Journal: Comput. J.

Volume 64, Issue 9

1315 -- 1325Xiaoyang Liu 0001, Ting Tang, Daobing He. Double-Layer Network Negative Public Opinion Information Propagation Modeling Based on Continuous-Time Markov Chain
1326 -- 1342Falak Nawaz, Naeem Khalid Janjua. Dynamic QoS-Aware Cloud Service Selection Using Best-Worst Method and Timeslot Weighted Satisfaction Scores
1343 -- 1357Diana Popova, Ken-ichi Kawarabayashi, Alex Thomo. CutTheTail: An Accurate and Space-Efficient Heuristic Algorithm for Influence Maximization
1358 -- 1383Zahra Abdi Reyhan, Shahriar Lotfi, Ayaz Isazadeh, Jaber Karimpour. Intra-Tile Parallelization for Two-Level Perfectly Nested Loops With Non-Uniform Dependences
1384 -- 1392Caixia Liang, Bo Zhou 0007, Haiyan Guo. Minimum Status, Matching and Domination of Graphs
1393 -- 1400Hong Zhang, Jixiang Meng. Reliability of DQcube Based on g-Extra Conditional Fault
1401 -- 1411Guanqin Lian, Shuming Zhou, Eddie Cheng 0001, Jiafei Liu, Gaolin Chen. Persistence of Hybrid Diagnosability of Regular Networks Under Testing Diagnostic Model
1412 -- 1424Fei Ma, Ping Wang. Determining Exact Solutions for Structural Parameters on Hierarchical Networks With Density Feature
1425 -- 1436Mei-Mei Gu, Rong-Xia Hao, Jou-Ming Chang. Reliability Analysis of Alternating Group Graphs and Split-Stars
1437 -- 1450Vinicius Fulber Garcia, Sérgio Luis Sardi Mergen. LUISA: Decoupling the Frequency Model From the Context Model in Prediction-Based Compression
1451 -- 1464Mengjie Lv, Baolei Cheng, Jianxi Fan, Xi Wang, Jingya Zhou, Jia Yu 0005. The Conditional Reliability Evaluation of Data Center Network BCDC

Volume 64, Issue 8

1145 -- 1162Mojtaba Rafiee, Shahram Khazaei. Private Set Operations Over Encrypted Cloud Dataset and Applications
1163 -- 1177Zirui Qiao, Qiliang Yang, Yanwei Zhou, Zhe Xia, Mingwu Zhang. Novel Public-Key Encryption with Continuous Leakage Amplification
1178 -- 1192Haixia Chen, Xinyi Huang, Wei Wu 0001, Yi Mu 0001. Privacy-Aware Image Authentication from Cryptographic Primitives
1193 -- 1214Ehsan Farzadnia, Hossein Shirazi, Alireza Nowroozi. A New Intrusion Detection System Using the Improved Dendritic Cell Algorithm
1215 -- 1225Yong Fang, Yuchi Zhang, Cheng Huang. CyberEyes: Cybersecurity Entity Recognition Model Based on Graph Convolutional Network
1226 -- 1238Hao Lin, Zhen Zhao 0005, Fei Gao 0001, Willy Susilo, Qiaoyan Wen, Fuchun Guo, Yijie Shi. Lightweight Public Key Encryption With Equality Test Supporting Partial Authorization in Cloud Storage
1239 -- 1252Sha Ma, Qiong Huang. CCA-Almost-Full Anonymous Group Signature with Verifier Local Revocation in the Standard Model
1253 -- 1263Sudong Ma, Jie Guan. Improved Key Recovery Attacks on Simplified Version of K2 Stream Cipher
1264 -- 1276Gaoli Wang, Zhenfu Cao, Xiaolei Dong. Improved File-injection Attacks on Searchable Encryption Using Finite Set Theory
1277 -- 1292Hailong Zhang 0001, Wei Yang. Theoretical Estimation on the Success Rate of the Asymptotic Higher Order Optimal Distinguisher
1293 -- 1302Ji Sun Shin, Minjae Jo, Jung Yeon Hwang, Jaehwan Lee 0001. A Verifier-Based Password-Authenticated Key Exchange Using Tamper-Proof Hardware
1303 -- 1314Yangguang Tian, Yingjiu Li, Yi Mu 0001, Guomin Yang. Unlinkable and Revocable Secret Handshake

Volume 64, Issue 7

991 -- 992Xiaofeng Zhu 0001, Kim-Han Thung, Minjeong Kim. Privacy-preserving Multimedia Data Analysis
993 -- 1004Guoqiu Wen, Yonghua Zhu, Linjun Chen, Mengmeng Zhan, Yangcai Xie. Global and Local Structure Preservation for Nonlinear High-dimensional Spectral Clustering
1005 -- 1015Rongyao Hu, Leyuan Zhang, Jian Wei. Adaptive Laplacian Support Vector Machine for Semi-supervised Learning
1016 -- 1027Waqar Ali, Rajesh Kumar, Zhiyi Deng, Yansong Wang, Jie Shao. A Federated Learning Approach for Privacy Protection in Context-Aware Recommender Systems
1028 -- 1038Shijie Hao, Zhonghao Wang, Fuming Sun. LEDet: A Single-Shot Real-Time Object Detector Based on Low-Light Image Enhancement
1039 -- 1055Yuying Liu, Shaoyi Du, Wenting Cui, Xijing Wang, Qingnan Mou, Jiamin Zhao, Yucheng Guo, Yong Zhang. Precise Point Set Registration Based on Feature Fusion
1056 -- 1068Jianxing Yu, Shiqi Wang, Jian Yin 0001. Adaptive Cross-Lingual Question Generation with Minimal Resources
1069 -- 1079Guangquan Lu, Jihong Huang. Learning Representation From Concurrence-Words Graph For Aspect Sentiment Classification
1080 -- 1092Jiangzhang Gan, Tong Liu, Li Li, Jilian Zhang. Non-negative Matrix Factorization: A Survey
1093 -- 1103Liang Peng, Fei Kong, Chongzhi Liu, Ping Kuang. Robust and Dynamic Graph Convolutional Network For Multi-view Data Classification
1130 -- 1143Meiling Liu, Beixian Zhang, Xi Li, Weidong Tang, Gangqiang Zhang. An Optimized k-means Algorithm Based on Information Entropy

Volume 64, Issue 6

843 -- 859Sanjay Adiwal, Balaji Rajendran, Pushparaj Shetty D, Gopinath Palaniappan. Revisiting the Performance of DNS Queries on a DNS Hierarchy Testbed over Dual-Stack
860 -- 879Manel Takrouni, Rim Bouhouch, Salem Hasnaoui. Simulink Implementation of the Data Distribution Service for Vehicular Controllers on Top of GBE and AFDX
880 -- 894S. Sasikala, S. Gomathi 0001, V. Geetha, L. Murali. A proposed framework for cloud-aware multimodal multimedia big data analysis toward optimal resource allocation
895 -- 908Yuhong Dong, Zetian Fu, Stevan Stankovski, Yaoqi Peng, Xinxing Li. A Call Center System based on Expert Systems for the Acquisition of Agricultural Knowledge Transferred from Text-to-Speech in China
909 -- 920Kumar Shaswat. Hybrid-based Deep Belief Network Model for Cement Compressive Strength Prediction
921 -- 928Jun Yuan, Aixia Liu, Xi Wang. The Relationship Between the g-Extra Connectivity and the g-Extra Diagnosability of Networks Under the MM* Model
929 -- 940Fu Donglai, Liu Yanhua 0001. Trust-aware Task Allocation in Collaborative Crowdsourcing Model
941 -- 959Shuhui Chen, Jincheng Zhong, Teng Huang, Ziling Wei, Shuang Zhao. CMT: An Efficient Algorithm for Scalable Packet Classification
960 -- 972Gugulothu Venkanna, K. F. Bharati. Optimal Text Document Clustering Enabled by Weighed Similarity Oriented Jaya With Grey Wolf Optimization Algorithm
973 -- 989Meng Li, Meilian Lu. A Virtual Network Embedding Algorithm Based On Double-Layer Reinforcement Learning

Volume 64, Issue 5

675 -- 706Khavee Agustus Botangen, Jian Yu, Wai-Kiang Yeap, Quan Z. Sheng. Integrating Context to Preferences and Goals for Goal-oriented Adaptability of Software Systems
707 -- 720Alejandro Estrada-Moreno, Ismael G. Yero, Juan Alberto Rodríguez-Velázquez. On The (k, t)-Metric Dimension Of Graphs
721 -- 730Ekaterina Benza, Shmuel T. Klein, Dana Shapira. Smaller Compressed Suffix Arrays†
731 -- 748Reshma V. K, Vinod Kumar R. S. Pixel Prediction-Based Image Steganography by Support Vector Neural Network
749 -- 761Yufeng Liu, Xiaoqin Zeng, Kang Zhang 0001, Yang Zou. Coordinate Graph Grammar for the Specification of Spatial Graphs
762 -- 788Rubing Huang, Haibo Chen 0005, Yunan Zhou, Tsong Yueh Chen, Dave Towey, Man Fai Lau, Sebastian Ng, Robert Merkel, Jinfu Chen 0001. Covering Array Constructors: An Experimental Analysis of Their Interaction Coverage and Fault Detection
789 -- 811Jelle Hellings, Catherine L. Pilachowski, Dirk Van Gucht, Marc Gyssens, Yuqing Wu. From Relation Algebra to Semi-join Algebra: An Approach to Graph Query Optimization
812 -- 825Mei-Mei Gu, Jou-Ming Chang, Rong-Xia Hao. Strong Menger Connectedness of Augmented k-ary n-cubes
826 -- 841Cléber Gimenez Corrêa, Márcio E. Delamaro, Marcos Lordello Chaim, Fátima L. S. Nunes. Software Testing Automation of VR-Based Systems With Haptic Interfaces

