QUANTUM COMPUTING PROJECT DOMAIN
IEEE TITLES
S.NO TITLES
1 A Survey on Real-Time Object Detection on FPGAs
2 Computer-Aided Quantum Algorithms for Real-Time Energy Market Trading
3 Kerr Microcombs in Integrated Waveguide Ring Resonators Enabled by Graphene Nonlinearity
4 Power Theft Detection in Smart Grids Using Quantum Machine Learning
NETWORKING AND NETWORK SECURITY UING PYTHON
S.NO TITLES
1 A Multi-Language Toolkit for the Semi-Automated Checking of Research Outputs
Model-Oriented Training of Coordinators of the Decentralized Control System of Technological
2
Facilities With Resource Interaction
Proof of Random Leader: A Fast and Manipulation-Resistant Proof-of-Authority Consensus
3
lgorithm for Permissioned Blockchains Using Verifiable Random Function
4 Secure Quantum Communication With Multi-Users in Quantum Networks
DATA ANALYSIS
S.NO TITLES
1 A Novel Hybrid Model for Credit Risk Assessment of Supply Chain Finance Based on Topological
Data Analysis and Graph Neural Network
2 A Two-Stage Method for Screening Pulse RFI in SAR Raw Data Alternating the Use of Time and
Frequency Domains
3 Application of Soft Computing for Prediction of Peripheral Neuropathy in T2DM-A Real-Time Data
Analysis
4 Hazard Analysis of Weather Conditions on Distribution Transformer Failures via Cox Proportional
Hazard Model
5 Integrating Travel Survey and Amap API Data Into Travel Mode Choice Analysis With Interpretable
Machine Learning Models: A Case Study in China
6 Loops: Leveraging Provenance and Visualization to Support Exploratory Data Analysis in
Notebooks
MODIFIED TITLES
Real-Time Object Detection on FPGAs: Bridging AI and Hardware for Intelligent
Systems
Fusing Quantum Intelligence with Real-Time Energy Trading: A Computer-Aided
Approach
Reconfigurable Kerr Microcombs through Graphene-Enabled Nonlinearity in
Integrated Photonic Circuits
Next-Gen Grid Protection: Power Theft Detection Using Quantum Machine Learning
Algorithms
Reliable Results Across Languages: Semi-Automated Checking of Research Outputs
Made Scalable
Training the Mind of the System: A Model-Based Approach to Decentralized
Control Coordination
PoRL: A Verifiable Random Function-Based Consensus for High-Speed,
Manipulation-Resistant Permissioned Blockchains
Securing the Quantum Internet: Multi-User Communication Protocols for Scalable
Quantum Networks
Topology Meets Graph Learning: A Novel Credit Risk Assessment Framework for
Supply Chain Finance
Adaptive RFI Mitigation in SAR: A Two-Stage Time–Frequency Domain Approach for
Pulse Interference
Early Detection of T2DM-Related Neuropathy: A Soft Computing-Based Clinical
Intelligence System
Climate Meets the Grid: Cox Proportional Hazard Modeling of Weather Impacts on
Transformer Reliability
Transparent Travel Modeling: Interpretable ML with Multi-Source Data Fusion for
Mode Choice Analysis
Exploring Better with Loops: Provenance-Enhanced Visual Analytics in
Computational Notebooks
ARTIFICIAL INTELLIGENCE
IEEE TITLES
S.NO TITLES
1 Digital Health: The Cybersecurity for AI-Based Healthcare Communication
A Huge Innovation in Diagnosis of Obstructive Sleep Apnea Syndrome: With an
2 Artificial Intelligence-Based Algorithm, Obstructive Sleep Apnea Syndrome Can
Now Be Diagnosed With Pulmonary Function Test
3 AI-Based Holistic Framework for Cyber Threat Intelligence Management
AI-Driven Meat Food Drying Time Prediction for Resource Optimization and
4
Production Planning in Smart Manufacturing
AI-Enhanced Robotic Process Automation: A Review of Intelligent Automation
5
Innovations
6 An Explainable Artificial Intelligence Model for the Classification of Breast Cancer
Application of Artificial Intelligence Virtual Image Technology in Photography Art
7
Creation Under Deep Learning
Application of CRNN and OpenGL in Intelligent Landscape Design Systems Utilizing
8 Internet of Things, Explainable Artificial Intelligence, and Unmanned Aerial
Vehicle Technology
9 Artificial Intelligence in Science and Society: The Vision of USERN
Children’s AI Design Platform for Making and Deploying ML-Driven Apps:
10
Design,Testing, and Development
11 Efficient Onboard Multitask AI Architecture Based on Self-Supervised Learning
End-to-End Stroke Imaging Analysis Using Effective Connectivity and Interpretable
12
Artificial Intelligence
Enhancing Gas Distribution Network Resilience Utilizing a Mixed Social Network
13
Analysis–Simulation Approach: Application of Artificial Intelligence
Evaluating Mathematical Problem-Solving Abilities of Generative AI Models:
14 Performance Analysis of o1-preview and gpt-4o Using the Korean College
Scholastic Ability Test
Explainable AI-Based Approach for Age-Related Macular Degeneration (AMD)
15
Detection via Fundus Imaging
Exploring Generative Adversarial Networks:Comparative Analysis of Facial Image
16
Synthesis and the Extension of Creative Capacities in Artificial Intelligence
Fiber Bragg Grating Sensors Combined With Artificial Intelligence for Noninvasive
17
Breast Tumor Identification
From ChatGPT to Sora: Analyzing Public Opinions and Attitudes on Generative
18
Artificial Intelligence in Social Media
19 From Hybrid to AI-First Innovation Management
Integrating Explainable Artificial Intelligence in Anomaly Detection for Threat
20
Management in E-Commerce Platforms
Integrating Explainable Artificial Intelligence With Advanced Deep Learning Model
21
for Crowd Density Estimation in Real-World Surveillance Systems
Mapping the Landscape of AI-Driven Human Resource Management: A Social
22
Network Analysis of Research Collaboration
23 Monitoring Bone Healing: Integrating RF Sensing With AI
Optimizing Secure AI Lifecycle Model Management With Innovative Generative AI
24
Strategies
Optimizing Security in IoT Ecosystems Using Hybrid Artificial Intelligence and
25
Blockchain Models: A Scalable and Efficient Approach for Threat Detection
Predicting Postoperative Re-Tear of Arthroscopic Rotator Cuff Repair Using
26
Artificial Intelligence on Imbalanced Data
Reconfigurable and Scalable Artificial Intelligence Acceleration Hardware
27
Architecture with RISC-V CNN Coprocessor for Real-time Seizure Detection
28 Satellite-Based Forest Stand Detection Using Artificial Intelligence
Simplified Physical Stability Assessment of Chilean Mine Waste Storage Facilities
29
Using GIS and AI: Application in the Antofagasta Region
Super-Resolution AI-Based Approach for Extracting Agricultural Cadastral Maps:
30
Form and Content Validation
TepiSense: A Social Computing-Based Real-Time Epidemic Surveillance System
31
Using Artificial Intelligence
Transformer-Driven Inverse Learning for AI-Powered Ceramic Material Innovation
32
With Advanced Data Preprocessing
33 Virtual Cities: From Digital Twins to Autonomous AI Societies
AI WITH PYTHON
IEEE TITLES
S.NO TITLES
Accelerating Euclidean Distance Transforms: A Fast and Flexible Approach With
1 Multi-Vendor GPU, Multi-Threading, and Multi-Language Support
2 AI-Based Holistic Framework for Cyber Threat Intelligence Management
3 Analysis of ChatGPT-Generated Codes Across Multiple Programming Languages
Analysis of the Influence of CT Imaging Conditions on the CT Image Features of
4 Pulmonary Nodule Phantoms
Blinder Oaxaca and Wilk Neutrosophic Fuzzy Set-Based IoT Sensor
5 Communication for Remote Healthcare Analysis
Comprehensive Review on the Exploitation of Advanced Memory Optimization
Strategies to Improve Performance for Convolutional and Spiking Neural
6 Networks in Medical Imaging Using Hardware Accelerators
Convolutional Neural Networks for Automatic Identification of Individuals at
7 Terrestrial Terminals
8 Descriptor: Deakin IoT Traffic (D-IoT)
Enhancing Cervical Cancer Classification: Through a Hybrid Deep Learning
9 Approach Integrating DenseNet201 and InceptionV3
Enhancing Fraud Detection in Banking With Deep Learning: Graph Neural
10 Networks and Autoencoders for Real-Time Credit Card Fraud Prevention
Evaluation of Generative AI Models in Python Code Generation: A Comparative
11 Study
Exploring the Potential of Offline LLMs in Data Science: A Study on Code
12 Generation for Data Analysis
13 Fuzzy Logic Recommender Model for Housing
Leveraging Large Language Models for Enhanced Back-Translation: Techniques
14 and Applications
Machine Learning Evaluation Metric Discrepancies Across Programming
Languages and Their Components in Medical Imaging Domains: Need for
15 Standardization
Optimizing Pre-Trained Code Embeddings With Triplet Loss for Code Smell
16 Detection
PokerKit: A Comprehensive Python Library for Fine-Grained Multivariant Poker
17 Game Simulations
Recognizing Supporting Standpoints for Online Restaurant Reviews: Evidence
18 From Tripadvisor
MODIFIED TITLES
Securing the Future of Care: Cybersecurity in AI-Driven Digital Health
Communication Networks
AI Revolutionizes OSAS Diagnosis: From Sleep Labs to Lung Function Tests
Cognitive Cybersecurity: An AI-Centric Approach to Threat Intelligence
Management
Machine Learning for Meat Drying Time Prediction: A Smart Manufacturing
Perspective
Revolutionizing Automation: A Survey on AI-Enhanced RPA for Smart
Business Processes
Explainable Deep Learning for Breast Cancer Detection: Bridging Accuracy
