2247 | -- | 2261 | Zheng Xu, Yongqiang Li, Mingsheng Wang. Observations on the Security of COMET |
2262 | -- | 2275 | Yanan Cheng, Tingting Chai, Zhaoxin Zhang, Keyu Lu, Yuejin Du. Detecting Malicious Domain Names with Abnormal WHOIS Records Using Feature-Based Rules |
2276 | -- | 2298 | Keyu Lu, Tingting Chai, Haiyan Xu, Shitala Prasad, Jianen Yan, Zhaoxin Zhang. Research on Unexpected DNS Response from Open DNS Resolvers |
2299 | -- | 2314 | Charles Bouillaguet, Florette Martinez, Damien Vergnaud. Cryptanalysis of Modular Exponentiation Outsourcing Protocols |
2315 | -- | 2338 | B. Janardhana Rao, Y. Chakrapani, S. Srinivas Kumar. Hybridized Cuckoo Search with Multi-Verse Optimization-Based Patch Matching and Deep Learning Concept for Enhancing Video Inpainting |
2339 | -- | 2346 | Shanshan Yin, Liqiong Xu. g-Extra Connectivity of the Enhanced Hypercubes |
2347 | -- | 2359 | Yucheng Wang, Yuhao Yi, Wanyue Xu, Zhongzhi Zhang. Modeling Higher-Order Interactions in Complex Networks by Edge Product of Graphs |
2360 | -- | 2376 | Salim el Khediri, Adel Thaljaoui, Fayez Alfayez. A Novel Decision-Making Process for COVID-19 Fighting Based on Association Rules and Bayesian Methods |
2377 | -- | 2391 | Binlei Cai, Qin Guo, Junfeng Yu. LraSched: Admitting More Long-Running Applications via Auto-Estimating Container Size and Affinity |
2392 | -- | 2399 | Sadia Sharmin. An Experimental Approach to Exact and Random Boolean-Widths and Their Comparison with Other Width Parameters |
2400 | -- | 2410 | Pingyuan Zhang, Han Jiang, Zhihua Zheng, Hao Wang 0007, Qiuliang Xu. A New and Efficient Lattice-Based Online/Offline Signature From Perspective of Abort |
2411 | -- | 2420 | Manman Li, Shaozhen Chen. Improved Meet-in-the-Middle Attacks on Reduced-Round Tweakable Block Cipher Deoxys-BC |
2421 | -- | 2429 | Meenakshi Kansal, Amit Kumar Singh, Ratna Dutta. Efficient Multi-Signature Scheme Using Lattice |
2430 | -- | 2438 | Wei Gao, Liqun Chen, Chunming Rong, Kaitai Liang, Xianghan Zheng, Jiangshan Yu. Security Analysis and Improvement of a Redactable Consortium Blockchain for Industrial Internet-of-Things |
2439 | -- | 2453 | Yoganand S, Chithra S. Bat Ant Lion Optimization-Based Generative Adversarial Network For Structural Heath Monitoring In IoT |
2454 | -- | 2469 | Jinyu Lu, Yunwen Liu, Tomer Ashur, Chao Li. On the Effect of the Key-Expansion Algorithm in Simon-like Ciphers |
2470 | -- | 2483 | Fatiha Youbi, Nesma Settouti. Analysis of Machine Learning and Deep Learning Frameworks for Opinion Mining on Drug Reviews |
2484 | -- | 2492 | Tarek Moulahi. Joining Formal Concept Analysis to Feature Extraction for Data Pruning in Cloud of Things |
2493 | -- | 2505 | Bashar Al-Shboul, Abdullateef Rabab'ah, Mahmoud Al-Ayyoub, Yaser Jararweh, Thar Baker. Social Network Analysis of the Panama Papers Concentrating on the MENA Region |
2506 | -- | 2527 | Gurukumar Lokku, Gangireddy Harinatha Reddy, M. N. Giri Prasad. Optimized Scale-Invariant Feature Transform with Local Tri-directional Patterns for Facial Expression Recognition with Deep Learning Model |
2528 | -- | 2534 | Xiaowang Li, Shuming Zhou, Tianlong Ma, Xia Guo, Xiangyu Ren. h-Restricted Connectivity of a Class of Hypercube-Based Compound Networks |
2535 | -- | 2546 | Abidin Çaliskan. A New Ensemble Approach for Congestive Heart Failure and Arrhythmia Classification Using Shifted One-Dimensional Local Binary Patterns with Long Short-Term Memory |