Stop the war!
Остановите войну!
for scientists:
default search action
The Computer Journal, Volume 67
Volume 67, Number 1, January 2024
- Marios C. Angelides:
Thematic Editorial: Mostly Artificial Intelligence (AI) or Machine Learning (ML) Now in the Engine Room, in Pursuit of a Green Agenda. 1-2 - Mariem Gnouma, Ridha Ejbali, Mourad Zaied:
Deep Hashing and Sparse Representation of Abnormal Events Detection. 3-17 - Ozgur Oksuz:
A System For Storing Anonymous Patient Healthcare Data Using Blockchain And Its Applications. 18-30 - He Li, Duo Jin, Xuejiao Li, Shaojie Qiao:
A Dynamic Heterogeneous Graph Convolution Network For Traffic Flow Prediction. 31-44 - Tongfeng Li, Ruisheng Zhang, Bojuan Niu, Yabing Yao, Jun Ma, Jing Jiang, Zhili Zhao:
Link Prediction Based On Local Structure And Node Information Along Local Paths. 45-56 - Sayaka Kamei, Sébastien Tixeuil:
An Asynchronous Maximum Independent Set Algorithm By Myopic Luminous Robots On Grids. 57-77 - Zhuowei Wang, Hao Wang, Xiaoyu Song, Jiahui Wu:
Communication-Aware Energy Consumption Model in Heterogeneous Computing Systems. 78-94 - James Walsh, Oluwafunmilola Kesa, Andrew Wang, Mihai Ilas, Patrick O'Hara, Oscar Giles, Neil Dhir, Mark Girolami, Theodoros Damoulas:
Near Real-Time Social Distance Estimation In London. 95-109 - Aissam Aouar, Saïd Yahiaoui, Lamia Sadeg, Nadia Nouali-Taboudjemat, Kadda Beghdad Bey:
Distributed Partial Simulation for Graph Pattern Matching. 110-126 - Xiaoyang Liu, Luyuan Gao, Giacomo Fiumara, Pasquale De Meo:
Key Node Identification Method Integrating Information Transmission Probability and Path Diversity in Complex Network. 127-141 - Xiaoqing Liu, Shuming Zhou, Jiafei Liu, Hong Zhang:
Reliability Analysis of the Cactus-Based Networks Based on Subsystem. 142-152 - Qin Luo, Xin Cao:
PNCTS: A Prediction and Network Coding-Based Transmission Scheme for Efficient Screen Updates Delivery in DaaS. 153-168 - Vahid Amin Ghafari, Mahmoud Ahmadian-Attari:
An Attack on a Proposed Construction of Small-State Stream Ciphers and Proposals for New Constructions. 169-178 - Xiwen Wang, Kai Zhang, Jinguo Li, Mi Wen, Shengmin Xu, Jianting Ning:
Non-interactive Boolean Searchable Asymmetric Encryption With Bilateral Access Control. 179-194 - Jiali Shi, Chao Li, Guoqiang Liu:
Differential Attack With Constants On μ2 Block Cipher. 195-209 - Yin Lv, Danping Shi, Lei Hu, Zihui Guo, Yi Guo, Caibing Wang:
Improved Linear Cryptanalysis of Block Cipher BORON. 210-219 - Andrew Simpson, Matthias Dellago, Daniel W. Woods:
Formalizing Attack Trees To Support Economic Analysis. 220-235 - Xu Zhang, Shunjie Wen, Liang Yan, Jiangfan Feng, Ying Xia:
A Hybrid-Convolution Spatial-Temporal Recurrent Network For Traffic Flow Prediction. 236-252 - Wenhan Ge, Junfeng Wang:
SeqMask: Behavior Extraction Over Cyber Threat Intelligence Via Multi-Instance Learning. 253-273 - Chunning Zhou, Wentao Zhang, Weiwei Cao:
A New Approach of Evaluating the Security Against Differential and Linear Cryptanalysis and Its Applications to Serpent, NOEKEON and ASCON. 274-291 - Lin Ding, Zheng Wu, Guixian Zhang, Tairong Shi:
Quantum Guess and Determine Attack on Stream Ciphers. 292-303 - K. Ashwini:
User Name-Based Compression and Encryption of Images Using Chaotic Compressive Sensing Theory. 304-322 - Ke Wang, Zhenfeng Zhang, Haodong Jiang, Huiqin Xie, Yanjun Li, Ying Sun, Lidong Han:
Key Reuse Attacks on Post-quantum Cryptosystems, Revisited. 323-337 - Mozamel M. Saeed:
Designing Scenarios for In-Organization Training Using the CyberCIEGE Game. 338-346 - C. Shaji, I. Shatheesh Sam:
Encoding with Combination Orientation Technique for RDH in Dual Stego Images. 347-361 - Liqing Qiu, Yuying Liu, Jianyi Zhang:
A New Method for Identifying Influential Spreaders in Complex Networks. 362-375 - Joon-Young Paik, Rize Jin:
Malware Family Prediction with an Awareness of Label Uncertainty. 376-390 - Nieves R. Brisaboa, Travis Gagie, Adrián Gómez-Brandón, Gonzalo Navarro:
Two-Dimensional Block Trees. 391-406
Volume 67, Number 2, February 2024
- Amal Abid, Saoussen Cheikhrouhou, Slim Kallel, Zahir Tari, Mohamed Jmaiel:
A Smart Contract-Based Access Control Framework For Smart Healthcare Systems. 407-422 - Zhu Yuan, Xueqiang Lv, Ping Xie, Haojie Ge, Xindong You:
CSEA: A Fine-Grained Framework of Climate-Season-Based Energy-Aware in Cloud Storage Systems. 423-436 - Francisco Javier Moreno Arboleda, Georgia Garani, Carlos Daniel Bolivar Zapata:
Query Operators for Transactional Data: Detecting Similar and Periodic Transactions. 437-446 - Mengqi Liu, Hang Gao, Xiaofan Xia, Suying Gui, Tiegang Gao:
Perceptual Image Hashing Based on Canny Operator and Tensor for Copy-Move Forgery Detection. 447-462 - Changan Liu, Changjun Fan, Zhongzhi Zhang:
Finding Influencers in Complex Networks: An Effective Deep Reinforcement Learning Approach. 463-473 - Yaoan Jin, Atsuko Miyaji:
Secure and Compact Elliptic Curve Scalar Multiplication with Optimized Inversion. 474-484 - Mingzhe Zhu, Wanyue Xu, Wei Li, Zhongzhi Zhang, Haibin Kan:
Hitting Times of Random Walks on Edge Corona Product Graphs. 485-497 - Yuliang Xue, Yuhao Zhu, Zhiying Zhu, Sheng Li, Zhenxing Qian, Xinpeng Zhang:
Removing Watermarks For Image Processing Networks Via Referenced Subspace Attention. 498-507 - Reza Ebrahim Pourian, Mehdi Fartash, Javad Akbari Torkestani:
A Deep Learning Model for Energy-Aware Task Scheduling Algorithm Based on Learning Automata for Fog Computing. 508-518 - Marzieh Shamsizadeh, Mohammad Mehdi Zahedi, Khadijeh Abolpour:
Irreducible Fuzzy Multiset Finite Automaton. 519-526 - Heqin Liu, Dongqin Cheng:
Structure Fault Tolerance of Exchanged Hypercube. 527-536 - Jinyu Lu, Guoqiang Liu, Bing Sun, Chao Li, Li Liu:
Improved (Related-Key) Differential-Based Neural Distinguishers for SIMON and SIMECK Block Ciphers. 537-547 - Yuxing Yang:
Hyper-Hamiltonian Laceability of Cartesian Products of Cycles and Paths. 548-556 - Hireche Samia, Dennai Abdeslem, Boufeldja Kadri:
Toward a Novel RESTFUL Big Data-Based Urban Traffic Incident Data Web Service for Connected Vehicles. 557-580 - Xuefeng Zhao:
Secure and Efficient Masking of Lightweight Ciphers in Software and Hardware. 581-603 - Yishu Xu, Peng Zhang, Hongtao Yu, Fuzhi Zhang:
Detecting Group Shilling Attacks In Recommender Systems Based On User Multi-dimensional Features And Collusive Behaviour Analysis. 604-616 - Zhiwei Chen, Lunzhi Deng, Yu Ruan, Shuai Feng, Tao Wang, Bo Wang:
Certificateless Broadcast Encryption with Authorization Suitable for Storing Personal Health Records. 617-631 - Tu-Liang Lin, Hong-Yi Chang, Yuan-Yao Chiang, Shu-Cheng Lin, Tsung-Yen Yang, Chun-Jun Zhuang, Wha-Lee Tseng, Bo-Hao Zhang:
Ransomware Detection by Distinguishing API Call Sequences through LSTM and BERT Models. 632-641 - Tian Yang, Sha Ma, Jiaojiao Du, Chengyu Jiang, Qiong Huang:
Revocable Public Key Encryption with Equality Test without Pairing in Cloud Storage. 642-657 - Rahman Keramati Hatkeposhti, Meisam Yadollahzadeh Tabari, Mehdi GolsorkhtabariAmiri:
Providing an Approach for Early Prediction of Fall in Human Activities Based on Wearable Sensor Data and the Use of Deep Learning Algorithms. 658-673 - Li Zhang, Yu Zhang, Wenling Wu, Yongxia Mao, Yafei Zheng:
Explicit Upper Bound Of Impossible Differentials For AES-Like Ciphers: Application To uBlock And Midori. 674-687 - Zhecheng Yu, Liqiong Xu:
Reliability Evaluation Of Multiprocessor System Based On The Balanced Complete Multipartite Graphs. 688-693 - Shumin Si, Xiuhan Lin, Puwen Wei:
Compressed Zero-Knowledge Proofs for Lattice-Based Accumulator. 694-708 - Hong Zhang, Shuming Zhou, Eddie Cheng:
The Cyclic Diagnosability Of Hypercubes Under The PMC Model And The MM* Model. 709-718 - Katharina Boudgoust, Adeline Roux-Langlois:
Overfull: Too Large Aggregate Signatures Based on Lattices. 719-727 - Tzong-Jye Liu:
Adversarial Attacks on Network Intrusion Detection Systems Using Flow Containers. 728-745 - Hongjin Zhang, Hui Wei, Wang Bo:
A New Fuzzy Smoothing Term Model For Stereo Matching. 746-761 - Senxing Lu, Mingming Zhao, Chunlin Li, Quanbing Du, Youlong Luo:
Time-Aware Data Partition Optimization and Heterogeneous Task Scheduling Strategies in Spark Clusters. 762-776 - Shijie Zhao, Pingshan Li:
On Conditional Edge-Fault-Tolerant Strong Menger Edge Connectivity Of Folded Hypercubes. 777-781 - Hala S. Ali, R. Sridevi:
Mobility and Security Aware Real-Time Task Scheduling in Fog-Cloud Computing for IoT Devices: A Fuzzy-Logic Approach. 782-805 - Correction to: An Attack on a Proposed Construction of Small-State Stream Ciphers and Proposals for New Constructions. 806
- Correction to: Performance Evaluation of FPGA-Based LSTM Neural Networks for Pulse Signal Detection on Real-Time Radar Warning Receivers. 807
Volume 67, Number 3, 2024
- Yannis Manolopoulos:
Thematic Editorial: The Ubiquitous Network. 809-811 - Marek A. Suchenek:
Worst-Case Analysis of Heapsort, Exactly. 812-824 - Oguzhan Erdem, Tuncay Soylu, Aydin Carus:
Pipelined Decision Trees for Online Traffic Classification on FPGAs. 825-839 - Ching-Fang Hsu, Zhe Xia, Tianshu Cheng, Lein Harn:
Extremely Lightweight Constant-Round Membership-Authenticated Group Key Establishment for Resource-Constrained Smart Environments toward 5G. 840-850 - Shaohong Zhou, Junjiang He, Tao Li, Xiaolong Lan, Yunpeng Wang, Hui Zhao, Yihong Li:
Automating the Deployment of Cyber Range with OpenStack. 851-863 - Shixiong Yao, Pei Li, Jing Chen, Yuexing Zeng, Jiageng Chen, Donghui Wang:
CD-BCM:Cross-Domain Batch Certificates Management Based On Blockchain. 864-874 - Le He, Hongbo Yu:
Cryptanalysis of Reduced-Round SipHash. 875-883 - Chung-Ming Huang, Shu-Hang Huang:
Traffic-Aware Re-Grouping for Load Balance in IEEE 802.11ah IoT Network Based on the Registered Backoff Time Mechanism. 884-898 - Bolin Wang, Wenling Wu, Yuhan Zhang, Li Zhang:
New Integral Distinguishers On Permutation Of Whirlpool. 899-906 - Ya Liu, Yuanhang Wu, Fengyv Zhao, Yanli Ren:
Balanced Off-Chain Payment Channel Network Routing Strategy Based On Weight Calculation. 907-922 - Yang Yang, Wenhao Liu, Guang Zeng:
A General Condition of Structural Distinguisher. 923-932 - Ricard Borges, Francesc Sebé:
An e-Coin Based Construction for Unlinkable Priced Oblivious Transfer. 933-940 - Ravneet Kaur, Amrinderpreet Singh, Aekamjot Singh, Amit Goyal, Amritpal Singh, Shalini Batra:
An Efficient Pending Interest Table Content Search In NDN through Stable Bloom Filter. 941-946 - M. Veera Brahmam, S. Gopikrishnan:
NODSTAC: Novel Outlier Detection Technique Based on Spatial, Temporal and Attribute Correlations on IoT Bigdata. 947-960 - Amir Tehrani, Meisam Yadollahzadeh Tabari, Aidin Zehtab-Salmasi, Rasul Enayatifar:
Wearable Sensor-Based Human Activity Recognition System Employing Bi-LSTM Algorithm. 961-975 - Qingjun Yuan, Yuefei Zhu, Gang Xiong, Yongjuan Wang, Wentao Yu, Bin Luo, Gaopeng Gou:
ULDC: Unsupervised Learning-Based Data Cleaning for Malicious Traffic With High Noise. 976-987 - Liqun Chen, Nada El Kassem, Christopher J. P. Newton:
How To Bind A TPM's Attestation Keys With Its Endorsement Key. 988-1004 - Patrizio Angelini, Giordano Da Lozzo, Henry Förster, Thomas Schneck:
2-Layer k-Planar Graphs Density, Crossing Lemma, Relationships And Pathwidth. 1005-1016 - Liang Zhang, Haibin Kan, Feiyang Qiu, Feng Hao:
A Publicly Verifiable Optimistic Fair Exchange Protocol Using Decentralized CP-ABE. 1017-1029 - Dong Fang, Guifang Huang, Mengfan Wang, Lei Hu:
Decreasing Proof Size of BLS Scheme. 1030-1040 - Yue Li, Jianfang Qi, Haibin Jin, Dong Tian, Weisong Mu, Jianying Feng:
An Improved Genetic-XGBoost Classifier for Customer Consumption Behavior Prediction. 1041-1059 - Yongcheng Song, Jiang Zhang, Xinyi Huang, Wei Wu, Haixia Chen:
Analysis and Construction of Zero-Knowledge Proofs for the MinRank Problem. 1060-1075 - Yilun Shang:
Resilient Vector Consensus Over Random Dynamic Networks Under Mobile Malicious Attacks. 1076-1086 - Jie Chen, Yinuo Luo, Jun Liu, Chao Wang, Yueyu Zhang, Xiaoli Dong:
A White-box Implementation of SM4 with Self-equivalence Encoding. 1087-1098 - Kashav Ajmera, Tribhuwan Kumar Tewari:
Dynamic Virtual Machine Scheduling Using Residual Optimum Power-Efficiency In The Cloud Data Center. 1099-1110 - Volkan Müjdat Tiryaki, Nedim Tutkun:
Breast Cancer Mass Classification Using Machine Learning, Binary-Coded Genetic Algorithms and an Ensemble of Deep Transfer Learning. 1111-1125 - Praveen Kumar Ramtekkar, Anjana Pandey, Mahesh Kumar Pawar:
A Comprehensive Review of Brain Tumour Detection Mechanisms. 1126-1152 - Zongyang Zhang, Lingyue Zhang, Zhuo Wang, Yichen Li, Rongxing Lu, Yong Yu:
Chronos: An Efficient Asynchronous Byzantine Ordered Consensus. 1153-1162 - Lidong Xu, Mingqiang Wang, Jing Qin:
Quantum Bit Commitment Without Quantum Memory. 1163-1170 - Meilian Lu, Meng Li:
A Multiple QoS Metrics-Aware Virtual Network Embedding Algorithm. 1171-1186 - Ashutosh Kumar, Aakanksha Sharaff:
SnorkelPlus: A Novel Approach for Identifying Relationships Among Biomedical Entities Within Abstracts. 1187-1200 - Jin Huo, Weihua Yang:
Pancyclic And Hamiltonian Properties Of Dragonfly Networks. 1201-1208 - Correction to: Perceptual Image Hashing Based on Canny Operator and Tensor for Copy-Move Forgery Detection. 1209
- Correction to: Hitting Times of Random Walks on Edge Corona Product Graphs. 1210
Volume 67, Number 4, 2024
- Timóteo Gomes, Fernanda M. R. Alencar:
An Ontology as Support for Specification of Non-functional Requirements of AAL Systems Considering Compliance Aspects. 1211-1225 - Jan Strappa, Facundo Bromberg:
Efficient Comparison Of Independence Structures Of Log-Linear Models. 1226-1252 - Xin Wang, Li Lin, Yao Wang:
Stealth Address Schemes With Fast Retrievability Based On Subgroup Membership Assumptions Related To Factoring. 1253-1264 - Handong Cui, Kwan Yin Chan, Tsz Hon Yuen, Xin Kang, Cheng-Kang Chu:
Bandwidth-Efficient Zero-Knowledge Proofs For Threshold ECDSA. 1265-1278 - Ching-Kuo Hsu:
A Genetic Algorithm Based Scheduling Method With Carrier Aggregation In 5G Networks. 1279-1285 - Erana Veerappa Dinesh Subramaniam, Valarmathi Krishnasamy:
Hybrid Optimal Ensemble SVM Forest Classifier for Task Offloading in Mobile Cloud Computing. 1286-1297 - Jiaomei Zhang, Ayong Ye, Jianwei Chen, Yuexin Zhang, Wenjie Yang:
CSFL: Cooperative Security Aware Federated Learning Model Using The Blockchain. 1298-1308 - Zhonghao Zhai, Subin Shen, Yan-qin Mao:
A Toolbox for Migrating the Blockchain-Based Application From Ethereum to Hyperledger Fabric. 1309-1323 - Juan Manuel Castelo Gómez, Javier Carrillo Mondéjar, José Roldán Gómez, José Luis Martínez:
A Concept Forensic Methodology For The Investigation Of IoT Cyberincidents. 1324-1345 - Weiwei Yang, Shangsong Liang, Jian Yin:
Spatial-Aware Multi-Directional Autoencoder For Pre-Training. 1346-1360 - Runze Yang, Baoqi Huang, Zhendong Xu, Bing Jia, Gang Xu:
Towards Accurate Smartphone Localization Using CSI Measurements. 1361-1369 - Shuai Liu, Jizhou Ren, Jie Guan, Bin Hu, Sudong Ma, Hao Bai:
A Break Of Barrier To Classical Differential Fault Attack On The Nonce-Based Authenticated Encryption Algorithm. 1370-1380 - Harold Thimbleby:
Improving Science That Uses Code. 1381-1404 - Lingyun Li, Xianhui Lu, Kunpeng Wang:
eBiBa: A Post-Quantum Hash-Based Signature With Small Signature Size in the Continuous Communication of Large-Scale Data. 1405-1424 - Yaofang Zhang, Peixuan Li, Ping Xie:
A Hybrid Scheme Combining Duplications and LDPC Decoding to Reduce NAND Flash. 1425-1437 - Paul Lou, Amit Sahai, Varun Sivashankar:
Relinearization Attack On LPN Over Large Fields. 1438-1442 - Qingyuan Yu, Lingyue Qin, Xiaoyang Dong, Keting Jia:
Improved Related-Key Rectangle Attacks On GIFT. 1443-1456 - Chang Shu, Yan Wang, Jianxi Fan, Guijuan Wang:
Super Structure Fault-Tolerance Assessment of the Generalized Hypercube. 1457-1466 - Dongchao Ma, Dongmei Wang, Xiaofu Huang, Yuekun Hu, Li Ma:
KEFSAR: A Solar-Aware Routing Strategy For Rechargeable IoT Based On High-Accuracy Prediction. 1467-1482 - Shiqi Hou, Baofeng Wu, Shichang Wang, Hao Guo, Dongdai Lin:
Truncated Differential Attacks On Symmetric Primitives With Linear Key Schedule: WARP And Orthros. 1483-1500 - Shuang Zhao, Shuhui Chen, Fei Wang, Ziling Wei, Jincheng Zhong, Jianbing Liang:
A Large-Scale Mobile Traffic Dataset For Mobile Application Identification. 1501-1513 - Daniel Lemire:
Exact Short Products From Truncated Multipliers. 1514-1520 - Zhaoliang Lin, Jinguo Li:
FedEVCP: Federated Learning-Based Anomalies Detection for Electric Vehicle Charging Pile. 1521-1530 - Amalan Joseph Antony, Kunwar Singh:
A Blockchain-Based Public Key Infrastructure For IoT-Based Healthcare Systems. 1531-1537 - Tongshuai Wu, Liwei Chen, Gewangzi Du, Chenguang Zhu, Ningning Cui, Gang Shi:
CDNM: Clustering-Based Data Normalization Method For Automated Vulnerability Detection. 1538-1549 - Dinghua Zhang, Shihao Wu, Yang Li, Quan Pan:
An Evaluation On The Entropy Supplying Capability Of Smartphone Sensors. 1550-1563 - Junying Yuan, Huicheng Zheng, Jiangqun Ni:
Reversible Data Hiding With Pattern Adaptive Prediction. 1564-1571 - Nazatul Haque Sultan, Vijay Varadharajan, Saurab Dulal, Seyit Camtepe, Surya Nepal:
NDN-RBE: An Accountable Privacy Aware Access Control Framework For NDN. 1572-1589 - Mabin Joseph, Gautham Sekar, R. Balasubramanian:
Revisiting the Software-Efficient Stream Ciphers RCR-64 and RCR-32. 1590-1602 - Correction to: Metaheuristic-Enabled Artificial Neural Network Framework For Multimodal Biometric Recognition With Local Fusion Visual Features. 1603
- Correction to: A Semantic Embedding Enhanced Topic Model For User-Generated Textual Content Modeling In Social Ecosystems. 1604
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.