


default search action
The Computer Journal, Volume 67
Volume 67, Number 1, January 2024
- Marios C. Angelides

:
Thematic Editorial: Mostly Artificial Intelligence (AI) or Machine Learning (ML) Now in the Engine Room, in Pursuit of a Green Agenda. 1-2 - Mariem Gnouma

, Ridha Ejbali
, Mourad Zaied
:
Deep Hashing and Sparse Representation of Abnormal Events Detection. 3-17 - Ozgur Oksuz:

A System For Storing Anonymous Patient Healthcare Data Using Blockchain And Its Applications. 18-30 - He Li, Duo Jin, Xuejiao Li, Shaojie Qiao

:
A Dynamic Heterogeneous Graph Convolution Network For Traffic Flow Prediction. 31-44 - Tongfeng Li, Ruisheng Zhang

, Bojuan Niu, Yabing Yao, Jun Ma
, Jing Jiang, Zhili Zhao:
Link Prediction Based On Local Structure And Node Information Along Local Paths. 45-56 - Sayaka Kamei

, Sébastien Tixeuil
:
An Asynchronous Maximum Independent Set Algorithm By Myopic Luminous Robots On Grids. 57-77 - Zhuowei Wang, Hao Wang

, Xiaoyu Song, Jiahui Wu:
Communication-Aware Energy Consumption Model in Heterogeneous Computing Systems. 78-94 - James Walsh

, Oluwafunmilola Kesa, Andrew Wang
, Mihai Ilas
, Patrick O'Hara
, Oscar Giles, Neil Dhir
, Mark Girolami
, Theodoros Damoulas:
Near Real-Time Social Distance Estimation In London. 95-109 - Aissam Aouar

, Saïd Yahiaoui
, Lamia Sadeg, Nadia Nouali-Taboudjemat
, Kadda Beghdad Bey:
Distributed Partial Simulation for Graph Pattern Matching. 110-126 - Xiaoyang Liu

, Luyuan Gao
, Giacomo Fiumara
, Pasquale De Meo
:
Key Node Identification Method Integrating Information Transmission Probability and Path Diversity in Complex Network. 127-141 - Xiaoqing Liu

, Shuming Zhou, Jiafei Liu, Hong Zhang:
Reliability Analysis of the Cactus-Based Networks Based on Subsystem. 142-152 - Qin Luo

, Xin Cao:
PNCTS: A Prediction and Network Coding-Based Transmission Scheme for Efficient Screen Updates Delivery in DaaS. 153-168 - Vahid Amin Ghafari

, Mahmoud Ahmadian-Attari:
An Attack on a Proposed Construction of Small-State Stream Ciphers and Proposals for New Constructions. 169-178 - Xiwen Wang

, Kai Zhang
, Jinguo Li, Mi Wen, Shengmin Xu
, Jianting Ning
:
Non-interactive Boolean Searchable Asymmetric Encryption With Bilateral Access Control. 179-194 - Jiali Shi, Chao Li, Guoqiang Liu:

Differential Attack With Constants On μ2 Block Cipher. 195-209 - Yin Lv

, Danping Shi, Lei Hu
, Zihui Guo
, Yi Guo, Caibing Wang:
Improved Linear Cryptanalysis of Block Cipher BORON. 210-219 - Andrew Simpson

, Matthias Dellago, Daniel W. Woods
:
Formalizing Attack Trees To Support Economic Analysis. 220-235 - Xu Zhang

, Shunjie Wen
, Liang Yan, Jiangfan Feng, Ying Xia
:
A Hybrid-Convolution Spatial-Temporal Recurrent Network For Traffic Flow Prediction. 236-252 - Wenhan Ge

, Junfeng Wang:
SeqMask: Behavior Extraction Over Cyber Threat Intelligence Via Multi-Instance Learning. 253-273 - Chunning Zhou

, Wentao Zhang, Weiwei Cao:
A New Approach of Evaluating the Security Against Differential and Linear Cryptanalysis and Its Applications to Serpent, NOEKEON and ASCON. 274-291 - Lin Ding

, Zheng Wu, Guixian Zhang, Tairong Shi
:
Quantum Guess and Determine Attack on Stream Ciphers. 292-303 - K. Ashwini

:
User Name-Based Compression and Encryption of Images Using Chaotic Compressive Sensing Theory. 304-322 - Ke Wang

, Zhenfeng Zhang, Haodong Jiang, Huiqin Xie, Yanjun Li, Ying Sun, Lidong Han:
Key Reuse Attacks on Post-quantum Cryptosystems, Revisited. 323-337 - Mozamel M. Saeed

:
Designing Scenarios for In-Organization Training Using the CyberCIEGE Game. 338-346 - C. Shaji

, I. Shatheesh Sam:
Encoding with Combination Orientation Technique for RDH in Dual Stego Images. 347-361 - Liqing Qiu

, Yuying Liu
, Jianyi Zhang:
A New Method for Identifying Influential Spreaders in Complex Networks. 362-375 - Joon-Young Paik

, Rize Jin
:
Malware Family Prediction with an Awareness of Label Uncertainty. 376-390 - Nieves R. Brisaboa

, Travis Gagie
, Adrián Gómez-Brandón
, Gonzalo Navarro
:
Two-Dimensional Block Trees. 391-406
Volume 67, Number 2, February 2024
- Amal Abid

, Saoussen Cheikhrouhou
, Slim Kallel, Zahir Tari
, Mohamed Jmaiel
:
A Smart Contract-Based Access Control Framework For Smart Healthcare Systems. 407-422 - Zhu Yuan

, Xueqiang Lv, Ping Xie, Haojie Ge, Xindong You
:
CSEA: A Fine-Grained Framework of Climate-Season-Based Energy-Aware in Cloud Storage Systems. 423-436 - Francisco Javier Moreno Arboleda

, Georgia Garani
, Carlos Daniel Bolivar Zapata
:
Query Operators for Transactional Data: Detecting Similar and Periodic Transactions. 437-446 - Mengqi Liu

, Hang Gao
, Xiaofan Xia
, Suying Gui
, Tiegang Gao
:
Perceptual Image Hashing Based on Canny Operator and Tensor for Copy-Move Forgery Detection. 447-462 - Changan Liu, Changjun Fan, Zhongzhi Zhang:

Finding Influencers in Complex Networks: An Effective Deep Reinforcement Learning Approach. 463-473 - Yaoan Jin

, Atsuko Miyaji
:
Secure and Compact Elliptic Curve Scalar Multiplication with Optimized Inversion. 474-484 - Mingzhe Zhu

, Wanyue Xu, Wei Li, Zhongzhi Zhang, Haibin Kan
:
Hitting Times of Random Walks on Edge Corona Product Graphs. 485-497 - Yuliang Xue

, Yuhao Zhu, Zhiying Zhu
, Sheng Li, Zhenxing Qian
, Xinpeng Zhang:
Removing Watermarks For Image Processing Networks Via Referenced Subspace Attention. 498-507 - Reza Ebrahim Pourian, Mehdi Fartash

, Javad Akbari Torkestani:
A Deep Learning Model for Energy-Aware Task Scheduling Algorithm Based on Learning Automata for Fog Computing. 508-518 - Marzieh Shamsizadeh

, Mohammad Mehdi Zahedi
, Khadijeh Abolpour:
Irreducible Fuzzy Multiset Finite Automaton. 519-526 - Heqin Liu, Dongqin Cheng

:
Structure Fault Tolerance of Exchanged Hypercube. 527-536 - Jinyu Lu

, Guoqiang Liu, Bing Sun, Chao Li, Li Liu
:
Improved (Related-Key) Differential-Based Neural Distinguishers for SIMON and SIMECK Block Ciphers. 537-547 - Yuxing Yang

:
Hyper-Hamiltonian Laceability of Cartesian Products of Cycles and Paths. 548-556 - Hireche Samia

, Dennai Abdeslem
, Boufeldja Kadri
:
Toward a Novel RESTFUL Big Data-Based Urban Traffic Incident Data Web Service for Connected Vehicles. 557-580 - Xuefeng Zhao:

Secure and Efficient Masking of Lightweight Ciphers in Software and Hardware. 581-603 - Yishu Xu, Peng Zhang

, Hongtao Yu, Fuzhi Zhang:
Detecting Group Shilling Attacks In Recommender Systems Based On User Multi-dimensional Features And Collusive Behaviour Analysis. 604-616 - Zhiwei Chen

, Lunzhi Deng
, Yu Ruan, Shuai Feng, Tao Wang, Bo Wang:
Certificateless Broadcast Encryption with Authorization Suitable for Storing Personal Health Records. 617-631 - Tu-Liang Lin

, Hong-Yi Chang
, Yuan-Yao Chiang
, Shu-Cheng Lin
, Tsung-Yen Yang
, Chun-Jun Zhuang
, Wha-Lee Tseng
, Bo-Hao Zhang
:
Ransomware Detection by Distinguishing API Call Sequences through LSTM and BERT Models. 632-641 - Tian Yang, Sha Ma, Jiaojiao Du, Chengyu Jiang, Qiong Huang:

Revocable Public Key Encryption with Equality Test without Pairing in Cloud Storage. 642-657 - Rahman Keramati Hatkeposhti

, Meisam Yadollahzadeh Tabari
, Mehdi GolsorkhtabariAmiri
:
Providing an Approach for Early Prediction of Fall in Human Activities Based on Wearable Sensor Data and the Use of Deep Learning Algorithms. 658-673 - Li Zhang, Yu Zhang

, Wenling Wu, Yongxia Mao, Yafei Zheng:
Explicit Upper Bound Of Impossible Differentials For AES-Like Ciphers: Application To uBlock And Midori. 674-687 - Zhecheng Yu, Liqiong Xu

:
Reliability Evaluation Of Multiprocessor System Based On The Balanced Complete Multipartite Graphs. 688-693 - Shumin Si

, Xiuhan Lin, Puwen Wei:
Compressed Zero-Knowledge Proofs for Lattice-Based Accumulator. 694-708 - Hong Zhang, Shuming Zhou, Eddie Cheng

:
The Cyclic Diagnosability Of Hypercubes Under The PMC Model And The MM* Model. 709-718 - Katharina Boudgoust

, Adeline Roux-Langlois:
Overfull: Too Large Aggregate Signatures Based on Lattices. 719-727 - Tzong-Jye Liu

:
Adversarial Attacks on Network Intrusion Detection Systems Using Flow Containers. 728-745 - Hongjin Zhang

, Hui Wei
, Wang Bo:
A New Fuzzy Smoothing Term Model For Stereo Matching. 746-761 - Senxing Lu, Mingming Zhao, Chunlin Li, Quanbing Du, Youlong Luo:

Time-Aware Data Partition Optimization and Heterogeneous Task Scheduling Strategies in Spark Clusters. 762-776 - Shijie Zhao, Pingshan Li:

On Conditional Edge-Fault-Tolerant Strong Menger Edge Connectivity Of Folded Hypercubes. 777-781 - Hala S. Ali

, R. Sridevi:
Mobility and Security Aware Real-Time Task Scheduling in Fog-Cloud Computing for IoT Devices: A Fuzzy-Logic Approach. 782-805 - Correction to: An Attack on a Proposed Construction of Small-State Stream Ciphers and Proposals for New Constructions. 806

- Correction to: Performance Evaluation of FPGA-Based LSTM Neural Networks for Pulse Signal Detection on Real-Time Radar Warning Receivers. 807

Volume 67, Number 3, 2024
- Yannis Manolopoulos:

Thematic Editorial: The Ubiquitous Network. 809-811 - Marek A. Suchenek:

Worst-Case Analysis of Heapsort, Exactly. 812-824 - Oguzhan Erdem, Tuncay Soylu, Aydin Carus

:
Pipelined Decision Trees for Online Traffic Classification on FPGAs. 825-839 - Ching-Fang Hsu

, Zhe Xia
, Tianshu Cheng
, Lein Harn:
Extremely Lightweight Constant-Round Membership-Authenticated Group Key Establishment for Resource-Constrained Smart Environments toward 5G. 840-850 - Shaohong Zhou, Junjiang He, Tao Li, Xiaolong Lan, Yunpeng Wang, Hui Zhao, Yihong Li:

Automating the Deployment of Cyber Range with OpenStack. 851-863 - Shixiong Yao, Pei Li

, Jing Chen, Yuexing Zeng, Jiageng Chen
, Donghui Wang:
CD-BCM:Cross-Domain Batch Certificates Management Based On Blockchain. 864-874 - Le He

, Hongbo Yu:
Cryptanalysis of Reduced-Round SipHash. 875-883 - Chung-Ming Huang

, Shu-Hang Huang
:
Traffic-Aware Re-Grouping for Load Balance in IEEE 802.11ah IoT Network Based on the Registered Backoff Time Mechanism. 884-898 - Bolin Wang, Wenling Wu, Yuhan Zhang

, Li Zhang:
New Integral Distinguishers On Permutation Of Whirlpool. 899-906 - Ya Liu, Yuanhang Wu, Fengyv Zhao, Yanli Ren:

Balanced Off-Chain Payment Channel Network Routing Strategy Based On Weight Calculation. 907-922 - Yang Yang, Wenhao Liu

, Guang Zeng:
A General Condition of Structural Distinguisher. 923-932 - Ricard Borges, Francesc Sebé

:
An e-Coin Based Construction for Unlinkable Priced Oblivious Transfer. 933-940 - Ravneet Kaur

, Amrinderpreet Singh, Aekamjot Singh, Amit Goyal, Amritpal Singh, Shalini Batra:
An Efficient Pending Interest Table Content Search In NDN through Stable Bloom Filter. 941-946 - M. Veera Brahmam, S. Gopikrishnan

:
NODSTAC: Novel Outlier Detection Technique Based on Spatial, Temporal and Attribute Correlations on IoT Bigdata. 947-960 - Amir Tehrani, Meisam Yadollahzadeh Tabari

, Aidin Zehtab-Salmasi, Rasul Enayatifar:
Wearable Sensor-Based Human Activity Recognition System Employing Bi-LSTM Algorithm. 961-975 - Qingjun Yuan

, Yuefei Zhu, Gang Xiong, Yongjuan Wang, Wentao Yu, Bin Luo, Gaopeng Gou:
ULDC: Unsupervised Learning-Based Data Cleaning for Malicious Traffic With High Noise. 976-987 - Liqun Chen

, Nada El Kassem
, Christopher J. P. Newton
:
How To Bind A TPM's Attestation Keys With Its Endorsement Key. 988-1004 - Patrizio Angelini

, Giordano Da Lozzo
, Henry Förster
, Thomas Schneck:
2-Layer k-Planar Graphs Density, Crossing Lemma, Relationships And Pathwidth. 1005-1016 - Liang Zhang

, Haibin Kan
, Feiyang Qiu, Feng Hao
:
A Publicly Verifiable Optimistic Fair Exchange Protocol Using Decentralized CP-ABE. 1017-1029 - Dong Fang

, Guifang Huang
, Mengfan Wang
, Lei Hu
:
Decreasing Proof Size of BLS Scheme. 1030-1040 - Yue Li, Jianfang Qi, Haibin Jin, Dong Tian, Weisong Mu

, Jianying Feng
:
An Improved Genetic-XGBoost Classifier for Customer Consumption Behavior Prediction. 1041-1059 - Yongcheng Song

, Jiang Zhang, Xinyi Huang, Wei Wu, Haixia Chen
:
Analysis and Construction of Zero-Knowledge Proofs for the MinRank Problem. 1060-1075 - Yilun Shang:

Resilient Vector Consensus Over Random Dynamic Networks Under Mobile Malicious Attacks. 1076-1086 - Jie Chen, Yinuo Luo

, Jun Liu
, Chao Wang, Yueyu Zhang, Xiaoli Dong:
A White-box Implementation of SM4 with Self-equivalence Encoding. 1087-1098 - Kashav Ajmera

, Tribhuwan Kumar Tewari
:
Dynamic Virtual Machine Scheduling Using Residual Optimum Power-Efficiency In The Cloud Data Center. 1099-1110 - Volkan Müjdat Tiryaki

, Nedim Tutkun:
Breast Cancer Mass Classification Using Machine Learning, Binary-Coded Genetic Algorithms and an Ensemble of Deep Transfer Learning. 1111-1125 - Praveen Kumar Ramtekkar, Anjana Pandey

, Mahesh Kumar Pawar
:
A Comprehensive Review of Brain Tumour Detection Mechanisms. 1126-1152 - Zongyang Zhang, Lingyue Zhang, Zhuo Wang, Yichen Li, Rongxing Lu, Yong Yu

:
Chronos: An Efficient Asynchronous Byzantine Ordered Consensus. 1153-1162 - Lidong Xu, Mingqiang Wang, Jing Qin:

Quantum Bit Commitment Without Quantum Memory. 1163-1170 - Meilian Lu, Meng Li:

A Multiple QoS Metrics-Aware Virtual Network Embedding Algorithm. 1171-1186 - Ashutosh Kumar

, Aakanksha Sharaff
:
SnorkelPlus: A Novel Approach for Identifying Relationships Among Biomedical Entities Within Abstracts. 1187-1200 - Jin Huo, Weihua Yang:

Pancyclic And Hamiltonian Properties Of Dragonfly Networks. 1201-1208 - Correction to: Perceptual Image Hashing Based on Canny Operator and Tensor for Copy-Move Forgery Detection. 1209

- Correction to: Hitting Times of Random Walks on Edge Corona Product Graphs. 1210

Volume 67, Number 4, 2024
- Timóteo Gomes, Fernanda M. R. Alencar:

An Ontology as Support for Specification of Non-functional Requirements of AAL Systems Considering Compliance Aspects. 1211-1225 - Jan Strappa, Facundo Bromberg:

Efficient Comparison Of Independence Structures Of Log-Linear Models. 1226-1252 - Xin Wang

, Li Lin, Yao Wang:
Stealth Address Schemes With Fast Retrievability Based On Subgroup Membership Assumptions Related To Factoring. 1253-1264 - Handong Cui

