default search action
Search dblp for Publications
export results for "toc:db/journals/cj/cj67.bht:"
@article{DBLP:journals/cj/AbidCKTJ24, author = {Amal Abid and Saoussen Cheikhrouhou and Slim Kallel and Zahir Tari and Mohamed Jmaiel}, title = {A Smart Contract-Based Access Control Framework For Smart Healthcare Systems}, journal = {Comput. J.}, volume = {67}, number = {2}, pages = {407--422}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxac183}, doi = {10.1093/COMJNL/BXAC183}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/AbidCKTJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/AboluhomK24, author = {Abdulatif Ahmed Ali Aboluhom and Ismet Kandilli}, title = {Face recognition using deep learning on Raspberry Pi}, journal = {Comput. J.}, volume = {67}, number = {10}, pages = {3020--3030}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxae066}, doi = {10.1093/COMJNL/BXAE066}, timestamp = {Fri, 08 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/AboluhomK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/AhmedMAJM24, author = {Hunar Abubakir Ahmed and Jafar Majidpour and Mohammed Hussein Ahmed and Samer Kais Jameel and Amir Majidpour}, title = {Enhancing Auditory Brainstem Response Classification Based On Vision Transformer}, journal = {Comput. J.}, volume = {67}, number = {5}, pages = {1872--1878}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad107}, doi = {10.1093/COMJNL/BXAD107}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/AhmedMAJM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/AjmeraT24, author = {Kashav Ajmera and Tribhuwan Kumar Tewari}, title = {Dynamic Virtual Machine Scheduling Using Residual Optimum Power-Efficiency In The Cloud Data Center}, journal = {Comput. J.}, volume = {67}, number = {3}, pages = {1099--1110}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad045}, doi = {10.1093/COMJNL/BXAD045}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/AjmeraT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/AlAzzawiL24, author = {Ameen Al{-}Azzawi and G{\'{a}}bor Lencse}, title = {Security analysis of the {MAP-T} IPv6 transition technology}, journal = {Comput. J.}, volume = {67}, number = {10}, pages = {2945--2958}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxae059}, doi = {10.1093/COMJNL/BXAE059}, timestamp = {Fri, 08 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/AlAzzawiL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/AlhosainiAWX24, author = {Hadeel Alhosaini and Sultan Alharbi and Xianzhi Wang and Guandong Xu}, title = {{API} Recommendation For Mashup Creation: {A} Comprehensive Survey}, journal = {Comput. J.}, volume = {67}, number = {5}, pages = {1920--1940}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad112}, doi = {10.1093/COMJNL/BXAD112}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/AlhosainiAWX24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/AliS24, author = {Hala S. Ali and R. Sridevi}, title = {Mobility and Security Aware Real-Time Task Scheduling in Fog-Cloud Computing for IoT Devices: {A} Fuzzy-Logic Approach}, journal = {Comput. J.}, volume = {67}, number = {2}, pages = {782--805}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad019}, doi = {10.1093/COMJNL/BXAD019}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/AliS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/AminGhafariA24, author = {Vahid Amin Ghafari and Mahmoud Ahmadian{-}Attari}, title = {An Attack on a Proposed Construction of Small-State Stream Ciphers and Proposals for New Constructions}, journal = {Comput. J.}, volume = {67}, number = {1}, pages = {169--178}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxac165}, doi = {10.1093/COMJNL/BXAC165}, timestamp = {Fri, 10 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/AminGhafariA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/Angelides24, author = {Marios C. Angelides}, title = {Thematic Editorial: Mostly Artificial Intelligence {(AI)} or Machine Learning {(ML)} Now in the Engine Room, in Pursuit of a Green Agenda}, journal = {Comput. J.}, volume = {67}, number = {1}, pages = {1--2}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad115}, doi = {10.1093/COMJNL/BXAD115}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/Angelides24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/AngeliniLFS24, author = {Patrizio Angelini and Giordano Da Lozzo and Henry F{\"{o}}rster and Thomas Schneck}, title = {2-Layer \emph{k}-Planar Graphs Density, Crossing Lemma, Relationships And Pathwidth}, journal = {Comput. J.}, volume = {67}, number = {3}, pages = {1005--1016}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad038}, doi = {10.1093/COMJNL/BXAD038}, timestamp = {Sat, 06 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/AngeliniLFS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/Anta24, author = {Antonio Fern{\'{a}}ndez Anta}, title = {Thematic editorial: edge computing, fog computing, and internet of things}, journal = {Comput. J.}, volume = {67}, number = {9}, pages = {2721--2724}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxae097}, doi = {10.1093/COMJNL/BXAE097}, timestamp = {Fri, 08 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/Anta24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/AntonyS24, author = {Amalan Joseph Antony and Kunwar Singh}, title = {A Blockchain-Based Public Key Infrastructure For IoT-Based Healthcare Systems}, journal = {Comput. J.}, volume = {67}, number = {4}, pages = {1531--1537}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad079}, doi = {10.1093/COMJNL/BXAD079}, timestamp = {Sat, 06 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/AntonyS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/AouarYSNB24, author = {Aissam Aouar and Sa{\"{\i}}d Yahiaoui and Lamia Sadeg and Nadia Nouali{-}Taboudjemat and Kadda Beghdad Bey}, title = {Distributed Partial Simulation for Graph Pattern Matching}, journal = {Comput. J.}, volume = {67}, number = {1}, pages = {110--126}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxac161}, doi = {10.1093/COMJNL/BXAC161}, timestamp = {Sat, 27 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/AouarYSNB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ArboledaGZ24, author = {Francisco Javier Moreno Arboleda and Georgia Garani and Carlos Daniel Bolivar Zapata}, title = {Query Operators for Transactional Data: Detecting Similar and Periodic Transactions}, journal = {Comput. J.}, volume = {67}, number = {2}, pages = {437--446}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxac185}, doi = {10.1093/COMJNL/BXAC185}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/ArboledaGZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/Ashwini24, author = {K. Ashwini}, title = {User Name-Based Compression and Encryption of Images Using Chaotic Compressive Sensing Theory}, journal = {Comput. J.}, volume = {67}, number = {1}, pages = {304--322}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxac175}, doi = {10.1093/COMJNL/BXAC175}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/Ashwini24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/AtwanARSAA24, author = {Jaffar Atwan and Nedaa Almansour and Mohammad Hashem Ryalat and Shahnorbanun Sahran and Hamza Aldabbas and Dheeb Albashish}, title = {Ensemble of Deep Features for Breast Cancer Histopathological Image Classification}, journal = {Comput. J.}, volume = {67}, number = {6}, pages = {2126--2136}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad127}, doi = {10.1093/COMJNL/BXAD127}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/AtwanARSAA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/Badawi24, author = {Soran Badawi}, title = {Deep Learning-Based Cyberbullying Detection in Kurdish Language}, journal = {Comput. J.}, volume = {67}, number = {7}, pages = {2548--2558}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxae024}, doi = {10.1093/COMJNL/BXAE024}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/Badawi24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/BehalS24, author = {Veerawali Behal and Ramandeep Singh}, title = {An Intelligent Air Monitoring System For Pollution Prediction: {A} Predictive Healthcare Perspective}, journal = {Comput. J.}, volume = {67}, number = {5}, pages = {1763--1782}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad099}, doi = {10.1093/COMJNL/BXAD099}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/BehalS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/BeniwalS24, author = {Rohit Beniwal and Pavi Saraswat}, title = {A Hybrid {BERT-CNN} Approach for Depression Detection on Social Media Using Multimodal Data}, journal = {Comput. J.}, volume = {67}, number = {7}, pages = {2453--2472}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxae018}, doi = {10.1093/COMJNL/BXAE018}, timestamp = {Thu, 22 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/BeniwalS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/BergstraT24, author = {Jan A. Bergstra and John V. Tucker}, title = {Eager Term Rewriting For The Fracterm Calculus Of Common Meadows}, journal = {Comput. J.}, volume = {67}, number = {5}, pages = {1866--1871}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad106}, doi = {10.1093/COMJNL/BXAD106}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/BergstraT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/BooherBDFGKMPSSTVVWZ24, author = {Jeremy Booher and Ross Bowden and Javad Doliskani and Tako Boris Fouotsa and Steven D. Galbraith and Sabrina Kunzweiler and Simon{-}Philipp Merz and Christophe Petit and Benjamin Smith and Katherine E. Stange and Yan Bo Ti and Christelle Vincent and Jos{\'{e}} Felipe Voloch and Charlotte Weitk{\"{a}}mper and Lukas Zobernig}, title = {Failing to Hash Into Supersingular Isogeny Graphs}, journal = {Comput. J.}, volume = {67}, number = {8}, pages = {2702--2719}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxae038}, doi = {10.1093/COMJNL/BXAE038}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/BooherBDFGKMPSSTVVWZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/BorgesS24, author = {Ricard Borges and Francesc Seb{\'{e}}}, title = {An e-Coin Based Construction for Unlinkable Priced Oblivious Transfer}, journal = {Comput. J.}, volume = {67}, number = {3}, pages = {933--940}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad031}, doi = {10.1093/COMJNL/BXAD031}, timestamp = {Sat, 06 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/BorgesS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/BoudgoustR24, author = {Katharina Boudgoust and Adeline Roux{-}Langlois}, title = {Overfull: Too Large Aggregate Signatures Based on Lattices}, journal = {Comput. J.}, volume = {67}, number = {2}, pages = {719--727}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad013}, doi = {10.1093/COMJNL/BXAD013}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/BoudgoustR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/BrahmamG24, author = {M. Veera Brahmam and S. Gopikrishnan}, title = {{NODSTAC:} Novel Outlier Detection Technique Based on Spatial, Temporal and Attribute Correlations on IoT Bigdata}, journal = {Comput. J.}, volume = {67}, number = {3}, pages = {947--960}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad034}, doi = {10.1093/COMJNL/BXAD034}, timestamp = {Tue, 13 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/BrahmamG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/BrisaboaGGN24, author = {Nieves R. Brisaboa and Travis Gagie and Adri{\'{a}}n G{\'{o}}mez{-}Brand{\'{o}}n and Gonzalo Navarro}, title = {Two-Dimensional Block Trees}, journal = {Comput. J.}, volume = {67}, number = {1}, pages = {391--406}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxac182}, doi = {10.1093/COMJNL/BXAC182}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/BrisaboaGGN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/BritoATN24, author = {Luiz Fernando Afra Brito and Marcelo Keese Albertini and Bruno Augusto Nassif Traven{\c{c}}olo and Gonzalo Navarro}, title = {Dynamic compact data structure for temporal reachability with unsorted contact insertions}, journal = {Comput. J.}, volume = {67}, number = {10}, pages = {2984--2994}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxae063}, doi = {10.1093/COMJNL/BXAE063}, timestamp = {Fri, 08 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/BritoATN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/BurukanliY24, author = {Mehmet Burukanli and Nejat Yumusak}, title = {{COVID-19} virus mutation prediction with {LSTM} and attention mechanisms}, journal = {Comput. J.}, volume = {67}, number = {10}, pages = {2934--2944}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxae058}, doi = {10.1093/COMJNL/BXAE058}, timestamp = {Fri, 08 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/BurukanliY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/CastanedaDRV24, author = {Armando Casta{\~{n}}eda and Hans van Ditmarsch and David A. Rosenblueth and Diego A. Vel{\'{a}}zquez}, title = {Pattern Models: {A} Dynamic Epistemic Logic For Distributed Systems}, journal = {Comput. J.}, volume = {67}, number = {7}, pages = {2421--2440}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxae016}, doi = {10.1093/COMJNL/BXAE016}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/CastanedaDRV24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/CavalcantiFRS24, author = {Ana Cavalcanti and Madiel Conserva Filho and Pedro Ribeiro and Augusto Sampaio}, title = {Laws of Timed State Machines}, journal = {Comput. J.}, volume = {67}, number = {6}, pages = {2066--2107}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad124}, doi = {10.1093/COMJNL/BXAD124}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/CavalcantiFRS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ChakrabortyBM24, author = {Abhinav Chakraborty and Subhash Bhagat and Krishnendu Mukhopadhyaya}, title = {Gathering Over Heterogeneous Meeting Nodes}, journal = {Comput. J.