Journal: Comput. J.

Volume 63, Issue 9

1285 -- 1297Sasha Mahdavi Hezavehi, Y. Alimardani, Rouhollah Rahmani. An Efficient Framework for a Third Party Auditor in Cloud Computing Environments
1298 -- 1310Michal Soucha, Kirill Bogdanov 0002. Observation Tree Approach: Active Learning Relying on Testing
1311 -- 1320Mei-Mei Gu, Jou-Ming Chang, Rong-Xia Hao. On Computing Component (Edge) Connectivities of Balanced Hypercubes
1321 -- 1337Zhendong Lei, Shaowei Cai. NuDist: An Efficient Local Search Algorithm for (Weighted) Partial MaxSAT
1338 -- 1354ChunLin Li, Yihan Zhang, Youlong Luo. Adaptive Replica Creation and Selection Strategies for Latency-Aware Application in Collaborative Edge-Cloud System
1355 -- 1371Hui Yu, Jiejie Yang, Limei Lin, Yanze Huang, Jin'e Li, Riqing Chen. {1, 2, 3}-Restricted Connectivity of $(n, k)$-Enhanced Hypercubes
1372 -- 1384Zuwen Luo, Liqiong Xu. A Kind Of Conditional Vertex Connectivity Of Cayley Graphs Generated By Wheel Graphs
1385 -- 1396Yi Qi, Yuze Dong, Zhongzhi Zhang, Zhang Zhang. Hitting Times for Random Walks on Sierpiński Graphs and Hierarchical Graphs
1397 -- 1405Guanqin Lian, Shuming Zhou, Sun-Yuan Hsieh, Gaolin Chen, Jiafei Liu, Zhendong Gu. Characterization of Diagnosabilities on the Bounded PMC Model
1406 -- 1416Mei-Mei Gu, Rong-Xia Hao, Eddie Cheng 0001. Note on Applications of Linearly Many Faults
1417 -- 1437Natarajan Meghanathan. Relative Assortativity Index: A Quantitative Metric to Assess the Impact of Link Prediction Techniques on Assortativity of Complex Networks
1438 -- 1447Yunxia Ren, Shiying Wang. Diagnosability of the Cayley Graph Generated by Complete Graph with Missing Edges under the MM$^{\ast }$ Model

Volume 63, Issue 8

1125 -- 1138Mahmood Yousefi Azar, Len Hamey, Vijay Varadharajan, Shiping Chen 0001. Byte2vec: Malware Representation and Feature Selection for Android
1139 -- 1147Wenjie Yang, Jian Weng 0001, Xinyi Huang, Anjia Yang. A Provably Secure Certificateless Proxy Signature Scheme Against Malicious-But-Passive KGC Attacks
1148 -- 1167Robab Alyari, Jaber Karimpour, Habib Izadkhah. Specifying a New Requirement Model for Secure Adaptive Systems
1168 -- 1193María Magdalena Payeras Capellà, Macià Mut Puigserver, Pau Conejero-Alberola, Jordi Castellà-Roca, Llorenç Huguet i Rotger. Implementation And Evaluation Of The mCityPASS Protocol For Secure And Private Access To Associated Touristic Services
1194 -- 1202Dung Hoang Duong, Willy Susilo, Ha Thanh Nguyen Tran. A Multivariate Blind Ring Signature Scheme
1203 -- 1215Yang Chen, Wenmin Li, Fei Gao 0001, Kaitai Liang, Hua Zhang 0001, Qiaoyan Wen. Practical Attribute-Based Conjunctive Keyword Search Scheme
1216 -- 1230Wei Guo, Su-Juan Qin, Jun Lu, Fei Gao 0001, Zhengping Jin, Qiaoyan Wen, Daniele Sgandurra. Improved Proofs Of Retrievability And Replication For Data Availability In Cloud Storage
1231 -- 1246Haibo Zhou, Zheng Li 0008, Xiaoyang Dong, Keting Jia, Willi Meier, Tomer Ashur. Practical Key-Recovery Attacks On Round-Reduced Ketje Jr, Xoodoo-AE And Xoodyak
1247 -- 1258Muhua Liu, Ping Zhang. An Adaptively Secure Functional Encryption for Randomized Functions
1259 -- 1262Xi Jun Lin, Lin Sun 0005, Zhen Yan, Xiaoshuai Zhang, Haipeng Qu, Liqun Chen. On the Security Of A Certificateless Signcryption With Known Session-Specific Temporary Information Security In The Standard Model
1263 -- 1270Xi Jun Lin, Lin Sun 0005, Haipeng Qu, Kaitai Liang. Leakage-free ID-Based Signature, Revisited
1271 -- 0Qianqian Su, Rui Zhang 0016, Rui Xue 0001. Secure Outsourcing Algorithms for Composite Modular Exponentiation Based on Single Untrusted Cloud