, Kwan Yin Chan
, Tsz Hon Yuen
, Xin Kang
, Cheng-Kang Chu
:
Bandwidth-Efficient Zero-Knowledge Proofs For Threshold ECDSA. 1265-1278 - Ching-Kuo Hsu:

A Genetic Algorithm Based Scheduling Method With Carrier Aggregation In 5G Networks. 1279-1285 - Erana Veerappa Dinesh Subramaniam

, Valarmathi Krishnasamy
:
Hybrid Optimal Ensemble SVM Forest Classifier for Task Offloading in Mobile Cloud Computing. 1286-1297 - Jiaomei Zhang

, Ayong Ye, Jianwei Chen, Yuexin Zhang, Wenjie Yang
:
CSFL: Cooperative Security Aware Federated Learning Model Using The Blockchain. 1298-1308 - Zhonghao Zhai

, Subin Shen, Yan-qin Mao:
A Toolbox for Migrating the Blockchain-Based Application From Ethereum to Hyperledger Fabric. 1309-1323 - Juan Manuel Castelo Gómez

, Javier Carrillo Mondéjar
, José Roldán Gómez
, José Luis Martínez
:
A Concept Forensic Methodology For The Investigation Of IoT Cyberincidents. 1324-1345 - Weiwei Yang

, Shangsong Liang
, Jian Yin:
Spatial-Aware Multi-Directional Autoencoder For Pre-Training. 1346-1360 - Runze Yang

, Baoqi Huang
, Zhendong Xu, Bing Jia, Gang Xu:
Towards Accurate Smartphone Localization Using CSI Measurements. 1361-1369 - Shuai Liu, Jizhou Ren

, Jie Guan, Bin Hu, Sudong Ma
, Hao Bai
:
A Break Of Barrier To Classical Differential Fault Attack On The Nonce-Based Authenticated Encryption Algorithm. 1370-1380 - Harold Thimbleby

:
Improving Science That Uses Code. 1381-1404 - Lingyun Li

, Xianhui Lu
, Kunpeng Wang
:
eBiBa: A Post-Quantum Hash-Based Signature With Small Signature Size in the Continuous Communication of Large-Scale Data. 1405-1424 - Yaofang Zhang, Peixuan Li, Ping Xie:

A Hybrid Scheme Combining Duplications and LDPC Decoding to Reduce NAND Flash. 1425-1437 - Paul Lou, Amit Sahai, Varun Sivashankar

:
Relinearization Attack On LPN Over Large Fields. 1438-1442 - Qingyuan Yu

, Lingyue Qin, Xiaoyang Dong, Keting Jia:
Improved Related-Key Rectangle Attacks On GIFT. 1443-1456 - Chang Shu, Yan Wang, Jianxi Fan, Guijuan Wang:

Super Structure Fault-Tolerance Assessment of the Generalized Hypercube. 1457-1466 - Dongchao Ma, Dongmei Wang, Xiaofu Huang, Yuekun Hu, Li Ma:

KEFSAR: A Solar-Aware Routing Strategy For Rechargeable IoT Based On High-Accuracy Prediction. 1467-1482 - Shiqi Hou, Baofeng Wu

, Shichang Wang, Hao Guo, Dongdai Lin:
Truncated Differential Attacks On Symmetric Primitives With Linear Key Schedule: WARP And Orthros. 1483-1500 - Shuang Zhao, Shuhui Chen

, Fei Wang, Ziling Wei, Jincheng Zhong, Jianbing Liang:
A Large-Scale Mobile Traffic Dataset For Mobile Application Identification. 1501-1513 - Daniel Lemire:

Exact Short Products From Truncated Multipliers. 1514-1520 - Zhaoliang Lin

, Jinguo Li:
FedEVCP: Federated Learning-Based Anomalies Detection for Electric Vehicle Charging Pile. 1521-1530 - Amalan Joseph Antony

, Kunwar Singh:
A Blockchain-Based Public Key Infrastructure For IoT-Based Healthcare Systems. 1531-1537 - Tongshuai Wu

, Liwei Chen, Gewangzi Du, Chenguang Zhu
, Ningning Cui, Gang Shi:
CDNM: Clustering-Based Data Normalization Method For Automated Vulnerability Detection. 1538-1549 - Dinghua Zhang, Shihao Wu

, Yang Li
, Quan Pan:
An Evaluation On The Entropy Supplying Capability Of Smartphone Sensors. 1550-1563 - Junying Yuan

, Huicheng Zheng
, Jiangqun Ni
:
Reversible Data Hiding With Pattern Adaptive Prediction. 1564-1571 - Nazatul Haque Sultan

, Vijay Varadharajan
, Saurab Dulal
, Seyit Camtepe
, Surya Nepal
:
NDN-RBE: An Accountable Privacy Aware Access Control Framework For NDN. 1572-1589 - Mabin Joseph

, Gautham Sekar, R. Balasubramanian:
Revisiting the Software-Efficient Stream Ciphers RCR-64 and RCR-32. 1590-1602 - Correction to: Metaheuristic-Enabled Artificial Neural Network Framework For Multimodal Biometric Recognition With Local Fusion Visual Features. 1603

- Correction to: A Semantic Embedding Enhanced Topic Model For User-Generated Textual Content Modeling In Social Ecosystems. 1604

Volume 67, Number 5, 2024
- Fairouz Kamareddine

:
Thematic Editorial, It Is Hard To Imagine A World Without Algorithms and Data Science. 1605-1606 - Hanwen Zhang, Li-e Wang, Zhigang Sun, Xianxian Li:

Knowledge-Aware Dual-Channel Graph Neural Networks For Denoising Recommendation. 1607-1618 - Dong Dong, Hongxu Jiang, Boyu Diao

:
AKGF: Automatic Kernel Generation for DNN on CPU-FPGA. 1619-1627 - Nankai Lin, Xiaotian Lin, Yingwen Fu, Shengyi Jiang

, Lianxi Wang
:
A Chinese Grammatical Error Correction Model Based On Grammatical Generalization And Parameter Sharing. 1628-1636 - Syed Irteza Hussain Jafri

, Rozaida Ghazali
, Irfan Javid
, Yana Mazwin Mohmad Hassim, Mubashir Hayat Khan
:
A Hybrid Solution For The Cold Start Problem In Recommendation. 1637-1644 - Zhixiong Xu