}, volume = {67}, number = {5}, pages = {1794--1813}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad101}, doi = {10.1093/COMJNL/BXAD101}, timestamp = {Mon, 19 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/ChakrabortyBM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ChangC24, author = {Yeim{-}Kuan Chang and Hsin{-}Mao Chen}, title = {Partitioned 2D Set-Pruning Segment Trees with Compressed Buckets for Multi-Dimensional Packet Classification}, journal = {Comput. J.}, volume = {67}, number = {6}, pages = {2189--2207}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad132}, doi = {10.1093/COMJNL/BXAD132}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/ChangC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ChenDRFWW24, author = {Zhiwei Chen and Lunzhi Deng and Yu Ruan and Shuai Feng and Tao Wang and Bo Wang}, title = {Certificateless Broadcast Encryption with Authorization Suitable for Storing Personal Health Records}, journal = {Comput. J.}, volume = {67}, number = {2}, pages = {617--631}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad004}, doi = {10.1093/COMJNL/BXAD004}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/ChenDRFWW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ChenKN24, author = {Liqun Chen and Nada El Kassem and Christopher J. P. Newton}, title = {How To Bind {A} TPM's Attestation Keys With Its Endorsement Key}, journal = {Comput. J.}, volume = {67}, number = {3}, pages = {988--1004}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad037}, doi = {10.1093/COMJNL/BXAD037}, timestamp = {Sat, 06 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/ChenKN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ChenLLWZD24, author = {Jie Chen and Yinuo Luo and Jun Liu and Chao Wang and Yueyu Zhang and Xiaoli Dong}, title = {A White-box Implementation of {SM4} with Self-equivalence Encoding}, journal = {Comput. J.}, volume = {67}, number = {3}, pages = {1087--1098}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad044}, doi = {10.1093/COMJNL/BXAD044}, timestamp = {Sat, 06 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/ChenLLWZD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ChenLWH24, author = {Xiuyuan Chen and Chao Lin and Wei Wu and Debiao He}, title = {A General Blockchain-Based Automatic Audit Scheme For Proofs Of Retrievability}, journal = {Comput. J.}, volume = {67}, number = {6}, pages = {2219--2229}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxae001}, doi = {10.1093/COMJNL/BXAE001}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/ChenLWH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ChenLXLN24, author = {Zhenhua Chen and Ting Li and Junrui Xie and Ni Li and Jingjing Nie}, title = {\emph{K}th min Threshold Encryption for Privacy-preserving Data Evaluation}, journal = {Comput. J.}, volume = {67}, number = {5}, pages = {1941--1950}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad113}, doi = {10.1093/COMJNL/BXAD113}, timestamp = {Mon, 08 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/ChenLXLN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ChenLZDL24, author = {Shuangquan Chen and Jinguo Li and Kai Zhang and Aoran Di and Mengli Lu}, title = {Privacy-Preserving Breast Cancer Prediction Based on Logistic Regression}, journal = {Comput. J.}, volume = {67}, number = {8}, pages = {2667--2676}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxae035}, doi = {10.1093/COMJNL/BXAE035}, timestamp = {Mon, 07 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/ChenLZDL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/CuiCYKC24, author = {Handong Cui and Kwan Yin Chan and Tsz Hon Yuen and Xin Kang and Cheng{-}Kang Chu}, title = {Bandwidth-Efficient Zero-Knowledge Proofs For Threshold {ECDSA}}, journal = {Comput. J.}, volume = {67}, number = {4}, pages = {1265--1278}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad057}, doi = {10.1093/COMJNL/BXAD057}, timestamp = {Tue, 13 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/CuiCYKC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/Dangalchev24, author = {Chavdar Dangalchev}, title = {Closeness Centralities of Lollipop Graphs}, journal = {Comput. J.}, volume = {67}, number = {6}, pages = {2020--2029}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad120}, doi = {10.1093/COMJNL/BXAD120}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/Dangalchev24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/DingWZS24, author = {Lin Ding and Zheng Wu and Guixian Zhang and Tairong Shi}, title = {Quantum Guess and Determine Attack on Stream Ciphers}, journal = {Comput. J.}, volume = {67}, number = {1}, pages = {292--303}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxac174}, doi = {10.1093/COMJNL/BXAC174}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/DingWZS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/DongJD24, author = {Dong Dong and Hongxu Jiang and Boyu Diao}, title = {{AKGF:} Automatic Kernel Generation for {DNN} on {CPU-FPGA}}, journal = {Comput. J.}, volume = {67}, number = {5}, pages = {1619--1627}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad086}, doi = {10.1093/COMJNL/BXAD086}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/DongJD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/DongLW24, author = {Xueshi Dong and Qing Lin and Wei Wang}, title = {Hybrid IT{\"{O}} Algorithm for Maximum Scatter Colored Traveling Salesman Problem}, journal = {Comput. J.}, volume = {67}, number = {6}, pages = {2172--2188}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad131}, doi = {10.1093/COMJNL/BXAD131}, timestamp = {Mon, 08 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/DongLW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/DongYZY24, author = {Songshou Dong and Yanqing Yao and Yihua Zhou and Yuguang Yang}, title = {A Certificateless Linearly Homomorphic Signature Scheme Based on Lattice for Network Coding}, journal = {Comput. J.}, volume = {67}, number = {9}, pages = {2739--2748}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxae040}, doi = {10.1093/COMJNL/BXAE040}, timestamp = {Fri, 08 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/DongYZY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/DungTP24, author = {Luong The Dung and Nguyen Ngoc Toan and Tran Nghi Phu}, title = {{CAIMP:} Cross-Architecture IoT Malware Detection and Prediction Based On Static Feature}, journal = {Comput. J.}, volume = {67}, number = {9}, pages = {2763--2776}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxae042}, doi = {10.1093/COMJNL/BXAE042}, timestamp = {Fri, 08 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/DungTP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ErdemSC24, author = {Oguzhan Erdem and Tuncay Soylu and Aydin Carus}, title = {Pipelined Decision Trees for Online Traffic Classification on FPGAs}, journal = {Comput. J.}, volume = {67}, number = {3}, pages = {825--839}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad022}, doi = {10.1093/COMJNL/BXAD022}, timestamp = {Sat, 06 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/ErdemSC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/FangHWH24, author = {Dong Fang and Guifang Huang and Mengfan Wang and Lei Hu}, title = {Decreasing Proof Size of {BLS} Scheme}, journal = {Comput. J.}, volume = {67}, number = {3}, pages = {1030--1040}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad040}, doi = {10.1093/COMJNL/BXAD040}, timestamp = {Sat, 06 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/FangHWH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/FarhadiS24, author = {Amirfarhad Farhadi and Arash Sharifi}, title = {Leveraging Meta-Learning To Improve Unsupervised Domain Adaptation}, journal = {Comput. J.}, volume = {67}, number = {5}, pages = {1838--1850}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad104}, doi = {10.1093/COMJNL/BXAD104}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/FarhadiS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/Farooq24, author = {Muhammad Omer Farooq}, title = {WiPoTS: An Application Layer Protocol With Network Protocol Stack Enhancements For Wireless Power Transfer Networks}, journal = {Comput. J.}, volume = {67}, number = {6}, pages = {2108--2117}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad125}, doi = {10.1093/COMJNL/BXAD125}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/Farooq24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/FengQZL24, author = {Le Feng and Zhenxing Qian and Xinpeng Zhang and Sheng Li}, title = {Stealthy Backdoor Attacks On Deep Point Cloud Recognization Networks}, journal = {Comput. J.}, volume = {67}, number = {5}, pages = {1879--1891}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad109}, doi = {10.1093/COMJNL/BXAD109}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/FengQZL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/FengWC24, author = {Hao Feng and Jiong Wu and Lin Chen}, title = {Intermittent Fault Diagnosis Of Product Network Based On {PMC} Model}, journal = {Comput. J.}, volume = {67}, number = {9}, pages = {2777--2786}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxae043}, doi = {10.1093/COMJNL/BXAE043}, timestamp = {Fri, 08 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/FengWC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/FinocchiGS24, author = {Irene Finocchi and Renan Leon Garcia and Blerina Sinaimeri}, title = {From Stars to Diamonds: Counting and Listing Almost Complete Subgraphs in Large Networks}, journal = {Comput. J.}, volume = {67}, number = {6}, pages = {2151--2161}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad129}, doi = {10.1093/COMJNL/BXAD129}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/FinocchiGS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/GaoLWHY24, author = {Zhiyuan Gao and Jinguo Li and Liangliang Wang and Yin He and Peichun Yuan}, title = {{CM-UTC:} {A} Cost-sensitive Matrix based Method for Unknown Encrypted Traffic Classification}, journal = {Comput. J.}, volume = {67}, number = {7}, pages = {2441--2452}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxae017}, doi = {10.1093/COMJNL/BXAE017}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/GaoLWHY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/GeW24, author = {Wenhan Ge and Junfeng Wang}, title = {SeqMask: Behavior Extraction Over Cyber Threat Intelligence Via Multi-Instance Learning}, journal = {Comput. J.}, volume = {67}, number = {1}, pages = {253--273}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxac172}, doi = {10.1093/COMJNL/BXAC172}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/GeW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/GnoumaEZ24, author = {Mariem Gnouma and Ridha Ejbali and Mourad Zaied}, title = {Deep Hashing and Sparse Representation of Abnormal Events Detection}, journal = {Comput. J.}, volume = {67}, number = {1}, pages = {3--17}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxac152}, doi = {10.1093/COMJNL/BXAC152}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/GnoumaEZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/GomesA24, author = {Tim{\'{o}}teo Gomes and Fernanda M. R. Alencar}, title = {An Ontology as Support for Specification of Non-functional Requirements of {AAL} Systems Considering Compliance Aspects}, journal = {Comput. J.}, volume = {67}, number = {4}, pages = {1211--1225}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad053}, doi = {10.1093/COMJNL/BXAD053}, timestamp = {Sun, 05 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/GomesA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/GomezMGM24, author = {Juan Manuel Castelo G{\'{o}}mez and Javier Carrillo Mond{\'{e}}jar and Jos{\'{e}} Rold{\'{a}}n G{\'{o}}mez and Jos{\'{e}} Luis Mart{\'{\i}}nez}, title = {A Concept Forensic Methodology For The Investigation Of IoT Cyberincidents}, journal = {Comput. J.}, volume = {67}, number = {4}, pages = {1324--1345}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad062}, doi = {10.1093/COMJNL/BXAD062}, timestamp = {Sat, 06 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/GomezMGM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/GongLYYHC24, author = {Yunchao Gong and Xueqiang Lv and Zhu Yuan and Xindong You and Feng Hu and Yuzhong Chen}, title = {GNN-Based Multimodal Named Entity Recognition}, journal = {Comput. J.}, volume = {67}, number = {8}, pages = {2622--2632}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxae030}, doi = {10.1093/COMJNL/BXAE030}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/GongLYYHC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/GuoHZ24, author = {Kaiwen Guo and Kexin Hu and Zhenfeng Zhang}, title = {Liveness Attacks On HotStuff: The Vulnerability Of Timer Doubling Mechanism}, journal = {Comput. J.}, volume = {67}, number = {8}, pages = {2586--2600}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxae027}, doi = {10.1093/COMJNL/BXAE027}, timestamp = {Wed, 11 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/GuoHZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/HakimNR24, author = {Sheikh Azizul Hakim and Rahnuma Islam Nishat and Md. Saidur Rahman}, title = {Approximation algorithms for maximum weighted internal spanning trees in regular graphs and subdivisions of graphs}, journal = {Comput. J.}, volume = {67}, number = {10}, pages = {2898--2905}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxae055}, doi = {10.1093/COMJNL/BXAE055}, timestamp = {Fri, 08 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/HakimNR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/HamidKA24, author = {Naila Hamid and Nazar Khan and Arbish Akram}, title = {{ELSM:} Evidence-Based Line Segment Merging}, journal = {Comput. J.