


default search action
IEEE Open Journal of the Computer Society, Volume 6
Volume 6, 2025
- Vincenzo Piuri
:
New Incoming EIC Editorial. 2-3 - Prabadevi Boopathy
, Natarajan Deepa
, Praveen Kumar Reddy Maddikunta
, Nancy Victor
, Thippa Reddy Gadekallu
, Gokul Yenduri
, Wei Wang
, Quoc-Viet Pham
, Thien Huynh-The
, Madhusanka Liyanage
:
The Metaverse for Industry 5.0 in NextG Communications: Potential Applications and Future Challenges. 4-24 - Hrishikesh Joshi
:
Emerging Technologies Driving Zero Trust Maturity Across Industries. 25-36 - Xiangyi Meng
, Yuefeng Du
, Cong Wang
:
ECMO: An Efficient and Confidential Outsourcing Protocol for Medical Data. 37-48 - Adeel Ashraf Cheema
, Muhammad Shahzad Sarfraz
, Usman Habib
, Qamar Uz Zaman
, Ekkarat Boonchieng
:
CD-LLMCARS: Cross Domain Fine-Tuned Large Language Model for Context-Aware Recommender Systems. 49-59 - Li Kang
, Chuanghong Zhao
, Jianjun Huang
:
Object Re-Identification Based on Federated Incremental Subgradient Proximal Optimization. 60-71 - Marta Rey-Paredes
, Carlos J. Pérez
, Alfonso Mateos Caballero
:
Time Series Classification of Raw Voice Waveforms for Parkinson's Disease Detection Using Generative Adversarial Network-Driven Data Augmentation. 72-84 - Haoxuan Liu
, Vasu Singh
, Michal Filipiuk
, Siva Kumar Sastry Hari
:
ALBERTA: ALgorithm-Based Error Resilience in Transformer Architectures. 85-96 - Hussien AbdelRaouf
, Mostafa M. Fouda
, Mohamed I. Ibrahem
:
Revolutionizing User Authentication Exploiting Explainable AI and CTGAN-Based Keystroke Dynamics. 97-108 - Yazan Dayoub
, Andrey V. Savchenko
, Ilya Makarov
:
Boosting Depth Estimation for Self-Driving in a Self-Supervised Framework via Improved Pose Network. 109-118 - Mahzabeen Emu
, Taufiq Rahman
, Salimur Choudhury
, Kai Salomaa
:
Quantum Long Short-Term Memory-Assisted Optimization for Efficient Vehicle Platooning in Connected and Autonomous Systems. 119-128 - Jungpil Shin
, Abu Saleh Musa Miah
, Yuta Kaneko
, Najmul Hassan
, Hyoun-Sup Lee, Si-Woong Jang
:
Multimodal Attention-Enhanced Feature Fusion-Based Weakly Supervised Anomaly Violence Detection. 129-140 - Xinguang Zhang
, Shiyang Chen, Zhouhang Shao, Yongjie Niu
, Li Fan:
Enhanced Lithographic Hotspot Detection via Multi-Task Deep Learning With Synthetic Pattern Generation. 140-151 - Luigi Serreli
, Claudio Marche
, Michele Nitti
:
Reducing Data Volume in News Topic Classification: Deep Learning Framework and Dataset. 152-163 - Pedro Conde
, Rui L. Lopes
, Cristiano Premebida
:
Improving Accuracy and Calibration of Deep Image Classifiers With Agreement-Driven Dynamic Ensemble. 164-175 - Xu Wang
, Qisheng Xu
, Kele Xu
, Ting Yu
, Bo Ding
, Dawei Feng
, Yong Dou
:
Large Pretrained Foundation Model for Key Performance Indicator Multivariate Time Series Anomaly Detection. 176-187 - Bivin Pradeep
, Parag Kulkarni
, Farman Ullah
, Abderrahmane Lakas
:
Energy Use and Demand Prediction Using Time-Series Deep Learning Forecasting Techniques: Application for a University Campus. 189-198 - Aleksandar Jevremovic
, Zona Kostic
, Ivan Chorbev
, Dragan Perakovic
, Andrii Shalaginov, Ivan Cvitic:
Energy Efficiency of Kernel and User Space Level VPN Solutions in AIoT Networks. 199-210 - Alain Hadges
, Srikar Bellur:
Statistical Validity of Neural-Net Benchmarks. 211-222 - Shadi Jaradat
, Mohammed Elhenawy
, Huthaifa I. Ashqar, Alexander Paz
, Richi Nayak
:
Leveraging Deep Learning and Multimodal Large Language Models for Near-Miss Detection Using Crowdsourced Videos. 223-235 - Mohammad Hassan Adeli
, Dariush Abbasi-Moghadam
, Hossein Fotouhi
, Seyed Mohammad Razavizadeh
:
Optimizing Energy Efficiency in UPA-Assisted SWIPT Massive MIMO Systems Over Rician Fading Channels. 236-247 - Abdessamad Benlahbib
, Achraf Boumhidi
, Anass Fahfouh
, Hamza Alami
:
Comparative Analysis of Traditional and Modern NLP Techniques on the CoLA Dataset: From POS Tagging to Large Language Models. 248-260 - Lerina Aversano, Martina Iammarino
, Antonella Madau
, Giuseppe Pirlo
, Gianfranco Semeraro
:
What Time Is It? Finding Which Temporal Features is More Useful for Next Activity Prediction. 261-271 - Yi Xu
, Zhigang Chen
, Ming Zhao
, Fengxiao Tang
, Yangfan Li
, Jiaqi Liu
, Nei Kato
:
UVtrack: Multi-Modal Indoor Seamless Localization Using Ultra-Wideband Communication and Vision Sensors. 272-281 - Shuo Pei
, Jiajia Wang
, Yunlong Yang, Anyang Dong
, Bingqi Guo, Junlong Guo
, Yufeng Yao
:
A Human-Centered Kinematics Design Optimization of Upper Limb Rehabilitation Exoskeleton Based on Configuration Manifold. 282-293 - Xin Yuan
, Chenhui Wang, Xiaohong Chen, Mingxuan Wang, Ning Li
, Changli Yu
:
IGFU: A Hybrid Underwater Image Enhancement Approach Combining Adaptive GWA, FFA-Net With USM. 294-306 - Shreyan Prakash
, Raj Bhattacherjee
, Sainath Bitragunta
, Ashutosh Bhatia
, Kamlesh Tiwari
:
Quantum Computing-Accelerated Kalman Filtering for Satellite Clusters: Algorithms and Comparative Analysis. 307-316 - Rola Abdallah
, Mohamed Atef
, Nasir Saeed
:
Hybrid POF-VLC Systems: Recent Advances, Challenges, Opportunities, and Future Directions. 317-335 - Francesco Castro
, Donato Impedovo
, Giuseppe Pirlo
:
An Efficient and Privacy-Preserving Federated Learning Approach Based on Homomorphic Encryption. 336-347 - Aliya Tabassum
, Ezieddin Elmahjub
, Aasim I. Padela
, Andrej Zwitter
, Junaid Qadir
:
Generative AI and the Metaverse: A Scoping Review of Ethical and Legal Challenges. 348-359 - Farid Binbeshr
, Muhammad Imam
, Mustafa Ghaleb
, Mosab Hamdan
, Mussadiq Abdul Rahim, Mohammad Hammoudeh
:
The Rise of Cognitive SOCs: A Systematic Literature Review on AI Approaches. 360-379 - Md Al Rafi
, Gourab Nicholas Rodrigues
, Md Nazmul Hossain Mir
, Md Shahriar Mahmud Bhuiyan
, Muhammad Firoz Mridha
, Md. Rashedul Islam
, Yutaka Watanobe
:
A Hybrid Temporal Convolutional Network and Transformer Model for Accurate and Scalable Sales Forecasting. 380-391 - K. Sasikumar
, Sivakumar Nagarajan
:
Enhancing Cloud Security: A Multi-Factor Authentication and Adaptive Cryptography Approach Using Machine Learning Techniques. 392-402 - Song Guo:
Editorial: Gratitude, Reflection, and Celebration: My Tenure as EiC Comes to a Close. 1 - Yu Gong
, Muhan Shi, Dongli Han
:
Annual Report Text Information and Credit Rating Based on the Perspective of Readability. 403-412 - Ziyao Liu
, Huanyi Ye
, Chen Chen
, Yongsen Zheng
, Kwok-Yan Lam
:
Threats, Attacks, and Defenses in Machine Unlearning: A Survey. 413-425 - Ammar Elnour
, Wencheng Yang
, Yan Li
:
Nonparametric Bootstrap Likelihood Estimation to Investigate the Chance Set-Up on Clustering Results. 438-448 - Zijian Gao
, Bo Liu
, Kele Xu
, Xinjun Mao
, Huaimin Wang
:
Correlation-Based Knowledge Distillation in Exemplar-Free Class-Incremental Learning. 449-459 - Zhibo Zhang
, Benjamin P. Turnbull
, Shabnam Kasra Kermanshahi, Hemanshu Roy Pota
, Jiankun Hu:
UNSW-MG24: A Heterogeneous Dataset for Cybersecurity Analysis in Realistic Microgrid Systems. 543-553 - Sadeep Batewela
, Madhusanka Liyanage
, Engin Zeydan
, Mika Ylianttila
, Pasika Ranaweera
:
Security Orchestration in 5G and Beyond Smart Network Technologies. 554-573 - Saad Hameed
, Basheer Qolomany
, Samir Brahim Belhaouari
, Mohamed M. Abdallah
, Junaid Qadir
, Ala I. Al-Fuqaha
:
Large Language Model Enhanced Particle Swarm Optimization for Hyperparameter Tuning for Deep Learning Models. 574-585 - Ankit Agrawal
, Ashutosh Bhatia
, Kamlesh Tiwari
:
Sybil-Resilient Publisher Selection Mechanism in Blockchain-Based MCS Systems. 586-598 - Kasem Khalil
, Ashok Kumar
, Magdy A. Bayoumi
:
An Efficient Neural Cell Architecture for Spiking Neural Networks. 599-612 - Alhassan Abdulhamid
, Sohag Kabir
, Ibrahim Ghafir
, Ci Lei
, Khalil M. El Hindi, Mohammad Hammoudeh