, Wei Zhang, Ailing Li, Feifei Zhao, Yuanyuan Jing, Zheng Wan, Lei Cao
, Xiliang Chen
:
Online Optimization Method of Learning Process for Meta-Learning. 1645-1651 - Daoqiang Sun

, Hongbo Liu
, Yu Yang
, Long Li
, Heng Zhang
, Asfand Fahad:
Enumeration Of Subtrees Of Two Families Of Self-Similar Networks Based On Novel Two-Forest Dual Transformations. 1652-1662 - Jiqiang Lu

, Jingyu Li
, Zexuan Chen, Yanan Li
:
Cryptanalysis Of A Type Of White-Box Implementations Of The SM4 Block Cipher. 1663-1673 - Jiale Huang, Jigang Wu, Long Chen

, Yalan Wu
, Yidong Li:
Coalitional Double Auction For Ridesharing With Desired Benefit And QoE Constraints. 1674-1686 - Ali Marandi

, Pedro Geraldo M. R. Alves, Diego F. Aranha
, Rune Hylsberg Jacobsen:
Lattice-Based Homomorphic Encryption For Privacy-Preserving Smart Meter Data Analytics. 1687-1698 - Xin Yuan, Ning Li

, Xiaobo Gong, Changli Yu, Xiaoteng Zhou, José-Fernán Martínez-Ortega:
Underwater Wireless Sensor Network-Based Delaunay Triangulation (UWSN-DT) Algorithm for Sonar Map Fusion. 1699-1709 - Yun Zhang

, Yuling Liu, Ge Cheng
, Jie Wang:
Similarity Regression Of Functions In Different Compiled Forms With Neural Attentions On Dual Control-Flow Graphs. 1710-1718 - Jia Jie Liu

:
The Orbits of Folded Crossed Cubes. 1719-1726 - Nan Xiang

, Xiao Tang, Huiling Liu
, Xiaoxia Ma
:
Identifying and Ranking Influential Spreaders in Complex Networks by Localized Decreasing Gravity Model. 1727-1746 - Qiang Zhang, Junjiang He

, Tao Li, Xiaolong Lan, Wenbo Fang, Yihong Li
:
SPAW-SMOTE: Space Partitioning Adaptive Weighted Synthetic Minority Oversampling Technique For Imbalanced Data Set Learning. 1747-1762 - Veerawali Behal, Ramandeep Singh

:
An Intelligent Air Monitoring System For Pollution Prediction: A Predictive Healthcare Perspective. 1763-1782 - Nan Zhong

, Zhenxing Qian
, Xinpeng Zhang:
Sparse Backdoor Attack Against Neural Networks. 1783-1793 - Abhinav Chakraborty, Subhash Bhagat

, Krishnendu Mukhopadhyaya
:
Gathering Over Heterogeneous Meeting Nodes. 1794-1813 - Yangguang Tian

, Yingjiu Li, Robert H. Deng
, Guomin Yang, Nan Li:
Policy-Based Remote User Authentication From Multi-Biometrics. 1814-1825 - Chenghao Li

, Xinyan Yang, Gang Liang
:
Keyframe-guided Video Swin Transformer with Multi-path Excitation for Violence Detection. 1826-1837 - Amirfarhad Farhadi

, Arash Sharifi:
Leveraging Meta-Learning To Improve Unsupervised Domain Adaptation. 1838-1850 - Dingyu Shou

, Chao Li
, Zhen Wang
, Song Cheng, Xiaobo Hu, Kai Zhang
, Mi Wen, Yong Wang
:
An Intrusion Detection Method Based on Attention Mechanism to Improve CNN-BiLSTM Model. 1851-1865 - Jan A. Bergstra

, John V. Tucker:
Eager Term Rewriting For The Fracterm Calculus Of Common Meadows. 1866-1871 - Hunar Abubakir Ahmed

, Jafar Majidpour, Mohammed Hussein Ahmed, Samer Kais Jameel, Amir Majidpour
:
Enhancing Auditory Brainstem Response Classification Based On Vision Transformer. 1872-1878 - Le Feng, Zhenxing Qian

, Xinpeng Zhang, Sheng Li:
Stealthy Backdoor Attacks On Deep Point Cloud Recognization Networks. 1879-1891 - Chiheng Wang

, Shibin Zhao
, Jianshan Peng
, Junhu Zhu
:
KVFL: Key-Value-Based Persistent Fuzzing for IoT Web Servers. 1892-1909 - Xintong Xu, Run Cui, Chanying Huang

, Kedong Yan
:
Anonymization of face images with Contrastive Learning. 1910-1919 - Hadeel Alhosaini

, Sultan Alharbi
, Xianzhi Wang
, Guandong Xu
:
API Recommendation For Mashup Creation: A Comprehensive Survey. 1920-1940 - Zhenhua Chen, Ting Li, Junrui Xie, Ni Li, Jingjing Nie:

Kth min Threshold Encryption for Privacy-preserving Data Evaluation. 1941-1950 - Jinguang Han

, Willy Susilo
, Liquan Chen, Jianchang Lai, Ge Wu
:
Privacy-Preserving Confidential Reporting System With Designated Reporters. 1951-1962 - Shuodi Zu, Xiangyang Luo, Liang Wang

, Fan Zhang:
GUI: A Geolocation Method for Unreachable IP. 1963-1978 - Fucai Zhou, Zongye Zhang, Ruiwei Hou:

Privacy-Preserving Image Retrieval with Multi-Modal Query. 1979-1992 - Correction to: Automatic Diagnosis of Diabetic Retinopathy from Retinal Abnormalities: Improved Jaya-Based Feature Selection and Recurrent Neural Network. 2007

Volume 67, Number 6, 2024
- Zhicheng Yao

, Sa Wang, Jinbin Zhu
, Yungang Bao:
Panoptic Segmentation with Convex Object Representation. 2009-2019 - Chavdar Dangalchev

:
Closeness Centralities of Lollipop Graphs. 2020-2029 - Yihong Wang

, Baolei Cheng
, Yan Wang, Jia Yu
, Jianxi Fan:
Strongly Menger Connectedness of a Class of Recursive Networks. 2030-2038 - Changsheng Hou, Chunbo Jia, Bingnan Hou