}, volume = {67}, number = {7}, pages = {2498--2514}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxae021}, doi = {10.1093/COMJNL/BXAE021}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/HamidKA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/HanSCLW24, author = {Jinguang Han and Willy Susilo and Liquan Chen and Jianchang Lai and Ge Wu}, title = {Privacy-Preserving Confidential Reporting System With Designated Reporters}, journal = {Comput. J.}, volume = {67}, number = {5}, pages = {1951--1962}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad114}, doi = {10.1093/COMJNL/BXAD114}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/HanSCLW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/HatkeposhtiTG24, author = {Rahman Keramati Hatkeposhti and Meisam Yadollahzadeh Tabari and Mehdi GolsorkhtabariAmiri}, title = {Providing an Approach for Early Prediction of Fall in Human Activities Based on Wearable Sensor Data and the Use of Deep Learning Algorithms}, journal = {Comput. J.}, volume = {67}, number = {2}, pages = {658--673}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad008}, doi = {10.1093/COMJNL/BXAD008}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/HatkeposhtiTG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/HeY24, author = {Le He and Hongbo Yu}, title = {Cryptanalysis of Reduced-Round SipHash}, journal = {Comput. J.}, volume = {67}, number = {3}, pages = {875--883}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad026}, doi = {10.1093/COMJNL/BXAD026}, timestamp = {Sat, 06 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/HeY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/HouHLZCC24, author = {Changsheng Hou and Bingnan Hou and Xionglve Li and Tongqing Zhou and Yingwen Chen and Zhiping Cai}, title = {DRL-Tomo: a deep reinforcement learning-based approach to augmented data generation for network tomography}, journal = {Comput. J.}, volume = {67}, number = {10}, pages = {2995--3008}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxae064}, doi = {10.1093/COMJNL/BXAE064}, timestamp = {Fri, 08 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/HouHLZCC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/HouJHZCC24, author = {Changsheng Hou and Chunbo Jia and Bingnan Hou and Tongqing Zhou and Yingwen Chen and Zhiping Cai}, title = {A Sketch Framework for Fast, Accurate and Fine-Grained Analysis of Application Traffic}, journal = {Comput. J.}, volume = {67}, number = {6}, pages = {2039--2053}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad122}, doi = {10.1093/COMJNL/BXAD122}, timestamp = {Tue, 10 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/HouJHZCC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/HouWWGL24, author = {Shiqi Hou and Baofeng Wu and Shichang Wang and Hao Guo and Dongdai Lin}, title = {Truncated Differential Attacks On Symmetric Primitives With Linear Key Schedule: {WARP} And Orthros}, journal = {Comput. J.}, volume = {67}, number = {4}, pages = {1483--1500}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad075}, doi = {10.1093/COMJNL/BXAD075}, timestamp = {Sun, 05 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/HouWWGL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/Hsu24, author = {Ching{-}Kuo Hsu}, title = {A Genetic Algorithm Based Scheduling Method With Carrier Aggregation In 5G Networks}, journal = {Comput. J.}, volume = {67}, number = {4}, pages = {1279--1285}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad058}, doi = {10.1093/COMJNL/BXAD058}, timestamp = {Sun, 05 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/Hsu24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/HsuXCH24, author = {Ching{-}Fang Hsu and Zhe Xia and Tianshu Cheng and Lein Harn}, title = {Extremely Lightweight Constant-Round Membership-Authenticated Group Key Establishment for Resource-Constrained Smart Environments toward 5G}, journal = {Comput. J.}, volume = {67}, number = {3}, pages = {840--850}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad023}, doi = {10.1093/COMJNL/BXAD023}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/HsuXCH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/HuangH24, author = {Chung{-}Ming Huang and Shu{-}Hang Huang}, title = {Traffic-Aware Re-Grouping for Load Balance in {IEEE} 802.11ah IoT Network Based on the Registered Backoff Time Mechanism}, journal = {Comput. J.}, volume = {67}, number = {3}, pages = {884--898}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad027}, doi = {10.1093/COMJNL/BXAD027}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/HuangH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/HuangWCWL24, author = {Jiale Huang and Jigang Wu and Long Chen and Yalan Wu and Yidong Li}, title = {Coalitional Double Auction For Ridesharing With Desired Benefit And QoE Constraints}, journal = {Comput. J.}, volume = {67}, number = {5}, pages = {1674--1686}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad092}, doi = {10.1093/COMJNL/BXAD092}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/HuangWCWL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/HuangZLW24, author = {Zhuojie Huang and Shuping Zhao and Zien Liang and Jigang Wu}, title = {Discriminative Subspace Learning With Adaptive Graph Regularization}, journal = {Comput. J.}, volume = {67}, number = {9}, pages = {2823--2837}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxae049}, doi = {10.1093/COMJNL/BXAE049}, timestamp = {Fri, 08 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/HuangZLW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/HuoY24, author = {Jin Huo and Weihua Yang}, title = {Pancyclic And Hamiltonian Properties Of Dragonfly Networks}, journal = {Comput. J.}, volume = {67}, number = {3}, pages = {1201--1208}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad052}, doi = {10.1093/COMJNL/BXAD052}, timestamp = {Sun, 05 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/HuoY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/JafriGJHK24, author = {Syed Irteza Hussain Jafri and Rozaida Ghazali and Irfan Javid and Yana Mazwin Mohmad Hassim and Mubashir Hayat Khan}, title = {A Hybrid Solution For The Cold Start Problem In Recommendation}, journal = {Comput. J.}, volume = {67}, number = {5}, pages = {1637--1644}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad088}, doi = {10.1093/COMJNL/BXAD088}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/JafriGJHK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/JiaQ24, author = {Huanshen Jia and Jianguo Qian}, title = {Menger-Type Connectivity of Line Graphs of Generalized Hypercubes With Faulty Edges}, journal = {Comput. J.}, volume = {67}, number = {6}, pages = {2118--2125}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad126}, doi = {10.1093/COMJNL/BXAD126}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/JiaQ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/JiaWR24, author = {Hairong Jia and Suying Wang and Zelong Ren}, title = {{CNN-LSTM} Base Station Traffic Prediction Based On Dual Attention Mechanism and Timing Application}, journal = {Comput. J.}, volume = {67}, number = {6}, pages = {2246--2256}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxae003}, doi = {10.1093/COMJNL/BXAE003}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/JiaWR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/JinM24, author = {Yaoan Jin and Atsuko Miyaji}, title = {Secure and Compact Elliptic Curve Scalar Multiplication with Optimized Inversion}, journal = {Comput. J.}, volume = {67}, number = {2}, pages = {474--484}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxac188}, doi = {10.1093/COMJNL/BXAC188}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/JinM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/JosephSB24, author = {Mabin Joseph and Gautham Sekar and R. Balasubramanian}, title = {Revisiting the Software-Efficient Stream Ciphers {RCR-64} and {RCR-32}}, journal = {Comput. J.}, volume = {67}, number = {4}, pages = {1590--1602}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad084}, doi = {10.1093/COMJNL/BXAD084}, timestamp = {Sat, 06 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/JosephSB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/Kamareddine24, author = {Fairouz Kamareddine}, title = {Thematic Editorial, It Is Hard To Imagine {A} World Without Algorithms and Data Science}, journal = {Comput. J.}, volume = {67}, number = {5}, pages = {1605--1606}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxae046}, doi = {10.1093/COMJNL/BXAE046}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/Kamareddine24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/KameiT24, author = {Sayaka Kamei and S{\'{e}}bastien Tixeuil}, title = {An Asynchronous Maximum Independent Set Algorithm By Myopic Luminous Robots On Grids}, journal = {Comput. J.}, volume = {67}, number = {1}, pages = {57--77}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxac158}, doi = {10.1093/COMJNL/BXAC158}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/KameiT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/KaraoglanF24, author = {K{\"{u}}rsat Mustafa Karaoglan and Oguz Findik}, title = {Enhancing Aspect Category Detection Through Hybridised Contextualised Neural Language Models: {A} Case Study In Multi-Label Text Classification}, journal = {Comput. J.}, volume = {67}, number = {6}, pages = {2257--2269}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxae004}, doi = {10.1093/COMJNL/BXAE004}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/KaraoglanF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/KaurSSGSB24, author = {Ravneet Kaur and Amrinderpreet Singh and Aekamjot Singh and Amit Goyal and Amritpal Singh and Shalini Batra}, title = {An Efficient Pending Interest Table Content Search In {NDN} through Stable Bloom Filter}, journal = {Comput. J.}, volume = {67}, number = {3}, pages = {941--946}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad033}, doi = {10.1093/COMJNL/BXAD033}, timestamp = {Sun, 05 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/KaurSSGSB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/KhanNWT24, author = {Marwa Khan and Asma Naseer and Aamir Wali and Maria Tamoor}, title = {A Roman Urdu Corpus for sentiment analysis}, journal = {Comput. J.}, volume = {67}, number = {9}, pages = {2864--2876}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxae052}, doi = {10.1093/COMJNL/BXAE052}, timestamp = {Fri, 08 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/KhanNWT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/KumarS24, author = {Ashutosh Kumar and Aakanksha Sharaff}, title = {SnorkelPlus: {A} Novel Approach for Identifying Relationships Among Biomedical Entities Within Abstracts}, journal = {Comput. J.}, volume = {67}, number = {3}, pages = {1187--1200}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad051}, doi = {10.1093/COMJNL/BXAD051}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/KumarS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/KushwahaKBK24, author = {Arati Kushwaha and Manish Khare and Reddy Mounika Bommisetty and Ashish Khare}, title = {Human Activity Recognition Based On Video Summarization And Deep Convolutional Neural Network}, journal = {Comput. J.}, volume = {67}, number = {8}, pages = {2601--2609}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxae028}, doi = {10.1093/COMJNL/BXAE028}, timestamp = {Wed, 11 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/KushwahaKBK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/LeiQZHW24, author = {Yu Lei and Keshuai Qu and Yifan Zhao and Qing Han and Xuguang Wang}, title = {Multimodal Sentiment Analysis Based on Composite Hierarchical Fusion}, journal = {Comput. J.}, volume = {67}, number = {6}, pages = {2230--2245}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxae002}, doi = {10.1093/COMJNL/BXAE002}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/LeiQZHW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/Lemire24, author = {Daniel Lemire}, title = {Exact Short Products From Truncated Multipliers}, journal = {Comput. J.}, volume = {67}, number = {4}, pages = {1514--1520}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad077}, doi = {10.1093/COMJNL/BXAD077}, timestamp = {Sun, 05 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/Lemire24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/LiJLQ24, author = {He Li and Duo Jin and Xuejiao Li and Shaojie Qiao}, title = {A Dynamic Heterogeneous Graph Convolution Network For Traffic Flow Prediction}, journal = {Comput. J.}, volume = {67}, number = {1}, pages = {31--44}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxac156}, doi = {10.1093/COMJNL/BXAC156}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/LiJLQ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/LiLW24, author = {Lingyun Li and Xianhui Lu and Kunpeng Wang}, title = {eBiBa: {A} Post-Quantum Hash-Based Signature With Small Signature Size in the Continuous Communication of Large-Scale Data}, journal = {Comput. J.}, volume = {67}, number = {4}, pages = {1405--1424}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad068}, doi = {10.1093/COMJNL/BXAD068}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/LiLW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/LiQJTMF24, author = {Yue Li and Jianfang Qi and Haibin Jin and Dong Tian and Weisong Mu and Jianying Feng}, title = {An Improved Genetic-XGBoost Classifier for Customer Consumption Behavior Prediction}, journal = {Comput. J.