Advanced Search

  • SEARCHING...
  • SEARCHING...

Detail Record


XML

IEEE Open Journal of the Computer Society, Vol. 2, 2021

EDITORIAL
EIC Editorial. --S. Guo.

PAPERS
1. Packet Loss Recovery in Broadcast for Real-Time Applications in Dense Wireless Networks. --A. Arefi and M. Khabbazian.
2. A Novel Intrusion Detection Model for Detecting Known and Innovative Cyberattacks Using Convolutional Neural Network. --S. Ho, S. A. Jufout, K. Dajani, and M. Mozumdar.
3. A Hardware/Software Co-Design Methodology for Adaptive Approximate Computing in clustering and ANN Learning. --P. Huang, C. Wang, W. Liu, F. Qiao, and F. Lombardi.
4. Real-Time Cost Minimization of Fog Computing in Mobile-Base-Station Networked Disaster Areas. --M. C. Meyer, Y. Wang, and T. Watanabe.
5. Multi-View Deep Learning Framework for Predicting Patient Expenditure in Healthcare. --X. Zeng, S. Lin, and C. Liu.
6. A Survey on Privacy-Preserving Blockchain Systems (PPBS) and a Novel PPBS-Based Framework for Smart Agriculture. --Q. N. Tran, B. P. Turnbull, H.-T. Wu, A. J. S. de Silva, K. Kormusheva, and J. Hu.
7. A Routing Protocol for UAV-Assisted Vehicular Delay Tolerant Networks. --Z. Du, C. Wu, T. Yoshinaga, X. Chen, X. Wang, K.-L. A. Yau, and Y. Ji.
8. Privacy Preserved Cyber-Physical Searching for Information-Centric Intelligent Agriculture. --L. Ding, J. Wu, X. Zhang, J. Li, and J. Ma.
9. SPARC: Statistical Performance Analysis With Relevance Conclusions. --J. C. Tullos, S. R. Graham, J. D. Jordan, and P. R. Patel.
10. Efficient Authentication Protocol for Continuous Monitoring in Medical Sensor Networks. --B. Ying, N. R. Mohsen, and A. Nayak.
11. A Machine Learning Based Monitoring Framework for Side-Channel Information Leaks. --M. Lescisin and Q. H. Mahmoud.
12. On Credibility-Based Service Function Chain Deployment. --W. Fan, Q. Cui, X. Li, X. Huang, and X. Tao.
13. Blockchain Platform For COVID-19 Vaccine Supply Management. --C. Antal, T. Cioara, M. Antal, and I. Anghel.
14. Biometrics and Privacy-Preservation: How Do They Evolve?. --Q. N. Tran, B. P. Turnbull, and J. Hu.
15. Multi-Channel Blockchain Scheme for Internet of Vehicles. --L. Gao, C. Wu, T. Yoshinaga, X. Chen, and Y. Ji.
16. From Technology to Society: An Overview of Blockchain-Based DAO. --L. Liu, S. Zhou, H. Huang, and Z. Zheng.
17. Speaker Identification for Business-Card-Type Sensors. --S. Yamaguchi, R. Oshima, J. Oshima, R. Shiina, T. Fujihashi, S. Saruwatari, and T. Watanabe.
18. Lattice: A Vision for Machine Learning, Data Engineering, and Policy Considerations for Digital
Agriculture at Scale. --S. Chaterji, N. DeLay, J. Evans, N. Mosier, B. Engel, D. Buckmaster, M. R. Ladisch, and R. Chandra.
19. Security Enhanced Emergency Situation Detection System for Ambient Assisted Living. --P. Shabisha, C. Sandeepa, C. Moremada, N. Dissanayaka, T. Gamage, A. Braeken, K. Steenhaut, and M. Liyanage.
20. Ensemble Deep Learning Assisted VNF Deployment Strategy for Next-Generation IoT Services. --M. Emu and S. Choudhury.
21. QuadScatter: Computational Efficiency in Simultaneous Transmissions for Large-Scale IoT Backscatter Networks. --O. Zeba, K. Hayashi, K. Kizaki, S. Saruwatari, and T. Watanabe.
22. PERIDOT: Modeling Execution Time of Spark Applications. --S. Shah, Y. Amannejad, D. Krishnamurthy, and M. Wang.
23. Optimal Resource Allocation for Multimedia Applications Offloading in Mobile Edge Computing. --G. Chen, L. Zhao, X. Li, F. Zhao, and X. Zeng.
24. A Survey on 2D and 3D Contactless Fingerprint Biometrics: A Taxonomy, Review, and Future
Directions. --X. Yin, Y. Zhu, and J. Hu.
25. Image Impulse Noise Removal Using Cascaded Filtering Based on Overlapped Adaptive Gaussian Smoothing and Convolutional Refinement Networks. --Y.-T. Peng and S.-W. Huang.
26. Link Scheduling and End-to-End Throughput Optimization in Wireless Multi-Hop Networks. --F. Ge, L. Tan, W. Zhang, M. Liu, X. Gao, and J. Luo.
27. Covert Timing Channels Detection Based on Auxiliary Classifier Generative Adversarial Network. --C. Sun, Y. Chen, H. Tian, and S. Wu.

SPECIAL SECTION PAPERS
Artificial Intelligence and Machine Learning for Future Networking

1. Deep Reinforcement Learning Empowered Adaptivity for Future Blockchain Networks. --C. Qiu, X. Ren, Y. Cao, and T. Mai.

Blockchain Intelligence: Technologies and Applications

1. Crypto Pharmacy – Digital Medicine: A Mobile Application Integrated With Hybrid Blockchain
to Tackle the Issues in Pharma Supply Chain. --G. Subramanian, A. S. Thampy, N. V. Ugwuoke, and B. Ramnani.

Cybersecurity: Privacy, Attack, and Defense
1. A Trust Based Scheme to Protect 5G UAV Communication Networks. --Y. Su.

Emerging Techniques for Future Smart Cities after COVID-19
1. Toward Agile Information and Communication Framework for the Post-COVID-19 Era. --C. Wu, C. Peng, Z. Du, L. Gao, T. Yoshinaga, and Y. Ji.

Resource Management in UAV-Assisted Systems
1. Joint Computation Offloading, Channel Access and Scheduling Optimization in UAV Swarms: A
Game-Theoretic Learning Approach. --R. Chen, L. Cui, M. Wang, Y. Zhang, K. Yao, Y. Yang, and C. Yao.

Ubiquitous Machine Learning over Beyond 5G/6G Networks
1. Concentrated Differentially Private Federated Learning With Performance Analysis. --R. Hu, Y. Guo, and Y. Gong.
2. DRESIA: Deep Reinforcement Learning-Enabled Gray Box Approach for Large-Scale Dynamic Cyber-Twin System Simulation. --Z. Lin, K. Li, Y. Yang, F. Sun, L. Wu, P. Shi, S. Ci, and Y. Zuo.
Arefi, A. - Personal Name
Antal, C. - Personal Name
Lescisin, M. - Personal Name
Ying, B. - Personal Name
Tullos, J. C. - Personal Name
Ding, L. - Personal Name
Tran, Q. N. - Personal Name
Zeng, X. - Personal Name
Meyer, M. C. - Personal Name
Huang, P. - Personal Name
S. Ho - Personal Name
Gao, L. - Personal Name
Vol. 2, 2021
2644-1268
e-Journal PTI
Inggris
IEEE Xplore
2020
United States of America
LOADING LIST...
LOADING LIST...