Search dblp for Publications

export results for "toc:db/journals/cj/cj67.bht:"

 download as .bib file

@article{DBLP:journals/cj/AbidCKTJ24,
  author       = {Amal Abid and
                  Saoussen Cheikhrouhou and
                  Slim Kallel and
                  Zahir Tari and
                  Mohamed Jmaiel},
  title        = {A Smart Contract-Based Access Control Framework For Smart Healthcare
                  Systems},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {2},
  pages        = {407--422},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxac183},
  doi          = {10.1093/COMJNL/BXAC183},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cj/AbidCKTJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/AjmeraT24,
  author       = {Kashav Ajmera and
                  Tribhuwan Kumar Tewari},
  title        = {Dynamic Virtual Machine Scheduling Using Residual Optimum Power-Efficiency
                  In The Cloud Data Center},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {3},
  pages        = {1099--1110},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxad045},
  doi          = {10.1093/COMJNL/BXAD045},
  timestamp    = {Sun, 05 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/AjmeraT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/AliS24,
  author       = {Hala S. Ali and
                  R. Sridevi},
  title        = {Mobility and Security Aware Real-Time Task Scheduling in Fog-Cloud
                  Computing for IoT Devices: {A} Fuzzy-Logic Approach},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {2},
  pages        = {782--805},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxad019},
  doi          = {10.1093/COMJNL/BXAD019},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cj/AliS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/AminGhafariA24,
  author       = {Vahid Amin Ghafari and
                  Mahmoud Ahmadian{-}Attari},
  title        = {An Attack on a Proposed Construction of Small-State Stream Ciphers
                  and Proposals for New Constructions},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {1},
  pages        = {169--178},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxac165},
  doi          = {10.1093/COMJNL/BXAC165},
  timestamp    = {Fri, 10 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/AminGhafariA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/Angelides24,
  author       = {Marios C. Angelides},
  title        = {Thematic Editorial: Mostly Artificial Intelligence {(AI)} or Machine
                  Learning {(ML)} Now in the Engine Room, in Pursuit of a Green Agenda},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {1},
  pages        = {1--2},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxad115},
  doi          = {10.1093/COMJNL/BXAD115},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cj/Angelides24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/AngeliniLFS24,
  author       = {Patrizio Angelini and
                  Giordano Da Lozzo and
                  Henry F{\"{o}}rster and
                  Thomas Schneck},
  title        = {2-Layer \emph{k}-Planar Graphs Density, Crossing Lemma, Relationships
                  And Pathwidth},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {3},
  pages        = {1005--1016},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxad038},
  doi          = {10.1093/COMJNL/BXAD038},
  timestamp    = {Sun, 05 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/AngeliniLFS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/AntonyS24,
  author       = {Amalan Joseph Antony and
                  Kunwar Singh},
  title        = {A Blockchain-Based Public Key Infrastructure For IoT-Based Healthcare
                  Systems},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {4},
  pages        = {1531--1537},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxad079},
  doi          = {10.1093/COMJNL/BXAD079},
  timestamp    = {Sun, 05 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/AntonyS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/AouarYSNB24,
  author       = {Aissam Aouar and
                  Sa{\"{\i}}d Yahiaoui and
                  Lamia Sadeg and
                  Nadia Nouali{-}Taboudjemat and
                  Kadda Beghdad Bey},
  title        = {Distributed Partial Simulation for Graph Pattern Matching},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {1},
  pages        = {110--126},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxac161},
  doi          = {10.1093/COMJNL/BXAC161},
  timestamp    = {Sat, 27 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/AouarYSNB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/ArboledaGZ24,
  author       = {Francisco Javier Moreno Arboleda and
                  Georgia Garani and
                  Carlos Daniel Bolivar Zapata},
  title        = {Query Operators for Transactional Data: Detecting Similar and Periodic
                  Transactions},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {2},
  pages        = {437--446},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxac185},
  doi          = {10.1093/COMJNL/BXAC185},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cj/ArboledaGZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/Ashwini24,
  author       = {K. Ashwini},
  title        = {User Name-Based Compression and Encryption of Images Using Chaotic
                  Compressive Sensing Theory},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {1},
  pages        = {304--322},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxac175},
  doi          = {10.1093/COMJNL/BXAC175},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cj/Ashwini24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/BorgesS24,
  author       = {Ricard Borges and
                  Francesc Seb{\'{e}}},
  title        = {An e-Coin Based Construction for Unlinkable Priced Oblivious Transfer},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {3},
  pages        = {933--940},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxad031},
  doi          = {10.1093/COMJNL/BXAD031},
  timestamp    = {Sun, 05 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/BorgesS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/BoudgoustR24,
  author       = {Katharina Boudgoust and
                  Adeline Roux{-}Langlois},
  title        = {Overfull: Too Large Aggregate Signatures Based on Lattices},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {2},
  pages        = {719--727},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxad013},
  doi          = {10.1093/COMJNL/BXAD013},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cj/BoudgoustR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/BrahmamG24,
  author       = {M. Veera Brahmam and
                  S. Gopikrishnan},
  title        = {{NODSTAC:} Novel Outlier Detection Technique Based on Spatial, Temporal
                  and Attribute Correlations on IoT Bigdata},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {3},
  pages        = {947--960},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxad034},
  doi          = {10.1093/COMJNL/BXAD034},
  timestamp    = {Sun, 05 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/BrahmamG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/BrisaboaGGN24,
  author       = {Nieves R. Brisaboa and
                  Travis Gagie and
                  Adri{\'{a}}n G{\'{o}}mez{-}Brand{\'{o}}n and
                  Gonzalo Navarro},
  title        = {Two-Dimensional Block Trees},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {1},
  pages        = {391--406},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxac182},
  doi          = {10.1093/COMJNL/BXAC182},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cj/BrisaboaGGN24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/ChenDRFWW24,
  author       = {Zhiwei Chen and
                  Lunzhi Deng and
                  Yu Ruan and
                  Shuai Feng and
                  Tao Wang and
                  Bo Wang},
  title        = {Certificateless Broadcast Encryption with Authorization Suitable for
                  Storing Personal Health Records},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {2},
  pages        = {617--631},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxad004},
  doi          = {10.1093/COMJNL/BXAD004},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cj/ChenDRFWW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/ChenKN24,
  author       = {Liqun Chen and
                  Nada El Kassem and
                  Christopher J. P. Newton},
  title        = {How To Bind {A} TPM's Attestation Keys With Its Endorsement Key},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {3},
