Journal: Comput. J.

Volume 67, Issue 1

1 -- 2Marios C. Angelides. Thematic Editorial: Mostly Artificial Intelligence (AI) or Machine Learning (ML) Now in the Engine Room, in Pursuit of a Green Agenda
3 -- 17Mariem Gnouma, Ridha Ejbali, Mourad Zaied. Deep Hashing and Sparse Representation of Abnormal Events Detection
18 -- 30Ozgur Oksuz. A System For Storing Anonymous Patient Healthcare Data Using Blockchain And Its Applications
31 -- 44He Li 0006, Duo Jin, Xuejiao Li, Shaojie Qiao. A Dynamic Heterogeneous Graph Convolution Network For Traffic Flow Prediction
45 -- 56Tongfeng Li, Ruisheng Zhang, Bojuan Niu, Yabing Yao, Jun Ma, Jing Jiang, Zhili Zhao. Link Prediction Based On Local Structure And Node Information Along Local Paths
57 -- 77Sayaka Kamei, Sébastien Tixeuil. An Asynchronous Maximum Independent Set Algorithm By Myopic Luminous Robots On Grids
78 -- 94Zhuowei Wang 0001, Hao Wang, Xiaoyu Song, Jiahui Wu. Communication-Aware Energy Consumption Model in Heterogeneous Computing Systems
95 -- 109James Walsh 0004, Oluwafunmilola Kesa, Andrew Wang, Mihai Ilas, Patrick O'Hara, Oscar Giles, Neil Dhir, Mark Girolami, Theodoros Damoulas. Near Real-Time Social Distance Estimation In London
110 -- 126Aissam Aouar, Saïd Yahiaoui, Lamia Sadeg, Nadia Nouali-Taboudjemat, Kadda Beghdad Bey. Distributed Partial Simulation for Graph Pattern Matching
127 -- 141Xiaoyang Liu 0001, Luyuan Gao, Giacomo Fiumara, Pasquale De Meo. Key Node Identification Method Integrating Information Transmission Probability and Path Diversity in Complex Network
142 -- 152Xiaoqing Liu, Shuming Zhou, Jiafei Liu, Hong Zhang. Reliability Analysis of the Cactus-Based Networks Based on Subsystem
153 -- 168Qin Luo, Xin Cao. PNCTS: A Prediction and Network Coding-Based Transmission Scheme for Efficient Screen Updates Delivery in DaaS
169 -- 178Vahid Amin Ghafari, Mahmoud Ahmadian-Attari. An Attack on a Proposed Construction of Small-State Stream Ciphers and Proposals for New Constructions
179 -- 194Xiwen Wang, Kai Zhang 0016, Jinguo Li, Mi Wen, Shengmin Xu, Jianting Ning. Non-interactive Boolean Searchable Asymmetric Encryption With Bilateral Access Control
195 -- 209Jiali Shi, Chao Li, Guoqiang Liu. Differential Attack With Constants On μ2 Block Cipher
210 -- 219Yin Lv, Danping Shi, Lei Hu, Zihui Guo, Yi Guo, Caibing Wang. Improved Linear Cryptanalysis of Block Cipher BORON
220 -- 235Andrew Simpson, Matthias Dellago, Daniel W. Woods. Formalizing Attack Trees To Support Economic Analysis
236 -- 252Xu Zhang, Shunjie Wen, Liang Yan, Jiangfan Feng, Ying Xia. A Hybrid-Convolution Spatial-Temporal Recurrent Network For Traffic Flow Prediction
253 -- 273Wenhan Ge, Junfeng Wang 0003. SeqMask: Behavior Extraction Over Cyber Threat Intelligence Via Multi-Instance Learning
274 -- 291Chunning Zhou, Wentao Zhang, Weiwei Cao. A New Approach of Evaluating the Security Against Differential and Linear Cryptanalysis and Its Applications to Serpent, NOEKEON and ASCON
292 -- 303Lin Ding 0001, Zheng Wu, Guixian Zhang, Tairong Shi. Quantum Guess and Determine Attack on Stream Ciphers
304 -- 322K. Ashwini. User Name-Based Compression and Encryption of Images Using Chaotic Compressive Sensing Theory
323 -- 337Ke Wang, Zhenfeng Zhang, Haodong Jiang, Huiqin Xie, Yanjun Li, Ying Sun, Lidong Han. Key Reuse Attacks on Post-quantum Cryptosystems, Revisited
338 -- 346Mozamel M. Saeed. Designing Scenarios for In-Organization Training Using the CyberCIEGE Game
347 -- 361C. Shaji, I. Shatheesh Sam. Encoding with Combination Orientation Technique for RDH in Dual Stego Images
362 -- 375Liqing Qiu, Yuying Liu, Jianyi Zhang. A New Method for Identifying Influential Spreaders in Complex Networks
376 -- 390Joon-Young Paik, Rize Jin. Malware Family Prediction with an Awareness of Label Uncertainty
391 -- 406Nieves R. Brisaboa, Travis Gagie, Adrián Gómez-Brandón, Gonzalo Navarro. Two-Dimensional Block Trees