}, volume = {67}, number = {3}, pages = {1041--1059}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad041}, doi = {10.1093/COMJNL/BXAD041}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/LiQJTMF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/LiYL24, author = {Chenghao Li and Xinyan Yang and Gang Liang}, title = {Keyframe-guided Video Swin Transformer with Multi-path Excitation for Violence Detection}, journal = {Comput. J.}, volume = {67}, number = {5}, pages = {1826--1837}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad103}, doi = {10.1093/COMJNL/BXAD103}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/LiYL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/LiZNYMJZ24, author = {Tongfeng Li and Ruisheng Zhang and Bojuan Niu and Yabing Yao and Jun Ma and Jing Jiang and Zhili Zhao}, title = {Link Prediction Based On Local Structure And Node Information Along Local Paths}, journal = {Comput. J.}, volume = {67}, number = {1}, pages = {45--56}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxac157}, doi = {10.1093/COMJNL/BXAC157}, timestamp = {Sat, 27 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/LiZNYMJZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/LinCCLYZTZ24, author = {Tu{-}Liang Lin and Hong{-}Yi Chang and Yuan{-}Yao Chiang and Shu{-}Cheng Lin and Tsung{-}Yen Yang and Chun{-}Jun Zhuang and Wha{-}Lee Tseng and Bo{-}Hao Zhang}, title = {Ransomware Detection by Distinguishing {API} Call Sequences through {LSTM} and {BERT} Models}, journal = {Comput. J.}, volume = {67}, number = {2}, pages = {632--641}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad005}, doi = {10.1093/COMJNL/BXAD005}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/LinCCLYZTZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/LinL24, author = {Zhaoliang Lin and Jinguo Li}, title = {FedEVCP: Federated Learning-Based Anomalies Detection for Electric Vehicle Charging Pile}, journal = {Comput. J.}, volume = {67}, number = {4}, pages = {1521--1530}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad078}, doi = {10.1093/COMJNL/BXAD078}, timestamp = {Sat, 06 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/LinL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/LinLFJW24, author = {Nankai Lin and Xiaotian Lin and Yingwen Fu and Shengyi Jiang and Lianxi Wang}, title = {A Chinese Grammatical Error Correction Model Based On Grammatical Generalization And Parameter Sharing}, journal = {Comput. J.}, volume = {67}, number = {5}, pages = {1628--1636}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad087}, doi = {10.1093/COMJNL/BXAD087}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/LinLFJW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/LinXWD24, author = {Keao Lin and Xiaozhu Xie and Wei Weng and Xiaofeng Du}, title = {Global-local graph attention: unifying global and local attention for node classification}, journal = {Comput. J.}, volume = {67}, number = {10}, pages = {2959--2969}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxae060}, doi = {10.1093/COMJNL/BXAE060}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/LinXWD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/Liu24, author = {Tzong{-}Jye Liu}, title = {Adversarial Attacks on Network Intrusion Detection Systems Using Flow Containers}, journal = {Comput. J.}, volume = {67}, number = {2}, pages = {728--745}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad014}, doi = {10.1093/COMJNL/BXAD014}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/Liu24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/Liu24a, author = {Jia{-}Jie Liu}, title = {The Orbits of Folded Crossed Cubes}, journal = {Comput. J.}, volume = {67}, number = {5}, pages = {1719--1726}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad096}, doi = {10.1093/COMJNL/BXAD096}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/Liu24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/LiuC24, author = {Heqin Liu and Dongqin Cheng}, title = {Structure Fault Tolerance of Exchanged Hypercube}, journal = {Comput. J.}, volume = {67}, number = {2}, pages = {527--536}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxac194}, doi = {10.1093/COMJNL/BXAC194}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/LiuC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/LiuDWFM24, author = {Xiaoyang Liu and Nan Ding and Yudie Wu and Giacomo Fiumara and Pasquale De Meo}, title = {Discrete-Time Quantum Walks Community Detection in Multi-Domain Networks}, journal = {Comput. J.}, volume = {67}, number = {6}, pages = {2379--2389}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxae013}, doi = {10.1093/COMJNL/BXAE013}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/LiuDWFM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/LiuFMF24, author = {Xiaoyang Liu and Xiaoyang Fu and Pasquale De Meo and Giacomo Fiumara}, title = {Cross-Domain Recommendation To Cold-Start Users Via Categorized Preference Transfer}, journal = {Comput. J.}, volume = {67}, number = {8}, pages = {2610--2621}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxae029}, doi = {10.1093/COMJNL/BXAE029}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/LiuFMF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/LiuFZ24, author = {Changan Liu and Changjun Fan and Zhongzhi Zhang}, title = {Finding Influencers in Complex Networks: An Effective Deep Reinforcement Learning Approach}, journal = {Comput. J.}, volume = {67}, number = {2}, pages = {463--473}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxac187}, doi = {10.1093/COMJNL/BXAC187}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/LiuFZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/LiuGCMP24, author = {Weihua Liu and Bing Gong and Kai Che and Jieming Ma and Yushan Pan}, title = {Anomaly Metrics on Class Variations For Face Anti-Spoofing}, journal = {Comput. J.}, volume = {67}, number = {9}, pages = {2725--2738}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxae039}, doi = {10.1093/COMJNL/BXAE039}, timestamp = {Fri, 08 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/LiuGCMP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/LiuGFM24, author = {Xiaoyang Liu and Luyuan Gao and Giacomo Fiumara and Pasquale De Meo}, title = {Key Node Identification Method Integrating Information Transmission Probability and Path Diversity in Complex Network}, journal = {Comput. J.}, volume = {67}, number = {1}, pages = {127--141}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxac162}, doi = {10.1093/COMJNL/BXAC162}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/LiuGFM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/LiuGXGG24, author = {Mengqi Liu and Hang Gao and Xiaofan Xia and Suying Gui and Tiegang Gao}, title = {Perceptual Image Hashing Based on Canny Operator and Tensor for Copy-Move Forgery Detection}, journal = {Comput. J.}, volume = {67}, number = {2}, pages = {447--462}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxac186}, doi = {10.1093/COMJNL/BXAC186}, timestamp = {Wed, 31 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/LiuGXGG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/LiuLTLSC24, author = {Kang Liu and Yang Lu and Shiyi Tan and Wei Liang and Huiping Sun and Zhong Chen}, title = {CFAuditChain: Audit BlockChain Based On Cuckoo Filter}, journal = {Comput. J.}, volume = {67}, number = {6}, pages = {2208--2218}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad133}, doi = {10.1093/COMJNL/BXAD133}, timestamp = {Mon, 08 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/LiuLTLSC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/LiuRGHMB24, author = {Shuai Liu and Jizhou Ren and Jie Guan and Bin Hu and Sudong Ma and Hao Bai}, title = {A Break Of Barrier To Classical Differential Fault Attack On The Nonce-Based Authenticated Encryption Algorithm}, journal = {Comput. J.}, volume = {67}, number = {4}, pages = {1370--1380}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad066}, doi = {10.1093/COMJNL/BXAD066}, timestamp = {Sat, 06 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/LiuRGHMB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/LiuWZR24, author = {Ya Liu and Yuanhang Wu and Fengyv Zhao and Yanli Ren}, title = {Balanced Off-Chain Payment Channel Network Routing Strategy Based On Weight Calculation}, journal = {Comput. J.}, volume = {67}, number = {3}, pages = {907--922}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad029}, doi = {10.1093/COMJNL/BXAD029}, timestamp = {Sun, 05 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/LiuWZR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/LiuZLZ24, author = {Xiaoqing Liu and Shuming Zhou and Jiafei Liu and Hong Zhang}, title = {Reliability Analysis of the Cactus-Based Networks Based on Subsystem}, journal = {Comput. J.}, volume = {67}, number = {1}, pages = {142--152}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxac163}, doi = {10.1093/COMJNL/BXAC163}, timestamp = {Tue, 03 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/LiuZLZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/LouSS24, author = {Paul Lou and Amit Sahai and Varun Sivashankar}, title = {Relinearization Attack On {LPN} Over Large Fields}, journal = {Comput. J.}, volume = {67}, number = {4}, pages = {1438--1442}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad070}, doi = {10.1093/COMJNL/BXAD070}, timestamp = {Sat, 06 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/LouSS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/LouatiKA24, author = {Faten Louati and Farah Barika Ktata and Ikram Amous}, title = {An Intelligent Security System Using Enhanced Anomaly-Based Detection Scheme}, journal = {Comput. J.}, volume = {67}, number = {6}, pages = {2317--2330}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxae008}, doi = {10.1093/COMJNL/BXAE008}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/LouatiKA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/LuL24, author = {Meilian Lu and Meng Li}, title = {A Multiple QoS Metrics-Aware Virtual Network Embedding Algorithm}, journal = {Comput. J.}, volume = {67}, number = {3}, pages = {1171--1186}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad050}, doi = {10.1093/COMJNL/BXAD050}, timestamp = {Sun, 05 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/LuL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/LuLCL24, author = {Jiqiang Lu and Jingyu Li and Zexuan Chen and Yanan Li}, title = {Cryptanalysis Of {A} Type Of White-Box Implementations Of The {SM4} Block Cipher}, journal = {Comput. J.}, volume = {67}, number = {5}, pages = {1663--1673}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad091}, doi = {10.1093/COMJNL/BXAD091}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/LuLCL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/LuLSLL24, author = {Jinyu Lu and Guoqiang Liu and Bing Sun and Chao Li and Li Liu}, title = {Improved (Related-Key) Differential-Based Neural Distinguishers for {SIMON} and {SIMECK} Block Ciphers}, journal = {Comput. J.}, volume = {67}, number = {2}, pages = {537--547}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxac195}, doi = {10.1093/COMJNL/BXAC195}, timestamp = {Sun, 31 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/LuLSLL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/LuZLDL24, author = {Senxing Lu and Mingming Zhao and Chunlin Li and Quanbing Du and Youlong Luo}, title = {Time-Aware Data Partition Optimization and Heterogeneous Task Scheduling Strategies in Spark Clusters}, journal = {Comput. J.}, volume = {67}, number = {2}, pages = {762--776}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad017}, doi = {10.1093/COMJNL/BXAD017}, timestamp = {Fri, 05 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/LuZLDL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/LuoC24, author = {Qin Luo and Xin Cao}, title = {{PNCTS:} {A} Prediction and Network Coding-Based Transmission Scheme for Efficient Screen Updates Delivery in DaaS}, journal = {Comput. J.}, volume = {67}, number = {1}, pages = {153--168}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxac164}, doi = {10.1093/COMJNL/BXAC164}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/LuoC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/LvFDW24, author = {Mengjie Lv and Weibei Fan and Hui Dong and Guijuan Wang}, title = {Fault tolerance of hierarchical cubic networks based on cluster fault pattern}, journal = {Comput. J.}, volume = {67}, number = {10}, pages = {2890--2897}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxae054}, doi = {10.1093/COMJNL/BXAE054}, timestamp = {Fri, 08 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/LvFDW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/LvSHGGW24, author = {Yin Lv and Danping Shi and Lei Hu and Zihui Guo and Yi Guo and Caibing Wang}, title = {Improved Linear Cryptanalysis of Block Cipher {BORON}}, journal = {Comput. J.}, volume = {67}, number = {1}, pages = {210--219}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxac169}, doi = {10.1093/COMJNL/BXAC169}, timestamp = {Sat, 27 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/LvSHGGW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/MaWHHM24, author = {Dongchao Ma and Dongmei Wang and Xiaofu Huang and Yuekun Hu and Li Ma}, title = {{KEFSAR:} {A} Solar-Aware Routing Strategy For Rechargeable IoT Based On High-Accuracy Prediction}, journal = {Comput. J.}, volume = {67}, number = {4}, pages = {1467--1482}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad074}, doi = {10.1093/COMJNL/BXAD074}, timestamp = {Sun, 05 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/MaWHHM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/Manolopoulos24, author = {Yannis Manolopoulos}, title = {Thematic Editorial: The Ubiquitous Network}, journal = {Comput. J.