Journal: Comput. J.

Volume 65, Issue 9

2247 -- 2261Zheng Xu, Yongqiang Li, Mingsheng Wang. Observations on the Security of COMET
2262 -- 2275Yanan Cheng, Tingting Chai, Zhaoxin Zhang, Keyu Lu, Yuejin Du. Detecting Malicious Domain Names with Abnormal WHOIS Records Using Feature-Based Rules
2276 -- 2298Keyu Lu, Tingting Chai, Haiyan Xu, Shitala Prasad, Jianen Yan, Zhaoxin Zhang. Research on Unexpected DNS Response from Open DNS Resolvers
2299 -- 2314Charles Bouillaguet, Florette Martinez, Damien Vergnaud. Cryptanalysis of Modular Exponentiation Outsourcing Protocols
2315 -- 2338B. Janardhana Rao, Y. Chakrapani, S. Srinivas Kumar. Hybridized Cuckoo Search with Multi-Verse Optimization-Based Patch Matching and Deep Learning Concept for Enhancing Video Inpainting
2339 -- 2346Shanshan Yin, Liqiong Xu. g-Extra Connectivity of the Enhanced Hypercubes
2347 -- 2359Yucheng Wang, Yuhao Yi, Wanyue Xu, Zhongzhi Zhang. Modeling Higher-Order Interactions in Complex Networks by Edge Product of Graphs
2360 -- 2376Salim el Khediri, Adel Thaljaoui, Fayez Alfayez. A Novel Decision-Making Process for COVID-19 Fighting Based on Association Rules and Bayesian Methods
2377 -- 2391Binlei Cai, Qin Guo, Junfeng Yu. LraSched: Admitting More Long-Running Applications via Auto-Estimating Container Size and Affinity
2392 -- 2399Sadia Sharmin. An Experimental Approach to Exact and Random Boolean-Widths and Their Comparison with Other Width Parameters
2400 -- 2410Pingyuan Zhang, Han Jiang, Zhihua Zheng, Hao Wang 0007, Qiuliang Xu. A New and Efficient Lattice-Based Online/Offline Signature From Perspective of Abort
2411 -- 2420Manman Li, Shaozhen Chen. Improved Meet-in-the-Middle Attacks on Reduced-Round Tweakable Block Cipher Deoxys-BC
2421 -- 2429Meenakshi Kansal, Amit Kumar Singh, Ratna Dutta. Efficient Multi-Signature Scheme Using Lattice
2430 -- 2438Wei Gao, Liqun Chen, Chunming Rong, Kaitai Liang, Xianghan Zheng, Jiangshan Yu. Security Analysis and Improvement of a Redactable Consortium Blockchain for Industrial Internet-of-Things
2439 -- 2453Yoganand S, Chithra S. Bat Ant Lion Optimization-Based Generative Adversarial Network For Structural Heath Monitoring In IoT
2454 -- 2469Jinyu Lu, Yunwen Liu, Tomer Ashur, Chao Li. On the Effect of the Key-Expansion Algorithm in Simon-like Ciphers
2470 -- 2483Fatiha Youbi, Nesma Settouti. Analysis of Machine Learning and Deep Learning Frameworks for Opinion Mining on Drug Reviews
2484 -- 2492Tarek Moulahi. Joining Formal Concept Analysis to Feature Extraction for Data Pruning in Cloud of Things
2493 -- 2505Bashar Al-Shboul, Abdullateef Rabab'ah, Mahmoud Al-Ayyoub, Yaser Jararweh, Thar Baker. Social Network Analysis of the Panama Papers Concentrating on the MENA Region
2506 -- 2527Gurukumar Lokku, Gangireddy Harinatha Reddy, M. N. Giri Prasad. Optimized Scale-Invariant Feature Transform with Local Tri-directional Patterns for Facial Expression Recognition with Deep Learning Model
2528 -- 2534Xiaowang Li, Shuming Zhou, Tianlong Ma, Xia Guo, Xiangyu Ren. h-Restricted Connectivity of a Class of Hypercube-Based Compound Networks
2535 -- 2546Abidin Çaliskan. A New Ensemble Approach for Congestive Heart Failure and Arrhythmia Classification Using Shifted One-Dimensional Local Binary Patterns with Long Short-Term Memory