  pages        = {988--1004},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxad037},
  doi          = {10.1093/COMJNL/BXAD037},
  timestamp    = {Sun, 05 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/ChenKN24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/ChenLLWZD24,
  author       = {Jie Chen and
                  Yinuo Luo and
                  Jun Liu and
                  Chao Wang and
                  Yueyu Zhang and
                  Xiaoli Dong},
  title        = {A White-box Implementation of {SM4} with Self-equivalence Encoding},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {3},
  pages        = {1087--1098},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxad044},
  doi          = {10.1093/COMJNL/BXAD044},
  timestamp    = {Sun, 05 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/ChenLLWZD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/CuiCYKC24,
  author       = {Handong Cui and
                  Kwan Yin Chan and
                  Tsz Hon Yuen and
                  Xin Kang and
                  Cheng{-}Kang Chu},
  title        = {Bandwidth-Efficient Zero-Knowledge Proofs For Threshold {ECDSA}},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {4},
  pages        = {1265--1278},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxad057},
  doi          = {10.1093/COMJNL/BXAD057},
  timestamp    = {Sun, 05 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/CuiCYKC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/DingWZS24,
  author       = {Lin Ding and
                  Zheng Wu and
                  Guixian Zhang and
                  Tairong Shi},
  title        = {Quantum Guess and Determine Attack on Stream Ciphers},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {1},
  pages        = {292--303},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxac174},
  doi          = {10.1093/COMJNL/BXAC174},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cj/DingWZS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/ErdemSC24,
  author       = {Oguzhan Erdem and
                  Tuncay Soylu and
                  Aydin Carus},
  title        = {Pipelined Decision Trees for Online Traffic Classification on FPGAs},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {3},
  pages        = {825--839},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxad022},
  doi          = {10.1093/COMJNL/BXAD022},
  timestamp    = {Sun, 05 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/ErdemSC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/FangHWH24,
  author       = {Dong Fang and
                  Guifang Huang and
                  Mengfan Wang and
                  Lei Hu},
  title        = {Decreasing Proof Size of {BLS} Scheme},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {3},
  pages        = {1030--1040},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxad040},
  doi          = {10.1093/COMJNL/BXAD040},
  timestamp    = {Sun, 05 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/FangHWH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/GeW24,
  author       = {Wenhan Ge and
                  Junfeng Wang},
  title        = {SeqMask: Behavior Extraction Over Cyber Threat Intelligence Via Multi-Instance
                  Learning},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {1},
  pages        = {253--273},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxac172},
  doi          = {10.1093/COMJNL/BXAC172},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cj/GeW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/GnoumaEZ24,
  author       = {Mariem Gnouma and
                  Ridha Ejbali and
                  Mourad Zaied},
  title        = {Deep Hashing and Sparse Representation of Abnormal Events Detection},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {1},
  pages        = {3--17},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxac152},
  doi          = {10.1093/COMJNL/BXAC152},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cj/GnoumaEZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/GomesA24,
  author       = {Tim{\'{o}}teo Gomes and
                  Fernanda M. R. Alencar},
  title        = {An Ontology as Support for Specification of Non-functional Requirements
                  of {AAL} Systems Considering Compliance Aspects},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {4},
  pages        = {1211--1225},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxad053},
  doi          = {10.1093/COMJNL/BXAD053},
  timestamp    = {Sun, 05 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/GomesA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/GomezMGM24,
  author       = {Juan Manuel Castelo G{\'{o}}mez and
                  Javier Carrillo Mond{\'{e}}jar and
                  Jos{\'{e}} Rold{\'{a}}n G{\'{o}}mez and
                  Jos{\'{e}} Luis Mart{\'{\i}}nez},
  title        = {A Concept Forensic Methodology For The Investigation Of IoT Cyberincidents},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {4},
  pages        = {1324--1345},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxad062},
  doi          = {10.1093/COMJNL/BXAD062},
  timestamp    = {Sun, 05 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/GomezMGM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/HatkeposhtiTG24,
  author       = {Rahman Keramati Hatkeposhti and
                  Meisam Yadollahzadeh Tabari and
                  Mehdi GolsorkhtabariAmiri},
  title        = {Providing an Approach for Early Prediction of Fall in Human Activities
                  Based on Wearable Sensor Data and the Use of Deep Learning Algorithms},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {2},
  pages        = {658--673},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxad008},
  doi          = {10.1093/COMJNL/BXAD008},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cj/HatkeposhtiTG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/HeY24,
  author       = {Le He and
                  Hongbo Yu},
  title        = {Cryptanalysis of Reduced-Round SipHash},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {3},
  pages        = {875--883},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxad026},
  doi          = {10.1093/COMJNL/BXAD026},
  timestamp    = {Sun, 05 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/HeY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/HouWWGL24,
  author       = {Shiqi Hou and
                  Baofeng Wu and
                  Shichang Wang and
                  Hao Guo and
                  Dongdai Lin},
  title        = {Truncated Differential Attacks On Symmetric Primitives With Linear
                  Key Schedule: {WARP} And Orthros},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {4},
  pages        = {1483--1500},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxad075},
  doi          = {10.1093/COMJNL/BXAD075},
  timestamp    = {Sun, 05 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/HouWWGL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/Hsu24,
  author       = {Ching{-}Kuo Hsu},
  title        = {A Genetic Algorithm Based Scheduling Method With Carrier Aggregation
                  In 5G Networks},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {4},
  pages        = {1279--1285},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxad058},
  doi          = {10.1093/COMJNL/BXAD058},
  timestamp    = {Sun, 05 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/Hsu24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/HsuXCH24,
  author       = {Ching{-}Fang Hsu and
                  Zhe Xia and
                  Tianshu Cheng and
                  Lein Harn},
  title        = {Extremely Lightweight Constant-Round Membership-Authenticated Group
                  Key Establishment for Resource-Constrained Smart Environments toward
                  5G},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {3},
  pages        = {840--850},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxad023},
  doi          = {10.1093/COMJNL/BXAD023},
  timestamp    = {Sun, 05 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/HsuXCH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/HuangH24,
  author       = {Chung{-}Ming Huang and
                  Shu{-}Hang Huang},
  title        = {Traffic-Aware Re-Grouping for Load Balance in {IEEE} 802.11ah IoT
                  Network Based on the Registered Backoff Time Mechanism},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {3},
  pages        = {884--898},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxad027},
  doi          = {10.1093/COMJNL/BXAD027},
  timestamp    = {Sun, 05 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/HuangH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/HuoY24,
