


default search action
The Computer Journal, Volume 67
Volume 67, Number 1, January 2024
- Marios C. Angelides
:
Thematic Editorial: Mostly Artificial Intelligence (AI) or Machine Learning (ML) Now in the Engine Room, in Pursuit of a Green Agenda. 1-2 - Mariem Gnouma
, Ridha Ejbali
, Mourad Zaied
:
Deep Hashing and Sparse Representation of Abnormal Events Detection. 3-17 - Ozgur Oksuz:
A System For Storing Anonymous Patient Healthcare Data Using Blockchain And Its Applications. 18-30 - He Li, Duo Jin, Xuejiao Li, Shaojie Qiao
:
A Dynamic Heterogeneous Graph Convolution Network For Traffic Flow Prediction. 31-44 - Tongfeng Li, Ruisheng Zhang
, Bojuan Niu, Yabing Yao, Jun Ma
, Jing Jiang, Zhili Zhao:
Link Prediction Based On Local Structure And Node Information Along Local Paths. 45-56 - Sayaka Kamei
, Sébastien Tixeuil
:
An Asynchronous Maximum Independent Set Algorithm By Myopic Luminous Robots On Grids. 57-77 - Zhuowei Wang, Hao Wang
, Xiaoyu Song, Jiahui Wu:
Communication-Aware Energy Consumption Model in Heterogeneous Computing Systems. 78-94 - James Walsh
, Oluwafunmilola Kesa, Andrew Wang
, Mihai Ilas
, Patrick O'Hara
, Oscar Giles, Neil Dhir
, Mark Girolami
, Theodoros Damoulas:
Near Real-Time Social Distance Estimation In London. 95-109 - Aissam Aouar
, Saïd Yahiaoui
, Lamia Sadeg, Nadia Nouali-Taboudjemat
, Kadda Beghdad Bey:
Distributed Partial Simulation for Graph Pattern Matching. 110-126 - Xiaoyang Liu
, Luyuan Gao
, Giacomo Fiumara
, Pasquale De Meo
:
Key Node Identification Method Integrating Information Transmission Probability and Path Diversity in Complex Network. 127-141 - Xiaoqing Liu
, Shuming Zhou, Jiafei Liu, Hong Zhang:
Reliability Analysis of the Cactus-Based Networks Based on Subsystem. 142-152 - Qin Luo
, Xin Cao:
PNCTS: A Prediction and Network Coding-Based Transmission Scheme for Efficient Screen Updates Delivery in DaaS. 153-168 - Vahid Amin Ghafari
, Mahmoud Ahmadian-Attari:
An Attack on a Proposed Construction of Small-State Stream Ciphers and Proposals for New Constructions. 169-178 - Xiwen Wang
, Kai Zhang
, Jinguo Li, Mi Wen, Shengmin Xu
, Jianting Ning
:
Non-interactive Boolean Searchable Asymmetric Encryption With Bilateral Access Control. 179-194 - Jiali Shi, Chao Li, Guoqiang Liu:
Differential Attack With Constants On μ2 Block Cipher. 195-209 - Yin Lv
, Danping Shi, Lei Hu
, Zihui Guo
, Yi Guo, Caibing Wang:
Improved Linear Cryptanalysis of Block Cipher BORON. 210-219 - Andrew Simpson
, Matthias Dellago, Daniel W. Woods
:
Formalizing Attack Trees To Support Economic Analysis. 220-235 - Xu Zhang
, Shunjie Wen
, Liang Yan, Jiangfan Feng, Ying Xia
:
A Hybrid-Convolution Spatial-Temporal Recurrent Network For Traffic Flow Prediction. 236-252 - Wenhan Ge
, Junfeng Wang:
SeqMask: Behavior Extraction Over Cyber Threat Intelligence Via Multi-Instance Learning. 253-273 - Chunning Zhou
, Wentao Zhang, Weiwei Cao:
A New Approach of Evaluating the Security Against Differential and Linear Cryptanalysis and Its Applications to Serpent, NOEKEON and ASCON. 274-291 - Lin Ding
, Zheng Wu, Guixian Zhang, Tairong Shi
:
Quantum Guess and Determine Attack on Stream Ciphers. 292-303 - K. Ashwini
:
User Name-Based Compression and Encryption of Images Using Chaotic Compressive Sensing Theory. 304-322 - Ke Wang
, Zhenfeng Zhang, Haodong Jiang, Huiqin Xie, Yanjun Li, Ying Sun, Lidong Han:
Key Reuse Attacks on Post-quantum Cryptosystems, Revisited. 323-337 - Mozamel M. Saeed
:
Designing Scenarios for In-Organization Training Using the CyberCIEGE Game. 338-346 - C. Shaji
, I. Shatheesh Sam:
Encoding with Combination Orientation Technique for RDH in Dual Stego Images. 347-361 - Liqing Qiu
, Yuying Liu
, Jianyi Zhang:
A New Method for Identifying Influential Spreaders in Complex Networks. 362-375 - Joon-Young Paik
, Rize Jin
:
Malware Family Prediction with an Awareness of Label Uncertainty. 376-390 - Nieves R. Brisaboa
, Travis Gagie
, Adrián Gómez-Brandón
, Gonzalo Navarro
:
Two-Dimensional Block Trees. 391-406
Volume 67, Number 2, February 2024
- Amal Abid
, Saoussen Cheikhrouhou
, Slim Kallel, Zahir Tari
, Mohamed Jmaiel
:
A Smart Contract-Based Access Control Framework For Smart Healthcare Systems. 407-422 - Zhu Yuan
, Xueqiang Lv, Ping Xie, Haojie Ge, Xindong You
:
CSEA: A Fine-Grained Framework of Climate-Season-Based Energy-Aware in Cloud Storage Systems. 423-436 - Francisco Javier Moreno Arboleda
, Georgia Garani
, Carlos Daniel Bolivar Zapata
:
Query Operators for Transactional Data: Detecting Similar and Periodic Transactions. 437-446 - Mengqi Liu
, Hang Gao
, Xiaofan Xia
, Suying Gui
, Tiegang Gao
:
Perceptual Image Hashing Based on Canny Operator and Tensor for Copy-Move Forgery Detection. 447-462 - Changan Liu, Changjun Fan, Zhongzhi Zhang:
Finding Influencers in Complex Networks: An Effective Deep Reinforcement Learning Approach. 463-473 - Yaoan Jin
, Atsuko Miyaji
:
Secure and Compact Elliptic Curve Scalar Multiplication with Optimized Inversion. 474-484 - Mingzhe Zhu
, Wanyue Xu, Wei Li, Zhongzhi Zhang, Haibin Kan
:
Hitting Times of Random Walks on Edge Corona Product Graphs. 485-497 - Yuliang Xue
, Yuhao Zhu, Zhiying Zhu
, Sheng Li, Zhenxing Qian, Xinpeng Zhang:
Removing Watermarks For Image Processing Networks Via Referenced Subspace Attention. 498-507 - Reza Ebrahim Pourian, Mehdi Fartash
, Javad Akbari Torkestani:
A Deep Learning Model for Energy-Aware Task Scheduling Algorithm Based on Learning Automata for Fog Computing. 508-518 - Marzieh Shamsizadeh
, Mohammad Mehdi Zahedi
, Khadijeh Abolpour:
Irreducible Fuzzy Multiset Finite Automaton. 519-526 - Heqin Liu, Dongqin Cheng
:
Structure Fault Tolerance of Exchanged Hypercube. 527-536 - Jinyu Lu
, Guoqiang Liu, Bing Sun, Chao Li, Li Liu
:
Improved (Related-Key) Differential-Based Neural Distinguishers for SIMON and SIMECK Block Ciphers. 537-547 - Yuxing Yang
:
Hyper-Hamiltonian Laceability of Cartesian Products of Cycles and Paths. 548-556 - Hireche Samia
, Dennai Abdeslem
, Boufeldja Kadri
:
Toward a Novel RESTFUL Big Data-Based Urban Traffic Incident Data Web Service for Connected Vehicles. 557-580 - Xuefeng Zhao:
Secure and Efficient Masking of Lightweight Ciphers in Software and Hardware. 581-603 - Yishu Xu, Peng Zhang
, Hongtao Yu, Fuzhi Zhang:
Detecting Group Shilling Attacks In Recommender Systems Based On User Multi-dimensional Features And Collusive Behaviour Analysis. 604-616 - Zhiwei Chen
, Lunzhi Deng
, Yu Ruan, Shuai Feng, Tao Wang, Bo Wang:
Certificateless Broadcast Encryption with Authorization Suitable for Storing Personal Health Records. 617-631 - Tu-Liang Lin
, Hong-Yi Chang
, Yuan-Yao Chiang
, Shu-Cheng Lin
, Tsung-Yen Yang
, Chun-Jun Zhuang
, Wha-Lee Tseng
, Bo-Hao Zhang
:
Ransomware Detection by Distinguishing API Call Sequences through LSTM and BERT Models. 632-641 - Tian Yang, Sha Ma, Jiaojiao Du, Chengyu Jiang, Qiong Huang:
Revocable Public Key Encryption with Equality Test without Pairing in Cloud Storage. 642-657 - Rahman Keramati Hatkeposhti
, Meisam Yadollahzadeh Tabari
, Mehdi GolsorkhtabariAmiri
:
Providing an Approach for Early Prediction of Fall in Human Activities Based on Wearable Sensor Data and the Use of Deep Learning Algorithms. 658-673 - Li Zhang, Yu Zhang
, Wenling Wu, Yongxia Mao, Yafei Zheng:
Explicit Upper Bound Of Impossible Differentials For AES-Like Ciphers: Application To uBlock And Midori. 674-687 - Zhecheng Yu, Liqiong Xu
:
Reliability Evaluation Of Multiprocessor System Based On The Balanced Complete Multipartite Graphs. 688-693 - Shumin Si
, Xiuhan Lin, Puwen Wei:
Compressed Zero-Knowledge Proofs for Lattice-Based Accumulator. 694-708 - Hong Zhang, Shuming Zhou, Eddie Cheng
:
The Cyclic Diagnosability Of Hypercubes Under The PMC Model And The MM* Model. 709-718 - Katharina Boudgoust
, Adeline Roux-Langlois:
Overfull: Too Large Aggregate Signatures Based on Lattices. 719-727 - Tzong-Jye Liu
:
Adversarial Attacks on Network Intrusion Detection Systems Using Flow Containers. 728-745 - Hongjin Zhang
, Hui Wei
, Wang Bo:
A New Fuzzy Smoothing Term Model For Stereo Matching. 746-761 - Senxing Lu, Mingming Zhao, Chunlin Li, Quanbing Du, Youlong Luo:
Time-Aware Data Partition Optimization and Heterogeneous Task Scheduling Strategies in Spark Clusters. 762-776 - Shijie Zhao, Pingshan Li:
On Conditional Edge-Fault-Tolerant Strong Menger Edge Connectivity Of Folded Hypercubes. 777-781 - Hala S. Ali
, R. Sridevi:
Mobility and Security Aware Real-Time Task Scheduling in Fog-Cloud Computing for IoT Devices: A Fuzzy-Logic Approach. 782-805 - Correction to: An Attack on a Proposed Construction of Small-State Stream Ciphers and Proposals for New Constructions. 806
- Correction to: Performance Evaluation of FPGA-Based LSTM Neural Networks for Pulse Signal Detection on Real-Time Radar Warning Receivers. 807
Volume 67, Number 3, 2024
- Yannis Manolopoulos:
Thematic Editorial: The Ubiquitous Network. 809-811 - Marek A. Suchenek:
Worst-Case Analysis of Heapsort, Exactly. 812-824 - Oguzhan Erdem, Tuncay Soylu, Aydin Carus
:
Pipelined Decision Trees for Online Traffic Classification on FPGAs. 825-839 - Ching-Fang Hsu
, Zhe Xia
, Tianshu Cheng
, Lein Harn:
Extremely Lightweight Constant-Round Membership-Authenticated Group Key Establishment for Resource-Constrained Smart Environments toward 5G. 840-850 - Shaohong Zhou, Junjiang He, Tao Li, Xiaolong Lan, Yunpeng Wang, Hui Zhao, Yihong Li:
Automating the Deployment of Cyber Range with OpenStack. 851-863 - Shixiong Yao, Pei Li
, Jing Chen, Yuexing Zeng, Jiageng Chen
, Donghui Wang:
CD-BCM:Cross-Domain Batch Certificates Management Based On Blockchain. 864-874 - Le He
, Hongbo Yu:
Cryptanalysis of Reduced-Round SipHash. 875-883 - Chung-Ming Huang
, Shu-Hang Huang
:
Traffic-Aware Re-Grouping for Load Balance in IEEE 802.11ah IoT Network Based on the Registered Backoff Time Mechanism. 884-898 - Bolin Wang, Wenling Wu, Yuhan Zhang
, Li Zhang:
New Integral Distinguishers On Permutation Of Whirlpool. 899-906 - Ya Liu, Yuanhang Wu, Fengyv Zhao, Yanli Ren:
Balanced Off-Chain Payment Channel Network Routing Strategy Based On Weight Calculation. 907-922 - Yang Yang, Wenhao Liu
, Guang Zeng:
A General Condition of Structural Distinguisher. 923-932 - Ricard Borges, Francesc Sebé
:
An e-Coin Based Construction for Unlinkable Priced Oblivious Transfer. 933-940 - Ravneet Kaur, Amrinderpreet Singh, Aekamjot Singh, Amit Goyal, Amritpal Singh, Shalini Batra:
An Efficient Pending Interest Table Content Search In NDN through Stable Bloom Filter. 941-946 - M. Veera Brahmam, S. Gopikrishnan
:
NODSTAC: Novel Outlier Detection Technique Based on Spatial, Temporal and Attribute Correlations on IoT Bigdata. 947-960 - Amir Tehrani, Meisam Yadollahzadeh Tabari
, Aidin Zehtab-Salmasi, Rasul Enayatifar:
Wearable Sensor-Based Human Activity Recognition System Employing Bi-LSTM Algorithm. 961-975 - Qingjun Yuan
, Yuefei Zhu, Gang Xiong, Yongjuan Wang, Wentao Yu, Bin Luo, Gaopeng Gou:
ULDC: Unsupervised Learning-Based Data Cleaning for Malicious Traffic With High Noise. 976-987 - Liqun Chen
, Nada El Kassem
, Christopher J. P. Newton
:
How To Bind A TPM's Attestation Keys With Its Endorsement Key. 988-1004 - Patrizio Angelini
, Giordano Da Lozzo
, Henry Förster
, Thomas Schneck:
2-Layer k-Planar Graphs Density, Crossing Lemma, Relationships And Pathwidth. 1005-1016 - Liang Zhang
, Haibin Kan
, Feiyang Qiu, Feng Hao
:
A Publicly Verifiable Optimistic Fair Exchange Protocol Using Decentralized CP-ABE. 1017-1029 - Dong Fang
, Guifang Huang
, Mengfan Wang
, Lei Hu
:
Decreasing Proof Size of BLS Scheme. 1030-1040 - Yue Li, Jianfang Qi, Haibin Jin, Dong Tian, Weisong Mu, Jianying Feng
:
An Improved Genetic-XGBoost Classifier for Customer Consumption Behavior Prediction. 1041-1059 - Yongcheng Song
, Jiang Zhang, Xinyi Huang, Wei Wu, Haixia Chen
:
Analysis and Construction of Zero-Knowledge Proofs for the MinRank Problem. 1060-1075 - Yilun Shang:
Resilient Vector Consensus Over Random Dynamic Networks Under Mobile Malicious Attacks. 1076-1086 - Jie Chen, Yinuo Luo
, Jun Liu
, Chao Wang, Yueyu Zhang, Xiaoli Dong:
A White-box Implementation of SM4 with Self-equivalence Encoding. 1087-1098 - Kashav Ajmera
, Tribhuwan Kumar Tewari
:
Dynamic Virtual Machine Scheduling Using Residual Optimum Power-Efficiency In The Cloud Data Center. 1099-1110 - Volkan Müjdat Tiryaki
, Nedim Tutkun:
Breast Cancer Mass Classification Using Machine Learning, Binary-Coded Genetic Algorithms and an Ensemble of Deep Transfer Learning. 1111-1125 - Praveen Kumar Ramtekkar, Anjana Pandey, Mahesh Kumar Pawar
:
A Comprehensive Review of Brain Tumour Detection Mechanisms. 1126-1152 - Zongyang Zhang, Lingyue Zhang, Zhuo Wang, Yichen Li, Rongxing Lu, Yong Yu
:
Chronos: An Efficient Asynchronous Byzantine Ordered Consensus. 1153-1162 - Lidong Xu, Mingqiang Wang, Jing Qin:
Quantum Bit Commitment Without Quantum Memory. 1163-1170 - Meilian Lu, Meng Li:
A Multiple QoS Metrics-Aware Virtual Network Embedding Algorithm. 1171-1186 - Ashutosh Kumar
, Aakanksha Sharaff
:
SnorkelPlus: A Novel Approach for Identifying Relationships Among Biomedical Entities Within Abstracts. 1187-1200 - Jin Huo, Weihua Yang:
Pancyclic And Hamiltonian Properties Of Dragonfly Networks. 1201-1208 - Correction to: Perceptual Image Hashing Based on Canny Operator and Tensor for Copy-Move Forgery Detection. 1209
- Correction to: Hitting Times of Random Walks on Edge Corona Product Graphs. 1210
Volume 67, Number 4, 2024
- Timóteo Gomes, Fernanda M. R. Alencar:
An Ontology as Support for Specification of Non-functional Requirements of AAL Systems Considering Compliance Aspects. 1211-1225 - Jan Strappa, Facundo Bromberg:
Efficient Comparison Of Independence Structures Of Log-Linear Models. 1226-1252 - Xin Wang
, Li Lin, Yao Wang:
Stealth Address Schemes With Fast Retrievability Based On Subgroup Membership Assumptions Related To Factoring. 1253-1264 - Handong Cui
, Kwan Yin Chan
, Tsz Hon Yuen
, Xin Kang
, Cheng-Kang Chu
:
Bandwidth-Efficient Zero-Knowledge Proofs For Threshold ECDSA. 1265-1278 - Ching-Kuo Hsu:
A Genetic Algorithm Based Scheduling Method With Carrier Aggregation In 5G Networks. 1279-1285 - Erana Veerappa Dinesh Subramaniam
, Valarmathi Krishnasamy
:
Hybrid Optimal Ensemble SVM Forest Classifier for Task Offloading in Mobile Cloud Computing. 1286-1297 - Jiaomei Zhang
, Ayong Ye, Jianwei Chen, Yuexin Zhang, Wenjie Yang
:
CSFL: Cooperative Security Aware Federated Learning Model Using The Blockchain. 1298-1308 - Zhonghao Zhai
, Subin Shen, Yan-qin Mao:
A Toolbox for Migrating the Blockchain-Based Application From Ethereum to Hyperledger Fabric. 1309-1323 - Juan Manuel Castelo Gómez
, Javier Carrillo Mondéjar
, José Roldán Gómez
, José Luis Martínez
:
A Concept Forensic Methodology For The Investigation Of IoT Cyberincidents. 1324-1345 - Weiwei Yang
, Shangsong Liang
, Jian Yin:
Spatial-Aware Multi-Directional Autoencoder For Pre-Training. 1346-1360 - Runze Yang
, Baoqi Huang
, Zhendong Xu, Bing Jia, Gang Xu:
Towards Accurate Smartphone Localization Using CSI Measurements. 1361-1369 - Shuai Liu, Jizhou Ren
, Jie Guan, Bin Hu, Sudong Ma
, Hao Bai
:
A Break Of Barrier To Classical Differential Fault Attack On The Nonce-Based Authenticated Encryption Algorithm. 1370-1380 - Harold Thimbleby
:
Improving Science That Uses Code. 1381-1404 - Lingyun Li
, Xianhui Lu
, Kunpeng Wang
:
eBiBa: A Post-Quantum Hash-Based Signature With Small Signature Size in the Continuous Communication of Large-Scale Data. 1405-1424 - Yaofang Zhang, Peixuan Li, Ping Xie:
A Hybrid Scheme Combining Duplications and LDPC Decoding to Reduce NAND Flash. 1425-1437 - Paul Lou, Amit Sahai, Varun Sivashankar
:
Relinearization Attack On LPN Over Large Fields. 1438-1442 - Qingyuan Yu
, Lingyue Qin, Xiaoyang Dong, Keting Jia:
Improved Related-Key Rectangle Attacks On GIFT. 1443-1456 - Chang Shu, Yan Wang, Jianxi Fan, Guijuan Wang:
Super Structure Fault-Tolerance Assessment of the Generalized Hypercube. 1457-1466 - Dongchao Ma, Dongmei Wang, Xiaofu Huang, Yuekun Hu, Li Ma:
KEFSAR: A Solar-Aware Routing Strategy For Rechargeable IoT Based On High-Accuracy Prediction. 1467-1482 - Shiqi Hou, Baofeng Wu
, Shichang Wang, Hao Guo, Dongdai Lin:
Truncated Differential Attacks On Symmetric Primitives With Linear Key Schedule: WARP And Orthros. 1483-1500 - Shuang Zhao, Shuhui Chen
, Fei Wang, Ziling Wei, Jincheng Zhong, Jianbing Liang:
A Large-Scale Mobile Traffic Dataset For Mobile Application Identification. 1501-1513 - Daniel Lemire:
Exact Short Products From Truncated Multipliers. 1514-1520 - Zhaoliang Lin
, Jinguo Li:
FedEVCP: Federated Learning-Based Anomalies Detection for Electric Vehicle Charging Pile. 1521-1530 - Amalan Joseph Antony
, Kunwar Singh:
A Blockchain-Based Public Key Infrastructure For IoT-Based Healthcare Systems. 1531-1537 - Tongshuai Wu
, Liwei Chen, Gewangzi Du, Chenguang Zhu
, Ningning Cui, Gang Shi:
CDNM: Clustering-Based Data Normalization Method For Automated Vulnerability Detection. 1538-1549 - Dinghua Zhang, Shihao Wu
, Yang Li
, Quan Pan:
An Evaluation On The Entropy Supplying Capability Of Smartphone Sensors. 1550-1563 - Junying Yuan
, Huicheng Zheng
, Jiangqun Ni
:
Reversible Data Hiding With Pattern Adaptive Prediction. 1564-1571 - Nazatul Haque Sultan
, Vijay Varadharajan
, Saurab Dulal
, Seyit Camtepe
, Surya Nepal
:
NDN-RBE: An Accountable Privacy Aware Access Control Framework For NDN. 1572-1589 - Mabin Joseph
, Gautham Sekar, R. Balasubramanian:
Revisiting the Software-Efficient Stream Ciphers RCR-64 and RCR-32. 1590-1602 - Correction to: Metaheuristic-Enabled Artificial Neural Network Framework For Multimodal Biometric Recognition With Local Fusion Visual Features. 1603
- Correction to: A Semantic Embedding Enhanced Topic Model For User-Generated Textual Content Modeling In Social Ecosystems. 1604
Volume 67, Number 5, 2024
- Fairouz Kamareddine
:
Thematic Editorial, It Is Hard To Imagine A World Without Algorithms and Data Science. 1605-1606 - Hanwen Zhang, Li-e Wang, Zhigang Sun, Xianxian Li:
Knowledge-Aware Dual-Channel Graph Neural Networks For Denoising Recommendation. 1607-1618 - Dong Dong, Hongxu Jiang, Boyu Diao
:
AKGF: Automatic Kernel Generation for DNN on CPU-FPGA. 1619-1627 - Nankai Lin, Xiaotian Lin, Yingwen Fu, Shengyi Jiang
, Lianxi Wang
:
A Chinese Grammatical Error Correction Model Based On Grammatical Generalization And Parameter Sharing. 1628-1636 - Syed Irteza Hussain Jafri
, Rozaida Ghazali
, Irfan Javid
, Yana Mazwin Mohmad Hassim, Mubashir Hayat Khan
:
A Hybrid Solution For The Cold Start Problem In Recommendation. 1637-1644 - Zhixiong Xu
, Wei Zhang, Ailin Li, Feifei Zhao, Yuanyuan Jing, Zheng Wan, Lei Cao
, Xiliang Chen
:
Online Optimization Method of Learning Process for Meta-Learning. 1645-1651 - Daoqiang Sun
, Hongbo Liu
, Yu Yang
, Long Li
, Heng Zhang
, Asfand Fahad:
Enumeration Of Subtrees Of Two Families Of Self-Similar Networks Based On Novel Two-Forest Dual Transformations. 1652-1662 - Jiqiang Lu
, Jingyu Li
, Zexuan Chen, Yanan Li
:
Cryptanalysis Of A Type Of White-Box Implementations Of The SM4 Block Cipher. 1663-1673 - Jiale Huang, Jigang Wu, Long Chen
, Yalan Wu
, Yidong Li:
Coalitional Double Auction For Ridesharing With Desired Benefit And QoE Constraints. 1674-1686 - Ali Marandi
, Pedro Geraldo M. R. Alves, Diego F. Aranha
, Rune Hylsberg Jacobsen:
Lattice-Based Homomorphic Encryption For Privacy-Preserving Smart Meter Data Analytics. 1687-1698 - Xin Yuan, Ning Li
, Xiaobo Gong, Changli Yu, Xiaoteng Zhou, José-Fernán Martínez-Ortega:
Underwater Wireless Sensor Network-Based Delaunay Triangulation (UWSN-DT) Algorithm for Sonar Map Fusion. 1699-1709 - Yun Zhang
, Yuling Liu, Ge Cheng
, Jie Wang:
Similarity Regression Of Functions In Different Compiled Forms With Neural Attentions On Dual Control-Flow Graphs. 1710-1718 - Jia-Jie Liu
:
The Orbits of Folded Crossed Cubes. 1719-1726 - Nan Xiang
, Xiao Tang, Huiling Liu, Xiaoxia Ma
:
Identifying and Ranking Influential Spreaders in Complex Networks by Localized Decreasing Gravity Model. 1727-1746 - Qiang Zhang, Junjiang He
, Tao Li, Xiaolong Lan, Wenbo Fang, Yihong Li
:
SPAW-SMOTE: Space Partitioning Adaptive Weighted Synthetic Minority Oversampling Technique For Imbalanced Data Set Learning. 1747-1762 - Veerawali Behal, Ramandeep Singh
:
An Intelligent Air Monitoring System For Pollution Prediction: A Predictive Healthcare Perspective. 1763-1782 - Nan Zhong
, Zhenxing Qian
, Xinpeng Zhang:
Sparse Backdoor Attack Against Neural Networks. 1783-1793 - Abhinav Chakraborty, Subhash Bhagat
, Krishnendu Mukhopadhyaya
:
Gathering Over Heterogeneous Meeting Nodes. 1794-1813 - Yangguang Tian
, Yingjiu Li, Robert H. Deng
, Guomin Yang, Nan Li:
Policy-Based Remote User Authentication From Multi-Biometrics. 1814-1825 - Chenghao Li
, Xinyan Yang, Gang Liang
:
Keyframe-guided Video Swin Transformer with Multi-path Excitation for Violence Detection. 1826-1837 - Amirfarhad Farhadi
, Arash Sharifi:
Leveraging Meta-Learning To Improve Unsupervised Domain Adaptation. 1838-1850 - Dingyu Shou
, Chao Li
, Zhen Wang
, Song Cheng, Xiaobo Hu, Kai Zhang
, Mi Wen, Yong Wang
:
An Intrusion Detection Method Based on Attention Mechanism to Improve CNN-BiLSTM Model. 1851-1865 - Jan A. Bergstra
, John V. Tucker:
Eager Term Rewriting For The Fracterm Calculus Of Common Meadows. 1866-1871 - Hunar Abubakir Ahmed
, Jafar Majidpour, Mohammed Hussein Ahmed, Samer Kais Jameel, Amir Majidpour
:
Enhancing Auditory Brainstem Response Classification Based On Vision Transformer. 1872-1878 - Le Feng, Zhenxing Qian
, Xinpeng Zhang, Sheng Li:
Stealthy Backdoor Attacks On Deep Point Cloud Recognization Networks. 1879-1891 - Chiheng Wang
, Shibin Zhao
, Jianshan Peng
, Junhu Zhu
:
KVFL: Key-Value-Based Persistent Fuzzing for IoT Web Servers. 1892-1909 - Xintong Xu, Run Cui, Chanying Huang
, Kedong Yan
:
Anonymization of face images with Contrastive Learning. 1910-1919 - Hadeel Alhosaini
, Sultan Alharbi
, Xianzhi Wang
, Guandong Xu
:
API Recommendation For Mashup Creation: A Comprehensive Survey. 1920-1940 - Zhenhua Chen, Ting Li, Junrui Xie, Ni Li, Jingjing Nie:
Kth min Threshold Encryption for Privacy-preserving Data Evaluation. 1941-1950 - Jinguang Han
, Willy Susilo
, Liquan Chen, Jianchang Lai, Ge Wu
:
Privacy-Preserving Confidential Reporting System With Designated Reporters. 1951-1962 - Shuodi Zu, Xiangyang Luo, Liang Wang
, Fan Zhang:
GUI: A Geolocation Method for Unreachable IP. 1963-1978 - Fucai Zhou, Zongye Zhang, Ruiwei Hou:
Privacy-Preserving Image Retrieval with Multi-Modal Query. 1979-1992 - Correction to: Automatic Diagnosis of Diabetic Retinopathy from Retinal Abnormalities: Improved Jaya-Based Feature Selection and Recurrent Neural Network. 2007
Volume 67, Number 6, 2024
- Zhicheng Yao
, Sa Wang, Jinbin Zhu