and Interpretability
Photographic Innovation in the AI Era: Virtual Image Art Creation Powered by
Deep Learning
Designing the Future: An IoT-Driven, CRNN and OpenGL-Based Landscape
Architecture System with XAI and UAV Support
Shaping the Future: The USERN Perspective on Artificial Intelligence in
Science and Society
Machine Learning Made Child’s Play: A Platform for Designing and Deploying
AI Apps by Young Innovators
Self-Supervised Synergy: Toward Efficient Multitask AI Architectures for
Onboard Intelligence
Decoding Stroke Pathways: End-to-End Imaging Analysis with Effective
Connectivity and XAI Integration
Modeling Resilience: An AI-Powered Approach to Gas Distribution Using
Social Network Analysis and Simulation
Cracking the Korean CSAT: A Comparative Analysis of o1-preview and GPT-4o
in Mathematical Reasoning
Illuminating the Diagnosis: Fundus Image-Based AMD Detection with
Explainable Artificial Intelligence
Generative Intelligence Unveiled: A Comparative Study on GANs for Facial
Image Synthesis and AI Creativity
Precision Without Invasion: A Hybrid AI-FBG Sensor Approach to Breast
Tumor Identification
Echoes Online: Exploring Public Opinion on Generative AI from ChatGPT to
Sora via Social Media Analytics
The Rise of AI-First Innovation: From Collaborative Hybrids to Autonomous
Intelligence
Secure Commerce with Transparent Intelligence: XAI-Enabled Anomaly
Detection for Threat Mitigation
Explainable Crowd Counting: AI-Powered Density Estimation for Smarter
Surveillance Systems
Charting Connections: A Social Network Analysis of Research Collaboration in
AI-Driven Human Resource Management
Wireless Intelligence: Monitoring Bone Regeneration Using RF Sensing and
Artificial Intelligence
AI Building AI: Generative Approaches to Secure, Automated Lifecycle
Management of AI Models
Cognitive Chains: Hybrid AI and Blockchain Models for Efficient and Scalable
IoT Threat Detection
Smart Surgery Follow-Up: Using Artificial Intelligence to Predict Rotator Cuff
Re-Tear in Imbalanced Datasets
Intelligent Hardware for Brain Health: Scalable AI Acceleration with RISC-V
CNN Coprocessors for Seizure Detection
Seeing the Forest from Space: AI-Based Satellite Analytics for Sustainable
Stand Identification
Toward Predictive Mining Safety: AI-Enhanced GIS Tools for Assessing Waste
Storage Stability in Chile
High-Definition Agriculture: A Super-Resolution AI Approach to Extract and
Validate Cadastral Maps
Social Sensing for Public Health: TepiSense AI System for Real-Time Epidemic
Tracking
Revolutionizing Ceramic Design: A Transformer-Driven Approach to Inverse
Learning and Data Optimization
Digital Twins to AI Societies: Reimagining Urban Futures in Virtual Cities
TH PYTHON
MODIFIED TITLES
Blazing Fast Euclidean Distance Transforms: A Scalable Approach with Multi-
GPU and Multi-Language Integration
Adaptive Threat Intelligence: An AI-Integrated Holistic Framework for
Modern Cybersecurity Challenges
Multi-Language Code Generation with ChatGPT: Insights into AI’s Cross-
Linguistic Programming Abilities
CT Imaging Conditions Under the Microscope: Their Role in Shaping
Pulmonary Nodule Phantom Features
A Neutrosophic Fuzzy IoT Framework for Remote Healthcare: Enhancing
Analysis with Blinder-Oaxaca and Wilk Models
Efficient Brains for Digital Medicine: Memory-Centric Optimization of CNNs
and SNNs Using Hardware Accelerators
Convolutional Neural Networks in Motion: Automating Passenger
Identification at Terrestrial Terminals
Smart Mobility with D-IoT: An IoT-Based Traffic Sensing and Optimization
System
Hybrid Deep Learning for Women’s Health: DenseNet201 and InceptionV3
Integration in Cervical Cancer Screening
Banking on Trust: Deep Learning-Driven Fraud Detection with Graph Neural
Networks and Autoencoders
CodeCraft: Benchmarking Generative AI Performance in Python Development
Environments
Edge-AI for Data Science: Assessing Offline LLMs in Python Code Generation
and Analysis Tasks
Precision in Preference: Housing Recommendation Using Fuzzy Logic Decision
Modeling
Translating Twice, Thinking Once: Leveraging LLMs for Smarter Back-
Translation Strategies
Fragmented Metrics: The Urgent Need for Standardizing ML Evaluation
Across Programming Ecosystems in Medical Imaging
Embedding Quality, Detecting Flaws: A Triplet Loss Framework for Code
Smell Detection
PokerKit Unveiled: Fine-Grained Poker Game Simulation Across Variants with
Python
Review Intelligence: Argument Mining in Tripadvisor Restaurant Feedback
MACHINE LEARNING
IEEE TITLES
S.NO TITLES
A Cloud-Based Optimized Ensemble Model for Risk Prediction of Diabetic Progression—An
1
Azure Machine Learning Perspective
A Data-Driven Approach to Engineering Instruction: Exploring Learning Styles, Study Habits,
2
and Machine Learning
3 A Hybrid Machine Learning Model for Efficient XML Parsing
A New Heterogeneous Hybrid Massive MIMO Receiver With an Intrinsic Ability of Removing
4
Phase Ambiguity of DOA Estimation via Machine Learning
A Nonintrusive Nonlinear Model Reduction Method for Thermal Cycling-Induced Viscoplastic
5
Deformation Problems Based on Segmented Gaussian Process Regression Machine Learning
A Novel Approach to Cognitive Load Measurement in N-Back Tasks Using Wearable Sensors,
6 Empirical Mode Decomposition With Machine Learning, and Explainable AI for Feature
Importance
8 Ad Click Fraud Detection Using Machine Learning and Deep Learning Algorithms
Advanced Machine Learning Ensembles for Improved Precipitation Forecasting: The
9
Modified Stacking Ensemble Strategy in China
An Efficient Malware Detection Approach Based on Machine Learning Feature Influence
10
Techniques for Resource-Constrained Devices
Analysis of Gas Pipeline Failure Factors Based on the Novel Bayesian Network by Machine
11
Learning Optimization
12 Anomaly Detection in Network Traffic Using Advanced Machine Learning Techniques
Bridging Precision and Complexity: A Novel Machine Learning Approach for Ambiguity
13
Detection in Software Requirements
Decoding Motor Excitability in TMS Using EEG-Features: An Exploratory Machine Learning
14
Approach
Depression Detection in Social Media: A Comprehensive Review of Machine Learning and
15
Deep Learning Techniques
Design a Robust DDoS Attack Detection and Mitigation Scheme in SDN-Edge-IoT by
16
Leveraging Machine Learning
17 Design of an Early Prediction Model for Parkinson’s Disease Using Machine Learning
Detection and Classification of Teacher-Rated Children’s Activity Levels Using Millimeter-
18
Wave Radar and Machine Learning: A Pilot Study in a Real Primary School Environment
Discriminating Between Indoor and Outdoor Environments During Daily Living Activities
19
Using Local Magnetic Field Characteristics and Machine Learning Techniques
Enhancing Chronic Disease Prediction in IoMT-Enabled Healthcare 5.0 Using Deep Machine
20
Learning: Alzheimer’s Disease as a Case Study
Enhancing Credit Risk Decision-Making in Supply Chain Finance With Interpretable Machine
21
Learning Model
Exploring the Effectiveness of Machine Learning and Deep Learning Techniques for EEG
22
Signal Classification in Neurological Disorders
Exploring the Landscape of Programming Language Identification With Machine Learning
23
Approaches
Frailty Modeling Using Machine Learning Methodologies: A Systematic Review With
24
Discussions on Outstanding Questions
Fuzzy Enhanced Kidney Tumor Detection: Integrating Machine Learning Operations for a
25
Fusion of Twin Transferable Network and Weighted Ensemble Machine Learning Classifier
26 Imbalanced Data Problem in Machine Learning: A Review
Implementation and Performance Evaluation of Machine Learning Based Apriori Algorithm
27
to Detect Non-Technical Losses in Distribution Systems
28 Improving Sleep Disorder Diagnosis Through Optimized Machine Learning Approaches
29 Interpretable Machine Learning Models for PISA Results in Mathematics
LASSO-mCGA: Machine Learning and Modified Compact Genetic Algorithm-Based Biomarker
30
Selection for Breast Cancer Subtype Classification
Optimized Identification of Sentence-Level Multiclass Events on Urdu-Language-Text Using
42
Machine Learning Techniques
Performance of Quantum Annealing Machine Learning Classification Models on ADMET
43
Datasets
Prediction of High-Pressure Physical Properties of Crude Oil Using Explainable Machine
44
Learning Models
Prediction of Multidimensional Poverty Status With Machine Learning Classification at
45
Household Level: Empirical Evidence From Tanzania
46 Semi-Supervised Learning via Cross-Prediction-Powered Inference for Wireless Systems
47 Smell-ML: A Machine Learning Framework for Detecting Rarely Studied Code Smells
48 Sustainable Selection of Machine Learning Algorithm for Gender-Bias Attenuated Prediction
Systematic Review of Fake News, Propaganda,and Disinformation: Examining Authors,
49
Content,and Social Impact Through Machine Learning
Volatile Organic Compounds for the Prediction of Lung Cancer by Using Ensembled Machine
50
Learning Model and Feature Selection
ML WITH PYTHON
S.NO TITLE
A General Framework for Comparing Embedding Visualizations Across Class-Label
1
Hierarchies
2 AI-Based Holistic Framework for Cyber Threat Intelligence Management
