


default search action
IEEE Open Journal of the Computer Society, Volume 6
Volume 6, 2025
- Vincenzo Piuri

:
New Incoming EIC Editorial. 2-3 - Prabadevi Boopathy

, Natarajan Deepa
, Praveen Kumar Reddy Maddikunta
, Nancy Victor
, Thippa Reddy Gadekallu
, Gokul Yenduri
, Wei Wang
, Quoc-Viet Pham
, Thien Huynh-The
, Madhusanka Liyanage
:
The Metaverse for Industry 5.0 in NextG Communications: Potential Applications and Future Challenges. 4-24 - Hrishikesh Joshi

:
Emerging Technologies Driving Zero Trust Maturity Across Industries. 25-36 - Xiangyi Meng

, Yuefeng Du
, Cong Wang
:
ECMO: An Efficient and Confidential Outsourcing Protocol for Medical Data. 37-48 - Adeel Ashraf Cheema

, Muhammad Shahzad Sarfraz
, Usman Habib
, Qamar Uz Zaman
, Ekkarat Boonchieng
:
CD-LLMCARS: Cross Domain Fine-Tuned Large Language Model for Context-Aware Recommender Systems. 49-59 - Li Kang

, Chuanghong Zhao
, Jianjun Huang
:
Object Re-Identification Based on Federated Incremental Subgradient Proximal Optimization. 60-71 - Marta Rey-Paredes

, Carlos J. Pérez
, Alfonso Mateos Caballero
:
Time Series Classification of Raw Voice Waveforms for Parkinson's Disease Detection Using Generative Adversarial Network-Driven Data Augmentation. 72-84 - Haoxuan Liu

, Vasu Singh
, Michal Filipiuk
, Siva Kumar Sastry Hari
:
ALBERTA: ALgorithm-Based Error Resilience in Transformer Architectures. 85-96 - Hussien AbdelRaouf

, Mostafa M. Fouda
, Mohamed I. Ibrahem
:
Revolutionizing User Authentication Exploiting Explainable AI and CTGAN-Based Keystroke Dynamics. 97-108 - Yazan Dayoub

, Andrey V. Savchenko
, Ilya Makarov
:
Boosting Depth Estimation for Self-Driving in a Self-Supervised Framework via Improved Pose Network. 109-118 - Mahzabeen Emu

, Taufiq Rahman
, Salimur Choudhury
, Kai Salomaa
:
Quantum Long Short-Term Memory-Assisted Optimization for Efficient Vehicle Platooning in Connected and Autonomous Systems. 119-128 - Jungpil Shin

, Abu Saleh Musa Miah
, Yuta Kaneko
, Najmul Hassan
, Hyoun-Sup Lee, Si-Woong Jang
:
Multimodal Attention-Enhanced Feature Fusion-Based Weakly Supervised Anomaly Violence Detection. 129-140 - Xinguang Zhang

, Shiyang Chen, Zhouhang Shao, Yongjie Niu
, Li Fan:
Enhanced Lithographic Hotspot Detection via Multi-Task Deep Learning With Synthetic Pattern Generation. 140-151 - Luigi Serreli

, Claudio Marche
, Michele Nitti
:
Reducing Data Volume in News Topic Classification: Deep Learning Framework and Dataset. 152-163 - Pedro Conde

, Rui L. Lopes
, Cristiano Premebida
:
Improving Accuracy and Calibration of Deep Image Classifiers With Agreement-Driven Dynamic Ensemble. 164-175 - Xu Wang

, Qisheng Xu
, Kele Xu
, Ting Yu
, Bo Ding
, Dawei Feng
, Yong Dou
:
Large Pretrained Foundation Model for Key Performance Indicator Multivariate Time Series Anomaly Detection. 176-187 - Bivin Pradeep

, Parag Kulkarni
, Farman Ullah
, Abderrahmane Lakas
:
Energy Use and Demand Prediction Using Time-Series Deep Learning Forecasting Techniques: Application for a University Campus. 189-198 - Aleksandar Jevremovic

, Zona Kostic
, Ivan Chorbev
, Dragan Perakovic
, Andrii Shalaginov, Ivan Cvitic:
Energy Efficiency of Kernel and User Space Level VPN Solutions in AIoT Networks. 199-210 - Alain Hadges

, Srikar Bellur:
Statistical Validity of Neural-Net Benchmarks. 211-222 - Shadi Jaradat

, Mohammed Elhenawy
, Huthaifa I. Ashqar, Alexander Paz
, Richi Nayak
:
Leveraging Deep Learning and Multimodal Large Language Models for Near-Miss Detection Using Crowdsourced Videos. 223-235 - Mohammad Hassan Adeli