, Yungang Bao:
Panoptic Segmentation with Convex Object Representation. 2009-2019 - Chavdar Dangalchev
:
Closeness Centralities of Lollipop Graphs. 2020-2029 - Yihong Wang
, Baolei Cheng
, Yan Wang, Jia Yu
, Jianxi Fan:
Strongly Menger Connectedness of a Class of Recursive Networks. 2030-2038 - Changsheng Hou, Chunbo Jia, Bingnan Hou
, Tongqing Zhou, Yingwen Chen
, Zhiping Cai
:
A Sketch Framework for Fast, Accurate and Fine-Grained Analysis of Application Traffic. 2039-2053 - Weidong Zhao, Xiaotong Liu
:
Detection of E-Commerce Fraud Review via Self-Paced Graph Contrast Learning. 2054-2065 - Ana Cavalcanti
, Madiel Conserva Filho
, Pedro Ribeiro
, Augusto Sampaio
:
Laws of Timed State Machines. 2066-2107 - Muhammad Omer Farooq
:
WiPoTS: An Application Layer Protocol With Network Protocol Stack Enhancements For Wireless Power Transfer Networks. 2108-2117 - Huanshen Jia, Jianguo Qian
:
Menger-Type Connectivity of Line Graphs of Generalized Hypercubes With Faulty Edges. 2118-2125 - Jaffar Atwan
, Nedaa Almansour, Mohammad Hashem Ryalat
, Shahnorbanun Sahran
, Hamza Aldabbas
, Dheeb Albashish:
Ensemble of Deep Features for Breast Cancer Histopathological Image Classification. 2126-2136 - Ping Wang
, Ruisheng Zhang
:
Influence Maximization in Social Networks Using an Improved Multi-Objective Particle Swarm Optimization. 2137-2150 - Irene Finocchi
, Renan Leon Garcia, Blerina Sinaimeri
:
From Stars to Diamonds: Counting and Listing Almost Complete Subgraphs in Large Networks. 2151-2161 - Mengzhu Yu
, Zhenjun Tang
, Hanyun Zhang, Xiaoping Liang, Xianquan Zhang
:
Video Hashing with Tensor Robust PCA and Histogram of Optical Flow for Copy Detection. 2162-2171 - Xueshi Dong, Qing Lin, Wei Wang:
Hybrid ITÖ Algorithm for Maximum Scatter Colored Traveling Salesman Problem. 2172-2188 - Yeim-Kuan Chang
, Hsin-Mao Chen
:
Partitioned 2D Set-Pruning Segment Trees with Compressed Buckets for Multi-Dimensional Packet Classification. 2189-2207 - Kang Liu, Yang Lu, Shiyi Tan, Wei Liang, Huiping Sun, Zhong Chen:
CFAuditChain: Audit BlockChain Based On Cuckoo Filter. 2208-2218 - Xiuyuan Chen
, Chao Lin
, Wei Wu, Debiao He
:
A General Blockchain-Based Automatic Audit Scheme For Proofs Of Retrievability. 2219-2229 - Yu Lei
, Keshuai Qu
, Yifan Zhao, Qing Han, Xuguang Wang:
Multimodal Sentiment Analysis Based on Composite Hierarchical Fusion. 2230-2245 - Hairong Jia
, Suying Wang
, Zelong Ren
:
CNN-LSTM Base Station Traffic Prediction Based On Dual Attention Mechanism and Timing Application. 2246-2256 - Kürsat Mustafa Karaoglan
, Oguz Findik
:
Enhancing Aspect Category Detection Through Hybridised Contextualised Neural Language Models: A Case Study In Multi-Label Text Classification. 2257-2269 - Sandhya, Abhishek Kashyap:
A Light Weight Depthwise Separable Layer Optimized CNN Architecture for Object-Based Forgery Detection in Surveillance Videos. 2270-2285 - Leyou Xu
, Chengli Li, Bo Zhou
:
Link Residual Closeness of Graphs with Fixed Parameters. 2286-2302 - Qiang Xu
, Dongmei Xu, Hao Wang, Jianye Yuan
, Zhe Wang
:
Color Patterns And Enhanced Texture Learning For Detecting Computer-Generated Images. 2303-2316 - Faten Louati
, Farah Barika Ktata
, Ikram Amous
:
An Intelligent Security System Using Enhanced Anomaly-Based Detection Scheme. 2317-2330 - Qiang Zhou, Liangmin Wang, Huijuan Zhu, Tong Lu, Heping Song
:
Joint Alignment Networks For Few-Shot Website Fingerprinting Attack. 2331-2345 - Yi Zhong, Zihan Teng
, Mengjun Tong:
LiteMixer: Cauliflower Disease Diagnosis based on a Novel Lightweight Neural Network. 2346-2356 - Zhongjun Yang
, Qing Huang, Qi Wang
, Xuejun Zong, Ran Ao:
Visual Intrusion Detection Based On CBAM-Capsule Networks. 2357-2367 - Xianyun Mei
, Liangliang Wang
, Baodong Qin, Kai Zhang
, Yu Long:
EFTA: An Efficient and Fault-Tolerant Data Aggregation Scheme without TTP in Smart Grid. 2368-2378 - Xiaoyang Liu
, Nan Ding
, Yudie Wu
, Giacomo Fiumara
, Pasquale De Meo
:
Discrete-Time Quantum Walks Community Detection in Multi-Domain Networks. 2379-2389 - Yuyuan Xiang, Hongxia Wang, Ling Yang, Mingze He
, Fei Zhang
:
SEDD: Robust Blind Image Watermarking With Single Encoder And Dual Decoders. 2390-2402
Volume 67, Number 7, 2024
- Yannis Manolopoulos:
Thematic editorial: sentiment analysis. 2403-2407 - Dawei Ren
, Lingwei Meng, Rui Wang:
Borehole Depth Recognition Based on Improved YOLOX Detection. 2408-2420 - Armando Castañeda
, Hans van Ditmarsch, David A. Rosenblueth, Diego A. Velázquez
:
Pattern Models: A Dynamic Epistemic Logic For Distributed Systems. 2421-2440 - Zhiyuan Gao, Jinguo Li, Liangliang Wang