CGAP: A Hybrid Contrastive and Graph-Based Active Learning Pipeline to Detect Water and
3
Sediment in Multispectral Images
Convolutional Neural Networks for Automatic Identification of Individuals at Terrestrial
4
Terminals
5 Descriptor: Clarkson University Affective Research Dataset (CUADS)
6 Descriptor: Deakin IoT Traffic (D-IoT)
Enhancing Fraud Detection in Banking With Deep Learning: Graph Neural Networks and
7
Autoencoders for Real-Time Credit Card Fraud Prevention
8 ERX: A Fast Real-Time Anomaly Detection Algorithm for Hyperspectral Line Scanning
Machine Learning Evaluation Metric Discrepancies Across Programming Languages and Their
9
Components in Medical Imaging Domains: Need for Standardization
Model-Oriented Training of Coordinators of the Decentralized Control System of
10
Technological Facilities With Resource Interaction
RADSAFiE: A Netlist-Level Fault Injection User Interface Application for FPGA-Based Digital
11
Systems
SCM-DL: Split-Combine-Merge Deep Learning Model Integrated with Feature Selection in
12
Sports for Talent Identification
SPICE-Level Demonstration of Unsupervised Learning With Spintronic Synapses in Spiking
13
Neural Networks
Super-Resolution AI-Based Approach for Extracting Agricultural Cadastral Maps: Form and
14
Content Validation
15 Tiny Federated Learning for Constrained Sensors: A Systematic Literature Review
Understanding Flaky Tests Through Linguistic Diversity: A Cross-Language and Comparative
16
Machine Learning Study
MODIFIED TITLES
Predicting Diabetic Progression in the Cloud: An Optimized Ensemble Approach Using
Azure Machine Learning
Smart Instruction: Leveraging Machine Learning to Personalize Engineering Education
Through Data on Learning Behaviors
Fusing Intelligence and Structure: Hybrid Machine Learning for Optimized XML Parsing
Massive MIMO Meets Machine Learning: A Heterogeneous Receiver Architecture for
Phase-Aware DOA Estimation
Segmented Intelligence: Nonintrusive GPR-Driven Reduction of Nonlinear Viscoplastic
Models in Thermal Environments
From Signals to Insights: An Explainable Machine Learning Approach for Measuring
Cognitive Load with Wearables
Guarding the Clickstream: A Hybrid AI Framework for Ad Fraud Detection
Forecasting the Storm: A Modified Stacking Ensemble Approach for Enhanced
Precipitation Prediction in China
Efficient Threat Detection: Leveraging Feature Influence in ML for Malware Defense on
Low-Power Devices
Unveiling Pipeline Risk: Machine Learning-Optimized Bayesian Networks for Gas Failure
Analysis
Detecting the Undetected: Cutting-Edge Machine Learning Techniques for Network
Anomaly Discovery
Requirements Reimagined: ML-Based Detection of Ambiguous Language in Software
Engineering
EEG-Informed Insights: Leveraging Machine Learning to Decode Motor Excitability in TMS
Studies
Mood Mapping in the Digital World: ML and DL-Based Insights into Depression Detection
on Social Platforms
Fortifying the Smart Edge: A Machine Learning-Based DDoS Detection and Defense Model
for SDN-IoT Integration
Anticipating Neurodegeneration: A Machine Learning Model for Predicting Parkinson’s in
Its Infancy
Invisible Observers: Leveraging mmWave Radar and Machine Learning to Assess Student
Activity in Live Educational Settings
Magnetic Footprints: Leveraging Local Field Variations and AI to Detect Daily Living
Contexts
Revolutionizing Neurodegenerative Care: IoMT and Deep Learning Synergy for Alzheimer’s
Disease Prediction in Healthcare 5.0
Unboxing the Black Box: Interpretable Machine Learning Models for Supply Chain Credit
Risk Decisions
Electroencephalographic Intelligence: Evaluating Learning Algorithms for Neurological
Disorder Prediction
Syntax Meets Intelligence: Machine Learning-Based Detection of Programming Languages
Unpacking Frailty With Algorithms: A Machine Learning Perspective on Current Models
and Research Gaps
Fuzzy-Driven Kidney Tumor Detection: Integrating Twin Transferable Networks with
Weighted Ensemble Machine Learning
Skewed But Significant: Exploring Machine Learning Solutions for Imbalanced Data
Problems
Empowering Grid Intelligence: ML-Based Apriori Algorithm for Identifying Non-Technical
Losses in Distribution Networks
AI-Powered Slumber: Enhancing Sleep Disorder Detection Through Advanced Machine
Learning Optimization
AI-Powered Slumber: Enhancing Sleep Disorder Detection Through Advanced Machine
Learning Optimization
Hybrid Genomics Intelligence: A LASSO and Compact Genetic Algorithm Approach to
Breast Cancer Subtype Classification
Multiclass Event Extraction from Urdu Text: A Machine Learning Approach for Linguistic
Intelligence
Exploring Quantum Horizons: Performance Analysis of Annealing-Based ML on ADMET
Datasets
Predicting Crude Oil Thermophysics at High Pressure: A Transparent Machine Learning
Approach
Intelligent Poverty Mapping: Machine Learning Models for Multidimensional Poverty
Prediction in Tanzania
Cross-Prediction Enhanced Semi-Supervised Learning for Intelligent Wireless Inference
Deep Code Hygiene: Smell-ML Framework for Rare Smell Detection with Machine
Learning
Balancing Performance and Fairness: A Sustainable ML Algorithm Selection Strategy for
Gender-Bias Reduction
Machine Learning for Truth Discovery: A Review of Fake News, Propaganda Authors, and
Their Influence on Society
Predicting Lung Cancer With AI-Enhanced Breath Analysis: Feature-Selected Ensemble
Models of VOC Biomarkers
Exploring Latent Landscapes: A Framework for Comparing Embeddings Across Class
Hierarchies
Holistic Cyber Defense: Leveraging Artificial Intelligence for Adaptive Threat Intelligence
Management
Harnessing CGAP: Hybrid Graph-Contrastive Learning for Efficient Water and Sediment
Mapping in Multispectral Data
Individual Identification in Surveillance Footage from Terrestrial Terminals Using CNNs
Redefining Emotional Understanding: Descriptor Innovation for the CUADS Dataset
Smart Traffic Descriptors for IoT: A Deep Dive into the Deakin D-IoT Dataset
Neural Graphs Against Fraud: A Deep Learning Architecture for Secure Banking
Streamlined Hyperspectral Intelligence: ERX for Real-Time Anomaly Detection
Code Matters: How Programming Language Choices Affect ML Evaluation in Medical
Imaging
Empowering Control Agents: Model-Oriented Training in Decentralized, Resource-Aware
Systems
Pushing the Boundaries of FPGA Reliability: RADSAFiE for Interactive Fault Injection
Game-Changing Intelligence: SCM-DL with Feature Selection for Next-Gen Sports Talent
Identification
Spintronics Meets Neuromorphic Intelligence: SPICE-Level Unsupervised Learning in SNNs
Precision Mapping in Agriculture: A Super-Resolution AI Framework for Cadastral
Extraction and Semantic Validation
Bringing AI to the Smallest Devices: A Systematic Study of Tiny Federated Learning in
Sensor Networks
Breaking the Silence of Flaky Tests: Cross-Language Linguistic Features in ML-Powered
Software Testing
DATA MINING
IEEE TITLES
S.NO TITLE
1 A Clause-Based Data Augmentation Method for Low-Resource Neural Machine Translation
2 A Decision Tree-Based Advisory Recommendation System for Dental Students
A High-performance reversible data hiding scheme for audio streams base on code division
3
multiplexing
4 A Systematic Literature Review on Mining LTL Specifications
Comparative Analysis of Federated Association Rules in a Simulated Environment for Medical
5
Applications
Customer Behavior Analysis and Predictive Modeling in Supermarket Retail: A Comprehensive Data
6
Mining Approach
Comprehensive Environmental Monitoring System for Industrial and Mining Enterprises Using
7
Multimodal Deep Learning and CLIP Model
8 Data Fusion and Models Integration for Enhanced Semantic Segmentation in Remote Sensing
Data-Driven Dynamic Graph Convolution Transformer Network Model for EEG Emotion Recognition
9
Under IoMT Environment
Desensitized Financial Data Generation Based on Generative Adversarial Network and Differential
10
Privacy
Developing Data-Driven QFD: A Systemic Approach to Employing Product Manuals and Customer
11
Reviews
Digital Twins and Enabling Technology Applications in Mining: Research Trends, Opportunities, and
12
Challenges
Exploratory and Interpretable Approach to Estimating Latent Health Risk Factors Without Using
13
Domain Knowledge
14 Fusion of Geochemical Data and Remote Sensing Data Based on Convolutional Neural Network
15 How Big Data Has Changed Technology Roadmapping: A Review on Data-Driven Roadmapping
IACGAN-ST: A Fault Diagnosis Method for Scraper Conveyor Bearings Under Imbalanced Data
16
Conditions
17 Incremental Closed Frequent Itemsets Mining-Based Approach Using Maximal Candidates
18 Integrating Fuzzy C-Means and DBSCAN: A Hybrid Approach to Medical Data Mining
Joint Adaptive Resolution Selection and Conditional Early Exiting for Efficient Video Recognition on
19
Edge Devices
Knowledge-Enriched Recommendations: Bridging the Gap in Alloy Material Selection With Large
20
Language Models
Lightweight Multiscale Spatio-Temporal Graph Convolutional Network for Skeleton-Based Action
21
Recognition
LLM-Enhanced Human–Machine Interaction for Adaptive Decision-Making in Dynamic
22
Manufacturing Process Environments
