Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/cj/cj67.bht:"
@article{DBLP:journals/cj/AbidCKTJ24, author = {Amal Abid and Saoussen Cheikhrouhou and Slim Kallel and Zahir Tari and Mohamed Jmaiel}, title = {A Smart Contract-Based Access Control Framework For Smart Healthcare Systems}, journal = {Comput. J.}, volume = {67}, number = {2}, pages = {407--422}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxac183}, doi = {10.1093/COMJNL/BXAC183}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/AbidCKTJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/AjmeraT24, author = {Kashav Ajmera and Tribhuwan Kumar Tewari}, title = {Dynamic Virtual Machine Scheduling Using Residual Optimum Power-Efficiency In The Cloud Data Center}, journal = {Comput. J.}, volume = {67}, number = {3}, pages = {1099--1110}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad045}, doi = {10.1093/COMJNL/BXAD045}, timestamp = {Sun, 05 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/AjmeraT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/AliS24, author = {Hala S. Ali and R. Sridevi}, title = {Mobility and Security Aware Real-Time Task Scheduling in Fog-Cloud Computing for IoT Devices: {A} Fuzzy-Logic Approach}, journal = {Comput. J.}, volume = {67}, number = {2}, pages = {782--805}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad019}, doi = {10.1093/COMJNL/BXAD019}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/AliS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/AminGhafariA24, author = {Vahid Amin Ghafari and Mahmoud Ahmadian{-}Attari}, title = {An Attack on a Proposed Construction of Small-State Stream Ciphers and Proposals for New Constructions}, journal = {Comput. J.}, volume = {67}, number = {1}, pages = {169--178}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxac165}, doi = {10.1093/COMJNL/BXAC165}, timestamp = {Fri, 10 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/AminGhafariA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/Angelides24, author = {Marios C. Angelides}, title = {Thematic Editorial: Mostly Artificial Intelligence {(AI)} or Machine Learning {(ML)} Now in the Engine Room, in Pursuit of a Green Agenda}, journal = {Comput. J.}, volume = {67}, number = {1}, pages = {1--2}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad115}, doi = {10.1093/COMJNL/BXAD115}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/Angelides24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/AngeliniLFS24, author = {Patrizio Angelini and Giordano Da Lozzo and Henry F{\"{o}}rster and Thomas Schneck}, title = {2-Layer \emph{k}-Planar Graphs Density, Crossing Lemma, Relationships And Pathwidth}, journal = {Comput. J.}, volume = {67}, number = {3}, pages = {1005--1016}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad038}, doi = {10.1093/COMJNL/BXAD038}, timestamp = {Sun, 05 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/AngeliniLFS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/AntonyS24, author = {Amalan Joseph Antony and Kunwar Singh}, title = {A Blockchain-Based Public Key Infrastructure For IoT-Based Healthcare Systems}, journal = {Comput. J.}, volume = {67}, number = {4}, pages = {1531--1537}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad079}, doi = {10.1093/COMJNL/BXAD079}, timestamp = {Sun, 05 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/AntonyS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/AouarYSNB24, author = {Aissam Aouar and Sa{\"{\i}}d Yahiaoui and Lamia Sadeg and Nadia Nouali{-}Taboudjemat and Kadda Beghdad Bey}, title = {Distributed Partial Simulation for Graph Pattern Matching}, journal = {Comput. J.}, volume = {67}, number = {1}, pages = {110--126}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxac161}, doi = {10.1093/COMJNL/BXAC161}, timestamp = {Sat, 27 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/AouarYSNB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ArboledaGZ24, author = {Francisco Javier Moreno Arboleda and Georgia Garani and Carlos Daniel Bolivar Zapata}, title = {Query Operators for Transactional Data: Detecting Similar and Periodic Transactions}, journal = {Comput. J.}, volume = {67}, number = {2}, pages = {437--446}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxac185}, doi = {10.1093/COMJNL/BXAC185}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/ArboledaGZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/Ashwini24, author = {K. Ashwini}, title = {User Name-Based Compression and Encryption of Images Using Chaotic Compressive Sensing Theory}, journal = {Comput. J.}, volume = {67}, number = {1}, pages = {304--322}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxac175}, doi = {10.1093/COMJNL/BXAC175}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/Ashwini24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/BorgesS24, author = {Ricard Borges and Francesc Seb{\'{e}}}, title = {An e-Coin Based Construction for Unlinkable Priced Oblivious Transfer}, journal = {Comput. J.}, volume = {67}, number = {3}, pages = {933--940}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad031}, doi = {10.1093/COMJNL/BXAD031}, timestamp = {Sun, 05 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/BorgesS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/BoudgoustR24, author = {Katharina Boudgoust and Adeline Roux{-}Langlois}, title = {Overfull: Too Large Aggregate Signatures Based on Lattices}, journal = {Comput. J.}, volume = {67}, number = {2}, pages = {719--727}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad013}, doi = {10.1093/COMJNL/BXAD013}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/BoudgoustR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/BrahmamG24, author = {M. Veera Brahmam and S. Gopikrishnan}, title = {{NODSTAC:} Novel Outlier Detection Technique Based on Spatial, Temporal and Attribute Correlations on IoT Bigdata}, journal = {Comput. J.}, volume = {67}, number = {3}, pages = {947--960}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad034}, doi = {10.1093/COMJNL/BXAD034}, timestamp = {Sun, 05 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/BrahmamG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/BrisaboaGGN24, author = {Nieves R. Brisaboa and Travis Gagie and Adri{\'{a}}n G{\'{o}}mez{-}Brand{\'{o}}n and Gonzalo Navarro}, title = {Two-Dimensional Block Trees}, journal = {Comput. J.}, volume = {67}, number = {1}, pages = {391--406}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxac182}, doi = {10.1093/COMJNL/BXAC182}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/BrisaboaGGN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ChenDRFWW24, author = {Zhiwei Chen and Lunzhi Deng and Yu Ruan and Shuai Feng and Tao Wang and Bo Wang}, title = {Certificateless Broadcast Encryption with Authorization Suitable for Storing Personal Health Records}, journal = {Comput. J.}, volume = {67}, number = {2}, pages = {617--631}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad004}, doi = {10.1093/COMJNL/BXAD004}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/ChenDRFWW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ChenKN24, author = {Liqun Chen and Nada El Kassem and Christopher J. P. Newton}, title = {How To Bind {A} TPM's Attestation Keys With Its Endorsement Key}, journal = {Comput. J.