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2024.emnlp-main.64"},{"key":"ref24","article-title":"Pushing large language models to the 6G edge: Vision, challenges, and opportunities","author":"Lin","year":"2023","journal-title":"arXiv:2309.16739"},{"key":"ref25","article-title":"Generative AI for unmanned vehicle swarms: Challenges, applications and opportunities","author":"Liu","year":"2024","journal-title":"arXiv:2402.18062"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2025.103158"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/OJVT.2024.3446799"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM52923.2024.10901312"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM52923.2024.10901317"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3583740.3626809"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3439363"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2025.3576176"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TAES.2013.130074"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2945037"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2017.2688328"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2014.2342736"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2890999"},{"key":"ref38","article-title":"Survey of vulnerabilities in large language models revealed by adversarial attacks","author":"Shayegani","year":"2023","journal-title":"arXiv:2310.10844"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3712001"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2025.3527641"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.009.2300501"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6488907\/11261327\/11184156.pdf?arnumber=11184156","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,20]],"date-time":"2025-11-20T18:44:19Z","timestamp":1763664259000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11184156\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,1]]},"references-count":41,"journal-issue":{"issue":"23"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2025.3615410","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"type":"electronic","value":"2327-4662"},{"type":"electronic","value":"2372-2541"}],"subject":[],"published":{"date-parts":[[2025,12,1]]}}}