, Dariush Abbasi-Moghadam
, Hossein Fotouhi
, Seyed Mohammad Razavizadeh
:
Optimizing Energy Efficiency in UPA-Assisted SWIPT Massive MIMO Systems Over Rician Fading Channels. 236-247 - Abdessamad Benlahbib

, Achraf Boumhidi
, Anass Fahfouh
, Hamza Alami
:
Comparative Analysis of Traditional and Modern NLP Techniques on the CoLA Dataset: From POS Tagging to Large Language Models. 248-260 - Lerina Aversano, Martina Iammarino

, Antonella Madau
, Giuseppe Pirlo
, Gianfranco Semeraro
:
What Time Is It? Finding Which Temporal Features is More Useful for Next Activity Prediction. 261-271 - Yi Xu

, Zhigang Chen
, Ming Zhao
, Fengxiao Tang
, Yangfan Li
, Jiaqi Liu
, Nei Kato
:
UVtrack: Multi-Modal Indoor Seamless Localization Using Ultra-Wideband Communication and Vision Sensors. 272-281 - Shuo Pei

, Jiajia Wang
, Yunlong Yang, Anyang Dong
, Bingqi Guo, Junlong Guo
, Yufeng Yao
:
A Human-Centered Kinematics Design Optimization of Upper Limb Rehabilitation Exoskeleton Based on Configuration Manifold. 282-293 - Xin Yuan

, Chenhui Wang, Xiaohong Chen, Mingxuan Wang, Ning Li
, Changli Yu
:
IGFU: A Hybrid Underwater Image Enhancement Approach Combining Adaptive GWA, FFA-Net With USM. 294-306 - Shreyan Prakash

, Raj Bhattacherjee
, Sainath Bitragunta
, Ashutosh Bhatia
, Kamlesh Tiwari
:
Quantum Computing-Accelerated Kalman Filtering for Satellite Clusters: Algorithms and Comparative Analysis. 307-316 - Rola Abdallah

, Mohamed Atef
, Nasir Saeed
:
Hybrid POF-VLC Systems: Recent Advances, Challenges, Opportunities, and Future Directions. 317-335 - Francesco Castro

, Donato Impedovo
, Giuseppe Pirlo
:
An Efficient and Privacy-Preserving Federated Learning Approach Based on Homomorphic Encryption. 336-347 - Aliya Tabassum

, Ezieddin Elmahjub
, Aasim I. Padela
, Andrej Zwitter
, Junaid Qadir
:
Generative AI and the Metaverse: A Scoping Review of Ethical and Legal Challenges. 348-359 - Farid Binbeshr

, Muhammad Imam
, Mustafa Ghaleb
, Mosab Hamdan
, Mussadiq Abdul Rahim, Mohammad Hammoudeh
:
The Rise of Cognitive SOCs: A Systematic Literature Review on AI Approaches. 360-379 - Md Al Rafi

, Gourab Nicholas Rodrigues
, Md Nazmul Hossain Mir
, Md Shahriar Mahmud Bhuiyan
, Muhammad Firoz Mridha
, Md. Rashedul Islam
, Yutaka Watanobe
:
A Hybrid Temporal Convolutional Network and Transformer Model for Accurate and Scalable Sales Forecasting. 380-391 - K. Sasikumar

, Sivakumar Nagarajan
:
Enhancing Cloud Security: A Multi-Factor Authentication and Adaptive Cryptography Approach Using Machine Learning Techniques. 392-402 - Song Guo:

Editorial: Gratitude, Reflection, and Celebration: My Tenure as EiC Comes to a Close. 1 - Yu Gong

, Muhan Shi, Dongli Han
:
Annual Report Text Information and Credit Rating Based on the Perspective of Readability. 403-412 - Ziyao Liu

, Huanyi Ye
, Chen Chen
, Yongsen Zheng
, Kwok-Yan Lam
:
Threats, Attacks, and Defenses in Machine Unlearning: A Survey. 413-425 - Ammar Elnour

, Wencheng Yang
, Yan Li
:
Nonparametric Bootstrap Likelihood Estimation to Investigate the Chance Set-Up on Clustering Results. 438-448 - Zijian Gao

, Bo Liu
, Kele Xu
, Xinjun Mao
, Huaimin Wang
:
Correlation-Based Knowledge Distillation in Exemplar-Free Class-Incremental Learning. 449-459 - Zhibo Zhang