, Yin He
, Peichun Yuan
:
CM-UTC: A Cost-sensitive Matrix based Method for Unknown Encrypted Traffic Classification. 2441-2452 - Rohit Beniwal
, Pavi Saraswat
:
A Hybrid BERT-CNN Approach for Depression Detection on Social Media Using Multimodal Data. 2453-2472 - Guofeng Yan, Zhengwen Su, Hengliang Tan, Jiao Du:
Service Function Placement Optimization For Cloud Service With End-to-End Delay Constraints. 2473-2485 - Chuancheng Wei, Gang Liang, Kexiang Yan:
BotGSL: Twitter Bot Detection with Graph Structure Learning. 2486-2497 - Naila Hamid
, Nazar Khan
, Arbish Akram
:
ELSM: Evidence-Based Line Segment Merging. 2498-2514 - Yujuan Zou
, Zhijian Wang, Pengfei Xu, Taizhi Lv
:
An Improved Density Peaks Clustering Algorithm Based On Density Ratio. 2515-2528 - Sugandh Seth
, Kuljit Kaur Chahal
, Gurvinder Singh
:
Concept Drift-Based Intrusion Detection For Evolving Data Stream Classification In IDS: Approaches And Comparative Study. 2529-2547 - Soran Badawi
:
Deep Learning-Based Cyberbullying Detection in Kurdish Language. 2548-2558
Volume 67, Number 8, 2024
- Lina Zhu
, Zuochang Zhang
:
Software Failure Prediction Based On Program State and First-Error Characteristics. 2559-2572 - Xi Zhang, Ye Su
, Jing Qin
, Jiameng Sun:
SDTA: Secure Decentralized Trading Alliance for Electronic Medical Data. 2573-2585 - Kaiwen Guo, Kexin Hu, Zhenfeng Zhang:
Liveness Attacks On HotStuff: The Vulnerability Of Timer Doubling Mechanism. 2586-2600 - Arati Kushwaha, Manish Khare, Reddy Mounika Bommisetty, Ashish Khare
:
Human Activity Recognition Based On Video Summarization And Deep Convolutional Neural Network. 2601-2609 - Xiaoyang Liu, Xiaoyang Fu, Pasquale De Meo
, Giacomo Fiumara
:
Cross-Domain Recommendation To Cold-Start Users Via Categorized Preference Transfer. 2610-2621 - Yunchao Gong, Xueqiang Lv, Zhu Yuan
, Xindong You
, Feng Hu, Yuzhong Chen:
GNN-Based Multimodal Named Entity Recognition. 2622-2632 - Hemakasiny Visuwalingam
, Ratnasingam Sakuntharaj
, Janaka Alawatugoda
, Roshan G. Ragel
:
Deep Learning Model for Tamil Part-of-Speech Tagging. 2633-2642 - J. Ayuso Perez
:
Hardware Addition Over Finite Fields Based On Booth-Karatsuba Algorithm. 2643-2666 - Shuangquan Chen, Jinguo Li, Kai Zhang
, Aoran Di, Mengli Lu:
Privacy-Preserving Breast Cancer Prediction Based on Logistic Regression. 2667-2676 - Youness Manzali
, Yassine Akhiat
, Khalidou Abdoulaye Barry, Elyazid Akachar
, Mohamed El Far
:
Prediction of Student Performance Using Random Forest Combined With Naïve Bayes. 2677-2689 - Yifan Xu, Liangmin Wang, Jie Chen
, Qiang Zhou:
Tor Trace in Images: A Novel Multi-Tab Website Fingerprinting Attack With Object Detection. 2690-2701 - Jeremy Booher
, Ross Bowden
, Javad Doliskani
, Tako Boris Fouotsa
, Steven D. Galbraith
, Sabrina Kunzweiler
, Simon-Philipp Merz
, Christophe Petit
, Benjamin Smith, Katherine E. Stange
, Yan Bo Ti, Christelle Vincent, José Felipe Voloch, Charlotte Weitkämper, Lukas Zobernig:
Failing to Hash Into Supersingular Isogeny Graphs. 2702-2719
Volume 67, Number 9, 2024
- Antonio Fernández Anta
:
Thematic editorial: edge computing, fog computing, and internet of things. 2721-2724 - Weihua Liu, Bing Gong, Kai Che, Jieming Ma
, Yushan Pan:
Anomaly Metrics on Class Variations For Face Anti-Spoofing. 2725-2738 - Songshou Dong
, Yanqing Yao, Yihua Zhou, Yuguang Yang
:
A Certificateless Linearly Homomorphic Signature Scheme Based on Lattice for Network Coding. 2739-2748 - Chenguang Zhu
, Renzheng Wei, Liwei Chen, Tongshuai Wu
, Gewangzi Du, Gang Shi:
Vulnerability Localization Based On Intermediate Code Representation and Feature Fusion. 2749-2762 - Luong The Dung, Nguyen Ngoc Toan, Tran Nghi Phu
:
CAIMP: Cross-Architecture IoT Malware Detection and Prediction Based On Static Feature. 2763-2776 - Hao Feng
, Jiong Wu, Lin Chen
:
Intermittent Fault Diagnosis Of Product Network Based On PMC Model. 2777-2786 - Hongjuan Yang, Gang Tian, Chengrui Xu, Rui Wang:
Algorithms For Cold-Start Game Recommendation Based On GNN Pre-training Model. 2787-2798 - Fatemeh Taheri
, Kambiz Rahbar
:
Coverless Image Steganography Using Content-Based Image Patch Retrieval. 2799-2808 - Shurui Wang, Yuhe Zhang
, Ruizhe Guo, Yaning Zhang, Yifei Xie
, Xinyu Zhou
:
2L-LSH: A Locality-Sensitive Hash Function-Based Method For Rapid Point Cloud Indexing. 2809-2818 - Zhen Yan
, Haipeng Qu
, Xi Jun Lin:
On The Security Of A Novel Construction Of Certificateless Aggregate Signature Scheme For Healthcare Wireless Medical Sensor Networks. 2819-2822 - Zhuojie Huang
