Journal: Comput. J.

Volume 66, Issue 9

2077 -- 2101Kaiju Li, Hao Wang. Federated Learning Communication-Efficiency Framework via Corset Construction
2102 -- 2117Zaki Brahmi, Afef Selmi. Coordinate System-Based Trust-Aware Web Services Composition in Edge and Cloud Environment
2118 -- 2122Yayu Yang, Mingzu Zhang, Jixiang Meng, Rongda Chen. a-average Degree Edge-Connectivity of Bijective Connection Networks
2123 -- 2137Marriam Daud, Ali Afzal Malik. Construction and Validation of Early Software Size Estimation Models Based on ADAF-Adjusted ACD Metrics
2138 -- 2154Xiaoyang Liu 0001, Shanghong Dai, Giacomo Fiumara, Pasquale De Meo. Target-specific sentiment analysis method combining word-masking data enhancement and adversarial learning
2155 -- 2168Zhenhua Chen, Jingjing Nie, Zhanli Li, Chunpeng Ge, Willy Susilo. Geometric Searchable Encryption Without False Positive And Its Applications
2169 -- 2180Talha Mahboob Alam, Kamran Shaukat, Adel Khelifi, Hanan Aljuaid, Malaika Shafqat, Usama Ahmed, Sadeem Ahmad Nafees, Suhuai Luo. A Fuzzy Inference-Based Decision Support System for Disease Diagnosis
2181 -- 2190Aleksandr S. Tvardovskii, Nina Yevtushenko 0001. Deriving homing sequences for Finite State Machines with timeouts
2191 -- 2207B. Mathan Kumar, Bharati S. Ainapure, Suryabhan Pratap Singh, Sumit Vyas. Feature Extraction Based Deep Indexing by Deep Fuzzy Clustering for Image Retrieval Using Jaro Winkler Distance
2208 -- 2219Talal H. Noor. Behavior Analysis-Based IoT Services For Crowd Management
2220 -- 2229Xiao Zeng, Guowu Yang, Xiaoyu Song, Marek A. Perkowski, Gang Chen. Detecting Affine Equivalence Of Boolean Functions And Circuit Transformation
2230 -- 2253Michael Simpson 0001, Venkatesh Srinivasan 0001, Alex Thomo. Scalable Misinformation Mitigation in Social Networks Using Reverse Sampling
2254 -- 2264Parul Tomar, Gyanendra Kumar, Lal Pratap Verma. Path-Rank-Based Data Chunk Scheduling for Concurrent Multipath Transmission
2265 -- 2278Zhe Jiang, Kai Zhang 0016, Liangliang Wang, Jianting Ning. Forward Secure Public-key Authenticated Encryption with Conjunctive Keyword Search
2279 -- 2295Yaqi Xu, Baofeng Wu, Dongdai Lin. New Strategies To Improve Differential-Linear Attacks With Applications To Chaskey
2296 -- 2316Wided Selmi, Hager Kammoun, Ikram Amous. Semantic-Based Hybrid Query Reformulation for Biomedical Information Retrieval
2317 -- 2328Gokhan Ozogur, Mehmet Ali Ertürk, Gulsum Zeynep Gurkas Aydin, Muhammed Ali Aydin. Android Malware Detection in Bytecode Level Using TF-IDF and XGBoost
2329 -- 0. Correction to: Learning Disjunctive Multiplicity Expressions and Disjunctive Generalize Multiplicity Expressions From Both Positive and Negative Examples