, Tongqing Zhou, Yingwen Chen
, Zhiping Cai
:
A Sketch Framework for Fast, Accurate and Fine-Grained Analysis of Application Traffic. 2039-2053 - Weidong Zhao, Xiaotong Liu

:
Detection of E-Commerce Fraud Review via Self-Paced Graph Contrast Learning. 2054-2065 - Ana Cavalcanti

, Madiel Conserva Filho
, Pedro Ribeiro
, Augusto Sampaio
:
Laws of Timed State Machines. 2066-2107 - Muhammad Omer Farooq

:
WiPoTS: An Application Layer Protocol With Network Protocol Stack Enhancements For Wireless Power Transfer Networks. 2108-2117 - Huanshen Jia, Jianguo Qian

:
Menger-Type Connectivity of Line Graphs of Generalized Hypercubes With Faulty Edges. 2118-2125 - Jaffar Atwan

, Nedaa Almansour, Mohammad Hashem Ryalat
, Shahnorbanun Sahran
, Hamza Aldabbas
, Dheeb Albashish:
Ensemble of Deep Features for Breast Cancer Histopathological Image Classification. 2126-2136 - Ping Wang

, Ruisheng Zhang
:
Influence Maximization in Social Networks Using an Improved Multi-Objective Particle Swarm Optimization. 2137-2150 - Irene Finocchi

, Renan Leon Garcia, Blerina Sinaimeri
:
From Stars to Diamonds: Counting and Listing Almost Complete Subgraphs in Large Networks. 2151-2161 - Mengzhu Yu

, Zhenjun Tang
, Hanyun Zhang, Xiaoping Liang, Xianquan Zhang
:
Video Hashing with Tensor Robust PCA and Histogram of Optical Flow for Copy Detection. 2162-2171 - Xueshi Dong, Qing Lin, Wei Wang:

Hybrid ITÖ Algorithm for Maximum Scatter Colored Traveling Salesman Problem. 2172-2188 - Yeim-Kuan Chang

, Hsin-Mao Chen
:
Partitioned 2D Set-Pruning Segment Trees with Compressed Buckets for Multi-Dimensional Packet Classification. 2189-2207 - Kang Liu, Yang Lu, Shiyi Tan, Wei Liang, Huiping Sun, Zhong Chen:

CFAuditChain: Audit BlockChain Based On Cuckoo Filter. 2208-2218 - Xiuyuan Chen

, Chao Lin
, Wei Wu, Debiao He
:
A General Blockchain-Based Automatic Audit Scheme For Proofs Of Retrievability. 2219-2229 - Yu Lei

, Keshuai Qu
, Yifan Zhao, Qing Han, Xuguang Wang:
Multimodal Sentiment Analysis Based on Composite Hierarchical Fusion. 2230-2245 - Hairong Jia

, Suying Wang
, Zelong Ren
:
CNN-LSTM Base Station Traffic Prediction Based On Dual Attention Mechanism and Timing Application. 2246-2256 - Kürsat Mustafa Karaoglan

, Oguz Findik
:
Enhancing Aspect Category Detection Through Hybridised Contextualised Neural Language Models: A Case Study In Multi-Label Text Classification. 2257-2269 - Sandhya, Abhishek Kashyap:

A Light Weight Depthwise Separable Layer Optimized CNN Architecture for Object-Based Forgery Detection in Surveillance Videos. 2270-2285 - Leyou Xu

, Chengli Li, Bo Zhou
:
Link Residual Closeness of Graphs with Fixed Parameters. 2286-2302 - Qiang Xu

, Dongmei Xu, Hao Wang, Jianye Yuan
, Zhe Wang
:
Color Patterns And Enhanced Texture Learning For Detecting Computer-Generated Images. 2303-2316 - Faten Louati

, Farah Barika Ktata
, Ikram Amous
:
An Intelligent Security System Using Enhanced Anomaly-Based Detection Scheme. 2317-2330 - Qiang Zhou, Liangmin Wang, Huijuan Zhu, Tong Lu, Heping Song

:
Joint Alignment Networks For Few-Shot Website Fingerprinting Attack. 2331-2345 - Yi Zhong, Zihan Teng

, Mengjun Tong:
LiteMixer: Cauliflower Disease Diagnosis based on a Novel Lightweight Neural Network. 2346-2356 - Zhongjun Yang

, Qing Huang, Qi Wang
, Xuejun Zong, Ran Ao:
Visual Intrusion Detection Based On CBAM-Capsule Networks. 2357-2367 - Xianyun Mei

, Liangliang Wang
, Baodong Qin, Kai Zhang
, Yu Long:
EFTA: An Efficient and Fault-Tolerant Data Aggregation Scheme without TTP in Smart Grid. 2368-2378 - Xiaoyang Liu

, Nan Ding
, Yudie Wu
, Giacomo Fiumara
, Pasquale De Meo
:
Discrete-Time Quantum Walks Community Detection in Multi-Domain Networks. 2379-2389 - Yuyuan Xiang, Hongxia Wang, Ling Yang

, Mingze He
, Fei Zhang
:
SEDD: Robust Blind Image Watermarking With Single Encoder And Dual Decoders. 2390-2402
Volume 67, Number 7, 2024
- Yannis Manolopoulos:

Thematic editorial: sentiment analysis. 2403-2407 - Dawei Ren

, Lingwei Meng, Rui Wang:
Borehole Depth Recognition Based on Improved YOLOX Detection. 2408-2420 - Armando Castañeda

, Hans van Ditmarsch, David A. Rosenblueth, Diego A. Velázquez
:
Pattern Models: A Dynamic Epistemic Logic For Distributed Systems. 2421-2440 - Zhiyuan Gao, Jinguo Li, Liangliang Wang

, Yin He
, Peichun Yuan
:
CM-UTC: A Cost-sensitive Matrix based Method for Unknown Encrypted Traffic Classification. 2441-2452 - Rohit Beniwal

, Pavi Saraswat
:
A Hybrid BERT-CNN Approach for Depression Detection on Social Media Using Multimodal Data. 2453-2472 - Guofeng Yan, Zhengwen Su, Hengliang Tan, Jiao Du:

Service Function Placement Optimization For Cloud Service With End-to-End Delay Constraints. 2473-2485 - Chuancheng Wei, Gang Liang, Kexiang Yan:

BotGSL: Twitter Bot Detection with Graph Structure Learning. 2486-2497 - Naila Hamid

, Nazar Khan
, Arbish Akram
:
ELSM: Evidence-Based Line Segment Merging. 2498-2514 - Yujuan Zou

, Zhijian Wang, Pengfei Xu, Taizhi Lv
:
An Improved Density Peaks Clustering Algorithm Based On Density Ratio. 2515-2528 - Sugandh Seth

, Kuljit Kaur Chahal
, Gurvinder Singh
:
Concept Drift-Based Intrusion Detection For Evolving Data Stream Classification In IDS: Approaches And Comparative Study. 2529-2547 - Soran Badawi

:
Deep Learning-Based Cyberbullying Detection in Kurdish Language. 2548-2558
Volume 67, Number 8, 2024
- Lina Zhu

, Zuochang Zhang
:
Software Failure Prediction Based On Program State and First-Error Characteristics. 2559-2572 - Xi Zhang, Ye Su

, Jing Qin
, Jiameng Sun:
SDTA: Secure Decentralized Trading Alliance for Electronic Medical Data. 2573-2585 - Kaiwen Guo, Kexin Hu, Zhenfeng Zhang:

Liveness Attacks On HotStuff: The Vulnerability Of Timer Doubling Mechanism. 2586-2600 - Arati Kushwaha, Manish Khare, Reddy Mounika Bommisetty, Ashish Khare

:
Human Activity Recognition Based On Video Summarization And Deep Convolutional Neural Network. 2601-2609 - Xiaoyang Liu, Xiaoyang Fu, Pasquale De Meo

, Giacomo Fiumara
:
Cross-Domain Recommendation To Cold-Start Users Via Categorized Preference Transfer. 2610-2621 - Yunchao Gong, Xueqiang Lv, Zhu Yuan

, Xindong You
, Feng Hu
, Yuzhong Chen:
GNN-Based Multimodal Named Entity Recognition. 2622-2632 - Hemakasiny Visuwalingam

, Ratnasingam Sakuntharaj
, Janaka Alawatugoda
, Roshan G. Ragel
:
Deep Learning Model for Tamil Part-of-Speech Tagging. 2633-2642 - J. Ayuso Perez

:
Hardware Addition Over Finite Fields Based On Booth-Karatsuba Algorithm. 2643-2666 - Shuangquan Chen, Jinguo Li, Kai Zhang

, Aoran Di, Mengli Lu:
Privacy-Preserving Breast Cancer Prediction Based on Logistic Regression. 2667-2676 - Youness Manzali

, Yassine Akhiat
, Khalidou Abdoulaye Barry, Elyazid Akachar
, Mohamed El Far
:
Prediction of Student Performance Using Random Forest Combined With Naïve Bayes. 2677-2689 - Yifan Xu, Liangmin Wang, Jie Chen

, Qiang Zhou:
Tor Trace in Images: A Novel Multi-Tab Website Fingerprinting Attack With Object Detection. 2690-2701 - Jeremy Booher

, Ross Bowden
, Javad Doliskani
, Tako Boris Fouotsa
, Steven D. Galbraith
, Sabrina Kunzweiler
, Simon-Philipp Merz
, Christophe Petit
, Benjamin Smith, Katherine E. Stange
, Yan Bo Ti, Christelle Vincent
, José Felipe Voloch, Charlotte Weitkämper, Lukas Zobernig:
Failing to Hash Into Supersingular Isogeny Graphs. 2702-2719
Volume 67, Number 9, 2024
- Antonio Fernández Anta

:
Thematic editorial: edge computing, fog computing, and internet of things. 2721-2724 - Weihua Liu, Bing Gong, Kai Che, Jieming Ma

, Yushan Pan:
Anomaly Metrics on Class Variations For Face Anti-Spoofing. 2725-2738 - Songshou Dong

, Yanqing Yao, Yihua Zhou, Yuguang Yang
:
A Certificateless Linearly Homomorphic Signature Scheme Based on Lattice for Network Coding. 2739-2748 - Chenguang Zhu

, Renzheng Wei, Liwei Chen, Tongshuai Wu
, Gewangzi Du, Gang Shi:
Vulnerability Localization Based On Intermediate Code Representation and Feature Fusion. 2749-2762 - Luong The Dung, Nguyen Ngoc Toan

, Tran Nghi Phu
:
CAIMP: Cross-Architecture IoT Malware Detection and Prediction Based On Static Feature. 2763-2776 - Hao Feng

, Jiong Wu, Lin Chen
:
Intermittent Fault Diagnosis Of Product Network Based On PMC Model. 2777-2786 - Hongjuan Yang, Gang Tian, Chengrui Xu, Rui Wang:

Algorithms For Cold-Start Game Recommendation Based On GNN Pre-training Model. 2787-2798 - Fatemeh Taheri

, Kambiz Rahbar
:
Coverless Image Steganography Using Content-Based Image Patch Retrieval. 2799-2808 - Shurui Wang, Yuhe Zhang

, Ruizhe Guo, Yaning Zhang, Yifei Xie
, Xinyu Zhou
:
2L-LSH: A Locality-Sensitive Hash Function-Based Method For Rapid Point Cloud Indexing. 2809-2818 - Zhen Yan

, Haipeng Qu
, Xi Jun Lin:
On The Security Of A Novel Construction Of Certificateless Aggregate Signature Scheme For Healthcare Wireless Medical Sensor Networks. 2819-2822 - Zhuojie Huang

, Shuping Zhao, Zien Liang, Jigang Wu:
Discriminative Subspace Learning With Adaptive Graph Regularization. 2823-2837 - Fang Tang, Nengsheng Du, Zhengwei Zhong, Chunlin Li, Youlong Luo

:
An improved sensing data cleaning scheme for object localization in edge computing environment. 2838-2853 - Haizhen Wang