  author       = {Jin Huo and
                  Weihua Yang},
  title        = {Pancyclic And Hamiltonian Properties Of Dragonfly Networks},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {3},
  pages        = {1201--1208},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxad052},
  doi          = {10.1093/COMJNL/BXAD052},
  timestamp    = {Sun, 05 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/HuoY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/JinM24,
  author       = {Yaoan Jin and
                  Atsuko Miyaji},
  title        = {Secure and Compact Elliptic Curve Scalar Multiplication with Optimized
                  Inversion},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {2},
  pages        = {474--484},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxac188},
  doi          = {10.1093/COMJNL/BXAC188},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/JinM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/JosephSB24,
  author       = {Mabin Joseph and
                  Gautham Sekar and
                  R. Balasubramanian},
  title        = {Revisiting the Software-Efficient Stream Ciphers {RCR-64} and {RCR-32}},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {4},
  pages        = {1590--1602},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxad084},
  doi          = {10.1093/COMJNL/BXAD084},
  timestamp    = {Sun, 05 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/JosephSB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/KameiT24,
  author       = {Sayaka Kamei and
                  S{\'{e}}bastien Tixeuil},
  title        = {An Asynchronous Maximum Independent Set Algorithm By Myopic Luminous
                  Robots On Grids},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {1},
  pages        = {57--77},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxac158},
  doi          = {10.1093/COMJNL/BXAC158},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cj/KameiT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/KaurSSGSB24,
  author       = {Ravneet Kaur and
                  Amrinderpreet Singh and
                  Aekamjot Singh and
                  Amit Goyal and
                  Amritpal Singh and
                  Shalini Batra},
  title        = {An Efficient Pending Interest Table Content Search In {NDN} through
                  Stable Bloom Filter},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {3},
  pages        = {941--946},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxad033},
  doi          = {10.1093/COMJNL/BXAD033},
  timestamp    = {Sun, 05 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/KaurSSGSB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/KumarS24,
  author       = {Ashutosh Kumar and
                  Aakanksha Sharaff},
  title        = {SnorkelPlus: {A} Novel Approach for Identifying Relationships Among
                  Biomedical Entities Within Abstracts},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {3},
  pages        = {1187--1200},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxad051},
  doi          = {10.1093/COMJNL/BXAD051},
  timestamp    = {Sun, 05 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/KumarS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/Lemire24,
  author       = {Daniel Lemire},
  title        = {Exact Short Products From Truncated Multipliers},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {4},
  pages        = {1514--1520},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxad077},
  doi          = {10.1093/COMJNL/BXAD077},
  timestamp    = {Sun, 05 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/Lemire24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/LiJLQ24,
  author       = {He Li and
                  Duo Jin and
                  Xuejiao Li and
                  Shaojie Qiao},
  title        = {A Dynamic Heterogeneous Graph Convolution Network For Traffic Flow
                  Prediction},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {1},
  pages        = {31--44},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxac156},
  doi          = {10.1093/COMJNL/BXAC156},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cj/LiJLQ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/LiLW24,
  author       = {Lingyun Li and
                  Xianhui Lu and
                  Kunpeng Wang},
  title        = {eBiBa: {A} Post-Quantum Hash-Based Signature With Small Signature
                  Size in the Continuous Communication of Large-Scale Data},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {4},
  pages        = {1405--1424},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxad068},
  doi          = {10.1093/COMJNL/BXAD068},
  timestamp    = {Sun, 05 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/LiLW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/LiQJTMF24,
  author       = {Yue Li and
                  Jianfang Qi and
                  Haibin Jin and
                  Dong Tian and
                  Weisong Mu and
                  Jianying Feng},
  title        = {An Improved Genetic-XGBoost Classifier for Customer Consumption Behavior
                  Prediction},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {3},
  pages        = {1041--1059},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxad041},
  doi          = {10.1093/COMJNL/BXAD041},
  timestamp    = {Sun, 05 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/LiQJTMF24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/LiZNYMJZ24,
  author       = {Tongfeng Li and
                  Ruisheng Zhang and
                  Bojuan Niu and
                  Yabing Yao and
                  Jun Ma and
                  Jing Jiang and
                  Zhili Zhao},
  title        = {Link Prediction Based On Local Structure And Node Information Along
                  Local Paths},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {1},
  pages        = {45--56},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxac157},
  doi          = {10.1093/COMJNL/BXAC157},
  timestamp    = {Sat, 27 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/LiZNYMJZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/LinCCLYZTZ24,
  author       = {Tu{-}Liang Lin and
                  Hong{-}Yi Chang and
                  Yuan{-}Yao Chiang and
                  Shu{-}Cheng Lin and
                  Tsung{-}Yen Yang and
                  Chun{-}Jun Zhuang and
                  Wha{-}Lee Tseng and
                  Bo{-}Hao Zhang},
  title        = {Ransomware Detection by Distinguishing {API} Call Sequences through
                  {LSTM} and {BERT} Models},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {2},
  pages        = {632--641},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxad005},
  doi          = {10.1093/COMJNL/BXAD005},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cj/LinCCLYZTZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/LinL24,
  author       = {Zhaoliang Lin and
                  Jinguo Li},
  title        = {FedEVCP: Federated Learning-Based Anomalies Detection for Electric
                  Vehicle Charging Pile},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {4},
  pages        = {1521--1530},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxad078},
  doi          = {10.1093/COMJNL/BXAD078},
  timestamp    = {Sun, 05 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/LinL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/Liu24,
  author       = {Tzong{-}Jye Liu},
  title        = {Adversarial Attacks on Network Intrusion Detection Systems Using Flow
                  Containers},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {2},
  pages        = {728--745},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxad014},
  doi          = {10.1093/COMJNL/BXAD014},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cj/Liu24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/LiuC24,
  author       = {Heqin Liu and
                  Dongqin Cheng},
  title        = {Structure Fault Tolerance of Exchanged Hypercube},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {2},
  pages        = {527--536},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxac194},
  doi          = {10.1093/COMJNL/BXAC194},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cj/LiuC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/LiuFZ24,
  author       = {Changan Liu and
                  Changjun Fan and
                  Zhongzhi Zhang},
  title        = {Finding Influencers in Complex Networks: An Effective Deep Reinforcement
                  Learning Approach},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {2},
