0% found this document useful (0 votes)
688 views44 pages

2025-2026 Cse Major Projects-Ai ML

Contact: 9581464142

Uploaded by

MAHESH REDDY
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
688 views44 pages

2025-2026 Cse Major Projects-Ai ML

Contact: 9581464142

Uploaded by

MAHESH REDDY
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd

QUANTUM COMPUTING PROJECT DOMAIN

IEEE TITLES
S.NO TITLES
1 A Survey on Real-Time Object Detection on FPGAs

2 Computer-Aided Quantum Algorithms for Real-Time Energy Market Trading

3 Kerr Microcombs in Integrated Waveguide Ring Resonators Enabled by Graphene Nonlinearity

4 Power Theft Detection in Smart Grids Using Quantum Machine Learning

NETWORKING AND NETWORK SECURITY UING PYTHON


S.NO TITLES
1 A Multi-Language Toolkit for the Semi-Automated Checking of Research Outputs

Model-Oriented Training of Coordinators of the Decentralized Control System of Technological


2
Facilities With Resource Interaction
Proof of Random Leader: A Fast and Manipulation-Resistant Proof-of-Authority Consensus
3
lgorithm for Permissioned Blockchains Using Verifiable Random Function

4 Secure Quantum Communication With Multi-Users in Quantum Networks

DATA ANALYSIS
S.NO TITLES
1 A Novel Hybrid Model for Credit Risk Assessment of Supply Chain Finance Based on Topological
Data Analysis and Graph Neural Network
2 A Two-Stage Method for Screening Pulse RFI in SAR Raw Data Alternating the Use of Time and
Frequency Domains
3 Application of Soft Computing for Prediction of Peripheral Neuropathy in T2DM-A Real-Time Data
Analysis
4 Hazard Analysis of Weather Conditions on Distribution Transformer Failures via Cox Proportional
Hazard Model
5 Integrating Travel Survey and Amap API Data Into Travel Mode Choice Analysis With Interpretable
Machine Learning Models: A Case Study in China
6 Loops: Leveraging Provenance and Visualization to Support Exploratory Data Analysis in
Notebooks
MODIFIED TITLES

Real-Time Object Detection on FPGAs: Bridging AI and Hardware for Intelligent


Systems
Fusing Quantum Intelligence with Real-Time Energy Trading: A Computer-Aided
Approach
Reconfigurable Kerr Microcombs through Graphene-Enabled Nonlinearity in
Integrated Photonic Circuits
Next-Gen Grid Protection: Power Theft Detection Using Quantum Machine Learning
Algorithms

Reliable Results Across Languages: Semi-Automated Checking of Research Outputs


Made Scalable
Training the Mind of the System: A Model-Based Approach to Decentralized
Control Coordination
PoRL: A Verifiable Random Function-Based Consensus for High-Speed,
Manipulation-Resistant Permissioned Blockchains
Securing the Quantum Internet: Multi-User Communication Protocols for Scalable
Quantum Networks

Topology Meets Graph Learning: A Novel Credit Risk Assessment Framework for
Supply Chain Finance
Adaptive RFI Mitigation in SAR: A Two-Stage Time–Frequency Domain Approach for
Pulse Interference
Early Detection of T2DM-Related Neuropathy: A Soft Computing-Based Clinical
Intelligence System
Climate Meets the Grid: Cox Proportional Hazard Modeling of Weather Impacts on
Transformer Reliability
Transparent Travel Modeling: Interpretable ML with Multi-Source Data Fusion for
Mode Choice Analysis
Exploring Better with Loops: Provenance-Enhanced Visual Analytics in
Computational Notebooks
ARTIFICIAL INTELLIGENCE
IEEE TITLES
S.NO TITLES
1 Digital Health: The Cybersecurity for AI-Based Healthcare Communication

A Huge Innovation in Diagnosis of Obstructive Sleep Apnea Syndrome: With an


2 Artificial Intelligence-Based Algorithm, Obstructive Sleep Apnea Syndrome Can
Now Be Diagnosed With Pulmonary Function Test

3 AI-Based Holistic Framework for Cyber Threat Intelligence Management

AI-Driven Meat Food Drying Time Prediction for Resource Optimization and
4
Production Planning in Smart Manufacturing
AI-Enhanced Robotic Process Automation: A Review of Intelligent Automation
5
Innovations

6 An Explainable Artificial Intelligence Model for the Classification of Breast Cancer

Application of Artificial Intelligence Virtual Image Technology in Photography Art


7
Creation Under Deep Learning
Application of CRNN and OpenGL in Intelligent Landscape Design Systems Utilizing
8 Internet of Things, Explainable Artificial Intelligence, and Unmanned Aerial
Vehicle Technology

9 Artificial Intelligence in Science and Society: The Vision of USERN

Children’s AI Design Platform for Making and Deploying ML-Driven Apps:


10
Design,Testing, and Development

11 Efficient Onboard Multitask AI Architecture Based on Self-Supervised Learning

End-to-End Stroke Imaging Analysis Using Effective Connectivity and Interpretable


12
Artificial Intelligence
Enhancing Gas Distribution Network Resilience Utilizing a Mixed Social Network
13
Analysis–Simulation Approach: Application of Artificial Intelligence
Evaluating Mathematical Problem-Solving Abilities of Generative AI Models:
14 Performance Analysis of o1-preview and gpt-4o Using the Korean College
Scholastic Ability Test
Explainable AI-Based Approach for Age-Related Macular Degeneration (AMD)
15
Detection via Fundus Imaging

Exploring Generative Adversarial Networks:Comparative Analysis of Facial Image


16
Synthesis and the Extension of Creative Capacities in Artificial Intelligence

Fiber Bragg Grating Sensors Combined With Artificial Intelligence for Noninvasive
17
Breast Tumor Identification
From ChatGPT to Sora: Analyzing Public Opinions and Attitudes on Generative
18
Artificial Intelligence in Social Media

19 From Hybrid to AI-First Innovation Management


Integrating Explainable Artificial Intelligence in Anomaly Detection for Threat
20
Management in E-Commerce Platforms
Integrating Explainable Artificial Intelligence With Advanced Deep Learning Model
21
for Crowd Density Estimation in Real-World Surveillance Systems
Mapping the Landscape of AI-Driven Human Resource Management: A Social
22
Network Analysis of Research Collaboration

23 Monitoring Bone Healing: Integrating RF Sensing With AI

Optimizing Secure AI Lifecycle Model Management With Innovative Generative AI


24
Strategies
Optimizing Security in IoT Ecosystems Using Hybrid Artificial Intelligence and
25
Blockchain Models: A Scalable and Efficient Approach for Threat Detection
Predicting Postoperative Re-Tear of Arthroscopic Rotator Cuff Repair Using
26
Artificial Intelligence on Imbalanced Data
Reconfigurable and Scalable Artificial Intelligence Acceleration Hardware
27
Architecture with RISC-V CNN Coprocessor for Real-time Seizure Detection
28 Satellite-Based Forest Stand Detection Using Artificial Intelligence

Simplified Physical Stability Assessment of Chilean Mine Waste Storage Facilities


29
Using GIS and AI: Application in the Antofagasta Region
Super-Resolution AI-Based Approach for Extracting Agricultural Cadastral Maps:
30
Form and Content Validation
TepiSense: A Social Computing-Based Real-Time Epidemic Surveillance System
31
Using Artificial Intelligence
Transformer-Driven Inverse Learning for AI-Powered Ceramic Material Innovation
32
With Advanced Data Preprocessing
33 Virtual Cities: From Digital Twins to Autonomous AI Societies

AI WITH PYTHON
IEEE TITLES
S.NO TITLES
Accelerating Euclidean Distance Transforms: A Fast and Flexible Approach With
1 Multi-Vendor GPU, Multi-Threading, and Multi-Language Support

2 AI-Based Holistic Framework for Cyber Threat Intelligence Management

3 Analysis of ChatGPT-Generated Codes Across Multiple Programming Languages


Analysis of the Influence of CT Imaging Conditions on the CT Image Features of
4 Pulmonary Nodule Phantoms

Blinder Oaxaca and Wilk Neutrosophic Fuzzy Set-Based IoT Sensor


5 Communication for Remote Healthcare Analysis
Comprehensive Review on the Exploitation of Advanced Memory Optimization
Strategies to Improve Performance for Convolutional and Spiking Neural
6 Networks in Medical Imaging Using Hardware Accelerators
Convolutional Neural Networks for Automatic Identification of Individuals at
7 Terrestrial Terminals

8 Descriptor: Deakin IoT Traffic (D-IoT)


Enhancing Cervical Cancer Classification: Through a Hybrid Deep Learning
9 Approach Integrating DenseNet201 and InceptionV3
Enhancing Fraud Detection in Banking With Deep Learning: Graph Neural
10 Networks and Autoencoders for Real-Time Credit Card Fraud Prevention
Evaluation of Generative AI Models in Python Code Generation: A Comparative
11 Study
Exploring the Potential of Offline LLMs in Data Science: A Study on Code
12 Generation for Data Analysis

13 Fuzzy Logic Recommender Model for Housing


Leveraging Large Language Models for Enhanced Back-Translation: Techniques
14 and Applications
Machine Learning Evaluation Metric Discrepancies Across Programming
Languages and Their Components in Medical Imaging Domains: Need for
15 Standardization
Optimizing Pre-Trained Code Embeddings With Triplet Loss for Code Smell
16 Detection
PokerKit: A Comprehensive Python Library for Fine-Grained Multivariant Poker
17 Game Simulations
Recognizing Supporting Standpoints for Online Restaurant Reviews: Evidence
18 From Tripadvisor
MODIFIED TITLES

