default search action
The Computer Journal, Volume 67
Volume 67, Number 1, January 2024
- Marios C. Angelides:
Thematic Editorial: Mostly Artificial Intelligence (AI) or Machine Learning (ML) Now in the Engine Room, in Pursuit of a Green Agenda. 1-2 - Mariem Gnouma, Ridha Ejbali, Mourad Zaied:
Deep Hashing and Sparse Representation of Abnormal Events Detection. 3-17 - Ozgur Oksuz:
A System For Storing Anonymous Patient Healthcare Data Using Blockchain And Its Applications. 18-30 - He Li, Duo Jin, Xuejiao Li, Shaojie Qiao:
A Dynamic Heterogeneous Graph Convolution Network For Traffic Flow Prediction. 31-44 - Tongfeng Li, Ruisheng Zhang, Bojuan Niu, Yabing Yao, Jun Ma, Jing Jiang, Zhili Zhao:
Link Prediction Based On Local Structure And Node Information Along Local Paths. 45-56 - Sayaka Kamei, Sébastien Tixeuil:
An Asynchronous Maximum Independent Set Algorithm By Myopic Luminous Robots On Grids. 57-77 - Zhuowei Wang, Hao Wang, Xiaoyu Song, Jiahui Wu:
Communication-Aware Energy Consumption Model in Heterogeneous Computing Systems. 78-94 - James Walsh, Oluwafunmilola Kesa, Andrew Wang, Mihai Ilas, Patrick O'Hara, Oscar Giles, Neil Dhir, Mark Girolami, Theodoros Damoulas:
Near Real-Time Social Distance Estimation In London. 95-109 - Aissam Aouar, Saïd Yahiaoui, Lamia Sadeg, Nadia Nouali-Taboudjemat, Kadda Beghdad Bey:
Distributed Partial Simulation for Graph Pattern Matching. 110-126 - Xiaoyang Liu, Luyuan Gao, Giacomo Fiumara, Pasquale De Meo:
Key Node Identification Method Integrating Information Transmission Probability and Path Diversity in Complex Network. 127-141 - Xiaoqing Liu, Shuming Zhou, Jiafei Liu, Hong Zhang:
Reliability Analysis of the Cactus-Based Networks Based on Subsystem. 142-152 - Qin Luo, Xin Cao:
PNCTS: A Prediction and Network Coding-Based Transmission Scheme for Efficient Screen Updates Delivery in DaaS. 153-168 - Vahid Amin Ghafari, Mahmoud Ahmadian-Attari:
An Attack on a Proposed Construction of Small-State Stream Ciphers and Proposals for New Constructions. 169-178 - Xiwen Wang, Kai Zhang, Jinguo Li, Mi Wen, Shengmin Xu, Jianting Ning:
Non-interactive Boolean Searchable Asymmetric Encryption With Bilateral Access Control. 179-194 - Jiali Shi, Chao Li, Guoqiang Liu:
Differential Attack With Constants On μ2 Block Cipher. 195-209 - Yin Lv, Danping Shi, Lei Hu, Zihui Guo, Yi Guo, Caibing Wang:
Improved Linear Cryptanalysis of Block Cipher BORON. 210-219 - Andrew Simpson, Matthias Dellago, Daniel W. Woods:
Formalizing Attack Trees To Support Economic Analysis. 220-235 - Xu Zhang, Shunjie Wen, Liang Yan, Jiangfan Feng, Ying Xia:
A Hybrid-Convolution Spatial-Temporal Recurrent Network For Traffic Flow Prediction. 236-252 - Wenhan Ge, Junfeng Wang:
SeqMask: Behavior Extraction Over Cyber Threat Intelligence Via Multi-Instance Learning. 253-273 - Chunning Zhou, Wentao Zhang, Weiwei Cao:
A New Approach of Evaluating the Security Against Differential and Linear Cryptanalysis and Its Applications to Serpent, NOEKEON and ASCON. 274-291 - Lin Ding, Zheng Wu, Guixian Zhang, Tairong Shi:
Quantum Guess and Determine Attack on Stream Ciphers. 292-303 - K. Ashwini:
User Name-Based Compression and Encryption of Images Using Chaotic Compressive Sensing Theory. 304-322 - Ke Wang, Zhenfeng Zhang, Haodong Jiang, Huiqin Xie, Yanjun Li, Ying Sun, Lidong Han:
Key Reuse Attacks on Post-quantum Cryptosystems, Revisited. 323-337 - Mozamel M. Saeed:
Designing Scenarios for In-Organization Training Using the CyberCIEGE Game. 338-346 - C. Shaji, I. Shatheesh Sam:
Encoding with Combination Orientation Technique for RDH in Dual Stego Images. 347-361 - Liqing Qiu, Yuying Liu, Jianyi Zhang:
A New Method for Identifying Influential Spreaders in Complex Networks. 362-375 - Joon-Young Paik, Rize Jin:
Malware Family Prediction with an Awareness of Label Uncertainty. 376-390 - Nieves R. Brisaboa, Travis Gagie, Adrián Gómez-Brandón, Gonzalo Navarro:
Two-Dimensional Block Trees. 391-406
Volume 67, Number 2, February 2024
- Amal Abid, Saoussen Cheikhrouhou, Slim Kallel, Zahir Tari, Mohamed Jmaiel:
A Smart Contract-Based Access Control Framework For Smart Healthcare Systems. 407-422 - Zhu Yuan, Xueqiang Lv, Ping Xie, Haojie Ge, Xindong You:
CSEA: A Fine-Grained Framework of Climate-Season-Based Energy-Aware in Cloud Storage Systems. 423-436 - Francisco Javier Moreno Arboleda, Georgia Garani, Carlos Daniel Bolivar Zapata:
Query Operators for Transactional Data: Detecting Similar and Periodic Transactions. 437-446 - Mengqi Liu, Hang Gao, Xiaofan Xia, Suying Gui, Tiegang Gao:
Perceptual Image Hashing Based on Canny Operator and Tensor for Copy-Move Forgery Detection. 447-462 - Changan Liu, Changjun Fan, Zhongzhi Zhang:
Finding Influencers in Complex Networks: An Effective Deep Reinforcement Learning Approach. 463-473 - Yaoan Jin, Atsuko Miyaji:
Secure and Compact Elliptic Curve Scalar Multiplication with Optimized Inversion. 474-484 - Mingzhe Zhu, Wanyue Xu, Wei Li, Zhongzhi Zhang, Haibin Kan:
Hitting Times of Random Walks on Edge Corona Product Graphs. 485-497 - Yuliang Xue, Yuhao Zhu, Zhiying Zhu, Sheng Li, Zhenxing Qian, Xinpeng Zhang:
Removing Watermarks For Image Processing Networks Via Referenced Subspace Attention. 498-507 - Reza Ebrahim Pourian, Mehdi Fartash, Javad Akbari Torkestani:
A Deep Learning Model for Energy-Aware Task Scheduling Algorithm Based on Learning Automata for Fog Computing. 508-518 - Marzieh Shamsizadeh, Mohammad Mehdi Zahedi, Khadijeh Abolpour:
Irreducible Fuzzy Multiset Finite Automaton. 519-526 - Heqin Liu, Dongqin Cheng:
Structure Fault Tolerance of Exchanged Hypercube. 527-536 - Jinyu Lu, Guoqiang Liu, Bing Sun, Chao Li, Li Liu:
Improved (Related-Key) Differential-Based Neural Distinguishers for SIMON and SIMECK Block Ciphers. 537-547 - Yuxing Yang:
Hyper-Hamiltonian Laceability of Cartesian Products of Cycles and Paths. 548-556 - Hireche Samia, Dennai Abdeslem, Boufeldja Kadri:
Toward a Novel RESTFUL Big Data-Based Urban Traffic Incident Data Web Service for Connected Vehicles. 557-580 - Xuefeng Zhao:
Secure and Efficient Masking of Lightweight Ciphers in Software and Hardware. 581-603 - Yishu Xu, Peng Zhang, Hongtao Yu, Fuzhi Zhang:
Detecting Group Shilling Attacks In Recommender Systems Based On User Multi-dimensional Features And Collusive Behaviour Analysis. 604-616 - Zhiwei Chen, Lunzhi Deng, Yu Ruan, Shuai Feng, Tao Wang, Bo Wang:
Certificateless Broadcast Encryption with Authorization Suitable for Storing Personal Health Records. 617-631 - Tu-Liang Lin, Hong-Yi Chang, Yuan-Yao Chiang, Shu-Cheng Lin, Tsung-Yen Yang, Chun-Jun Zhuang, Wha-Lee Tseng, Bo-Hao Zhang:
Ransomware Detection by Distinguishing API Call Sequences through LSTM and BERT Models. 632-641 - Tian Yang, Sha Ma, Jiaojiao Du, Chengyu Jiang, Qiong Huang:
Revocable Public Key Encryption with Equality Test without Pairing in Cloud Storage. 642-657 - Rahman Keramati Hatkeposhti, Meisam Yadollahzadeh Tabari, Mehdi GolsorkhtabariAmiri:
Providing an Approach for Early Prediction of Fall in Human Activities Based on Wearable Sensor Data and the Use of Deep Learning Algorithms. 658-673 - Li Zhang, Yu Zhang, Wenling Wu, Yongxia Mao, Yafei Zheng:
Explicit Upper Bound Of Impossible Differentials For AES-Like Ciphers: Application To uBlock And Midori. 674-687 - Zhecheng Yu, Liqiong Xu:
Reliability Evaluation Of Multiprocessor System Based On The Balanced Complete Multipartite Graphs. 688-693 - Shumin Si, Xiuhan Lin, Puwen Wei:
Compressed Zero-Knowledge Proofs for Lattice-Based Accumulator. 694-708 - Hong Zhang, Shuming Zhou, Eddie Cheng:
The Cyclic Diagnosability Of Hypercubes Under The PMC Model And The MM* Model. 709-718 - Katharina Boudgoust, Adeline Roux-Langlois:
Overfull: Too Large Aggregate Signatures Based on Lattices. 719-727 - Tzong-Jye Liu:
Adversarial Attacks on Network Intrusion Detection Systems Using Flow Containers. 728-745 - Hongjin Zhang, Hui Wei, Wang Bo:
A New Fuzzy Smoothing Term Model For Stereo Matching. 746-761 - Senxing Lu, Mingming Zhao, Chunlin Li, Quanbing Du, Youlong Luo:
Time-Aware Data Partition Optimization and Heterogeneous Task Scheduling Strategies in Spark Clusters. 762-776 - Shijie Zhao, Pingshan Li:
On Conditional Edge-Fault-Tolerant Strong Menger Edge Connectivity Of Folded Hypercubes. 777-781 - Hala S. Ali, R. Sridevi:
Mobility and Security Aware Real-Time Task Scheduling in Fog-Cloud Computing for IoT Devices: A Fuzzy-Logic Approach. 782-805 - Correction to: An Attack on a Proposed Construction of Small-State Stream Ciphers and Proposals for New Constructions. 806
- Correction to: Performance Evaluation of FPGA-Based LSTM Neural Networks for Pulse Signal Detection on Real-Time Radar Warning Receivers. 807
Volume 67, Number 3, 2024
- Yannis Manolopoulos:
Thematic Editorial: The Ubiquitous Network. 809-811 - Marek A. Suchenek:
Worst-Case Analysis of Heapsort, Exactly. 812-824 - Oguzhan Erdem, Tuncay Soylu, Aydin Carus:
Pipelined Decision Trees for Online Traffic Classification on FPGAs. 825-839 - Ching-Fang Hsu, Zhe Xia, Tianshu Cheng, Lein Harn:
Extremely Lightweight Constant-Round Membership-Authenticated Group Key Establishment for Resource-Constrained Smart Environments toward 5G. 840-850 - Shaohong Zhou, Junjiang He, Tao Li, Xiaolong Lan, Yunpeng Wang, Hui Zhao, Yihong Li:
Automating the Deployment of Cyber Range with OpenStack. 851-863 - Shixiong Yao, Pei Li, Jing Chen, Yuexing Zeng, Jiageng Chen, Donghui Wang:
CD-BCM:Cross-Domain Batch Certificates Management Based On Blockchain. 864-874 - Le He, Hongbo Yu:
Cryptanalysis of Reduced-Round SipHash. 875-883 - Chung-Ming Huang, Shu-Hang Huang:
Traffic-Aware Re-Grouping for Load Balance in IEEE 802.11ah IoT Network Based on the Registered Backoff Time Mechanism. 884-898 - Bolin Wang, Wenling Wu, Yuhan Zhang, Li Zhang:
New Integral Distinguishers On Permutation Of Whirlpool. 899-906 - Ya Liu, Yuanhang Wu, Fengyv Zhao, Yanli Ren:
Balanced Off-Chain Payment Channel Network Routing Strategy Based On Weight Calculation. 907-922 - Yang Yang, Wenhao Liu, Guang Zeng:
A General Condition of Structural Distinguisher. 923-932 - Ricard Borges, Francesc Sebé:
An e-Coin Based Construction for Unlinkable Priced Oblivious Transfer. 933-940 - Ravneet Kaur, Amrinderpreet Singh, Aekamjot Singh, Amit Goyal, Amritpal Singh, Shalini Batra:
An Efficient Pending Interest Table Content Search In NDN through Stable Bloom Filter. 941-946 - M. Veera Brahmam, S. Gopikrishnan:
NODSTAC: Novel Outlier Detection Technique Based on Spatial, Temporal and Attribute Correlations on IoT Bigdata. 947-960 - Amir Tehrani, Meisam Yadollahzadeh Tabari, Aidin Zehtab-Salmasi, Rasul Enayatifar:
Wearable Sensor-Based Human Activity Recognition System Employing Bi-LSTM Algorithm. 961-975 - Qingjun Yuan, Yuefei Zhu, Gang Xiong, Yongjuan Wang, Wentao Yu, Bin Luo, Gaopeng Gou:
ULDC: Unsupervised Learning-Based Data Cleaning for Malicious Traffic With High Noise. 976-987 - Liqun Chen, Nada El Kassem, Christopher J. P. Newton:
How To Bind A TPM's Attestation Keys With Its Endorsement Key. 988-1004 - Patrizio Angelini, Giordano Da Lozzo, Henry Förster, Thomas Schneck:
2-Layer k-Planar Graphs Density, Crossing Lemma, Relationships And Pathwidth. 1005-1016 - Liang Zhang, Haibin Kan, Feiyang Qiu, Feng Hao:
A Publicly Verifiable Optimistic Fair Exchange Protocol Using Decentralized CP-ABE. 1017-1029 - Dong Fang, Guifang Huang, Mengfan Wang, Lei Hu:
Decreasing Proof Size of BLS Scheme. 1030-1040 - Yue Li, Jianfang Qi, Haibin Jin, Dong Tian, Weisong Mu, Jianying Feng:
An Improved Genetic-XGBoost Classifier for Customer Consumption Behavior Prediction. 1041-1059 - Yongcheng Song, Jiang Zhang, Xinyi Huang, Wei Wu, Haixia Chen:
Analysis and Construction of Zero-Knowledge Proofs for the MinRank Problem. 1060-1075 - Yilun Shang:
Resilient Vector Consensus Over Random Dynamic Networks Under Mobile Malicious Attacks. 1076-1086 - Jie Chen, Yinuo Luo, Jun Liu, Chao Wang, Yueyu Zhang, Xiaoli Dong:
A White-box Implementation of SM4 with Self-equivalence Encoding. 1087-1098 - Kashav Ajmera, Tribhuwan Kumar Tewari:
Dynamic Virtual Machine Scheduling Using Residual Optimum Power-Efficiency In The Cloud Data Center. 1099-1110 - Volkan Müjdat Tiryaki, Nedim Tutkun:
Breast Cancer Mass Classification Using Machine Learning, Binary-Coded Genetic Algorithms and an Ensemble of Deep Transfer Learning. 1111-1125 - Praveen Kumar Ramtekkar, Anjana Pandey, Mahesh Kumar Pawar:
A Comprehensive Review of Brain Tumour Detection Mechanisms. 1126-1152 - Zongyang Zhang, Lingyue Zhang, Zhuo Wang, Yichen Li, Rongxing Lu, Yong Yu:
Chronos: An Efficient Asynchronous Byzantine Ordered Consensus. 1153-1162 - Lidong Xu, Mingqiang Wang, Jing Qin:
Quantum Bit Commitment Without Quantum Memory. 1163-1170 - Meilian Lu, Meng Li:
A Multiple QoS Metrics-Aware Virtual Network Embedding Algorithm. 1171-1186 - Ashutosh Kumar, Aakanksha Sharaff:
SnorkelPlus: A Novel Approach for Identifying Relationships Among Biomedical Entities Within Abstracts. 1187-1200 - Jin Huo, Weihua Yang:
Pancyclic And Hamiltonian Properties Of Dragonfly Networks. 1201-1208 - Correction to: Perceptual Image Hashing Based on Canny Operator and Tensor for Copy-Move Forgery Detection. 1209