  pages        = {463--473},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxac187},
  doi          = {10.1093/COMJNL/BXAC187},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cj/LiuFZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/LiuGFM24,
  author       = {Xiaoyang Liu and
                  Luyuan Gao and
                  Giacomo Fiumara and
                  Pasquale De Meo},
  title        = {Key Node Identification Method Integrating Information Transmission
                  Probability and Path Diversity in Complex Network},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {1},
  pages        = {127--141},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxac162},
  doi          = {10.1093/COMJNL/BXAC162},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cj/LiuGFM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/LiuGXGG24,
  author       = {Mengqi Liu and
                  Hang Gao and
                  Xiaofan Xia and
                  Suying Gui and
                  Tiegang Gao},
  title        = {Perceptual Image Hashing Based on Canny Operator and Tensor for Copy-Move
                  Forgery Detection},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {2},
  pages        = {447--462},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxac186},
  doi          = {10.1093/COMJNL/BXAC186},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cj/LiuGXGG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/LiuRGHMB24,
  author       = {Shuai Liu and
                  Jizhou Ren and
                  Jie Guan and
                  Bin Hu and
                  Sudong Ma and
                  Hao Bai},
  title        = {A Break Of Barrier To Classical Differential Fault Attack On The Nonce-Based
                  Authenticated Encryption Algorithm},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {4},
  pages        = {1370--1380},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxad066},
  doi          = {10.1093/COMJNL/BXAD066},
  timestamp    = {Sun, 05 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/LiuRGHMB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/LiuWZR24,
  author       = {Ya Liu and
                  Yuanhang Wu and
                  Fengyv Zhao and
                  Yanli Ren},
  title        = {Balanced Off-Chain Payment Channel Network Routing Strategy Based
                  On Weight Calculation},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {3},
  pages        = {907--922},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxad029},
  doi          = {10.1093/COMJNL/BXAD029},
  timestamp    = {Sun, 05 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/LiuWZR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/LiuZLZ24,
  author       = {Xiaoqing Liu and
                  Shuming Zhou and
                  Jiafei Liu and
                  Hong Zhang},
  title        = {Reliability Analysis of the Cactus-Based Networks Based on Subsystem},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {1},
  pages        = {142--152},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxac163},
  doi          = {10.1093/COMJNL/BXAC163},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cj/LiuZLZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/LouSS24,
  author       = {Paul Lou and
                  Amit Sahai and
                  Varun Sivashankar},
  title        = {Relinearization Attack On {LPN} Over Large Fields},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {4},
  pages        = {1438--1442},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxad070},
  doi          = {10.1093/COMJNL/BXAD070},
  timestamp    = {Sun, 05 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/LouSS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/LuL24,
  author       = {Meilian Lu and
                  Meng Li},
  title        = {A Multiple QoS Metrics-Aware Virtual Network Embedding Algorithm},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {3},
  pages        = {1171--1186},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxad050},
  doi          = {10.1093/COMJNL/BXAD050},
  timestamp    = {Sun, 05 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/LuL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/LuLSLL24,
  author       = {Jinyu Lu and
                  Guoqiang Liu and
                  Bing Sun and
                  Chao Li and
                  Li Liu},
  title        = {Improved (Related-Key) Differential-Based Neural Distinguishers for
                  {SIMON} and {SIMECK} Block Ciphers},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {2},
  pages        = {537--547},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxac195},
  doi          = {10.1093/COMJNL/BXAC195},
  timestamp    = {Sun, 31 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cj/LuLSLL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/LuZLDL24,
  author       = {Senxing Lu and
                  Mingming Zhao and
                  Chunlin Li and
                  Quanbing Du and
                  Youlong Luo},
  title        = {Time-Aware Data Partition Optimization and Heterogeneous Task Scheduling
                  Strategies in Spark Clusters},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {2},
  pages        = {762--776},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxad017},
  doi          = {10.1093/COMJNL/BXAD017},
  timestamp    = {Fri, 05 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/LuZLDL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/LuoC24,
  author       = {Qin Luo and
                  Xin Cao},
  title        = {{PNCTS:} {A} Prediction and Network Coding-Based Transmission Scheme
                  for Efficient Screen Updates Delivery in DaaS},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {1},
  pages        = {153--168},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxac164},
  doi          = {10.1093/COMJNL/BXAC164},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cj/LuoC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/LvSHGGW24,
  author       = {Yin Lv and
                  Danping Shi and
                  Lei Hu and
                  Zihui Guo and
                  Yi Guo and
                  Caibing Wang},
  title        = {Improved Linear Cryptanalysis of Block Cipher {BORON}},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {1},
  pages        = {210--219},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxac169},
  doi          = {10.1093/COMJNL/BXAC169},
  timestamp    = {Sat, 27 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/LvSHGGW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/MaWHHM24,
  author       = {Dongchao Ma and
                  Dongmei Wang and
                  Xiaofu Huang and
                  Yuekun Hu and
                  Li Ma},
  title        = {{KEFSAR:} {A} Solar-Aware Routing Strategy For Rechargeable IoT Based
                  On High-Accuracy Prediction},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {4},
  pages        = {1467--1482},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxad074},
  doi          = {10.1093/COMJNL/BXAD074},
  timestamp    = {Sun, 05 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/MaWHHM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/Manolopoulos24,
  author       = {Yannis Manolopoulos},
  title        = {Thematic Editorial: The Ubiquitous Network},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {3},
  pages        = {809--811},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxae032},
  doi          = {10.1093/COMJNL/BXAE032},
  timestamp    = {Sun, 05 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/Manolopoulos24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/Oksuz24,
  author       = {Ozgur Oksuz},
  title        = {A System For Storing Anonymous Patient Healthcare Data Using Blockchain
                  And Its Applications},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {1},
  pages        = {18--30},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxac155},
  doi          = {10.1093/COMJNL/BXAC155},
  timestamp    = {Tue, 06 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cj/Oksuz24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/PaikJ24,
  author       = {Joon{-}Young Paik and
                  Rize Jin},
  title        = {Malware Family Prediction with an Awareness of Label Uncertainty},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {1},
  pages        = {376--390},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxac181},
  doi          = {10.1093/COMJNL/BXAC181},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cj/PaikJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/PourianFT24,
  author       = {Reza Ebrahim Pourian and
                  Mehdi Fartash and