Volume 63, Issue 7

983 -- 994Muhammad Asad, Muhammad Asim, Talha Javed, Mirza Omer Beg, Hasan Mujtaba, Sohail Abbas. DeepDetect: Detection of Distributed Denial of Service Attacks Using Deep Learning
995 -- 1003Z. Xu, L. Cao, X. Chen, Jin-Hee Cho. Deep Reinforcement Learning with Adaptive Update Target Combination
1004 -- 1016Kalthoum Rezgui, Hédia Mhiri. Towards a Semantic Framework for Lifelong Integrated Competency Management and Development
1017 -- 1030Zhenjun Tang, Lv Chen, Heng Yao, Xianquan Zhang, Chunqiang Yu, Fionn Murtagh. Video Hashing with DCT and NMF
1031 -- 1038Zongjie Ma, Abdul Sattar 0001, Jun Zhou, Qingliang Chen, Kaile Su. Dropout with Tabu Strategy for Regularizing Deep Neural Networks
1039 -- 1062Navid Yazdanjue, Mohammad Fathian, Babak Amiri. Evolutionary Algorithms For k-Anonymity In Social Networks Based On Clustering Approach
1063 -- 1075Muralidhar Pantula, K. S. Kuppusamy. A Metric to Assess the Readability of Video Closed Captions for the Persons With Low Literacy Skills
1076 -- 1083Tianwen Huang, Fei Jiao. Study on Data Transfer in Meteorological Forecast of Small and Medium-Sized Cities and Its Application in Zhaoqing City
1084 -- 1098Haijiang Wang, Jingpu Wang, Fuqi Yao, Yongqiang Ma, Lihong Li, Qinke Yang. Multi-Band Contourlet Transform For Adaptive Remote Sensing Image Denoising
1099 -- 1108Salem Ameen, Sunil Vadera. Pruning Neural Networks Using Multi-Armed Bandits
1109 -- 1123Iqbal H. Sarker, Alan Colman, Jun Han 0004, A. S. M. Kayes, Paul A. Watters. CalBehav: A Machine Learning-Based Personalized Calendar Behavioral Model Using Time-Series Smartphone Data

Volume 63, Issue 6

817 -- 831Shounak Sugave, Balaso Jagdale, Domenico Rosaci. Monarch-EWA: Monarch-Earthworm-Based Secure Routing Protocol in IoT
832 -- 843Muthumanikandan Vanamoorthy, Valliyammai Chinnaiah. Congestion-Free Transient Plane (CFTP) Using Bandwidth Sharing During Link Failures in SDN
844 -- 856JuMin Zhao, Liang Zhang, Deng-ao Li. Multiantenna Receiver Signal Detection in AmBC Based on Cluster Analysis
857 -- 879B. Mathan Kumar, Pushpalakshmi Raman. An Approach for Image Search and Retrieval by Cluster-Based Indexing of Binary MKSIFT Codes
880 -- 899Lixia Chen, Jian Li 0021, Ruhui Ma, Haibing Guan, Hans-Arno Jacobsen. Balancing Power And Performance In HPC Clouds
900 -- 912Oswalt Manoj S, John Patrick Ananth. MapReduce and Optimized Deep Network for Rainfall Prediction in Agriculture
913 -- 926T. Mahalakshmi, Alluri Sreenivas, Dimitrios Tzovaras. Adaptive Filter with Type-2 Fuzzy System and Optimization-Based Kernel Interpolation for Satellite Image Denoising
927 -- 941A. A. Periola, Akintunde A. Alonge, Kingsley A. Ogudo. Architecture and System Design for Marine Cloud Computing Assets
942 -- 957Jemish V. Maisuria, Saurabh N. Mehta, Ing-Ray Chen. Bayesian-Based Spectrum Sensing and Optimal Channel Estimation for MAC Layer Protocol in Cognitive Radio Sensor Networks
958 -- 973Muhammad Omer Farooq. RIoT: A Routing Protocol for the Internet of Things†
974 -- 981Jianqiu Sun, Xingguang Li, Kang Chen, Wei Cui, Ming Chu. A Novel CMA+DD_LMS Blind Equalization Algorithm for Underwater Acoustic Communication