, Shuping Zhao, Zien Liang, Jigang Wu:
Discriminative Subspace Learning With Adaptive Graph Regularization. 2823-2837 - Fang Tang, Nengsheng Du, Zhengwei Zhong, Chunlin Li, Youlong Luo
:
An improved sensing data cleaning scheme for object localization in edge computing environment. 2838-2853 - Haizhen Wang
, Zhiqing Cui
, Zuozheng Lian
, Jinying Yan
:
An improved DNN model for WLAN intrusion detection. 2854-2863 - Marwa Khan, Asma Naseer, Aamir Wali, Maria Tamoor:
A Roman Urdu Corpus for sentiment analysis. 2864-2876
Volume 67, Number 10, 2024
- Xiaolei Zhang
, Zhaoyu Chen, Xin Zhang, Qingni Shen
, Zhonghai Wu
:
IPOD2: an irrecoverable and verifiable deletion scheme for outsourced data. 2877-2889 - Mengjie Lv, Weibei Fan, Hui Dong, Guijuan Wang
:
Fault tolerance of hierarchical cubic networks based on cluster fault pattern. 2890-2897 - Sheikh Azizul Hakim
, Rahnuma Islam Nishat, Md. Saidur Rahman
:
Approximation algorithms for maximum weighted internal spanning trees in regular graphs and subdivisions of graphs. 2898-2905 - Peng Zhang
, Zhendong Niu, Ru Ma
, Fuzhi Zhang:
DHCL-BR: Dual Hypergraph Contrastive Learning for Bundle Recommendation. 2906-2919 - Junfeng Tian
, Qi Zhu
, Jiawei Shen
, Tengfei Xu
:
TPRT: a trajectory publishing scheme for the Internet of Vehicles based on radix tree. 2920-2933 - Mehmet Burukanli
, Nejat Yumusak
:
COVID-19 virus mutation prediction with LSTM and attention mechanisms. 2934-2944 - Ameen Al-Azzawi
, Gábor Lencse
:
Security analysis of the MAP-T IPv6 transition technology. 2945-2958 - Keao Lin, Xiaozhu Xie, Wei Weng
, Xiaofeng Du:
Global-local graph attention: unifying global and local attention for node classification. 2959-2969 - Han Qi
, Jingtong Wang
, Yufan Cui:
VQCNN: variational quantum convolutional neural networks based on quantum filters and fully connected layers. 2970-2983 - Luiz Fernando Afra Brito, Marcelo Keese Albertini
, Bruno Augusto Nassif Travençolo
, Gonzalo Navarro
:
Dynamic compact data structure for temporal reachability with unsorted contact insertions. 2984-2994 - Changsheng Hou, Bingnan Hou
, Xionglve Li
, Tongqing Zhou, Yingwen Chen
, Zhiping Cai
:
DRL-Tomo: a deep reinforcement learning-based approach to augmented data generation for network tomography. 2995-3008 - Junhao Zeng, Gang Liang, Yixin Ma, Xinyan Yang, Cheng Chen:
Pornographic video detection based on semantic and image enhancement. 3009-3019 - Abdulatif Ahmed Ali Aboluhom, Ismet Kandilli
:
Face recognition using deep learning on Raspberry Pi. 3020-3030
Volume 67, Number 11, 2024
- K. Nalini Sujantha Bel, I. Shatheesh Sam:
Image retrieval based on auto-encoder and clustering with centroid update. 3031-3041 - Kevisino Khate
, Bam Bahadur Sinha
, Arambam Neelima:
Flower pollination-enhanced CNN for lung disease diagnosis. 3080-3093 - Yifan Yang, Xionglve Li
, Tao Yang
, Bingnan Hou
, Lingbin Zeng
, Zhiping Cai
, Wenyuan Kuang:
DGA domain embedding with deep metric learning. 3094-3104 - Xiaolong Shi
, Anjun Song:
Defog YOLO for road object detection in foggy weather. 3115-3127
Volume 67, Number 12, 2024
- Xin Yang, Peng Zeng, Kim-Kwang Raymond Choo, Chengju Li, Yanzhao Yang:
CoinFA: an efficient coin mixing scheme with flexible amounts. 3141-3150 - Huawei Xie, Jing Liu, Na Li:
Supervisor synthesis for opacity enforcement in partially observed discrete event systems. 3151-3159 - Siftee Ratra, Mohona Ghosh
, Niyati Baliyan
, Jinka Rashmitha Mohan, Sanjana Singh:
Graph neural network based phishing account detection in Ethereum. 3160-3168 - Wenfa Qi, Cheng Li
, Xinhui Han:
Research on blind reversible database watermarking algorithm based on dual embedding strategy. 3169-3179 - Wenjun Qian, Qingni Shen
, Xiaoyi Chen
, Cong Li
, Yuejian Fang, Zhonghai Wu
:
FDP-FL: differentially private federated learning with flexible privacy budget allocation. 3180-3195 - Zihang Zhang
, Yuling Liu, Zhili Zhou
, Gaobo Yang
, Q. M. Jonathan Wu:
Efficient object detector via dynamic prior and dynamic feature fusion. 3196-3206 - Xiaojun Zhao, Shudan Xue, Qingying Deng
, Pingshan Li:
Structure connectivity and substructure connectivity of Möbius cubes. 3207-3220 - Yizhe You, Zhengwei Jiang
, Peian Yang, Jun Jiang, Kai Zhang
, Xuren Wang, Chenpeng Tu
, Huamin Feng
:
P-TIMA: a framework of T witter threat intelligence mining and analysis based on a prompt-learning NER model. 3221-3238 - Zeguang Jia
, Jianming Wang, Rize Jin
:
GRNet: a graph reasoning network for enhanced multi-modal learning in scene text recognition. 3239-3250

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.