- Correction to: Hitting Times of Random Walks on Edge Corona Product Graphs. 1210
Volume 67, Number 4, 2024
- Timóteo Gomes, Fernanda M. R. Alencar:
An Ontology as Support for Specification of Non-functional Requirements of AAL Systems Considering Compliance Aspects. 1211-1225 - Jan Strappa, Facundo Bromberg:
Efficient Comparison Of Independence Structures Of Log-Linear Models. 1226-1252 - Xin Wang, Li Lin, Yao Wang:
Stealth Address Schemes With Fast Retrievability Based On Subgroup Membership Assumptions Related To Factoring. 1253-1264 - Handong Cui, Kwan Yin Chan, Tsz Hon Yuen, Xin Kang, Cheng-Kang Chu:
Bandwidth-Efficient Zero-Knowledge Proofs For Threshold ECDSA. 1265-1278 - Ching-Kuo Hsu:
A Genetic Algorithm Based Scheduling Method With Carrier Aggregation In 5G Networks. 1279-1285 - Erana Veerappa Dinesh Subramaniam, Valarmathi Krishnasamy:
Hybrid Optimal Ensemble SVM Forest Classifier for Task Offloading in Mobile Cloud Computing. 1286-1297 - Jiaomei Zhang, Ayong Ye, Jianwei Chen, Yuexin Zhang, Wenjie Yang:
CSFL: Cooperative Security Aware Federated Learning Model Using The Blockchain. 1298-1308 - Zhonghao Zhai, Subin Shen, Yan-qin Mao:
A Toolbox for Migrating the Blockchain-Based Application From Ethereum to Hyperledger Fabric. 1309-1323 - Juan Manuel Castelo Gómez, Javier Carrillo Mondéjar, José Roldán Gómez, José Luis Martínez:
A Concept Forensic Methodology For The Investigation Of IoT Cyberincidents. 1324-1345 - Weiwei Yang, Shangsong Liang, Jian Yin:
Spatial-Aware Multi-Directional Autoencoder For Pre-Training. 1346-1360 - Runze Yang, Baoqi Huang, Zhendong Xu, Bing Jia, Gang Xu:
Towards Accurate Smartphone Localization Using CSI Measurements. 1361-1369 - Shuai Liu, Jizhou Ren, Jie Guan, Bin Hu, Sudong Ma, Hao Bai:
A Break Of Barrier To Classical Differential Fault Attack On The Nonce-Based Authenticated Encryption Algorithm. 1370-1380 - Harold Thimbleby:
Improving Science That Uses Code. 1381-1404 - Lingyun Li, Xianhui Lu, Kunpeng Wang:
eBiBa: A Post-Quantum Hash-Based Signature With Small Signature Size in the Continuous Communication of Large-Scale Data. 1405-1424 - Yaofang Zhang, Peixuan Li, Ping Xie:
A Hybrid Scheme Combining Duplications and LDPC Decoding to Reduce NAND Flash. 1425-1437 - Paul Lou, Amit Sahai, Varun Sivashankar:
Relinearization Attack On LPN Over Large Fields. 1438-1442 - Qingyuan Yu, Lingyue Qin, Xiaoyang Dong, Keting Jia:
Improved Related-Key Rectangle Attacks On GIFT. 1443-1456 - Chang Shu, Yan Wang, Jianxi Fan, Guijuan Wang:
Super Structure Fault-Tolerance Assessment of the Generalized Hypercube. 1457-1466 - Dongchao Ma, Dongmei Wang, Xiaofu Huang, Yuekun Hu, Li Ma:
KEFSAR: A Solar-Aware Routing Strategy For Rechargeable IoT Based On High-Accuracy Prediction. 1467-1482 - Shiqi Hou, Baofeng Wu, Shichang Wang, Hao Guo, Dongdai Lin:
Truncated Differential Attacks On Symmetric Primitives With Linear Key Schedule: WARP And Orthros. 1483-1500 - Shuang Zhao, Shuhui Chen, Fei Wang, Ziling Wei, Jincheng Zhong, Jianbing Liang:
A Large-Scale Mobile Traffic Dataset For Mobile Application Identification. 1501-1513 - Daniel Lemire:
Exact Short Products From Truncated Multipliers. 1514-1520 - Zhaoliang Lin, Jinguo Li:
FedEVCP: Federated Learning-Based Anomalies Detection for Electric Vehicle Charging Pile. 1521-1530