                  Javad Akbari Torkestani},
  title        = {A Deep Learning Model for Energy-Aware Task Scheduling Algorithm Based
                  on Learning Automata for Fog Computing},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {2},
  pages        = {508--518},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxac192},
  doi          = {10.1093/COMJNL/BXAC192},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cj/PourianFT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/QiuLZ24,
  author       = {Liqing Qiu and
                  Yuying Liu and
                  Jianyi Zhang},
  title        = {A New Method for Identifying Influential Spreaders in Complex Networks},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {1},
  pages        = {362--375},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxac180},
  doi          = {10.1093/COMJNL/BXAC180},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cj/QiuLZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/RamtekkarPP24,
  author       = {Praveen Kumar Ramtekkar and
                  Anjana Pandey and
                  Mahesh Kumar Pawar},
  title        = {A Comprehensive Review of Brain Tumour Detection Mechanisms},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {3},
  pages        = {1126--1152},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxad047},
  doi          = {10.1093/COMJNL/BXAD047},
  timestamp    = {Sun, 05 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/RamtekkarPP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/Saeed24,
  author       = {Mozamel M. Saeed},
  title        = {Designing Scenarios for In-Organization Training Using the CyberCIEGE
                  Game},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {1},
  pages        = {338--346},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxac177},
  doi          = {10.1093/COMJNL/BXAC177},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cj/Saeed24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/SamiaAK24,
  author       = {Hireche Samia and
                  Dennai Abdeslem and
                  Boufeldja Kadri},
  title        = {Toward a Novel {RESTFUL} Big Data-Based Urban Traffic Incident Data
                  Web Service for Connected Vehicles},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {2},
  pages        = {557--580},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxad001},
  doi          = {10.1093/COMJNL/BXAD001},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cj/SamiaAK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/ShajiS24,
  author       = {C. Shaji and
                  I. Shatheesh Sam},
  title        = {Encoding with Combination Orientation Technique for {RDH} in Dual
                  Stego Images},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {1},
  pages        = {347--361},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxac178},
  doi          = {10.1093/COMJNL/BXAC178},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cj/ShajiS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/ShamsizadehZA24,
  author       = {Marzieh Shamsizadeh and
                  Mohammad Mehdi Zahedi and
                  Khadijeh Abolpour},
  title        = {Irreducible Fuzzy Multiset Finite Automaton},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {2},
  pages        = {519--526},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxac193},
  doi          = {10.1093/COMJNL/BXAC193},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cj/ShamsizadehZA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/Shang24,
  author       = {Yilun Shang},
  title        = {Resilient Vector Consensus Over Random Dynamic Networks Under Mobile
                  Malicious Attacks},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {3},
  pages        = {1076--1086},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxad043},
  doi          = {10.1093/COMJNL/BXAD043},
  timestamp    = {Sun, 05 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/Shang24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/ShiLL24,
  author       = {Jiali Shi and
                  Chao Li and
                  Guoqiang Liu},
  title        = {Differential Attack With Constants On {\(\mu\)}2 Block Cipher},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {1},
  pages        = {195--209},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxac168},
  doi          = {10.1093/COMJNL/BXAC168},
  timestamp    = {Tue, 06 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cj/ShiLL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/ShuWFW24,
  author       = {Chang Shu and
                  Yan Wang and
                  Jianxi Fan and
                  Guijuan Wang},
  title        = {Super Structure Fault-Tolerance Assessment of the Generalized Hypercube},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {4},
  pages        = {1457--1466},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxad072},
  doi          = {10.1093/COMJNL/BXAD072},
  timestamp    = {Sun, 05 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/ShuWFW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/SiLW24,
  author       = {Shumin Si and
                  Xiuhan Lin and
                  Puwen Wei},
  title        = {Compressed Zero-Knowledge Proofs for Lattice-Based Accumulator},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {2},
  pages        = {694--708},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxad011},
  doi          = {10.1093/COMJNL/BXAD011},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cj/SiLW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/SimpsonDW24,
  author       = {Andrew Simpson and
                  Matthias Dellago and
                  Daniel W. Woods},
  title        = {Formalizing Attack Trees To Support Economic Analysis},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {1},
  pages        = {220--235},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxac170},
  doi          = {10.1093/COMJNL/BXAC170},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cj/SimpsonDW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/SongZHWC24,
  author       = {Yongcheng Song and
                  Jiang Zhang and
                  Xinyi Huang and
                  Wei Wu and
                  Haixia Chen},
  title        = {Analysis and Construction of Zero-Knowledge Proofs for the MinRank
                  Problem},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {3},
  pages        = {1060--1075},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxad042},
  doi          = {10.1093/COMJNL/BXAD042},
  timestamp    = {Sun, 05 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/SongZHWC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/StrappaB24,
  author       = {Jan Strappa and
                  Facundo Bromberg},
  title        = {Efficient Comparison Of Independence Structures Of Log-Linear Models},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {4},
  pages        = {1226--1252},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxad054},
  doi          = {10.1093/COMJNL/BXAD054},
  timestamp    = {Sun, 05 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/StrappaB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/SubramaniamK24,
  author       = {Erana Veerappa Dinesh Subramaniam and
                  Valarmathi Krishnasamy},
  title        = {Hybrid Optimal Ensemble {SVM} Forest Classifier for Task Offloading
                  in Mobile Cloud Computing},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {4},
  pages        = {1286--1297},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxad059},
  doi          = {10.1093/COMJNL/BXAD059},
  timestamp    = {Sun, 05 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/SubramaniamK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/Suchenek24,
  author       = {Marek A. Suchenek},
  title        = {Worst-Case Analysis of Heapsort, Exactly},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {3},
  pages        = {812--824},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxad007},
  doi          = {10.1093/COMJNL/BXAD007},
  timestamp    = {Sun, 05 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/Suchenek24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/SultanVDCN24,
  author       = {Nazatul Haque Sultan and
                  Vijay Varadharajan and
                  Saurab Dulal and
                  Seyit Camtepe and
                  Surya Nepal},
  title        = {{NDN-RBE:} An Accountable Privacy Aware Access Control Framework For
                  {NDN}},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {4},
  pages        = {1572--1589},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxad083},
  doi          = {10.1093/COMJNL/BXAD083},
