2077 | -- | 2101 | Kaiju Li, Hao Wang. Federated Learning Communication-Efficiency Framework via Corset Construction |
2102 | -- | 2117 | Zaki Brahmi, Afef Selmi. Coordinate System-Based Trust-Aware Web Services Composition in Edge and Cloud Environment |
2118 | -- | 2122 | Yayu Yang, Mingzu Zhang, Jixiang Meng, Rongda Chen. a-average Degree Edge-Connectivity of Bijective Connection Networks |
2123 | -- | 2137 | Marriam Daud, Ali Afzal Malik. Construction and Validation of Early Software Size Estimation Models Based on ADAF-Adjusted ACD Metrics |
2138 | -- | 2154 | Xiaoyang Liu 0001, Shanghong Dai, Giacomo Fiumara, Pasquale De Meo. Target-specific sentiment analysis method combining word-masking data enhancement and adversarial learning |
2155 | -- | 2168 | Zhenhua Chen, Jingjing Nie, Zhanli Li, Chunpeng Ge, Willy Susilo. Geometric Searchable Encryption Without False Positive And Its Applications |
2169 | -- | 2180 | Talha Mahboob Alam, Kamran Shaukat, Adel Khelifi, Hanan Aljuaid, Malaika Shafqat, Usama Ahmed, Sadeem Ahmad Nafees, Suhuai Luo. A Fuzzy Inference-Based Decision Support System for Disease Diagnosis |
2181 | -- | 2190 | Aleksandr S. Tvardovskii, Nina Yevtushenko 0001. Deriving homing sequences for Finite State Machines with timeouts |
2191 | -- | 2207 | B. Mathan Kumar, Bharati S. Ainapure, Suryabhan Pratap Singh, Sumit Vyas. Feature Extraction Based Deep Indexing by Deep Fuzzy Clustering for Image Retrieval Using Jaro Winkler Distance |
2208 | -- | 2219 | Talal H. Noor. Behavior Analysis-Based IoT Services For Crowd Management |
2220 | -- | 2229 | Xiao Zeng, Guowu Yang, Xiaoyu Song, Marek A. Perkowski, Gang Chen. Detecting Affine Equivalence Of Boolean Functions And Circuit Transformation |
2230 | -- | 2253 | Michael Simpson 0001, Venkatesh Srinivasan 0001, Alex Thomo. Scalable Misinformation Mitigation in Social Networks Using Reverse Sampling |
2254 | -- | 2264 | Parul Tomar, Gyanendra Kumar, Lal Pratap Verma. Path-Rank-Based Data Chunk Scheduling for Concurrent Multipath Transmission |
2265 | -- | 2278 | Zhe Jiang, Kai Zhang 0016, Liangliang Wang, Jianting Ning. Forward Secure Public-key Authenticated Encryption with Conjunctive Keyword Search |
2279 | -- | 2295 | Yaqi Xu, Baofeng Wu, Dongdai Lin. New Strategies To Improve Differential-Linear Attacks With Applications To Chaskey |
2296 | -- | 2316 | Wided Selmi, Hager Kammoun, Ikram Amous. Semantic-Based Hybrid Query Reformulation for Biomedical Information Retrieval |
2317 | -- | 2328 | Gokhan Ozogur, Mehmet Ali Ertürk, Gulsum Zeynep Gurkas Aydin, Muhammed Ali Aydin. Android Malware Detection in Bytecode Level Using TF-IDF and XGBoost |
2329 | -- | 0 | . Correction to: Learning Disjunctive Multiplicity Expressions and Disjunctive Generalize Multiplicity Expressions From Both Positive and Negative Examples |