23 Offender Characterization and Prediction: A Case Study of the Kingdom of Bahrain
24 Performance Analysis: Discovering Semi-Markov Models From Event Logs
Predicting the Imbalanced Impact of Drugs on Microbial Abundance Using Multi-View Learning and
25
Data Augmentation
Prediction of Higher Education Achievement by Mining Patterns from Health Records and Socio-
26
Economic Status
MODIFIED TITLES
Clause-Level Intelligence: Structurally Informed Data Augmentation for Low-Resource NMT
Tasks
Personalized Academic Recommendations for Dental Students Using Decision Tree Models
Echo-Free Embedding: High-Performance Reversible Data Hiding in Audio via Code Division
Multiplexing
Temporal Logic Decoded: Advances and Challenges in Mining LTL Specifications – A
Systematic Review
Unifying Privacy and Predictive Power: Comparative Analysis of Federated Association Rules
in Healthcare Simulations
Predicting the Aisles: Comprehensive Customer Behavior Analysis in Supermarket
Environments
Industrial Ecology Reimagined: A Multimodal AI Monitoring System Using CLIP for
Environmental Risk Assessment
Semantic Clarity from the Sky: Data Fusion and Deep Model Integration in Remote Sensing
Applications
IoMT-Enabled Emotion Recognition: A Fusion of Graph Convolution and Transformer
Networks on EEG Data
Financial Data Reimagined: A Differential Privacy and GAN-Based Framework for Synthetic
Generation
Voice of the Customer Meets the Manual: Building QFD with Data-Driven Intelligence
Enabling Intelligent Mines: Digital Twin Technologies and the Road Ahead
Interpretable Health Risk Discovery: Mining Latent Factors Without Expert Input
FusionNet-Earth: A CNN Model for Integrated Analysis of Geochemical and Remote Sensing
Datasets
Redefining the Roadmap: The Impact of Big Data on Technology Foresight and Strategic
Planning
Robust Fault Diagnosis in the Wild: IACGAN-ST for Scraper Conveyor Bearings with Skewed
Data
Efficient Pattern Discovery: An Incremental Approach to Mining Closed Frequent Itemsets
Using Maximal Candidates
Exploring Medical Data Complexity: A Novel Hybrid Clustering Technique Using FCM and
DBSCAN
Edge-Aware Video Intelligence: Joint Adaptive Resolution and Early Exiting for Efficient
Recognition
Bridging Materials Intelligence: LLM-Powered Recommendations for Informed Alloy
Selection
AgilePose: Lightweight Graph Convolutional Modeling for Multiscale Skeleton-Based Action
Recognition
Conversational Manufacturing: LLM-Based Human–Machine Collaboration for Real-Time
Process Adaptation
Offender Analytics in Action: Characterization and Prediction in the Bahraini Criminal
Landscape
Modeling Time and Transitions: A Semi-Markov Approach to Event Log-Based Performance
Analysis
Integrative Modeling of Drug-Microbiome Responses with Multi-View Learning and
Synthetic Data
Health Meets Academia: Predictive Modeling of Educational Attainment via Socio-Economic
and Medical Data
BLOCK CHAIN
IEEE TITLES
S.NO TITLES
A broadcast-and-select ROADM architecture to support linear hub-ended trees using point-to-
1 multipoint coherent transceivers [Invited]
A Dynamic Sliding Window Encoding for Secured DNA Data Storage Compliant With Biological
2 and Indexing Constraints
A Novel Lattice-based Blockchain Infrastructure and its Application on Trusted Data
3 Management
Cyber Threat Inference Focused on Threat Class Sequence With Threat Class Sequence System
4
Design of Approximate Adder With Reconfigurable Accuracy
5
Exploiting Low-Density Signal Structure via Approximate Message Passing With Side
6 Information for Grant-Free NOMA
Fresh or Rotten? Enhancing Rotten Fruit Detection With Deep Learning and Gaussian Filtering
7
Generalized Centered Binomial Distribution for Bimodal Lattice Signatures
8
Opportunities and challenges in the metaverse and NFTs for business model innovation: a
9 managerial point of view
Predicting block delays in Bitcoin blockchain via Bayesian and non-Bayesian logistic regression
10
MODIFIED TITLES
Innovative ROADM Design for Linear Hub-Ended Trees Using Point-to-Multipoint Coherent
Transceivers
Encoding DNA Data Securely: A Dynamic Sliding Window Approach Respecting Biological and
Indexing Limits
Building Trust with Lattice-Based Blockchain: A New Paradigm for Data Management
Inferring Cyber Threats via Threat Class Sequences: A Threat Class Sequence System Approach
Approximate Adder with Reconfigurable Accuracy: Balancing Precision and Efficiency
Grant-Free NOMA Enabled by Approximate Message Passing Leveraging Low-Density Signal
Structures and Side Information
Enhanced Rotten Fruit Identification Using Deep Neural Networks and Gaussian Filtering
Innovations in Bimodal Lattice Signatures via Generalized Centered Binomial Distribution
Navigating Opportunities and Challenges of the Metaverse and NFTs for Business Model
Innovation: Insights for Managers
Advanced Prediction of Bitcoin Block Delays via Bayesian and Non-Bayesian Logistic Regression
DEEP LEARNING
IEEE TITLES
S.NO TITLES
A Co-Evolutionary Genetic Algorithm Approach to Optimizing Deep Learning for
1
Brain Tumor Classification
A Computational Intelligence Framework Integrating Data Augmentation and
2 Meta-Heuristic Optimization Algorithms for Enhanced Hybrid Nanofluid Density
Prediction Through Machine and Deep Learning Paradigms
A Deep and Interpretable Learning Approach for Long-Term ECG Clinical Noise
3
Classification
A Novel Active Learning Approach for Improving Classification of Unlabeled
4
Video Based on Deep Learning Techniques
A Novel RMS-Driven Deep Reinforcement Learning for Optimized Portfolio
5
Management in Stock Trading
Autonomous Quadrotor Path Planning Through Deep Reinforcement Learning
6
With Monocular Depth Estimation
Deep Learning and Federated Learning in Breast Cancer Screening and
7
Diagnosis: A Systematic Review
Deep Learning Approaches in the Effects of Recession and FOMC Minutes on Oil
8
Prices
Deep Learning-Augmented Evolutionary Strategies for Intelligent Global
9
Optimization
Depression Detection in Social Media: A Comprehensive Review of Machine
10
Learning and Deep Learning Techniques
Development of Continuous AMSR-E/2 Soil Moisture Time Series by Hybrid
11 Deep Learning Model (ConvLSTM2D and Conv2D) and Transfer Learning for
Reanalyses
Dueling Network Architecture for GNN in the Deep Reinforcement Learning for
12
the Automated ICT System Design
Enhancing Chronic Disease Prediction in IoMT-Enabled Healthcare 5.0 Using
13
Deep Machine Learning: Alzheimer’s Disease as a Case Study
Enhancing Mobile App Recommendations With Crowdsourced Educational Data
14
Using Machine Learning and Deep Learning
Enhancing Phishing Detection: A Machine Learning Approach With Feature
15
Selection and Deep Learning Models
Exploring the Effectiveness of Machine Learning and Deep Learning Techniques
16
for EEG Signal Classification in Neurological Disorders
17 Federated Deep Reinforcement Learning for ENDC optimization
FFDL: Feature Fusion-Based Deep Learning Method Utilizing Federated Learning
18
for Forged Face Detection
Fuzzy Enhanced Kidney Tumor Detection: Integrating Machine Learning
19 Operations for a Fusion of Twin Transferable Network and Weighted Ensemble
Machine Learning Classifier
Gamma Log Inversion of Seismic Data Based on Transformer With Stratigraphic
20
Position Encoding
Inverse RL Scene Dynamics Learning for Nonlinear Predictive Control in
21
Autonomous Vehicles
22 Learning Ordinal–Hierarchical Constraints for Deep Learning Classifiers
Lithium-Ion Battery State of Health Degradation Prediction Using Deep Learning
23
Approaches
Machine Learning and Deep Learning Approaches for Accent Recognition: A
24
Review
Melanoma Breslow Thickness Classification Using Ensemble-Based Knowledge
25
Distillation With Semi-Supervised Convolutional Neural Networks
Performance Evaluation of Hybrid Bio-Inspired and Deep Learning Algorithms in
26
Gene Selection and Cancer Classification
Prediction of High-Risk Cardiac Arrhythmia Based on Optimized Deep Active
27
Learning
Reweighted Partial Least Squares and Deep Learning-Based RDOA/AOA
28
Estimation for Seismic Epicenter
Simple Yet Powerful: Machine Learning-Based IoT Intrusion System With Smart
29
Preprocessing and Feature Generation Rivals Deep Learning
MODIFIED TITLES
Optimizing Deep Learning for Brain Tumor Classification Using a Co-
Evolutionary Genetic Algorithm Approach
A Hybrid AI Approach for Nanofluid Density Prediction Using Augmented Data
and Meta-Heuristic Optimization
Interpretable AI for Healthcare: Deep Learning-Based Long-Term ECG Noise
Classification
Efficient Deep Learning for Unlabeled Video: An Active Learning-Based
Classification Framework
RMS-Driven Deep Reinforcement Learning: A Novel Framework for Optimized
Stock Portfolio Management
Monocular Depth-Guided Deep Reinforcement Learning for Efficient
Quadrotor Path Planning
Federated and Deep Learning Techniques for Breast Cancer Screening and
Diagnosis: A Systematic Overview
Predicting Oil Price Movements through Deep Learning: The Role of Recession
and FOMC Minutes
Integrating Deep Learning with Evolutionary Strategies for Smarter Global
Optimization
Detecting Depression through Social Media: Advances in Machine and Deep