}, volume = {67}, number = {3}, pages = {988--1004}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad037}, doi = {10.1093/COMJNL/BXAD037}, timestamp = {Sun, 05 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/ChenKN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ChenLLWZD24, author = {Jie Chen and Yinuo Luo and Jun Liu and Chao Wang and Yueyu Zhang and Xiaoli Dong}, title = {A White-box Implementation of {SM4} with Self-equivalence Encoding}, journal = {Comput. J.}, volume = {67}, number = {3}, pages = {1087--1098}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad044}, doi = {10.1093/COMJNL/BXAD044}, timestamp = {Sun, 05 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/ChenLLWZD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/CuiCYKC24, author = {Handong Cui and Kwan Yin Chan and Tsz Hon Yuen and Xin Kang and Cheng{-}Kang Chu}, title = {Bandwidth-Efficient Zero-Knowledge Proofs For Threshold {ECDSA}}, journal = {Comput. J.}, volume = {67}, number = {4}, pages = {1265--1278}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad057}, doi = {10.1093/COMJNL/BXAD057}, timestamp = {Sun, 05 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/CuiCYKC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/DingWZS24, author = {Lin Ding and Zheng Wu and Guixian Zhang and Tairong Shi}, title = {Quantum Guess and Determine Attack on Stream Ciphers}, journal = {Comput. J.}, volume = {67}, number = {1}, pages = {292--303}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxac174}, doi = {10.1093/COMJNL/BXAC174}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/DingWZS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ErdemSC24, author = {Oguzhan Erdem and Tuncay Soylu and Aydin Carus}, title = {Pipelined Decision Trees for Online Traffic Classification on FPGAs}, journal = {Comput. J.}, volume = {67}, number = {3}, pages = {825--839}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad022}, doi = {10.1093/COMJNL/BXAD022}, timestamp = {Sun, 05 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/ErdemSC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/FangHWH24, author = {Dong Fang and Guifang Huang and Mengfan Wang and Lei Hu}, title = {Decreasing Proof Size of {BLS} Scheme}, journal = {Comput. J.}, volume = {67}, number = {3}, pages = {1030--1040}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad040}, doi = {10.1093/COMJNL/BXAD040}, timestamp = {Sun, 05 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/FangHWH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/GeW24, author = {Wenhan Ge and Junfeng Wang}, title = {SeqMask: Behavior Extraction Over Cyber Threat Intelligence Via Multi-Instance Learning}, journal = {Comput. J.}, volume = {67}, number = {1}, pages = {253--273}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxac172}, doi = {10.1093/COMJNL/BXAC172}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/GeW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/GnoumaEZ24, author = {Mariem Gnouma and Ridha Ejbali and Mourad Zaied}, title = {Deep Hashing and Sparse Representation of Abnormal Events Detection}, journal = {Comput. J.}, volume = {67}, number = {1}, pages = {3--17}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxac152}, doi = {10.1093/COMJNL/BXAC152}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/GnoumaEZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/GomesA24, author = {Tim{\'{o}}teo Gomes and Fernanda M. R. Alencar}, title = {An Ontology as Support for Specification of Non-functional Requirements of {AAL} Systems Considering Compliance Aspects}, journal = {Comput. J.}, volume = {67}, number = {4}, pages = {1211--1225}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad053}, doi = {10.1093/COMJNL/BXAD053}, timestamp = {Sun, 05 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/GomesA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/GomezMGM24, author = {Juan Manuel Castelo G{\'{o}}mez and Javier Carrillo Mond{\'{e}}jar and Jos{\'{e}} Rold{\'{a}}n G{\'{o}}mez and Jos{\'{e}} Luis Mart{\'{\i}}nez}, title = {A Concept Forensic Methodology For The Investigation Of IoT Cyberincidents}, journal = {Comput. J.}, volume = {67}, number = {4}, pages = {1324--1345}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad062}, doi = {10.1093/COMJNL/BXAD062}, timestamp = {Sun, 05 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/GomezMGM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/HatkeposhtiTG24, author = {Rahman Keramati Hatkeposhti and Meisam Yadollahzadeh Tabari and Mehdi GolsorkhtabariAmiri}, title = {Providing an Approach for Early Prediction of Fall in Human Activities Based on Wearable Sensor Data and the Use of Deep Learning Algorithms}, journal = {Comput. J.}, volume = {67}, number = {2}, pages = {658--673}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad008}, doi = {10.1093/COMJNL/BXAD008}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/HatkeposhtiTG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/HeY24, author = {Le He and Hongbo Yu}, title = {Cryptanalysis of Reduced-Round SipHash}, journal = {Comput. J.}, volume = {67}, number = {3}, pages = {875--883}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad026}, doi = {10.1093/COMJNL/BXAD026}, timestamp = {Sun, 05 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/HeY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/HouWWGL24, author = {Shiqi Hou and Baofeng Wu and Shichang Wang and Hao Guo and Dongdai Lin}, title = {Truncated Differential Attacks On Symmetric Primitives With Linear Key Schedule: {WARP} And Orthros}, journal = {Comput. J.}, volume = {67}, number = {4}, pages = {1483--1500}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad075}, doi = {10.1093/COMJNL/BXAD075}, timestamp = {Sun, 05 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/HouWWGL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/Hsu24, author = {Ching{-}Kuo Hsu}, title = {A Genetic Algorithm Based Scheduling Method With Carrier Aggregation In 5G Networks}, journal = {Comput. J.}, volume = {67}, number = {4}, pages = {1279--1285}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad058}, doi = {10.1093/COMJNL/BXAD058}, timestamp = {Sun, 05 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/Hsu24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/HsuXCH24, author = {Ching{-}Fang Hsu and Zhe Xia and Tianshu Cheng and Lein Harn}, title = {Extremely Lightweight Constant-Round Membership-Authenticated Group Key Establishment for Resource-Constrained Smart Environments toward 5G}, journal = {Comput. J.}, volume = {67}, number = {3}, pages = {840--850}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad023}, doi = {10.1093/COMJNL/BXAD023}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/HsuXCH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/HuangH24, author = {Chung{-}Ming Huang and Shu{-}Hang Huang}, title = {Traffic-Aware Re-Grouping for Load Balance in {IEEE} 802.11ah IoT Network Based on the Registered Backoff Time Mechanism}, journal = {Comput. J.