  timestamp    = {Sun, 05 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/SultanVDCN24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/TehraniTZE24,
  author       = {Amir Tehrani and
                  Meisam Yadollahzadeh Tabari and
                  Aidin Zehtab{-}Salmasi and
                  Rasul Enayatifar},
  title        = {Wearable Sensor-Based Human Activity Recognition System Employing
                  Bi-LSTM Algorithm},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {3},
  pages        = {961--975},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxad035},
  doi          = {10.1093/COMJNL/BXAD035},
  timestamp    = {Sun, 05 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/TehraniTZE24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/Thimbleby24,
  author       = {Harold Thimbleby},
  title        = {Improving Science That Uses Code},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {4},
  pages        = {1381--1404},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxad067},
  doi          = {10.1093/COMJNL/BXAD067},
  timestamp    = {Sun, 05 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/Thimbleby24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/TiryakiT24,
  author       = {Volkan M{\"{u}}jdat Tiryaki and
                  Nedim Tutkun},
  title        = {Breast Cancer Mass Classification Using Machine Learning, Binary-Coded
                  Genetic Algorithms and an Ensemble of Deep Transfer Learning},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {3},
  pages        = {1111--1125},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxad046},
  doi          = {10.1093/COMJNL/BXAD046},
  timestamp    = {Sun, 05 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/TiryakiT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/WalshKWIOGDGD24,
  author       = {James Walsh and
                  Oluwafunmilola Kesa and
                  Andrew Wang and
                  Mihai Ilas and
                  Patrick O'Hara and
                  Oscar Giles and
                  Neil Dhir and
                  Mark Girolami and
                  Theodoros Damoulas},
  title        = {Near Real-Time Social Distance Estimation In London},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {1},
  pages        = {95--109},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxac160},
  doi          = {10.1093/COMJNL/BXAC160},
  timestamp    = {Sat, 27 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/WalshKWIOGDGD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/WangLW24,
  author       = {Xin Wang and
                  Li Lin and
                  Yao Wang},
  title        = {Stealth Address Schemes With Fast Retrievability Based On Subgroup
                  Membership Assumptions Related To Factoring},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {4},
  pages        = {1253--1264},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxad056},
  doi          = {10.1093/COMJNL/BXAD056},
  timestamp    = {Sun, 05 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/WangLW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/WangWSW24,
  author       = {Zhuowei Wang and
                  Hao Wang and
                  Xiaoyu Song and
                  Jiahui Wu},
  title        = {Communication-Aware Energy Consumption Model in Heterogeneous Computing
                  Systems},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {1},
  pages        = {78--94},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxac159},
  doi          = {10.1093/COMJNL/BXAC159},
  timestamp    = {Fri, 10 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/WangWSW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/WangWZZ24,
  author       = {Bolin Wang and
                  Wenling Wu and
                  Yuhan Zhang and
                  Li Zhang},
  title        = {New Integral Distinguishers On Permutation Of Whirlpool},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {3},
  pages        = {899--906},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxad028},
  doi          = {10.1093/COMJNL/BXAD028},
  timestamp    = {Sun, 05 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/WangWZZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/WangZJXLSH24,
  author       = {Ke Wang and
                  Zhenfeng Zhang and
                  Haodong Jiang and
                  Huiqin Xie and
                  Yanjun Li and
                  Ying Sun and
                  Lidong Han},
  title        = {Key Reuse Attacks on Post-quantum Cryptosystems, Revisited},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {1},
  pages        = {323--337},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxac176},
  doi          = {10.1093/COMJNL/BXAC176},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cj/WangZJXLSH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/WangZLWXN24,
  author       = {Xiwen Wang and
                  Kai Zhang and
                  Jinguo Li and
                  Mi Wen and
                  Shengmin Xu and
                  Jianting Ning},
  title        = {Non-interactive Boolean Searchable Asymmetric Encryption With Bilateral
                  Access Control},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {1},
  pages        = {179--194},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxac166},
  doi          = {10.1093/COMJNL/BXAC166},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cj/WangZLWXN24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/WuCDZCS24,
  author       = {Tongshuai Wu and
                  Liwei Chen and
                  Gewangzi Du and
                  Chenguang Zhu and
                  Ningning Cui and
                  Gang Shi},
  title        = {{CDNM:} Clustering-Based Data Normalization Method For Automated Vulnerability
                  Detection},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {4},
  pages        = {1538--1549},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxad080},
  doi          = {10.1093/COMJNL/BXAD080},
  timestamp    = {Sun, 05 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/WuCDZCS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/X24,
  title        = {Correction to: An Attack on a Proposed Construction of Small-State
                  Stream Ciphers and Proposals for New Constructions},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {2},
  pages        = {806},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxad020},
  doi          = {10.1093/COMJNL/BXAD020},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cj/X24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/X24a,
  title        = {Correction to: Performance Evaluation of FPGA-Based {LSTM} Neural
                  Networks for Pulse Signal Detection on Real-Time Radar Warning Receivers},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {2},
  pages        = {807},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxad021},
  doi          = {10.1093/COMJNL/BXAD021},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cj/X24a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/X24b,
  title        = {Correction to: Perceptual Image Hashing Based on Canny Operator and
                  Tensor for Copy-Move Forgery Detection},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {3},
  pages        = {1209},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxad032},
  doi          = {10.1093/COMJNL/BXAD032},
  timestamp    = {Sun, 05 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/X24b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/X24c,
  title        = {Correction to: Hitting Times of Random Walks on Edge Corona Product
                  Graphs},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {3},
  pages        = {1210},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxad055},
  doi          = {10.1093/COMJNL/BXAD055},
  timestamp    = {Sun, 05 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/X24c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/X24d,
  title        = {Correction to: Metaheuristic-Enabled Artificial Neural Network Framework
                  For Multimodal Biometric Recognition With Local Fusion Visual Features},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {4},
  pages        = {1603},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxad064},
  doi          = {10.1093/COMJNL/BXAD064},
  timestamp    = {Sun, 05 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/X24d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/X24e,
  title        = {Correction to: {A} Semantic Embedding Enhanced Topic Model For User-Generated
                  Textual Content Modeling In Social Ecosystems},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {4},