Learning Approaches – A Review
Leveraging Hybrid Deep Learning and Transfer Learning to Generate
Continuous AMSR-E/2 Soil Moisture Time Series
Deep Reinforcement Learning for Automated ICT Design: Leveraging Dueling
Network Architectures in GNNs
Advancing Alzheimer’s Disease Prediction in IoMT-Enabled Healthcare 5.0
Using Deep Machine Learning
Machine and Deep Learning Approaches to Personalized Mobile App
Recommendations Using Crowdsourced Education Data
Elevating Phishing Detection Performance with Machine Learning and Deep
Learning-Enabled Feature Selection
Intelligent EEG Signal Classification in Neurological Disorders Using Machine
and Deep Learning Methods
Federated DRL-Driven Optimization Strategies for ENDC in Next-Gen Networks
Forged Face Detection Using Federated Learning and Feature Fusion-Driven
Deep Neural Network
Robust Kidney Tumor Detection Using Fuzzy-Enhanced Machine Learning
Fusion of Twin Networks and Weighted Ensembles
Stratigraphic Position Encoding Enhanced Transformer for Gamma Log
Inversion in Seismic Analysis
IRL-Based Scene Dynamics Modeling for Enhanced Nonlinear Predictive
Control in Autonomous Vehicles
Ordinal–Hierarchical Constraint-Aware Deep Learning for Structured
Classification Tasks
Predicting Lithium-Ion Battery Health Degradation Using Deep Neural
Networks
Exploring Machine and Deep Learning Methods for Accurate Accent
Recognition: A Review
Semi-Supervised Deep Learning with Ensemble Knowledge Distillation for
Robust Melanoma Thickness Prediction
Hybrid Bio-Inspired and Deep Learning Approaches for Enhanced Gene
Selection and Cancer Classification: A Performance Study
An Optimized Deep Active Learning Approach for Accurate High-Risk Cardiac
Arrhythmia Prediction
Accurate Seismic Epicenter Localization Using Deep Learning and Reweighted
Partial Least Squares for RDOA/AOA Estimation
Rethinking IoT Security: Machine Learning Intrusion Detection System with
Intelligent Preprocessing Outperforming Deep Learning
SECURE COMPUTING
IEEE TITLES
S.NO TITLES
1 A Review of Block Ciphers and Its Post-Quantum Considerations
A Lightweight Mechanism for Dynamic Secret Sharing of Private Data by Constrained
2
Devices
A Method for Service Function Chain Migration Based on Server Failure Prediction in
3
Mobile Edge Computing Environment
A Novel Pairing Free Revocable Certificateless Encryption With Ciphertext Evolution
4
for Healthcare System
5 A Survey for Blockchain-Enabled Resource Management in Edge Networks
A Verifiable and Secure Industrial IoT Data Deduplication Scheme With Real-Time Data
6
Integrity Checking in Fog-Assisted Cloud Environments
7 A Very Compact and a Threshold Implementation of uBlock for Internet of Things
8 Adaptive Trust Architecture for Secure IoT Communication in 6G
9 An Energy-efficient Intrusion Detection Offloading Based on DNN for Edge Computing
10 An NVMe-Based Secure Computing Platform With FPGA-Based TFHE Accelerator
Blockchain and RL-Based Secured Task Offloading Framework for SoftwareDefined 5G
11
Edge Networks
12 BPS-FL: Blockchain-Based Privacy-Preserving and Secure Federated Learning
Cloud-Network-End Collaborative Security for Wireless Networks: Architecture,
13
Mechanisms, and Applications
14 Controlled Shared Memory (COSM) Isolation: Design and Testbed Evaluation
DataLab as a Service: Distributed Computing Framework for Multi-Interactive Analysis
15
Environments
DEEPFL: A Differential Evolution-Based Framework for Privacy Protection and
16
Poisoning Attack Defense in Maritime Edge Computing
17 Emerging Technologies Driving Zero Trust Maturity Across Industries
Empowering Diabetes Management Through Blockchain and Edge Computing: A
18
Systematic Review of Healthcare Innovations and Challenges
Enhancing Cloud Security: A Multi-Factor Authentication and Adaptive Cryptography
19
Approach Using Machine Learning Techniques
Evolutionary Algorithms and Quantum Computing: Recent Advances, Opportunities,
20
and Challenges
Exploiting Trusted Execution Environments and Distributed Computation for Genomic
21
Association Tests
22 Federated Deep Reinforcement Learning for ENDC Optimization
Federated Learning for Enhanced Cybersecurity and Trustworthiness in 5G and 6G
23
Networks: A Comprehensive Survey
Improved Results Synchronization on Secure Communication in Complex Dynamical
24
Networks With Time-Varying Delay Using Delay-Dependent Feedback Control
IoMT and Blockchain Synergy: A Novel Approach to Health Data Validation and
25
Storage
Leveraging Personalized Customer Experiences in Mobile Edge Computing Through
26
Split Learning Using Smart Data-Driven Modeling
27 Lightweight Yet Nonce-Misuse Secure Authenticated Encryption for Very Short Inputs
28 MalScan: Android Malware Detection Based on Social-Network Centrality Analysis
Multi-Slot Secure Offloading and Resource Management in VEC Networks: A Deep
29
Reinforcement Learning-Based Method
Navigating the Challenges and Opportunities of Securing Internet of Autonomous
30
Vehicles With Lightweight Authentication
N-Sum Box: An Abstraction for Linear Computation Over Many-to-One Quantum
31
Networks
Optimizing Secure Multi-User ISAC Systems With STAR-RIS: A Deep Reinforcement
32
Learning Approach for 6G Networks
Privacy-Preserving Keyword Search With Access Control for Secret Sharing-Based Data
33
Outsourcing
34 Privacy-Preserving Tools and Technologies: Government Adoption and Challenges
Quantum Communication Network Routing with Circuit and Packet Switching
35
Strategies
Quantum Safe Multi-Factor User Authentication Protocol for Cloud-Assisted Medical
36
IoT
37 Secure Biometric Verification in the Presence of Malicious Adversaries
Secure Fine-Grained Multi-Keyword Ciphertext Search Supporting Cloud-Edge-End
38
Collaboration in IoT
39 Secure Lattice-Based Signature Scheme for Internet of Things Applications
40 Secure Quantum Communication With Multi-Users in Quantum Networks
Secure User Authentication With Information Theoretic Security Using Secret Sharing-
41
Based Secure Computation
SEEIR: Secure and Efficient Encrypted Image Retrieval Based on Additive Secret
42
Sharing
43 Survey of Distributed Ledger Technology (DLT) for Secure and Scalable Computing
Sybil-Resistant Self-Sovereign Identity Utilizing Attested Execution Secure Processors
44
and Zero-Knowledge Membership Proofs
45 The Rise of Cognitive SOCs: A Systematic Literature Review on AI Approaches
Trust Verification Method for Leveraging Secure Task Completion in Mobile Crowd
46
Outsourcing Processes
47 Unbounded Depth ElGamal-Based Asymmetric Updatable Encryption Technique
Unified Security Framework Using Device-Specific Fingerprint: Mitigating Hardware
48
Trojans and Authenticating Firmware Updates
Unveiling Samsung Quantum Galaxy: Securing Smartphones With Quantum and Post-
49
Quantum Cryptography
MODIFIED TITLES
Post-Quantum Challenges and Advances in Block Cipher
Cryptography: A Review
Dynamic Secret Sharing with Minimal Overhead for Privacy
Preservation on Constrained Devices
Predictive Server Failure-Driven Service Function Chain Migration
in Mobile Edge Environments
Secure Healthcare Data Protection via Pairing-Free Revocable
Certificateless Encryption with Dynamic Ciphertext Evolution
Surveying Blockchain-Based Approaches to Resource
Management in Edge Computing Environments
Verifiable and Secure Data Deduplication for Industrial IoT with
Real-Time Integrity Verification in Fog-Assisted Clouds
Threshold Implementation of uBlock: A Compact Solution for
Internet of Things
Empowering 6G IoT Communication with Adaptive and Secure
Trust Architectures
A DNN-Based Approach for Energy-Conscious Intrusion Detection
Offloading in Edge Computing
Secure NVMe Computing Leveraging FPGA-Based Fully
Homomorphic Encryption Acceleration
Reinforcement Learning and Blockchain Integration for Secured
Task Offloading in Software-Defined 5G Edge Environments
Enhancing Federated Learning Security and Privacy with
Blockchain-Based BPS-FL
Collaborative Security Across Cloud, Network, and Edge:
Architectures and Mechanisms for Wireless Networks
Exploring COSM Isolation: Design Principles and Real-World
Testbed Performance
DataLab as a Service: Architecting Distributed Multi-Interactive
Analysis Platforms
A Novel Differential Evolution-Based Approach (DEEPFL) for
Privacy and Poisoning Attack Defense in Maritime Edge
Environments
Driving Zero Trust Evolution Across Industries Through Emerging
Technologies
Revolutionizing Diabetes Management with Blockchain and Edge
Technologies: A Systematic Healthcare Review
Adaptive Cryptography and Multi-Factor Authentication in Cloud
Security Using Machine Learning Techniques
Quantum Computing and Evolutionary Algorithms:
Advancements, Potential Applications, and Obstacles
Harnessing Trusted Execution Environments with Distributed
Computing for Privacy-Preserving Genomic Association Analysis
Collaborative Deep Reinforcement Learning for Efficient ENDC
Optimization in Distributed Networks
Federated Learning Empowering Secure and Trustworthy 5G and
6G Networks: An In-Depth Survey
Delay-Dependent Feedback Control for Improved Secure
Communication Synchronization in Complex Networks with