Volume 63, Issue 5

657 -- 687Eleonora D'Andrea, Beatrice Lazzerini, Francesco Marcelloni. A System for Multi-Passenger Urban Ridesharing Recommendations with Ordered Multiple Stops
688 -- 700Wenjun Shi, Jigang Wu, Guiyuan Jiang, Siew Kei Lam. Multiple-Choice Hardware/Software Partitioning for Tree Task-Graph on MPSoC
701 -- 708Sérgio L. S. Mergen. UnfairDuelMerge: Merging with Even Fewer Moves
709 -- 731Wallace Manzano, Valdemar Vicente Graciano Neto, Elisa Yumi Nakagawa. Dynamic-SoS: An Approach for the Simulation of Systems-of-Systems Dynamic Architectures
732 -- 757Viviana Yarel Rosales-Morales, Laura Nely Sánchez Morales, Giner Alor-Hernández, Jorge Luis García-Alcaraz, José Luis Sánchez-Cervantes, Lisbeth Rodríguez-Mazahua. ImagIngDev: A New Approach for Developing Automatic Cross-Platform Mobile Applications Using Image Processing Techniques
758 -- 773Matthew Leeke. Simultaneous Fault Models for the Generation and Location of Efficient Error Detection Mechanisms
774 -- 790Alan Burns, Ian J. Hayes, Cliff B. Jones. Deriving Specifications of Control Programs for Cyber Physical Systems
791 -- 816Muhammed Jassem Al-Muhammed. Lookback-Guess-Next Optimizer: Feedback-Guided Random Search Technique with Biased Mapping for Solving Unconstrained Optimization Problems

Volume 63, Issue 4

495 -- 507Zhichao Yang, Rongmao Chen, Chao Li 0002, Longjiang Qu, Guomin Yang. On the Security of LWE Cryptosystem against Subversion Attacks
508 -- 524Yanwei Zhou, Bo Yang 0003, Tao Wang 0039, Zhe Xia, Hong-xia Hou. Continuous Leakage-Resilient Certificate-Based Encryption Scheme Without Bilinear Pairings
525 -- 535Zhen Zhao 0005, Ge Wu 0001, Fuchun Guo, Willy Susilo, Yi Mu 0001, Baocang Wang, Yupu Hu. Black-Box Accountable Authority Identity-Based Revocation System
536 -- 548Yangguang Tian, Yingjiu Li, Robert H. Deng, Nan Li, Guomin Yang, Zheng Yang. A New Construction for Linkable Secret Handshake
549 -- 566Hao Wang, Kaiju Li. Resistance of IID Noise in Differentially Private Schemes for Trajectory Publishing
567 -- 592Jiafu Jiang, Linyu Tang, Ke Gu, Weijia Jia. Secure Computing Resource Allocation Framework For Open Fog Computing
593 -- 603Er-Rajy Latifa, My Ahmed El Kiram, Mohamed El Ghazouani. New Security Risk Value Estimate Method for Android Applications
604 -- 619Leyli Javid Khayati, Erkay Savas, Halit Alptekin. Intrusion Detection Over Encrypted Network Data
620 -- 632Xuecheng Ma, Dongdai Lin. Server-aided Revocable IBE with Identity Reuse
633 -- 647Qiang Wang 0005, Fucai Zhou, Jian Xu 0004, Zifeng Xu. A (Zero-Knowledge) Vector Commitment with Sum Binding and its Applications
648 -- 656Meijuan Huang, Bo Yang 0003, Mingwu Zhang, Lina Zhang, Hong-xia Hou. Updatable Lossy Trapdoor Functions Under Consecutive Leakage

