{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T22:11:39Z","timestamp":1775254299554,"version":"3.50.1"},"reference-count":110,"publisher":"Wiley","license":[{"start":{"date-parts":[[2023,5,4]],"date-time":"2023-05-04T00:00:00Z","timestamp":1683158400000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100008675","name":"Zayed University","doi-asserted-by":"publisher","award":["R20128"],"award-info":[{"award-number":["R20128"]}],"id":[{"id":"10.13039\/501100008675","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Applied Computational Intelligence and Soft Computing"],"published-print":{"date-parts":[[2023,5,4]]},"abstract":"<jats:p>Covid-19 has been a life-changer in the sphere of online education. With complete lockdown in various countries, there has been a tumultuous increase in the need for providing online education, and hence, it has become mandatory for examiners to ensure that a fair methodology is followed for evaluation, and academic integrity is met. A plethora of literature is available related to methods to mitigate cheating during online examinations. A systematic literature review (SLR) has been followed in our article which aims at introducing the research gap in terms of the usage of soft computing techniques to combat cheating during online examinations. We have also presented state-of-the-art methods followed, which are capable of mitigating online cheating, namely, face recognition, face expression recognition, head posture analysis, eye gaze tracking, network data traffic analysis, and detection of IP spoofing. A discussion on improvement of existing online cheating detection systems has also been presented.<\/jats:p>","DOI":"10.1155\/2023\/3739975","type":"journal-article","created":{"date-parts":[[2023,5,4]],"date-time":"2023-05-04T17:53:36Z","timestamp":1683222816000},"page":"1-23","source":"Crossref","is-referenced-by-count":5,"title":["Computational Intelligence and Soft Computing Paradigm for Cheating Detection in Online Examinations"],"prefix":"10.1155","volume":"2023","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4384-4364","authenticated-orcid":true,"given":"Sanaa","family":"Kaddoura","sequence":"first","affiliation":[{"name":"College of Technological Innovation, Zayed University, Abu Dhabi, UAE"}]},{"given":"Shweta","family":"Vincent","sequence":"additional","affiliation":[{"name":"Department of Mechatronics, Manipal Institute of Technology, Manipal Academy of Higher Education, Manipal 576104, Karnataka, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6091-1880","authenticated-orcid":true,"given":"D. Jude","family":"Hemanth","sequence":"additional","affiliation":[{"name":"Department of ECE, Karunya Institute of Technology and Sciences, Coimbatore, India"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1007\/s10639-022-10927-7"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.986"},{"key":"3","first-page":"1935","article-title":"An autonomous articulating desktop robot for proctoring remote online examinations","author":"W. Rosen"},{"key":"4","first-page":"1129","article-title":"Massive open online proctor: protecting the credibility of MOOCs certificates","author":"X. Li"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1007\/s11159-018-9710-5"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/j.iswa.2022.200153"},{"key":"7","first-page":"234","article-title":"Gesture based misbehavior detection in online examination","author":"Z. Fan"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1080\/07294360.2017.1303456"},{"key":"9","first-page":"1","article-title":"Video summarization for remote invigilation of online exams","author":"M. Cote"},{"issue":"4","key":"10","doi-asserted-by":"crossref","first-page":"176","DOI":"10.14569\/IJACSA.2017.080425","article-title":"E-exam cheating detection system","volume":"8","author":"R. Bawarith","year":"2017","journal-title":"International Journal of Advanced Computer Science and Applications"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.4236\/ait.2014.42002"},{"key":"12","unstructured":"KasliwalG.Cheating detection in online examinations2015San Jose, CA, USASan Jose State UniversityM.Sc. thesis"},{"key":"13","article-title":"E-cheating prevention measures: detection of cheating at online examinations using deep learning approach -- a case study","author":"L. C. O. Tiong","year":"2021"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1016\/j.mex.2019.100777"},{"key":"15","first-page":"895","article-title":"Convolutional neural network based virtual exam controller","author":"K. Garg"},{"key":"16","first-page":"389","article-title":"Using face recognition to detect \u201cGhost Writer\u201d cheating in examination","volume-title":"Edutainment, Lecture Notes in Computer Science","author":"H. He","year":"2018"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/access.2021.3061572"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.3033675"},{"key":"19","first-page":"43759","article-title":"Siamese local and global networks for robust face tracking","volume":"29","author":"Q. Yuankai","year":"2020","journal-title":"IEEE Transactions on Image Processing"},{"key":"20","first-page":"202","article-title":"Real-time 3D facial tracking via cascaded compositional learning","volume":"30","author":"L. Jianwen","year":"2020","journal-title":"IEEE Transactions on Image Processing"},{"issue":"24","key":"21","first-page":"1","article-title":"A novel camera-free eye tracking sensor for augmented reality based on laser scanning","volume":"20","author":"M. Johannes","year":"2020","journal-title":"IEEE Sensors Journal"},{"issue":"1","key":"22","first-page":"43759","article-title":"Analysis of EEG signals and facial expressions for continuous emotion detection","volume":"7","author":"S. Mohammad","year":"2016","journal-title":"IEEE Transactions on Affective Computing"},{"key":"23","article-title":"Evolution of facial tissue oxygen saturation and detection of human physical stress","author":"L. Xinyu"},{"key":"24","article-title":"Facial emotion recognition based on LDA and facial landmark detection","author":"S. Lanxin"},{"key":"25","first-page":"1","article-title":"Real-time facial expression recognition based on Edge computing","volume":"11","author":"Y. Jiannnan","year":"2021","journal-title":"IEEE Access"},{"key":"26","first-page":"88","article-title":"Research on abnormal behaviour detection of online examination based on image information","author":"S. Hu"},{"key":"27","first-page":"138","article-title":"An intelligent system for online exam monitoring","author":"S. Prathish"},{"key":"28","first-page":"2879","article-title":"Face detection, pose estimation, and landmark localization in the wild","author":"X. Zhu"},{"key":"29","first-page":"1837","article-title":"Head pose estimation based on multivariate label distribution","author":"X. Geng"},{"issue":"1","key":"30","first-page":"437","article-title":"Head and body orientation estimation using convolutional random projection forests","volume":"41","author":"L. Donghoon","year":"2019","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"issue":"11","key":"31","first-page":"437","article-title":"HeadFusion: 360 head pose tracking combining 3D morphable model and 3D reconstruction","volume":"40","author":"Y. Yu","year":"2018","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1016\/j.jhep.2015.08.021"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1145\/2461912.2461976"},{"key":"34","first-page":"1701","article-title":"Deepface: closing the gap to human-level performance in face verification","author":"Y. Taigman"},{"issue":"1","key":"35","first-page":"437","article-title":"HyperFace: a deep multi-task learning framework for face detection, landmark localization, pose estimation, and gender recognition","volume":"41","author":"R. Rajeev","year":"2019","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"issue":"7","key":"36","first-page":"43578","article-title":"Novel wearable monitoring system of forward head posture assisted by Magnet-Magnetometer pair and machine learning","volume":"20","author":"H. Hobeom","year":"2020","journal-title":"IEEE Sensors"},{"key":"37","doi-asserted-by":"crossref","article-title":"An application to discover cheating in digital exams","author":"J. Opgen-Rhein","DOI":"10.1145\/3279720.3279740"},{"key":"38","first-page":"138","article-title":"An intelligent system for online exam monitoring","author":"S. Prathish"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1109\/access.2021.3068223"},{"issue":"3","key":"40","first-page":"1","article-title":"Face-from-depth for head pose estimation on depth images","volume":"42","author":"B. Guido","year":"2020","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"41","first-page":"440","article-title":"MR-CapsNet: a deep learning algorithm for image-based head pose estimation on CapsNet","volume":"5","author":"F. Hao","year":"2021","journal-title":"IEEE Access"},{"issue":"3","key":"42","first-page":"127","article-title":"Gaze pattern on spontaneous human face perception: an eye tracker study","volume":"41","author":"B. S. Bagepally","year":"2015","journal-title":"Journal of the Indian Academy of Applied Psychology"},{"key":"43","article-title":"The eye tribe","year":"2016"},{"key":"44","first-page":"1","article-title":"Cheating in exams with technology","volume":"30","author":"K. Curran","year":"2011","journal-title":"International Journal of Cyber Ethics in Education"},{"key":"45","doi-asserted-by":"publisher","DOI":"10.2307\/1182947"},{"key":"46","doi-asserted-by":"publisher","DOI":"10.1016\/j.sbspro.2013.10.074"},{"key":"47","volume-title":"Detecting and Preventing Cheating during Exams","author":"K. Yee","year":"2009"},{"key":"48","doi-asserted-by":"publisher","DOI":"10.1109\/mce.2015.2464852"},{"key":"49","doi-asserted-by":"publisher","DOI":"10.1109\/mits.2017.2743165"},{"key":"50","doi-asserted-by":"publisher","DOI":"10.1109\/tce.2012.6227433"},{"key":"51","doi-asserted-by":"publisher","DOI":"10.3390\/s19040859"},{"issue":"10","key":"52","first-page":"515","article-title":"A smart approach of E-Exam assessment method using face recognition to address identity theft and cheating","volume":"14","author":"S. Idemudia","year":"2016","journal-title":"International Journal of Computer Science and Information Security"},{"issue":"1","key":"53","first-page":"49056","article-title":"A complete system for analysis of video lecture based on eye tracking","volume":"1","author":"Z. Xuebai","year":"2018","journal-title":"IEEE Access"},{"key":"54","doi-asserted-by":"publisher","DOI":"10.1109\/tvcg.2021.3067787"},{"key":"55","doi-asserted-by":"publisher","DOI":"10.1109\/tnb.2020.2990690"},{"issue":"3","key":"56","first-page":"120","article-title":"IEEE Automatic pupil detection and gaze estimation using the vestibulo-ocular reflex in a low-cost eye-tracking setup","volume":"111","author":"A. Vered","year":"2020","journal-title":"South African Institute of Electrical Engineers"},{"key":"57","doi-asserted-by":"publisher","DOI":"10.1109\/tbme.2020.2990734"},{"key":"58","doi-asserted-by":"publisher","DOI":"10.1109\/tce.2019.2912802"},{"key":"59","doi-asserted-by":"publisher","DOI":"10.1109\/tcds.2018.2821566"},{"key":"60","doi-asserted-by":"publisher","DOI":"10.1109\/access.2021.3110644"},{"key":"61","doi-asserted-by":"publisher","DOI":"10.1109\/tim.2020.2983525"},{"key":"62","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2949150"},{"key":"63","doi-asserted-by":"publisher","DOI":"10.1109\/jsen.2018.2876940"},{"key":"64","first-page":"1509","article-title":"A deep learning-based framework for phishing website detection","volume":"10","author":"T. Lizhen","year":"2021","journal-title":"IEEE Access"},{"key":"65","first-page":"193","article-title":"A spam email detection mechanism for English language text emails using deep learning approach","author":"S. Kaddoura"},{"key":"66","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.01.064"},{"key":"67","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2018.09.029"},{"key":"68","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.830"},{"key":"69","first-page":"257821","article-title":"A fuzzy ontology and SVM\u2013based web content classification system","volume":"5","author":"A. Farman","year":"2017","journal-title":"IEEE Access"},{"issue":"6","key":"70","first-page":"2162","article-title":"An efficient antiphishing method to secure eConsume","volume":"8","author":"G. Guang-Gang","year":"2019","journal-title":"IEEE Consumer Electronics Magazine"},{"issue":"2","key":"71","first-page":"790","article-title":"An explainable multi-modal hierarchical attention model for developing phishing threat intelligence","volume":"19","author":"C. Yidong","year":"2022","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"72","doi-asserted-by":"publisher","DOI":"10.1109\/tsusc.2018.2808430"},{"key":"73","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2920655"},{"key":"74","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2892066"},{"key":"75","doi-asserted-by":"publisher","DOI":"10.1109\/access.2017.2768564"},{"issue":"2","key":"76","doi-asserted-by":"crossref","first-page":"1520","DOI":"10.1109\/TNSM.2021.3052888","article-title":"Adversarial network traffic: towards evaluating the robustness of deep-learning-based network traffic classification","volume":"18","author":"A. M. Sadeghzadeh","year":"2021","journal-title":"IEEE Transactions on Network and Service Management"},{"issue":"5","key":"77","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1364\/JOCN.411017","article-title":"Classification and forecasting of real-time server traffic flows employing long short-term memory for hybrid E\/O data center networks","volume":"13","author":"B. Mihail","year":"2021","journal-title":"Journal of Optical Communications and Networking"},{"key":"78","first-page":"224059","article-title":"Edge computing intelligence using robust feature selection for network traffic classification in Internet-of-Things","volume":"8","author":"M. Bushra","year":"2020","journal-title":"Special Selection on Edge Intelligence for Internet of Things"},{"key":"79","first-page":"52310","article-title":"Evolutionary algorithm-based and network architecture search-enabled multi-objective traffic classification","volume":"9","author":"W. Xiaojuan","year":"2021","journal-title":"IEEE Access. Special Section on Intelligent Big Data Analytics for Internet of Things, Services and People"},{"key":"80","doi-asserted-by":"publisher","DOI":"10.1109\/tnsm.2021.3071441"},{"key":"81","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.3026831"},{"key":"82","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2933165"},{"key":"83","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.2976624"},{"key":"84","first-page":"118","article-title":"Semi-supervised encrypted traffic classification with deep convolutional generative adversarial networks","volume":"8","author":"S. I. Auwal","year":"2019","journal-title":"IEEE Access"},{"key":"85","doi-asserted-by":"publisher","DOI":"10.1109\/tvt.2021.3063738"},{"key":"86","doi-asserted-by":"publisher","DOI":"10.1109\/tnsm.2021.3085097"},{"key":"87","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.3007917"},{"key":"88","doi-asserted-by":"publisher","DOI":"10.1109\/access.2021.3073967"},{"key":"89","first-page":"1","article-title":"Symmetry degree measurement and its applications to anomaly detection","volume":"15","author":"Q. Tao","year":"2020","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"90","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1016\/S1353-4858(11)70086-1","article-title":"Advanced persistent threats and how to monitor and deter them","volume":"8","author":"C. Tankard","year":"2011","journal-title":"Network Security"},{"key":"91","doi-asserted-by":"publisher","DOI":"10.1155\/2009\/692654"},{"key":"92","first-page":"71","article-title":"A signal analysis of network traffic anomalies","author":"P. Barford"},{"key":"93","doi-asserted-by":"publisher","DOI":"10.1109\/les.2020.3015092"},{"key":"94","first-page":"776","article-title":"Watermarking techniques for intellectual property protection","author":"A. B. Kahng"},{"key":"95","doi-asserted-by":"crossref","DOI":"10.1145\/2046707.2046722","article-title":"On the vulnerability of FPGA bitstream encryption against power analysis attacks: extracting keys from Xilinx virtex-II FPGAs","volume-title":"IACR Cryptol","author":"A. Moradi","year":"2011"},{"key":"96","first-page":"91","article-title":"Side-channel attacks on the bitstream encryption mechanism of Altera Atratix II: facilitating black-box analysis using software reverse-engineering","author":"A. Moradi"},{"key":"97","first-page":"209","article-title":"Netlist-level IP protection by watermarking for LUT-based FPGAs","author":"M. Schmid"},{"key":"98","first-page":"764","article-title":"Watermarking FPGA bitfile for intellectual property protection","volume":"21","author":"J. Zhang","year":"2012","journal-title":"Radio Engineering"},{"key":"99","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1016\/B978-0-323-99412-5.00001-0","article-title":"Supervised machine learning techniques to protect IoT healthcare environment against cyberattacks","volume-title":"Intelligent Edge Computing for Cyber Physical Applications","author":"S. Kaddoura","year":"2023"},{"key":"100","doi-asserted-by":"crossref","first-page":"179","DOI":"10.4018\/978-1-6684-6937-8.ch009","article-title":"Artificial intelligence applications in cybersecurity","volume-title":"Handbook of Research on AI Methods and Applications in Computer Engineering","author":"T. Abrham","year":"2023"},{"key":"101","first-page":"1","article-title":"Evaluation of supervised machine learning algorithms for multi-class intrusion detection systems","volume-title":"Proceedings of the Future Technologies Conference (FTC)","author":"S. Kaddoura","year":"2022"},{"key":"102","first-page":"1","article-title":"Evaluation of supervised machine learning approaches for credit card fraud detection","author":"A. M. Balobid"},{"key":"103","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-021-06009-4"},{"key":"104","doi-asserted-by":"publisher","DOI":"10.4018\/ijswis.2017040105"},{"key":"105","doi-asserted-by":"publisher","DOI":"10.1109\/access.2021.3073413"},{"issue":"11","key":"106","doi-asserted-by":"crossref","first-page":"1786","DOI":"10.1109\/JAS.2021.1004171","article-title":"Enhanced intrusion detection system for an EH IoT architecture using a cooperative UAV relay and friendly UAV jammer","volume":"8","author":"N. V. Van","year":"2021","journal-title":"IEEE\/CAA Journal of Automatica Sinica"},{"key":"107","doi-asserted-by":"publisher","DOI":"10.1109\/tetc.2016.2585046"},{"key":"108","doi-asserted-by":"publisher","DOI":"10.1109\/tnet.2021.3115935"},{"key":"109","doi-asserted-by":"publisher","DOI":"10.1109\/tvlsi.2017.2715188"},{"issue":"2","key":"110","first-page":"16","article-title":"The impact of the Covid-19 pandemic on on- line examination: challenges and opportunities","volume":"24","author":"M. Itani","year":"2022","journal-title":"Global Journal of Engineering Education"}],"container-title":["Applied Computational Intelligence and Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/acisc\/2023\/3739975.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/acisc\/2023\/3739975.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/acisc\/2023\/3739975.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,4]],"date-time":"2023-05-04T17:54:24Z","timestamp":1683222864000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/acisc\/2023\/3739975\/"}},"subtitle":[],"editor":[{"given":"Imran","family":"Ashraf","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2023,5,4]]},"references-count":110,"alternative-id":["3739975","3739975"],"URL":"https:\/\/doi.org\/10.1155\/2023\/3739975","relation":{},"ISSN":["1687-9732","1687-9724"],"issn-type":[{"value":"1687-9732","type":"electronic"},{"value":"1687-9724","type":"print"}],"subject":[],"published":{"date-parts":[[2023,5,4]]}}}