


default search action
IEEE Open Journal of the Computer Society, Volume 2
Volume 2, 2021
- Song Guo
:
EIC Editorial. 1-2 - Afshin Arefi
, Majid Khabbazian
:
Packet Loss Recovery in Broadcast for Real-Time Applications in Dense Wireless Networks. 3-13 - Samson Ho, Saleh A. Al-Jufout
, Khalil Dajani, Mohammad Mozumdar
:
A Novel Intrusion Detection Model for Detecting Known and Innovative Cyberattacks Using Convolutional Neural Network. 14-25 - Subramanian Ganesan
, Anand Sreekantan Thampy
, Nnamdi Valbosco Ugwuoke
, Baghwan Ramnani
:
Crypto Pharmacy - Digital Medicine: A Mobile Application Integrated With Hybrid Blockchain to Tackle the Issues in Pharma Supply Chain. 26-37 - Pengfei Huang, Chenghua Wang, Weiqiang Liu
, Fei Qiao
, Fabrizio Lombardi
:
A Hardware/Software Co-Design Methodology for Adaptive Approximate Computing in clustering and ANN Learning. 38-52 - Michael Conrad Meyer
, Yu Wang, Takahiro Watanabe
:
Real-Time Cost Minimization of Fog Computing in Mobile-Base-Station Networked Disaster Areas. 53-61 - Xianlong Zeng
, Simon M. Lin, Chang Liu
:
Multi-View Deep Learning Framework for Predicting Patient Expenditure in Healthcare. 62-71 - Quang Nhat Tran, Benjamin P. Turnbull
, Hao-Tian Wu
, A. J. S. de Silva, Katerina Kormusheva
, Jiankun Hu
:
A Survey on Privacy-Preserving Blockchain Systems (PPBS) and a Novel PPBS-Based Framework for Smart Agriculture. 72-84 - Zhaoyang Du
, Celimuge Wu
, Tsutomu Yoshinaga
, Xianfu Chen
, Xiaoyan Wang
, Kok-Lim Alvin Yau
, Yusheng Ji
:
A Routing Protocol for UAV-Assisted Vehicular Delay Tolerant Networks. 85-98 - Chao Qiu
, Xiaoxu Ren, Yifan Cao, Tianle Mai
:
Deep Reinforcement Learning Empowered Adaptivity for Future Blockchain Networks. 99-105 - Li Ding
, Jun Wu
, Xiaofei Zhang, Jianhua Li, Jin Ma:
Privacy Preserved Cyber-Physical Searching for Information-Centric Intelligent Agriculture. 106-116 - Justin C. Tullos
, Scott R. Graham
, Jeremy D. Jordan, Pranav R. Patel
:
SPARC: Statistical Performance Analysis With Relevance Conclusions. 117-129 - Bidi Ying
, Nada Radwan Mohsen, Amiya Nayak
:
Efficient Authentication Protocol for Continuous Monitoring in Medical Sensor Networks. 130-138 - Michael Lescisin
, Qusay H. Mahmoud
:
A Machine Learning Based Monitoring Framework for Side-Channel Information Leaks. 139-151 - Weiqi Fan, Qimei Cui
, Xiangjun Li, Xueqing Huang, Xiaofeng Tao
:
On Credibility-Based Service Function Chain Deployment. 152-163 - Claudia Antal
, Tudor Cioara
, Marcel Antal
, Ionut Anghel
:
Blockchain Platform For COVID-19 Vaccine Supply Management. 164-178 - Quang Nhat Tran, Benjamin P. Turnbull
, Jiankun Hu
:
Biometrics and Privacy-Preservation: How Do They Evolve? 179-191 - Liming Gao
, Celimuge Wu
, Tsutomu Yoshinaga
, Xianfu Chen
, Yusheng Ji
:
Multi-Channel Blockchain Scheme for Internet of Vehicles. 192-203 - Lu Liu, Sicong Zhou
, Huawei Huang
, Zibin Zheng
:
From Technology to Society: An Overview of Blockchain-Based DAO. 204-215 - Shunpei Yamaguchi
, Ritsuko Oshima, Jun Oshima, Ryota Shiina, Takuya Fujihashi
, Shunsuke Saruwatari
, Takashi Watanabe
:
Speaker Identification for Business-Card-Type Sensors. 216-226 - Somali Chaterji
, Nathan DeLay, John Evans, Nathan Mosier
, Bernard Engel, Dennis Buckmaster, Michael Ladisch, Ranveer Chandra:
Lattice: A Vision for Machine Learning, Data Engineering, and Policy Considerations for Digital Agriculture at Scale. 227-240 - Placide Shabisha
, Chamara Sandeepa
, Charuka Moremada
, Nadeeka Dissanayaka
, Tharindu D. Gamage
, An Braeken
, Kris Steenhaut
, Madhusanka Liyanage
:
Security Enhanced Emergency Situation Detection System for Ambient Assisted Living. 241-259 - Mahzabeen Emu
, Salimur Choudhury
:
Ensemble Deep Learning Assisted VNF Deployment Strategy for Next-Generation IoT Services. 260-275 - Rui Hu, Yuanxiong Guo
, Yanmin Gong
:
Concentrated Differentially Private Federated Learning With Performance Analysis. 276-289 - Celimuge Wu
, Chunrong Peng, Zhaoyang Du
, Liming Gao
, Tsutomu Yoshinaga
, Yusheng Ji
:
Toward Agile Information and Communication Framework for the Post-COVID-19 Era. 290-299 - Yu Su
:
A Trust Based Scheme to Protect 5G UAV Communication Networks. 300-307 - Zhouyang Lin
, Kai Li, Yang Yang
, Fanglei Sun, Liantao Wu
, Panpan Shi, Song Ci, Yong Zuo
:
DRESIA: Deep Reinforcement Learning-Enabled Gray Box Approach for Large-Scale Dynamic Cyber-Twin System Simulation. 321-333 - Ousmane Zeba
, Kentaro Hayashi, Kazuhiro Kizaki, Shunsuke Saruwatari
, Takashi Watanabe
:
QuadScatter: Computational Efficiency in Simultaneous Transmissions for Large-Scale IoT Backscatter Networks. 334-345 - Sarah Shah
, Yasaman Amannejad
, Diwakar Krishnamurthy
, Mea Wang:
PERIDOT: Modeling Execution Time of Spark Applications. 346-359 - Guolong Chen, Liang Zhao
, Xianwei Li
, Fuqi Zhao, Xiaojian Zeng:
Optimal Resource Allocation for Multimedia Applications Offloading in Mobile Edge Computing. 360-369 - Xuefei Yin
, Yanming Zhu
, Jiankun Hu
:
A Survey on 2D and 3D Contactless Fingerprint Biometrics: A Taxonomy, Review, and Future Directions. 370-381 - Yan-Tsung Peng
, Sha-Wo Huang:
Image Impulse Noise Removal Using Cascaded Filtering Based on Overlapped Adaptive Gaussian Smoothing and Convolutional Refinement Networks. 382-392 - Fei Ge
, Liansheng Tan
, Wei Zhang, Ming Liu, Xun Gao
, Juan Luo
:
Link Scheduling and End-to-End Throughput Optimization in Wireless Multi-Hop Networks. 393-406 - Chonggao Sun
, Yonghong Chen
, Hui Tian
, Shuhong Wu
:
Covert Timing Channels Detection Based on Auxiliary Classifier Generative Adversarial Network. 407-418

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.