Variable Time Delays
A Blockchain-Enabled IoMT Approach for Reliable Health Data
Validation and Storage
Data-Driven Split Learning Approaches to Elevate Personalized
Experiences in Mobile Edge Computing
Efficient Lightweight Authenticated Encryption Ensuring Nonce
Misuse Security for Tiny Data Blocks
Revolutionizing Android Malware Detection Using Social Network
Centrality: The MalScan Model
Adaptive Multi-Slot Secure Offloading and Resource
Management in Vehicular Edge Computing via Deep
Reinforcement Learning
Mitigating Security Risks in Internet of Autonomous Vehicles
Through Lightweight Authentication Solutions
Linear Computation in Quantum Networks: The Role of N-Sum
Box Abstraction
Joint Optimization of STAR-RIS-Aided ISAC for Secure Multi-User
6G Networks Using Deep Reinforcement Learning
Secure and Private Keyword Search over Secret Shared
Outsourced Data
Empowering Governance Through Privacy: Emerging Tools,
Technologies, and Adoption Challenges
Fusion of Circuit and Packet Switching in Quantum Networks: A
Next-Generation Routing Approach
Healing Through Security: Quantum-Safe Multi-Factor
Authentication for Cloud-Enabled Medical IoT
Resilient Biometric Verification: Defending Against Malicious
Adversaries in Next-Gen Security Systems
Efficient and Secure IoT Search with Multi-Keyword Support in
Edge-Centric Environments
Reimagining IoT Security: Lattice-Based Digital Signatures for the
Post-Quantum Era
Advanced Multi-User Quantum Communication with Security
Guarantees
Information-Theoretic Secure User Authentication via Secret
Sharing-Based Secure Computation
Encrypted Image Retrieval Framework Based on Additive Secret
Sharing
A Comprehensive Survey of Distributed Ledger Technology for
Secure and Scalable Computing
Attested Execution and ZK Proofs for Sybil-Resistant Self-
Sovereign Identity
The Evolution of Cognitive SOCs: Exploring AI Techniques
Through a Systematic Review
Trust-Driven Secure Task Management in Mobile Crowd
Outsourcing
ElGamal-Driven Asymmetric Updatable Encryption for Unlimited
Update Depth
Securing Devices with Fingerprint-Driven Frameworks: Mitigation
of Hardware Trojans and Firmware Validation
Quantum and Post-Quantum Cryptography in Samsung Galaxy
Smartphones
CYBER SECURITY
IEEE TITLES
S.NO TITLES
A Bibliometric Analysis of Agent-Based Systems in Cybersecurity and Broader Security
1
Domains: Trends and Insights
A Systematic Literature Review on Tackling Cyber Threats for Cyber Logistic Chain and
7
Conceptual Frameworks for Robust Detection Mechanisms
8 Adaptive Early Warning Method of Cascading Failures Caused by Coordinated Cyber-attacks
Advancing Passwordless Authentication: A Systematic Review of Methods, Challenges, and
9
Future Directions for Secure User Identity
AI-Powered System for an Efficient and Effective Cyber Incidents Detection and Response in
10
Cloud Environments
An Automated Compliance Framework for Critical Infrastructure Security Through Artificial
11
Intelligence
Analysis of Network Security Countermeasures From the Perspective of Improved FS
12
Algorithm and ICT Convergence
CIRA-Cyber Intelligent Risk Assessment Methodology for Industrial Internet of Things based
13
on Machine Learning
Cloud-Network-End Collaborative Security for Wireless Networks: Architecture,
14
Mechanisms, and Applications
Computer Network Security System Optimization Based on Improved Neural Network
15
Algorithm and Data Search
Cyber Attack Prediction: From Traditional Machine Learning to Generative Artificial
16
Intelligence
17 Cyber Shadows: Neutralizing Security Threats with AI and Targeted Policy Measures
Cyber Threat Inference Focused on Threat Class Sequence With Threat Class Sequence
18
System
19 Cyber Threat Susceptibility Assessment for Heavy-Duty Vehicles Based on ISO/SAE 21434
Cyber-Biosecurity Challenges in Next-Generation Sequencing: A Comprehensive Analysis of
20
Emerging Threat Vectors
Cyber-Physical System Security for Manufacturing Industry 4.0 Using LSTM-CNN Parallel
21
Orchestration
Data Acquisition Framework for Micromobility Vehicles Toward Driving Risk Prediction
22
Against Cyberphysical Security Attack
Deep Learning Based Side-Channel Attack Detection for Mobile Devices Security in 5G
23
Networks
Design and Research of Network Edge Device Security Monitoring System Based on
24
Embedded System and Bi-LSTM
DiGraph-Enabled Digital Twin and Label-Encoding Machine Learning for SCADA Network’s
25
Cyber Attack Analysis in Industry 5.0
PRIDA-ME: A Privacy-Preserving, Interoperable and Decentralized Authentication Scheme
26
for Metaverse Environment
Quantitative Cybersecurity Analysis Framework for Cyber Physical Systems: A Conceptual
27
Approach
Research on Encryption Algorithm and Embedded System Optimization Strategy Based on
28
IoT Security
Research on Network Security Situational Awareness and Risk Assessment Model Based on
29
Bayesian Network
Research on Performance Optimization and Resource Allocation Strategy of Network Node
30
Encryption Based on RSA Algorithm
Research on the Application of Blockchain Technology in the Security Protection of Sensitive
31
Data in Information Systems
Resilience Framework for Power Electronic Systems Against Cyber-Physical Attacks: A
32
Review
Secure Combination of Untrusted Time Information Based on Optimized Dempster-Shafer
33
Theory
Security Enhancement in AAV Swarms: A Case Study Using Federated Learning and SHAP
34
Analysis
Security Risk Assessment and Risk-oriented Defense Resource Allocation for Cyber-physical
35
Distribution Networks Against Coordinated Cyber Attacks
Study on the Application of Dynamic Continuous Trust Assessment Model Based on
36
Clustering Mechanism in Network Security Optimization
Timestamp Based OTP and Enhanced RSA Key Exchange Scheme with SIT Encryption to
37
Secure IoT Devices
Toward a Unified Understanding of Cyber Resilience: Concepts, Strategies, and Future
38
Directions
MODIFIED TITLES
Mapping the Landscape: A Bibliometric Study of Agent-Based Systems in Cybersecurity
and Security Fields
Cyber Threat Resilience in Logistics Chains: A Systematic Review and Conceptual
Detection Frameworks
Early Warning of Cascading Failures Under Coordinated Cyber-Attacks: An Adaptive
Approach
The Future of Secure Identity: A Systematic Review of Passwordless Authentication
Methods and Challenges
AI-Enhanced Cybersecurity for Cloud Platforms: Detection and Response Framework
Automation of Security Compliance in Critical Infrastructure via AI
FS Algorithm-Based Security Enhancements for ICT-Driven Network Systems
Cyber Intelligent Risk Assessment for Industrial IoT Using Machine Learning
Integrated Cloud-Network-Edge Security Framework for Wireless Networks: Mechanisms
and Use Cases
Enhancing Network Security Systems via Optimized Neural Networks and Intelligent Data
Search
Cyber Threat Forecasting: The Transition from Traditional ML to Generative AI
Approaches
Illuminating Cyber Shadows: Targeted AI Solutions and Policy Frameworks for Threat
Neutralization
Inference of Cyber Threats Through Sequential Analysis of Threat Classes Using a Threat
Class Sequence System
Applying ISO/SAE 21434 for Cyber Threat Susceptibility Analysis in Heavy-Duty Vehicles
Navigating Cyber-Biosecurity Risks in Next-Gen Sequencing: An In-Depth Threat Vector
Analysis
Parallel LSTM-CNN Framework for Cyber-Physical System Protection in Industry 4.0
Micromobility Cyber-Physical Security: Data Acquisition for Driving Risk Prediction
AI-Powered Side-Channel Attack Detection for Mobile Security in Next-Gen 5G Networks
Innovative Edge Device Security Monitoring with Embedded Systems and Bi-LSTM
Algorithms
DiGraph and Label-Encoding ML for Enhanced Cybersecurity in Industry 5.0 SCADA
Systems
Interoperable and Privacy-Driven Authentication in the Metaverse: PRIDA-ME Scheme
A Conceptual Approach to Quantitative Cybersecurity Analysis in Cyber-Physical Systems
Encryption and Embedded System Optimization Strategies for IoT Security
Bayesian Network-Based Model for Network Security Situational Awareness and Risk
Assessment
Enhancing Network Node Encryption Efficiency: Performance and Resource Optimization
Using RSA
Innovative Applications of Blockchain for Safeguarding Sensitive Information in Digital
Systems
Enhancing Resilience of Power Electronic Systems Against Cyber-Physical Attacks: A
Comprehensive Review
A Robust Framework for Combining Untrusted Time Information via Optimized
Dempster-Shafer Theory
Federated Learning and SHAP-Driven Security Improvements for Autonomous Aerial
Vehicle Swarms
Coordinated Cyber Attack Resilience: Risk Assessment and Strategic Defense Resource
Allocation in Distribution Networks
A Dynamic Trust Evaluation Framework Based on Clustering for Network Security
Enhancement
Robust IoT Device Security Using Timestamp-Driven OTP and Advanced RSA Key
Exchange with SIT Encryption
Unifying Cyber Resilience: Strategic Concepts and Future Research Directions
CLOUD COMPUTING
IEEE TITLES
S.NO TITLES
A Joint Adaptive Neuro-Fuzzy Inference System and Binary Quantum-based Avian
1 Navigation Algorithm for Optimal Resource Monitoring, Task Scheduling and
Migration in Cloud-based System
