


default search action
The Computer Journal, Volume 66
Volume 66, Number 1, January 2023
- Nagaraj Honnikoll

, Ishwar Baidari:
Mean Error Rate Weighted Online Boosting Method. 1-15 - Saihua Cai

, Jinfu Chen, Haibo Chen, Chi Zhang, Qian Li, Dengzhou Shi, Wei Lin:
Minimal Rare Pattern-Based Outlier Detection Approach For Uncertain Data Streams Under Monotonic Constraints. 16-34 - Sana Khanam

, Safdar Tanweer, Syed Sibtain Khalid
:
Youtube Trending Videos: Boosting Machine Learning Results Using Exploratory Data Analysis. 35-46 - Alonso Tenorio-Trigoso

, Manuel Castillo-Cara
, Giovanny Mondragón-Ruiz
, Carmen Carrión
, María Blanca Caminero
:
An Analysis of Computational Resources of Event-Driven Streaming Data Flow for Internet of Things: A Case Study. 47-60 - Jafar Majidpour, Samer Kais Jameel

, Jihad Anwar Qadir:
Face Identification System Based on Synthesizing Realistic Image using Edge-Aided GANs. 61-69 - Niharika Gupta, Baij Nath Kaushik:

Prognosis and Prediction of Breast Cancer Using Machine Learning and Ensemble-Based Training Model. 70-85 - Surbhi Gupta

, Manoj Kumar Gupta:
Computational Model for Prediction of Malignant Mesothelioma Diagnosis. 86-100 - Parsi Kalpana:

Chronological Sailfish Optimizer for Preserving Privacy in Cloud Based on Khatri-Rao Product. 101-113 - Qiaohong Hao, Qi Zhao, Mateu Sbert, Qinghe Feng, Cosmin Ancuti, Miquel Feixas, Màrius Vila

, Jiawan Zhang:
Information-Theoretic Channel for Multi-exposure Image Fusion. 114-127 - Mohammad Nabipour, Amir Reza Momen

:
A Novel Approach to Adaptive Resource Allocation for Energy Saving in Reconfigurable Heterogeneous Networks. 128-143 - Ankush Manocha, Gulshan Kumar, Munish Bhatia:

IoT Analytics-inspired Real-time Monitoring for Early Prediction of COVID-19 Symptoms. 144-159 - Xiaodan Li, Wenling Wu:

Constructing Binary Matrices with Good Implementation Properties for Low-Latency Block Ciphers based on Lai-Massey Structure. 160-173 - Qing Wang, Xi Zhang, Jing Qin, Jixin Ma, Xinyi Huang:

A Verifiable Symmetric Searchable Encryption Scheme Based on the AVL Tree. 174-183 - Jinlu Liu, Bo Zhao, Jing Qin, Xi Zhang, Jixin Ma:

Multi-Keyword Ranked Searchable Encryption with the Wildcard Keyword for Data Sharing in Cloud Computing. 184-196 - Wenju Xu, Baocang Wang, Yupu Hu, Pu Duan, Benyu Zhang, Momeng Liu:

Multi-key Fully Homomorphic Encryption from Additive Homomorphism. 197-207 - Chingfang Hsu

, Lein Harn, Zhe Xia, Jianqun Cui, Jingxue Chen:
Construction of Lightweight Authenticated Joint Arithmetic Computation for 5G IoT Networks. 208-220 - Yulong Wei, Ronghua Li, Weihua Yang:

Hybrid Fault Diagnosis Capability Analysis of Highly Connected Graphs. 221-228 - Mohammad Jalilvand Aghdam Bonab, Ramin Shaghaghi Kandovan:

Effective Resource Allocation and Load Balancing in Hierarchical HetNets: Toward QoS-Aware Multi-Access Edge Computing. 229-244 - Ramachandro Majji, R. Rajeswari, Ch. Vidyadhari, Cristin Rajan:

Squirrel Search Deer Hunting-Based Deep Recurrent Neural Network for Survival Prediction Using PAN-Cancer Gene Expression Data. 245-266 - Muthumanikandan Vanamoorthy, Valliyammai Chinnaiah:

Corrigendum to: Congestion Free Transient Plane(CFTP) using bandwidth sharing during link failures in SDN. 267
Volume 66, Number 2, February 2023
- Wenqin Cao, Wentao Zhang, Xuefeng Zhao:

The Key-Dependent Capacity in Multidimensional Linear Cryptanalysis. 269-279 - Penta Anil Kumar, R. Gunasundari

, R. Aarthi:
Fractional Sailfish Optimizer with Deep Convolution Neural Network for Compressive Sensing Based Magnetic Resonance Image Reconstruction. 280-294 - Cinzia Bernardeschi, Andrea Domenici

, Adriano Fagiolini, Maurizio Palmieri
:
Co-simulation and Formal Verification of Co-operative Drone Control With Logic-Based Specifications. 295-317 - Kailun Yan

, Jilian Zhang, Yongdong Wu:
Improving Bitcoin Transaction Propagation Efficiency through Local Clique Network. 318-332 - Wiselin Jiji Ganasigamony, G. Merlin, Rajesh Athiswamy:

Assessment and Monitoring of Salinity of Soils After Tsunami in Nagapattinam Area Using Fuzzy Logic-Based Classification. 333-341 - Subrata Datta, Kalyani Mali, Udit Ghosh, Subrata Bose, Sourav Das, Sourav Ghosh:

Rare Correlated Coherent Association Rule Mining With CLS-MMS. 342-359 - Hector B. Hougaard, Atsuko Miyaji

:
Authenticated Tree-Based R-LWE Group Key Exchange. 360-372 - Cong Lu, Jianbin Huang, Longji Huang:

Detecting Urban Anomalies Using Factor Analysis and One Class Support Vector Machine. 373-383 - Shudan Xue

, Qingying Deng, Pingshan Li:
Fault-Tolerant Strongly Hamiltonian Laceability and Hyper-Hamiltonian Laceability of Cayley Graphs Generated by Transposition Trees. 384-398 - Zahraa E. Mohamed, Hussein H. Saleh:

Potential of Machine Learning Based Support Vector Regression for Solar Radiation Prediction. 399-415 - P. Radha

, N. Selvakumar, J. Raja Sekar, J. V. Johnsonselva:
Density-Based Dynamically Self-Parameterized Clustering for Material Inspection. 416-428 - Piyush Kumar Shukla, Vandana Roy, Prashant Kumar Shukla

, Anoop Kumar Chaturvedi, Aumreesh Kumar Saxena, Manish Maheshwari
, Parashu Ram Pal
:
An Advanced EEG Motion Artifacts Eradication Algorithm. 429-440 - Xiao-Yan Li

, Yufang Zhang, Ximeng Liu, Xiangke Wang, Hongju Cheng:
Reliability Evaluation of Clustered Faults for Regular Networks Under the Probabilistic Diagnosis Model. 441-462 - Oswald C., B. Sivaselvan:

Smart Multimedia Compressor - Intelligent Algorithms for Text and Image Compression. 463-478 - Tao Hou, Ting Cui, Jiyan Zhang

:
Practical Attacks on Reduced-Round 3D and Saturnin. 479-495 - Mohammad Reza Zarrabi, Nasrollah Moghaddam Charkari

:
Single-Point And Triple-Point Queries Visibility Constrained Minimum Link Paths In Simple Polygons. 496-507 - S. Christina Magneta

, C. Sundar
, Muniyandi Suruli Thanabal
:
Lung Lobe Segmentation and Feature Extraction-Based Hierarchical Attention Network for COVID-19 Prediction from Chest X-Ray Images. 508-522 - Gongxian Zeng, Meiqi He, Siu-Ming Yiu, Zhengan Huang:

Corrigendum to: A Self-Tallying Electronic Voting Based on Blockchain. 523 - Ehsan Ataie, Athanasia Evangelinou, Eugenio Gianniti, Danilo Ardagna:

Erratum to: A Hybrid Machine Learning Approach for Performance Modeling of Cloud-Based Big Data Applications. 524
Volume 66, Number 3, March 2023
- A Krishan, Deepti Mittal

:
Multi-Class Liver Cancer Diseases Classification Using CT Images. 525-539 - Weina Niu, Yuheng Luo, Kangyi Ding, Xiaosong Zhang, Yanping Wang, Beibei Li:

A Novel Generation Method for Diverse Privacy Image Based on Machine Learning. 540-553 - Krishnamoorthy Durga Devi

, P. Uma Maheswari, Phani Kumar Polasi
, R. Preetha
, M. Vidhyalakshmi:
Pattern Matching Model for Recognition of Stone Inscription Characters. 554-564 - Zhiqiang Lv

, Jianbo Li, Chuanhao Dong, Zhihao Xu:
DeepSTF: A Deep Spatial-Temporal Forecast Model of Taxi Flow. 565-580 - Furkan Gözükara

, Selma Ayse Özel
:
An Incremental Hierarchical Clustering Based System For Record Linkage In E-Commerce Domain. 581-602 - Pramod Ganapathi, Rezaul Chowdhury:

A Unified Framework to Discover Permutation Generation Algorithms. 603-614 - Taha Mansouri

, Mohammad Reza Sadeghi Moghadam
, Fatemeh Monshizadeh, Ahad Zareravasan
:
IoT Data Quality Issues and Potential Solutions: A Literature Review. 615-625 - Kaiju Li, Chunhua Xiao:

PBFL: Communication-Efficient Federated Learning via Parameter Predicting. 626-642 - Jie Ma

, Bin Qi, Kewei Lv:
Reusable Group Fuzzy Extractor and Group-Shared Bitcoin Wallet. 643-661 - Chuanxiang Ju, Hangqi Ding

, Benjia Hu:
A Hybrid Strategy Improved Whale Optimization Algorithm for Web Service Composition. 662-677 - Yalan Wu, Jiaquan Yan, Long Chen, Jigang Wu, Yidong Li:

Efficient Parameter Server Placement for Distributed Deep Learning in Edge Computing. 678-691 - Zhiwang Xu, Huibin Qin, Shengying Yang, Seyedeh Maryam Arefzadeh

:
A New Approach for Resource Recommendation in the Fog-Based IoT Using a Hybrid Algorithm. 692-710 - Yuchen Tian, Weizhe Zhang, Andrew Simpson

, Yang Liu
, Zoe Lin Jiang:
Defending Against Data Poisoning Attacks: From Distributed Learning to Federated Learning. 711-726 - Sheela J, Janet B