}, volume = {67}, number = {3}, pages = {884--898}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad027}, doi = {10.1093/COMJNL/BXAD027}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/HuangH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/HuoY24, author = {Jin Huo and Weihua Yang}, title = {Pancyclic And Hamiltonian Properties Of Dragonfly Networks}, journal = {Comput. J.}, volume = {67}, number = {3}, pages = {1201--1208}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad052}, doi = {10.1093/COMJNL/BXAD052}, timestamp = {Sun, 05 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/HuoY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/JinM24, author = {Yaoan Jin and Atsuko Miyaji}, title = {Secure and Compact Elliptic Curve Scalar Multiplication with Optimized Inversion}, journal = {Comput. J.}, volume = {67}, number = {2}, pages = {474--484}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxac188}, doi = {10.1093/COMJNL/BXAC188}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/JinM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/JosephSB24, author = {Mabin Joseph and Gautham Sekar and R. Balasubramanian}, title = {Revisiting the Software-Efficient Stream Ciphers {RCR-64} and {RCR-32}}, journal = {Comput. J.}, volume = {67}, number = {4}, pages = {1590--1602}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad084}, doi = {10.1093/COMJNL/BXAD084}, timestamp = {Sun, 05 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/JosephSB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/KameiT24, author = {Sayaka Kamei and S{\'{e}}bastien Tixeuil}, title = {An Asynchronous Maximum Independent Set Algorithm By Myopic Luminous Robots On Grids}, journal = {Comput. J.}, volume = {67}, number = {1}, pages = {57--77}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxac158}, doi = {10.1093/COMJNL/BXAC158}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/KameiT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/KaurSSGSB24, author = {Ravneet Kaur and Amrinderpreet Singh and Aekamjot Singh and Amit Goyal and Amritpal Singh and Shalini Batra}, title = {An Efficient Pending Interest Table Content Search In {NDN} through Stable Bloom Filter}, journal = {Comput. J.}, volume = {67}, number = {3}, pages = {941--946}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad033}, doi = {10.1093/COMJNL/BXAD033}, timestamp = {Sun, 05 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/KaurSSGSB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/KumarS24, author = {Ashutosh Kumar and Aakanksha Sharaff}, title = {SnorkelPlus: {A} Novel Approach for Identifying Relationships Among Biomedical Entities Within Abstracts}, journal = {Comput. J.}, volume = {67}, number = {3}, pages = {1187--1200}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad051}, doi = {10.1093/COMJNL/BXAD051}, timestamp = {Sun, 05 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/KumarS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/Lemire24, author = {Daniel Lemire}, title = {Exact Short Products From Truncated Multipliers}, journal = {Comput. J.}, volume = {67}, number = {4}, pages = {1514--1520}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad077}, doi = {10.1093/COMJNL/BXAD077}, timestamp = {Sun, 05 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/Lemire24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/LiJLQ24, author = {He Li and Duo Jin and Xuejiao Li and Shaojie Qiao}, title = {A Dynamic Heterogeneous Graph Convolution Network For Traffic Flow Prediction}, journal = {Comput. J.}, volume = {67}, number = {1}, pages = {31--44}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxac156}, doi = {10.1093/COMJNL/BXAC156}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/LiJLQ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/LiLW24, author = {Lingyun Li and Xianhui Lu and Kunpeng Wang}, title = {eBiBa: {A} Post-Quantum Hash-Based Signature With Small Signature Size in the Continuous Communication of Large-Scale Data}, journal = {Comput. J.}, volume = {67}, number = {4}, pages = {1405--1424}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad068}, doi = {10.1093/COMJNL/BXAD068}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/LiLW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/LiQJTMF24, author = {Yue Li and Jianfang Qi and Haibin Jin and Dong Tian and Weisong Mu and Jianying Feng}, title = {An Improved Genetic-XGBoost Classifier for Customer Consumption Behavior Prediction}, journal = {Comput. J.}, volume = {67}, number = {3}, pages = {1041--1059}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad041}, doi = {10.1093/COMJNL/BXAD041}, timestamp = {Sun, 05 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/LiQJTMF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/LiZNYMJZ24, author = {Tongfeng Li and Ruisheng Zhang and Bojuan Niu and Yabing Yao and Jun Ma and Jing Jiang and Zhili Zhao}, title = {Link Prediction Based On Local Structure And Node Information Along Local Paths}, journal = {Comput. J.}, volume = {67}, number = {1}, pages = {45--56}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxac157}, doi = {10.1093/COMJNL/BXAC157}, timestamp = {Sat, 27 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/LiZNYMJZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/LinCCLYZTZ24, author = {Tu{-}Liang Lin and Hong{-}Yi Chang and Yuan{-}Yao Chiang and Shu{-}Cheng Lin and Tsung{-}Yen Yang and Chun{-}Jun Zhuang and Wha{-}Lee Tseng and Bo{-}Hao Zhang}, title = {Ransomware Detection by Distinguishing {API} Call Sequences through {LSTM} and {BERT} Models}, journal = {Comput. J.}, volume = {67}, number = {2}, pages = {632--641}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad005}, doi = {10.1093/COMJNL/BXAD005}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/LinCCLYZTZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/LinL24, author = {Zhaoliang Lin and Jinguo Li}, title = {FedEVCP: Federated Learning-Based Anomalies Detection for Electric Vehicle Charging Pile}, journal = {Comput. J.}, volume = {67}, number = {4}, pages = {1521--1530}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad078}, doi = {10.1093/COMJNL/BXAD078}, timestamp = {Sun, 05 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/LinL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/Liu24, author = {Tzong{-}Jye Liu}, title = {Adversarial Attacks on Network Intrusion Detection Systems Using Flow Containers}, journal = {Comput. J.}, volume = {67}, number = {2}, pages = {728--745}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad014}, doi = {10.1093/COMJNL/BXAD014}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/Liu24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/LiuC24, author = {Heqin Liu and Dongqin Cheng}, title = {Structure Fault Tolerance of Exchanged Hypercube}, journal = {Comput. J.}, volume = {67}, number = {2}, pages = {527--536}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxac194}, doi = {10.1093/COMJNL/BXAC194}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/LiuC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/LiuFZ24, author = {Changan Liu and Changjun Fan and Zhongzhi Zhang}, title = {Finding Influencers in Complex Networks: An Effective Deep Reinforcement Learning Approach}, journal = {Comput. J.