


default search action
IEEE Open Journal of the Computer Society, Volume 6
Volume 6, 2025
- Vincenzo Piuri
:
New Incoming EIC Editorial. 2-3 - Prabadevi Boopathy
, Natarajan Deepa
, Praveen Kumar Reddy Maddikunta
, Nancy Victor
, Thippa Reddy Gadekallu
, Gokul Yenduri
, Wei Wang
, Quoc-Viet Pham
, Thien Huynh-The
, Madhusanka Liyanage
:
The Metaverse for Industry 5.0 in NextG Communications: Potential Applications and Future Challenges. 4-24 - Hrishikesh Joshi
:
Emerging Technologies Driving Zero Trust Maturity Across Industries. 25-36 - Xiangyi Meng
, Yuefeng Du
, Cong Wang
:
ECMO: An Efficient and Confidential Outsourcing Protocol for Medical Data. 37-48 - Adeel Ashraf Cheema
, Muhammad Shahzad Sarfraz
, Usman Habib
, Qamar Uz Zaman
, Ekkarat Boonchieng
:
CD-LLMCARS: Cross Domain Fine-Tuned Large Language Model for Context-Aware Recommender Systems. 49-59 - Li Kang
, Chuanghong Zhao
, Jianjun Huang
:
Object Re-Identification Based on Federated Incremental Subgradient Proximal Optimization. 60-71 - Marta Rey-Paredes
, Carlos J. Pérez
, Alfonso Mateos Caballero
:
Time Series Classification of Raw Voice Waveforms for Parkinson's Disease Detection Using Generative Adversarial Network-Driven Data Augmentation. 72-84 - Haoxuan Liu
, Vasu Singh
, Michal Filipiuk
, Siva Kumar Sastry Hari
:
ALBERTA: ALgorithm-Based Error Resilience in Transformer Architectures. 85-96 - Hussien AbdelRaouf
, Mostafa M. Fouda
, Mohamed I. Ibrahem
:
Revolutionizing User Authentication Exploiting Explainable AI and CTGAN-Based Keystroke Dynamics. 97-108 - Yazan Dayoub
, Andrey V. Savchenko
, Ilya Makarov
:
Boosting Depth Estimation for Self-Driving in a Self-Supervised Framework via Improved Pose Network. 109-118 - Mahzabeen Emu
, Taufiq Rahman
, Salimur Choudhury
, Kai Salomaa
:
Quantum Long Short-Term Memory-Assisted Optimization for Efficient Vehicle Platooning in Connected and Autonomous Systems. 119-128 - Jungpil Shin
, Abu Saleh Musa Miah
, Yuta Kaneko
, Najmul Hassan
, Hyoun-Sup Lee, Si-Woong Jang
:
Multimodal Attention-Enhanced Feature Fusion-Based Weakly Supervised Anomaly Violence Detection. 129-140 - Xinguang Zhang
, Shiyang Chen, Zhouhang Shao, Yongjie Niu
, Li Fan:
Enhanced Lithographic Hotspot Detection via Multi-Task Deep Learning With Synthetic Pattern Generation. 140-151 - Luigi Serreli
, Claudio Marche
, Michele Nitti
:
Reducing Data Volume in News Topic Classification: Deep Learning Framework and Dataset. 152-163 - Pedro Conde
, Rui L. Lopes
, Cristiano Premebida
:
Improving Accuracy and Calibration of Deep Image Classifiers With Agreement-Driven Dynamic Ensemble. 164-175 - Xu Wang
, Qisheng Xu
, Kele Xu
, Ting Yu
, Bo Ding
, Dawei Feng
, Yong Dou
:
Large Pretrained Foundation Model for Key Performance Indicator Multivariate Time Series Anomaly Detection. 176-187 - Bivin Pradeep
, Parag Kulkarni
, Farman Ullah
, Abderrahmane Lakas
:
Energy Use and Demand Prediction Using Time-Series Deep Learning Forecasting Techniques: Application for a University Campus. 189-198 - Aleksandar Jevremovic
, Zona Kostic
, Ivan Chorbev
, Dragan Perakovic
, Andrii Shalaginov, Ivan Cvitic:
Energy Efficiency of Kernel and User Space Level VPN Solutions in AIoT Networks. 199-210 - Alain Hadges
, Srikar Bellur:
Statistical Validity of Neural-Net Benchmarks. 211-222 - Shadi Jaradat
, Mohammed Elhenawy
, Huthaifa I. Ashqar, Alexander Paz
, Richi Nayak
:
Leveraging Deep Learning and Multimodal Large Language Models for Near-Miss Detection Using Crowdsourced Videos. 223-235 - Mohammad Hassan Adeli
, Dariush Abbasi-Moghadam
, Hossein Fotouhi
, Seyed Mohammad Razavizadeh
:
Optimizing Energy Efficiency in UPA-Assisted SWIPT Massive MIMO Systems Over Rician Fading Channels. 236-247 - Abdessamad Benlahbib
, Achraf Boumhidi
, Anass Fahfouh
, Hamza Alami
:
Comparative Analysis of Traditional and Modern NLP Techniques on the CoLA Dataset: From POS Tagging to Large Language Models. 248-260 - Lerina Aversano, Martina Iammarino
, Antonella Madau
, Giuseppe Pirlo
, Gianfranco Semeraro
:
What Time Is It? Finding Which Temporal Features is More Useful for Next Activity Prediction. 261-271 - Yi Xu
, Zhigang Chen
, Ming Zhao
, Fengxiao Tang
, Yangfan Li
, Jiaqi Liu
, Nei Kato
:
UVtrack: Multi-Modal Indoor Seamless Localization Using Ultra-Wideband Communication and Vision Sensors. 272-281 - Shuo Pei
, Jiajia Wang
, Yunlong Yang, Anyang Dong
, Bingqi Guo, Junlong Guo
, Yufeng Yao
:
A Human-Centered Kinematics Design Optimization of Upper Limb Rehabilitation Exoskeleton Based on Configuration Manifold. 282-293 - Xin Yuan
, Chenhui Wang, Xiaohong Chen, Mingxuan Wang, Ning Li
, Changli Yu
:
IGFU: A Hybrid Underwater Image Enhancement Approach Combining Adaptive GWA, FFA-Net With USM. 294-306 - Shreyan Prakash
, Raj Bhattacherjee
, Sainath Bitragunta
, Ashutosh Bhatia
, Kamlesh Tiwari
:
Quantum Computing-Accelerated Kalman Filtering for Satellite Clusters: Algorithms and Comparative Analysis. 307-316 - Rola Abdallah
, Mohamed Atef
, Nasir Saeed
:
Hybrid POF-VLC Systems: Recent Advances, Challenges, Opportunities, and Future Directions. 317-335 - Francesco Castro
, Donato Impedovo
, Giuseppe Pirlo
:
An Efficient and Privacy-Preserving Federated Learning Approach Based on Homomorphic Encryption. 336-347 - Aliya Tabassum
, Ezieddin Elmahjub
, Aasim I. Padela
, Andrej Zwitter
, Junaid Qadir
:
Generative AI and the Metaverse: A Scoping Review of Ethical and Legal Challenges. 348-359 - Farid Binbeshr
, Muhammad Imam
, Mustafa Ghaleb
, Mosab Hamdan
, Mussadiq Abdul Rahim, Mohammad Hammoudeh
:
The Rise of Cognitive SOCs: A Systematic Literature Review on AI Approaches. 360-379 - Md Al Rafi
, Gourab Nicholas Rodrigues
, Md Nazmul Hossain Mir
, Md Shahriar Mahmud Bhuiyan
, Muhammad Firoz Mridha
, Md. Rashedul Islam
, Yutaka Watanobe
:
A Hybrid Temporal Convolutional Network and Transformer Model for Accurate and Scalable Sales Forecasting. 380-391 - K. Sasikumar
, Sivakumar Nagarajan
:
Enhancing Cloud Security: A Multi-Factor Authentication and Adaptive Cryptography Approach Using Machine Learning Techniques. 392-402 - Song Guo:
Editorial: Gratitude, Reflection, and Celebration: My Tenure as EiC Comes to a Close. 1 - Yu Gong
, Muhan Shi, Dongli Han
:
Annual Report Text Information and Credit Rating Based on the Perspective of Readability. 403-412 - Ziyao Liu