A Verifiable and Secure Industrial IoT Data Deduplication Scheme With Real-Time
2
Data Integrity Checking in Fog-Assisted Cloud Environments
3 Challenges and Opportunities in Fog Computing Scheduling: A Literature Review
Cloud and Cloud Shadow Detection for Multi-Modal Imagery With Gap-Filling
4
Applications
Cloud Platform Selection Model in the Framework of Differential Quality Game With
5
Fuzzy Information
Cloud Telescope: An Ephemeral, Distributed, and Cloud-Native Architecture for
6
Collecting Internet Background Radiation
7 Data Overlay Mesh in Distributed Clouds Allowing Collaborative Applications
DataLab as a Service: Distributed Computing Framework for Multi-Interactive Analysis
8
Environments
Dynamic Service Placement in Edge Computing: A Comparative Evaluation of Nature-
9
Inspired Algorithms
Efficient Task Scheduling and Load Balancing in Fog Computing for Crucial Healthcare
10
Through Deep Reinforcement Learning
EMO-TS: An Enhanced Multi-Objective Optimization Algorithm for Energy-Efficient
11
Task Scheduling in Cloud Data Centers
Energy-Efficient Resource Allocation in Mobile Edge Computing Using NOMA and
12
Massive MIMO
Enhancing Cloud Security: A Multi-Factor Authentication and Adaptive Cryptography
13
Approach Using Machine Learning Techniques
14 Formation Producing Control of Multi-Quadcopter Systems Under the Cloud Access
Hybrid Henry Gas-Harris Hawks ComprehensiveOpposition Algorithm for Task
15
Scheduling in Cloud Computing
Leveraging Cloud Resources for Distributed Training of Residual CNNs in Aerial Image
16
Classification
17 Literature Review of Machine Learning and Threat Intelligence in Cloud Security
Meta-RHDC: Meta Reinforcement Learning Driven Hybrid Lyrebird Falcon
18
Optimization for Dynamic Load Balancing in Cloud Computing
19 Modern Deep Learning Techniques for Big Medical Data Processing in Cloud
Motion detection methods applied on RGB-D images for vehicle classification on the
20
edge computing
Multi-Objective Optimization Techniques in Cloud Task Scheduling: A Systematic
21
Literature Review
O2O-PLB: A One-to-One-Based Optimizer With Priority and Load Balancing
22
Mechanism for Resource Allocation in Fog-Cloud Environments
Optimized Task Offloading in Multi-Domain IoT Networks Using Distributed Deep
23
Reinforcement Learning in Edge Computing Environments
PPRU: A Privacy-Preserving Reputation Updating Scheme for Cloud-Assisted Vehicular
24
Networks
25 QoS Aware Task Scheduling Using Hybrid Genetic Algorithm in Cloud Computing
Quantum Safe Multi-Factor User Authentication Protocol for Cloud-Assisted Medical
26
IoT
Research on Image Recognition and Classification Algorithms in Cloud Computing
27
Environment Based on Deep Neural Networks
Resource Adaptive Automated Task Scheduling Using Deep Deterministic Policy
28
Gradient in Fog Computing
Scheduling of Low-Latency Medical Services in Healthcare Cloud with Deep
29
Reinforcement Learning
Securing Linux Cloud Environments: Privacy-Aware Federated Learning Framework for
30
Advanced Malware Detection in Linux Clouds
31 Survey of Distributed Ledger Technology (DLT) for Secure and Scalable Computing
Sustainable AI With Quantum-Inspired Optimization: Enabling End-to-End Automation
32
in Cloud-Edge Computing
33 TM-Chain: TCB Measurement Management Using Cloud Blockchain for IoT Devices
34 Towards Efficient Serverless MapReduce Computing on Cloud-Native Platforms
Towards Reliable Configuration Management in Clouds: A Lightweight Consistency
35
Validation Mechanism for Virtual Private Clouds
Understanding the Security Risks of Websites Using Cloud Storage for Direct User File
36
Uploads
Nonlinear Model Predictive Control for Internet of Things Using Particle Swarm
37
Optimization and Cloud Computing
CLOUD SECURITY
S.NO TITLES
A Novel Pairing Free Revocable Certificateless Encryption With Ciphertext Evolution
2
for Healthcare System
A Method for Service Function Chain Migration Based on Server Failure Prediction in
4
Mobile Edge Computing Environment
Accelerated Multi-Key Homomorphic Encryption via Automorphism-Based Circuit
8
Bootstrapping
AI-Powered System for an Efficient and Effective Cyber Incidents Detection and
9
Response in Cloud Environments
An Auto-Annotation Approach for Object Detection and Depth-Based Distance
10
Estimation in Security and Surveillance Systems
Cloud Platform Selection Model in the Framework of Differential Quality Game With
12
Fuzzy Information
Comments on ‘‘Exploring Secure V2X Communication Networks for Human-Centric
14 Security and Privacy in Smart Cities’’—Privacy-Preserving Certificate in V2X
Communications
Design and Research of Network Edge Device Security Monitoring System Based on
15
Embedded System and Bi-LSTM
16 Dynamic Management of Constrained Computing Resources for Serverless Services
Security Risks and Designs in the Connected Vehicle Ecosystem: In-Vehicle and Edge
32
Platforms
36 Unbounded Depth ElGamal-Based Asymmetric Updatable Encryption Technique
Understanding the Security Risks of Websites Using Cloud Storage for Direct User File
37
Uploads
Unified Security Framework Using Device-Specific Fingerprint: Mitigating Hardware
38
Trojans and Authenticating Firmware Updates
UniTwin: Pushing Universal Digital Twins Into the Clouds Through Reconfigurable
39
Container Environments
PPRU: A Privacy-Preserving Reputation Updating Scheme for Cloud-Assisted Vehicular
24
Networks
Quantum Safe Multi-Factor User Authentication Protocol for Cloud-Assisted Medical
25
IoT
Reinforcement Learning-Driven Task Offloading and Resource Allocation in Wireless
26
IoT Networks
Research on Image Recognition and Classification Algorithms in Cloud Computing
28
Environment Based on Deep Neural Networks
Securing Linux Cloud Environments: Privacy-Aware Federated Learning Framework for
29
Advanced Malware Detection in Linux Clouds
MODIFIED TITLES
Hybrid Adaptive Neuro-Fuzzy and Quantum Avian Navigation Algorithm
for Optimized Resource Monitoring and Task Scheduling in Cloud
Systems
Real-Time Data Integrity and Secure Deduplication Scheme for Industrial
IoT in Fog-Assisted Cloud Systems
Navigating the Challenges and Unlocking Opportunities in Fog Computing
Scheduling: A Systematic Literature Review
Multi-Modal Imagery Cloud and Shadow Detection Techniques with
Integrated Gap-Filling Solutions
Fuzzy Logic-Driven Differential Quality Game Model for Dynamic Cloud
Platform Selection
Ephemeral and Distributed Cloud-Native Architecture for Monitoring
Internet Background Radiation: The Cloud Telescope Approach
Enabling Distributed Cloud Collaboration Through Data Overlay Mesh
Networks
Enabling Multi-Interactive Data Analysis Through DataLab as a Service
Distributed Framework
Evaluating Nature-Inspired Techniques for Adaptive Service Placement in
Edge Computing Environments
Deep Reinforcement Learning for Efficient Task Scheduling and Load
Balancing in Fog Computing for Critical Healthcare
Energy-Efficient Task Scheduling in Cloud Data Centers Using Enhanced
Multi-Objective Optimization (EMO-TS)
Green Resource Management in Mobile Edge Computing with NOMA
and Massive MIMO Technologies
Strengthening Cloud Security with Machine Learning-Driven Multi-Factor
Authentication and Adaptive Cryptography
Cooperative Formation Control of Multi-Quadcopters via Cloud Access
and Real-Time Coordination
Efficient Cloud Task Scheduling Using a Hybrid Henry Gas-Harris Hawks
Comprehensive Opposition Algorithm
Efficient Cloud-Driven Distributed Training of Residual CNNs for Aerial
Images
Machine Learning and Threat Intelligence in Cloud Security: Trends,
Challenges, and Future Directions
A Meta Reinforcement Learning-Based Hybrid Lyrebird Falcon Optimizer
for Efficient Cloud Load Balancing
Harnessing Modern Deep Learning for Efficient Processing of Big Medical
Data in Cloud Environments
Edge-Based Motion Detection Using RGB-D Imaging for Enhanced Vehicle
Classification
Advances in Multi-Objective Optimization for Cloud Task Scheduling: A
Comprehensive Literature Survey
Resource Allocation in Fog-Cloud Environments Using O2O-PLB: A Priority
and Load Balancing Approach
Distributed Deep Reinforcement Learning-Driven Task Offloading
Optimization in Multi-Domain IoT Edge Environments
PPRU: Privacy-Preserving Mechanisms for Reputation Updates in
Vehicular Networks with Cloud Support
Hybrid Genetic Algorithm-Based QoS-Aware Task Scheduling for
Enhanced Cloud Performance
Enhancing Medical IoT Security with Quantum-Safe Multi-Factor
Authentication in Cloud Platforms
Cloud-Based Deep Neural Network Algorithms for Enhanced Image
Recognition and Classification
Resource-Efficient Task Scheduling in Fog Computing Using Deep
Deterministic Policy Gradient
A Deep Reinforcement Learning Framework for Scheduling Delay-
Sensitive Healthcare Services in the Cloud
Intelligent Malware Detection in Linux Clouds with Privacy-Aware
Federated Learning
A Taxonomy and Analysis of DLT Approaches for Security and Scalability
in Computing
Sustainable and Scalable AI in Cloud-Edge Computing Through Quantum-
Inspired Optimization
Decentralized TCB Measurement Management in IoT via Cloud-
Integrated Blockchain
Enabling Scalable MapReduce Computing via Serverless Architectures in