}, volume = {67}, number = {2}, pages = {463--473}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxac187}, doi = {10.1093/COMJNL/BXAC187}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/LiuFZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/LiuGFM24, author = {Xiaoyang Liu and Luyuan Gao and Giacomo Fiumara and Pasquale De Meo}, title = {Key Node Identification Method Integrating Information Transmission Probability and Path Diversity in Complex Network}, journal = {Comput. J.}, volume = {67}, number = {1}, pages = {127--141}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxac162}, doi = {10.1093/COMJNL/BXAC162}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/LiuGFM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/LiuGXGG24, author = {Mengqi Liu and Hang Gao and Xiaofan Xia and Suying Gui and Tiegang Gao}, title = {Perceptual Image Hashing Based on Canny Operator and Tensor for Copy-Move Forgery Detection}, journal = {Comput. J.}, volume = {67}, number = {2}, pages = {447--462}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxac186}, doi = {10.1093/COMJNL/BXAC186}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/LiuGXGG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/LiuRGHMB24, author = {Shuai Liu and Jizhou Ren and Jie Guan and Bin Hu and Sudong Ma and Hao Bai}, title = {A Break Of Barrier To Classical Differential Fault Attack On The Nonce-Based Authenticated Encryption Algorithm}, journal = {Comput. J.}, volume = {67}, number = {4}, pages = {1370--1380}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad066}, doi = {10.1093/COMJNL/BXAD066}, timestamp = {Sun, 05 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/LiuRGHMB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/LiuWZR24, author = {Ya Liu and Yuanhang Wu and Fengyv Zhao and Yanli Ren}, title = {Balanced Off-Chain Payment Channel Network Routing Strategy Based On Weight Calculation}, journal = {Comput. J.}, volume = {67}, number = {3}, pages = {907--922}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad029}, doi = {10.1093/COMJNL/BXAD029}, timestamp = {Sun, 05 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/LiuWZR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/LiuZLZ24, author = {Xiaoqing Liu and Shuming Zhou and Jiafei Liu and Hong Zhang}, title = {Reliability Analysis of the Cactus-Based Networks Based on Subsystem}, journal = {Comput. J.}, volume = {67}, number = {1}, pages = {142--152}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxac163}, doi = {10.1093/COMJNL/BXAC163}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/LiuZLZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/LouSS24, author = {Paul Lou and Amit Sahai and Varun Sivashankar}, title = {Relinearization Attack On {LPN} Over Large Fields}, journal = {Comput. J.}, volume = {67}, number = {4}, pages = {1438--1442}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad070}, doi = {10.1093/COMJNL/BXAD070}, timestamp = {Sun, 05 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/LouSS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/LuL24, author = {Meilian Lu and Meng Li}, title = {A Multiple QoS Metrics-Aware Virtual Network Embedding Algorithm}, journal = {Comput. J.}, volume = {67}, number = {3}, pages = {1171--1186}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad050}, doi = {10.1093/COMJNL/BXAD050}, timestamp = {Sun, 05 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/LuL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/LuLSLL24, author = {Jinyu Lu and Guoqiang Liu and Bing Sun and Chao Li and Li Liu}, title = {Improved (Related-Key) Differential-Based Neural Distinguishers for {SIMON} and {SIMECK} Block Ciphers}, journal = {Comput. J.}, volume = {67}, number = {2}, pages = {537--547}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxac195}, doi = {10.1093/COMJNL/BXAC195}, timestamp = {Sun, 31 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/LuLSLL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/LuZLDL24, author = {Senxing Lu and Mingming Zhao and Chunlin Li and Quanbing Du and Youlong Luo}, title = {Time-Aware Data Partition Optimization and Heterogeneous Task Scheduling Strategies in Spark Clusters}, journal = {Comput. J.}, volume = {67}, number = {2}, pages = {762--776}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad017}, doi = {10.1093/COMJNL/BXAD017}, timestamp = {Fri, 05 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/LuZLDL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/LuoC24, author = {Qin Luo and Xin Cao}, title = {{PNCTS:} {A} Prediction and Network Coding-Based Transmission Scheme for Efficient Screen Updates Delivery in DaaS}, journal = {Comput. J.}, volume = {67}, number = {1}, pages = {153--168}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxac164}, doi = {10.1093/COMJNL/BXAC164}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/LuoC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/LvSHGGW24, author = {Yin Lv and Danping Shi and Lei Hu and Zihui Guo and Yi Guo and Caibing Wang}, title = {Improved Linear Cryptanalysis of Block Cipher {BORON}}, journal = {Comput. J.}, volume = {67}, number = {1}, pages = {210--219}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxac169}, doi = {10.1093/COMJNL/BXAC169}, timestamp = {Sat, 27 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/LvSHGGW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/MaWHHM24, author = {Dongchao Ma and Dongmei Wang and Xiaofu Huang and Yuekun Hu and Li Ma}, title = {{KEFSAR:} {A} Solar-Aware Routing Strategy For Rechargeable IoT Based On High-Accuracy Prediction}, journal = {Comput. J.}, volume = {67}, number = {4}, pages = {1467--1482}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad074}, doi = {10.1093/COMJNL/BXAD074}, timestamp = {Sun, 05 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/MaWHHM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/Manolopoulos24, author = {Yannis Manolopoulos}, title = {Thematic Editorial: The Ubiquitous Network}, journal = {Comput. J.}, volume = {67}, number = {3}, pages = {809--811}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxae032}, doi = {10.1093/COMJNL/BXAE032}, timestamp = {Sun, 05 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/Manolopoulos24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/Oksuz24, author = {Ozgur Oksuz}, title = {A System For Storing Anonymous Patient Healthcare Data Using Blockchain And Its Applications}, journal = {Comput. J.}, volume = {67}, number = {1}, pages = {18--30}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxac155}, doi = {10.1093/COMJNL/BXAC155}, timestamp = {Tue, 06 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/Oksuz24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/PaikJ24, author = {Joon{-}Young Paik and Rize Jin}, title = {Malware Family Prediction with an Awareness of Label Uncertainty}, journal = {Comput. J.}, volume = {67}, number = {1}, pages = {376--390}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxac181}, doi = {10.1093/COMJNL/BXAC181}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/PaikJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/PourianFT24, author = {Reza Ebrahim Pourian and Mehdi Fartash and Javad Akbari Torkestani}, title = {A Deep Learning Model for Energy-Aware Task Scheduling Algorithm Based on Learning Automata for Fog Computing}, journal = {Comput. J.}, volume = {67}, number = {2}, pages = {508--518}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxac192}, doi = {10.1093/COMJNL/BXAC192}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/PourianFT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/QiuLZ24, author = {Liqing Qiu and Yuying Liu and Jianyi Zhang}, title = {A New Method for Identifying Influential Spreaders in Complex Networks}, journal = {Comput. J.}, volume = {67}, number = {1}, pages = {362--375}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxac180}, doi = {10.1093/COMJNL/BXAC180}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/QiuLZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/RamtekkarPP24, author = {Praveen Kumar Ramtekkar and Anjana Pandey and Mahesh Kumar Pawar}, title = {A Comprehensive Review of Brain Tumour Detection Mechanisms}, journal = {Comput. J.}, volume = {67}, number = {3}, pages = {1126--1152}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad047}, doi = {10.1093/COMJNL/BXAD047}, timestamp = {Sun, 05 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/RamtekkarPP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/Saeed24, author = {Mozamel M. Saeed}, title = {Designing Scenarios for In-Organization Training Using the CyberCIEGE Game}, journal = {Comput. J.}, volume = {67}, number = {1}, pages = {338--346}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxac177}, doi = {10.1093/COMJNL/BXAC177}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/Saeed24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/SamiaAK24, author = {Hireche Samia and Dennai Abdeslem and Boufeldja Kadri}, title = {Toward a Novel {RESTFUL} Big Data-Based Urban Traffic Incident Data Web Service for Connected Vehicles}, journal = {Comput. J.}, volume = {67}, number = {2}, pages = {557--580}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad001}, doi = {10.1093/COMJNL/BXAD001}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/SamiaAK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ShajiS24, author = {C. Shaji and I. Shatheesh Sam}, title = {Encoding with Combination Orientation Technique for {RDH} in Dual Stego Images}, journal = {Comput. J.}, volume = {67}, number = {1}, pages = {347--361}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxac178}, doi = {10.1093/COMJNL/BXAC178}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/ShajiS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ShamsizadehZA24, author = {Marzieh Shamsizadeh and Mohammad Mehdi Zahedi and Khadijeh Abolpour}, title = {Irreducible Fuzzy Multiset Finite Automaton}, journal = {Comput. J.}, volume = {67}, number = {2}, pages = {519--526}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxac193}, doi = {10.1093/COMJNL/BXAC193}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/ShamsizadehZA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/Shang24, author = {Yilun Shang}, title = {Resilient Vector Consensus Over Random Dynamic Networks Under Mobile Malicious Attacks}, journal = {Comput. J.}, volume = {67}, number = {3}, pages = {1076--1086}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad043}, doi = {10.1093/COMJNL/BXAD043}, timestamp = {Sun, 05 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/Shang24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ShiLL24, author = {Jiali Shi and Chao Li and Guoqiang Liu}, title = {Differential Attack With Constants On {\(\mu\)}2 Block Cipher}, journal = {Comput. J.}, volume = {67}, number = {1}, pages = {195--209}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxac168}, doi = {10.1093/COMJNL/BXAC168}, timestamp = {Tue, 06 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/ShiLL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ShuWFW24, author = {Chang Shu and Yan Wang and Jianxi Fan and Guijuan Wang}, title = {Super Structure Fault-Tolerance Assessment of the Generalized Hypercube}, journal = {Comput. J.}, volume = {67}, number = {4}, pages = {1457--1466}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad072}, doi = {10.1093/COMJNL/BXAD072}, timestamp = {Sun, 05 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/ShuWFW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/SiLW24, author = {Shumin Si and Xiuhan Lin and Puwen Wei}, title = {Compressed Zero-Knowledge Proofs for Lattice-Based Accumulator}, journal = {Comput. J.}, volume = {67}, number = {2}, pages = {694--708}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad011}, doi = {10.1093/COMJNL/BXAD011}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/SiLW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/SimpsonDW24, author = {Andrew Simpson and Matthias Dellago and Daniel W. Woods}, title = {Formalizing Attack Trees To Support Economic Analysis}, journal = {Comput. J.}, volume = {67}, number = {1}, pages = {220--235}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxac170}, doi = {10.1093/COMJNL/BXAC170}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/SimpsonDW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/SongZHWC24, author = {Yongcheng Song and Jiang Zhang and Xinyi Huang and Wei Wu and Haixia Chen}, title = {Analysis and Construction of Zero-Knowledge Proofs for the MinRank Problem}, journal = {Comput. J.}, volume = {67}, number = {3}, pages = {1060--1075}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad042}, doi = {10.1093/COMJNL/BXAD042}, timestamp = {Sun, 05 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/SongZHWC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/StrappaB24, author = {Jan Strappa and Facundo Bromberg}, title = {Efficient Comparison Of Independence Structures Of Log-Linear Models}, journal = {Comput. J.}, volume = {67}, number = {4}, pages = {1226--1252}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad054}, doi = {10.1093/COMJNL/BXAD054}, timestamp = {Sun, 05 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/StrappaB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/SubramaniamK24, author = {Erana Veerappa Dinesh Subramaniam and Valarmathi Krishnasamy}, title = {Hybrid Optimal Ensemble {SVM} Forest Classifier for Task Offloading in Mobile Cloud Computing}, journal = {Comput. J.}, volume = {67}, number = {4}, pages = {1286--1297}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad059}, doi = {10.1093/COMJNL/BXAD059}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/SubramaniamK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/Suchenek24, author = {Marek A. Suchenek}, title = {Worst-Case Analysis of Heapsort, Exactly}, journal = {Comput. J.}, volume = {67}, number = {3}, pages = {812--824}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad007}, doi = {10.1093/COMJNL/BXAD007}, timestamp = {Sun, 05 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/Suchenek24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/SultanVDCN24, author = {Nazatul Haque Sultan and Vijay Varadharajan and Saurab Dulal and Seyit Camtepe and Surya Nepal}, title = {{NDN-RBE:} An Accountable Privacy Aware Access Control Framework For {NDN}}, journal = {Comput. J.}, volume = {67}, number = {4}, pages = {1572--1589}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad083}, doi = {10.1093/COMJNL/BXAD083}, timestamp = {Sun, 05 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/SultanVDCN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/TehraniTZE24, author = {Amir Tehrani and Meisam Yadollahzadeh Tabari and Aidin Zehtab{-}Salmasi and Rasul Enayatifar}, title = {Wearable Sensor-Based Human Activity Recognition System Employing Bi-LSTM Algorithm}, journal = {Comput. J.}, volume = {67}, number = {3}, pages = {961--975}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad035}, doi = {10.1093/COMJNL/BXAD035}, timestamp = {Sun, 05 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/TehraniTZE24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/Thimbleby24, author = {Harold Thimbleby}, title = {Improving Science That Uses Code}, journal = {Comput. J.}, volume = {67}, number = {4}, pages = {1381--1404}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad067}, doi = {10.1093/COMJNL/BXAD067}, timestamp = {Sun, 05 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/Thimbleby24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/TiryakiT24, author = {Volkan M{\"{u}}jdat Tiryaki and Nedim Tutkun}, title = {Breast Cancer Mass Classification Using Machine Learning, Binary-Coded Genetic Algorithms and an Ensemble of Deep Transfer Learning}, journal = {Comput. J.}, volume = {67}, number = {3}, pages = {1111--1125}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad046}, doi = {10.1093/COMJNL/BXAD046}, timestamp = {Sun, 05 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/TiryakiT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/WalshKWIOGDGD24, author = {James Walsh and Oluwafunmilola Kesa and Andrew Wang and Mihai Ilas and Patrick O'Hara and Oscar Giles and Neil Dhir and Mark Girolami and Theodoros Damoulas}, title = {Near Real-Time Social Distance Estimation In London}, journal = {Comput. J.}, volume = {67}, number = {1}, pages = {95--109}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxac160}, doi = {10.1093/COMJNL/BXAC160}, timestamp = {Sat, 27 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/WalshKWIOGDGD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/WangLW24, author = {Xin Wang and Li Lin and Yao Wang}, title = {Stealth Address Schemes With Fast Retrievability Based On Subgroup Membership Assumptions Related To Factoring}, journal = {Comput. J.}, volume = {67}, number = {4}, pages = {1253--1264}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad056}, doi = {10.1093/COMJNL/BXAD056}, timestamp = {Sun, 05 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/WangLW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/WangWSW24, author = {Zhuowei Wang and Hao Wang and Xiaoyu Song and Jiahui Wu}, title = {Communication-Aware Energy Consumption Model in Heterogeneous Computing Systems}, journal = {Comput. J.}, volume = {67}, number = {1}, pages = {78--94}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxac159}, doi = {10.1093/COMJNL/BXAC159}, timestamp = {Fri, 10 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/WangWSW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/WangWZZ24, author = {Bolin Wang and Wenling Wu and Yuhan Zhang and Li Zhang}, title = {New Integral Distinguishers On Permutation Of Whirlpool}, journal = {Comput. J.}, volume = {67}, number = {3}, pages = {899--906}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad028}, doi = {10.1093/COMJNL/BXAD028}, timestamp = {Sun, 05 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/WangWZZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/WangZJXLSH24, author = {Ke Wang and Zhenfeng Zhang and Haodong Jiang and Huiqin Xie and Yanjun Li and Ying Sun and Lidong Han}, title = {Key Reuse Attacks on Post-quantum Cryptosystems, Revisited}, journal = {Comput. J.}, volume = {67}, number = {1}, pages = {323--337}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxac176}, doi = {10.1093/COMJNL/BXAC176}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/WangZJXLSH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/WangZLWXN24, author = {Xiwen Wang and Kai Zhang and Jinguo Li and Mi Wen and Shengmin Xu and Jianting Ning}, title = {Non-interactive Boolean Searchable Asymmetric Encryption With Bilateral Access Control}, journal = {Comput. J.}, volume = {67}, number = {1}, pages = {179--194}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxac166}, doi = {10.1093/COMJNL/BXAC166}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/WangZLWXN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/WuCDZCS24, author = {Tongshuai Wu and Liwei Chen and Gewangzi Du and Chenguang Zhu and Ningning Cui and Gang Shi}, title = {{CDNM:} Clustering-Based Data Normalization Method For Automated Vulnerability Detection}, journal = {Comput. J.}, volume = {67}, number = {4}, pages = {1538--1549}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad080}, doi = {10.1093/COMJNL/BXAD080}, timestamp = {Sun, 05 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/WuCDZCS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/X24, title = {Correction to: An Attack on a Proposed Construction of Small-State Stream Ciphers and Proposals for New Constructions}, journal = {Comput. J.}, volume = {67}, number = {2}, pages = {806}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad020}, doi = {10.1093/COMJNL/BXAD020}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/X24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/X24a, title = {Correction to: Performance Evaluation of FPGA-Based {LSTM} Neural Networks for Pulse Signal Detection on Real-Time Radar Warning Receivers}, journal = {Comput. J.}, volume = {67}, number = {2}, pages = {807}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad021}, doi = {10.1093/COMJNL/BXAD021}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/X24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/X24b, title = {Correction to: Perceptual Image Hashing Based on Canny Operator and Tensor for Copy-Move Forgery Detection}, journal = {Comput. J.}, volume = {67}, number = {3}, pages = {1209}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad032}, doi = {10.1093/COMJNL/BXAD032}, timestamp = {Sun, 05 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/X24b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/X24c, title = {Correction to: Hitting Times of Random Walks on Edge Corona Product Graphs}, journal = {Comput. J.}, volume = {67}, number = {3}, pages = {1210}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad055}, doi = {10.1093/COMJNL/BXAD055}, timestamp = {Sun, 05 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/X24c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/X24d, title = {Correction to: Metaheuristic-Enabled Artificial Neural Network Framework For Multimodal Biometric Recognition With Local Fusion Visual Features}, journal = {Comput. J.}, volume = {67}, number = {4}, pages = {1603}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad064}, doi = {10.1093/COMJNL/BXAD064}, timestamp = {Sun, 05 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/X24d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/X24e, title = {Correction to: {A} Semantic Embedding Enhanced Topic Model For User-Generated Textual Content Modeling In Social Ecosystems}, journal = {Comput. J.}, volume = {67}, number = {4}, pages = {1604}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad073}, doi = {10.1093/COMJNL/BXAD073}, timestamp = {Sun, 05 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/X24e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/XuWQ24, author = {Lidong Xu and Mingqiang Wang and Jing Qin}, title = {Quantum Bit Commitment Without Quantum Memory}, journal = {Comput. J.}, volume = {67}, number = {3}, pages = {1163--1170}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad049}, doi = {10.1093/COMJNL/BXAD049}, timestamp = {Sun, 05 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/XuWQ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/XuZYZ24, author = {Yishu Xu and Peng Zhang and Hongtao Yu and Fuzhi Zhang}, title = {Detecting Group Shilling Attacks In Recommender Systems Based On User Multi-dimensional Features And Collusive Behaviour Analysis}, journal = {Comput. J.}, volume = {67}, number = {2}, pages = {604--616}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad003}, doi = {10.1093/COMJNL/BXAD003}, timestamp = {Sat, 27 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/XuZYZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/XueZZLQZ24, author = {Yuliang Xue and Yuhao Zhu and Zhiying Zhu and Sheng Li and Zhenxing Qian and Xinpeng Zhang}, title = {Removing Watermarks For Image Processing Networks Via Referenced Subspace Attention}, journal = {Comput. J.}, volume = {67}, number = {2}, pages = {498--507}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxac190}, doi = {10.1093/COMJNL/BXAC190}, timestamp = {Sat, 27 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/XueZZLQZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/Yang24, author = {Yuxing Yang}, title = {Hyper-Hamiltonian Laceability of Cartesian Products of Cycles and Paths}, journal = {Comput. J.}, volume = {67}, number = {2}, pages = {548--556}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxac196}, doi = {10.1093/COMJNL/BXAC196}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/Yang24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/YangHXJX24, author = {Runze Yang and Baoqi Huang and Zhendong Xu and Bing Jia and Gang Xu}, title = {Towards Accurate Smartphone Localization Using {CSI} Measurements}, journal = {Comput. J.}, volume = {67}, number = {4}, pages = {1361--1369}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad065}, doi = {10.1093/COMJNL/BXAD065}, timestamp = {Sun, 05 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/YangHXJX24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/YangLY24, author = {Weiwei Yang and Shangsong Liang and Jian Yin}, title = {Spatial-Aware Multi-Directional Autoencoder For Pre-Training}, journal = {Comput. J.}, volume = {67}, number = {4}, pages = {1346--1360}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad063}, doi = {10.1093/COMJNL/BXAD063}, timestamp = {Sun, 05 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/YangLY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/YangLZ24, author = {Yang Yang and Wenhao Liu and Guang Zeng}, title = {A General Condition of Structural Distinguisher}, journal = {Comput. J.}, volume = {67}, number = {3}, pages = {923--932}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad030}, doi = {10.1093/COMJNL/BXAD030}, timestamp = {Sun, 05 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/YangLZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/YangMDJH24, author = {Tian Yang and Sha Ma and Jiaojiao Du and Chengyu Jiang and Qiong Huang}, title = {Revocable Public Key Encryption with Equality Test without Pairing in Cloud Storage}, journal = {Comput. J.}, volume = {67}, number = {2}, pages = {642--657}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad006}, doi = {10.1093/COMJNL/BXAD006}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/YangMDJH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/YaoLCZCW24, author = {Shixiong Yao and Pei Li and Jing Chen and Yuexing Zeng and Jiageng Chen and Donghui Wang}, title = {CD-BCM:Cross-Domain Batch Certificates Management Based On Blockchain}, journal = {Comput. J.}, volume = {67}, number = {3}, pages = {864--874}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad025}, doi = {10.1093/COMJNL/BXAD025}, timestamp = {Sun, 05 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/YaoLCZCW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/YuQDJ24, author = {Qingyuan Yu and Lingyue Qin and Xiaoyang Dong and Keting Jia}, title = {Improved Related-Key Rectangle Attacks On \texttt{GIFT}}, journal = {Comput. J.}, volume = {67}, number = {4}, pages = {1443--1456}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad071}, doi = {10.1093/COMJNL/BXAD071}, timestamp = {Sun, 05 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/YuQDJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/YuX24, author = {Zhecheng Yu and Liqiong Xu}, title = {Reliability Evaluation Of Multiprocessor System Based On The Balanced Complete Multipartite Graphs}, journal = {Comput. J.}, volume = {67}, number = {2}, pages = {688--693}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad010}, doi = {10.1093/COMJNL/BXAD010}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/YuX24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/YuanLXGY24, author = {Zhu Yuan and Xueqiang Lv and Ping Xie and Haojie Ge and Xindong You}, title = {{CSEA:} {A} Fine-Grained Framework of Climate-Season-Based Energy-Aware in Cloud Storage Systems}, journal = {Comput. J.}, volume = {67}, number = {2}, pages = {423--436}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxac184}, doi = {10.1093/COMJNL/BXAC184}, timestamp = {Sat, 27 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/YuanLXGY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/YuanZN24, author = {Junying Yuan and Huicheng Zheng and Jiangqun Ni}, title = {Reversible Data Hiding With Pattern Adaptive Prediction}, journal = {Comput. J.}, volume = {67}, number = {4}, pages = {1564--1571}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad082}, doi = {10.1093/COMJNL/BXAD082}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/YuanZN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/YuanZXWYLG24, author = {Qingjun Yuan and Yuefei Zhu and Gang Xiong and Yongjuan Wang and Wentao Yu and Bin Luo and Gaopeng Gou}, title = {{ULDC:} Unsupervised Learning-Based Data Cleaning for Malicious Traffic With High Noise}, journal = {Comput. J.}, volume = {67}, number = {3}, pages = {976--987}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad036}, doi = {10.1093/COMJNL/BXAD036}, timestamp = {Sun, 05 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/YuanZXWYLG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ZhaiSM24, author = {Zhonghao Zhai and Subin Shen and Yan{-}qin Mao}, title = {A Toolbox for Migrating the Blockchain-Based Application From Ethereum to Hyperledger Fabric}, journal = {Comput. J.