Volume 63, Issue 3

337 -- 350Pavithra Latha Kumaresan, T. Sree Sharmila. An Improved Seed Point Selection-Based Unsupervised Color Clustering for Content-Based Image Retrieval Application
351 -- 363Rim Afdhal, Ridha Ejbali, Mourad Zaied. Emotion Recognition by a Hybrid System Based on the Features of Distances and the Shapes of the Wrinkles
364 -- 382Bikash Kanti Sarkar. A Two-Step Knowledge Extraction Framework for Improving Disease Diagnosis
383 -- 394Syrine Neffati, Khaoula Ben Abdellafou, Okba Taouali, Kais Bouzrara. Enhanced SVM-KPCA Method for Brain MR Image Classification
395 -- 409L. B. Shyamasundar, Prathuri Jhansi Rani. A Multiple-Layer Machine Learning Architecture for Improved Accuracy in Sentiment Analysis
410 -- 424Guangfeng Liu, Xianying Huang, Xiaoyang Liu, Anzhi Yang. A Novel Aspect-based Sentiment Analysis Network Model Based on Multilingual Hierarchy in Online Social Network
425 -- 434Negin Manshouri, Temel Kayikçioglu. A Comprehensive Analysis of 2D&3D Video Watching of EEG Signals by Increasing PLSR and SVM Classification Results
435 -- 447Mohsen Salehi, Jafar Razmara, Shahriar Lotfi. A Novel Data Mining on Breast Cancer Survivability Using MLP Ensemble Learners
448 -- 459Amin Mahmoudi, Mohd Ridzwan Yaakub, Azuraliza Abu Bakar. A New Real-Time Link Prediction Method Based on User Community Changes in Online Social Networks
460 -- 468Faming Gong, Hanbing Yue, Xiangbing Yuan, Wenjuan Gong, Tao Song 0001. Discriminative Correlation Filter for Long-Time Tracking
469 -- 478Na Su, Shujuan Ji, Jimin Liu. Real-Time Topic Detection with Dynamic Windows
479 -- 493Wadood Abdul, Ohoud Nafea, Sanaa Ghouzali. Combining Watermarking and Hyper-Chaotic Map to Enhance the Security of Stored Biometric Templates

Volume 63, Issue 2

169 -- 178Ajay Amrit Raj, Dejey. Adaptive Neuro-Fuzzy Inference System-based Nonlinear Equalizer for CO-OFDM Systems
179 -- 192Karl J. O'Dwyer, Eoin Creedon, Mark Purcell, David Malone. Power Saving Proxies for Web Servers
193 -- 202N. Ganesh. Performance Evaluation of Depth Adjustment and Void Aware Pressure Routing (DA-VAPR) Protocol for Underwater Wireless Sensor Networks
203 -- 219Mani Zarei. Traffic-Centric Mesoscopic Analysis of Connectivity in VANETs
220 -- 238Mehmet Hakan Karaata, Anwar Nais AlMutairi. A Snap-Stabilizing m-wave Algorithm for Tree Networks
239 -- 253S. Thanga Revathi, N. Ramaraj, S. Chithra. Tracy-Singh Product and Genetic Whale Optimization Algorithm for Retrievable Data Perturbation for Privacy Preserved Data Publishing in Cloud Computing
253 -- 266Mohammed Haddad 0001, Colette Johnen, Sven Köhler 0001. Polynomial Silent Self-Stabilizing p-Star Decomposition†
267 -- 282Avinash Ratre. Stochastic Gradient Descent-Whale Optimization Algorithm-Based Deep Convolutional Neural Network To Crowd Emotion Understanding
283 -- 294Hong-Yi Chang, Zih-Huan Hang, Yih-Jou Tzang. MNVPCS: Multinode Virtual-Point-Based Charging Scheme to Prolong the Lifetime of Wireless Rechargeable Sensor Networks
295 -- 307Arslan Qadeer, Asad Waqar Malik, Anis Ur Rahman, Mian Muhammad Hamayun, Arsalan Ahmad. Virtual Infrastructure Orchestration For Cloud Service Deployment
308 -- 321J. Thrisul Kumar, Y. Mallikarjuna Reddy, B. Prabhakara Rao. WHDA-FCM: Wolf Hunting-Based Dragonfly With Fuzzy C-Mean Clustering For Change Detection In SAR Images
322 -- 336P. G. Om Prakash, A. Jaya. WS-BD-Based Two-Level Match: Interesting Sequential Patterns and Bayesian Fuzzy Clustering for Predicting the Web Pages from Weblogs