:
Caviar-Sunflower Optimization Algorithm-Based Deep Learning Classifier for Multi-Document Summarization. 727-742 - Rahul Ramesh Chakre, Dipak V. Patil:

Particle Rider Mutual Information and Dendritic-Squirrel Search Algorithm With Artificial Immune Classifier for Brain Tumor Classification. 743-762 - Maximiliano Cristiá

, Andrea Fois
, Gianfranco Rossi:
Declarative Programming with Intensional Sets in Java Using JSetL. 763-784
Volume 66, Number 4, April 2023
- Sweta Jain

, Pruthviraj Choudhari, Mahesh Gour
:
Pulmonary Lung Nodule Detection from Computed Tomography Images Using Two-Stage Convolutional Neural Network. 785-795 - Karine Altisen, Stéphane Devismes, Erwan Jahier:

sasa: a SimulAtor of Self-stabilizing Algorithms. 796-814 - Bharathi Gopal

, Anandharaj Ganesan
:
Sentiment Classification of Tourist's Opinion on Tourist Places of Interest in South India using Tweet Reviews. 815-825 - Qianru Zhou, Shuming Zhou, Xiaoqing Liu, Zhengqin Yu:

Cluster Connectivity And Super Cluster Connectivity Of DQcube. 826-841 - Jixin Zhang, Jiageng Chen

:
Efficient Traceable Attribute-Based Signature With Update-Free Revocation For Blockchain. 842-865 - Mehmet Duran Toksari, Berrin Atalay:

Some Scheduling Problems With Job Rejection And A Learning Effect. 866-872 - R. Sekar, Ravi G.

:
Taylor Sun Flower Optimization-Based Compressive Sensing for Image Compression and Recovery. 873-887 - Cheng Zhang

, Bo Ou, Xiaolong Li, Jianqin Xiong:
Human Visual System Guided Reversible Data Hiding Based On Multiple Histograms Modification. 888-906 - Simone Faro, Thierry Lecroq, Kunsoo Park, Stefano Scafiti:

On the Longest Common Cartesian Substring Problem. 907-923 - Yanwei Zhou, Zhaolong Wang, Zirui Qiao, Ying Wang, Bo Yang, Yi Mu, Mingwu Zhang:

Identity-Based Encryption With Continuous Leakage-Resilient CCA Security From Static Complexity Assumption. 924-940 - Yue Li

, Jianfang Qi
, Xiaoquan Chu
, Weisong Mu
:
Customer Segmentation Using K-Means Clustering and the Hybrid Particle Swarm Optimization Algorithm. 941-962 - Amitabha Acharya

, Aman Aryan
, Sujay Saha
, Anupam Ghosh
:
Impact of COVID-19 on the Human Personality: An Analysis Based on Document Modeling Using Machine Learning Tools. 963-969 - Jialiang Hua, Tai Liu, Yulong Cui, Lingyue Qin, Xiaoyang Dong, Huiyong Cui:

Low-Data Cryptanalysis On SKINNY Block Cipher. 970-986 - Hailun Yan, Serge Vaudenay, Daniel Collins, Andrea Caforio:

Optimal Symmetric Ratcheting for Secure Communication. 987-1016 - Li Zhang, Wenling Wu, Yafei Zheng, Bolin Wang:

Cryptanalysis on Reduced-Round 3D and Saturnin. 1017-1029 - K. Ravishankar

, C. Jothikumar
:
Analysis Performance Of Image Processing Technique Its Application by Decision Support Systems On Covid-19 Disease Prediction Using Convolution Neural Network. 1030-1039 - Erdogan Berkay Tekincan

, Tülin Erçelebi Ayyildiz
, Nizam Ayyildiz
:
Performance Evaluation of FPGA-Based LSTM Neural Networks for Pulse Signal Detection on Real-Time Radar Warning Receivers. 1040-1052
Volume 66, Number 5, May 2023
- Sudhin Chandran

, R. Rajesh
, M. Dev Anand
:
Laser Beam Welded Aluminum-Titanium Dissimilar Sheet Metals: Neural Network Based Strength and Hardness Prediction Model. 1053-1068 - Hao Guo, Zhiyu Zhang, Qianqian Yang, Lei Hu, Yiyuan Luo:

A New Method To Find All The High-Probability Word-Oriented Truncated Differentials: Application To Midori, SKINNY And CRAFT. 1069-1082 - Md Abu Marjan, Md. Palash Uddin

, Masud Ibn Afjal
:
An Educational Data Mining System For Predicting And Enhancing Tertiary Students' Programming Skill. 1083-1101 - Bin-Bin Cai, Yusen Wu, Jing Dong, Su-Juan Qin, Fei Gao, Qiao-Yan Wen:

Quantum Attacks on 1K-AES and PRINCE. 1102-1110 - Guofeng Tang, Zhenfeng Zhang:

Two-Party Signing For ISO/IEC Digital Signature Standards. 1111-1125 - K. Suresh

, S. S. Sreeja Mole
, A. Joseph Selva Kumar:
F2SO: An Energy Efficient Cluster Based Routing Protocol Using Fuzzy Firebug Swarm Optimization Algorithm in WSN. 1126-1138 - Shobhan Kumar

, Arun Chauhan
:
A Transformer Based Encodings for Detection of Semantically Equivalent Questions in cQA. 1139-1155 - Yanna Wang, Bo Zhou:

Residual Closeness, Matching Number and Chromatic Number. 1156-1166 - Xiaodi Wang

, Xiaoge Pan, Tian Yang, Jianhua Xie, Mingwei Tang:
Aspect-Based Sentiment Analysis Using Interaction Matrix And Global Attention Neural Network. 1167-1183 - Yanze Huang

, Limei Lin
, Eddie Cheng
, Li Xu
:
Component Fault Diagnosis and Fault Tolerance of Alternating Group Graphs. 1184-1194 - Xiaoli Dong

, Yongzhuang Wei, Wen Gao, Jie Chen:
New Meet-in-the-Middle Attacks on FOX Block Cipher. 1195-1212 - Luming Yang, Shaojing Fu, Yongjun Wang, Kaitai Liang, Fan Mo, Bo Liu:

DEV-ETA: An Interpretable Detection Framework for Encrypted Malicious Traffic. 1213-1227 - Mona Mosa

, Nedaa Agami
, Ghada Elkhayat
, Mohamed Kholief
:
A Novel Hybrid Segmentation Approach for Decision Support: A Case Study in Banking. 1228-1240 - Mengzhu Yu

, Zhenjun Tang, Zhixin Li, Xiaoping Liang, Xianquan Zhang:
Robust Image Hashing With Saliency Map And Sparse Model. 1241-1255 - Bishal Basak Papan

, Protik Bose Pranto, Md. Saidur Rahman:
On 2-Interval Pairwise Compatibility Properties of Two Classes of Grid Graphs. 1256-1267 - Zhen Shi

, Chenhui Jin:
Linear Attacks On SNOW 3G And SNOW-V Using Automatic Search. 1268-1278 - J. Shobana

, M. Murali
:
An Improved Self Attention Mechanism Based on Optimized BERT-BiLSTM Model for Accurate Polarity Prediction. 1279-1294 - Bo Pang

, Gang Liang, Jin Yang, Yijing Chen, Xinyi Wang, Wenbo He:
CWSOGG: Catching Web Shell Obfuscation Based on Genetic Algorithm and Generative Adversarial Network. 1295-1309
Volume 66, Number 6, June 2023
- Tomer Ashur, Chris J. Mitchell:

Special Issue on Failed Approaches and Insightful Losses in Cryptology - Foreword. 1311 - Tomer Ashur

, Mohammad Mahzoun
, Dilara Toprakhisar
:
How Not To Design An Efficient FHE-Friendly Block Cipher: Seljuk. 1312-1319 - Nina Bindel

, Sarah McCarthy
:
The Need for Being Explicit: Failed Attempts to Construct Implicit Certificates from Lattices. 1320-1334 - Chitchanok Chuengsatiansup, Eyal Ronen, Gregory G. Rose, Yuval Yarom:

Row, Row, Row Your Boat: How to Not Find Weak Keys in Pilsung. 1335-1341 - Daniel Shumow:

Incorrectly Generated RSA Keys: How I Learned To Stop Worrying And Recover Lost Plaintexts. 1342-1349 - Satish Muppidi

, Om Prakash P. G, B. Kishore:
Dragonfly Political Optimizer Algorithm-Based Rider Deep Long Short-Term Memory for Soil Moisture and Heat Level Prediction in IoT. 1350-1365 - Hieu Minh Truong

, Hieu Trung Huynh
:
A Novel Approach For CT-Based COVID-19 Classification and Lesion Segmentation Based On Deep Learning. 1366-1375 - Shichang Wang, Meicheng Liu, Dongdai Lin, Li Ma:

On Grain-Like Small State Stream Ciphers Against Fast Correlation Attacks: Cryptanalysis of Plantlet, Fruit-v2 and Fruit-80. 1376-1399 - Shusen Wu, Xiaoshe Dong, Heng Chen, Longxiang Wang, Qiang Wang, Zhengdong Zhu:

Simplified High Level Parallelism Expression on Heterogeneous Systems through Data Partition Pattern Description. 1400-1418 - Yi Chen, Yantian Shen, Hongbo Yu, Sitong Yuan:

A New Neural Distinguisher Considering Features Derived From Multiple Ciphertext Pairs. 1419-1433 - Hailong Zhang, Wei Yang:

Template Attack Assisted Linear Cryptanalysis on Outer Rounds Protected DES Implementations. 1434-1451 - Hisaki Kobayashi, Yuichi Sudo

, Hirotsugu Kakugawa, Toshimitsu Masuzawa:
A Self-Stabilizing Distributed Algorithm for the Generalized Dominating Set Problem With Safe Convergence. 1452-1476 - Damian Arellanes

, Kung-Kiu Lau, Rizos Sakellariou:
Decentralized Data Flows for the Functional Scalability of Service-Oriented IoT Systems. 1477-1506 - Ti Wang, Yongbin Zhou, Hui Ma, Rui Zhang:

Flexible and Controllable Access Policy Update for Encrypted Data Sharing in the Cloud. 1507-1524 - Sinam Ajitkumar Singh, Ningthoujam Dinita Devi, Swanirbhar Majumder

:
An Improved Unsegmented Phonocardiogram Classification Using Nonlinear Time Scattering Features. 1525-1540 - Ahmet Gökçen

