2547 | -- | 2569 | Rajalakshmi Shenbaga Moorthy, P. Pabitha. Accelerating Analytics Using Improved Binary Particle Swarm Optimization for Discrete Feature Selection |
2570 | -- | 2588 | Binanda Sengupta, Yingjiu Li, Yangguang Tian, Robert H. Deng, Zheng Yang. Policy-Based Editing-Enabled Signatures: Authenticating Fine-Grained and Restricted Data Modification |
2589 | -- | 2609 | Muhammad Inaam Ul Haq, Qianmu Li, Jun Hou 0002. Analyzing the Research Trends of IoT Using Topic Modeling |
2610 | -- | 2614 | Michael H. Albert, Vincent Vatter. How Many Pop-Stacks Does It Take To Sort A Permutation? |
2615 | -- | 2630 | Zhiyao Li, Wei Liu, Xiaofeng Gao 0001, Guihai Chen. Friends-Based Crowdsourcing: Algorithms For Task Dissemination Over Social Groups |
2631 | -- | 2640 | Elif Ustundag Soykan, Leyli Karaçay, Zeki Bilgin, Emrah Tomur, Mehmet Akif Ersoy, Ferhat Karakoç, Pinar Çomak. Context-Aware Authentication with Dynamic Credentials using Electricity Consumption Data |
2641 | -- | 2653 | Mohsen Salehi, Jafar Razmara, Shahriar Lotfi, Farnaz Mahan. A One-Dimensional Probabilistic Convolutional Neural Network for Prediction of Breast Cancer Survivability |
2654 | -- | 2663 | Mehmet Akif Bülbül, Celal Öztürk, Mehmet Fatih Isik. Optimization of Climatic Conditions Affecting Determination of the Amount of Water Needed by Plants in Relation to Their Life Cycle with Particle Swarm Optimization, and Determining the Optimum Irrigation Schedule |
2664 | -- | 2677 | Shefali Gupta, Ankit Goel, Meenu Dave. Tunicate Swarm Magnetic Optimization With Deep Convolution Neural Network For Collaborative Filter Recommendation |
2678 | -- | 2692 | S. Guruvammal, T. Chellatamilan, L. Jegatha Deborah. Automatic Detection of Autism in Young Children Using Weighted Logarithmic Transformed Data with Optimized Deep Learning |
2693 | -- | 2708 | Xiaoyang Liu, Xiang Li. A Social Network Link Prediction Method Based on Stacked Generalization |
2709 | -- | 2719 | Pramod Ganapathi, Rezaul Chowdhury. Parallel Divide-and-Conquer Algorithms for Bubble Sort, Selection Sort and Insertion Sort |
2720 | -- | 2729 | Yanzhao Shen, Ting Wu 0001, Gaoli Wang, Xinfeng Dong, Haifeng Qian. Improved Collision Detection Of MD5 Using Sufficient Condition Combination |
2730 | -- | 2740 | Vikas Chaurasia, Saurabh Pal. Ensemble Technique to Predict Breast Cancer on Multiple Dataset |
2741 | -- | 2754 | Ayoub Lahmidi, Khalid Minaoui, Chouaib Moujahdi, Mohammed Rziza. Fingerprint Template Protection Using Irreversible Minutiae Tetrahedrons |
2755 | -- | 2768 | María Magdalena Payeras Capellà, Macià Mut Puigserver, Miquel A. Cabot-Nadal, Llorenç Huguet i Rotger. Blockchain-Based Confidential Multiparty Contract Signing Protocol Without TTP Using Elliptic Curve Cryptography |
2769 | -- | 2779 | Milad Seddigh, Hadi Soleimany. Flush+Reload Attacks on SEED |
2780 | -- | 2800 | Amel Mammar, Lazhar Hamel, Mohamed Graiet. An Event-B-Based Approach to Model and Verify Behaviors for Component-Based Applications |
2801 | -- | 2814 | Sohei Ito, Kenji Osari, Masaya Shimakawa, Shigeki Hagihara, Naoki Yonezaki. Efficient Realizability Checking by Modularization of LTL Specifications |
2815 | -- | 2827 | Muhammad Asif, Maaz Bin Ahmad, Shiza Mushtaq, Khalid Masood, Toqeer Mahmood, Arfan Ali Nagra. Long Multi-digit Number Recognition from Images Empowered by Deep Convolutional Neural Networks |
2828 | -- | 2844 | Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo, Yu-Chi Chen. Public-Key Authenticated Encryption with Keyword Search: A Generic Construction and Its Quantum-Resistant Instantiation |
2845 | -- | 0 | M. KrishnaSiva Prasad, Poonam Sharma. Corrigendum to: Similarity of Sentences With Contradiction Using Semantic Similarity Measures |
2846 | -- | 0 | Binlin Cheng, Jinjun Liu, Jiejie Chen, Shudong Shi, Xufu Peng, Xingwen Zhang, Haiqing Hai. Erratum to: MoG: Behavior-Obfuscation Resistance Malware Detection |