Volume 63, Issue 12

1789 -- 1812Lin Jiao, Yongqiang Li 0001, Yonglin Hao. A Guess-And-Determine Attack On SNOW-V Stream Cipher
1813 -- 1825Amirhossein Ebrahimi Moghaddam, Zahra Ahmadian. New Automatic Search Method for Truncated-Differential Characteristics Application to Midori, SKINNY and CRAFT
1826 -- 1834Yiming Li, Shengli Liu, Dawu Gu, Kefei Chen. Reusable Fuzzy Extractor Based on the LPN Assumption
1835 -- 1848Ge Wu 0001, Zhen Zhao 0005, Fuchun Guo, Willy Susilo, Futai Zhang. On the General Construction of Tightly Secure Identity-Based Signature Schemes
1849 -- 1858Sha Ma, Qiong Huang. A New Framework of IND-CCA Secure Public Key Encryption with Keyword Search
1859 -- 1870Ya Liu 0001, Bing Shi, Dawu Gu, Fengyu Zhao, Wei Li 0013, Zhiqiang Liu 0001. Improved Meet-in-the-Middle Attacks on Reduced-Round Deoxys-BC-256
1871 -- 1885Cheng-Jun Lin, Rui Xue 0001, Shao-Jun Yang, Xinyi Huang, Shimin Li. Linearly Homomorphic Signatures from Lattices
1886 -- 1903Zhidan Li, Wenmin Li, Fei Gao 0001, Ping Yu, Hua Zhang 0001, Zhengping Jin, Qiaoyan Wen. New Blind Filter Protocol: An Improved Privacy-Preserving Scheme for Location-Based Services
1904 -- 1914Janaka Alawatugoda. Public-Key Encryption In The Standard Model Against Strong Leakage Adversary
1915 -- 1938Huizhong Li, Yongbin Zhou, Jingdian Ming, Guang Yang, Chengbin Jin. The Notion of Transparency Order, Revisited

Volume 63, Issue 11

1607 -- 1623Longji Huang, Jianbin Huang, Yueshen Xu, Zhiqiang Zhao, Zhenghao Zhang. Driving Route Recommendation With Profit Maximization in Ride Sharing
1624 -- 1632Bam Bahadur Sinha, R. Dhanalakshmi 0001. Building a Fuzzy Logic-Based Artificial Neural Network to Uplift Recommendation Accuracy
1633 -- 1643Yan Wang 0037, Jiantao Zhou 0002, Xinyuan Li, Xiaoyu Song. Effective User Preference Clustering in Web Service Applications
1644 -- 1657Harkiran Kaur, Sandeep K. Sood. A Smart Disaster Management Framework For Wildfire Detection and Prediction
1658 -- 1667María José Castro Bleda, Salvador España Boquera, Joan Pastor-Pellicer, Francisco Zamora-Martínez. The NoisyOffice Database: A Corpus To Train Supervised Machine Learning Filters For Image Processing
1668 -- 1688Bojie Shen, Md. Saiful Islam 0003, David Taniar. Direction-based Spatial Skyline for Retrieving Arbitrary-Shaped Surrounding Objects
1689 -- 1703Xiaoyang Liu, Daobing He. Information Propagation and Public Opinion Evolution Model Based on Artificial Neural Network in Online Social Network
1704 -- 1712Amandeep Kaur, Sandeep K. Sood. Artificial Intelligence-Based Model For Drought Prediction and Forecasting
1713 -- 1726Ian Kenny. Hydrographical Flow Modelling of the River Severn Using Particle Swarm Optimization
1727 -- 1737Abhishek Kashyap, B. Suresh, Hariom Gupta. Detection of splicing forgery using differential evolution and wavelet decomposition
1738 -- 1755C. A. Ghuge, V. Chandra Prakash, Sachin Ruikar. Weighed query-specific distance and hybrid NARX neural network for video object retrieval
1756 -- 1774Fatih Aydin, Zafer Aslan. The Construction of a Majority-Voting Ensemble Based on the Interrelation and Amount of Information of Features
1775 -- 1787Yong Fang 0002, Yue Yang, Cheng Huang. EmailDetective: An Email Authorship Identification And Verification Model