Cloud-Native Environments
Reliable Configuration Management in Cloud Environments Using
Lightweight Consistency Validation
Security Implications of Direct User File Uploads to Cloud Storage in Web
Applications
Optimizing Nonlinear Predictive Control in IoT Networks Through Cloud-
Enabled PSO Algorithms
Efficient Ciphertext Evolution and Revocable Certificateless Encryption
for Healthcare Applications
Predictive Migration of Service Function Chains for Fault-Tolerant Mobile
Edge Computing
Improving Multi-Key Homomorphic Encryption Efficiency via
Automorphism-Enhanced Circuit Bootstrapping
Efficient and Effective Cybersecurity Incident Management in the Cloud
Using AI
Auto-Annotation Driven Object Detection with Depth-Based Distance
Estimation for Enhanced Surveillance
Modeling Cloud Platform Selection via Differential Quality Game
Framework Incorporating Fuzzy Information
Analysis of Privacy-Preserving Certificates in V2X for Human-Centric
Smart City Security
Development and Analysis of an Embedded System-Driven Bi-LSTM
Security Monitoring System for Network Edge Devices
Intelligent Dynamic Resource Management for Serverless Services with
Resource Constraints
Securing the Connected Vehicle Ecosystem: Advanced Risk Mitigation
and Design for In-Vehicle and Edge Platforms
Flexible Asymmetric Updatable Encryption Leveraging Unbounded Depth
ElGamal Technique
Security Risks and Safeguards for Websites Employing Cloud Storage in
User File Uploads
Mitigating Hardware Trojans and Authenticating Firmware via Device-
Specific Fingerprint Security Framework
Reconfigurable Container-Based Framework for Universal Digital Twin
Deployment in the Cloud
Design and Evaluation of PPRU: A Privacy-Preserving Reputation
Mechanism in Vehicular Cloud Environments
Towards Quantum-Safe Healthcare IoT: A Multi-Factor Authentication
Protocol for Cloud Integration
Learning to Offload: Reinforcement Learning for Scalable Resource
Allocation in Wireless IoT Networks
Optimizing Image Recognition and Classification with Deep Neural
Networks in Cloud Computing
Federated Learning Framework for Privacy-Conscious Malware Detection
in Linux Clouds
IMAGE PROCESSING
IEEE TITLES
S.NO TITLES
A Dual-Stream Deep Learning Architecture With Adaptive Random Vector Functional Link
2 for Multi-Center Ischemic Stroke Classification
A Multilevel Point-Matching Algorithm Based on Hierarchical Feature Detection and
3 Description for SAR-to-Optical Image Registration
A Novel Approach for Aphasia Evaluation Based on ROI-Based Features From Structural
4 Magnetic Resonance Image
A Polarization-Power-Maximum-Based 3-D Imaging Method for Ku-Band UAV-Borne Fully
5 Polarimetric Array InSAR
A Sinogram Decimation Fast Back-Projection Algorithm for Strip-Map SAR Imaging
6
AI-Synthesized Image Detection: Source Camera Fingerprinting to Discern the Authenticity
7 of Digital Images
An Effective Adaptive Downsampling Method for High-Resolution Multi-Panel Image
8 Segmentation
Atmospheric Scattering Model Combined With Image Segmentation in Foggy Image
9 Enhancement
Automatic Adjustment Method of Operating Parameters in Laser Cleaning Process Based on
10 Image Processing
Automatic Interpretation of Brain Medical Images Using Hierarchical Classification and
Image Captioning Model
11
CAMP-Net: Consistency-Aware Multi-Prior Network for Accelerated MRI Reconstruction
12
Computationally Efficient SVD Filtering for Ultrasound Flow Imaging and Real-Time
13 Application to Ultrafast Doppler
ConvexAdam: Self-Configuring Dual-Optimization-Based 3D Multitask Medical Image
14 Registration
CR-DEQ-SAR: A Deep Equilibrium Sparse SAR Imaging Method for Compound Regularization
15
Dedicated 3D-Printed Radioactive Phantoms With 18F-FDG for Ultrahigh-Resolution PET
16
Deep Image Synthesis, Analysis and Indexing Using Integrated CNN Architectures
17
Degrade or Super-Resolve to Recognize? Bridging the Domain Gap for Cross-Resolution Face
18 Recognition
Design of an Iterative Model for Incremental Enhancements in Quantum Image Processing
19 Using Reinforcement Learning-Based Optimizations
Development of View Optimization Techniques for Structural Monitoring Systems Using
20 Post-Processing of Structural Analysis and Image Processing
Elevational Synthetic Aperture Focusing for Rotated Array-Based Three-Dimensional
22 Ultrasound Imaging
Enhanced BP Algorithm Combined With Semantic Segmentation and Subaperture for
23 Improving Agricultural Scene Image Quality in GEO SAR
Explainable Feature-Injected Diffusion Model for Medical Image Translation
24
Fast-DDPM: Fast Denoising Diffusion Probabilistic Models for Medical Image-to-Image
25 Generation
From Technical Prerequisites to Improved Care: Distributed Edge AI for Tomographic
26 Imaging
GPU Accelerated Trilateral Filter for MR Image Restoration
27
28 IIDM: Image-to-image diffusion model for semantic image synthesis
Improved Motion Correction in Dynamic Contrast-Enhanced MRI Using Low Rank With Soft
29 Weighting
Information-Theoretic Analysis of Multimodal Image Translation
30
Infrared and Visible Image Fusion Based on Image Enhancement and Target Extraction
31
Integration of Convolutional Neural Network and Image Processing for Pulp Fibril Detection
33 and Measurement
Low-Light Image Enhancement via New Intuitionistic Fuzzy Generator-Based Retinex
34 Approach
Mamba-Based VoxelMorph Framework for Cardiovascular Disease Imaging and Risk
35 Assessment
Maximizing Measurement Visual-Inertial Odometry for Low-Light Environment Through
36 Online Image Pre-Processing
Mitigation of Motion Artifacts in Handheld Laser Speckle Contrast Imaging Illustrated on
37 Psoriasis Lesions
Motion Compensation in Pulmonary Fluorescence Lifetime Imaging: An Image Processing
Pipeline for Artefact Reduction and Clinical Precision
38
MODIFIED TITLES
Adaptive Dual-Stream Deep Learning with Random Vector
Functional Link for Multi-Center Ischemic Stroke Diagnosis
Hierarchical Feature-Based Multilevel Matching: A New Paradigm
for SAR and Optical Image Registration
Transforming Aphasia Detection: A Novel ROI-Focused Method
Leveraging Structural MRI
Ku-Band UAV-Borne Fully Polarimetric Array InSAR: A Novel
Polarization-Power-Maximum Method for Enhanced 3D Imaging
Accelerated Strip-Map SAR Imaging via Sinogram Decimation and
Fast Back-Projection
From Pixels to Provenance: Harnessing Source Camera Fingerprints
to Detect AI-Created Images
Scalable Adaptive Downsampling Framework for Accurate High-
Resolution Multi-Panel Segmentation
Precision Foggy Image Enhancement Using Combined Atmospheric
Scattering and Segmentation Models
AI-Powered Adaptive Control for Laser Cleaning Through Image
Analysis
Bridging Visual and Semantic Understanding: Automated Brain MRI
Interpretation through Hierarchical Classification and Captioning
Consistency-Aware Multi-Prior Deep Network for Robust
Accelerated MRI Imaging
Ultrafast Doppler Ultrasound Flow Imaging via Streamlined
Computational SVD Filtering
Smart and Self-Configuring 3D Multitask Image Registration Using
ConvexAdam Dual Optimization
Innovative Sparse SAR Imaging with CR-DEQ-SAR: Deep Equilibrium
and Compound Regularization Synergy
Revolutionizing PET Imaging: Dedicated 3D-Printed 18F-FDG
Phantoms for Ultrahigh Spatial Resolution
Deep Integrated CNN Pipeline for Comprehensive Image Synthesis,
Analysis, and Indexing
Bridging the Resolution Divide: Innovative Techniques for Face
Recognition Across Domains
Reinforcement Learning-Driven Iterative Model for Progressive
Quantum Image Processing Improvements
Innovative View Optimization Techniques for Structural Health
Monitoring via Post-Processing and Image Analysis
High-Resolution 3D Ultrasound via Elevational Focusing with
Rotated Synthetic Aperture Arrays
Improving Agricultural Image Quality in GEO SAR Using Enhanced
BP, Semantic Segmentation, and Subaperture Processing
Medical Image Translation Using Explainable Diffusion Models with
Integrated Feature Injection
Efficient Denoising Diffusion Models for High-Fidelity Medical Image
Synthesis
Transforming Tomographic Imaging with Distributed Edge AI: A Path
from Technology to Better Care
High-Performance MR Image Restoration Using GPU-Accelerated
Trilateral Filtering
Semantic Image Synthesis via Image-to-Image Diffusion Modeling
Improving Motion Robustness in DCE-MRI Using Low-Rank Models
with Adaptive Soft Weighting
Encoding Diversity and Consistency: An Information-Theoretic Study
of Multimodal Translation
Fusion of Infrared and Visible Images Using Target-Oriented Image
Enhancement Strategies
Integrating CNN and Image Processing Methods for Precise
Detection and Quantification of Pulp Fibrils
Intuitionistic Fuzzy Generator-Based Retinex Framework for
Advanced Low-Light Image Enhancement
Cardiovascular Disease Diagnosis and Risk Evaluation Through a
Novel Mamba-Based VoxelMorph Model
Improving Visual-Inertial Odometry Robustness in Low-Light via
Adaptive Online Image Pre-Processing
Mitigating Motion-Induced Distortions in Handheld Laser Speckle
Imaging of Psoriasis Skin
Motion Artifact Reduction in Pulmonary Fluorescence Lifetime
Imaging via an Image Processing Pipeline for Greater Clinical Fidelity