:
Quantitative Cybersecurity Analysis Framework for Cyber Physical Systems: A Conceptual Approach. 613-626 - Ali Daud
, Khameis Mohamed Al Abdouli, Afzal Badshah
:
Emerging Computing Tools for Emergency Management: Applications, Limitations and Future Prospects. 627-644 - Muhammad Tariq Shaheen
, Hafsa Iqbal
, Numan Khurshid
, Haleema Sadia
, Nasir Saeed
:
SwinSegFormer: Advancing Aerial Image Semantic Segmentation for Flood Detection. 645-657 - Sadeep Batewela
, Pasika Ranaweera
, Madhusanka Liyanage
, Engin Zeydan
, Mika Ylianttila
:
Addressing Security Orchestration Challenges in Next-Generation Networks: A Comprehensive Overview. 669-687 - Tatsuya Amano
, Hirozumi Yamaguchi
, Teruo Higashino
:
Reference-Free 3D WiFi AP Localization by Outdoor-to-Indoor Bridging. 688-700 - Aniruddha Mukherjee, Vikas Hassija, Vinay Chamola, Karunesh Kumar Gupta:
A Detailed Comparative Analysis of Automatic Neural Metrics for Machine Translation: BLEURT & BERTScore. 658-668 - Syed Hussain Ali Kazmi, Faizan Qamar, Rosilah Hassan, Kashif Nisar:
FOCC: A Synthetically Balanced Federated One-Class-Classification for Cyber Threat Intelligence in Software Defined Networking. 701-713 - Lyhour Hak, Somchart Fugkeaw:
SSL-XIoMT: Secure, Scalable, and Lightweight Cross-Domain IoMT Sharing With SSI and ZKP Authentication. 714-725 - Shahariar Hossain Mahir, Md. Tanjum An Tashrif, Md. Ahsan Karim, Dipanjali Kundu, Anichur Rahman, Md. Amir Hamza, Fahmid Al Farid, Abu Saleh Musa Miah, Sarina Mansor:
Advanced Hydro-Informatic Modeling Through Feedforward Neural Network, Federated Learning, and Explainable AI for Enhancing Flood Prediction. 726-738 - Neena Aloysius, Madathilkulangara Geetha, Prema Nedungadi:
Optimized Multi-Modal Conformer-Based Framework for Continuous Sign Language Recognition. 739-749 - Mir Nafiul Nagib, Rahat Pervez, Afsana Alam Nova, Hadiur Rahman Nabil, Zeyar Aung, Muhammad Firoz Mridha:
TuSegNet: A Transformer-Based and Attention-Enhanced Architecture for Brain Tumor Segmentation. 750-761 - Mohammed Al-Shalabi, Mohammed A. Mahdi, Malik Braik, Mohammed Azmi Al-Betar, Shahanawaj Ahamad, Sawsan A. Saad:
Opposition-Based White Shark Optimizer for Optimizing Modified EfficientNetV2 in Road Crack Classification. 762-775 - Eugene Casmin, Miriam Rodrigues, Américo Alves, Rodolfo Oliveira:
Comparison of Deep Learning Techniques for RF-Based Human Posture Detection Systems. 776-788 - Van-Nhan Tran, Hoanh-Su Le, Piljoo Choi, Suk-Hwan Lee, Ki-Ryong Kwon:
MEViT: Generalization of Deepfake Detection With Meta-Learning EfficientNet Vision Transformer. 789-800 - Borja Arroyo Galende, Patricia A. Apellániz, Juan Parras, Santiago Zazo, Silvia Uribe:
Membership Inference Attacks and Differential Privacy: A Study Within the Context of Generative Models. 801-811 - Josue Genaro Almaraz-Rivera, Jose Antonio Cantoral-Ceballos, Juan Felipe Botero, Francisco Javier MuñOz, Brian David Martinez:
Hyphatia: A Card-Not-Present Fraud Detection System Based on Self-Supervised Tabular Learning. 812-821 - Mariana Cunha, Ricardo Mendes, Yves-Alexandre de Montjoye, João P. Vilela:
WiFi-Based Location Tracking: A Still Open Door on Laptops. 822-833 - Badiea Abdulkarem Mohammed, Himanshu Dhumras, Varun Shukla, Rakesh Kumar Bajaj, Zeyad Ghaleb Al-Mekhlafi:
Innovative Evaluation Framework for Consumer Electronics-Enabled Intelligent Transportation Systems: Leveraging $q$-Rung Picture Fuzzy Hypersoft Schweizer-Sklar Aggregation Operators. 834-845 - Saddam Hussain, Ali Tufail, Haji Awg Abdul Ghani Naim, Muhammad Asghar Khan, Gordana Barb:
Evaluation of Computationally Efficient Identity-Based Proxy Signatures. 846-861 - Abualsoud Hanani, Alaa R. Isaac, Abdallatif S. Abu-Issa:
Automatic Classifying of Requirements-Relevant Contents From App Reviews in the Arabic Language. 862-873

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