Volume 63, Issue 10

1449 -- 1462Binjie He, Dong Zhang, Chang Zhao. Hidden Markov Model-based Load Balancing in Data Center Networks
1463 -- 1478Jianhui Zhang, Tianhao Zhang, Feilong Jiang, Bei Zhao. Who Face Me? Neighbor Identification With LED Camera Communication
1479 -- 1489Lata Jaywant Sankpal, Suhas Haribhau Patil. Rider-Rank Algorithm-Based Feature Extraction for Re-ranking the Webpages in the Search Engine
1490 -- 1499Zhichao Yang, Dung Hoang Duong, Willy Susilo, Guomin Yang, Chao Li 0002, Rongmao Chen. Hierarchical Identity-Based Signature in Polynomial Rings
1500 -- 1512Parampreet Kaur, Ashima Singh, Sukhpal Singh Gill. RGIM: An Integrated Approach to Improve QoS in AODV, DSR and DSDV Routing Protocols for FANETS Using the Chain Mobility Model
1513 -- 1523Balaji C. G, Anu Monisha A, K. Murugan. A Novel Hybrid UE Selection Scheme for Efficient Data Offloading Using D2D Communication
1524 -- 1536Bin Yu, Xiaofeng Li, He Zhao. Virtual Block Group: A Scalable Blockchain Model with Partial Node Storage and Distributed Hash Table
1537 -- 1546Rola El Osta, Maryline Chetto, Hussein El Ghor. Optimal Slack Stealing Servicing for Real-Time Energy Harvesting Systems
1547 -- 1563Bechir Alaya, Rehanullah Khan. QoS Enhancement In VoD Systems: Load Management And Replication Policy Optimization Perspectives
1564 -- 1583Lili Jiang, Xiaolin Chang, Runkai Yang, Jelena V. Misic, Vojislav B. Misic. Model-Based Comparison of Cloud-Edge Computing Resource Allocation Policies
1584 -- 1596Haishan Chen, Junying Yuan, Wien Hong, Jiangqun Ni, Tung-Shou Chen. On Performance Improvement Of Reversible Data Hiding With Contrast Enhancement
1597 -- 1606Chao-Chao Wang, Wan-liang Wang, Xin-Wei Yao. Interference and Coverage Modeling for Indoor Terahertz Communications with Beamforming Antennas

Volume 63, Issue 1

1 -- 15Shiying Wang, Nan Zhao. The Two-Good-Neighbor Connectivity and Diagnosability of the Augmented Three-Ary n-Cubes
16 -- 24Xueli Sun, Shuming Zhou, Mengjie Lv, Jiafei Liu, Guanqin Lian. Intermittent Fault Diagnosability of Some General Regular Networks
25 -- 40Yuan Lin 0003, Zhongzhi Zhang. Effects of Edge Centrality on Random Walks on Graphs
41 -- 65Lixiao Zheng, Shuai Ma 0001, Yuanyang Wang, Gang Lin. String Generation for Testing Regular Expressions
66 -- 79Juan Li, Yanmin Zhu, Jiadi Yu. Redundancy-Aware and Budget-Feasible Incentive Mechanism in Crowd Sensing
80 -- 90Huiqing Liu, Xiaolan Hu, Shan Gao 0005. The g-Good-Neighbor Conditional Diagnosability of Locally Exchanged Twisted Cubes
91 -- 104Lydia W. Rizkallah, Mona F. Ahmed, Nevin M. Darwish. SMT-LH: A New Satisfiability Modulo Theory-Based Technique for Solving Vehicle Routing Problem with Time Window Constraints
105 -- 122MohammadSadegh Mohagheghi, Jaber Karimpour, Ayaz Isazadeh. Prioritizing Methods to Accelerate Probabilistic Model Checking of Discrete-Time Markov Models
123 -- 136Xian-Shu Li, Su-Kyung Yoon, Jeong Geun Kim, Bernd Burgstaller, Shin-Dug Kim. Algorithm-Switching-Based Last-Level Cache Structure with Hybrid Main Memory Architecture
137 -- 150Xiao-yu Wang, Yu-Feng Liu, Kang Zhang. A Graph Grammar Approach to the Design and Validation of Floor Plans
151 -- 167Vasamsetti Srinivas, Ch Santhirani. Optimization-Based Support Vector Neural network for Speaker Recognition