, Huanyi Ye
, Chen Chen
, Yongsen Zheng
, Kwok-Yan Lam
:
Threats, Attacks, and Defenses in Machine Unlearning: A Survey. 413-425 - Ammar Elnour
, Wencheng Yang
, Yan Li
:
Nonparametric Bootstrap Likelihood Estimation to Investigate the Chance Set-Up on Clustering Results. 438-448 - Zijian Gao
, Bo Liu
, Kele Xu
, Xinjun Mao
, Huaimin Wang
:
Correlation-Based Knowledge Distillation in Exemplar-Free Class-Incremental Learning. 449-459 - Zhibo Zhang
, Benjamin P. Turnbull
, Shabnam Kasra Kermanshahi, Hemanshu Roy Pota
, Jiankun Hu:
UNSW-MG24: A Heterogeneous Dataset for Cybersecurity Analysis in Realistic Microgrid Systems. 543-553 - Sadeep Batewela
, Madhusanka Liyanage
, Engin Zeydan
, Mika Ylianttila
, Pasika Ranaweera
:
Security Orchestration in 5G and Beyond Smart Network Technologies. 554-573 - Saad Hameed
, Basheer Qolomany
, Samir Brahim Belhaouari
, Mohamed M. Abdallah
, Junaid Qadir
, Ala I. Al-Fuqaha
:
Large Language Model Enhanced Particle Swarm Optimization for Hyperparameter Tuning for Deep Learning Models. 574-585 - Ankit Agrawal
, Ashutosh Bhatia
, Kamlesh Tiwari
:
Sybil-Resilient Publisher Selection Mechanism in Blockchain-Based MCS Systems. 586-598 - Kasem Khalil
, Ashok Kumar
, Magdy A. Bayoumi
:
An Efficient Neural Cell Architecture for Spiking Neural Networks. 599-612 - Alhassan Abdulhamid
, Sohag Kabir
, Ibrahim Ghafir
, Ci Lei
, Khalil M. El Hindi, Mohammad Hammoudeh
:
Quantitative Cybersecurity Analysis Framework for Cyber Physical Systems: A Conceptual Approach. 613-626 - Ali Daud
, Khameis Mohamed Al Abdouli, Afzal Badshah
:
Emerging Computing Tools for Emergency Management: Applications, Limitations and Future Prospects. 627-644 - Muhammad Tariq Shaheen
, Hafsa Iqbal
, Numan Khurshid
, Haleema Sadia
, Nasir Saeed
:
SwinSegFormer: Advancing Aerial Image Semantic Segmentation for Flood Detection. 645-657 - Sadeep Batewela
, Pasika Ranaweera
, Madhusanka Liyanage
, Engin Zeydan
, Mika Ylianttila
:
Addressing Security Orchestration Challenges in Next-Generation Networks: A Comprehensive Overview. 669-687 - Tatsuya Amano
, Hirozumi Yamaguchi
, Teruo Higashino
:
Reference-Free 3D WiFi AP Localization by Outdoor-to-Indoor Bridging. 688-700 - Aniruddha Mukherjee
, Vikas Hassija
, Vinay Chamola
, Karunesh Kumar Gupta
:
A Detailed Comparative Analysis of Automatic Neural Metrics for Machine Translation: BLEURT & BERTScore. 658-668 - Syed Hussain Ali Kazmi
, Faizan Qamar
, Rosilah Hassan
, Kashif Nisar:
FOCC: A Synthetically Balanced Federated One-Class-Classification for Cyber Threat Intelligence in Software Defined Networking. 701-713 - Lyhour Hak
, Somchart Fugkeaw
:
SSL-XIoMT: Secure, Scalable, and Lightweight Cross-Domain IoMT Sharing With SSI and ZKP Authentication. 714-725 - Shahariar Hossain Mahir, Md. Tanjum An Tashrif
, Md. Ahsan Karim
, Dipanjali Kundu, Anichur Rahman, Md. Amir Hamza, Fahmid Al Farid
, Abu Saleh Musa Miah
, Sarina Mansor
:
Advanced Hydro-Informatic Modeling Through Feedforward Neural Network, Federated Learning, and Explainable AI for Enhancing Flood Prediction. 726-738 - Neena Aloysius
, Madathilkulangara Geetha, Prema Nedungadi:
Optimized Multi-Modal Conformer-Based Framework for Continuous Sign Language Recognition. 739-749 - Mir Nafiul Nagib, Rahat Pervez, Afsana Alam Nova, Hadiur Rahman Nabil
, Zeyar Aung
, Muhammad Firoz Mridha
:
TuSegNet: A Transformer-Based and Attention-Enhanced Architecture for Brain Tumor Segmentation. 750-761 - Mohammed Al-Shalabi
, Mohammed A. Mahdi
, Malik Braik, Mohammed Azmi Al-Betar
, Shahanawaj Ahamad, Sawsan A. Saad:
Opposition-Based White Shark Optimizer for Optimizing Modified EfficientNetV2 in Road Crack Classification. 762-775 - Eugene Casmin
, Miriam Rodrigues, Américo Alves
, Rodolfo Oliveira
:
Comparison of Deep Learning Techniques for RF-Based Human Posture Detection Systems. 776-788 - Van-Nhan Tran
, Hoanh-Su Le
, Piljoo Choi
, Suk-Hwan Lee
, Ki-Ryong Kwon
:
MEViT: Generalization of Deepfake Detection With Meta-Learning EfficientNet Vision Transformer. 789-800 - Borja Arroyo Galende
, Patricia A. Apellániz
, Juan Parras
, Santiago Zazo, Silvia Uribe
:
Membership Inference Attacks and Differential Privacy: A Study Within the Context of Generative Models. 801-811 - Josue Genaro Almaraz-Rivera
, Jose Antonio Cantoral-Ceballos
, Juan Felipe Botero
, Francisco Javier MuñOz
, Brian David Martinez
:
Hyphatia: A Card-Not-Present Fraud Detection System Based on Self-Supervised Tabular Learning. 812-821 - Mariana Cunha
, Ricardo Mendes
, Yves-Alexandre de Montjoye
, João P. Vilela
:
WiFi-Based Location Tracking: A Still Open Door on Laptops. 822-833 - Badiea Abdulkarem Mohammed
, Himanshu Dhumras
, Varun Shukla
, Rakesh Kumar Bajaj
, Zeyad Ghaleb Al-Mekhlafi
:
Innovative Evaluation Framework for Consumer Electronics-Enabled Intelligent Transportation Systems: Leveraging $q$-Rung Picture Fuzzy Hypersoft Schweizer-Sklar Aggregation Operators. 834-845 - Saddam Hussain
, Ali Tufail, Haji Awg Abdul Ghani Naim, Muhammad Asghar Khan
, Gordana Barb
:
Evaluation of Computationally Efficient Identity-Based Proxy Signatures. 846-861 - Abualsoud Hanani
, Alaa R. Isaac, Abdallatif S. Abu-Issa
:
Automatic Classifying of Requirements-Relevant Contents From App Reviews in the Arabic Language. 862-873 - Yun-Wei Lin
, Yi-Bing Lin
, Yi-Feng Wu, Pei-Hsuan Shen:
VoiceTalk: A No-Code Approach for Creating Voice-Controlled Smart Home Applications. 874-883 - Selvarajah Thuseethan
, Sandipkumar Gangajaliya, Luke Hamlin, Bharanidharan Shanmugam
, Suresh Thennadil
:
Conv-Ensemble for Solar Power Prediction With First Nations Seasonal Information. 884-895 - Md Nazmul Hossain Mir
, Arindam Kishor Biswas
, Md Shariful Alam Bhuiyan, Md. Golam Rabbani Abir
, Muhammad Firoz Mridha
, Md. Jakir Hossen
:
ABMF-Net: An Attentive Bayesian Multi-Stage Deep Learning Model for Robust Forecasting of Electricity Price and Demand. 896-907 - Mustafa Ghaleb
, Mosab Hamdan
, Abdulaziz Y. Barnawi
, Muhammad Liman Gambo
, Abubakar Danasabe
, Saheed A. Bello
, Aliyu Habib
:
Explainable AI for Lightweight Network Traffic Classification Using Depthwise Separable Convolutions. 908-920 - Alemayehu Tilahun Haile
, Surafel Lemma Abebe
, Henock Mulugeta Melaku
:
Real-Time Automated Cyber Threat Classification and Emerging Threat Detection Framework. 921-930 - MD Azam Khan
, Arifur Rahman
, Farhad Uddin Mahmud
, Kanchon Kumar Bishnu
, Hadiur Rahman Nabil
, Muhammad Firoz Mridha
, Md. Jakir Hossen
:
A Physics-Guided Bayesian Neural Network for Sensor Fault Detection in Wind Turbines. 931-942 - Mahanur Alam
, Md. Johirul Islam Tutul
, Md. Anwar Hussen Wadud, Md. Jakir Hossen
, Muhammad Firoz Mridha
:
Bilingual Bangla OCR for Rural Empowerment: Detecting Handwritten Queries and Agricultural Assistance. 943-954 - Loreen Mahmoud
, Madhusanka Liyanage
, Jitin Singla
, Sugata Gangopadhyay
:
DSEM-NIDS: Enhanced Network Intrusion Detection System Using Deep Stacking Ensemble Model. 955-967 - Nuttapong Attrapadung
, Reo Eriguchi
, Goichiro Hanaoka
, Takahiro Matsuda
, Naohisa Nishida
, Tatsumi Oba
, Jacob C. N. Schuldt
, Koki Tejima, Tadanori Teruya
, Yuji Unagami
, Naoto Yanai
:
Fast and Private 1-to-$N$ Face Identification Protocols. 968-986 - Kailash Gogineni
, Ali Suvizi
, Guru Venkataramani
:
LLMs on a Budget: System-Level Approaches to Power-Efficient and Scalable Fine-Tuning. 987-1000 - Yomna Mohamed
, Mostafa M. Fouda
, Zubair Md Fadlullah
, Rabab Abdelfattah
, Mohamed I. Ibrahem
:
BOL-LPP: A Bayesian-Optimized LSTM Model for Day-Ahead Load Price Forecasting in the ERCOT Market. 1001-1011 - Isaac Ampratwum, Amiya Nayak
:
Hybrid Approach for WDM Network Restoration: Deep Reinforcement Learning and Graph Neural Networks. 1012-1026 - Hanyue Xu
, Kah Phooi Seng
, Kenneth Li-Minn Ang
, Wei Wang
, Jeremy Smith:
Graph Split Federated Learning for Distributed Large-Scale AIoT in Smart Cities. 1027-1040 - Leandro Honorato de Souza Silva
, Agostinho Freire, George O. de A. Azevedo
, Sérgio Campello Oliveira
, Carlo Marcelo Revoredo da Silva
, Bruno J. T. Fernandes
:
GEN Self-Labeling Object Detector for PCB Recycling Evaluation. 1041-1052 - Md Shahin Alam Mozumder, Mohammad Balayet Hossain Sakil, Md Rokibul Hasan, Md Amit Hasan, K. M. Nafiur Rahman Fuad
, M. F. Mridha
, Md. Rashedul Islam
, Yutaka Watanobe
:
Hybrid Contrastive Learning With Attention-Based Neural Networks for Robust Fraud Detection in Digital Payment Systems. 1053-1064 - Safa Ben Atitallah
, Maha Driss
, Wadii Boulila
, Anis Koubaa:
Securing Industrial IoT Environments: A Fuzzy Graph Attention Network for Robust Intrusion Detection. 1065-1076 - Chih-Lyang Hwang
, Felix Gunawan
, Chih-Han Chen
:
Squeeze-Excitation Transformer With Residual Bi-GRU Model for Distributed UWB Based Continuous Gesture Recognition and its Application to Human-UAV Interactions. 1077-1089 - Gayathri Ramasamy
, Tripty Singh
, Xiaohui Yuan
, Ganesh R. Naik
:
Deep TPS-PSO: Hybrid Deep Feature Extraction and Global Optimization for Precise 3D MRI Registration. 1090-1099 - Samir Abdaljalil
, Hasan Kurban
, Rachad Atat
, Erchin Serpedin
, Khalid A. Qaraqe
:
Deep Temporal and Structural Embeddings for Robust Unsupervised Anomaly Detection in Dynamic Graphs. 1100-1109 - Amine Haboub
, Hamza Baali
, Abdesselam Bouzerdoum
:
DCT-Based Channel Attention for Multivariate Time Series Classification. 1110-1120 - Kiara Nand, Zhibo Zhang
, Jiankun Hu
:
A Comprehensive Survey on the Usage of Machine Learning to Detect False Data Injection Attacks in Smart Grids. 1121-1132 - Kashish D. Shah
, Dhaval K. Patel
, Brijesh Soni
, Siddhartan Govindasamy
, Mehul S. Raval
, Mukesh A. Zaveri:
Dynamic Spectrum Coexistence of NR-V2X and Wi-Fi 6E Using Deep Reinforcement Learning. 1133-1145 - Tuan Hai Vu
, Vu Trung Duong Le
, Hoai Luan Pham
, Yasuhiko Nakashima
:
Benchmarking Variants of the Adam Optimizer for Quantum Machine Learning Applications. 1146-1154 - Mohammad Ennab
, Hamid Mcheick:
Enhancing Pneumonia Diagnosis Through AI Interpretability: Comparative Analysis of Pixel-Level Interpretability and Grad-CAM on X-ray Imaging With VGG19. 1155-1165 - Jialei Cao
, Wenxia Zheng, Yao Ge, Jiyuan Wang
:
DriftShield: Autonomous Fraud Detection via Actor-Critic Reinforcement Learning With Dynamic Feature Reweighting. 1166-1177 - Najah AbuAli
, Ihtesham Jadoon, Farman Ullah
, Mohammad Hayajneh
, Shayma Alkobaisi
:
Radio Frequency Sensing-Based Human Emotion Identification by Leveraging 2D Transformation Techniques and Deep Learning Models. 1178-1189 - Muhammad Ashraf, Adnan Nadeem, Oussama Benrhouma, Muhammad Sarim, Kashif Rizwan, Amir Mehmood:
A Robust Cross-Channel Image Watermarking Technique for Tamper Detection and its Precise Localization. 1202-1213 - Sunil Prajapat
, Pankaj Kumar
, Kashish Chaudhary, Kranti Kumar, Gyanendra Kumar
, Ali Kashif Bashir
:
A Robust Image Encryption Protocol for Secure Data Sharing in Brain Computer Interface Applications. 1190-1201 - Seongho Kim
, Jihyun Moon
, Juntaek Oh
, Insu Choi
, Joon-Sung Yang
:
Survey and Evaluation of Converging Architecture in LLMs Based on Footsteps of Operations. 1214-1226 - Naeem Khan
, Shibli Nisar
, Muhammad Asghar Khan
, Yasar Abbas Ur Rehman, Fazal Noor
, Gordana Barb
:
Optimizing Federated Learning With Aggregation Strategies: A Comprehensive Survey. 1227-1247 - Abdulmalik Shehu Yaro
, Filip Maly, Pavel Prazak
, Karel Malý
:
Examining the Impact of Distance-Based Similarity Metrics on the Performance of Projected Clustering Algorithm for Fingerprint Database Clustering. 1248-1259 - Swapneel C. Mhatre
, Priya Chandran:
Simulators for Processors Used in Virtualization: A Survey. 1260-1270 - Ehtesham Iqbal
, Sirojbek Safarov
, Seongdeok Bang
, Sajid Javed
, Yahya H. Zweiri
, Yusra Abdulrahman
:
Few-Shot Segmentation Using Multi-Similarity and Attention Guidance. 1271-1282 - Arjun Kumar Bose Arnob
, Muhammad Mostafa Monowar
, Md. Abdul Hamid
, Muhammad Firoz Mridha
:
XPolypNet: A U-Net-Based Model for Semantic Segmentation of Gastrointestinal Polyps With Explainable AI. 1283-1293 - Nikolaos Makris, Stamatina K. Koutsileou, Nikolaos Mitrou:
A Probabilistic Method for Hierarchical Multisubject Classification of Documents Based on Multilingual Subject Term Vocabularies. 1294-1305 - Abdelkader Laouid
, Mostefa Kara
, Mohammad Hammoudeh
:
A New Cryptographic Frontier: Key-Independent Security and Post-Quantum Hardness Assumptions. 1306-1316 - Laura Rodríguez de Lope
, Víctor M. Maestre, Luis Díez, Alfredo Ortiz Fernández, Ramón Agüero
, Inmaculada Ortiz:
A Comprehensive AI-Based Digital Twin Model for Residential Hydrogen-Based Energy Systems. 1317-1328

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.