| 445 | -- | 459 | Avanthika Vineetha Harish, Kimberly Tam, Kevin D. Jones. Generating training events for building cyber-physical security skills |
| 460 | -- | 478 | Shang Shang, Xinqiang Zhao, Zhongjiang Yao, Yepeng Yao, Liya Su, Zijing Fan, Xiaodan Zhang, Zhengwei Jiang. Can LLMs deeply detect complex malicious queries? A framework for jailbreaking via obfuscating intent |
| 479 | -- | 486 | Hongliang Sun, Zhihui Liu, Chao Wang, Dan Li. Admission control algorithm for visible light communication random access network under delay and jitter constraints |
| 487 | -- | 501 | Zhongjun Yang, Jixue Zhang, Beimin Su. Internet of vehicles intrusion detection method based on CFS-COA feature selection and spatio-temporal feature extraction |
| 502 | -- | 509 | Lina Ba, Heping Zhang. Structure connectivity of folded cross cubes |
| 510 | -- | 519 | Yang Chen, Chunlu Zhao, Jin Pan, Yang Liu. Verifiable attribute-based multi-keyword ranked search scheme in blockchain |
| 520 | -- | 538 | Qiqing Xia, Qianru Zhu, Huiqin Xie, Li Yang. Algorithm for solving quantum linear systems of equations with coherent superposition and extended applications |
| 539 | -- | 551 | Prasanth Aruchamy, M. Sundarrajan, Mani Deepak Choudhry, Akshya Jothi. Enhancing security of medical images using code-based intermittent encryption and convolutional neural network |
| 552 | -- | 564 | Yaxun Jia, Zhu Yuan, Haoyang Wang, Yunchao Gong, Haixiang Yang, Zuo-Lin Xiang. Variations towards an efficient drug-drug interaction |
| 565 | -- | 576 | Muhammad Inaam Ul Haq, Qianmu Li, Khalid Mahmood 0002, Ayesha Shafique, Rizwan Ullah. BioElectra-BiLSTM-Dual Attention classifier for optimizing multilabel scientific literature classification |