}, volume = {67}, number = {4}, pages = {1309--1323}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad061}, doi = {10.1093/COMJNL/BXAD061}, timestamp = {Sun, 05 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/ZhaiSM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ZhangKQH24, author = {Liang Zhang and Haibin Kan and Feiyang Qiu and Feng Hao}, title = {A Publicly Verifiable Optimistic Fair Exchange Protocol Using Decentralized {CP-ABE}}, journal = {Comput. J.}, volume = {67}, number = {3}, pages = {1017--1029}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad039}, doi = {10.1093/COMJNL/BXAD039}, timestamp = {Sun, 05 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/ZhangKQH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ZhangLX24, author = {Yaofang Zhang and Peixuan Li and Ping Xie}, title = {A Hybrid Scheme Combining Duplications and {LDPC} Decoding to Reduce {NAND} Flash}, journal = {Comput. J.}, volume = {67}, number = {4}, pages = {1425--1437}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad069}, doi = {10.1093/COMJNL/BXAD069}, timestamp = {Sun, 05 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/ZhangLX24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ZhangWB24, author = {Hongjin Zhang and Hui Wei and Wang Bo}, title = {A New Fuzzy Smoothing Term Model For Stereo Matching}, journal = {Comput. J.}, volume = {67}, number = {2}, pages = {746--761}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad015}, doi = {10.1093/COMJNL/BXAD015}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/ZhangWB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ZhangWLP24, author = {Dinghua Zhang and Shihao Wu and Yang Li and Quan Pan}, title = {An Evaluation On The Entropy Supplying Capability Of Smartphone Sensors}, journal = {Comput. J.}, volume = {67}, number = {4}, pages = {1550--1563}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad081}, doi = {10.1093/COMJNL/BXAD081}, timestamp = {Sun, 05 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/ZhangWLP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ZhangWYFX24, author = {Xu Zhang and Shunjie Wen and Liang Yan and Jiangfan Feng and Ying Xia}, title = {A Hybrid-Convolution Spatial-Temporal Recurrent Network For Traffic Flow Prediction}, journal = {Comput. J.}, volume = {67}, number = {1}, pages = {236--252}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxac171}, doi = {10.1093/COMJNL/BXAC171}, timestamp = {Sat, 27 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/ZhangWYFX24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ZhangYCZY24, author = {Jiaomei Zhang and Ayong Ye and Jianwei Chen and Yuexin Zhang and Wenjie Yang}, title = {{CSFL:} Cooperative Security Aware Federated Learning Model Using The Blockchain}, journal = {Comput. J.}, volume = {67}, number = {4}, pages = {1298--1308}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad060}, doi = {10.1093/COMJNL/BXAD060}, timestamp = {Sun, 05 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/ZhangYCZY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ZhangZC24, author = {Hong Zhang and Shuming Zhou and Eddie Cheng}, title = {The Cyclic Diagnosability Of Hypercubes Under The {PMC} Model And The MM* Model}, journal = {Comput. J.}, volume = {67}, number = {2}, pages = {709--718}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad012}, doi = {10.1093/COMJNL/BXAD012}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/ZhangZC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ZhangZWLLY24, author = {Zongyang Zhang and Lingyue Zhang and Zhuo Wang and Yichen Li and Rongxing Lu and Yong Yu}, title = {Chronos: An Efficient Asynchronous Byzantine Ordered Consensus}, journal = {Comput. J.}, volume = {67}, number = {3}, pages = {1153--1162}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad048}, doi = {10.1093/COMJNL/BXAD048}, timestamp = {Sun, 05 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/ZhangZWLLY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ZhangZWMZ24, author = {Li Zhang and Yu Zhang and Wenling Wu and Yongxia Mao and Yafei Zheng}, title = {Explicit Upper Bound Of Impossible Differentials For AES-Like Ciphers: Application To uBlock And Midori}, journal = {Comput. J.}, volume = {67}, number = {2}, pages = {674--687}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad009}, doi = {10.1093/COMJNL/BXAD009}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/ZhangZWMZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/Zhao24, author = {Xuefeng Zhao}, title = {Secure and Efficient Masking of Lightweight Ciphers in Software and Hardware}, journal = {Comput. J.}, volume = {67}, number = {2}, pages = {581--603}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad002}, doi = {10.1093/COMJNL/BXAD002}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/Zhao24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ZhaoCWWZL24, author = {Shuang Zhao and Shuhui Chen and Fei Wang and Ziling Wei and Jincheng Zhong and Jianbing Liang}, title = {A Large-Scale Mobile Traffic Dataset For Mobile Application Identification}, journal = {Comput. J.}, volume = {67}, number = {4}, pages = {1501--1513}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad076}, doi = {10.1093/COMJNL/BXAD076}, timestamp = {Sun, 05 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/ZhaoCWWZL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ZhaoL24, author = {Shijie Zhao and Pingshan Li}, title = {On Conditional Edge-Fault-Tolerant Strong Menger Edge Connectivity Of Folded Hypercubes}, journal = {Comput. J.}, volume = {67}, number = {2}, pages = {777--781}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad018}, doi = {10.1093/COMJNL/BXAD018}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/ZhaoL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ZhouHLLWZL24, author = {Shaohong Zhou and Junjiang He and Tao Li and Xiaolong Lan and Yunpeng Wang and Hui Zhao and Yihong Li}, title = {Automating the Deployment of Cyber Range with OpenStack}, journal = {Comput. J.}, volume = {67}, number = {3}, pages = {851--863}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad024}, doi = {10.1093/COMJNL/BXAD024}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/ZhouHLLWZL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ZhouZC24, author = {Chunning Zhou and Wentao Zhang and Weiwei Cao}, title = {A New Approach of Evaluating the Security Against Differential and Linear Cryptanalysis and Its Applications to Serpent, {NOEKEON} and {ASCON}}, journal = {Comput. J.}, volume = {67}, number = {1}, pages = {274--291}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxac173}, doi = {10.1093/COMJNL/BXAC173}, timestamp = {Sat, 27 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/ZhouZC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ZhuXLZK24, author = {Mingzhe Zhu and Wanyue Xu and Wei Li and Zhongzhi Zhang and Haibin Kan}, title = {Hitting Times of Random Walks on Edge Corona Product Graphs}, journal = {Comput. J.}, volume = {67}, number = {2}, pages = {485--497}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxac189}, doi = {10.1093/COMJNL/BXAC189}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/ZhuXLZK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.