, Zhiqing Cui
, Zuozheng Lian
, Jinying Yan
:
An improved DNN model for WLAN intrusion detection. 2854-2863 - Marwa Khan, Asma Naseer, Aamir Wali, Maria Tamoor:

A Roman Urdu Corpus for sentiment analysis. 2864-2876
Volume 67, Number 10, 2024
- Xiaolei Zhang

, Zhaoyu Chen, Xin Zhang, Qingni Shen
, Zhonghai Wu
:
IPOD2: an irrecoverable and verifiable deletion scheme for outsourced data. 2877-2889 - Mengjie Lv, Weibei Fan, Hui Dong, Guijuan Wang

:
Fault tolerance of hierarchical cubic networks based on cluster fault pattern. 2890-2897 - Sheikh Azizul Hakim

, Rahnuma Islam Nishat, Md. Saidur Rahman
:
Approximation algorithms for maximum weighted internal spanning trees in regular graphs and subdivisions of graphs. 2898-2905 - Peng Zhang

, Zhendong Niu, Ru Ma
, Fuzhi Zhang:
DHCL-BR: Dual Hypergraph Contrastive Learning for Bundle Recommendation. 2906-2919 - Junfeng Tian

, Qi Zhu
, Jiawei Shen
, Tengfei Xu
:
TPRT: a trajectory publishing scheme for the Internet of Vehicles based on radix tree. 2920-2933 - Mehmet Burukanli

, Nejat Yumusak
:
COVID-19 virus mutation prediction with LSTM and attention mechanisms. 2934-2944 - Ameen Al-Azzawi

, Gábor Lencse
:
Security analysis of the MAP-T IPv6 transition technology. 2945-2958 - Keao Lin, Xiaozhu Xie, Wei Weng

, Xiaofeng Du:
Global-local graph attention: unifying global and local attention for node classification. 2959-2969 - Han Qi

, Jingtong Wang
, Yufan Cui:
VQCNN: variational quantum convolutional neural networks based on quantum filters and fully connected layers. 2970-2983 - Luiz Fernando Afra Brito, Marcelo Keese Albertini

, Bruno Augusto Nassif Travençolo
, Gonzalo Navarro
:
Dynamic compact data structure for temporal reachability with unsorted contact insertions. 2984-2994 - Changsheng Hou, Bingnan Hou

, Xionglve Li
, Tongqing Zhou, Yingwen Chen
, Zhiping Cai
:
DRL-Tomo: a deep reinforcement learning-based approach to augmented data generation for network tomography. 2995-3008 - Junhao Zeng, Gang Liang, Yixin Ma, Xinyan Yang, Cheng Chen:

Pornographic video detection based on semantic and image enhancement. 3009-3019 - Abdulatif Ahmed Ali Aboluhom

, Ismet Kandilli
:
Face recognition using deep learning on Raspberry Pi. 3020-3030
Volume 67, Number 11, 2024
- K. Nalini Sujantha Bel, I. Shatheesh Sam:

Image retrieval based on auto-encoder and clustering with centroid update. 3031-3041 - Kevisino Khate

, Bam Bahadur Sinha
, Arambam Neelima:
Flower pollination-enhanced CNN for lung disease diagnosis. 3080-3093 - Yifan Yang, Xionglve Li

, Tao Yang
, Bingnan Hou
, Lingbin Zeng
, Zhiping Cai
, Wenyuan Kuang:
DGA domain embedding with deep metric learning. 3094-3104 - Xiaolong Shi

, Anjun Song:
Defog YOLO for road object detection in foggy weather. 3115-3127 - Zhong Tang

:
A generic multi-level framework for building term-weighting schemes in text classification. 3042-3055 - Shenglin Xu, Zhiyuan Jiang, Yongjun Wang, Peidai Xie:

FormatAEG: a framework for bypassing ASLR defense and automated exploitation of format string vulnerability. 3056-3066 - Gang Tian, Guangxin Zhao, Rui Wang, Jiachang Wang, Cheng He:

K-Nearest neighbor smart contract classification with semantic feature enhancement. 3067-3079 - Tameem Yousaf

, Ali Afzal Malik
, Marriam Daud
:
Customization effort estimation of Microsoft ERP projects. 3105-3114 - Nan Li

, Yingjiu Li, Mark Manulis
, Yangguang Tian
, Guomin Yang
:
Practical and secure policy-based chameleon hash for redactable blockchains. 3128-3139
Volume 67, Number 12, 2024
- Xin Yang, Peng Zeng, Kim-Kwang Raymond Choo, Chengju Li, Yanzhao Yang:

CoinFA: an efficient coin mixing scheme with flexible amounts. 3141-3150 - Huawei Xie, Jing Liu, Na Li:

Supervisor synthesis for opacity enforcement in partially observed discrete event systems. 3151-3159 - Siftee Ratra, Mohona Ghosh

, Niyati Baliyan
, Jinka Rashmitha Mohan, Sanjana Singh:
Graph neural network based phishing account detection in Ethereum. 3160-3168 - Wenfa Qi, Cheng Li

, Xinhui Han:
Research on blind reversible database watermarking algorithm based on dual embedding strategy. 3169-3179 - Wenjun Qian, Qingni Shen

, Xiaoyi Chen
, Cong Li
, Yuejian Fang, Zhonghai Wu
:
FDP-FL: differentially private federated learning with flexible privacy budget allocation. 3180-3195 - Zihang Zhang

, Yuling Liu, Zhili Zhou
, Gaobo Yang
, Q. M. Jonathan Wu:
Efficient object detector via dynamic prior and dynamic feature fusion. 3196-3206 - Xiaojun Zhao, Shudan Xue, Qingying Deng

, Pingshan Li:
Structure connectivity and substructure connectivity of Möbius cubes. 3207-3220 - Yizhe You, Zhengwei Jiang

, Peian Yang, Jun Jiang, Kai Zhang
, Xuren Wang, Chenpeng Tu
, Huamin Feng
:
P-TIMA: a framework of T witter threat intelligence mining and analysis based on a prompt-learning NER model. 3221-3238 - Zeguang Jia

, Jianming Wang, Rize Jin
:
GRNet: a graph reasoning network for enhanced multi-modal learning in scene text recognition. 3239-3250

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