}, volume = {67}, number = {3}, pages = {809--811}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxae032}, doi = {10.1093/COMJNL/BXAE032}, timestamp = {Sun, 05 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/Manolopoulos24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/Manolopoulos24a, author = {Yannis Manolopoulos}, title = {Thematic editorial: sentiment analysis}, journal = {Comput. J.}, volume = {67}, number = {7}, pages = {2403--2407}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxae061}, doi = {10.1093/COMJNL/BXAE061}, timestamp = {Wed, 07 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/Manolopoulos24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ManzaliABAF24, author = {Youness Manzali and Yassine Akhiat and Khalidou Abdoulaye Barry and Elyazid Akachar and Mohamed El Far}, title = {Prediction of Student Performance Using Random Forest Combined With Na{\"{\i}}ve Bayes}, journal = {Comput. J.}, volume = {67}, number = {8}, pages = {2677--2689}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxae036}, doi = {10.1093/COMJNL/BXAE036}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/ManzaliABAF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/MarandiAAJ24, author = {Ali Marandi and Pedro Geraldo M. R. Alves and Diego F. Aranha and Rune Hylsberg Jacobsen}, title = {Lattice-Based Homomorphic Encryption For Privacy-Preserving Smart Meter Data Analytics}, journal = {Comput. J.}, volume = {67}, number = {5}, pages = {1687--1698}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad093}, doi = {10.1093/COMJNL/BXAD093}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/MarandiAAJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/MeiWQZL24, author = {Xianyun Mei and Liangliang Wang and Baodong Qin and Kai Zhang and Yu Long}, title = {{EFTA:} An Efficient and Fault-Tolerant Data Aggregation Scheme without {TTP} in Smart Grid}, journal = {Comput. J.}, volume = {67}, number = {6}, pages = {2368--2378}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxae012}, doi = {10.1093/COMJNL/BXAE012}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/MeiWQZL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/NavinNJA24, author = {K. S. Navin and H. Khannah Nehemiah and Y. Nancy Jane and Kannan Arputharaj}, title = {Clinical Dataset Classification Using Feature Ranking And Satin Bower Bird Optimized SVMs}, journal = {Comput. J.}, volume = {67}, number = {5}, pages = {1993--2006}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad118}, doi = {10.1093/COMJNL/BXAD118}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/NavinNJA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/Oksuz24, author = {Ozgur Oksuz}, title = {A System For Storing Anonymous Patient Healthcare Data Using Blockchain And Its Applications}, journal = {Comput. J.}, volume = {67}, number = {1}, pages = {18--30}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxac155}, doi = {10.1093/COMJNL/BXAC155}, timestamp = {Tue, 06 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/Oksuz24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/PaikJ24, author = {Joon{-}Young Paik and Rize Jin}, title = {Malware Family Prediction with an Awareness of Label Uncertainty}, journal = {Comput. J.}, volume = {67}, number = {1}, pages = {376--390}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxac181}, doi = {10.1093/COMJNL/BXAC181}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/PaikJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/Perez24, author = {J. Ayuso Perez}, title = {Hardware Addition Over Finite Fields Based On Booth-Karatsuba Algorithm}, journal = {Comput. J.}, volume = {67}, number = {8}, pages = {2643--2666}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxae034}, doi = {10.1093/COMJNL/BXAE034}, timestamp = {Fri, 20 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/Perez24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/PourianFT24, author = {Reza Ebrahim Pourian and Mehdi Fartash and Javad Akbari Torkestani}, title = {A Deep Learning Model for Energy-Aware Task Scheduling Algorithm Based on Learning Automata for Fog Computing}, journal = {Comput. J.}, volume = {67}, number = {2}, pages = {508--518}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxac192}, doi = {10.1093/COMJNL/BXAC192}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/PourianFT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/QiWC24, author = {Han Qi and Jingtong Wang and Yufan Cui}, title = {{VQCNN:} variational quantum convolutional neural networks based on quantum filters and fully connected layers}, journal = {Comput. J.}, volume = {67}, number = {10}, pages = {2970--2983}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxae062}, doi = {10.1093/COMJNL/BXAE062}, timestamp = {Fri, 08 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/QiWC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/QiuLZ24, author = {Liqing Qiu and Yuying Liu and Jianyi Zhang}, title = {A New Method for Identifying Influential Spreaders in Complex Networks}, journal = {Comput. J.}, volume = {67}, number = {1}, pages = {362--375}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxac180}, doi = {10.1093/COMJNL/BXAC180}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/QiuLZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/RamtekkarPP24, author = {Praveen Kumar Ramtekkar and Anjana Pandey and Mahesh Kumar Pawar}, title = {A Comprehensive Review of Brain Tumour Detection Mechanisms}, journal = {Comput. J.}, volume = {67}, number = {3}, pages = {1126--1152}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad047}, doi = {10.1093/COMJNL/BXAD047}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/RamtekkarPP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/RenMW24, author = {Dawei Ren and Lingwei Meng and Rui Wang}, title = {Borehole Depth Recognition Based on Improved {YOLOX} Detection}, journal = {Comput. J.}, volume = {67}, number = {7}, pages = {2408--2420}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxae015}, doi = {10.1093/COMJNL/BXAE015}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/RenMW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/Saeed24, author = {Mozamel M. Saeed}, title = {Designing Scenarios for In-Organization Training Using the CyberCIEGE Game}, journal = {Comput. J.}, volume = {67}, number = {1}, pages = {338--346}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxac177}, doi = {10.1093/COMJNL/BXAC177}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/Saeed24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/SamiaAK24, author = {Hireche Samia and Dennai Abdeslem and Boufeldja Kadri}, title = {Toward a Novel {RESTFUL} Big Data-Based Urban Traffic Incident Data Web Service for Connected Vehicles}, journal = {Comput. J.}, volume = {67}, number = {2}, pages = {557--580}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad001}, doi = {10.1093/COMJNL/BXAD001}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/SamiaAK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/SandhyaK24, author = {Sandhya and Abhishek Kashyap}, title = {A Light Weight Depthwise Separable Layer Optimized {CNN} Architecture for Object-Based Forgery Detection in Surveillance Videos}, journal = {Comput. J.}, volume = {67}, number = {6}, pages = {2270--2285}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxae005}, doi = {10.1093/COMJNL/BXAE005}, timestamp = {Mon, 15 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/SandhyaK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/SethCS24, author = {Sugandh Seth and Kuljit Kaur Chahal and Gurvinder Singh}, title = {Concept Drift-Based Intrusion Detection For Evolving Data Stream Classification In {IDS:} Approaches And Comparative Study}, journal = {Comput. J.}, volume = {67}, number = {7}, pages = {2529--2547}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxae023}, doi = {10.1093/COMJNL/BXAE023}, timestamp = {Thu, 22 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/SethCS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ShajiS24, author = {C. Shaji and I. Shatheesh Sam}, title = {Encoding with Combination Orientation Technique for {RDH} in Dual Stego Images}, journal = {Comput. J.}, volume = {67}, number = {1}, pages = {347--361}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxac178}, doi = {10.1093/COMJNL/BXAC178}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/ShajiS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ShamsizadehZA24, author = {Marzieh Shamsizadeh and Mohammad Mehdi Zahedi and Khadijeh Abolpour}, title = {Irreducible Fuzzy Multiset Finite Automaton}, journal = {Comput. J.}, volume = {67}, number = {2}, pages = {519--526}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxac193}, doi = {10.1093/COMJNL/BXAC193}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/ShamsizadehZA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/Shang24, author = {Yilun Shang}, title = {Resilient Vector Consensus Over Random Dynamic Networks Under Mobile Malicious Attacks}, journal = {Comput. J.}, volume = {67}, number = {3}, pages = {1076--1086}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad043}, doi = {10.1093/COMJNL/BXAD043}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/Shang24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ShiLL24, author = {Jiali Shi and Chao Li and Guoqiang Liu}, title = {Differential Attack With Constants On {\(\mu\)}2 Block Cipher}, journal = {Comput. J.}, volume = {67}, number = {1}, pages = {195--209}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxac168}, doi = {10.1093/COMJNL/BXAC168}, timestamp = {Thu, 01 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/ShiLL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ShouLWCHZWW24, author = {Dingyu Shou and Chao Li and Zhen Wang and Song Cheng and Xiaobo Hu and Kai Zhang and Mi Wen and Yong Wang}, title = {An Intrusion Detection Method Based on Attention Mechanism to Improve CNN-BiLSTM Model}, journal = {Comput. J.}, volume = {67}, number = {5}, pages = {1851--1865}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad105}, doi = {10.1093/COMJNL/BXAD105}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/ShouLWCHZWW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ShuWFW24, author = {Chang Shu and Yan Wang and Jianxi Fan and Guijuan Wang}, title = {Super Structure Fault-Tolerance Assessment of the Generalized Hypercube}, journal = {Comput. J.}, volume = {67}, number = {4}, pages = {1457--1466}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad072}, doi = {10.1093/COMJNL/BXAD072}, timestamp = {Sun, 05 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/ShuWFW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/SiLW24, author = {Shumin Si and Xiuhan Lin and Puwen Wei}, title = {Compressed Zero-Knowledge Proofs for Lattice-Based Accumulator}, journal = {Comput. J.}, volume = {67}, number = {2}, pages = {694--708}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad011}, doi = {10.1093/COMJNL/BXAD011}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/SiLW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/SimpsonDW24, author = {Andrew Simpson and Matthias Dellago and Daniel W. Woods}, title = {Formalizing Attack Trees To Support Economic Analysis}, journal = {Comput. J.}, volume = {67}, number = {1}, pages = {220--235}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxac170}, doi = {10.1093/COMJNL/BXAC170}, timestamp = {Thu, 20 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/SimpsonDW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/SongZHWC24, author = {Yongcheng Song and Jiang Zhang and Xinyi Huang and Wei Wu and Haixia Chen}, title = {Analysis and Construction of Zero-Knowledge Proofs for the MinRank Problem}, journal = {Comput. J.}, volume = {67}, number = {3}, pages = {1060--1075}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad042}, doi = {10.1093/COMJNL/BXAD042}, timestamp = {Thu, 18 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/SongZHWC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/StrappaB24, author = {Jan Strappa and Facundo Bromberg}, title = {Efficient Comparison Of Independence Structures Of Log-Linear Models}, journal = {Comput. J.}, volume = {67}, number = {4}, pages = {1226--1252}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad054}, doi = {10.1093/COMJNL/BXAD054}, timestamp = {Sun, 05 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/StrappaB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/SubramaniamK24, author = {Erana Veerappa Dinesh Subramaniam and Valarmathi Krishnasamy}, title = {Hybrid Optimal Ensemble {SVM} Forest Classifier for Task Offloading in Mobile Cloud Computing}, journal = {Comput. J.}, volume = {67}, number = {4}, pages = {1286--1297}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad059}, doi = {10.1093/COMJNL/BXAD059}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/SubramaniamK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/Suchenek24, author = {Marek A. Suchenek}, title = {Worst-Case Analysis of Heapsort, Exactly}, journal = {Comput. J.}, volume = {67}, number = {3}, pages = {812--824}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad007}, doi = {10.1093/COMJNL/BXAD007}, timestamp = {Sun, 05 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/Suchenek24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/SultanVDCN24, author = {Nazatul Haque Sultan and Vijay Varadharajan and Saurab Dulal and Seyit Camtepe and Surya Nepal}, title = {{NDN-RBE:} An Accountable Privacy Aware Access Control Framework For {NDN}}, journal = {Comput. J.