, Alkim Gokcen, Savas Sahin
:
Prediction of Li-Ion Battery Discharge Patterns in IoT Devices Under Random Use Via Machine Learning Algorithms. 1541-1548 - Pravin Narayan Kathavate

:
Role of Machine Learning on Key Extraction for Data Privacy Preservation of Health Care Sectors in IoT Environment. 1549-1562 - Corrigendum to: IoT Data Quality Issues and Potential Solutions: A Literature Review. 1563

- Corrigendum to: A Multi-Objective Randomly Updated Beetle Swarm and Multi-Verse Optimization for Brain Tumor Segmentation and Classification. 1564

Volume 66, Number 7, July 2023
- Jan A. Bergstra, John V. Tucker:

On The Axioms Of Common Meadows: Fracterm Calculus, Flattening And Incompleteness. 1565-1572 - Zhiruo Zhao

, Lei Cao
, Xiliang Chen
, Jun Lai
, Legui Zhang
:
Improvement of MADRL Equilibrium Based on Pareto Optimization. 1573-1585 - Tiziana Calamoneri, Daniele Tavernelli:

Modeling and Approximating the Visit of a Set of Sites With a Fleet of UAVs. 1586-1594 - Aravindkumar Sekar, Varalakshmi Perumal:

A Novel SGD-U-Network-Based Pixel-Level Road Crack Segmentation and Classification. 1595-1608 - Lingyuan Yin, Jing Xu, Zhenfeng Zhang:

Interopera: An Efficient Cross-Chain Trading Protocol. 1609-1621 - Poongodi Kannan

, Dhananjay Kumar
:
Mining Frequent Serial Positioning Episode Rules with Forward and Backward Search Technique from Event Sequences. 1622-1643 - Anjushi Verma

, Tirthankar Gayen
:
Reliability Assessment of Combined Hardware-Software Non-repairable Time-Critical Systems. 1644-1663 - Wanwan Zheng, Mingzhe Jin

:
Improving the Performance of Feature Selection Methods with Low-Sample-Size Data. 1664-1686 - Samer Kais Jameel

, Jafar Majidpour
, Abdulbasit K. Al-Talabani, Jihad Anwar Qadir:
Face Identification Using Conditional Generative Adversarial Network. 1687-1697 - Elham Raisi Sarbizhan

, Mohammad Mehdi Zahedi
, Marzieh Shamsizadeh:
L-graph Automata And Some Applications. 1698-1716 - Shiyou Xu, Jian Wang, Liangliang Wang:

Indistinguishable Leakage-Resilient Circuit Compiler. 1717-1732 - Yeting Li, Haiming Chen, Zixuan Chen:

Learning Disjunctive Multiplicity Expressions and Disjunctive Generalize Multiplicity Expressions From Both Positive and Negative Examples. 1733-1748 - Muath AlShaikh

:
A Novel Reduced Reference Image Quality Assessment Based on Formal Concept Analysis. 1749-1760 - He Li, Yanna Liu, Shuqi Yang, Yishuai Lin, Yi Yang, Jaesoo Yoo:

An Improved Hill Climbing Algorithm for Graph Partitioning. 1761-1776 - Muhammad Umar Nasir

, Urva Rehmat
, Imran Ahmad
:
Social Media Analysis of Customer Emotions in Pizza Industry. 1777-1783 - Veluguri Sureshkumar

, Rajasomashekar Somarajadikshitar, B. Sarala Beeram:
A Novel Representation and Prediction Initiative for Underground Water by Using Deep Learning Technique of Remote Sensing Images. 1784-1801 - Diego Teijeiro

, Margarita Amor
, Ramón Doallo
, David Deibe
:
Interactive Visualization of Large Point Clouds Using an Autotuning Multiresolution Out-Of-Core Strategy. 1802-1816
Volume 66, Number 8, August 2023
- Jianen Yan

, Haiyan Xu
, Ning Li
, Zhaoxin Zhang
:
Large-Scale Emulation Network Topology Partition Based on Community Detection With the Weight of Vertex Similarity. 1817-1828 - Guoying Sun, Feng Ye, Tingting Chai, Zhaoxin Zhang, Xiaojun Tong, Shitala Prasad:

Gambling Domain Name Recognition via Certificate and Textual Analysis. 1829-1839 - Fareeha Rasheed

, Abdul Wahid
:
An Unobtrusive Approach to Emotion Detection in E-Learning Systems. 1840-1855 - Rafiul Haq, Xiaowang Zhang

, Wahab Khan, Zhiyong Feng:
Urdu Named Entity Recognition System Using Deep Learning Approaches. 1856-1869 - Zhongkun Yu, Junfeng Wang, Binhui Tang, Li Lu:

Tactics And Techniques Classification In Cyber Threat Intelligence. 1870-1881 - Zhang Long, Jinsong Wang:

Network Traffic Classification Based On A Deep Learning Approach Using NetFlow Data. 1882-1892 - Pawan Meena

, Mahesh Kumar Pawar
, Anjana Pandey:
Comparative Analysis of Overlap Community Detection Techniques on Social Media Platform. 1893-1912 - Yunxia Ren, Shiying Wang:

The Local Diagnosability of a Class of Cayley Graphs with Conditional Faulty Edges Under the PMC Model. 1913-1921 - Mingzhe Zhu

