Stop the war!
Остановите войну!
for scientists:
default search action
The Computer Journal, Volume 67
Volume 67, Number 1, January 2024
- Marios C. Angelides:
Thematic Editorial: Mostly Artificial Intelligence (AI) or Machine Learning (ML) Now in the Engine Room, in Pursuit of a Green Agenda. 1-2 - Mariem Gnouma, Ridha Ejbali, Mourad Zaied:
Deep Hashing and Sparse Representation of Abnormal Events Detection. 3-17 - Ozgur Oksuz:
A System For Storing Anonymous Patient Healthcare Data Using Blockchain And Its Applications. 18-30 - He Li, Duo Jin, Xuejiao Li, Shaojie Qiao:
A Dynamic Heterogeneous Graph Convolution Network For Traffic Flow Prediction. 31-44 - Tongfeng Li, Ruisheng Zhang, Bojuan Niu, Yabing Yao, Jun Ma, Jing Jiang, Zhili Zhao:
Link Prediction Based On Local Structure And Node Information Along Local Paths. 45-56 - Sayaka Kamei, Sébastien Tixeuil:
An Asynchronous Maximum Independent Set Algorithm By Myopic Luminous Robots On Grids. 57-77 - Zhuowei Wang, Hao Wang, Xiaoyu Song, Jiahui Wu:
Communication-Aware Energy Consumption Model in Heterogeneous Computing Systems. 78-94 - James Walsh, Oluwafunmilola Kesa, Andrew Wang, Mihai Ilas, Patrick O'Hara, Oscar Giles, Neil Dhir, Mark Girolami, Theodoros Damoulas:
Near Real-Time Social Distance Estimation In London. 95-109 - Aissam Aouar, Saïd Yahiaoui, Lamia Sadeg, Nadia Nouali-Taboudjemat, Kadda Beghdad Bey:
Distributed Partial Simulation for Graph Pattern Matching. 110-126 - Xiaoyang Liu, Luyuan Gao, Giacomo Fiumara, Pasquale De Meo:
Key Node Identification Method Integrating Information Transmission Probability and Path Diversity in Complex Network. 127-141 - Xiaoqing Liu, Shuming Zhou, Jiafei Liu, Hong Zhang:
Reliability Analysis of the Cactus-Based Networks Based on Subsystem. 142-152 - Qin Luo, Xin Cao:
PNCTS: A Prediction and Network Coding-Based Transmission Scheme for Efficient Screen Updates Delivery in DaaS. 153-168 - Vahid Amin-Ghafari, Mahmoud Ahmadian-Attari:
An Attack on a Proposed Construction of Small-State Stream Ciphers and Proposals for New Constructions. 169-178 - Xiwen Wang, Kai Zhang, Jinguo Li, Mi Wen, Shengmin Xu, Jianting Ning:
Non-interactive Boolean Searchable Asymmetric Encryption With Bilateral Access Control. 179-194 - Jiali Shi, Chao Li, Guoqiang Liu:
Differential Attack With Constants On μ2 Block Cipher. 195-209 - Yin Lv, Danping Shi, Lei Hu, Zihui Guo, Yi Guo, Caibing Wang:
Improved Linear Cryptanalysis of Block Cipher BORON. 210-219 - Andrew Simpson, Matthias Dellago, Daniel W. Woods:
Formalizing Attack Trees To Support Economic Analysis. 220-235 - Xu Zhang, Shunjie Wen, Liang Yan, Jiangfan Feng, Ying Xia:
A Hybrid-Convolution Spatial-Temporal Recurrent Network For Traffic Flow Prediction. 236-252 - Wenhan Ge, Junfeng Wang:
SeqMask: Behavior Extraction Over Cyber Threat Intelligence Via Multi-Instance Learning. 253-273 - Chunning Zhou, Wentao Zhang, Weiwei Cao:
A New Approach of Evaluating the Security Against Differential and Linear Cryptanalysis and Its Applications to Serpent, NOEKEON and ASCON. 274-291 - Lin Ding, Zheng Wu, Guixian Zhang, Tairong Shi:
Quantum Guess and Determine Attack on Stream Ciphers. 292-303 - K. Ashwini:
User Name-Based Compression and Encryption of Images Using Chaotic Compressive Sensing Theory. 304-322 - Ke Wang, Zhenfeng Zhang, Haodong Jiang, Huiqin Xie, Yanjun Li, Ying Sun, Lidong Han:
Key Reuse Attacks on Post-quantum Cryptosystems, Revisited. 323-337 - Mozamel M. Saeed:
Designing Scenarios for In-Organization Training Using the CyberCIEGE Game. 338-346 - C. Shaji, I. Shatheesh Sam:
Encoding with Combination Orientation Technique for RDH in Dual Stego Images. 347-361 - Liqing Qiu, Yuying Liu, Jianyi Zhang:
A New Method for Identifying Influential Spreaders in Complex Networks. 362-375 - Joon-Young Paik, Rize Jin:
Malware Family Prediction with an Awareness of Label Uncertainty. 376-390 - Nieves R. Brisaboa, Travis Gagie, Adrián Gómez-Brandón, Gonzalo Navarro:
Two-Dimensional Block Trees. 391-406
Volume 67, Number 2, February 2024
- Amal Abid, Saoussen Cheikhrouhou, Slim Kallel, Zahir Tari, Mohamed Jmaiel:
A Smart Contract-Based Access Control Framework For Smart Healthcare Systems. 407-422 - Zhu Yuan, Xueqiang Lv, Ping Xie, Haojie Ge, Xindong You:
CSEA: A Fine-Grained Framework of Climate-Season-Based Energy-Aware in Cloud Storage Systems. 423-436 - Francisco Javier Moreno Arboleda, Georgia Garani, Carlos Daniel Bolivar Zapata:
Query Operators for Transactional Data: Detecting Similar and Periodic Transactions. 437-446 - Mengqi Liu, Hang Gao, Xiaofan Xia, Suying Gui, Tiegang Gao:
Perceptual Image Hashing Based on Canny Operator and Tensor for Copy-Move Forgery Detection. 447-462 - Changan Liu, Changjun Fan, Zhongzhi Zhang:
Finding Influencers in Complex Networks: An Effective Deep Reinforcement Learning Approach. 463-473 - Yaoan Jin, Atsuko Miyaji:
Secure and Compact Elliptic Curve Scalar Multiplication with Optimized Inversion. 474-484 - Mingzhe Zhu, Wanyue Xu, Wei Li, Zhongzhi Zhang, Haibin Kan:
Hitting Times of Random Walks on Edge Corona Product Graphs. 485-497 - Yuliang Xue, Yuhao Zhu, Zhiying Zhu, Sheng Li, Zhenxing Qian, Xinpeng Zhang:
Removing Watermarks For Image Processing Networks Via Referenced Subspace Attention. 498-507 - Reza Ebrahim Pourian, Mehdi Fartash, Javad Akbari Torkestani:
A Deep Learning Model for Energy-Aware Task Scheduling Algorithm Based on Learning Automata for Fog Computing. 508-518 - Marzieh Shamsizadeh, Mohammad Mehdi Zahedi, Khadijeh Abolpour:
Irreducible Fuzzy Multiset Finite Automaton. 519-526 - Heqin Liu, Dongqin Cheng:
Structure Fault Tolerance of Exchanged Hypercube. 527-536 - Jinyu Lu, Guoqiang Liu, Bing Sun, Chao Li, Li Liu:
Improved (Related-Key) Differential-Based Neural Distinguishers for SIMON and SIMECK Block Ciphers. 537-547 - Yuxing Yang:
Hyper-Hamiltonian Laceability of Cartesian Products of Cycles and Paths. 548-556 - Hireche Samia, Dennai Abdeslem, Boufeldja Kadri:
Toward a Novel RESTFUL Big Data-Based Urban Traffic Incident Data Web Service for Connected Vehicles. 557-580 - Xuefeng Zhao:
Secure and Efficient Masking of Lightweight Ciphers in Software and Hardware. 581-603 - Yishu Xu, Peng Zhang, Hongtao Yu, Fuzhi Zhang:
Detecting Group Shilling Attacks In Recommender Systems Based On User Multi-dimensional Features And Collusive Behaviour Analysis. 604-616 - Zhiwei Chen, Lunzhi Deng, Yu Ruan, Shuai Feng, Tao Wang, Bo Wang:
Certificateless Broadcast Encryption with Authorization Suitable for Storing Personal Health Records. 617-631 - Tu-Liang Lin, Hong-Yi Chang, Yuan-Yao Chiang, Shu-Cheng Lin, Tsung-Yen Yang, Chun-Jun Zhuang, Wha-Lee Tseng, Bo-Hao Zhang:
Ransomware Detection by Distinguishing API Call Sequences through LSTM and BERT Models. 632-641 - Tian Yang, Sha Ma, Jiaojiao Du, Chengyu Jiang, Qiong Huang:
Revocable Public Key Encryption with Equality Test without Pairing in Cloud Storage. 642-657 - Rahman Keramati Hatkeposhti, Meisam Yadollahzadeh Tabari, Mehdi GolsorkhtabariAmiri:
Providing an Approach for Early Prediction of Fall in Human Activities Based on Wearable Sensor Data and the Use of Deep Learning Algorithms. 658-673 - Li Zhang, Yu Zhang, Wenling Wu, Yongxia Mao, Yafei Zheng:
Explicit Upper Bound Of Impossible Differentials For AES-Like Ciphers: Application To uBlock And Midori. 674-687 - Zhecheng Yu, Liqiong Xu:
Reliability Evaluation Of Multiprocessor System Based On The Balanced Complete Multipartite Graphs. 688-693 - Shumin Si, Xiuhan Lin, Puwen Wei:
Compressed Zero-Knowledge Proofs for Lattice-Based Accumulator. 694-708 - Hong Zhang, Shuming Zhou, Eddie Cheng:
The Cyclic Diagnosability Of Hypercubes Under The PMC Model And The MM* Model. 709-718 - Katharina Boudgoust, Adeline Roux-Langlois:
Overfull: Too Large Aggregate Signatures Based on Lattices. 719-727 - Tzong-Jye Liu:
Adversarial Attacks on Network Intrusion Detection Systems Using Flow Containers. 728-745 - Hongjin Zhang, Hui Wei, Wang Bo:
A New Fuzzy Smoothing Term Model For Stereo Matching. 746-761 - Senxing Lu, Mingming Zhao, Chunlin Li, Quanbing Du, Youlong Luo:
Time-Aware Data Partition Optimization and Heterogeneous Task Scheduling Strategies in Spark Clusters. 762-776 - Shijie Zhao, Pingshan Li:
On Conditional Edge-Fault-Tolerant Strong Menger Edge Connectivity Of Folded Hypercubes. 777-781 - Hala S. Ali, R. Sridevi:
Mobility and Security Aware Real-Time Task Scheduling in Fog-Cloud Computing for IoT Devices: A Fuzzy-Logic Approach. 782-805 - Correction to: An Attack on a Proposed Construction of Small-State Stream Ciphers and Proposals for New Constructions. 806
- Correction to: Performance Evaluation of FPGA-Based LSTM Neural Networks for Pulse Signal Detection on Real-Time Radar Warning Receivers. 807
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.