


default search action
IEEE Open Journal of the Computer Society, Volume 2
Volume 2, 2021
- Song Guo

:
EIC Editorial. 1-2 - Afshin Arefi

, Majid Khabbazian
:
Packet Loss Recovery in Broadcast for Real-Time Applications in Dense Wireless Networks. 3-13 - Samson Ho, Saleh A. Al-Jufout

, Khalil Dajani, Mohammad Mozumdar
:
A Novel Intrusion Detection Model for Detecting Known and Innovative Cyberattacks Using Convolutional Neural Network. 14-25 - Subramanian Ganesan

, Anand Sreekantan Thampy
, Nnamdi Valbosco Ugwuoke
, Baghwan Ramnani
:
Crypto Pharmacy - Digital Medicine: A Mobile Application Integrated With Hybrid Blockchain to Tackle the Issues in Pharma Supply Chain. 26-37 - Pengfei Huang, Chenghua Wang, Weiqiang Liu

, Fei Qiao
, Fabrizio Lombardi
:
A Hardware/Software Co-Design Methodology for Adaptive Approximate Computing in clustering and ANN Learning. 38-52 - Michael Conrad Meyer

, Yu Wang, Takahiro Watanabe
:
Real-Time Cost Minimization of Fog Computing in Mobile-Base-Station Networked Disaster Areas. 53-61 - Xianlong Zeng

, Simon M. Lin, Chang Liu
:
Multi-View Deep Learning Framework for Predicting Patient Expenditure in Healthcare. 62-71 - Quang Nhat Tran, Benjamin P. Turnbull

, Hao-Tian Wu
, A. J. S. de Silva, Katerina Kormusheva
, Jiankun Hu
:
A Survey on Privacy-Preserving Blockchain Systems (PPBS) and a Novel PPBS-Based Framework for Smart Agriculture. 72-84 - Zhaoyang Du

, Celimuge Wu
, Tsutomu Yoshinaga
, Xianfu Chen
, Xiaoyan Wang
, Kok-Lim Alvin Yau
, Yusheng Ji
:
A Routing Protocol for UAV-Assisted Vehicular Delay Tolerant Networks. 85-98 - Chao Qiu

, Xiaoxu Ren, Yifan Cao, Tianle Mai
:
Deep Reinforcement Learning Empowered Adaptivity for Future Blockchain Networks. 99-105 - Li Ding

, Jun Wu
, Xiaofei Zhang, Jianhua Li, Jin Ma:
Privacy Preserved Cyber-Physical Searching for Information-Centric Intelligent Agriculture. 106-116 - Justin C. Tullos

, Scott R. Graham
, Jeremy D. Jordan, Pranav R. Patel
:
SPARC: Statistical Performance Analysis With Relevance Conclusions. 117-129 - Bidi Ying

, Nada Radwan Mohsen, Amiya Nayak
:
Efficient Authentication Protocol for Continuous Monitoring in Medical Sensor Networks. 130-138 - Michael Lescisin

, Qusay H. Mahmoud
:
A Machine Learning Based Monitoring Framework for Side-Channel Information Leaks. 139-151 - Weiqi Fan, Qimei Cui

, Xiangjun Li, Xueqing Huang, Xiaofeng Tao
:
On Credibility-Based Service Function Chain Deployment. 152-163 - Claudia Antal

, Tudor Cioara
, Marcel Antal
, Ionut Anghel
:
Blockchain Platform For COVID-19 Vaccine Supply Management. 164-178 - Quang Nhat Tran, Benjamin P. Turnbull

, Jiankun Hu
:
Biometrics and Privacy-Preservation: How Do They Evolve? 179-191 - Liming Gao

, Celimuge Wu
, Tsutomu Yoshinaga
, Xianfu Chen
, Yusheng Ji
:
Multi-Channel Blockchain Scheme for Internet of Vehicles. 192-203 - Lu Liu, Sicong Zhou

, Huawei Huang
, Zibin Zheng
:
From Technology to Society: An Overview of Blockchain-Based DAO. 204-215 - Shunpei Yamaguchi

, Ritsuko Oshima
, Jun Oshima, Ryota Shiina, Takuya Fujihashi
, Shunsuke Saruwatari
, Takashi Watanabe
:
Speaker Identification for Business-Card-Type Sensors. 216-226 - Somali Chaterji

, Nathan DeLay, John Evans, Nathan Mosier
, Bernard Engel, Dennis Buckmaster, Michael Ladisch, Ranveer Chandra:
Lattice: A Vision for Machine Learning, Data Engineering, and Policy Considerations for Digital Agriculture at Scale. 227-240 - Placide Shabisha

, Chamara Sandeepa
, Charuka Moremada
, Nadeeka Dissanayaka
, Tharindu D. Gamage
, An Braeken
, Kris Steenhaut
, Madhusanka Liyanage
:
Security Enhanced Emergency Situation Detection System for Ambient Assisted Living. 241-259 - Mahzabeen Emu

, Salimur Choudhury
:
Ensemble Deep Learning Assisted VNF Deployment Strategy for Next-Generation IoT Services. 260-275 - Rui Hu, Yuanxiong Guo

, Yanmin Gong
:
Concentrated Differentially Private Federated Learning With Performance Analysis. 276-289 - Celimuge Wu

, Chunrong Peng, Zhaoyang Du
, Liming Gao
, Tsutomu Yoshinaga
, Yusheng Ji
:
Toward Agile Information and Communication Framework for the Post-COVID-19 Era. 290-299 - Yu Su

:
A Trust Based Scheme to Protect 5G UAV Communication Networks. 300-307 - Zhouyang Lin

, Kai Li, Yang Yang
, Fanglei Sun, Liantao Wu
, Panpan Shi, Song Ci, Yong Zuo
:
DRESIA: Deep Reinforcement Learning-Enabled Gray Box Approach for Large-Scale Dynamic Cyber-Twin System Simulation. 321-333 - Ousmane Zeba

, Kentaro Hayashi, Kazuhiro Kizaki, Shunsuke Saruwatari
, Takashi Watanabe
:
QuadScatter: Computational Efficiency in Simultaneous Transmissions for Large-Scale IoT Backscatter Networks. 334-345 - Sarah Shah

, Yasaman Amannejad
, Diwakar Krishnamurthy
, Mea Wang:
PERIDOT: Modeling Execution Time of Spark Applications. 346-359 - Guolong Chen, Liang Zhao

, Xianwei Li
, Fuqi Zhao, Xiaojian Zeng:
Optimal Resource Allocation for Multimedia Applications Offloading in Mobile Edge Computing. 360-369 - Xuefei Yin

, Yanming Zhu
, Jiankun Hu
:
A Survey on 2D and 3D Contactless Fingerprint Biometrics: A Taxonomy, Review, and Future Directions. 370-381 - Yan-Tsung Peng

, Sha-Wo Huang:
Image Impulse Noise Removal Using Cascaded Filtering Based on Overlapped Adaptive Gaussian Smoothing and Convolutional Refinement Networks. 382-392 - Fei Ge

, Liansheng Tan
, Wei Zhang, Ming Liu, Xun Gao
, Juan Luo
:
Link Scheduling and End-to-End Throughput Optimization in Wireless Multi-Hop Networks. 393-406 - Chonggao Sun

, Yonghong Chen
, Hui Tian
, Shuhong Wu
:
Covert Timing Channels Detection Based on Auxiliary Classifier Generative Adversarial Network. 407-418

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