, Benjamin P. Turnbull
, Shabnam Kasra Kermanshahi, Hemanshu Roy Pota
, Jiankun Hu:
UNSW-MG24: A Heterogeneous Dataset for Cybersecurity Analysis in Realistic Microgrid Systems. 543-553 - Sadeep Batewela

, Madhusanka Liyanage
, Engin Zeydan
, Mika Ylianttila
, Pasika Ranaweera
:
Security Orchestration in 5G and Beyond Smart Network Technologies. 554-573 - Saad Hameed

, Basheer Qolomany
, Samir Brahim Belhaouari
, Mohamed M. Abdallah
, Junaid Qadir
, Ala I. Al-Fuqaha
:
Large Language Model Enhanced Particle Swarm Optimization for Hyperparameter Tuning for Deep Learning Models. 574-585 - Ankit Agrawal

, Ashutosh Bhatia
, Kamlesh Tiwari
:
Sybil-Resilient Publisher Selection Mechanism in Blockchain-Based MCS Systems. 586-598 - Kasem Khalil

, Ashok Kumar
, Magdy A. Bayoumi
:
An Efficient Neural Cell Architecture for Spiking Neural Networks. 599-612 - Alhassan Abdulhamid

, Sohag Kabir
, Ibrahim Ghafir
, Ci Lei
, Khalil M. El Hindi, Mohammad Hammoudeh
:
Quantitative Cybersecurity Analysis Framework for Cyber Physical Systems: A Conceptual Approach. 613-626 - Ali Daud

, Khameis Mohamed Al Abdouli, Afzal Badshah
:
Emerging Computing Tools for Emergency Management: Applications, Limitations and Future Prospects. 627-644 - Muhammad Tariq Shaheen

, Hafsa Iqbal
, Numan Khurshid
, Haleema Sadia
, Nasir Saeed
:
SwinSegFormer: Advancing Aerial Image Semantic Segmentation for Flood Detection. 645-657 - Sadeep Batewela

, Pasika Ranaweera
, Madhusanka Liyanage
, Engin Zeydan
, Mika Ylianttila
:
Addressing Security Orchestration Challenges in Next-Generation Networks: A Comprehensive Overview. 669-687 - Tatsuya Amano

, Hirozumi Yamaguchi
, Teruo Higashino
:
Reference-Free 3D WiFi AP Localization by Outdoor-to-Indoor Bridging. 688-700 - Aniruddha Mukherjee

, Vikas Hassija
, Vinay Chamola
, Karunesh Kumar Gupta
:
A Detailed Comparative Analysis of Automatic Neural Metrics for Machine Translation: BLEURT & BERTScore. 658-668 - Syed Hussain Ali Kazmi

, Faizan Qamar
, Rosilah Hassan
, Kashif Nisar:
FOCC: A Synthetically Balanced Federated One-Class-Classification for Cyber Threat Intelligence in Software Defined Networking. 701-713 - Lyhour Hak

, Somchart Fugkeaw
:
SSL-XIoMT: Secure, Scalable, and Lightweight Cross-Domain IoMT Sharing With SSI and ZKP Authentication. 714-725 - Shahariar Hossain Mahir

, Md. Tanjum An Tashrif
, Md. Ahsan Karim
, Dipanjali Kundu, Anichur Rahman, Md. Amir Hamza, Fahmid Al Farid
, Abu Saleh Musa Miah
, Sarina Mansor
:
Advanced Hydro-Informatic Modeling Through Feedforward Neural Network, Federated Learning, and Explainable AI for Enhancing Flood Prediction. 726-738 - Neena Aloysius

, Madathilkulangara Geetha, Prema Nedungadi
:
Optimized Multi-Modal Conformer-Based Framework for Continuous Sign Language Recognition. 739-749 - Mir Nafiul Nagib, Rahat Pervez, Afsana Alam Nova, Hadiur Rahman Nabil

, Zeyar Aung
, Muhammad Firoz Mridha
:
TuSegNet: A Transformer-Based and Attention-Enhanced Architecture for Brain Tumor Segmentation. 750-761 - Mohammed Al-Shalabi

, Mohammed A. Mahdi
, Malik Braik, Mohammed Azmi Al-Betar
, Shahanawaj Ahamad, Sawsan A. Saad:
Opposition-Based White Shark Optimizer for Optimizing Modified EfficientNetV2 in Road Crack Classification. 762-775 - Eugene Casmin

, Miriam Rodrigues, Américo Alves
, Rodolfo Oliveira
:
Comparison of Deep Learning Techniques for RF-Based Human Posture Detection Systems. 776-788 - Van-Nhan Tran

