Journal: Comput. J.

Volume 66, Issue 5

1053 -- 1068Sudhin Chandran, R. Rajesh, M. Dev Anand. Laser Beam Welded Aluminum-Titanium Dissimilar Sheet Metals: Neural Network Based Strength and Hardness Prediction Model
1069 -- 1082Hao Guo, Zhiyu Zhang, Qianqian Yang, Lei Hu, Yiyuan Luo. A New Method To Find All The High-Probability Word-Oriented Truncated Differentials: Application To <tt>Midori</tt>, <tt>SKINNY</tt> And <tt>CRAFT</tt>
1083 -- 1101Md Abu Marjan, Md. Palash Uddin, Masud Ibn Afjal. An Educational Data Mining System For Predicting And Enhancing Tertiary Students' Programming Skill
1102 -- 1110Bin-Bin Cai, Yusen Wu, Jing Dong, Su-Juan Qin, Fei Gao 0001, Qiao-Yan Wen. Quantum Attacks on 1K-AES and PRINCE
1111 -- 1125GuoFeng Tang, Zhenfeng Zhang. Two-Party Signing For ISO/IEC Digital Signature Standards
1126 -- 1138K. Suresh, S. S. Sreeja Mole, A. Joseph Selva Kumar. F2SO: An Energy Efficient Cluster Based Routing Protocol Using Fuzzy Firebug Swarm Optimization Algorithm in WSN
1139 -- 1155Shobhan Kumar, Arun Chauhan 0002. A Transformer Based Encodings for Detection of Semantically Equivalent Questions in cQA
1156 -- 1166Yanna Wang, Bo Zhou. Residual Closeness, Matching Number and Chromatic Number
1167 -- 1183Xiaodi Wang, Xiaoge Pan, Tian Yang, Jianhua Xie, Mingwei Tang. Aspect-Based Sentiment Analysis Using Interaction Matrix And Global Attention Neural Network
1184 -- 1194Yanze Huang, Limei Lin, Eddie Cheng 0001, Li Xu 0002. Component Fault Diagnosis and Fault Tolerance of Alternating Group Graphs
1195 -- 1212Xiaoli Dong, Yongzhuang Wei, Wen Gao, Jie Chen. New Meet-in-the-Middle Attacks on FOX Block Cipher
1213 -- 1227LuMing Yang, Shaojing Fu, Yongjun Wang, Kaitai Liang, Fan Mo, Bo Liu. DEV-ETA: An Interpretable Detection Framework for Encrypted Malicious Traffic
1228 -- 1240Mona Mosa, Nedaa Agami, Ghada Elkhayat, Mohamed Kholief. A Novel Hybrid Segmentation Approach for Decision Support: A Case Study in Banking
1241 -- 1255Mengzhu Yu, Zhenjun Tang, Zhixin Li 0001, Xiaoping Liang, Xianquan Zhang. Robust Image Hashing With Saliency Map And Sparse Model
1256 -- 1267Bishal Basak Papan, Protik Bose Pranto, Md. Saidur Rahman 0001. On 2-Interval Pairwise Compatibility Properties of Two Classes of Grid Graphs
1268 -- 1278Zhen Shi, Chenhui Jin. Linear Attacks On SNOW 3G And SNOW-V Using Automatic Search
1279 -- 1294J. Shobana, M. Murali. An Improved Self Attention Mechanism Based on Optimized BERT-BiLSTM Model for Accurate Polarity Prediction
1295 -- 1309Bo Pang, Gang Liang, Jin Yang, Yijing Chen, Xinyi Wang, Wenbo He. CWSOGG: Catching Web Shell Obfuscation Based on Genetic Algorithm and Generative Adversarial Network