Journal: Comput. J.

Volume 68, Issue 5

445 -- 459Avanthika Vineetha Harish, Kimberly Tam, Kevin D. Jones. Generating training events for building cyber-physical security skills
460 -- 478Shang Shang, Xinqiang Zhao, Zhongjiang Yao, Yepeng Yao, Liya Su, Zijing Fan, Xiaodan Zhang, Zhengwei Jiang. Can LLMs deeply detect complex malicious queries? A framework for jailbreaking via obfuscating intent
479 -- 486Hongliang Sun, Zhihui Liu, Chao Wang, Dan Li. Admission control algorithm for visible light communication random access network under delay and jitter constraints
487 -- 501Zhongjun Yang, Jixue Zhang, Beimin Su. Internet of vehicles intrusion detection method based on CFS-COA feature selection and spatio-temporal feature extraction
502 -- 509Lina Ba, Heping Zhang. Structure connectivity of folded cross cubes
510 -- 519Yang Chen, Chunlu Zhao, Jin Pan, Yang Liu. Verifiable attribute-based multi-keyword ranked search scheme in blockchain
520 -- 538Qiqing Xia, Qianru Zhu, Huiqin Xie, Li Yang. Algorithm for solving quantum linear systems of equations with coherent superposition and extended applications
539 -- 551Prasanth Aruchamy, M. Sundarrajan, Mani Deepak Choudhry, Akshya Jothi. Enhancing security of medical images using code-based intermittent encryption and convolutional neural network
552 -- 564Yaxun Jia, Zhu Yuan, Haoyang Wang, Yunchao Gong, Haixiang Yang, Zuo-Lin Xiang. Variations towards an efficient drug-drug interaction
565 -- 576Muhammad Inaam Ul Haq, Qianmu Li, Khalid Mahmood 0002, Ayesha Shafique, Rizwan Ullah. BioElectra-BiLSTM-Dual Attention classifier for optimizing multilabel scientific literature classification