, Wanyue Xu, Zhongzhi Zhang, Haibin Kan, Guanrong Chen:
Resistance Distances In Simplicial Networks. 1922-1935 - Saleh Albahli

, Waleed Albattah
:
Crime Type Prediction in Saudi Arabia Based on Intelligence Gathering. 1936-1948 - J. C. Smitha

, Ambily Jane
, Lekshmi Chandran
:
3D Flattering Amplified Neural Network-Based Segmentation of Amygdala and Hippocampus. 1949-1964 - Hui Dong, Jianxi Fan, Baolei Cheng, Yan Wang, Li Xu:

Hamiltonian Properties of the Data Center Network HSDC with Faulty Elements. 1965-1981 - Manisha Kumawat

, Arti Khaparde
:
Development of Adaptive Time-Weighted Dynamic Time Warping for Time Series Vegetation Classification Using Satellite Images in Solapur District. 1982-1999 - Chen Guo, Qiuming Liu, Zhifang Xiao, Shuo Peng:

The Diagnosability of Interconnection Networks with Missing Edges and Broken-Down Nodes Under the PMC and MM* Models. 2000-2010 - Jaspreet Kaur

, Prabhpreet Kaur
:
Automated Computer-Aided Diagnosis of Diabetic Retinopathy Based on Segmentation and Classification using K-nearest neighbor algorithm in retinal images. 2011-2032 - Xueli Sun, Jianxi Fan, Baolei Cheng, Jingya Zhou, Yan Wang:

Relationship Between Component Connectivity And Component Diagnosability Of Some Regular Networks. 2033-2042 - Abhishek Bhatt

, Vandana Thakur
:
An Optimized Deep Belief Network for Land Cover Classification Using Synthetic-Aperture Radar Images and Landsat Images. 2043-2058 - Satish Muppidi

, Kishore Bhamidipati
, Sajeev Ram Arumugam
:
SPDPOA: Student Psychology Dragonfly Political Optimizer Algorithm-Based Soil Moisture and Heat-Level Prediction for Plant Health Monitoring in Internet of Things. 2059-2074 - Correction to: Adaptive Laplacian Support Vector Machine for Semi-supervised Learning. 2075

Volume 66, Number 9, September 2023
- Kaiju Li, Hao Wang:

Federated Learning Communication-Efficiency Framework via Corset Construction. 2077-2101 - Zaki Brahmi

, Afef Selmi
:
Coordinate System-Based Trust-Aware Web Services Composition in Edge and Cloud Environment. 2102-2117 - Yayu Yang

, Mingzu Zhang, Jixiang Meng, Rongda Chen:
The a-average Degree Edge-Connectivity of Bijective Connection Networks. 2118-2122 - Marriam Daud

, Ali Afzal Malik
:
Construction and Validation of Early Software Size Estimation Models Based on ADAF-Adjusted ACD Metrics. 2123-2137 - Xiaoyang Liu

, Shanghong Dai
, Giacomo Fiumara
, Pasquale De Meo
:
Target-specific sentiment analysis method combining word-masking data enhancement and adversarial learning. 2138-2154 - Zhenhua Chen, Jingjing Nie, Zhanli Li, Chunpeng Ge, Willy Susilo

:
Geometric Searchable Encryption Without False Positive And Its Applications. 2155-2168 - Talha Mahboob Alam

, Kamran Shaukat
, Adel Khelifi
, Hanan Aljuaid
, Malaika Shafqat
, Usama Ahmed
, Sadeem Ahmad Nafees
, Suhuai Luo
:
A Fuzzy Inference-Based Decision Support System for Disease Diagnosis. 2169-2180 - Aleksandr S. Tvardovskii, Nina Yevtushenko:

Deriving homing sequences for Finite State Machines with timeouts. 2181-2190 - B. Mathan Kumar

, Bharati S. Ainapure
, Suryabhan Pratap Singh
, Sumit Vyas
:
Feature Extraction Based Deep Indexing by Deep Fuzzy Clustering for Image Retrieval Using Jaro Winkler Distance. 2191-2207 - Talal H. Noor:

Behavior Analysis-Based IoT Services For Crowd Management. 2208-2219 - Xiao Zeng, Guowu Yang, Xiaoyu Song, Marek A. Perkowski, Gang Chen:

Detecting Affine Equivalence Of Boolean Functions And Circuit Transformation. 2220-2229 - Michael Simpson, Venkatesh Srinivasan, Alex Thomo:

Scalable Misinformation Mitigation in Social Networks Using Reverse Sampling. 2230-2253 - Parul Tomar

, Gyanendra Kumar
, Lal Pratap Verma
:
Path-Rank-Based Data Chunk Scheduling for Concurrent Multipath Transmission. 2254-2264 - Zhe Jiang, Kai Zhang

, Liangliang Wang, Jianting Ning:
Forward Secure Public-key Authenticated Encryption with Conjunctive Keyword Search. 2265-2278 - Yaqi Xu, Baofeng Wu

, Dongdai Lin:
New Strategies To Improve Differential-Linear Attacks With Applications To Chaskey. 2279-2295 - Wided Selmi, Hager Kammoun, Ikram Amous:

Semantic-Based Hybrid Query Reformulation for Biomedical Information Retrieval. 2296-2316 - Gokhan Ozogur