}, volume = {67}, number = {4}, pages = {1572--1589}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad083}, doi = {10.1093/COMJNL/BXAD083}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/SultanVDCN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/SunLYLZF24, author = {Daoqiang Sun and Hongbo Liu and Yu Yang and Long Li and Heng Zhang and Asfand Fahad}, title = {Enumeration Of Subtrees Of Two Families Of Self-Similar Networks Based On Novel Two-Forest Dual Transformations}, journal = {Comput. J.}, volume = {67}, number = {5}, pages = {1652--1662}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad090}, doi = {10.1093/COMJNL/BXAD090}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/SunLYLZF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/TaheriR24, author = {Fatemeh Taheri and Kambiz Rahbar}, title = {Coverless Image Steganography Using Content-Based Image Patch Retrieval}, journal = {Comput. J.}, volume = {67}, number = {9}, pages = {2799--2808}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxae045}, doi = {10.1093/COMJNL/BXAE045}, timestamp = {Fri, 08 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/TaheriR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/TangDZLL24, author = {Fang Tang and Nengsheng Du and Zhong Zhengwei and Chunlin Li and Youlong Luo}, title = {An improved sensing data cleaning scheme for object localization in edge computing environment}, journal = {Comput. J.}, volume = {67}, number = {9}, pages = {2838--2853}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxae050}, doi = {10.1093/COMJNL/BXAE050}, timestamp = {Fri, 08 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/TangDZLL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/TehraniTZE24, author = {Amir Tehrani and Meisam Yadollahzadeh Tabari and Aidin Zehtab{-}Salmasi and Rasul Enayatifar}, title = {Wearable Sensor-Based Human Activity Recognition System Employing Bi-LSTM Algorithm}, journal = {Comput. J.}, volume = {67}, number = {3}, pages = {961--975}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad035}, doi = {10.1093/COMJNL/BXAD035}, timestamp = {Sat, 06 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/TehraniTZE24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/Thimbleby24, author = {Harold Thimbleby}, title = {Improving Science That Uses Code}, journal = {Comput. J.}, volume = {67}, number = {4}, pages = {1381--1404}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad067}, doi = {10.1093/COMJNL/BXAD067}, timestamp = {Sat, 06 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/Thimbleby24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/TianLDYL24, author = {Yangguang Tian and Yingjiu Li and Robert H. Deng and Guomin Yang and Nan Li}, title = {Policy-Based Remote User Authentication From Multi-Biometrics}, journal = {Comput. J.}, volume = {67}, number = {5}, pages = {1814--1825}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad102}, doi = {10.1093/COMJNL/BXAD102}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/TianLDYL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/TianZSX24, author = {Junfeng Tian and Qi Zhu and Jiawei Shen and Tengfei Xu}, title = {{TPRT:} a trajectory publishing scheme for the Internet of Vehicles based on radix tree}, journal = {Comput. J.}, volume = {67}, number = {10}, pages = {2920--2933}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxae057}, doi = {10.1093/COMJNL/BXAE057}, timestamp = {Fri, 08 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/TianZSX24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/TiryakiT24, author = {Volkan M{\"{u}}jdat Tiryaki and Nedim Tutkun}, title = {Breast Cancer Mass Classification Using Machine Learning, Binary-Coded Genetic Algorithms and an Ensemble of Deep Transfer Learning}, journal = {Comput. J.}, volume = {67}, number = {3}, pages = {1111--1125}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad046}, doi = {10.1093/COMJNL/BXAD046}, timestamp = {Sat, 06 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/TiryakiT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/VisuwalingamSAR24, author = {Hemakasiny Visuwalingam and Ratnasingam Sakuntharaj and Janaka Alawatugoda and Roshan G. Ragel}, title = {Deep Learning Model for Tamil Part-of-Speech Tagging}, journal = {Comput. J.}, volume = {67}, number = {8}, pages = {2633--2642}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxae033}, doi = {10.1093/COMJNL/BXAE033}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/VisuwalingamSAR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/WalshKWIOGDGD24, author = {James Walsh and Oluwafunmilola Kesa and Andrew Wang and Mihai Ilas and Patrick O'Hara and Oscar Giles and Neil Dhir and Mark Girolami and Theodoros Damoulas}, title = {Near Real-Time Social Distance Estimation In London}, journal = {Comput. J.}, volume = {67}, number = {1}, pages = {95--109}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxac160}, doi = {10.1093/COMJNL/BXAC160}, timestamp = {Sat, 27 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/WalshKWIOGDGD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/WangCLY24, author = {Haizhen Wang and Zhiqing Cui and Zuozheng Lian and Jinying Yan}, title = {An improved {DNN} model for {WLAN} intrusion detection}, journal = {Comput. J.}, volume = {67}, number = {9}, pages = {2854--2863}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxae051}, doi = {10.1093/COMJNL/BXAE051}, timestamp = {Fri, 08 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/WangCLY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/WangCWYF24, author = {Yihong Wang and Baolei Cheng and Yan Wang and Jia Yu and Jianxi Fan}, title = {Strongly Menger Connectedness of a Class of Recursive Networks}, journal = {Comput. J.}, volume = {67}, number = {6}, pages = {2030--2038}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad121}, doi = {10.1093/COMJNL/BXAD121}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/WangCWYF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/WangLW24, author = {Xin Wang and Li Lin and Yao Wang}, title = {Stealth Address Schemes With Fast Retrievability Based On Subgroup Membership Assumptions Related To Factoring}, journal = {Comput. J.}, volume = {67}, number = {4}, pages = {1253--1264}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad056}, doi = {10.1093/COMJNL/BXAD056}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/WangLW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/WangWSW24, author = {Zhuowei Wang and Hao Wang and Xiaoyu Song and Jiahui Wu}, title = {Communication-Aware Energy Consumption Model in Heterogeneous Computing Systems}, journal = {Comput. J.}, volume = {67}, number = {1}, pages = {78--94}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxac159}, doi = {10.1093/COMJNL/BXAC159}, timestamp = {Fri, 10 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/WangWSW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/WangWZZ24, author = {Bolin Wang and Wenling Wu and Yuhan Zhang and Li Zhang}, title = {New Integral Distinguishers On Permutation Of Whirlpool}, journal = {Comput. J.}, volume = {67}, number = {3}, pages = {899--906}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad028}, doi = {10.1093/COMJNL/BXAD028}, timestamp = {Sat, 06 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/WangWZZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/WangZ24, author = {Ping Wang and Ruisheng Zhang}, title = {Influence Maximization in Social Networks Using an Improved Multi-Objective Particle Swarm Optimization}, journal = {Comput. J.}, volume = {67}, number = {6}, pages = {2137--2150}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad128}, doi = {10.1093/COMJNL/BXAD128}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/WangZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/WangZGZXZ24, author = {Shurui Wang and Yuhe Zhang and Ruizhe Guo and Yaning Zhang and Yifei Xie and Xinyu Zhou}, title = {2L-LSH: {A} Locality-Sensitive Hash Function-Based Method For Rapid Point Cloud Indexing}, journal = {Comput. J.}, volume = {67}, number = {9}, pages = {2809--2818}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxae047}, doi = {10.1093/COMJNL/BXAE047}, timestamp = {Fri, 08 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/WangZGZXZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/WangZJXLSH24, author = {Ke Wang and Zhenfeng Zhang and Haodong Jiang and Huiqin Xie and Yanjun Li and Ying Sun and Lidong Han}, title = {Key Reuse Attacks on Post-quantum Cryptosystems, Revisited}, journal = {Comput. J.}, volume = {67}, number = {1}, pages = {323--337}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxac176}, doi = {10.1093/COMJNL/BXAC176}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/WangZJXLSH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/WangZLWXN24, author = {Xiwen Wang and Kai Zhang and Jinguo Li and Mi Wen and Shengmin Xu and Jianting Ning}, title = {Non-interactive Boolean Searchable Asymmetric Encryption With Bilateral Access Control}, journal = {Comput. J.}, volume = {67}, number = {1}, pages = {179--194}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxac166}, doi = {10.1093/COMJNL/BXAC166}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/WangZLWXN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/WangZPZ24, author = {Chiheng Wang and Shibin Zhao and Jianshan Peng and Junhu Zhu}, title = {{KVFL:} Key-Value-Based Persistent Fuzzing for IoT Web Servers}, journal = {Comput. J.}, volume = {67}, number = {5}, pages = {1892--1909}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad110}, doi = {10.1093/COMJNL/BXAD110}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/WangZPZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/WeiLY24, author = {Chuancheng Wei and Gang Liang and Kexiang Yan}, title = {BotGSL: Twitter Bot Detection with Graph Structure Learning}, journal = {Comput. J.}, volume = {67}, number = {7}, pages = {2486--2497}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxae020}, doi = {10.1093/COMJNL/BXAE020}, timestamp = {Wed, 07 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/WeiLY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/WuCDZCS24, author = {Tongshuai Wu and Liwei Chen and Gewangzi Du and Chenguang Zhu and Ningning Cui and Gang Shi}, title = {{CDNM:} Clustering-Based Data Normalization Method For Automated Vulnerability Detection}, journal = {Comput. J.}, volume = {67}, number = {4}, pages = {1538--1549}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad080}, doi = {10.1093/COMJNL/BXAD080}, timestamp = {Sat, 06 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/WuCDZCS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/X24, title = {Correction to: An Attack on a Proposed Construction of Small-State Stream Ciphers and Proposals for New Constructions}, journal = {Comput. J.}, volume = {67}, number = {2}, pages = {806}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad020}, doi = {10.1093/COMJNL/BXAD020}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/X24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/X24a, title = {Correction to: Performance Evaluation of FPGA-Based {LSTM} Neural Networks for Pulse Signal Detection on Real-Time Radar Warning Receivers}, journal = {Comput. J.}, volume = {67}, number = {2}, pages = {807}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad021}, doi = {10.1093/COMJNL/BXAD021}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/X24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/X24b, title = {Correction to: Perceptual Image Hashing Based on Canny Operator and Tensor for Copy-Move Forgery Detection}, journal = {Comput. J.}, volume = {67}, number = {3}, pages = {1209}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad032}, doi = {10.1093/COMJNL/BXAD032}, timestamp = {Sun, 05 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/X24b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/X24c, title = {Correction to: Hitting Times of Random Walks on Edge Corona Product Graphs}, journal = {Comput. J.}, volume = {67}, number = {3}, pages = {1210}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad055}, doi = {10.1093/COMJNL/BXAD055}, timestamp = {Sun, 05 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/X24c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/X24d, title = {Correction to: Metaheuristic-Enabled Artificial Neural Network Framework For Multimodal Biometric Recognition With Local Fusion Visual Features}, journal = {Comput. J.}, volume = {67}, number = {4}, pages = {1603}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad064}, doi = {10.1093/COMJNL/BXAD064}, timestamp = {Sun, 05 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/X24d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/X24e, title = {Correction to: {A} Semantic Embedding Enhanced Topic Model For User-Generated Textual Content Modeling In Social Ecosystems}, journal = {Comput. J.}, volume = {67}, number = {4}, pages = {1604}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad073}, doi = {10.1093/COMJNL/BXAD073}, timestamp = {Sun, 05 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/X24e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/X24f, title = {Correction to: Automatic Diagnosis of Diabetic Retinopathy from Retinal Abnormalities: Improved Jaya-Based Feature Selection and Recurrent Neural Network}, journal = {Comput. J.}, volume = {67}, number = {5}, pages = {2007}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad108}, doi = {10.1093/COMJNL/BXAD108}, timestamp = {Mon, 08 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/X24f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/XiangTLM24, author = {Nan Xiang and Xiao Tang and Huiling Liu and Xiaoxia Ma}, title = {Identifying and Ranking Influential Spreaders in Complex Networks by Localized Decreasing Gravity Model}, journal = {Comput. J.