Journal: Comput. J.

Volume 65, Issue 7

1653 -- 1665Fei Zhu, Xun Yi, Alsharif Abuadbba, Ibrahim Khalil, Surya Nepal, Xinyi Huang 0001. Forward-Secure Edge Authentication for Graphs
1666 -- 1678Faisal Khurshid, Yan Zhu 0007, Jie Hu, Muqeet Ahmad, Mushtaq Ahmad. Battering Review Spam Through Ensemble Learning in Imbalanced Datasets
1679 -- 1691Jiang Che, Wanyue Xu, Xiaotian Zhou, Zhongzhi Zhang, Haibin Kan. Some Combinatorial Problems in Power-Law Graphs
1692 -- 1701Jianchang Lai, Xinyi Huang 0001, Debiao He, Wei Wu 0001. Provably Secure Online/Offline Identity-Based Signature Scheme Based on SM9
1702 -- 1716Intissar Khalifa, Ridha Ejbali, Raimondo Schettini, Mourad Zaied. Deep Multi-Stage Approach For Emotional Body Gesture Recognition In Job Interview
1717 -- 1725M. Ramchandran, E. N. Ganesh. MBSO Algorithm For Handling Energy-Throughput Trade-Off In Cognitive Radio Networks
1726 -- 1739Hao Wang, Huan Wang. Differentially Private Publication For Correlated Non-Numerical Data
1740 -- 1751Talha Mahboob Alam, Kamran Shaukat, Haris Mahboob, Muhammad Umer Sarwar, Farhat Iqbal, Adeel Nasir, Ibrahim A. Hameed, Suhuai Luo. A Machine Learning Approach for Identification of Malignant Mesothelioma Etiological Factors in an Imbalanced Dataset
1752 -- 1759G. S. Smrithy, Ramadoss Balakrishnan. A Statistical-Based Light-Weight Anomaly Detection Framework for Wireless Body Area Networks
1760 -- 1775Wenzheng Zhang, Zirui Qiao, Bo Yang 0003, Yanwei Zhou, Mingwu Zhang. Continuous Leakage-Amplified Public-Key Encryption With CCA Security
1776 -- 1786Siyuan Chen, Peng Zeng 0002, Kim-Kwang Raymond Choo. A New Code-Based Blind Signature Scheme
1787 -- 1794Suliman Mohamed Fati. Detecting Cyberbullying across Social Media Platforms in Saudi Arabia Using Sentiment Analysis: A Case Study
1795 -- 1811Antony Jaya Mabel Rani, Albert Pravin. Optimization Enabled Black Hole Entropic Fuzzy Clustering Approach for Medical Data
1812 -- 1825T. Daniya, S. Vigneshwari. Deep Neural Network for Disease Detection in Rice Plant Using the Texture and Deep Features
1826 -- 1845Shujiao Cao, Rui Xue. The (Im)Possibility on Constructing Verifiable Random Functions
1846 -- 1859Yanbo Wang, Fasheng Wang, Chang Wang, Fuming Sun, Jianjun He. Learning Saliency-Aware Correlation Filters for Visual Tracking
1860 -- 1873Pradeep Krishnadoss, L. Javid Ali, Gobalakrishnan Natesan, C. J. Raman, Manikandan Nanjappan. CWOA: Hybrid Approach for Task Scheduling in Cloud Environment
1874 -- 1890Shiying Wang, Xiaolei Ma. The Matching Preclusion of Enhanced Hypercubes
1891 -- 1903Maximiliano Cristiá, Ricardo D. Katz, Gianfranco Rossi. Proof Automation in the Theory of Finite Sets and Finite Set Relation Algebra
1904 -- 1922Lavanya Ravala, Rajini G. K. Automatic Diagnosis of Diabetic Retinopathy from Retinal Abnormalities: Improved Jaya-Based Feature Selection and Recurrent Neural Network
1923 -- 1936V. Betcy Thanga Shoba, I. Shatheesh Sam. Aging Facial Recognition for Feature Extraction Using Adaptive Fully Recurrent Deep Neural Learning
1937 -- 0Yonghong Hou, Lin Xue, Shuo Li 0003, Jiaming Xing. Corrigendum: User-Experience-Oriented Fuzzy Logic Controller for Adaptive Streaming
1938 -- 0Juan Li, Dandan Xiao, Ting Zhang, Chun Liu, Yuan-xiang Li, Gaige Wang. Q-Learning Model