  pages        = {1604},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxad073},
  doi          = {10.1093/COMJNL/BXAD073},
  timestamp    = {Sun, 05 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/X24e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/XuWQ24,
  author       = {Lidong Xu and
                  Mingqiang Wang and
                  Jing Qin},
  title        = {Quantum Bit Commitment Without Quantum Memory},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {3},
  pages        = {1163--1170},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxad049},
  doi          = {10.1093/COMJNL/BXAD049},
  timestamp    = {Sun, 05 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/XuWQ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/XuZYZ24,
  author       = {Yishu Xu and
                  Peng Zhang and
                  Hongtao Yu and
                  Fuzhi Zhang},
  title        = {Detecting Group Shilling Attacks In Recommender Systems Based On User
                  Multi-dimensional Features And Collusive Behaviour Analysis},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {2},
  pages        = {604--616},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxad003},
  doi          = {10.1093/COMJNL/BXAD003},
  timestamp    = {Sat, 27 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/XuZYZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/XueZZLQZ24,
  author       = {Yuliang Xue and
                  Yuhao Zhu and
                  Zhiying Zhu and
                  Sheng Li and
                  Zhenxing Qian and
                  Xinpeng Zhang},
  title        = {Removing Watermarks For Image Processing Networks Via Referenced Subspace
                  Attention},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {2},
  pages        = {498--507},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxac190},
  doi          = {10.1093/COMJNL/BXAC190},
  timestamp    = {Sat, 27 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/XueZZLQZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/Yang24,
  author       = {Yuxing Yang},
  title        = {Hyper-Hamiltonian Laceability of Cartesian Products of Cycles and
                  Paths},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {2},
  pages        = {548--556},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxac196},
  doi          = {10.1093/COMJNL/BXAC196},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cj/Yang24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/YangHXJX24,
  author       = {Runze Yang and
                  Baoqi Huang and
                  Zhendong Xu and
                  Bing Jia and
                  Gang Xu},
  title        = {Towards Accurate Smartphone Localization Using {CSI} Measurements},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {4},
  pages        = {1361--1369},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxad065},
  doi          = {10.1093/COMJNL/BXAD065},
  timestamp    = {Sun, 05 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/YangHXJX24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/YangLY24,
  author       = {Weiwei Yang and
                  Shangsong Liang and
                  Jian Yin},
  title        = {Spatial-Aware Multi-Directional Autoencoder For Pre-Training},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {4},
  pages        = {1346--1360},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxad063},
  doi          = {10.1093/COMJNL/BXAD063},
  timestamp    = {Sun, 05 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/YangLY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/YangLZ24,
  author       = {Yang Yang and
                  Wenhao Liu and
                  Guang Zeng},
  title        = {A General Condition of Structural Distinguisher},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {3},
  pages        = {923--932},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxad030},
  doi          = {10.1093/COMJNL/BXAD030},
  timestamp    = {Sun, 05 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/YangLZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/YangMDJH24,
  author       = {Tian Yang and
                  Sha Ma and
                  Jiaojiao Du and
                  Chengyu Jiang and
                  Qiong Huang},
  title        = {Revocable Public Key Encryption with Equality Test without Pairing
                  in Cloud Storage},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {2},
  pages        = {642--657},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxad006},
  doi          = {10.1093/COMJNL/BXAD006},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cj/YangMDJH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/YaoLCZCW24,
  author       = {Shixiong Yao and
                  Pei Li and
                  Jing Chen and
                  Yuexing Zeng and
                  Jiageng Chen and
                  Donghui Wang},
  title        = {CD-BCM:Cross-Domain Batch Certificates Management Based On Blockchain},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {3},
  pages        = {864--874},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxad025},
  doi          = {10.1093/COMJNL/BXAD025},
  timestamp    = {Sun, 05 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/YaoLCZCW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/YuQDJ24,
  author       = {Qingyuan Yu and
                  Lingyue Qin and
                  Xiaoyang Dong and
                  Keting Jia},
  title        = {Improved Related-Key Rectangle Attacks On \texttt{GIFT}},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {4},
  pages        = {1443--1456},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxad071},
  doi          = {10.1093/COMJNL/BXAD071},
  timestamp    = {Sun, 05 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/YuQDJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/YuX24,
  author       = {Zhecheng Yu and
                  Liqiong Xu},
  title        = {Reliability Evaluation Of Multiprocessor System Based On The Balanced
                  Complete Multipartite Graphs},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {2},
  pages        = {688--693},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxad010},
  doi          = {10.1093/COMJNL/BXAD010},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cj/YuX24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/YuanLXGY24,
  author       = {Zhu Yuan and
                  Xueqiang Lv and
                  Ping Xie and
                  Haojie Ge and
                  Xindong You},
  title        = {{CSEA:} {A} Fine-Grained Framework of Climate-Season-Based Energy-Aware
                  in Cloud Storage Systems},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {2},
  pages        = {423--436},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxac184},
  doi          = {10.1093/COMJNL/BXAC184},
  timestamp    = {Sat, 27 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/YuanLXGY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/YuanZN24,
  author       = {Junying Yuan and
                  Huicheng Zheng and
                  Jiangqun Ni},
  title        = {Reversible Data Hiding With Pattern Adaptive Prediction},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {4},
  pages        = {1564--1571},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxad082},
  doi          = {10.1093/COMJNL/BXAD082},
  timestamp    = {Sun, 05 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/YuanZN24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/YuanZXWYLG24,
  author       = {Qingjun Yuan and
                  Yuefei Zhu and
                  Gang Xiong and
                  Yongjuan Wang and
                  Wentao Yu and
                  Bin Luo and
                  Gaopeng Gou},
  title        = {{ULDC:} Unsupervised Learning-Based Data Cleaning for Malicious Traffic
                  With High Noise},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {3},
  pages        = {976--987},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxad036},
  doi          = {10.1093/COMJNL/BXAD036},
  timestamp    = {Sun, 05 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/YuanZXWYLG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/ZhaiSM24,
  author       = {Zhonghao Zhai and
                  Subin Shen and
                  Yan{-}qin Mao},
  title        = {A Toolbox for Migrating the Blockchain-Based Application From Ethereum
                  to Hyperledger Fabric},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {4},
  pages        = {1309--1323},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxad061},
  doi          = {10.1093/COMJNL/BXAD061},