}, volume = {67}, number = {5}, pages = {1727--1746}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad097}, doi = {10.1093/COMJNL/BXAD097}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/XiangTLM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/XiangWYHZ24, author = {Yuyuan Xiang and Hongxia Wang and Ling Yang and Mingze He and Fei Zhang}, title = {{SEDD:} Robust Blind Image Watermarking With Single Encoder And Dual Decoders}, journal = {Comput. J.}, volume = {67}, number = {6}, pages = {2390--2402}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxae014}, doi = {10.1093/COMJNL/BXAE014}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/XiangWYHZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/XuCHY24, author = {Xintong Xu and Run Cui and Chanying Huang and Kedong Yan}, title = {Anonymization of face images with Contrastive Learning}, journal = {Comput. J.}, volume = {67}, number = {5}, pages = {1910--1919}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad111}, doi = {10.1093/COMJNL/BXAD111}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/XuCHY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/XuLZ24, author = {Leyou Xu and Chengli Li and Bo Zhou}, title = {Link Residual Closeness of Graphs with Fixed Parameters}, journal = {Comput. J.}, volume = {67}, number = {6}, pages = {2286--2302}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxae006}, doi = {10.1093/COMJNL/BXAE006}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/XuLZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/XuWCZ24, author = {Yifan Xu and Liangmin Wang and Jie Chen and Qiang Zhou}, title = {Tor Trace in Images: {A} Novel Multi-Tab Website Fingerprinting Attack With Object Detection}, journal = {Comput. J.}, volume = {67}, number = {8}, pages = {2690--2701}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxae037}, doi = {10.1093/COMJNL/BXAE037}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/XuWCZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/XuWQ24, author = {Lidong Xu and Mingqiang Wang and Jing Qin}, title = {Quantum Bit Commitment Without Quantum Memory}, journal = {Comput. J.}, volume = {67}, number = {3}, pages = {1163--1170}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad049}, doi = {10.1093/COMJNL/BXAD049}, timestamp = {Sun, 05 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/XuWQ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/XuXWYW24, author = {Qiang Xu and Dongmei Xu and Hao Wang and Jianye Yuan and Zhe Wang}, title = {Color Patterns And Enhanced Texture Learning For Detecting Computer-Generated Images}, journal = {Comput. J.}, volume = {67}, number = {6}, pages = {2303--2316}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxae007}, doi = {10.1093/COMJNL/BXAE007}, timestamp = {Tue, 13 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/XuXWYW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/XuZLZJWCC24, author = {Zhixiong Xu and Wei Zhang and Ailin Li and Feifei Zhao and Yuanyuan Jing and Zheng Wan and Lei Cao and Xiliang Chen}, title = {Online Optimization Method of Learning Process for Meta-Learning}, journal = {Comput. J.}, volume = {67}, number = {5}, pages = {1645--1651}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad089}, doi = {10.1093/COMJNL/BXAD089}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/XuZLZJWCC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/XuZYZ24, author = {Yishu Xu and Peng Zhang and Hongtao Yu and Fuzhi Zhang}, title = {Detecting Group Shilling Attacks In Recommender Systems Based On User Multi-dimensional Features And Collusive Behaviour Analysis}, journal = {Comput. J.}, volume = {67}, number = {2}, pages = {604--616}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad003}, doi = {10.1093/COMJNL/BXAD003}, timestamp = {Sat, 27 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/XuZYZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/XueZZLQZ24, author = {Yuliang Xue and Yuhao Zhu and Zhiying Zhu and Sheng Li and Zhenxing Qian and Xinpeng Zhang}, title = {Removing Watermarks For Image Processing Networks Via Referenced Subspace Attention}, journal = {Comput. J.}, volume = {67}, number = {2}, pages = {498--507}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxac190}, doi = {10.1093/COMJNL/BXAC190}, timestamp = {Sat, 06 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/XueZZLQZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/YanQL24, author = {Zhen Yan and Haipeng Qu and Xi Jun Lin}, title = {On The Security Of {A} Novel Construction Of Certificateless Aggregate Signature Scheme For Healthcare Wireless Medical Sensor Networks}, journal = {Comput. J.}, volume = {67}, number = {9}, pages = {2819--2822}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxae048}, doi = {10.1093/COMJNL/BXAE048}, timestamp = {Fri, 08 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/YanQL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/YanSTD24, author = {Guofeng Yan and Zhengwen Su and Hengliang Tan and Jiao Du}, title = {Service Function Placement Optimization For Cloud Service With End-to-End Delay Constraints}, journal = {Comput. J.}, volume = {67}, number = {7}, pages = {2473--2485}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxae019}, doi = {10.1093/COMJNL/BXAE019}, timestamp = {Wed, 07 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/YanSTD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/Yang24, author = {Yuxing Yang}, title = {Hyper-Hamiltonian Laceability of Cartesian Products of Cycles and Paths}, journal = {Comput. J.}, volume = {67}, number = {2}, pages = {548--556}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxac196}, doi = {10.1093/COMJNL/BXAC196}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/Yang24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/YangHWZA24, author = {Zhongjun Yang and Qing Huang and Qi Wang and Xuejun Zong and Ran Ao}, title = {Visual Intrusion Detection Based On CBAM-Capsule Networks}, journal = {Comput. J.}, volume = {67}, number = {6}, pages = {2357--2367}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxae011}, doi = {10.1093/COMJNL/BXAE011}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/YangHWZA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/YangHXJX24, author = {Runze Yang and Baoqi Huang and Zhendong Xu and Bing Jia and Gang Xu}, title = {Towards Accurate Smartphone Localization Using {CSI} Measurements}, journal = {Comput. J.}, volume = {67}, number = {4}, pages = {1361--1369}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad065}, doi = {10.1093/COMJNL/BXAD065}, timestamp = {Sat, 06 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/YangHXJX24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/YangLY24, author = {Weiwei Yang and Shangsong Liang and Jian Yin}, title = {Spatial-Aware Multi-Directional Autoencoder For Pre-Training}, journal = {Comput. J.}, volume = {67}, number = {4}, pages = {1346--1360}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad063}, doi = {10.1093/COMJNL/BXAD063}, timestamp = {Sat, 06 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/YangLY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/YangLZ24, author = {Yang Yang and Wenhao Liu and Guang Zeng}, title = {A General Condition of Structural Distinguisher}, journal = {Comput. J.}, volume = {67}, number = {3}, pages = {923--932}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad030}, doi = {10.1093/COMJNL/BXAD030}, timestamp = {Sat, 06 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/YangLZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/YangMDJH24, author = {Tian Yang and Sha Ma and Jiaojiao Du and Chengyu Jiang and Qiong Huang}, title = {Revocable Public Key Encryption with Equality Test without Pairing in Cloud Storage}, journal = {Comput. J.}, volume = {67}, number = {2}, pages = {642--657}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad006}, doi = {10.1093/COMJNL/BXAD006}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/YangMDJH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/YangTXW24, author = {Hongjuan Yang and Gang Tian and Chengrui Xu and Rui Wang}, title = {Algorithms For Cold-Start Game Recommendation Based On {GNN} Pre-training Model}, journal = {Comput. J.}, volume = {67}, number = {9}, pages = {2787--2798}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxae044}, doi = {10.1093/COMJNL/BXAE044}, timestamp = {Fri, 08 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/YangTXW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/YaoLCZCW24, author = {Shixiong Yao and Pei Li and Jing Chen and Yuexing Zeng and Jiageng Chen and Donghui Wang}, title = {CD-BCM:Cross-Domain Batch Certificates Management Based On Blockchain}, journal = {Comput. J.}, volume = {67}, number = {3}, pages = {864--874}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad025}, doi = {10.1093/COMJNL/BXAD025}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/YaoLCZCW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/YaoWZB24, author = {Zhicheng Yao and Sa Wang and Jinbin Zhu and Yungang Bao}, title = {Panoptic Segmentation with Convex Object Representation}, journal = {Comput. J.}, volume = {67}, number = {6}, pages = {2009--2019}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad119}, doi = {10.1093/COMJNL/BXAD119}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/YaoWZB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/YuQDJ24, author = {Qingyuan Yu and Lingyue Qin and Xiaoyang Dong and Keting Jia}, title = {Improved Related-Key Rectangle Attacks On \texttt{GIFT}}, journal = {Comput. J.}, volume = {67}, number = {4}, pages = {1443--1456}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad071}, doi = {10.1093/COMJNL/BXAD071}, timestamp = {Wed, 24 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/YuQDJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/YuTZLZ24, author = {Mengzhu Yu and Zhenjun Tang and Hanyun Zhang and Xiaoping Liang and Xianquan Zhang}, title = {Video Hashing with Tensor Robust {PCA} and Histogram of Optical Flow for Copy Detection}, journal = {Comput. J.}, volume = {67}, number = {6}, pages = {2162--2171}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad130}, doi = {10.1093/COMJNL/BXAD130}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/YuTZLZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/YuX24, author = {Zhecheng Yu and Liqiong Xu}, title = {Reliability Evaluation Of Multiprocessor System Based On The Balanced Complete Multipartite Graphs}, journal = {Comput. J.}, volume = {67}, number = {2}, pages = {688--693}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad010}, doi = {10.1093/COMJNL/BXAD010}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/YuX24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/YuanLGYZM24, author = {Xin Yuan and Ning Li and Xiaobo Gong and Changli Yu and Xiaoteng Zhou and Jos{\'{e}}{-}Fern{\'{a}}n Mart{\'{\i}}nez{-}Ortega}, title = {Underwater Wireless Sensor Network-Based Delaunay Triangulation {(UWSN-DT)} Algorithm for Sonar Map Fusion}, journal = {Comput. J.}, volume = {67}, number = {5}, pages = {1699--1709}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad094}, doi = {10.1093/COMJNL/BXAD094}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/YuanLGYZM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/YuanLXGY24, author = {Zhu Yuan and Xueqiang Lv and Ping Xie and Haojie Ge and Xindong You}, title = {{CSEA:} {A} Fine-Grained Framework of Climate-Season-Based Energy-Aware in Cloud Storage Systems}, journal = {Comput. J.}, volume = {67}, number = {2}, pages = {423--436}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxac184}, doi = {10.1093/COMJNL/BXAC184}, timestamp = {Sat, 27 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/YuanLXGY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/YuanZN24, author = {Junying Yuan and Huicheng Zheng and Jiangqun Ni}, title = {Reversible Data Hiding With Pattern Adaptive Prediction}, journal = {Comput. J.}, volume = {67}, number = {4}, pages = {1564--1571}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad082}, doi = {10.1093/COMJNL/BXAD082}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/YuanZN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/YuanZXWYLG24, author = {Qingjun Yuan and Yuefei Zhu and Gang Xiong and Yongjuan Wang and Wentao Yu and Bin Luo and Gaopeng Gou}, title = {{ULDC:} Unsupervised Learning-Based Data Cleaning for Malicious Traffic With High Noise}, journal = {Comput. J.}, volume = {67}, number = {3}, pages = {976--987}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad036}, doi = {10.1093/COMJNL/BXAD036}, timestamp = {Sat, 06 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/YuanZXWYLG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ZengLMYC24, author = {Junhao Zeng and Gang Liang and Yixin Ma and Xinyan Yang and Cheng Chen}, title = {Pornographic video detection based on semantic and image enhancement}, journal = {Comput. J.}, volume = {67}, number = {10}, pages = {3009--3019}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxae065}, doi = {10.1093/COMJNL/BXAE065}, timestamp = {Fri, 08 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/ZengLMYC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ZhaiSM24, author = {Zhonghao Zhai and Subin Shen and Yan{-}qin Mao}, title = {A Toolbox for Migrating the Blockchain-Based Application From Ethereum to Hyperledger Fabric}, journal = {Comput. J.}, volume = {67}, number = {4}, pages = {1309--1323}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad061}, doi = {10.1093/COMJNL/BXAD061}, timestamp = {Sat, 06 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/ZhaiSM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ZhangCZSW24, author = {Xiaolei Zhang and Zhaoyu Chen and Xin Zhang and Qingni Shen and Zhonghai Wu}, title = {{IPOD2:} an irrecoverable and verifiable deletion scheme for outsourced data}, journal = {Comput. J.