Securing the Future of Care: Cybersecurity in AI-Driven Digital Health


Communication Networks

AI Revolutionizes OSAS Diagnosis: From Sleep Labs to Lung Function Tests

Cognitive Cybersecurity: An AI-Centric Approach to Threat Intelligence


Management
Machine Learning for Meat Drying Time Prediction: A Smart Manufacturing
Perspective
Revolutionizing Automation: A Survey on AI-Enhanced RPA for Smart
Business Processes
Explainable Deep Learning for Breast Cancer Detection: Bridging Accuracy
and Interpretability
Photographic Innovation in the AI Era: Virtual Image Art Creation Powered by
Deep Learning

Designing the Future: An IoT-Driven, CRNN and OpenGL-Based Landscape


Architecture System with XAI and UAV Support

Shaping the Future: The USERN Perspective on Artificial Intelligence in


Science and Society
Machine Learning Made Child’s Play: A Platform for Designing and Deploying
AI Apps by Young Innovators
Self-Supervised Synergy: Toward Efficient Multitask AI Architectures for
Onboard Intelligence
Decoding Stroke Pathways: End-to-End Imaging Analysis with Effective
Connectivity and XAI Integration
Modeling Resilience: An AI-Powered Approach to Gas Distribution Using
Social Network Analysis and Simulation

Cracking the Korean CSAT: A Comparative Analysis of o1-preview and GPT-4o


in Mathematical Reasoning

Illuminating the Diagnosis: Fundus Image-Based AMD Detection with


Explainable Artificial Intelligence

Generative Intelligence Unveiled: A Comparative Study on GANs for Facial


Image Synthesis and AI Creativity

Precision Without Invasion: A Hybrid AI-FBG Sensor Approach to Breast


Tumor Identification
Echoes Online: Exploring Public Opinion on Generative AI from ChatGPT to
Sora via Social Media Analytics
The Rise of AI-First Innovation: From Collaborative Hybrids to Autonomous
Intelligence
Secure Commerce with Transparent Intelligence: XAI-Enabled Anomaly
Detection for Threat Mitigation
Explainable Crowd Counting: AI-Powered Density Estimation for Smarter
Surveillance Systems
Charting Connections: A Social Network Analysis of Research Collaboration in
AI-Driven Human Resource Management
Wireless Intelligence: Monitoring Bone Regeneration Using RF Sensing and
Artificial Intelligence
AI Building AI: Generative Approaches to Secure, Automated Lifecycle
Management of AI Models
Cognitive Chains: Hybrid AI and Blockchain Models for Efficient and Scalable
IoT Threat Detection
Smart Surgery Follow-Up: Using Artificial Intelligence to Predict Rotator Cuff
Re-Tear in Imbalanced Datasets
Intelligent Hardware for Brain Health: Scalable AI Acceleration with RISC-V
CNN Coprocessors for Seizure Detection
Seeing the Forest from Space: AI-Based Satellite Analytics for Sustainable
Stand Identification
Toward Predictive Mining Safety: AI-Enhanced GIS Tools for Assessing Waste
Storage Stability in Chile
High-Definition Agriculture: A Super-Resolution AI Approach to Extract and
Validate Cadastral Maps
Social Sensing for Public Health: TepiSense AI System for Real-Time Epidemic
Tracking
Revolutionizing Ceramic Design: A Transformer-Driven Approach to Inverse
Learning and Data Optimization
Digital Twins to AI Societies: Reimagining Urban Futures in Virtual Cities

TH PYTHON
MODIFIED TITLES

Blazing Fast Euclidean Distance Transforms: A Scalable Approach with Multi-


GPU and Multi-Language Integration
Adaptive Threat Intelligence: An AI-Integrated Holistic Framework for
Modern Cybersecurity Challenges
Multi-Language Code Generation with ChatGPT: Insights into AI’s Cross-
Linguistic Programming Abilities
CT Imaging Conditions Under the Microscope: Their Role in Shaping
Pulmonary Nodule Phantom Features

A Neutrosophic Fuzzy IoT Framework for Remote Healthcare: Enhancing


Analysis with Blinder-Oaxaca and Wilk Models

Efficient Brains for Digital Medicine: Memory-Centric Optimization of CNNs


and SNNs Using Hardware Accelerators

Convolutional Neural Networks in Motion: Automating Passenger


Identification at Terrestrial Terminals
Smart Mobility with D-IoT: An IoT-Based Traffic Sensing and Optimization
System
Hybrid Deep Learning for Women’s Health: DenseNet201 and InceptionV3
Integration in Cervical Cancer Screening
Banking on Trust: Deep Learning-Driven Fraud Detection with Graph Neural
Networks and Autoencoders
CodeCraft: Benchmarking Generative AI Performance in Python Development
Environments
Edge-AI for Data Science: Assessing Offline LLMs in Python Code Generation
and Analysis Tasks
Precision in Preference: Housing Recommendation Using Fuzzy Logic Decision
Modeling
Translating Twice, Thinking Once: Leveraging LLMs for Smarter Back-
Translation Strategies

Fragmented Metrics: The Urgent Need for Standardizing ML Evaluation


Across Programming Ecosystems in Medical Imaging

Embedding Quality, Detecting Flaws: A Triplet Loss Framework for Code


Smell Detection
PokerKit Unveiled: Fine-Grained Poker Game Simulation Across Variants with
Python

Review Intelligence: Argument Mining in Tripadvisor Restaurant Feedback


MACHINE LEARNING
IEEE TITLES
S.NO TITLES
A Cloud-Based Optimized Ensemble Model for Risk Prediction of Diabetic Progression—An
1
Azure Machine Learning Perspective
A Data-Driven Approach to Engineering Instruction: Exploring Learning Styles, Study Habits,
2
and Machine Learning

3 A Hybrid Machine Learning Model for Efficient XML Parsing

A New Heterogeneous Hybrid Massive MIMO Receiver With an Intrinsic Ability of Removing
4
Phase Ambiguity of DOA Estimation via Machine Learning

A Nonintrusive Nonlinear Model Reduction Method for Thermal Cycling-Induced Viscoplastic


5
Deformation Problems Based on Segmented Gaussian Process Regression Machine Learning

A Novel Approach to Cognitive Load Measurement in N-Back Tasks Using Wearable Sensors,
6 Empirical Mode Decomposition With Machine Learning, and Explainable AI for Feature
Importance

8 Ad Click Fraud Detection Using Machine Learning and Deep Learning Algorithms

Advanced Machine Learning Ensembles for Improved Precipitation Forecasting: The


9
Modified Stacking Ensemble Strategy in China
An Efficient Malware Detection Approach Based on Machine Learning Feature Influence
10
Techniques for Resource-Constrained Devices
Analysis of Gas Pipeline Failure Factors Based on the Novel Bayesian Network by Machine
11
Learning Optimization

12 Anomaly Detection in Network Traffic Using Advanced Machine Learning Techniques

Bridging Precision and Complexity: A Novel Machine Learning Approach for Ambiguity
13
Detection in Software Requirements
Decoding Motor Excitability in TMS Using EEG-Features: An Exploratory Machine Learning
14
Approach
Depression Detection in Social Media: A Comprehensive Review of Machine Learning and
15
Deep Learning Techniques
Design a Robust DDoS Attack Detection and Mitigation Scheme in SDN-Edge-IoT by
16
Leveraging Machine Learning

17 Design of an Early Prediction Model for Parkinson’s Disease Using Machine Learning

Detection and Classification of Teacher-Rated Children’s Activity Levels Using Millimeter-


18
Wave Radar and Machine Learning: A Pilot Study in a Real Primary School Environment
Discriminating Between Indoor and Outdoor Environments During Daily Living Activities
19
Using Local Magnetic Field Characteristics and Machine Learning Techniques
Enhancing Chronic Disease Prediction in IoMT-Enabled Healthcare 5.0 Using Deep Machine
20
Learning: Alzheimer’s Disease as a Case Study
Enhancing Credit Risk Decision-Making in Supply Chain Finance With Interpretable Machine
21
Learning Model
Exploring the Effectiveness of Machine Learning and Deep Learning Techniques for EEG
22
Signal Classification in Neurological Disorders
Exploring the Landscape of Programming Language Identification With Machine Learning
23
Approaches
Frailty Modeling Using Machine Learning Methodologies: A Systematic Review With
24
Discussions on Outstanding Questions
Fuzzy Enhanced Kidney Tumor Detection: Integrating Machine Learning Operations for a
25
Fusion of Twin Transferable Network and Weighted Ensemble Machine Learning Classifier

26 Imbalanced Data Problem in Machine Learning: A Review

Implementation and Performance Evaluation of Machine Learning Based Apriori Algorithm


27
to Detect Non-Technical Losses in Distribution Systems

28 Improving Sleep Disorder Diagnosis Through Optimized Machine Learning Approaches

29 Interpretable Machine Learning Models for PISA Results in Mathematics

LASSO-mCGA: Machine Learning and Modified Compact Genetic Algorithm-Based Biomarker


30
Selection for Breast Cancer Subtype Classification
Optimized Identification of Sentence-Level Multiclass Events on Urdu-Language-Text Using
42
Machine Learning Techniques
Performance of Quantum Annealing Machine Learning Classification Models on ADMET
43
Datasets
Prediction of High-Pressure Physical Properties of Crude Oil Using Explainable Machine
44
Learning Models
Prediction of Multidimensional Poverty Status With Machine Learning Classification at
45
Household Level: Empirical Evidence From Tanzania

46 Semi-Supervised Learning via Cross-Prediction-Powered Inference for Wireless Systems

47 Smell-ML: A Machine Learning Framework for Detecting Rarely Studied Code Smells

48 Sustainable Selection of Machine Learning Algorithm for Gender-Bias Attenuated Prediction

Systematic Review of Fake News, Propaganda,and Disinformation: Examining Authors,