, Mehmet Ali Ertürk
, Gulsum Zeynep Gurkas Aydin
, Muhammed Ali Aydin
:
Android Malware Detection in Bytecode Level Using TF-IDF and XGBoost. 2317-2328 - Correction to: Learning Disjunctive Multiplicity Expressions and Disjunctive Generalize Multiplicity Expressions From Both Positive and Negative Examples. 2329

Volume 66, Number 10, October 2023
- Lein Harn, Ching-Fang Hsu, Zhe Xia

, Zixuan Li
:
Multiple Blind Signature for e-Voting and e-Cash. 2331-2338 - Runkai Yang, Jelena V. Misic, Vojislav B. Misic, Xiao Liang, Shenshen Zhou, Xiaolin Chang:

Understanding Performance of a Vulnerable Heterogeneous Edge Data Center: A Modeling Approach. 2339-2354 - Wenju Xu, Baocang Wang, Quanbo Qu, Tanping Zhou, Pu Duan:

Modified Multi-Key Fully Homomorphic Encryption Scheme in the Plain Model. 2355-2364 - Yangguang Tian, Atsuko Miyaji

, Koki Matsubara, Hui Cui, Nan Li:
Revocable Policy-Based Chameleon Hash for Blockchain Rewriting. 2365-2378 - Haitang Lu, Jie Chen, Jianting Ning, Kai Zhang

:
Verifiable Conjunctive Dynamic Searchable Symmetric Encryption With Forward and Backward Privacy. 2379-2392 - He Li, Duo Jin, Xuejiao Li, Hongjie Huang, Jinpeng Yun, Longji Huang:

Multi-View Spatial-Temporal Graph Neural Network for Traffic Prediction. 2393-2408 - Mianyang Yao, Long Chen, Yalan Wu, Jigang Wu:

Loading Cost-Aware Model Caching And Request Routing In Edge-enabled Wireless Sensor Networks. 2409-2425 - N. S. Jeya Shyla, W. R. Sam Emmanuel

:
Glaucoma Detection Using Multiple Feature Set With Recurrent Neural Network. 2426-2436 - Öznur Kalkar, Isa Sertkaya

, Seher Tutdere:
On The Batch Outsourcing Of Pairing Computations. 2437-2446 - Xuanhao Luo

, Yong Feng
, Chengdong Wang
:
A Clothoid Curve-Based Intersection Collision Warning Scheme in Internet of Vehicles. 2447-2461 - Wei Zhou

, Xiaoxue Ding
, Hai-Xia Xu
:
Anti-Occlusion Target Tracking Based on Joint Confidence. 2462-2479 - Yi Chen, Yantian Shen, Hongbo Yu:

Neural-Aided Statistical Attack for Cryptanalysis. 2480-2498 - Vikas Srivastava

, Sumit Kumar Debnath
:
A Multivariate-Based Provably Secure Certificateless Signature Scheme With Applications To The Internet Of Medical Things. 2499-2516 - Zezhou Hou

, Jiongjiong Ren, Shaozhen Chen:
Practical Attacks of Round-Reduced SIMON Based on Deep Learning. 2517-2534 - Juanjuan Shi, Yongfang Kou, Yulan Hu, Weihua Yang:

On The Maximum Cliques Of The Subgraphs Induced By Binary Constant Weight Codes In Powers Of Hypercubes. 2535-2541 - Mingxing Hu, Weijiong Zhang, Zhen Liu:

An Improved Lattice-Based Ring Signature With Unclaimable Anonymity in the Standard Model. 2542-2553 - Keshuo Sun, Haiying Gao:

Adaptively Secure KP-ABE For Circuits With Fan-In n And Fan-Out 1. 2554-2573 - Dengli Bu, Junyi Deng, Pengjie Tang, Shuhong Yang:

Reversible Circuit Synthesis Method Using Sub-graphs of Shared Functional Decision Diagrams. 2574-2592 - Correction to: Intelligent Forecast of Stock Markets to Handle COVID-19 Economic Crisis by Modified Generative Adversarial Networks. 2593

Volume 66, Number 11, November 2023
- Hakan Yilmazer

, Selma Ayse Özel
:
ImposeSVD: Incrementing PureSVD For Top-N Recommendations for Cold-Start Problems and Sparse Datasets. 2595-2622 - Junying Yuan

, Huicheng Zheng
, Jiangqun Ni
:
Multiple Histograms-Based Reversible Data Hiding Using Fast Performance Optimization and Adaptive Pixel Distribution. 2623-2637 - Shahid Alam

:
LAM: Scrutinizing Leading APIs For Detecting Suspicious Call Sequences. 2638-2655 - Ning Li

, Xin Yuan
, José-Fernán Martínez-Ortega, Vicente Hernández Díaz:
Trapezoidal Sketch: A Sketch Structure for Frequency Estimation of Data Streams. 2656-2673 - Chengbin Jin, Yongbin Zhou:

Enhancing Deep-Learning Based Side-Channel Analysis Through Simultaneously Multi-Byte Training. 2674-2704 - N. V. L. M. Krishna Munagala

, A. Daisy Rani
, D. V. Rama Koti Reddy
:
Blockchain-Based Internet-of-Things for Secure Transmission of Medical Data in Rural Areas. 2705-2720 - Yao Li

, Zhi Xiong
, Tao Zhang
, Qinkun Zhang, Ming Fan, Lei Xue:
Ensemble Framework Combining Family Information for Android Malware Detection. 2721-2740 - Lv Chen

, Dengpan Ye, Yueyun Shang:
RTIM Hashing: Robust and Compact Video Hashing With a Rotation- and Translation-Invariant Model. 2741-2757 - Yan Zeng

, Yuankai Mu, Junfeng Yuan, Siyuan Teng, Jilin Zhang, Jian Wan, Yongjian Ren, Yunquan Zhang:
Adaptive Federated Learning With Non-IID Data. 2758-2772 - Zheng Zhang, Fangguo Zhang

:
New Obfuscation Scheme for Conjunctions. 2773-2781 - Liqin Xiong

, Lei Cao, Xiliang Chen, Jun Lai, Xijian Luo:
Character-Based Value Factorization For MADRL. 2782-2793 - Wooyoung Park

, Seungbum Jo, Srinivasa Rao Satti:
Practical Implementation of Encoding Range Top-2 Queries. 2794-2809 - Zirui Qiao, Qiliang Yang, Yanwei Zhou, Bo Yang, Mingwu Zhang:

A Novel Construction Of Certificateless Aggregate Signature Scheme For Healthcare Wireless Medical Sensor Networks. 2810-2824 - Lanlan Rui

, Shiyue Dai, Zhipeng Gao, Xuesong Qiu, Xingyu Chen:
Double-Lead Content Search And Producer Location Prediction Scheme For Producer Mobility In Named Data Networking. 2825-2843 - Shuai Liu

, Yan Zhao
:
Robust Image Hashing Combining 3D Space Contour and Vector Angle Features. 2844-2859
Volume 66, Number 12, December 2023
- Kexin Xu

, Benjamin Hong Meng Tan, Li-Ping Wang, Khin Mi Mi Aung, Huaxiong Wang:
Threshold Homomorphic Encryption From Provably Secure NTRU. 2861-2873 - Junfeng Tian

, Haoyi Jia
, Wenqing Bai
:
CCESHP: Causal Consistency Model of Edge Storage Based on Hash Ring and Partial Geo-Replication. 2874-2886 - Ching-Kuo Hsu:

A Dueling DQN-Based Computational Offloading Method in MEC-Enabled IIoT Network. 2887-2896 - Shitala Prasad, Tingting Chai, Jiahui Li

, Zhaoxin Zhang:
CR Loss: Improving Biometric Using ClassRoom Learning Approach. 2897-2907 - Areeb Ahmed Bhutta

, Hasnain Ahmed
:
Edge-Based Congestion-Aware Datacenter Load Balancing with Smart Probing. 2908-2920 - Jing Wang

, Fangmin Li
:
The Generalized 3-Connectivity Of The Folded Hypercube FQn. 2921-2927 - Jincheng Zhong, Shuhui Chen

, Biao Han
:
FPGA-CPU Architecture Accelerated Regular Expression Matching With Fast Preprocessing. 2928-2947 - Jiahui Yao, Lingling Xu:

Online/Offline Attribute-Based Boolean Keyword Search For Internet Of Things. 2948-2960 - Yong Zhao, Shao-Jun Yang, Wei Wu, Xinyi Huang:

A Lattice-Based Redactable Signature Scheme using Cryptographic Accumulators for Trees. 2961-2973 - Hao Lin

, Shi-Feng Sun, Mingqiang Wang, Joseph K. Liu
, Weijia Wang
:
Shorter Linkable Ring Signature Based on Middle-Product Learning with Errors Problem. 2974-2989 - Canan Çiftçi

, Vecdi Aytaç:
Disjunctive Total Domination In Harary Graphs. 2990-2999 - Jie Li, Guoying Sun:

RSCOEWR: Radical-Based Sentiment Classification of Online Education Website Reviews. 3000-3014 - Nan Zhao

, Nianmin Yao
, Zhenguo Gao
:
An Adaptive MAC Protocol Based on Time-Domain Interference Alignment for UWANs. 3015-3028 - Gildas Avoine, Xavier Carpent, Diane Leblanc-Albarel

:
Rainbow Tables: How Far Can CPU Go? 3029-3037 - R. Sudhakar

, P. V. Venkateswara Rao
:
Digital Image Anti-Forensic Model Using Exponential Chaotic Biogeography-Based Optimization Algorithm. 3038-3051 - Yin Lv

, Danping Shi, Yi Guo, Qiu Chen, Lei Hu, Zihui Guo
:
Automatic Demirci-Selçuk Meet-In-The-Middle Attack On SIMON. 3052-3068 - Congming Wei, Xiaoyang Dong, Willi Meier, Lingyue Qin, Ximing Fu

:
Differential-Aided Preimage Attacks On Round-Reduced Keccak. 3069-3091 - Li Feng, Xiaoling Ni, Zhen Ling, Liangmin Wang:

Strong Anonymous Communication System Based on Segment Routing Over SDN. 3092-3106 - Pingshan Liu, Shuyue Lv

:
Chinese RoBERTa Distillation For Emotion Classification. 3107-3118 - Lina Ba

, Yaxian Zhang, Heping Zhang
:
The Path-Structure Connectivity of Augmented k-ary n-cubes. 3119-3128

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