, Hoanh-Su Le
, Piljoo Choi
, Suk-Hwan Lee
, Ki-Ryong Kwon
:
MEViT: Generalization of Deepfake Detection With Meta-Learning EfficientNet Vision Transformer. 789-800 - Borja Arroyo Galende

, Patricia A. Apellániz
, Juan Parras
, Santiago Zazo, Silvia Uribe
:
Membership Inference Attacks and Differential Privacy: A Study Within the Context of Generative Models. 801-811 - Josue Genaro Almaraz-Rivera

, Jose Antonio Cantoral-Ceballos
, Juan Felipe Botero
, Francisco Javier MuñOz
, Brian David Martinez
:
Hyphatia: A Card-Not-Present Fraud Detection System Based on Self-Supervised Tabular Learning. 812-821 - Mariana Cunha

, Ricardo Mendes
, Yves-Alexandre de Montjoye
, João P. Vilela
:
WiFi-Based Location Tracking: A Still Open Door on Laptops. 822-833 - Badiea Abdulkarem Mohammed

, Himanshu Dhumras
, Varun Shukla
, Rakesh Kumar Bajaj
, Zeyad Ghaleb Al-Mekhlafi
:
Innovative Evaluation Framework for Consumer Electronics-Enabled Intelligent Transportation Systems: Leveraging $q$-Rung Picture Fuzzy Hypersoft Schweizer-Sklar Aggregation Operators. 834-845 - Saddam Hussain

, Ali Tufail, Haji Awg Abdul Ghani Naim, Muhammad Asghar Khan
, Gordana Barb
:
Evaluation of Computationally Efficient Identity-Based Proxy Signatures. 846-861 - Abualsoud Hanani

, Alaa R. Isaac, Abdallatif S. Abu-Issa
:
Automatic Classifying of Requirements-Relevant Contents From App Reviews in the Arabic Language. 862-873 - Yun-Wei Lin

, Yi-Bing Lin
, Yi-Feng Wu, Pei-Hsuan Shen:
VoiceTalk: A No-Code Approach for Creating Voice-Controlled Smart Home Applications. 874-883 - Selvarajah Thuseethan

, Sandipkumar Gangajaliya, Luke Hamlin, Bharanidharan Shanmugam
, Suresh Thennadil
:
Conv-Ensemble for Solar Power Prediction With First Nations Seasonal Information. 884-895 - Md Nazmul Hossain Mir

, Arindam Kishor Biswas
, Md Shariful Alam Bhuiyan, Md. Golam Rabbani Abir
, Muhammad Firoz Mridha
, Md. Jakir Hossen
:
ABMF-Net: An Attentive Bayesian Multi-Stage Deep Learning Model for Robust Forecasting of Electricity Price and Demand. 896-907 - Mustafa Ghaleb

, Mosab Hamdan
, Abdulaziz Y. Barnawi
, Muhammad Liman Gambo
, Abubakar Danasabe
, Saheed A. Bello
, Aliyu Habib
:
Explainable AI for Lightweight Network Traffic Classification Using Depthwise Separable Convolutions. 908-920 - Alemayehu Tilahun Haile

, Surafel Lemma Abebe
, Henock Mulugeta Melaku
:
Real-Time Automated Cyber Threat Classification and Emerging Threat Detection Framework. 921-930 - MD Azam Khan

, Arifur Rahman
, Farhad Uddin Mahmud
, Kanchon Kumar Bishnu
, Hadiur Rahman Nabil
, Muhammad Firoz Mridha
, Md. Jakir Hossen
:
A Physics-Guided Bayesian Neural Network for Sensor Fault Detection in Wind Turbines. 931-942 - Mahanur Alam

, Md. Johirul Islam Tutul
, Md. Anwar Hussen Wadud, Md. Jakir Hossen
, Muhammad Firoz Mridha
:
Bilingual Bangla OCR for Rural Empowerment: Detecting Handwritten Queries and Agricultural Assistance. 943-954 - Loreen Mahmoud

, Madhusanka Liyanage
, Jitin Singla
, Sugata Gangopadhyay
:
DSEM-NIDS: Enhanced Network Intrusion Detection System Using Deep Stacking Ensemble Model. 955-967 - Nuttapong Attrapadung

, Reo Eriguchi
, Goichiro Hanaoka
, Takahiro Matsuda
, Naohisa Nishida
, Tatsumi Oba
, Jacob C. N. Schuldt
, Koki Tejima, Tadanori Teruya
, Yuji Unagami
, Naoto Yanai
:
Fast and Private 1-to-$N$ Face Identification Protocols. 968-986 - Kailash Gogineni

, Ali Suvizi
, Guru Venkataramani
:
LLMs on a Budget: System-Level Approaches to Power-Efficient and Scalable Fine-Tuning. 987-1000 - Yomna Mohamed

, Mostafa M. Fouda
, Zubair Md Fadlullah
, Rabab Abdelfattah
, Mohamed I. Ibrahem
:
BOL-LPP: A Bayesian-Optimized LSTM Model for Day-Ahead Load Price Forecasting in the ERCOT Market. 1001-1011 - Isaac Ampratwum, Amiya Nayak

:
Hybrid Approach for WDM Network Restoration: Deep Reinforcement Learning and Graph Neural Networks. 1012-1026 - Hanyue Xu

, Kah Phooi Seng
, Kenneth Li-Minn Ang
, Wei Wang
, Jeremy Smith:
Graph Split Federated Learning for Distributed Large-Scale AIoT in Smart Cities. 1027-1040 - Leandro Honorato de Souza Silva

, Agostinho Freire, George O. de A. Azevedo
, Sérgio Campello Oliveira
, Carlo Marcelo Revoredo da Silva
, Bruno J. T. Fernandes
:
GEN Self-Labeling Object Detector for PCB Recycling Evaluation. 1041-1052 - Md Shahin Alam Mozumder, Mohammad Balayet Hossain Sakil, Md Rokibul Hasan, Md Amit Hasan, K. M. Nafiur Rahman Fuad

, M. F. Mridha
, Md. Rashedul Islam
, Yutaka Watanobe
:
Hybrid Contrastive Learning With Attention-Based Neural Networks for Robust Fraud Detection in Digital Payment Systems. 1053-1064 - Safa Ben Atitallah

, Maha Driss
, Wadii Boulila
, Anis Koubaa:
Securing Industrial IoT Environments: A Fuzzy Graph Attention Network for Robust Intrusion Detection. 1065-1076 - Chih-Lyang Hwang

, Felix Gunawan
, Chih-Han Chen
:
Squeeze-Excitation Transformer With Residual Bi-GRU Model for Distributed UWB Based Continuous Gesture Recognition and its Application to Human-UAV Interactions. 1077-1089 - Gayathri Ramasamy

, Tripty Singh
, Xiaohui Yuan
, Ganesh R. Naik
:
Deep TPS-PSO: Hybrid Deep Feature Extraction and Global Optimization for Precise 3D MRI Registration. 1090-1099 - Samir Abdaljalil

, Hasan Kurban
, Rachad Atat
, Erchin Serpedin
, Khalid A. Qaraqe
:
Deep Temporal and Structural Embeddings for Robust Unsupervised Anomaly Detection in Dynamic Graphs. 1100-1109 - Amine Haboub

, Hamza Baali
, Abdesselam Bouzerdoum
:
DCT-Based Channel Attention for Multivariate Time Series Classification. 1110-1120 - Kiara Nand, Zhibo Zhang

, Jiankun Hu
:
A Comprehensive Survey on the Usage of Machine Learning to Detect False Data Injection Attacks in Smart Grids. 1121-1132 - Kashish D. Shah

, Dhaval K. Patel
, Brijesh Soni
, Siddhartan Govindasamy
, Mehul S. Raval
, Mukesh A. Zaveri:
Dynamic Spectrum Coexistence of NR-V2X and Wi-Fi 6E Using Deep Reinforcement Learning. 1133-1145 - Tuan Hai Vu

, Vu Trung Duong Le
, Hoai Luan Pham
, Yasuhiko Nakashima
:
Benchmarking Variants of the Adam Optimizer for Quantum Machine Learning Applications. 1146-1154 - Mohammad Ennab

, Hamid Mcheick:
Enhancing Pneumonia Diagnosis Through AI Interpretability: Comparative Analysis of Pixel-Level Interpretability and Grad-CAM on X-ray Imaging With VGG19. 1155-1165 - Jialei Cao

, Wenxia Zheng, Yao Ge, Jiyuan Wang
:
DriftShield: Autonomous Fraud Detection via Actor-Critic Reinforcement Learning With Dynamic Feature Reweighting. 1166-1177 - Najah AbuAli

, Ihtesham Jadoon
, Farman Ullah
, Mohammad Hayajneh
, Shayma Alkobaisi
:
Radio Frequency Sensing-Based Human Emotion Identification by Leveraging 2D Transformation Techniques and Deep Learning Models. 1178-1189 - Muhammad Ashraf, Adnan Nadeem, Oussama Benrhouma, Muhammad Sarim, Kashif Rizwan, Amir Mehmood:

A Robust Cross-Channel Image Watermarking Technique for Tamper Detection and its Precise Localization. 1202-1213 - Sunil Prajapat

, Pankaj Kumar
, Kashish Chaudhary, Kranti Kumar, Gyanendra Kumar
, Ali Kashif Bashir
:
A Robust Image Encryption Protocol for Secure Data Sharing in Brain Computer Interface Applications. 1190-1201 - Seongho Kim

, Jihyun Moon
, Juntaek Oh
, Insu Choi
, Joon-Sung Yang
:
Survey and Evaluation of Converging Architecture in LLMs Based on Footsteps of Operations. 1214-1226 - Naeem Khan

, Shibli Nisar
, Muhammad Asghar Khan
, Yasar Abbas Ur Rehman, Fazal Noor
, Gordana Barb
:
Optimizing Federated Learning With Aggregation Strategies: A Comprehensive Survey. 1227-1247 - Abdulmalik Shehu Yaro

, Filip Maly, Pavel Prazak
, Karel Malý
:
Examining the Impact of Distance-Based Similarity Metrics on the Performance of Projected Clustering Algorithm for Fingerprint Database Clustering. 1248-1259 - Swapneel C. Mhatre

, Priya Chandran:
Simulators for Processors Used in Virtualization: A Survey. 1260-1270 - Ehtesham Iqbal

, Sirojbek Safarov
, Seongdeok Bang
, Sajid Javed
, Yahya H. Zweiri
, Yusra Abdulrahman
:
Few-Shot Segmentation Using Multi-Similarity and Attention Guidance. 1271-1282 - Arjun Kumar Bose Arnob

, Muhammad Mostafa Monowar
, Md. Abdul Hamid
, Muhammad Firoz Mridha
:
XPolypNet: A U-Net-Based Model for Semantic Segmentation of Gastrointestinal Polyps With Explainable AI. 1283-1293 - Nikolaos Makris, Stamatina K. Koutsileou, Nikolaos Mitrou:

A Probabilistic Method for Hierarchical Multisubject Classification of Documents Based on Multilingual Subject Term Vocabularies. 1294-1305 - Abdelkader Laouid

, Mostefa Kara
, Mohammad Hammoudeh
:
A New Cryptographic Frontier: Key-Independent Security and Post-Quantum Hardness Assumptions. 1306-1316 - Laura Rodríguez de Lope

, Víctor M. Maestre, Luis Díez, Alfredo Ortiz Fernández, Ramón Agüero
, Inmaculada Ortiz:
A Comprehensive AI-Based Digital Twin Model for Residential Hydrogen-Based Energy Systems. 1317-1328 - Everton de Matos

, George Lawton
, Conor Lennon:
Towards seL4 for Enhanced System Isolation and Security on Embedded Devices. 1329-1340 - Engin Zeydan

, Josep Mangues
, Suayb S. Arslan
, Yekta Turk
, Tharaka Hewa
, Madhusanka Liyanage
, Aidan O'Mahony
:
Reconfigurable Production Lines for Industrial 5.0 Automation: An Intent-Based Approach. 1341-1352 - Van-Nhan Tran

, Piljoo Choi
, Hoanh-Su Le
, Suk-Hwan Lee, Ki-Ryong Kwon
:
DiffCoR: Exposing AI-Generated Image by Using Stable Diffusion Model Based on Consistent Representation Learning. 1353-1365 - Najmul Hassan

, Abu Saleh Musa Miah
, Yuichi Okuyama
, Jungpil Shin
:
Neurological Disorder Recognition via Comprehensive Feature Fusion by Integrating Deep Learning and Texture Analysis. 1366-1377 - Patrick McEnroe

, Shen Wang
, Madhusanka Liyanage
:
FERO: Efficient Deep Reinforcement Learning based UAV Obstacle Avoidance at the Edge. 1378-1389 - Uday K. Chakraborty

, Cezary Z. Janikow:
Using Extreme Order Statistics of Multimodal Mixture Distributions for Complexity Analysis of Semi-Steady-State Jaya Algorithm. 1390-1401 - Masrat Rasool

, Khelil Kassoul
, Samir Brahim Belhaouari
:
Gaussian Kernel-Based LSH for High-Dimensional Similarity Search. 1402-1413 - Harsh Mehta

, Santosh Kumar Bharti
, Nishant Doshi:
Extractive Text Summarization Using Formality of Language. 1414-1425 - Abu Sadat Mohammad Shaker, Md Tohidul Islam, A T. M. Omor Faruq, Hritika Barua, Uland Rozario

, M. F. Mridha
, Md. Jakir Hossen
:
TACS-Net: Temporal-Aware Customer Segmentation Network. 1426-1437 - Somchart Fugkeaw

, Archawit Changtor, Thanabordee Maneerat, Pakapon Rattanasrisuk, Kittipat Tangtanawirut:
LightPUF-IIoT: A Lightweight PUF-Based Authentication Scheme With Real-Time Detection of Rogue Devices in Fog-Assisted IIoT Data Sharing. 1438-1450 - Muhammad Iqbal

, Tabinda Ashraf
, Jen-Yi Pan
:
Adaptive Three-Stage Hybrid RIS for Energy-Efficient and High-Performance Wireless Networks. 1451-1462 - Suchuan Xing

, Yihan Wang
:
Cross-Modal Attention Networks for Multi-Modal Anomaly Detection in System Software. 1463-1474 - Pascal A. Schirmer

, Dimitrios Kolosov
, Iosif Mporas
:
Multivariate Constrained Elastic Matching With Application in Real-Time Energy Disaggregation. 1475-1487 - Jungpil Shin

, Najmul Hassan
, Abu Saleh Musa Miah
, Taro Suzuki, Sultan Al Farhood
:
Optimized Breast Cancer Classification via SHAP-Based Feature Selection and Weighted Voting Ensemble Learning. 1488-1500 - Hiro Andrade, Nuno Pombo

, Sebastião Pais
:
Improving Software Defect Detection With LSTM-Based Semantic Modeling and Class Imbalance Handling. 1501-1511 - Arun Sekar Rajasekaran

, Maria Azees
, Babji Prasad Chapa
, Anantha Rao Gondu:
FAV2G: Fog-Based Authentication Scheme for Vehicle-to-Grid Network With Verilog Implementation. 1512-1524 - Francesco Rundo

, Angelo Alberto Messina
, Michele Fiore
, Michele Calabretta
, Pasquale Coscia
, Sebastiano Battiato
:
Hyperbolic Deep Learning System for Intelligent Gate-Driving and Health Monitoring of Silicon-Carbide Power MOSFETs. 1525-1536 - Nabila Rahman, Fuad Mahmud, Ashim Chandra Das, Md Shujan Shak, Rahomotul Islam

, Muhammad Firoz Mridha
, Md. Jakir Hossen
:
FedSalesNet: A Federated Learning-Inspired Deep Neural Framework for Decentralized Multi-Store Sales Forecasting. 1537-1548 - Eran Dahan

, Yosi Keller:
Kinship Verification Using Hierarchical Structures and Extended Contrastive Learning. 1549-1560 - Yonatan Mamani-Coaquira

, Edwin Villanueva
:
An Unsupervised Model Based on Knowledge Graph and Concepts for Sentiment Analysis. 1561-1574 - Shehel Yoosuf

, Hamza Baali
, Abdesselam Bouzerdoum
:
FiLM-SimVP: Scalable Uncertainty Quantification in Spatiotemporal Forecasting. 1575-1586 - Mohammad Mogharen Askarin

, Jiankun Hu
, Min Wang
, Xuefei Yin
, Xiuping Jia:
A B-Spline Function Based 3D Point Cloud Flattening Scheme for 3D Fingerprint Recognition and Identification. 1587-1598 - Funebi Francis Ijebu

, Yuanchao Liu, Chengjie Sun
, Nobert Rangarirai Jere
, Ibomoiye Domor Mienye
, Patience Usoro Usip:
Ensemble Answer Selection Leveraging Cross-Lingual Dealignment for Improved Question Answering With Mixture-of-Experts Setup. 1599-1610 - Yuntao Wang

, Yanghe Pan
, Shaolong Guo
, Zhou Su
:
Security of Internet of Agents: Attacks and Countermeasures. 1611-1624 - Md Tohidul Islam, Abu Sadat Mohammad Shaker, Hritika Barua, Uland Rozario

, Arindam Kishor Biswas
, M. F. Mridha
, Satoshi Nishimura
, Jungpil Shin
:
LaplaceSalesNet: A Neural Laplace-Transformer Framework for Continuous-Time Sales Forecasting. 1625-1636 - Misbah Khan, Shabnam Kasra Kermanshahi, Jiankun Hu

:
Optimized Block Ordering for DAG-Based Distributed Ledgers. 1637-1648 - Aryan Singh

, Ciarán Eising
, Patrick Denny
, Pepijn van de Ven
:
Improving GNNs for Image Classification: Addressing Homophily Challenges. 1649-1660 - N. Bharanidharan

, S. R. Sannasi Chakravarthy
, V. Vinoth Kumar:
Optimized Extreme Learning Machine for Breast Tumor Classification Using Mammograms. 1661-1672 - Seyed Nooreddin Jafari

, Bruno M. C. Silva:
A Survey on Real-Time Data Transfer and Energy Consumption Strategies for Rural and Remote IoT Technologies. 1686-1702 - Muhammad Fahad Nasir

, Mobeen Ur Rehman
, Irfan Hussain:
A Self-Attention Guided Approach for Advanced Underwater Image Super-Resolution With Depth Awareness. 1716-1726 - Saeed Ullah Jan

, Muhammad Usman Tariq
, Osama Ahmed Khashan
, Naif Alzahrani, Anwar Ghani
:
FEELAP: Fuzzy Extractor-Based Efficient Lightweight Authentication Protocol for Edge-IoT Ecosystem in e-Healthcare. 1727-1740 - Ammar Elnour, Wencheng Yang, Yan Li

:
The Chance Set-Up on Pattern Discovery. 1741-1751 - Krittin Thirasak, Teerawat Chuaphanngam, Danupat Chainarong, Somchart Fugkeaw

:
TF2ML: Threat Filtering With Two-Stage Machine Learning for Efficient Provenance-Aware Threat Detection and Response. 1752-1763 - Luis Barata

, Eurico Lopes
, Pedro R. M. Inácio
, Mário M. Freire
:
Classification of Anomalies in Microservices Using an XGBoost-Based Approach With Data Balancing and Hyperparameter Tuning. 1673-1685 - Lucia Cascone

, Marco Di Maio
, Vincenzo Loia
, Mattia Maucioni
, Michele Nappi
, Chiara Pero
:
Synthetic Data for Fairness: Bias Mitigation in Facial Attribute Recognition. 1703-1714 - Niharika Panda, Supriya M

, Atis Elsts:
Prioritized and Multi-Agent Reinforcement Learning-Based TSCH Schedulers. 1763-1774 - Afsana Alam Nova, Mir Nafiul Nagib, Rahat Pervez, Md. Jakir Hossen

, Muhammad Firoz Mridha
:
CustXaiNet: A Multi-Modal Deep Learning Framework for Predicting Customer Behavior With Explainable AI. 1775-1786 - Md Amit Hasan, Md Shahin Alam Mozumder, Md Rokibul Hasan, Mohammad Balayet Hossain Sakil, A S. M. Morshedul Hoque

, M. F. Mridha
, Md. Jakir Hossen
:
UniBizNet: A Unified Business Intelligence Network for Strategic Multimodal Data Integration and Predictive Analysis. 1787-1798 - Md. Fahim Ul Islam, Amitabha Chakrabarty

, Halimaton Saadiah Hakimi
, Siti Sarah Maidin
:
FedWGCA: A Federated Learning Based AAV Intrusion Detection With Gradient Clipping and Attention-Based Neural Networks. 1799-1809 - Abdulmumin Sa'ad

, Muhamad Felemban
, Abdulaziz Tabbakh
:
CEFEEL: Communication-Efficient FEderated Learning for Personal Assistant Applications. 1811-1821 - Ameera Almomani

, Khaldoon Mhaidat
, Osama Daifallah Al-Khaleel
, Mohammad Al-Khaleel
:
An Efficient and Scalable Montgomery Modular Multiplier for Cryptographic Applications. 1822-1833 - George Pacheco Pinto

, Cássio V. S. Prazeres
:
A User-Centric IoT Platform for Privacy With AI-Assisted Consent. 1834-1846 - Fusen Guo

, Ke Xu, Zhibo Zhang
, Hailing Zhou
, Guo Chen
, Jiankun Hu
, Jun Zhang
, Huadong Mo
:
Battery SOH Prediction Under Different Conditions via MBLSTM and iTransformer With Anomaly Detection and Explainability. 1847-1857 - Dishant Mewada

, Cathaoir Agnew
, Eoin Martino Grua
, Ciarán Eising
, Patrick Denny
, Mark Heffernan, Ken Tierney, Pepijn van de Ven
, Anthony G. Scanlan
:
Application of Vision Transformers to Contamination Detection in Densely Cluttered Waste Scenes. 1858-1869 - R. Neeraja

, L. Jani Anbarasi
, S. Benson Edwin Raj
, Sathiya Narayanan
:
Leveraging AdamW Golden Search Optimized Multi-Level Attention Stacked Feature Generators for Cephalometric Landmark Prediction. 1870-1883 - Harapriya Kar

, P. Viswanathan
:
Epsilon-Guided Spatiotemporal Transformer: An Exponential Error Reduction for Multi-Memory Multilingual Sign Interpreter. 1884-1895

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