49
Content,and Social Impact Through Machine Learning
Volatile Organic Compounds for the Prediction of Lung Cancer by Using Ensembled Machine
50
Learning Model and Feature Selection
ML WITH PYTHON
S.NO TITLE
A General Framework for Comparing Embedding Visualizations Across Class-Label
1
Hierarchies

2 AI-Based Holistic Framework for Cyber Threat Intelligence Management

CGAP: A Hybrid Contrastive and Graph-Based Active Learning Pipeline to Detect Water and
3
Sediment in Multispectral Images
Convolutional Neural Networks for Automatic Identification of Individuals at Terrestrial
4
Terminals

5 Descriptor: Clarkson University Affective Research Dataset (CUADS)

6 Descriptor: Deakin IoT Traffic (D-IoT)

Enhancing Fraud Detection in Banking With Deep Learning: Graph Neural Networks and
7
Autoencoders for Real-Time Credit Card Fraud Prevention

8 ERX: A Fast Real-Time Anomaly Detection Algorithm for Hyperspectral Line Scanning

Machine Learning Evaluation Metric Discrepancies Across Programming Languages and Their
9
Components in Medical Imaging Domains: Need for Standardization
Model-Oriented Training of Coordinators of the Decentralized Control System of
10
Technological Facilities With Resource Interaction
RADSAFiE: A Netlist-Level Fault Injection User Interface Application for FPGA-Based Digital
11
Systems
SCM-DL: Split-Combine-Merge Deep Learning Model Integrated with Feature Selection in
12
Sports for Talent Identification
SPICE-Level Demonstration of Unsupervised Learning With Spintronic Synapses in Spiking
13
Neural Networks
Super-Resolution AI-Based Approach for Extracting Agricultural Cadastral Maps: Form and
14
Content Validation

15 Tiny Federated Learning for Constrained Sensors: A Systematic Literature Review

Understanding Flaky Tests Through Linguistic Diversity: A Cross-Language and Comparative


16
Machine Learning Study
MODIFIED TITLES

Predicting Diabetic Progression in the Cloud: An Optimized Ensemble Approach Using


Azure Machine Learning
Smart Instruction: Leveraging Machine Learning to Personalize Engineering Education
Through Data on Learning Behaviors

Fusing Intelligence and Structure: Hybrid Machine Learning for Optimized XML Parsing

Massive MIMO Meets Machine Learning: A Heterogeneous Receiver Architecture for


Phase-Aware DOA Estimation

Segmented Intelligence: Nonintrusive GPR-Driven Reduction of Nonlinear Viscoplastic


Models in Thermal Environments

From Signals to Insights: An Explainable Machine Learning Approach for Measuring


Cognitive Load with Wearables

Guarding the Clickstream: A Hybrid AI Framework for Ad Fraud Detection

Forecasting the Storm: A Modified Stacking Ensemble Approach for Enhanced


Precipitation Prediction in China
Efficient Threat Detection: Leveraging Feature Influence in ML for Malware Defense on
Low-Power Devices
Unveiling Pipeline Risk: Machine Learning-Optimized Bayesian Networks for Gas Failure
Analysis
Detecting the Undetected: Cutting-Edge Machine Learning Techniques for Network
Anomaly Discovery
Requirements Reimagined: ML-Based Detection of Ambiguous Language in Software
Engineering
EEG-Informed Insights: Leveraging Machine Learning to Decode Motor Excitability in TMS
Studies
Mood Mapping in the Digital World: ML and DL-Based Insights into Depression Detection
on Social Platforms
Fortifying the Smart Edge: A Machine Learning-Based DDoS Detection and Defense Model
for SDN-IoT Integration
Anticipating Neurodegeneration: A Machine Learning Model for Predicting Parkinson’s in
Its Infancy
Invisible Observers: Leveraging mmWave Radar and Machine Learning to Assess Student
Activity in Live Educational Settings
Magnetic Footprints: Leveraging Local Field Variations and AI to Detect Daily Living
Contexts
Revolutionizing Neurodegenerative Care: IoMT and Deep Learning Synergy for Alzheimer’s
Disease Prediction in Healthcare 5.0
Unboxing the Black Box: Interpretable Machine Learning Models for Supply Chain Credit
Risk Decisions
Electroencephalographic Intelligence: Evaluating Learning Algorithms for Neurological
Disorder Prediction

Syntax Meets Intelligence: Machine Learning-Based Detection of Programming Languages

Unpacking Frailty With Algorithms: A Machine Learning Perspective on Current Models


and Research Gaps
Fuzzy-Driven Kidney Tumor Detection: Integrating Twin Transferable Networks with
Weighted Ensemble Machine Learning
Skewed But Significant: Exploring Machine Learning Solutions for Imbalanced Data
Problems
Empowering Grid Intelligence: ML-Based Apriori Algorithm for Identifying Non-Technical
Losses in Distribution Networks
AI-Powered Slumber: Enhancing Sleep Disorder Detection Through Advanced Machine
Learning Optimization
AI-Powered Slumber: Enhancing Sleep Disorder Detection Through Advanced Machine
Learning Optimization
Hybrid Genomics Intelligence: A LASSO and Compact Genetic Algorithm Approach to
Breast Cancer Subtype Classification
Multiclass Event Extraction from Urdu Text: A Machine Learning Approach for Linguistic
Intelligence
Exploring Quantum Horizons: Performance Analysis of Annealing-Based ML on ADMET
Datasets
Predicting Crude Oil Thermophysics at High Pressure: A Transparent Machine Learning
Approach
Intelligent Poverty Mapping: Machine Learning Models for Multidimensional Poverty
Prediction in Tanzania

Cross-Prediction Enhanced Semi-Supervised Learning for Intelligent Wireless Inference

Deep Code Hygiene: Smell-ML Framework for Rare Smell Detection with Machine
Learning
Balancing Performance and Fairness: A Sustainable ML Algorithm Selection Strategy for
Gender-Bias Reduction
Machine Learning for Truth Discovery: A Review of Fake News, Propaganda Authors, and
Their Influence on Society
Predicting Lung Cancer With AI-Enhanced Breath Analysis: Feature-Selected Ensemble
Models of VOC Biomarkers
Exploring Latent Landscapes: A Framework for Comparing Embeddings Across Class
Hierarchies
Holistic Cyber Defense: Leveraging Artificial Intelligence for Adaptive Threat Intelligence
Management
Harnessing CGAP: Hybrid Graph-Contrastive Learning for Efficient Water and Sediment
Mapping in Multispectral Data

Individual Identification in Surveillance Footage from Terrestrial Terminals Using CNNs

Redefining Emotional Understanding: Descriptor Innovation for the CUADS Dataset

Smart Traffic Descriptors for IoT: A Deep Dive into the Deakin D-IoT Dataset

Neural Graphs Against Fraud: A Deep Learning Architecture for Secure Banking

Streamlined Hyperspectral Intelligence: ERX for Real-Time Anomaly Detection

Code Matters: How Programming Language Choices Affect ML Evaluation in Medical


Imaging
Empowering Control Agents: Model-Oriented Training in Decentralized, Resource-Aware
Systems

Pushing the Boundaries of FPGA Reliability: RADSAFiE for Interactive Fault Injection

Game-Changing Intelligence: SCM-DL with Feature Selection for Next-Gen Sports Talent
Identification

Spintronics Meets Neuromorphic Intelligence: SPICE-Level Unsupervised Learning in SNNs

Precision Mapping in Agriculture: A Super-Resolution AI Framework for Cadastral


Extraction and Semantic Validation
Bringing AI to the Smallest Devices: A Systematic Study of Tiny Federated Learning in
Sensor Networks
Breaking the Silence of Flaky Tests: Cross-Language Linguistic Features in ML-Powered
Software Testing
DATA MINING
IEEE TITLES
S.NO TITLE
1 A Clause-Based Data Augmentation Method for Low-Resource Neural Machine Translation

2 A Decision Tree-Based Advisory Recommendation System for Dental Students

A High-performance reversible data hiding scheme for audio streams base on code division
3
multiplexing

4 A Systematic Literature Review on Mining LTL Specifications

Comparative Analysis of Federated Association Rules in a Simulated Environment for Medical


5
Applications
Customer Behavior Analysis and Predictive Modeling in Supermarket Retail: A Comprehensive Data
6
Mining Approach
Comprehensive Environmental Monitoring System for Industrial and Mining Enterprises Using
7
Multimodal Deep Learning and CLIP Model

8 Data Fusion and Models Integration for Enhanced Semantic Segmentation in Remote Sensing

Data-Driven Dynamic Graph Convolution Transformer Network Model for EEG Emotion Recognition
9
Under IoMT Environment
Desensitized Financial Data Generation Based on Generative Adversarial Network and Differential
10
Privacy
Developing Data-Driven QFD: A Systemic Approach to Employing Product Manuals and Customer
11
Reviews
Digital Twins and Enabling Technology Applications in Mining: Research Trends, Opportunities, and
12
Challenges
Exploratory and Interpretable Approach to Estimating Latent Health Risk Factors Without Using
13
Domain Knowledge

14 Fusion of Geochemical Data and Remote Sensing Data Based on Convolutional Neural Network

15 How Big Data Has Changed Technology Roadmapping: A Review on Data-Driven Roadmapping

IACGAN-ST: A Fault Diagnosis Method for Scraper Conveyor Bearings Under Imbalanced Data
16
Conditions

17 Incremental Closed Frequent Itemsets Mining-Based Approach Using Maximal Candidates

18 Integrating Fuzzy C-Means and DBSCAN: A Hybrid Approach to Medical Data Mining

Joint Adaptive Resolution Selection and Conditional Early Exiting for Efficient Video Recognition on
19
Edge Devices
Knowledge-Enriched Recommendations: Bridging the Gap in Alloy Material Selection With Large
20
Language Models
Lightweight Multiscale Spatio-Temporal Graph Convolutional Network for Skeleton-Based Action
21
Recognition
LLM-Enhanced Human–Machine Interaction for Adaptive Decision-Making in Dynamic
22
Manufacturing Process Environments