  timestamp    = {Sun, 05 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/ZhaiSM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/ZhangKQH24,
  author       = {Liang Zhang and
                  Haibin Kan and
                  Feiyang Qiu and
                  Feng Hao},
  title        = {A Publicly Verifiable Optimistic Fair Exchange Protocol Using Decentralized
                  {CP-ABE}},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {3},
  pages        = {1017--1029},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxad039},
  doi          = {10.1093/COMJNL/BXAD039},
  timestamp    = {Sun, 05 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/ZhangKQH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/ZhangLX24,
  author       = {Yaofang Zhang and
                  Peixuan Li and
                  Ping Xie},
  title        = {A Hybrid Scheme Combining Duplications and {LDPC} Decoding to Reduce
                  {NAND} Flash},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {4},
  pages        = {1425--1437},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxad069},
  doi          = {10.1093/COMJNL/BXAD069},
  timestamp    = {Sun, 05 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/ZhangLX24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/ZhangWB24,
  author       = {Hongjin Zhang and
                  Hui Wei and
                  Wang Bo},
  title        = {A New Fuzzy Smoothing Term Model For Stereo Matching},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {2},
  pages        = {746--761},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxad015},
  doi          = {10.1093/COMJNL/BXAD015},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cj/ZhangWB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/ZhangWLP24,
  author       = {Dinghua Zhang and
                  Shihao Wu and
                  Yang Li and
                  Quan Pan},
  title        = {An Evaluation On The Entropy Supplying Capability Of Smartphone Sensors},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {4},
  pages        = {1550--1563},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxad081},
  doi          = {10.1093/COMJNL/BXAD081},
  timestamp    = {Sun, 05 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/ZhangWLP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/ZhangWYFX24,
  author       = {Xu Zhang and
                  Shunjie Wen and
                  Liang Yan and
                  Jiangfan Feng and
                  Ying Xia},
  title        = {A Hybrid-Convolution Spatial-Temporal Recurrent Network For Traffic
                  Flow Prediction},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {1},
  pages        = {236--252},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxac171},
  doi          = {10.1093/COMJNL/BXAC171},
  timestamp    = {Sat, 27 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/ZhangWYFX24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/ZhangYCZY24,
  author       = {Jiaomei Zhang and
                  Ayong Ye and
                  Jianwei Chen and
                  Yuexin Zhang and
                  Wenjie Yang},
  title        = {{CSFL:} Cooperative Security Aware Federated Learning Model Using
                  The Blockchain},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {4},
  pages        = {1298--1308},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxad060},
  doi          = {10.1093/COMJNL/BXAD060},
  timestamp    = {Sun, 05 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/ZhangYCZY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/ZhangZC24,
  author       = {Hong Zhang and
                  Shuming Zhou and
                  Eddie Cheng},
  title        = {The Cyclic Diagnosability Of Hypercubes Under The {PMC} Model And
                  The MM* Model},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {2},
  pages        = {709--718},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxad012},
  doi          = {10.1093/COMJNL/BXAD012},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cj/ZhangZC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/ZhangZWLLY24,
  author       = {Zongyang Zhang and
                  Lingyue Zhang and
                  Zhuo Wang and
                  Yichen Li and
                  Rongxing Lu and
                  Yong Yu},
  title        = {Chronos: An Efficient Asynchronous Byzantine Ordered Consensus},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {3},
  pages        = {1153--1162},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxad048},
  doi          = {10.1093/COMJNL/BXAD048},
  timestamp    = {Sun, 05 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/ZhangZWLLY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/ZhangZWMZ24,
  author       = {Li Zhang and
                  Yu Zhang and
                  Wenling Wu and
                  Yongxia Mao and
                  Yafei Zheng},
  title        = {Explicit Upper Bound Of Impossible Differentials For AES-Like Ciphers:
                  Application To uBlock And Midori},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {2},
  pages        = {674--687},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxad009},
  doi          = {10.1093/COMJNL/BXAD009},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cj/ZhangZWMZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/Zhao24,
  author       = {Xuefeng Zhao},
  title        = {Secure and Efficient Masking of Lightweight Ciphers in Software and
                  Hardware},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {2},
  pages        = {581--603},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxad002},
  doi          = {10.1093/COMJNL/BXAD002},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cj/Zhao24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/ZhaoCWWZL24,
  author       = {Shuang Zhao and
                  Shuhui Chen and
                  Fei Wang and
                  Ziling Wei and
                  Jincheng Zhong and
                  Jianbing Liang},
  title        = {A Large-Scale Mobile Traffic Dataset For Mobile Application Identification},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {4},
  pages        = {1501--1513},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxad076},
  doi          = {10.1093/COMJNL/BXAD076},
  timestamp    = {Sun, 05 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/ZhaoCWWZL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/ZhaoL24,
  author       = {Shijie Zhao and
                  Pingshan Li},
  title        = {On Conditional Edge-Fault-Tolerant Strong Menger Edge Connectivity
                  Of Folded Hypercubes},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {2},
  pages        = {777--781},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxad018},
  doi          = {10.1093/COMJNL/BXAD018},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cj/ZhaoL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/ZhouHLLWZL24,
  author       = {Shaohong Zhou and
                  Junjiang He and
                  Tao Li and
                  Xiaolong Lan and
                  Yunpeng Wang and
                  Hui Zhao and
                  Yihong Li},
  title        = {Automating the Deployment of Cyber Range with OpenStack},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {3},
  pages        = {851--863},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxad024},
  doi          = {10.1093/COMJNL/BXAD024},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/ZhouHLLWZL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/ZhouZC24,
  author       = {Chunning Zhou and
                  Wentao Zhang and
                  Weiwei Cao},
  title        = {A New Approach of Evaluating the Security Against Differential and
                  Linear Cryptanalysis and Its Applications to Serpent, {NOEKEON} and
                  {ASCON}},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {1},
  pages        = {274--291},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxac173},
  doi          = {10.1093/COMJNL/BXAC173},
  timestamp    = {Sat, 27 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/ZhouZC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/ZhuXLZK24,
  author       = {Mingzhe Zhu and
                  Wanyue Xu and
                  Wei Li and
                  Zhongzhi Zhang and
                  Haibin Kan},
  title        = {Hitting Times of Random Walks on Edge Corona Product Graphs},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {2},
  pages        = {485--497},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxac189},
  doi          = {10.1093/COMJNL/BXAC189},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cj/ZhuXLZK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics