default search action
The Computer Journal, Volume 67
Volume 67, Number 1, January 2024
- Marios C. Angelides:
Thematic Editorial: Mostly Artificial Intelligence (AI) or Machine Learning (ML) Now in the Engine Room, in Pursuit of a Green Agenda. 1-2 - Mariem Gnouma, Ridha Ejbali, Mourad Zaied:
Deep Hashing and Sparse Representation of Abnormal Events Detection. 3-17 - Ozgur Oksuz:
A System For Storing Anonymous Patient Healthcare Data Using Blockchain And Its Applications. 18-30 - He Li, Duo Jin, Xuejiao Li, Shaojie Qiao:
A Dynamic Heterogeneous Graph Convolution Network For Traffic Flow Prediction. 31-44 - Tongfeng Li, Ruisheng Zhang, Bojuan Niu, Yabing Yao, Jun Ma, Jing Jiang, Zhili Zhao:
Link Prediction Based On Local Structure And Node Information Along Local Paths. 45-56 - Sayaka Kamei, Sébastien Tixeuil:
An Asynchronous Maximum Independent Set Algorithm By Myopic Luminous Robots On Grids. 57-77 - Zhuowei Wang, Hao Wang, Xiaoyu Song, Jiahui Wu:
Communication-Aware Energy Consumption Model in Heterogeneous Computing Systems. 78-94 - James Walsh, Oluwafunmilola Kesa, Andrew Wang, Mihai Ilas, Patrick O'Hara, Oscar Giles, Neil Dhir, Mark Girolami, Theodoros Damoulas:
Near Real-Time Social Distance Estimation In London. 95-109 - Aissam Aouar, Saïd Yahiaoui, Lamia Sadeg, Nadia Nouali-Taboudjemat, Kadda Beghdad Bey:
Distributed Partial Simulation for Graph Pattern Matching. 110-126 - Xiaoyang Liu, Luyuan Gao, Giacomo Fiumara, Pasquale De Meo:
Key Node Identification Method Integrating Information Transmission Probability and Path Diversity in Complex Network. 127-141 - Xiaoqing Liu, Shuming Zhou, Jiafei Liu, Hong Zhang:
Reliability Analysis of the Cactus-Based Networks Based on Subsystem. 142-152 - Qin Luo, Xin Cao:
PNCTS: A Prediction and Network Coding-Based Transmission Scheme for Efficient Screen Updates Delivery in DaaS. 153-168 - Vahid Amin Ghafari, Mahmoud Ahmadian-Attari:
An Attack on a Proposed Construction of Small-State Stream Ciphers and Proposals for New Constructions. 169-178 - Xiwen Wang, Kai Zhang, Jinguo Li, Mi Wen, Shengmin Xu, Jianting Ning:
Non-interactive Boolean Searchable Asymmetric Encryption With Bilateral Access Control. 179-194 - Jiali Shi, Chao Li, Guoqiang Liu:
Differential Attack With Constants On μ2 Block Cipher. 195-209 - Yin Lv, Danping Shi, Lei Hu, Zihui Guo, Yi Guo, Caibing Wang:
Improved Linear Cryptanalysis of Block Cipher BORON. 210-219 - Andrew Simpson, Matthias Dellago, Daniel W. Woods:
Formalizing Attack Trees To Support Economic Analysis. 220-235 - Xu Zhang, Shunjie Wen, Liang Yan, Jiangfan Feng, Ying Xia:
A Hybrid-Convolution Spatial-Temporal Recurrent Network For Traffic Flow Prediction. 236-252 - Wenhan Ge, Junfeng Wang:
SeqMask: Behavior Extraction Over Cyber Threat Intelligence Via Multi-Instance Learning. 253-273 - Chunning Zhou, Wentao Zhang, Weiwei Cao:
A New Approach of Evaluating the Security Against Differential and Linear Cryptanalysis and Its Applications to Serpent, NOEKEON and ASCON. 274-291 - Lin Ding, Zheng Wu, Guixian Zhang, Tairong Shi:
Quantum Guess and Determine Attack on Stream Ciphers. 292-303 - K. Ashwini:
User Name-Based Compression and Encryption of Images Using Chaotic Compressive Sensing Theory. 304-322 - Ke Wang, Zhenfeng Zhang, Haodong Jiang, Huiqin Xie, Yanjun Li, Ying Sun, Lidong Han:
Key Reuse Attacks on Post-quantum Cryptosystems, Revisited. 323-337 - Mozamel M. Saeed:
Designing Scenarios for In-Organization Training Using the CyberCIEGE Game. 338-346 - C. Shaji, I. Shatheesh Sam:
Encoding with Combination Orientation Technique for RDH in Dual Stego Images. 347-361 - Liqing Qiu, Yuying Liu, Jianyi Zhang:
A New Method for Identifying Influential Spreaders in Complex Networks. 362-375 - Joon-Young Paik, Rize Jin:
Malware Family Prediction with an Awareness of Label Uncertainty. 376-390 - Nieves R. Brisaboa, Travis Gagie, Adrián Gómez-Brandón, Gonzalo Navarro:
Two-Dimensional Block Trees. 391-406
Volume 67, Number 2, February 2024
- Amal Abid, Saoussen Cheikhrouhou, Slim Kallel, Zahir Tari, Mohamed Jmaiel:
A Smart Contract-Based Access Control Framework For Smart Healthcare Systems. 407-422 - Zhu Yuan, Xueqiang Lv, Ping Xie, Haojie Ge, Xindong You:
CSEA: A Fine-Grained Framework of Climate-Season-Based Energy-Aware in Cloud Storage Systems. 423-436 - Francisco Javier Moreno Arboleda, Georgia Garani, Carlos Daniel Bolivar Zapata:
Query Operators for Transactional Data: Detecting Similar and Periodic Transactions. 437-446 - Mengqi Liu, Hang Gao, Xiaofan Xia, Suying Gui, Tiegang Gao:
Perceptual Image Hashing Based on Canny Operator and Tensor for Copy-Move Forgery Detection. 447-462 - Changan Liu, Changjun Fan, Zhongzhi Zhang:
Finding Influencers in Complex Networks: An Effective Deep Reinforcement Learning Approach. 463-473 - Yaoan Jin, Atsuko Miyaji:
Secure and Compact Elliptic Curve Scalar Multiplication with Optimized Inversion. 474-484 - Mingzhe Zhu, Wanyue Xu, Wei Li, Zhongzhi Zhang, Haibin Kan:
Hitting Times of Random Walks on Edge Corona Product Graphs. 485-497 - Yuliang Xue, Yuhao Zhu, Zhiying Zhu, Sheng Li, Zhenxing Qian, Xinpeng Zhang:
Removing Watermarks For Image Processing Networks Via Referenced Subspace Attention. 498-507 - Reza Ebrahim Pourian, Mehdi Fartash, Javad Akbari Torkestani:
A Deep Learning Model for Energy-Aware Task Scheduling Algorithm Based on Learning Automata for Fog Computing. 508-518 - Marzieh Shamsizadeh, Mohammad Mehdi Zahedi, Khadijeh Abolpour:
Irreducible Fuzzy Multiset Finite Automaton. 519-526 - Heqin Liu, Dongqin Cheng:
Structure Fault Tolerance of Exchanged Hypercube. 527-536 - Jinyu Lu, Guoqiang Liu, Bing Sun, Chao Li, Li Liu:
Improved (Related-Key) Differential-Based Neural Distinguishers for SIMON and SIMECK Block Ciphers. 537-547 - Yuxing Yang:
Hyper-Hamiltonian Laceability of Cartesian Products of Cycles and Paths. 548-556 - Hireche Samia, Dennai Abdeslem, Boufeldja Kadri:
Toward a Novel RESTFUL Big Data-Based Urban Traffic Incident Data Web Service for Connected Vehicles. 557-580 - Xuefeng Zhao:
Secure and Efficient Masking of Lightweight Ciphers in Software and Hardware. 581-603 - Yishu Xu, Peng Zhang, Hongtao Yu, Fuzhi Zhang:
Detecting Group Shilling Attacks In Recommender Systems Based On User Multi-dimensional Features And Collusive Behaviour Analysis. 604-616 - Zhiwei Chen, Lunzhi Deng, Yu Ruan, Shuai Feng, Tao Wang, Bo Wang:
Certificateless Broadcast Encryption with Authorization Suitable for Storing Personal Health Records. 617-631 - Tu-Liang Lin, Hong-Yi Chang, Yuan-Yao Chiang, Shu-Cheng Lin, Tsung-Yen Yang, Chun-Jun Zhuang, Wha-Lee Tseng, Bo-Hao Zhang:
Ransomware Detection by Distinguishing API Call Sequences through LSTM and BERT Models. 632-641 - Tian Yang, Sha Ma, Jiaojiao Du, Chengyu Jiang, Qiong Huang:
Revocable Public Key Encryption with Equality Test without Pairing in Cloud Storage. 642-657 - Rahman Keramati Hatkeposhti, Meisam Yadollahzadeh Tabari, Mehdi GolsorkhtabariAmiri:
Providing an Approach for Early Prediction of Fall in Human Activities Based on Wearable Sensor Data and the Use of Deep Learning Algorithms. 658-673 - Li Zhang, Yu Zhang, Wenling Wu, Yongxia Mao, Yafei Zheng:
Explicit Upper Bound Of Impossible Differentials For AES-Like Ciphers: Application To uBlock And Midori. 674-687 - Zhecheng Yu, Liqiong Xu:
Reliability Evaluation Of Multiprocessor System Based On The Balanced Complete Multipartite Graphs. 688-693 - Shumin Si, Xiuhan Lin, Puwen Wei:
Compressed Zero-Knowledge Proofs for Lattice-Based Accumulator. 694-708 - Hong Zhang, Shuming Zhou, Eddie Cheng:
The Cyclic Diagnosability Of Hypercubes Under The PMC Model And The MM* Model. 709-718 - Katharina Boudgoust, Adeline Roux-Langlois:
Overfull: Too Large Aggregate Signatures Based on Lattices. 719-727 - Tzong-Jye Liu:
Adversarial Attacks on Network Intrusion Detection Systems Using Flow Containers. 728-745 - Hongjin Zhang, Hui Wei, Wang Bo:
A New Fuzzy Smoothing Term Model For Stereo Matching. 746-761 - Senxing Lu, Mingming Zhao, Chunlin Li, Quanbing Du, Youlong Luo:
Time-Aware Data Partition Optimization and Heterogeneous Task Scheduling Strategies in Spark Clusters. 762-776 - Shijie Zhao, Pingshan Li:
On Conditional Edge-Fault-Tolerant Strong Menger Edge Connectivity Of Folded Hypercubes. 777-781 - Hala S. Ali, R. Sridevi:
Mobility and Security Aware Real-Time Task Scheduling in Fog-Cloud Computing for IoT Devices: A Fuzzy-Logic Approach. 782-805 - Correction to: An Attack on a Proposed Construction of Small-State Stream Ciphers and Proposals for New Constructions. 806
- Correction to: Performance Evaluation of FPGA-Based LSTM Neural Networks for Pulse Signal Detection on Real-Time Radar Warning Receivers. 807
Volume 67, Number 3, 2024
- Yannis Manolopoulos:
Thematic Editorial: The Ubiquitous Network. 809-811 - Marek A. Suchenek:
Worst-Case Analysis of Heapsort, Exactly. 812-824 - Oguzhan Erdem, Tuncay Soylu, Aydin Carus:
Pipelined Decision Trees for Online Traffic Classification on FPGAs. 825-839 - Ching-Fang Hsu, Zhe Xia, Tianshu Cheng, Lein Harn:
Extremely Lightweight Constant-Round Membership-Authenticated Group Key Establishment for Resource-Constrained Smart Environments toward 5G. 840-850 - Shaohong Zhou, Junjiang He, Tao Li, Xiaolong Lan, Yunpeng Wang, Hui Zhao, Yihong Li:
Automating the Deployment of Cyber Range with OpenStack. 851-863 - Shixiong Yao, Pei Li, Jing Chen, Yuexing Zeng, Jiageng Chen, Donghui Wang:
CD-BCM:Cross-Domain Batch Certificates Management Based On Blockchain. 864-874 - Le He, Hongbo Yu:
Cryptanalysis of Reduced-Round SipHash. 875-883 - Chung-Ming Huang, Shu-Hang Huang:
Traffic-Aware Re-Grouping for Load Balance in IEEE 802.11ah IoT Network Based on the Registered Backoff Time Mechanism. 884-898 - Bolin Wang, Wenling Wu, Yuhan Zhang, Li Zhang:
New Integral Distinguishers On Permutation Of Whirlpool. 899-906 - Ya Liu, Yuanhang Wu, Fengyv Zhao, Yanli Ren:
Balanced Off-Chain Payment Channel Network Routing Strategy Based On Weight Calculation. 907-922 - Yang Yang, Wenhao Liu, Guang Zeng:
A General Condition of Structural Distinguisher. 923-932 - Ricard Borges, Francesc Sebé:
An e-Coin Based Construction for Unlinkable Priced Oblivious Transfer. 933-940 - Ravneet Kaur, Amrinderpreet Singh, Aekamjot Singh, Amit Goyal, Amritpal Singh, Shalini Batra:
An Efficient Pending Interest Table Content Search In NDN through Stable Bloom Filter. 941-946 - M. Veera Brahmam, S. Gopikrishnan:
NODSTAC: Novel Outlier Detection Technique Based on Spatial, Temporal and Attribute Correlations on IoT Bigdata. 947-960 - Amir Tehrani, Meisam Yadollahzadeh Tabari, Aidin Zehtab-Salmasi, Rasul Enayatifar:
Wearable Sensor-Based Human Activity Recognition System Employing Bi-LSTM Algorithm. 961-975 - Qingjun Yuan, Yuefei Zhu, Gang Xiong, Yongjuan Wang, Wentao Yu, Bin Luo, Gaopeng Gou:
ULDC: Unsupervised Learning-Based Data Cleaning for Malicious Traffic With High Noise. 976-987 - Liqun Chen, Nada El Kassem, Christopher J. P. Newton:
How To Bind A TPM's Attestation Keys With Its Endorsement Key. 988-1004 - Patrizio Angelini, Giordano Da Lozzo, Henry Förster, Thomas Schneck:
2-Layer k-Planar Graphs Density, Crossing Lemma, Relationships And Pathwidth. 1005-1016 - Liang Zhang, Haibin Kan, Feiyang Qiu, Feng Hao:
A Publicly Verifiable Optimistic Fair Exchange Protocol Using Decentralized CP-ABE. 1017-1029 - Dong Fang, Guifang Huang, Mengfan Wang, Lei Hu:
Decreasing Proof Size of BLS Scheme. 1030-1040 - Yue Li, Jianfang Qi, Haibin Jin, Dong Tian, Weisong Mu, Jianying Feng:
An Improved Genetic-XGBoost Classifier for Customer Consumption Behavior Prediction. 1041-1059 - Yongcheng Song, Jiang Zhang, Xinyi Huang, Wei Wu, Haixia Chen:
Analysis and Construction of Zero-Knowledge Proofs for the MinRank Problem. 1060-1075 - Yilun Shang:
Resilient Vector Consensus Over Random Dynamic Networks Under Mobile Malicious Attacks. 1076-1086 - Jie Chen, Yinuo Luo, Jun Liu, Chao Wang, Yueyu Zhang, Xiaoli Dong:
A White-box Implementation of SM4 with Self-equivalence Encoding. 1087-1098 - Kashav Ajmera, Tribhuwan Kumar Tewari:
Dynamic Virtual Machine Scheduling Using Residual Optimum Power-Efficiency In The Cloud Data Center. 1099-1110 - Volkan Müjdat Tiryaki, Nedim Tutkun:
Breast Cancer Mass Classification Using Machine Learning, Binary-Coded Genetic Algorithms and an Ensemble of Deep Transfer Learning. 1111-1125 - Praveen Kumar Ramtekkar, Anjana Pandey, Mahesh Kumar Pawar:
A Comprehensive Review of Brain Tumour Detection Mechanisms. 1126-1152 - Zongyang Zhang, Lingyue Zhang, Zhuo Wang, Yichen Li, Rongxing Lu, Yong Yu:
Chronos: An Efficient Asynchronous Byzantine Ordered Consensus. 1153-1162 - Lidong Xu, Mingqiang Wang, Jing Qin:
Quantum Bit Commitment Without Quantum Memory. 1163-1170 - Meilian Lu, Meng Li:
A Multiple QoS Metrics-Aware Virtual Network Embedding Algorithm. 1171-1186 - Ashutosh Kumar, Aakanksha Sharaff:
SnorkelPlus: A Novel Approach for Identifying Relationships Among Biomedical Entities Within Abstracts. 1187-1200 - Jin Huo, Weihua Yang:
Pancyclic And Hamiltonian Properties Of Dragonfly Networks. 1201-1208 - Correction to: Perceptual Image Hashing Based on Canny Operator and Tensor for Copy-Move Forgery Detection. 1209
- Correction to: Hitting Times of Random Walks on Edge Corona Product Graphs. 1210
Volume 67, Number 4, 2024
- Timóteo Gomes, Fernanda M. R. Alencar:
An Ontology as Support for Specification of Non-functional Requirements of AAL Systems Considering Compliance Aspects. 1211-1225 - Jan Strappa, Facundo Bromberg:
Efficient Comparison Of Independence Structures Of Log-Linear Models. 1226-1252 - Xin Wang, Li Lin, Yao Wang:
Stealth Address Schemes With Fast Retrievability Based On Subgroup Membership Assumptions Related To Factoring. 1253-1264 - Handong Cui, Kwan Yin Chan, Tsz Hon Yuen, Xin Kang, Cheng-Kang Chu:
Bandwidth-Efficient Zero-Knowledge Proofs For Threshold ECDSA. 1265-1278 - Ching-Kuo Hsu:
A Genetic Algorithm Based Scheduling Method With Carrier Aggregation In 5G Networks. 1279-1285 - Erana Veerappa Dinesh Subramaniam, Valarmathi Krishnasamy:
Hybrid Optimal Ensemble SVM Forest Classifier for Task Offloading in Mobile Cloud Computing. 1286-1297 - Jiaomei Zhang, Ayong Ye, Jianwei Chen, Yuexin Zhang, Wenjie Yang:
CSFL: Cooperative Security Aware Federated Learning Model Using The Blockchain. 1298-1308 - Zhonghao Zhai, Subin Shen, Yan-qin Mao:
A Toolbox for Migrating the Blockchain-Based Application From Ethereum to Hyperledger Fabric. 1309-1323 - Juan Manuel Castelo Gómez, Javier Carrillo Mondéjar, José Roldán Gómez, José Luis Martínez:
A Concept Forensic Methodology For The Investigation Of IoT Cyberincidents. 1324-1345 - Weiwei Yang, Shangsong Liang, Jian Yin:
Spatial-Aware Multi-Directional Autoencoder For Pre-Training. 1346-1360 - Runze Yang, Baoqi Huang, Zhendong Xu, Bing Jia, Gang Xu:
Towards Accurate Smartphone Localization Using CSI Measurements. 1361-1369 - Shuai Liu, Jizhou Ren, Jie Guan, Bin Hu, Sudong Ma, Hao Bai:
A Break Of Barrier To Classical Differential Fault Attack On The Nonce-Based Authenticated Encryption Algorithm. 1370-1380 - Harold Thimbleby:
Improving Science That Uses Code. 1381-1404 - Lingyun Li, Xianhui Lu, Kunpeng Wang:
eBiBa: A Post-Quantum Hash-Based Signature With Small Signature Size in the Continuous Communication of Large-Scale Data. 1405-1424 - Yaofang Zhang, Peixuan Li, Ping Xie:
A Hybrid Scheme Combining Duplications and LDPC Decoding to Reduce NAND Flash. 1425-1437 - Paul Lou, Amit Sahai, Varun Sivashankar:
Relinearization Attack On LPN Over Large Fields. 1438-1442 - Qingyuan Yu, Lingyue Qin, Xiaoyang Dong, Keting Jia:
Improved Related-Key Rectangle Attacks On GIFT. 1443-1456 - Chang Shu, Yan Wang, Jianxi Fan, Guijuan Wang:
Super Structure Fault-Tolerance Assessment of the Generalized Hypercube. 1457-1466 - Dongchao Ma, Dongmei Wang, Xiaofu Huang, Yuekun Hu, Li Ma:
KEFSAR: A Solar-Aware Routing Strategy For Rechargeable IoT Based On High-Accuracy Prediction. 1467-1482 - Shiqi Hou, Baofeng Wu, Shichang Wang, Hao Guo, Dongdai Lin:
Truncated Differential Attacks On Symmetric Primitives With Linear Key Schedule: WARP And Orthros. 1483-1500 - Shuang Zhao, Shuhui Chen, Fei Wang, Ziling Wei, Jincheng Zhong, Jianbing Liang:
A Large-Scale Mobile Traffic Dataset For Mobile Application Identification. 1501-1513 - Daniel Lemire:
Exact Short Products From Truncated Multipliers. 1514-1520 - Zhaoliang Lin, Jinguo Li:
FedEVCP: Federated Learning-Based Anomalies Detection for Electric Vehicle Charging Pile. 1521-1530 - Amalan Joseph Antony, Kunwar Singh:
A Blockchain-Based Public Key Infrastructure For IoT-Based Healthcare Systems. 1531-1537 - Tongshuai Wu, Liwei Chen, Gewangzi Du, Chenguang Zhu, Ningning Cui, Gang Shi:
CDNM: Clustering-Based Data Normalization Method For Automated Vulnerability Detection. 1538-1549 - Dinghua Zhang, Shihao Wu, Yang Li, Quan Pan:
An Evaluation On The Entropy Supplying Capability Of Smartphone Sensors. 1550-1563 - Junying Yuan, Huicheng Zheng, Jiangqun Ni:
Reversible Data Hiding With Pattern Adaptive Prediction. 1564-1571 - Nazatul Haque Sultan, Vijay Varadharajan, Saurab Dulal, Seyit Camtepe, Surya Nepal:
NDN-RBE: An Accountable Privacy Aware Access Control Framework For NDN. 1572-1589 - Mabin Joseph, Gautham Sekar, R. Balasubramanian:
Revisiting the Software-Efficient Stream Ciphers RCR-64 and RCR-32. 1590-1602 - Correction to: Metaheuristic-Enabled Artificial Neural Network Framework For Multimodal Biometric Recognition With Local Fusion Visual Features. 1603
- Correction to: A Semantic Embedding Enhanced Topic Model For User-Generated Textual Content Modeling In Social Ecosystems. 1604
Volume 67, Number 5, 2024
- Fairouz Kamareddine:
Thematic Editorial, It Is Hard To Imagine A World Without Algorithms and Data Science. 1605-1606 - Hanwen Zhang, Li-e Wang, Zhigang Sun, Xianxian Li:
Knowledge-Aware Dual-Channel Graph Neural Networks For Denoising Recommendation. 1607-1618 - Dong Dong, Hongxu Jiang, Boyu Diao:
AKGF: Automatic Kernel Generation for DNN on CPU-FPGA. 1619-1627 - Nankai Lin, Xiaotian Lin, Yingwen Fu, Shengyi Jiang, Lianxi Wang:
A Chinese Grammatical Error Correction Model Based On Grammatical Generalization And Parameter Sharing. 1628-1636 - Syed Irteza Hussain Jafri, Rozaida Ghazali, Irfan Javid, Yana Mazwin Mohmad Hassim, Mubashir Hayat Khan:
A Hybrid Solution For The Cold Start Problem In Recommendation. 1637-1644 - Zhixiong Xu, Wei Zhang, Ailin Li, Feifei Zhao, Yuanyuan Jing, Zheng Wan, Lei Cao, Xiliang Chen:
Online Optimization Method of Learning Process for Meta-Learning. 1645-1651 - Daoqiang Sun, Hongbo Liu, Yu Yang, Long Li, Heng Zhang, Asfand Fahad:
Enumeration Of Subtrees Of Two Families Of Self-Similar Networks Based On Novel Two-Forest Dual Transformations. 1652-1662 - Jiqiang Lu, Jingyu Li, Zexuan Chen, Yanan Li:
Cryptanalysis Of A Type Of White-Box Implementations Of The SM4 Block Cipher. 1663-1673 - Jiale Huang, Jigang Wu, Long Chen, Yalan Wu, Yidong Li:
Coalitional Double Auction For Ridesharing With Desired Benefit And QoE Constraints. 1674-1686 - Ali Marandi, Pedro Geraldo M. R. Alves, Diego F. Aranha, Rune Hylsberg Jacobsen:
Lattice-Based Homomorphic Encryption For Privacy-Preserving Smart Meter Data Analytics. 1687-1698 - Xin Yuan, Ning Li, Xiaobo Gong, Changli Yu, Xiaoteng Zhou, José-Fernán Martínez-Ortega:
Underwater Wireless Sensor Network-Based Delaunay Triangulation (UWSN-DT) Algorithm for Sonar Map Fusion. 1699-1709 - Yun Zhang, Yuling Liu, Ge Cheng, Jie Wang:
Similarity Regression Of Functions In Different Compiled Forms With Neural Attentions On Dual Control-Flow Graphs. 1710-1718 - Jia-Jie Liu:
The Orbits of Folded Crossed Cubes. 1719-1726 - Nan Xiang, Xiao Tang, Huiling Liu, Xiaoxia Ma:
Identifying and Ranking Influential Spreaders in Complex Networks by Localized Decreasing Gravity Model. 1727-1746 - Qiang Zhang, Junjiang He, Tao Li, Xiaolong Lan, Wenbo Fang, Yihong Li:
SPAW-SMOTE: Space Partitioning Adaptive Weighted Synthetic Minority Oversampling Technique For Imbalanced Data Set Learning. 1747-1762 - Veerawali Behal, Ramandeep Singh:
An Intelligent Air Monitoring System For Pollution Prediction: A Predictive Healthcare Perspective. 1763-1782 - Nan Zhong, Zhenxing Qian, Xinpeng Zhang:
Sparse Backdoor Attack Against Neural Networks. 1783-1793 - Abhinav Chakraborty, Subhash Bhagat, Krishnendu Mukhopadhyaya:
Gathering Over Heterogeneous Meeting Nodes. 1794-1813 - Yangguang Tian, Yingjiu Li, Robert H. Deng, Guomin Yang, Nan Li:
Policy-Based Remote User Authentication From Multi-Biometrics. 1814-1825 - Chenghao Li, Xinyan Yang, Gang Liang:
Keyframe-guided Video Swin Transformer with Multi-path Excitation for Violence Detection. 1826-1837 - Amirfarhad Farhadi, Arash Sharifi:
Leveraging Meta-Learning To Improve Unsupervised Domain Adaptation. 1838-1850 - Dingyu Shou, Chao Li, Zhen Wang, Song Cheng, Xiaobo Hu, Kai Zhang, Mi Wen, Yong Wang:
An Intrusion Detection Method Based on Attention Mechanism to Improve CNN-BiLSTM Model. 1851-1865 - Jan A. Bergstra, John V. Tucker:
Eager Term Rewriting For The Fracterm Calculus Of Common Meadows. 1866-1871 - Hunar Abubakir Ahmed, Jafar Majidpour, Mohammed Hussein Ahmed, Samer Kais Jameel, Amir Majidpour:
Enhancing Auditory Brainstem Response Classification Based On Vision Transformer. 1872-1878 - Le Feng, Zhenxing Qian, Xinpeng Zhang, Sheng Li:
Stealthy Backdoor Attacks On Deep Point Cloud Recognization Networks. 1879-1891 - Chiheng Wang, Shibin Zhao, Jianshan Peng, Junhu Zhu:
KVFL: Key-Value-Based Persistent Fuzzing for IoT Web Servers. 1892-1909 - Xintong Xu, Run Cui, Chanying Huang, Kedong Yan:
Anonymization of face images with Contrastive Learning. 1910-1919 - Hadeel Alhosaini, Sultan Alharbi, Xianzhi Wang, Guandong Xu:
API Recommendation For Mashup Creation: A Comprehensive Survey. 1920-1940 - Zhenhua Chen, Ting Li, Junrui Xie, Ni Li, Jingjing Nie:
Kth min Threshold Encryption for Privacy-preserving Data Evaluation. 1941-1950 - Jinguang Han, Willy Susilo, Liquan Chen, Jianchang Lai, Ge Wu:
Privacy-Preserving Confidential Reporting System With Designated Reporters. 1951-1962 - Shuodi Zu, Xiangyang Luo, Liang Wang, Fan Zhang:
GUI: A Geolocation Method for Unreachable IP. 1963-1978 - Fucai Zhou, Zongye Zhang, Ruiwei Hou:
Privacy-Preserving Image Retrieval with Multi-Modal Query. 1979-1992 - Correction to: Automatic Diagnosis of Diabetic Retinopathy from Retinal Abnormalities: Improved Jaya-Based Feature Selection and Recurrent Neural Network. 2007
Volume 67, Number 6, 2024
- Zhicheng Yao, Sa Wang, Jinbin Zhu, Yungang Bao:
Panoptic Segmentation with Convex Object Representation. 2009-2019 - Chavdar Dangalchev:
Closeness Centralities of Lollipop Graphs. 2020-2029 - Yihong Wang, Baolei Cheng, Yan Wang, Jia Yu, Jianxi Fan:
Strongly Menger Connectedness of a Class of Recursive Networks. 2030-2038 - Changsheng Hou, Chunbo Jia, Bingnan Hou, Tongqing Zhou, Yingwen Chen, Zhiping Cai:
A Sketch Framework for Fast, Accurate and Fine-Grained Analysis of Application Traffic. 2039-2053 - Weidong Zhao, Xiaotong Liu:
Detection of E-Commerce Fraud Review via Self-Paced Graph Contrast Learning. 2054-2065 - Ana Cavalcanti, Madiel Conserva Filho, Pedro Ribeiro, Augusto Sampaio:
Laws of Timed State Machines. 2066-2107 - Muhammad Omer Farooq:
WiPoTS: An Application Layer Protocol With Network Protocol Stack Enhancements For Wireless Power Transfer Networks. 2108-2117 - Huanshen Jia, Jianguo Qian:
Menger-Type Connectivity of Line Graphs of Generalized Hypercubes With Faulty Edges. 2118-2125 - Jaffar Atwan, Nedaa Almansour, Mohammad Hashem Ryalat, Shahnorbanun Sahran, Hamza Aldabbas, Dheeb Albashish:
Ensemble of Deep Features for Breast Cancer Histopathological Image Classification. 2126-2136 - Ping Wang, Ruisheng Zhang:
Influence Maximization in Social Networks Using an Improved Multi-Objective Particle Swarm Optimization. 2137-2150 - Irene Finocchi, Renan Leon Garcia, Blerina Sinaimeri:
From Stars to Diamonds: Counting and Listing Almost Complete Subgraphs in Large Networks. 2151-2161 - Mengzhu Yu, Zhenjun Tang, Hanyun Zhang, Xiaoping Liang, Xianquan Zhang:
Video Hashing with Tensor Robust PCA and Histogram of Optical Flow for Copy Detection. 2162-2171 - Xueshi Dong, Qing Lin, Wei Wang:
Hybrid ITÖ Algorithm for Maximum Scatter Colored Traveling Salesman Problem. 2172-2188 - Yeim-Kuan Chang, Hsin-Mao Chen:
Partitioned 2D Set-Pruning Segment Trees with Compressed Buckets for Multi-Dimensional Packet Classification. 2189-2207 - Kang Liu, Yang Lu, Shiyi Tan, Wei Liang, Huiping Sun, Zhong Chen:
CFAuditChain: Audit BlockChain Based On Cuckoo Filter. 2208-2218 - Xiuyuan Chen, Chao Lin, Wei Wu, Debiao He:
A General Blockchain-Based Automatic Audit Scheme For Proofs Of Retrievability. 2219-2229 - Yu Lei, Keshuai Qu, Yifan Zhao, Qing Han, Xuguang Wang:
Multimodal Sentiment Analysis Based on Composite Hierarchical Fusion. 2230-2245 - Hairong Jia, Suying Wang, Zelong Ren:
CNN-LSTM Base Station Traffic Prediction Based On Dual Attention Mechanism and Timing Application. 2246-2256 - Kürsat Mustafa Karaoglan, Oguz Findik:
Enhancing Aspect Category Detection Through Hybridised Contextualised Neural Language Models: A Case Study In Multi-Label Text Classification. 2257-2269 - Sandhya, Abhishek Kashyap:
A Light Weight Depthwise Separable Layer Optimized CNN Architecture for Object-Based Forgery Detection in Surveillance Videos. 2270-2285 - Leyou Xu, Chengli Li, Bo Zhou:
Link Residual Closeness of Graphs with Fixed Parameters. 2286-2302 - Qiang Xu, Dongmei Xu, Hao Wang, Jianye Yuan, Zhe Wang:
Color Patterns And Enhanced Texture Learning For Detecting Computer-Generated Images. 2303-2316 - Faten Louati, Farah Barika Ktata, Ikram Amous:
An Intelligent Security System Using Enhanced Anomaly-Based Detection Scheme. 2317-2330 - Qiang Zhou, Liangmin Wang, Huijuan Zhu, Tong Lu, Heping Song:
Joint Alignment Networks For Few-Shot Website Fingerprinting Attack. 2331-2345 - Yi Zhong, Zihan Teng, Mengjun Tong:
LiteMixer: Cauliflower Disease Diagnosis based on a Novel Lightweight Neural Network. 2346-2356 - Zhongjun Yang, Qing Huang, Qi Wang, Xuejun Zong, Ran Ao:
Visual Intrusion Detection Based On CBAM-Capsule Networks. 2357-2367 - Xianyun Mei, Liangliang Wang, Baodong Qin, Kai Zhang, Yu Long:
EFTA: An Efficient and Fault-Tolerant Data Aggregation Scheme without TTP in Smart Grid. 2368-2378 - Xiaoyang Liu, Nan Ding, Yudie Wu, Giacomo Fiumara, Pasquale De Meo:
Discrete-Time Quantum Walks Community Detection in Multi-Domain Networks. 2379-2389 - Yuyuan Xiang, Hongxia Wang, Ling Yang, Mingze He, Fei Zhang:
SEDD: Robust Blind Image Watermarking With Single Encoder And Dual Decoders. 2390-2402
Volume 67, Number 7, 2024
- Yannis Manolopoulos:
Thematic editorial: sentiment analysis. 2403-2407 - Dawei Ren, Lingwei Meng, Rui Wang:
Borehole Depth Recognition Based on Improved YOLOX Detection. 2408-2420 - Armando Castañeda, Hans van Ditmarsch, David A. Rosenblueth, Diego A. Velázquez:
Pattern Models: A Dynamic Epistemic Logic For Distributed Systems. 2421-2440 - Zhiyuan Gao, Jinguo Li, Liangliang Wang, Yin He, Peichun Yuan:
CM-UTC: A Cost-sensitive Matrix based Method for Unknown Encrypted Traffic Classification. 2441-2452 - Rohit Beniwal, Pavi Saraswat:
A Hybrid BERT-CNN Approach for Depression Detection on Social Media Using Multimodal Data. 2453-2472 - Guofeng Yan, Zhengwen Su, Hengliang Tan, Jiao Du:
Service Function Placement Optimization For Cloud Service With End-to-End Delay Constraints. 2473-2485 - Chuancheng Wei, Gang Liang, Kexiang Yan:
BotGSL: Twitter Bot Detection with Graph Structure Learning. 2486-2497 - Naila Hamid, Nazar Khan, Arbish Akram:
ELSM: Evidence-Based Line Segment Merging. 2498-2514 - Yujuan Zou, Zhijian Wang, Pengfei Xu, Taizhi Lv:
An Improved Density Peaks Clustering Algorithm Based On Density Ratio. 2515-2528 - Sugandh Seth, Kuljit Kaur Chahal, Gurvinder Singh:
Concept Drift-Based Intrusion Detection For Evolving Data Stream Classification In IDS: Approaches And Comparative Study. 2529-2547 - Soran Badawi:
Deep Learning-Based Cyberbullying Detection in Kurdish Language. 2548-2558
Volume 67, Number 8, 2024
- Lina Zhu, Zuochang Zhang:
Software Failure Prediction Based On Program State and First-Error Characteristics. 2559-2572 - Xi Zhang, Ye Su, Jing Qin, Jiameng Sun:
SDTA: Secure Decentralized Trading Alliance for Electronic Medical Data. 2573-2585 - Kaiwen Guo, Kexin Hu, Zhenfeng Zhang:
Liveness Attacks On HotStuff: The Vulnerability Of Timer Doubling Mechanism. 2586-2600 - Arati Kushwaha, Manish Khare, Reddy Mounika Bommisetty, Ashish Khare:
Human Activity Recognition Based On Video Summarization And Deep Convolutional Neural Network. 2601-2609 - Xiaoyang Liu, Xiaoyang Fu, Pasquale De Meo, Giacomo Fiumara:
Cross-Domain Recommendation To Cold-Start Users Via Categorized Preference Transfer. 2610-2621 - Yunchao Gong, Xueqiang Lv, Zhu Yuan, Xindong You, Feng Hu, Yuzhong Chen:
GNN-Based Multimodal Named Entity Recognition. 2622-2632 - Hemakasiny Visuwalingam, Ratnasingam Sakuntharaj, Janaka Alawatugoda, Roshan G. Ragel:
Deep Learning Model for Tamil Part-of-Speech Tagging. 2633-2642 - J. Ayuso Perez:
Hardware Addition Over Finite Fields Based On Booth-Karatsuba Algorithm. 2643-2666 - Shuangquan Chen, Jinguo Li, Kai Zhang, Aoran Di, Mengli Lu:
Privacy-Preserving Breast Cancer Prediction Based on Logistic Regression. 2667-2676 - Youness Manzali, Yassine Akhiat, Khalidou Abdoulaye Barry, Elyazid Akachar, Mohamed El Far:
Prediction of Student Performance Using Random Forest Combined With Naïve Bayes. 2677-2689 - Yifan Xu, Liangmin Wang, Jie Chen, Qiang Zhou:
Tor Trace in Images: A Novel Multi-Tab Website Fingerprinting Attack With Object Detection. 2690-2701 - Jeremy Booher, Ross Bowden, Javad Doliskani, Tako Boris Fouotsa, Steven D. Galbraith, Sabrina Kunzweiler, Simon-Philipp Merz, Christophe Petit, Benjamin Smith, Katherine E. Stange, Yan Bo Ti, Christelle Vincent, José Felipe Voloch, Charlotte Weitkämper, Lukas Zobernig:
Failing to Hash Into Supersingular Isogeny Graphs. 2702-2719
Volume 67, Number 9, 2024
- Antonio Fernández Anta:
Thematic editorial: edge computing, fog computing, and internet of things. 2721-2724 - Weihua Liu, Bing Gong, Kai Che, Jieming Ma, Yushan Pan:
Anomaly Metrics on Class Variations For Face Anti-Spoofing. 2725-2738 - Songshou Dong, Yanqing Yao, Yihua Zhou, Yuguang Yang:
A Certificateless Linearly Homomorphic Signature Scheme Based on Lattice for Network Coding. 2739-2748 - Chenguang Zhu, Renzheng Wei, Liwei Chen, Tongshuai Wu, Gewangzi Du, Gang Shi:
Vulnerability Localization Based On Intermediate Code Representation and Feature Fusion. 2749-2762 - Luong The Dung, Nguyen Ngoc Toan, Tran Nghi Phu:
CAIMP: Cross-Architecture IoT Malware Detection and Prediction Based On Static Feature. 2763-2776 - Hao Feng, Jiong Wu, Lin Chen:
Intermittent Fault Diagnosis Of Product Network Based On PMC Model. 2777-2786 - Hongjuan Yang, Gang Tian, Chengrui Xu, Rui Wang:
Algorithms For Cold-Start Game Recommendation Based On GNN Pre-training Model. 2787-2798 - Fatemeh Taheri, Kambiz Rahbar:
Coverless Image Steganography Using Content-Based Image Patch Retrieval. 2799-2808 - Shurui Wang, Yuhe Zhang, Ruizhe Guo, Yaning Zhang, Yifei Xie, Xinyu Zhou:
2L-LSH: A Locality-Sensitive Hash Function-Based Method For Rapid Point Cloud Indexing. 2809-2818 - Zhen Yan, Haipeng Qu, Xi Jun Lin:
On The Security Of A Novel Construction Of Certificateless Aggregate Signature Scheme For Healthcare Wireless Medical Sensor Networks. 2819-2822 - Zhuojie Huang, Shuping Zhao, Zien Liang, Jigang Wu:
Discriminative Subspace Learning With Adaptive Graph Regularization. 2823-2837 - Fang Tang, Nengsheng Du, Zhengwei Zhong, Chunlin Li, Youlong Luo:
An improved sensing data cleaning scheme for object localization in edge computing environment. 2838-2853 - Haizhen Wang, Zhiqing Cui, Zuozheng Lian, Jinying Yan:
An improved DNN model for WLAN intrusion detection. 2854-2863 - Marwa Khan, Asma Naseer, Aamir Wali, Maria Tamoor:
A Roman Urdu Corpus for sentiment analysis. 2864-2876
Volume 67, Number 10, 2024
- Xiaolei Zhang, Zhaoyu Chen, Xin Zhang, Qingni Shen, Zhonghai Wu:
IPOD2: an irrecoverable and verifiable deletion scheme for outsourced data. 2877-2889 - Mengjie Lv, Weibei Fan, Hui Dong, Guijuan Wang:
Fault tolerance of hierarchical cubic networks based on cluster fault pattern. 2890-2897 - Sheikh Azizul Hakim, Rahnuma Islam Nishat, Md. Saidur Rahman:
Approximation algorithms for maximum weighted internal spanning trees in regular graphs and subdivisions of graphs. 2898-2905 - Peng Zhang, Zhendong Niu, Ru Ma, Fuzhi Zhang:
DHCL-BR: Dual Hypergraph Contrastive Learning for Bundle Recommendation. 2906-2919 - Junfeng Tian, Qi Zhu, Jiawei Shen, Tengfei Xu:
TPRT: a trajectory publishing scheme for the Internet of Vehicles based on radix tree. 2920-2933 - Mehmet Burukanli, Nejat Yumusak:
COVID-19 virus mutation prediction with LSTM and attention mechanisms. 2934-2944 - Ameen Al-Azzawi, Gábor Lencse:
Security analysis of the MAP-T IPv6 transition technology. 2945-2958 - Keao Lin, Xiaozhu Xie, Wei Weng, Xiaofeng Du:
Global-local graph attention: unifying global and local attention for node classification. 2959-2969 - Han Qi, Jingtong Wang, Yufan Cui:
VQCNN: variational quantum convolutional neural networks based on quantum filters and fully connected layers. 2970-2983 - Luiz Fernando Afra Brito, Marcelo Keese Albertini, Bruno Augusto Nassif Travençolo, Gonzalo Navarro:
Dynamic compact data structure for temporal reachability with unsorted contact insertions. 2984-2994 - Changsheng Hou, Bingnan Hou, Xionglve Li, Tongqing Zhou, Yingwen Chen, Zhiping Cai:
DRL-Tomo: a deep reinforcement learning-based approach to augmented data generation for network tomography. 2995-3008 - Junhao Zeng, Gang Liang, Yixin Ma, Xinyan Yang, Cheng Chen:
Pornographic video detection based on semantic and image enhancement. 3009-3019 - Abdulatif Ahmed Ali Aboluhom, Ismet Kandilli:
Face recognition using deep learning on Raspberry Pi. 3020-3030
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.