Journal: Comput. J.

Volume 67, Issue 2

407 -- 422Amal Abid 0002, Saoussen Cheikhrouhou, Slim Kallel, Zahir Tari, Mohamed Jmaiel. A Smart Contract-Based Access Control Framework For Smart Healthcare Systems
423 -- 436Zhu Yuan, Xueqiang Lv, Ping Xie, Haojie Ge, Xindong You. CSEA: A Fine-Grained Framework of Climate-Season-Based Energy-Aware in Cloud Storage Systems
437 -- 446Francisco Javier Moreno Arboleda, Georgia Garani, Carlos Daniel Bolivar Zapata. Query Operators for Transactional Data: Detecting Similar and Periodic Transactions
447 -- 462Mengqi Liu, Hang Gao, Xiaofan Xia, Suying Gui, Tiegang Gao. Perceptual Image Hashing Based on Canny Operator and Tensor for Copy-Move Forgery Detection
463 -- 473Changan Liu, Changjun Fan, Zhongzhi Zhang. Finding Influencers in Complex Networks: An Effective Deep Reinforcement Learning Approach
474 -- 484Yaoan Jin, Atsuko Miyaji. Secure and Compact Elliptic Curve Scalar Multiplication with Optimized Inversion
485 -- 497Mingzhe Zhu, Wanyue Xu, Wei Li 0055, Zhongzhi Zhang, Haibin Kan. Hitting Times of Random Walks on Edge Corona Product Graphs
498 -- 507Yuliang Xue, Yuhao Zhu, Zhiying Zhu, Sheng Li, Zhenxing Qian, Xinpeng Zhang 0001. Removing Watermarks For Image Processing Networks Via Referenced Subspace Attention
508 -- 518Reza Ebrahim Pourian, Mehdi Fartash, Javad Akbari Torkestani. A Deep Learning Model for Energy-Aware Task Scheduling Algorithm Based on Learning Automata for Fog Computing
519 -- 526Marzieh Shamsizadeh, Mohammad Mehdi Zahedi, Khadijeh Abolpour. Irreducible Fuzzy Multiset Finite Automaton
527 -- 536Heqin Liu, Dongqin Cheng. Structure Fault Tolerance of Exchanged Hypercube
537 -- 547Jinyu Lu, Guoqiang Liu, Bing Sun 0001, Chao Li 0002, Li Liu. Improved (Related-Key) Differential-Based Neural Distinguishers for SIMON and SIMECK Block Ciphers
548 -- 556Yuxing Yang. Hyper-Hamiltonian Laceability of Cartesian Products of Cycles and Paths
557 -- 580Hireche Samia, Dennai Abdeslem, Boufeldja Kadri. Toward a Novel RESTFUL Big Data-Based Urban Traffic Incident Data Web Service for Connected Vehicles
581 -- 603Xuefeng Zhao. Secure and Efficient Masking of Lightweight Ciphers in Software and Hardware
604 -- 616Yishu Xu, Peng Zhang, Hongtao Yu, Fuzhi Zhang. Detecting Group Shilling Attacks In Recommender Systems Based On User Multi-dimensional Features And Collusive Behaviour Analysis
617 -- 631Zhiwei Chen, Lunzhi Deng, Yu Ruan, Shuai Feng, Tao Wang, Bo Wang. Certificateless Broadcast Encryption with Authorization Suitable for Storing Personal Health Records
632 -- 641Tu-Liang Lin, Hong-Yi Chang, Yuan-Yao Chiang, Shu-Cheng Lin, Tsung-Yen Yang, Chun-Jun Zhuang, Wha-Lee Tseng, Bo-Hao Zhang. Ransomware Detection by Distinguishing API Call Sequences through LSTM and BERT Models
642 -- 657Tian Yang, Sha Ma, Jiaojiao Du, Chengyu Jiang, Qiong Huang 0001. Revocable Public Key Encryption with Equality Test without Pairing in Cloud Storage
658 -- 673Rahman Keramati Hatkeposhti, Meisam Yadollahzadeh Tabari, Mehdi GolsorkhtabariAmiri. Providing an Approach for Early Prediction of Fall in Human Activities Based on Wearable Sensor Data and the Use of Deep Learning Algorithms
674 -- 687Li Zhang, Yu Zhang, Wenling Wu, Yongxia Mao, Yafei Zheng. Explicit Upper Bound Of Impossible Differentials For AES-Like Ciphers: Application To uBlock And Midori
688 -- 693Zhecheng Yu, Liqiong Xu. Reliability Evaluation Of Multiprocessor System Based On The Balanced Complete Multipartite Graphs
694 -- 708Shumin Si, Xiuhan Lin, Puwen Wei. Compressed Zero-Knowledge Proofs for Lattice-Based Accumulator
709 -- 718Hong Zhang, Shuming Zhou, Eddie Cheng 0001. The Cyclic Diagnosability Of Hypercubes Under The PMC Model And The MM* Model
719 -- 727Katharina Boudgoust, Adeline Roux-Langlois. Overfull: Too Large Aggregate Signatures Based on Lattices
728 -- 745Tzong-Jye Liu. Adversarial Attacks on Network Intrusion Detection Systems Using Flow Containers
746 -- 761Hongjin Zhang, Hui Wei 0001, Wang Bo. A New Fuzzy Smoothing Term Model For Stereo Matching
762 -- 776Senxing Lu, Mingming Zhao, ChunLin Li, Quanbing Du, Youlong Luo. Time-Aware Data Partition Optimization and Heterogeneous Task Scheduling Strategies in Spark Clusters
777 -- 781Shijie Zhao, Pingshan Li. On Conditional Edge-Fault-Tolerant Strong Menger Edge Connectivity Of Folded Hypercubes
782 -- 805Hala S. Ali, R. Sridevi. Mobility and Security Aware Real-Time Task Scheduling in Fog-Cloud Computing for IoT Devices: A Fuzzy-Logic Approach
806 -- 0. Correction to: An Attack on a Proposed Construction of Small-State Stream Ciphers and Proposals for New Constructions
807 -- 0. Correction to: Performance Evaluation of FPGA-Based LSTM Neural Networks for Pulse Signal Detection on Real-Time Radar Warning Receivers