23 Offender Characterization and Prediction: A Case Study of the Kingdom of Bahrain

24 Performance Analysis: Discovering Semi-Markov Models From Event Logs

Predicting the Imbalanced Impact of Drugs on Microbial Abundance Using Multi-View Learning and
25
Data Augmentation
Prediction of Higher Education Achievement by Mining Patterns from Health Records and Socio-
26
Economic Status
MODIFIED TITLES

Clause-Level Intelligence: Structurally Informed Data Augmentation for Low-Resource NMT


Tasks

Personalized Academic Recommendations for Dental Students Using Decision Tree Models

Echo-Free Embedding: High-Performance Reversible Data Hiding in Audio via Code Division
Multiplexing
Temporal Logic Decoded: Advances and Challenges in Mining LTL Specifications – A
Systematic Review
Unifying Privacy and Predictive Power: Comparative Analysis of Federated Association Rules
in Healthcare Simulations
Predicting the Aisles: Comprehensive Customer Behavior Analysis in Supermarket
Environments
Industrial Ecology Reimagined: A Multimodal AI Monitoring System Using CLIP for
Environmental Risk Assessment
Semantic Clarity from the Sky: Data Fusion and Deep Model Integration in Remote Sensing
Applications
IoMT-Enabled Emotion Recognition: A Fusion of Graph Convolution and Transformer
Networks on EEG Data
Financial Data Reimagined: A Differential Privacy and GAN-Based Framework for Synthetic
Generation

Voice of the Customer Meets the Manual: Building QFD with Data-Driven Intelligence

Enabling Intelligent Mines: Digital Twin Technologies and the Road Ahead

Interpretable Health Risk Discovery: Mining Latent Factors Without Expert Input

FusionNet-Earth: A CNN Model for Integrated Analysis of Geochemical and Remote Sensing
Datasets
Redefining the Roadmap: The Impact of Big Data on Technology Foresight and Strategic
Planning
Robust Fault Diagnosis in the Wild: IACGAN-ST for Scraper Conveyor Bearings with Skewed
Data
Efficient Pattern Discovery: An Incremental Approach to Mining Closed Frequent Itemsets
Using Maximal Candidates
Exploring Medical Data Complexity: A Novel Hybrid Clustering Technique Using FCM and
DBSCAN
Edge-Aware Video Intelligence: Joint Adaptive Resolution and Early Exiting for Efficient
Recognition
Bridging Materials Intelligence: LLM-Powered Recommendations for Informed Alloy
Selection
AgilePose: Lightweight Graph Convolutional Modeling for Multiscale Skeleton-Based Action
Recognition
Conversational Manufacturing: LLM-Based Human–Machine Collaboration for Real-Time
Process Adaptation
Offender Analytics in Action: Characterization and Prediction in the Bahraini Criminal
Landscape
Modeling Time and Transitions: A Semi-Markov Approach to Event Log-Based Performance
Analysis
Integrative Modeling of Drug-Microbiome Responses with Multi-View Learning and
Synthetic Data
Health Meets Academia: Predictive Modeling of Educational Attainment via Socio-Economic
and Medical Data
BLOCK CHAIN
IEEE TITLES
S.NO TITLES
A broadcast-and-select ROADM architecture to support linear hub-ended trees using point-to-
1 multipoint coherent transceivers [Invited]
A Dynamic Sliding Window Encoding for Secured DNA Data Storage Compliant With Biological
2 and Indexing Constraints
A Novel Lattice-based Blockchain Infrastructure and its Application on Trusted Data
3 Management

Cyber Threat Inference Focused on Threat Class Sequence With Threat Class Sequence System
4
Design of Approximate Adder With Reconfigurable Accuracy
5
Exploiting Low-Density Signal Structure via Approximate Message Passing With Side
6 Information for Grant-Free NOMA

Fresh or Rotten? Enhancing Rotten Fruit Detection With Deep Learning and Gaussian Filtering
7
Generalized Centered Binomial Distribution for Bimodal Lattice Signatures
8
Opportunities and challenges in the metaverse and NFTs for business model innovation: a
9 managerial point of view

Predicting block delays in Bitcoin blockchain via Bayesian and non-Bayesian logistic regression
10
MODIFIED TITLES

Innovative ROADM Design for Linear Hub-Ended Trees Using Point-to-Multipoint Coherent
Transceivers
Encoding DNA Data Securely: A Dynamic Sliding Window Approach Respecting Biological and
Indexing Limits

Building Trust with Lattice-Based Blockchain: A New Paradigm for Data Management

Inferring Cyber Threats via Threat Class Sequences: A Threat Class Sequence System Approach

Approximate Adder with Reconfigurable Accuracy: Balancing Precision and Efficiency

Grant-Free NOMA Enabled by Approximate Message Passing Leveraging Low-Density Signal


Structures and Side Information

Enhanced Rotten Fruit Identification Using Deep Neural Networks and Gaussian Filtering

Innovations in Bimodal Lattice Signatures via Generalized Centered Binomial Distribution

Navigating Opportunities and Challenges of the Metaverse and NFTs for Business Model
Innovation: Insights for Managers

Advanced Prediction of Bitcoin Block Delays via Bayesian and Non-Bayesian Logistic Regression
DEEP LEARNING
IEEE TITLES
S.NO TITLES
A Co-Evolutionary Genetic Algorithm Approach to Optimizing Deep Learning for
1
Brain Tumor Classification
A Computational Intelligence Framework Integrating Data Augmentation and
2 Meta-Heuristic Optimization Algorithms for Enhanced Hybrid Nanofluid Density
Prediction Through Machine and Deep Learning Paradigms
A Deep and Interpretable Learning Approach for Long-Term ECG Clinical Noise
3
Classification
A Novel Active Learning Approach for Improving Classification of Unlabeled
4
Video Based on Deep Learning Techniques
A Novel RMS-Driven Deep Reinforcement Learning for Optimized Portfolio
5
Management in Stock Trading
Autonomous Quadrotor Path Planning Through Deep Reinforcement Learning
6
With Monocular Depth Estimation
Deep Learning and Federated Learning in Breast Cancer Screening and
7
Diagnosis: A Systematic Review
Deep Learning Approaches in the Effects of Recession and FOMC Minutes on Oil
8
Prices
Deep Learning-Augmented Evolutionary Strategies for Intelligent Global
9
Optimization
Depression Detection in Social Media: A Comprehensive Review of Machine
10
Learning and Deep Learning Techniques
Development of Continuous AMSR-E/2 Soil Moisture Time Series by Hybrid
11 Deep Learning Model (ConvLSTM2D and Conv2D) and Transfer Learning for
Reanalyses
Dueling Network Architecture for GNN in the Deep Reinforcement Learning for
12
the Automated ICT System Design
Enhancing Chronic Disease Prediction in IoMT-Enabled Healthcare 5.0 Using
13
Deep Machine Learning: Alzheimer’s Disease as a Case Study
Enhancing Mobile App Recommendations With Crowdsourced Educational Data
14
Using Machine Learning and Deep Learning
Enhancing Phishing Detection: A Machine Learning Approach With Feature
15
Selection and Deep Learning Models
Exploring the Effectiveness of Machine Learning and Deep Learning Techniques
16
for EEG Signal Classification in Neurological Disorders

17 Federated Deep Reinforcement Learning for ENDC optimization

FFDL: Feature Fusion-Based Deep Learning Method Utilizing Federated Learning


18
for Forged Face Detection
Fuzzy Enhanced Kidney Tumor Detection: Integrating Machine Learning
19 Operations for a Fusion of Twin Transferable Network and Weighted Ensemble
Machine Learning Classifier
Gamma Log Inversion of Seismic Data Based on Transformer With Stratigraphic
20
Position Encoding
Inverse RL Scene Dynamics Learning for Nonlinear Predictive Control in
21
Autonomous Vehicles

22 Learning Ordinal–Hierarchical Constraints for Deep Learning Classifiers

Lithium-Ion Battery State of Health Degradation Prediction Using Deep Learning


23
Approaches
Machine Learning and Deep Learning Approaches for Accent Recognition: A
24
Review

Melanoma Breslow Thickness Classification Using Ensemble-Based Knowledge


25
Distillation With Semi-Supervised Convolutional Neural Networks

Performance Evaluation of Hybrid Bio-Inspired and Deep Learning Algorithms in


26
Gene Selection and Cancer Classification
Prediction of High-Risk Cardiac Arrhythmia Based on Optimized Deep Active
27
Learning
Reweighted Partial Least Squares and Deep Learning-Based RDOA/AOA
28
Estimation for Seismic Epicenter
Simple Yet Powerful: Machine Learning-Based IoT Intrusion System With Smart
29
Preprocessing and Feature Generation Rivals Deep Learning
MODIFIED TITLES

Optimizing Deep Learning for Brain Tumor Classification Using a Co-


Evolutionary Genetic Algorithm Approach

A Hybrid AI Approach for Nanofluid Density Prediction Using Augmented Data


and Meta-Heuristic Optimization

Interpretable AI for Healthcare: Deep Learning-Based Long-Term ECG Noise


Classification
Efficient Deep Learning for Unlabeled Video: An Active Learning-Based
Classification Framework
RMS-Driven Deep Reinforcement Learning: A Novel Framework for Optimized
Stock Portfolio Management
Monocular Depth-Guided Deep Reinforcement Learning for Efficient
Quadrotor Path Planning
Federated and Deep Learning Techniques for Breast Cancer Screening and
Diagnosis: A Systematic Overview
Predicting Oil Price Movements through Deep Learning: The Role of Recession
and FOMC Minutes
Integrating Deep Learning with Evolutionary Strategies for Smarter Global
Optimization
Detecting Depression through Social Media: Advances in Machine and Deep
Learning Approaches – A Review

Leveraging Hybrid Deep Learning and Transfer Learning to Generate


Continuous AMSR-E/2 Soil Moisture Time Series

Deep Reinforcement Learning for Automated ICT Design: Leveraging Dueling


Network Architectures in GNNs
Advancing Alzheimer’s Disease Prediction in IoMT-Enabled Healthcare 5.0
Using Deep Machine Learning
Machine and Deep Learning Approaches to Personalized Mobile App
Recommendations Using Crowdsourced Education Data
Elevating Phishing Detection Performance with Machine Learning and Deep
Learning-Enabled Feature Selection
Intelligent EEG Signal Classification in Neurological Disorders Using Machine
and Deep Learning Methods

Federated DRL-Driven Optimization Strategies for ENDC in Next-Gen Networks

Forged Face Detection Using Federated Learning and Feature Fusion-Driven


Deep Neural Network

Robust Kidney Tumor Detection Using Fuzzy-Enhanced Machine Learning


Fusion of Twin Networks and Weighted Ensembles

Stratigraphic Position Encoding Enhanced Transformer for Gamma Log


Inversion in Seismic Analysis
IRL-Based Scene Dynamics Modeling for Enhanced Nonlinear Predictive
Control in Autonomous Vehicles
Ordinal–Hierarchical Constraint-Aware Deep Learning for Structured
Classification Tasks
Predicting Lithium-Ion Battery Health Degradation Using Deep Neural
Networks
Exploring Machine and Deep Learning Methods for Accurate Accent
Recognition: A Review

Semi-Supervised Deep Learning with Ensemble Knowledge Distillation for


Robust Melanoma Thickness Prediction

Hybrid Bio-Inspired and Deep Learning Approaches for Enhanced Gene


Selection and Cancer Classification: A Performance Study
An Optimized Deep Active Learning Approach for Accurate High-Risk Cardiac
Arrhythmia Prediction
Accurate Seismic Epicenter Localization Using Deep Learning and Reweighted
Partial Least Squares for RDOA/AOA Estimation
Rethinking IoT Security: Machine Learning Intrusion Detection System with
Intelligent Preprocessing Outperforming Deep Learning
SECURE COMPUTING
IEEE TITLES
S.NO TITLES

1 A Review of Block Ciphers and Its Post-Quantum Considerations

A Lightweight Mechanism for Dynamic Secret Sharing of Private Data by Constrained


2
Devices
A Method for Service Function Chain Migration Based on Server Failure Prediction in
3
Mobile Edge Computing Environment
A Novel Pairing Free Revocable Certificateless Encryption With Ciphertext Evolution
4
for Healthcare System

5 A Survey for Blockchain-Enabled Resource Management in Edge Networks

A Verifiable and Secure Industrial IoT Data Deduplication Scheme With Real-Time Data
6
Integrity Checking in Fog-Assisted Cloud Environments

7 A Very Compact and a Threshold Implementation of uBlock for Internet of Things

8 Adaptive Trust Architecture for Secure IoT Communication in 6G

9 An Energy-efficient Intrusion Detection Offloading Based on DNN for Edge Computing

10 An NVMe-Based Secure Computing Platform With FPGA-Based TFHE Accelerator

Blockchain and RL-Based Secured Task Offloading Framework for SoftwareDefined 5G


11
Edge Networks

12 BPS-FL: Blockchain-Based Privacy-Preserving and Secure Federated Learning

Cloud-Network-End Collaborative Security for Wireless Networks: Architecture,


13
Mechanisms, and Applications

14 Controlled Shared Memory (COSM) Isolation: Design and Testbed Evaluation

DataLab as a Service: Distributed Computing Framework for Multi-Interactive Analysis


15
Environments

DEEPFL: A Differential Evolution-Based Framework for Privacy Protection and


16
Poisoning Attack Defense in Maritime Edge Computing

17 Emerging Technologies Driving Zero Trust Maturity Across Industries

Empowering Diabetes Management Through Blockchain and Edge Computing: A


18
Systematic Review of Healthcare Innovations and Challenges
Enhancing Cloud Security: A Multi-Factor Authentication and Adaptive Cryptography
19
Approach Using Machine Learning Techniques
Evolutionary Algorithms and Quantum Computing: Recent Advances, Opportunities,
20
and Challenges
Exploiting Trusted Execution Environments and Distributed Computation for Genomic
21
Association Tests

22 Federated Deep Reinforcement Learning for ENDC Optimization

Federated Learning for Enhanced Cybersecurity and Trustworthiness in 5G and 6G


23
Networks: A Comprehensive Survey

Improved Results Synchronization on Secure Communication in Complex Dynamical


24
Networks With Time-Varying Delay Using Delay-Dependent Feedback Control

IoMT and Blockchain Synergy: A Novel Approach to Health Data Validation and
25
Storage
Leveraging Personalized Customer Experiences in Mobile Edge Computing Through
26
Split Learning Using Smart Data-Driven Modeling

27 Lightweight Yet Nonce-Misuse Secure Authenticated Encryption for Very Short Inputs

28 MalScan: Android Malware Detection Based on Social-Network Centrality Analysis

Multi-Slot Secure Offloading and Resource Management in VEC Networks: A Deep


29
Reinforcement Learning-Based Method

Navigating the Challenges and Opportunities of Securing Internet of Autonomous


30
Vehicles With Lightweight Authentication
N-Sum Box: An Abstraction for Linear Computation Over Many-to-One Quantum
31
Networks
Optimizing Secure Multi-User ISAC Systems With STAR-RIS: A Deep Reinforcement
32
Learning Approach for 6G Networks
Privacy-Preserving Keyword Search With Access Control for Secret Sharing-Based Data
33
Outsourcing

34 Privacy-Preserving Tools and Technologies: Government Adoption and Challenges

Quantum Communication Network Routing with Circuit and Packet Switching


35
Strategies
Quantum Safe Multi-Factor User Authentication Protocol for Cloud-Assisted Medical
36
IoT

37 Secure Biometric Verification in the Presence of Malicious Adversaries

Secure Fine-Grained Multi-Keyword Ciphertext Search Supporting Cloud-Edge-End


38
Collaboration in IoT

39 Secure Lattice-Based Signature Scheme for Internet of Things Applications

40 Secure Quantum Communication With Multi-Users in Quantum Networks

Secure User Authentication With Information Theoretic Security Using Secret Sharing-
41
Based Secure Computation
SEEIR: Secure and Efficient Encrypted Image Retrieval Based on Additive Secret
42
Sharing
43 Survey of Distributed Ledger Technology (DLT) for Secure and Scalable Computing

Sybil-Resistant Self-Sovereign Identity Utilizing Attested Execution Secure Processors


44
and Zero-Knowledge Membership Proofs

45 The Rise of Cognitive SOCs: A Systematic Literature Review on AI Approaches

Trust Verification Method for Leveraging Secure Task Completion in Mobile Crowd
46
Outsourcing Processes

47 Unbounded Depth ElGamal-Based Asymmetric Updatable Encryption Technique

Unified Security Framework Using Device-Specific Fingerprint: Mitigating Hardware


48
Trojans and Authenticating Firmware Updates
Unveiling Samsung Quantum Galaxy: Securing Smartphones With Quantum and Post-
49
Quantum Cryptography
MODIFIED TITLES

Post-Quantum Challenges and Advances in Block Cipher


Cryptography: A Review
Dynamic Secret Sharing with Minimal Overhead for Privacy
Preservation on Constrained Devices
Predictive Server Failure-Driven Service Function Chain Migration
in Mobile Edge Environments
Secure Healthcare Data Protection via Pairing-Free Revocable
Certificateless Encryption with Dynamic Ciphertext Evolution
Surveying Blockchain-Based Approaches to Resource
Management in Edge Computing Environments
Verifiable and Secure Data Deduplication for Industrial IoT with
Real-Time Integrity Verification in Fog-Assisted Clouds
Threshold Implementation of uBlock: A Compact Solution for
Internet of Things
Empowering 6G IoT Communication with Adaptive and Secure
Trust Architectures
A DNN-Based Approach for Energy-Conscious Intrusion Detection
Offloading in Edge Computing
Secure NVMe Computing Leveraging FPGA-Based Fully
Homomorphic Encryption Acceleration

Reinforcement Learning and Blockchain Integration for Secured


Task Offloading in Software-Defined 5G Edge Environments

Enhancing Federated Learning Security and Privacy with


Blockchain-Based BPS-FL
Collaborative Security Across Cloud, Network, and Edge:
Architectures and Mechanisms for Wireless Networks
Exploring COSM Isolation: Design Principles and Real-World
Testbed Performance
DataLab as a Service: Architecting Distributed Multi-Interactive
Analysis Platforms
A Novel Differential Evolution-Based Approach (DEEPFL) for
Privacy and Poisoning Attack Defense in Maritime Edge
Environments
Driving Zero Trust Evolution Across Industries Through Emerging
Technologies
Revolutionizing Diabetes Management with Blockchain and Edge
Technologies: A Systematic Healthcare Review
Adaptive Cryptography and Multi-Factor Authentication in Cloud
Security Using Machine Learning Techniques
Quantum Computing and Evolutionary Algorithms:
Advancements, Potential Applications, and Obstacles
Harnessing Trusted Execution Environments with Distributed
Computing for Privacy-Preserving Genomic Association Analysis

Collaborative Deep Reinforcement Learning for Efficient ENDC


Optimization in Distributed Networks
Federated Learning Empowering Secure and Trustworthy 5G and
6G Networks: An In-Depth Survey
Delay-Dependent Feedback Control for Improved Secure
Communication Synchronization in Complex Networks with
Variable Time Delays
A Blockchain-Enabled IoMT Approach for Reliable Health Data
Validation and Storage
Data-Driven Split Learning Approaches to Elevate Personalized
Experiences in Mobile Edge Computing
Efficient Lightweight Authenticated Encryption Ensuring Nonce
Misuse Security for Tiny Data Blocks
Revolutionizing Android Malware Detection Using Social Network
Centrality: The MalScan Model
Adaptive Multi-Slot Secure Offloading and Resource
Management in Vehicular Edge Computing via Deep
Reinforcement Learning
Mitigating Security Risks in Internet of Autonomous Vehicles
Through Lightweight Authentication Solutions
Linear Computation in Quantum Networks: The Role of N-Sum
Box Abstraction
Joint Optimization of STAR-RIS-Aided ISAC for Secure Multi-User
6G Networks Using Deep Reinforcement Learning
Secure and Private Keyword Search over Secret Shared
Outsourced Data
Empowering Governance Through Privacy: Emerging Tools,
Technologies, and Adoption Challenges
Fusion of Circuit and Packet Switching in Quantum Networks: A
Next-Generation Routing Approach
Healing Through Security: Quantum-Safe Multi-Factor
Authentication for Cloud-Enabled Medical IoT
Resilient Biometric Verification: Defending Against Malicious
Adversaries in Next-Gen Security Systems
Efficient and Secure IoT Search with Multi-Keyword Support in
Edge-Centric Environments
Reimagining IoT Security: Lattice-Based Digital Signatures for the
Post-Quantum Era
Advanced Multi-User Quantum Communication with Security
Guarantees
Information-Theoretic Secure User Authentication via Secret
Sharing-Based Secure Computation
Encrypted Image Retrieval Framework Based on Additive Secret
Sharing
A Comprehensive Survey of Distributed Ledger Technology for
Secure and Scalable Computing
Attested Execution and ZK Proofs for Sybil-Resistant Self-
Sovereign Identity
The Evolution of Cognitive SOCs: Exploring AI Techniques
Through a Systematic Review
Trust-Driven Secure Task Management in Mobile Crowd
Outsourcing
ElGamal-Driven Asymmetric Updatable Encryption for Unlimited
Update Depth
Securing Devices with Fingerprint-Driven Frameworks: Mitigation
of Hardware Trojans and Firmware Validation
Quantum and Post-Quantum Cryptography in Samsung Galaxy
Smartphones
CYBER SECURITY
IEEE TITLES
S.NO TITLES
A Bibliometric Analysis of Agent-Based Systems in Cybersecurity and Broader Security
1
Domains: Trends and Insights

A Systematic Literature Review on Tackling Cyber Threats for Cyber Logistic Chain and
7
Conceptual Frameworks for Robust Detection Mechanisms

8 Adaptive Early Warning Method of Cascading Failures Caused by Coordinated Cyber-attacks

Advancing Passwordless Authentication: A Systematic Review of Methods, Challenges, and


9
Future Directions for Secure User Identity
AI-Powered System for an Efficient and Effective Cyber Incidents Detection and Response in
10
Cloud Environments
An Automated Compliance Framework for Critical Infrastructure Security Through Artificial
11
Intelligence
Analysis of Network Security Countermeasures From the Perspective of Improved FS
12
Algorithm and ICT Convergence
CIRA-Cyber Intelligent Risk Assessment Methodology for Industrial Internet of Things based
13
on Machine Learning
Cloud-Network-End Collaborative Security for Wireless Networks: Architecture,
14
Mechanisms, and Applications
Computer Network Security System Optimization Based on Improved Neural Network
15
Algorithm and Data Search
Cyber Attack Prediction: From Traditional Machine Learning to Generative Artificial
16
Intelligence

17 Cyber Shadows: Neutralizing Security Threats with AI and Targeted Policy Measures

Cyber Threat Inference Focused on Threat Class Sequence With Threat Class Sequence
18
System

19 Cyber Threat Susceptibility Assessment for Heavy-Duty Vehicles Based on ISO/SAE 21434

Cyber-Biosecurity Challenges in Next-Generation Sequencing: A Comprehensive Analysis of


20
Emerging Threat Vectors
Cyber-Physical System Security for Manufacturing Industry 4.0 Using LSTM-CNN Parallel
21
Orchestration
Data Acquisition Framework for Micromobility Vehicles Toward Driving Risk Prediction
22
Against Cyberphysical Security Attack
Deep Learning Based Side-Channel Attack Detection for Mobile Devices Security in 5G
23
Networks
Design and Research of Network Edge Device Security Monitoring System Based on
24
Embedded System and Bi-LSTM
DiGraph-Enabled Digital Twin and Label-Encoding Machine Learning for SCADA Network’s
25
Cyber Attack Analysis in Industry 5.0
PRIDA-ME: A Privacy-Preserving, Interoperable and Decentralized Authentication Scheme
26
for Metaverse Environment
Quantitative Cybersecurity Analysis Framework for Cyber Physical Systems: A Conceptual
27
Approach
Research on Encryption Algorithm and Embedded System Optimization Strategy Based on
28
IoT Security
Research on Network Security Situational Awareness and Risk Assessment Model Based on
29
Bayesian Network
Research on Performance Optimization and Resource Allocation Strategy of Network Node
30
Encryption Based on RSA Algorithm
Research on the Application of Blockchain Technology in the Security Protection of Sensitive
31
Data in Information Systems
Resilience Framework for Power Electronic Systems Against Cyber-Physical Attacks: A
32
Review
Secure Combination of Untrusted Time Information Based on Optimized Dempster-Shafer
33
Theory
Security Enhancement in AAV Swarms: A Case Study Using Federated Learning and SHAP
34
Analysis
Security Risk Assessment and Risk-oriented Defense Resource Allocation for Cyber-physical
35
Distribution Networks Against Coordinated Cyber Attacks
Study on the Application of Dynamic Continuous Trust Assessment Model Based on
36
Clustering Mechanism in Network Security Optimization
Timestamp Based OTP and Enhanced RSA Key Exchange Scheme with SIT Encryption to
37
Secure IoT Devices
Toward a Unified Understanding of Cyber Resilience: Concepts, Strategies, and Future
38
Directions
MODIFIED TITLES

Mapping the Landscape: A Bibliometric Study of Agent-Based Systems in Cybersecurity


and Security Fields

Cyber Threat Resilience in Logistics Chains: A Systematic Review and Conceptual


Detection Frameworks
Early Warning of Cascading Failures Under Coordinated Cyber-Attacks: An Adaptive
Approach
The Future of Secure Identity: A Systematic Review of Passwordless Authentication
Methods and Challenges

AI-Enhanced Cybersecurity for Cloud Platforms: Detection and Response Framework

Automation of Security Compliance in Critical Infrastructure via AI

FS Algorithm-Based Security Enhancements for ICT-Driven Network Systems

Cyber Intelligent Risk Assessment for Industrial IoT Using Machine Learning

Integrated Cloud-Network-Edge Security Framework for Wireless Networks: Mechanisms


and Use Cases
Enhancing Network Security Systems via Optimized Neural Networks and Intelligent Data
Search
Cyber Threat Forecasting: The Transition from Traditional ML to Generative AI
Approaches
Illuminating Cyber Shadows: Targeted AI Solutions and Policy Frameworks for Threat
Neutralization
Inference of Cyber Threats Through Sequential Analysis of Threat Classes Using a Threat
Class Sequence System
Applying ISO/SAE 21434 for Cyber Threat Susceptibility Analysis in Heavy-Duty Vehicles

Navigating Cyber-Biosecurity Risks in Next-Gen Sequencing: An In-Depth Threat Vector


Analysis

Parallel LSTM-CNN Framework for Cyber-Physical System Protection in Industry 4.0

Micromobility Cyber-Physical Security: Data Acquisition for Driving Risk Prediction

AI-Powered Side-Channel Attack Detection for Mobile Security in Next-Gen 5G Networks

Innovative Edge Device Security Monitoring with Embedded Systems and Bi-LSTM
Algorithms
DiGraph and Label-Encoding ML for Enhanced Cybersecurity in Industry 5.0 SCADA
Systems

Interoperable and Privacy-Driven Authentication in the Metaverse: PRIDA-ME Scheme

A Conceptual Approach to Quantitative Cybersecurity Analysis in Cyber-Physical Systems

Encryption and Embedded System Optimization Strategies for IoT Security

Bayesian Network-Based Model for Network Security Situational Awareness and Risk
Assessment
Enhancing Network Node Encryption Efficiency: Performance and Resource Optimization
Using RSA
Innovative Applications of Blockchain for Safeguarding Sensitive Information in Digital
Systems
Enhancing Resilience of Power Electronic Systems Against Cyber-Physical Attacks: A
Comprehensive Review
A Robust Framework for Combining Untrusted Time Information via Optimized
Dempster-Shafer Theory
Federated Learning and SHAP-Driven Security Improvements for Autonomous Aerial
Vehicle Swarms
Coordinated Cyber Attack Resilience: Risk Assessment and Strategic Defense Resource
Allocation in Distribution Networks
A Dynamic Trust Evaluation Framework Based on Clustering for Network Security
Enhancement
Robust IoT Device Security Using Timestamp-Driven OTP and Advanced RSA Key
Exchange with SIT Encryption

Unifying Cyber Resilience: Strategic Concepts and Future Research Directions


CLOUD COMPUTING
IEEE TITLES
S.NO TITLES
A Joint Adaptive Neuro-Fuzzy Inference System and Binary Quantum-based Avian
1 Navigation Algorithm for Optimal Resource Monitoring, Task Scheduling and
Migration in Cloud-based System
A Verifiable and Secure Industrial IoT Data Deduplication Scheme With Real-Time
2
Data Integrity Checking in Fog-Assisted Cloud Environments

3 Challenges and Opportunities in Fog Computing Scheduling: A Literature Review

Cloud and Cloud Shadow Detection for Multi-Modal Imagery With Gap-Filling
4
Applications
Cloud Platform Selection Model in the Framework of Differential Quality Game With
5
Fuzzy Information
Cloud Telescope: An Ephemeral, Distributed, and Cloud-Native Architecture for
6
Collecting Internet Background Radiation

7 Data Overlay Mesh in Distributed Clouds Allowing Collaborative Applications

DataLab as a Service: Distributed Computing Framework for Multi-Interactive Analysis


8
Environments
Dynamic Service Placement in Edge Computing: A Comparative Evaluation of Nature-
9
Inspired Algorithms
Efficient Task Scheduling and Load Balancing in Fog Computing for Crucial Healthcare
10
Through Deep Reinforcement Learning
EMO-TS: An Enhanced Multi-Objective Optimization Algorithm for Energy-Efficient
11
Task Scheduling in Cloud Data Centers
Energy-Efficient Resource Allocation in Mobile Edge Computing Using NOMA and
12
Massive MIMO
Enhancing Cloud Security: A Multi-Factor Authentication and Adaptive Cryptography
13
Approach Using Machine Learning Techniques

14 Formation Producing Control of Multi-Quadcopter Systems Under the Cloud Access

Hybrid Henry Gas-Harris Hawks ComprehensiveOpposition Algorithm for Task


15
Scheduling in Cloud Computing
Leveraging Cloud Resources for Distributed Training of Residual CNNs in Aerial Image
16
Classification

17 Literature Review of Machine Learning and Threat Intelligence in Cloud Security

Meta-RHDC: Meta Reinforcement Learning Driven Hybrid Lyrebird Falcon


18
Optimization for Dynamic Load Balancing in Cloud Computing

19 Modern Deep Learning Techniques for Big Medical Data Processing in Cloud

Motion detection methods applied on RGB-D images for vehicle classification on the
20
edge computing
Multi-Objective Optimization Techniques in Cloud Task Scheduling: A Systematic
21
Literature Review
O2O-PLB: A One-to-One-Based Optimizer With Priority and Load Balancing
22
Mechanism for Resource Allocation in Fog-Cloud Environments
Optimized Task Offloading in Multi-Domain IoT Networks Using Distributed Deep
23
Reinforcement Learning in Edge Computing Environments
PPRU: A Privacy-Preserving Reputation Updating Scheme for Cloud-Assisted Vehicular
24
Networks

25 QoS Aware Task Scheduling Using Hybrid Genetic Algorithm in Cloud Computing

Quantum Safe Multi-Factor User Authentication Protocol for Cloud-Assisted Medical


26
IoT
Research on Image Recognition and Classification Algorithms in Cloud Computing
27
Environment Based on Deep Neural Networks
Resource Adaptive Automated Task Scheduling Using Deep Deterministic Policy
28
Gradient in Fog Computing
Scheduling of Low-Latency Medical Services in Healthcare Cloud with Deep
29
Reinforcement Learning
Securing Linux Cloud Environments: Privacy-Aware Federated Learning Framework for
30
Advanced Malware Detection in Linux Clouds

31 Survey of Distributed Ledger Technology (DLT) for Secure and Scalable Computing

Sustainable AI With Quantum-Inspired Optimization: Enabling End-to-End Automation


32
in Cloud-Edge Computing

33 TM-Chain: TCB Measurement Management Using Cloud Blockchain for IoT Devices

34 Towards Efficient Serverless MapReduce Computing on Cloud-Native Platforms

Towards Reliable Configuration Management in Clouds: A Lightweight Consistency


35
Validation Mechanism for Virtual Private Clouds
Understanding the Security Risks of Websites Using Cloud Storage for Direct User File
36
Uploads
Nonlinear Model Predictive Control for Internet of Things Using Particle Swarm
37
Optimization and Cloud Computing

CLOUD SECURITY
S.NO TITLES

A Novel Pairing Free Revocable Certificateless Encryption With Ciphertext Evolution


2
for Healthcare System

A Method for Service Function Chain Migration Based on Server Failure Prediction in
4
Mobile Edge Computing Environment
Accelerated Multi-Key Homomorphic Encryption via Automorphism-Based Circuit
8
Bootstrapping
AI-Powered System for an Efficient and Effective Cyber Incidents Detection and
9
Response in Cloud Environments
An Auto-Annotation Approach for Object Detection and Depth-Based Distance
10
Estimation in Security and Surveillance Systems

Cloud Platform Selection Model in the Framework of Differential Quality Game With
12
Fuzzy Information

Comments on ‘‘Exploring Secure V2X Communication Networks for Human-Centric


14 Security and Privacy in Smart Cities’’—Privacy-Preserving Certificate in V2X
Communications
Design and Research of Network Edge Device Security Monitoring System Based on
15
Embedded System and Bi-LSTM

16 Dynamic Management of Constrained Computing Resources for Serverless Services

Security Risks and Designs in the Connected Vehicle Ecosystem: In-Vehicle and Edge
32
Platforms

36 Unbounded Depth ElGamal-Based Asymmetric Updatable Encryption Technique

Understanding the Security Risks of Websites Using Cloud Storage for Direct User File
37
Uploads
Unified Security Framework Using Device-Specific Fingerprint: Mitigating Hardware
38
Trojans and Authenticating Firmware Updates
UniTwin: Pushing Universal Digital Twins Into the Clouds Through Reconfigurable
39
Container Environments

PPRU: A Privacy-Preserving Reputation Updating Scheme for Cloud-Assisted Vehicular


24
Networks
Quantum Safe Multi-Factor User Authentication Protocol for Cloud-Assisted Medical
25
IoT
Reinforcement Learning-Driven Task Offloading and Resource Allocation in Wireless
26
IoT Networks

Research on Image Recognition and Classification Algorithms in Cloud Computing


28
Environment Based on Deep Neural Networks
Securing Linux Cloud Environments: Privacy-Aware Federated Learning Framework for
29
Advanced Malware Detection in Linux Clouds
MODIFIED TITLES

Hybrid Adaptive Neuro-Fuzzy and Quantum Avian Navigation Algorithm


for Optimized Resource Monitoring and Task Scheduling in Cloud
Systems
Real-Time Data Integrity and Secure Deduplication Scheme for Industrial
IoT in Fog-Assisted Cloud Systems
Navigating the Challenges and Unlocking Opportunities in Fog Computing
Scheduling: A Systematic Literature Review
Multi-Modal Imagery Cloud and Shadow Detection Techniques with
Integrated Gap-Filling Solutions
Fuzzy Logic-Driven Differential Quality Game Model for Dynamic Cloud
Platform Selection
Ephemeral and Distributed Cloud-Native Architecture for Monitoring
Internet Background Radiation: The Cloud Telescope Approach
Enabling Distributed Cloud Collaboration Through Data Overlay Mesh
Networks
Enabling Multi-Interactive Data Analysis Through DataLab as a Service
Distributed Framework
Evaluating Nature-Inspired Techniques for Adaptive Service Placement in
Edge Computing Environments
Deep Reinforcement Learning for Efficient Task Scheduling and Load
Balancing in Fog Computing for Critical Healthcare
Energy-Efficient Task Scheduling in Cloud Data Centers Using Enhanced
Multi-Objective Optimization (EMO-TS)
Green Resource Management in Mobile Edge Computing with NOMA
and Massive MIMO Technologies
Strengthening Cloud Security with Machine Learning-Driven Multi-Factor
Authentication and Adaptive Cryptography
Cooperative Formation Control of Multi-Quadcopters via Cloud Access
and Real-Time Coordination
Efficient Cloud Task Scheduling Using a Hybrid Henry Gas-Harris Hawks
Comprehensive Opposition Algorithm
Efficient Cloud-Driven Distributed Training of Residual CNNs for Aerial
Images
Machine Learning and Threat Intelligence in Cloud Security: Trends,
Challenges, and Future Directions
A Meta Reinforcement Learning-Based Hybrid Lyrebird Falcon Optimizer
for Efficient Cloud Load Balancing
Harnessing Modern Deep Learning for Efficient Processing of Big Medical
Data in Cloud Environments
Edge-Based Motion Detection Using RGB-D Imaging for Enhanced Vehicle
Classification
Advances in Multi-Objective Optimization for Cloud Task Scheduling: A
Comprehensive Literature Survey
Resource Allocation in Fog-Cloud Environments Using O2O-PLB: A Priority
and Load Balancing Approach
Distributed Deep Reinforcement Learning-Driven Task Offloading
Optimization in Multi-Domain IoT Edge Environments
PPRU: Privacy-Preserving Mechanisms for Reputation Updates in
Vehicular Networks with Cloud Support
Hybrid Genetic Algorithm-Based QoS-Aware Task Scheduling for
Enhanced Cloud Performance
Enhancing Medical IoT Security with Quantum-Safe Multi-Factor
Authentication in Cloud Platforms
Cloud-Based Deep Neural Network Algorithms for Enhanced Image
Recognition and Classification
Resource-Efficient Task Scheduling in Fog Computing Using Deep
Deterministic Policy Gradient
A Deep Reinforcement Learning Framework for Scheduling Delay-
Sensitive Healthcare Services in the Cloud
Intelligent Malware Detection in Linux Clouds with Privacy-Aware
Federated Learning
A Taxonomy and Analysis of DLT Approaches for Security and Scalability
in Computing
Sustainable and Scalable AI in Cloud-Edge Computing Through Quantum-
Inspired Optimization
Decentralized TCB Measurement Management in IoT via Cloud-
Integrated Blockchain
Enabling Scalable MapReduce Computing via Serverless Architectures in
Cloud-Native Environments
Reliable Configuration Management in Cloud Environments Using
Lightweight Consistency Validation
Security Implications of Direct User File Uploads to Cloud Storage in Web
Applications
Optimizing Nonlinear Predictive Control in IoT Networks Through Cloud-
Enabled PSO Algorithms

Efficient Ciphertext Evolution and Revocable Certificateless Encryption


for Healthcare Applications

Predictive Migration of Service Function Chains for Fault-Tolerant Mobile


Edge Computing
Improving Multi-Key Homomorphic Encryption Efficiency via
Automorphism-Enhanced Circuit Bootstrapping
Efficient and Effective Cybersecurity Incident Management in the Cloud
Using AI
Auto-Annotation Driven Object Detection with Depth-Based Distance
Estimation for Enhanced Surveillance

Modeling Cloud Platform Selection via Differential Quality Game


Framework Incorporating Fuzzy Information

Analysis of Privacy-Preserving Certificates in V2X for Human-Centric


Smart City Security

Development and Analysis of an Embedded System-Driven Bi-LSTM


Security Monitoring System for Network Edge Devices
Intelligent Dynamic Resource Management for Serverless Services with
Resource Constraints
Securing the Connected Vehicle Ecosystem: Advanced Risk Mitigation
and Design for In-Vehicle and Edge Platforms
Flexible Asymmetric Updatable Encryption Leveraging Unbounded Depth
ElGamal Technique
Security Risks and Safeguards for Websites Employing Cloud Storage in
User File Uploads
Mitigating Hardware Trojans and Authenticating Firmware via Device-
Specific Fingerprint Security Framework
Reconfigurable Container-Based Framework for Universal Digital Twin
Deployment in the Cloud

Design and Evaluation of PPRU: A Privacy-Preserving Reputation


Mechanism in Vehicular Cloud Environments
Towards Quantum-Safe Healthcare IoT: A Multi-Factor Authentication
Protocol for Cloud Integration
Learning to Offload: Reinforcement Learning for Scalable Resource
Allocation in Wireless IoT Networks

Optimizing Image Recognition and Classification with Deep Neural


Networks in Cloud Computing
Federated Learning Framework for Privacy-Conscious Malware Detection
in Linux Clouds
IMAGE PROCESSING
IEEE TITLES
S.NO TITLES

A Dual-Stream Deep Learning Architecture With Adaptive Random Vector Functional Link
2 for Multi-Center Ischemic Stroke Classification
A Multilevel Point-Matching Algorithm Based on Hierarchical Feature Detection and
3 Description for SAR-to-Optical Image Registration
A Novel Approach for Aphasia Evaluation Based on ROI-Based Features From Structural
4 Magnetic Resonance Image
A Polarization-Power-Maximum-Based 3-D Imaging Method for Ku-Band UAV-Borne Fully
5 Polarimetric Array InSAR

A Sinogram Decimation Fast Back-Projection Algorithm for Strip-Map SAR Imaging


6
AI-Synthesized Image Detection: Source Camera Fingerprinting to Discern the Authenticity
7 of Digital Images
An Effective Adaptive Downsampling Method for High-Resolution Multi-Panel Image
8 Segmentation
Atmospheric Scattering Model Combined With Image Segmentation in Foggy Image
9 Enhancement
Automatic Adjustment Method of Operating Parameters in Laser Cleaning Process Based on
10 Image Processing

Automatic Interpretation of Brain Medical Images Using Hierarchical Classification and


Image Captioning Model
11
CAMP-Net: Consistency-Aware Multi-Prior Network for Accelerated MRI Reconstruction
12
Computationally Efficient SVD Filtering for Ultrasound Flow Imaging and Real-Time
13 Application to Ultrafast Doppler
ConvexAdam: Self-Configuring Dual-Optimization-Based 3D Multitask Medical Image
14 Registration

CR-DEQ-SAR: A Deep Equilibrium Sparse SAR Imaging Method for Compound Regularization
15
Dedicated 3D-Printed Radioactive Phantoms With 18F-FDG for Ultrahigh-Resolution PET
16
Deep Image Synthesis, Analysis and Indexing Using Integrated CNN Architectures
17
Degrade or Super-Resolve to Recognize? Bridging the Domain Gap for Cross-Resolution Face
18 Recognition
Design of an Iterative Model for Incremental Enhancements in Quantum Image Processing
19 Using Reinforcement Learning-Based Optimizations
Development of View Optimization Techniques for Structural Monitoring Systems Using
20 Post-Processing of Structural Analysis and Image Processing

Elevational Synthetic Aperture Focusing for Rotated Array-Based Three-Dimensional


22 Ultrasound Imaging
Enhanced BP Algorithm Combined With Semantic Segmentation and Subaperture for
23 Improving Agricultural Scene Image Quality in GEO SAR

Explainable Feature-Injected Diffusion Model for Medical Image Translation


24
Fast-DDPM: Fast Denoising Diffusion Probabilistic Models for Medical Image-to-Image
25 Generation
From Technical Prerequisites to Improved Care: Distributed Edge AI for Tomographic
26 Imaging

GPU Accelerated Trilateral Filter for MR Image Restoration


27
28 IIDM: Image-to-image diffusion model for semantic image synthesis
Improved Motion Correction in Dynamic Contrast-Enhanced MRI Using Low Rank With Soft
29 Weighting

Information-Theoretic Analysis of Multimodal Image Translation


30
Infrared and Visible Image Fusion Based on Image Enhancement and Target Extraction
31

Integration of Convolutional Neural Network and Image Processing for Pulp Fibril Detection
33 and Measurement
Low-Light Image Enhancement via New Intuitionistic Fuzzy Generator-Based Retinex
34 Approach
Mamba-Based VoxelMorph Framework for Cardiovascular Disease Imaging and Risk
35 Assessment
Maximizing Measurement Visual-Inertial Odometry for Low-Light Environment Through
36 Online Image Pre-Processing
Mitigation of Motion Artifacts in Handheld Laser Speckle Contrast Imaging Illustrated on
37 Psoriasis Lesions

Motion Compensation in Pulmonary Fluorescence Lifetime Imaging: An Image Processing


Pipeline for Artefact Reduction and Clinical Precision
38
MODIFIED TITLES

Adaptive Dual-Stream Deep Learning with Random Vector


Functional Link for Multi-Center Ischemic Stroke Diagnosis
Hierarchical Feature-Based Multilevel Matching: A New Paradigm
for SAR and Optical Image Registration
Transforming Aphasia Detection: A Novel ROI-Focused Method
Leveraging Structural MRI
Ku-Band UAV-Borne Fully Polarimetric Array InSAR: A Novel
Polarization-Power-Maximum Method for Enhanced 3D Imaging
Accelerated Strip-Map SAR Imaging via Sinogram Decimation and
Fast Back-Projection
From Pixels to Provenance: Harnessing Source Camera Fingerprints
to Detect AI-Created Images
Scalable Adaptive Downsampling Framework for Accurate High-
Resolution Multi-Panel Segmentation
Precision Foggy Image Enhancement Using Combined Atmospheric
Scattering and Segmentation Models
AI-Powered Adaptive Control for Laser Cleaning Through Image
Analysis

Bridging Visual and Semantic Understanding: Automated Brain MRI


Interpretation through Hierarchical Classification and Captioning

Consistency-Aware Multi-Prior Deep Network for Robust


Accelerated MRI Imaging
Ultrafast Doppler Ultrasound Flow Imaging via Streamlined
Computational SVD Filtering
Smart and Self-Configuring 3D Multitask Image Registration Using
ConvexAdam Dual Optimization
Innovative Sparse SAR Imaging with CR-DEQ-SAR: Deep Equilibrium
and Compound Regularization Synergy
Revolutionizing PET Imaging: Dedicated 3D-Printed 18F-FDG
Phantoms for Ultrahigh Spatial Resolution
Deep Integrated CNN Pipeline for Comprehensive Image Synthesis,
Analysis, and Indexing
Bridging the Resolution Divide: Innovative Techniques for Face
Recognition Across Domains
Reinforcement Learning-Driven Iterative Model for Progressive
Quantum Image Processing Improvements
Innovative View Optimization Techniques for Structural Health
Monitoring via Post-Processing and Image Analysis

High-Resolution 3D Ultrasound via Elevational Focusing with


Rotated Synthetic Aperture Arrays
Improving Agricultural Image Quality in GEO SAR Using Enhanced
BP, Semantic Segmentation, and Subaperture Processing
Medical Image Translation Using Explainable Diffusion Models with
Integrated Feature Injection
Efficient Denoising Diffusion Models for High-Fidelity Medical Image
Synthesis
Transforming Tomographic Imaging with Distributed Edge AI: A Path
from Technology to Better Care
High-Performance MR Image Restoration Using GPU-Accelerated
Trilateral Filtering
Semantic Image Synthesis via Image-to-Image Diffusion Modeling
Improving Motion Robustness in DCE-MRI Using Low-Rank Models
with Adaptive Soft Weighting
Encoding Diversity and Consistency: An Information-Theoretic Study
of Multimodal Translation
Fusion of Infrared and Visible Images Using Target-Oriented Image
Enhancement Strategies

Integrating CNN and Image Processing Methods for Precise


Detection and Quantification of Pulp Fibrils
Intuitionistic Fuzzy Generator-Based Retinex Framework for
Advanced Low-Light Image Enhancement
Cardiovascular Disease Diagnosis and Risk Evaluation Through a
Novel Mamba-Based VoxelMorph Model
Improving Visual-Inertial Odometry Robustness in Low-Light via
Adaptive Online Image Pre-Processing
Mitigating Motion-Induced Distortions in Handheld Laser Speckle
Imaging of Psoriasis Skin

Motion Artifact Reduction in Pulmonary Fluorescence Lifetime


Imaging via an Image Processing Pipeline for Greater Clinical Fidelity

You might also like