}, volume = {67}, number = {10}, pages = {2877--2889}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxae053}, doi = {10.1093/COMJNL/BXAE053}, timestamp = {Fri, 08 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/ZhangCZSW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ZhangHLLFL24, author = {Qiang Zhang and Junjiang He and Tao Li and Xiaolong Lan and Wenbo Fang and Yihong Li}, title = {{SPAW-SMOTE:} Space Partitioning Adaptive Weighted Synthetic Minority Oversampling Technique For Imbalanced Data Set Learning}, journal = {Comput. J.}, volume = {67}, number = {5}, pages = {1747--1762}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad098}, doi = {10.1093/COMJNL/BXAD098}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/ZhangHLLFL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ZhangKQH24, author = {Liang Zhang and Haibin Kan and Feiyang Qiu and Feng Hao}, title = {A Publicly Verifiable Optimistic Fair Exchange Protocol Using Decentralized {CP-ABE}}, journal = {Comput. J.}, volume = {67}, number = {3}, pages = {1017--1029}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad039}, doi = {10.1093/COMJNL/BXAD039}, timestamp = {Sat, 06 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/ZhangKQH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ZhangLCW24, author = {Yun Zhang and Yuling Liu and Ge Cheng and Jie Wang}, title = {Similarity Regression Of Functions In Different Compiled Forms With Neural Attentions On Dual Control-Flow Graphs}, journal = {Comput. J.}, volume = {67}, number = {5}, pages = {1710--1718}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad095}, doi = {10.1093/COMJNL/BXAD095}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/ZhangLCW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ZhangLX24, author = {Yaofang Zhang and Peixuan Li and Ping Xie}, title = {A Hybrid Scheme Combining Duplications and {LDPC} Decoding to Reduce {NAND} Flash}, journal = {Comput. J.}, volume = {67}, number = {4}, pages = {1425--1437}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad069}, doi = {10.1093/COMJNL/BXAD069}, timestamp = {Sun, 05 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/ZhangLX24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ZhangNMZ24, author = {Peng Zhang and Zhendong Niu and Ru Ma and Fuzhi Zhang}, title = {{DHCL-BR:} Dual Hypergraph Contrastive Learning for Bundle Recommendation}, journal = {Comput. J.}, volume = {67}, number = {10}, pages = {2906--2919}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxae056}, doi = {10.1093/COMJNL/BXAE056}, timestamp = {Fri, 08 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/ZhangNMZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ZhangSQS24, author = {Xi Zhang and Ye Su and Jing Qin and Jiameng Sun}, title = {{SDTA:} Secure Decentralized Trading Alliance for Electronic Medical Data}, journal = {Comput. J.}, volume = {67}, number = {8}, pages = {2573--2585}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxae026}, doi = {10.1093/COMJNL/BXAE026}, timestamp = {Tue, 08 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/ZhangSQS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ZhangWB24, author = {Hongjin Zhang and Hui Wei and Wang Bo}, title = {A New Fuzzy Smoothing Term Model For Stereo Matching}, journal = {Comput. J.}, volume = {67}, number = {2}, pages = {746--761}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad015}, doi = {10.1093/COMJNL/BXAD015}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/ZhangWB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ZhangWLP24, author = {Dinghua Zhang and Shihao Wu and Yang Li and Quan Pan}, title = {An Evaluation On The Entropy Supplying Capability Of Smartphone Sensors}, journal = {Comput. J.}, volume = {67}, number = {4}, pages = {1550--1563}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad081}, doi = {10.1093/COMJNL/BXAD081}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/ZhangWLP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ZhangWSL24, author = {Hanwen Zhang and Li{-}e Wang and Zhigang Sun and Xianxian Li}, title = {Knowledge-Aware Dual-Channel Graph Neural Networks For Denoising Recommendation}, journal = {Comput. J.}, volume = {67}, number = {5}, pages = {1607--1618}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad085}, doi = {10.1093/COMJNL/BXAD085}, timestamp = {Thu, 18 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/ZhangWSL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ZhangWYFX24, author = {Xu Zhang and Shunjie Wen and Liang Yan and Jiangfan Feng and Ying Xia}, title = {A Hybrid-Convolution Spatial-Temporal Recurrent Network For Traffic Flow Prediction}, journal = {Comput. J.}, volume = {67}, number = {1}, pages = {236--252}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxac171}, doi = {10.1093/COMJNL/BXAC171}, timestamp = {Sat, 27 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/ZhangWYFX24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ZhangYCZY24, author = {Jiaomei Zhang and Ayong Ye and Jianwei Chen and Yuexin Zhang and Wenjie Yang}, title = {{CSFL:} Cooperative Security Aware Federated Learning Model Using The Blockchain}, journal = {Comput. J.}, volume = {67}, number = {4}, pages = {1298--1308}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad060}, doi = {10.1093/COMJNL/BXAD060}, timestamp = {Mon, 05 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/ZhangYCZY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ZhangZC24, author = {Hong Zhang and Shuming Zhou and Eddie Cheng}, title = {The Cyclic Diagnosability Of Hypercubes Under The {PMC} Model And The MM* Model}, journal = {Comput. J.}, volume = {67}, number = {2}, pages = {709--718}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad012}, doi = {10.1093/COMJNL/BXAD012}, timestamp = {Tue, 03 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/ZhangZC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ZhangZWLLY24, author = {Zongyang Zhang and Lingyue Zhang and Zhuo Wang and Yichen Li and Rongxing Lu and Yong Yu}, title = {Chronos: An Efficient Asynchronous Byzantine Ordered Consensus}, journal = {Comput. J.}, volume = {67}, number = {3}, pages = {1153--1162}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad048}, doi = {10.1093/COMJNL/BXAD048}, timestamp = {Tue, 13 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/ZhangZWLLY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ZhangZWMZ24, author = {Li Zhang and Yu Zhang and Wenling Wu and Yongxia Mao and Yafei Zheng}, title = {Explicit Upper Bound Of Impossible Differentials For AES-Like Ciphers: Application To uBlock And Midori}, journal = {Comput. J.}, volume = {67}, number = {2}, pages = {674--687}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad009}, doi = {10.1093/COMJNL/BXAD009}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/ZhangZWMZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/Zhao24, author = {Xuefeng Zhao}, title = {Secure and Efficient Masking of Lightweight Ciphers in Software and Hardware}, journal = {Comput. J.}, volume = {67}, number = {2}, pages = {581--603}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad002}, doi = {10.1093/COMJNL/BXAD002}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/Zhao24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ZhaoCWWZL24, author = {Shuang Zhao and Shuhui Chen and Fei Wang and Ziling Wei and Jincheng Zhong and Jianbing Liang}, title = {A Large-Scale Mobile Traffic Dataset For Mobile Application Identification}, journal = {Comput. J.}, volume = {67}, number = {4}, pages = {1501--1513}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad076}, doi = {10.1093/COMJNL/BXAD076}, timestamp = {Sat, 06 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/ZhaoCWWZL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ZhaoL24, author = {Shijie Zhao and Pingshan Li}, title = {On Conditional Edge-Fault-Tolerant Strong Menger Edge Connectivity Of Folded Hypercubes}, journal = {Comput. J.}, volume = {67}, number = {2}, pages = {777--781}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad018}, doi = {10.1093/COMJNL/BXAD018}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/ZhaoL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ZhaoL24a, author = {Weidong Zhao and Xiaotong Liu}, title = {Detection of E-Commerce Fraud Review via Self-Paced Graph Contrast Learning}, journal = {Comput. J.}, volume = {67}, number = {6}, pages = {2054--2065}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad123}, doi = {10.1093/COMJNL/BXAD123}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/ZhaoL24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ZhongQZ24, author = {Nan Zhong and Zhenxing Qian and Xinpeng Zhang}, title = {Sparse Backdoor Attack Against Neural Networks}, journal = {Comput. J.}, volume = {67}, number = {5}, pages = {1783--1793}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad100}, doi = {10.1093/COMJNL/BXAD100}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/ZhongQZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ZhongTT24, author = {Yi Zhong and Zihan Teng and Mengjun Tong}, title = {LiteMixer: Cauliflower Disease Diagnosis based on a Novel Lightweight Neural Network}, journal = {Comput. J.}, volume = {67}, number = {6}, pages = {2346--2356}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxae010}, doi = {10.1093/COMJNL/BXAE010}, timestamp = {Mon, 08 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/ZhongTT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ZhouHLLWZL24, author = {Shaohong Zhou and Junjiang He and Tao Li and Xiaolong Lan and Yunpeng Wang and Hui Zhao and Yihong Li}, title = {Automating the Deployment of Cyber Range with OpenStack}, journal = {Comput. J.}, volume = {67}, number = {3}, pages = {851--863}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad024}, doi = {10.1093/COMJNL/BXAD024}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/ZhouHLLWZL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ZhouWZLS24, author = {Qiang Zhou and Liangmin Wang and Huijuan Zhu and Tong Lu and Heping Song}, title = {Joint Alignment Networks For Few-Shot Website Fingerprinting Attack}, journal = {Comput. J.}, volume = {67}, number = {6}, pages = {2331--2345}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxae009}, doi = {10.1093/COMJNL/BXAE009}, timestamp = {Mon, 08 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/ZhouWZLS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ZhouZC24, author = {Chunning Zhou and Wentao Zhang and Weiwei Cao}, title = {A New Approach of Evaluating the Security Against Differential and Linear Cryptanalysis and Its Applications to Serpent, {NOEKEON} and {ASCON}}, journal = {Comput. J.}, volume = {67}, number = {1}, pages = {274--291}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxac173}, doi = {10.1093/COMJNL/BXAC173}, timestamp = {Sat, 27 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/ZhouZC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ZhouZH24, author = {Fucai Zhou and Zongye Zhang and Ruiwei Hou}, title = {Privacy-Preserving Image Retrieval with Multi-Modal Query}, journal = {Comput. J.}, volume = {67}, number = {5}, pages = {1979--1992}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad117}, doi = {10.1093/COMJNL/BXAD117}, timestamp = {Mon, 08 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/ZhouZH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ZhuWCWDS24, author = {Chenguang Zhu and Renzheng Wei and Liwei Chen and Tongshuai Wu and Gewangzi Du and Gang Shi}, title = {Vulnerability Localization Based On Intermediate Code Representation and Feature Fusion}, journal = {Comput. J.}, volume = {67}, number = {9}, pages = {2749--2762}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxae041}, doi = {10.1093/COMJNL/BXAE041}, timestamp = {Fri, 08 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/ZhuWCWDS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ZhuXLZK24, author = {Mingzhe Zhu and Wanyue Xu and Wei Li and Zhongzhi Zhang and Haibin Kan}, title = {Hitting Times of Random Walks on Edge Corona Product Graphs}, journal = {Comput. J.}, volume = {67}, number = {2}, pages = {485--497}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxac189}, doi = {10.1093/COMJNL/BXAC189}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/ZhuXLZK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ZhuZ24, author = {Lina Zhu and Zuochang Zhang}, title = {Software Failure Prediction Based On Program State and First-Error Characteristics}, journal = {Comput. J.}, volume = {67}, number = {8}, pages = {2559--2572}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxae025}, doi = {10.1093/COMJNL/BXAE025}, timestamp = {Fri, 20 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/ZhuZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ZouWXL24, author = {Yujuan Zou and Zhijian Wang and Pengfei Xu and Taizhi Lv}, title = {An Improved Density Peaks Clustering Algorithm Based On Density Ratio}, journal = {Comput. J.}, volume = {67}, number = {7}, pages = {2515--2528}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxae022}, doi = {10.1093/COMJNL/BXAE022}, timestamp = {Thu, 22 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/ZouWXL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ZuLWZ24, author = {Shuodi Zu and Xiangyang Luo and Liang Wang and Fan Zhang}, title = {{GUI:} {A} Geolocation Method for Unreachable {IP}}, journal = {Comput. J.}, volume = {67}, number = {5}, pages = {1963--1978}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad116}, doi = {10.1093/COMJNL/BXAD116}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/ZuLWZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.