Volume 64, Issue 4

509 -- 533Cong Li, Qingni Shen, Zhikang Xie, Xinyu Feng, Yuejian Fang, Zhonghai Wu. Large Universe CCA2 CP-ABE With Equality and Validity Test in the Standard Model
534 -- 549Zhenbin Yan, Yi Deng. Non-Malleable Zero-Knowledge Arguments with Lower Round Complexity
550 -- 563Hui Cui, Russell Paulet, Surya Nepal, Xun Yi, Butrus Mbimbi. Two-Factor Decryption: A Better Way to Protect Data Security and Privacy
564 -- 574Murat Yasin Kubilay, Mehmet Sabir Kiraz, Haci Ali Mantar. KORGAN: An Efficient PKI Architecture Based on PBFT Through Dynamic Threshold Signatures
575 -- 598Zhen Liu 0008, Qiong Huang, Duncan S. Wong. On Enabling Attribute-Based Encryption to Be Traceable Against Traitors
599 -- 609Tran Nghi Phu, Nguyen Dai Tho, Le Huy Hoang, Nguyen Ngoc Toan, Nguyen Ngoc Binh. An Efficient Algorithm to Extract Control Flow-Based Features for IoT Malware Detection
610 -- 627Fulei Ji, Wentao Zhang, Tianyou Ding. Improving Matsui's Search Algorithm For The Best Differential/Linear Trails And Its Applications For DES, DESL And GIFT
628 -- 638Haibo Zhou, Rui Zong, Xiaoyang Dong, Keting Jia, Willi Meier. Interpolation Attacks on Round-Reduced Elephant, Kravatte and Xoofff
639 -- 652Colin Boyd, Kai Gellert. A Modern View on Forward Security
653 -- 660Xi Jun Lin, Qihui Wang, Lin Sun 0005, Zhen Yan, Peishun Liu. Security Analysis of the First Certificateless Proxy Signature Scheme Against Malicious-But-Passive KGC Attacks
661 -- 674Yunhao Ling, Sha Ma, Qiong Huang, XiMing Li, Yijian Zhong, YunZhi Ling. Efficient Group ID-Based Encryption With Equality Test Against Insider Attack

Volume 64, Issue 3

281 -- 285Sabah Mohammed, Wai-Chi Fang, Aboul Ella Hassanien, Tai-Hoon Kim. Advanced Data Mining Tools and Methods for Social Computing
286 -- 295Rui Gao, Yuanyuan Zhu, Mingye Li, Shoufeng Li, Xiaohu Shi. Encoder-Decoder Couplet Generation Model Based on 'Trapezoidal Context' Character Vector
296 -- 304Weidong Huang 0003, Shuting Zhu, Xinkai Yao. Destination Image Recognition And Emotion Analysis: Evidence From User-Generated Content Of Online Travel Communities
305 -- 313Esra Sarac Essiz, Murat Oturakci. Artificial Bee Colony-Based Feature Selection Algorithm for Cyberbullying
314 -- 324Ai Wang, Xuedong Gao. Intelligent Computing: Knowledge Acquisition Method Based on the Management Scale Transformation
325 -- 336Xian Mo, Jun Pang 0001, Zhiming Liu 0001. Effective Link Prediction with Topological and Temporal Information using Wavelet Neural Network Embedding
337 -- 346Gang Han, Menggang Li, Yiduo Mei, Deming Li. Transportation Index Computation: A Development Theme Mining-Based Approach
347 -- 357Niyati Baliyan, Aarti Sharma. Related Blogs' Summarization With Natural Language Processing
358 -- 368Ahlem Drif, Khalil Hadjoudj. An Opinion Spread Prediction Model With Twitter Emotion Analysis During Algeria's Hirak
369 -- 382Abir Troudi, Leila Ghorbel, Corinne Amel Zayani, Salma Jamoussi, Ikram Amous. MDER: Multi-Dimensional Event Recommendation in Social Media Context
383 -- 390Ghazi Abdalla, Fatih Özyurt. Sentiment Analysis of Fast Food Companies With Deep Learning Models
408 -- 417Mumine Kaya Keles, Umit Kilic, Abdullah Emre Keles. Proposed Artificial Bee Colony Algorithm as Feature Selector to Predict the Leadership Perception of Site Managers
451 -- 461Ming-Hung Wang. Positioning and Categorizing Mass Media Using Reaction Emojis on Facebook
462 -- 472Zahid Hussain Wani, Javaid Iqbal Bhat, Kaisar Javeed Giri. A Generic Analogy-Centered Software Cost Estimation Based on Differential Evolution Exploration Process
473 -- 499Önder Çoban, Selma Ayse Özel, Ali Inan. Deep Learning-based Sentiment Analysis of Facebook Data: The Case of Turkish Users
500 -- 508Qingyun Li, Jie Han, Lin Lu. A Random Forest Classification Algorithm Based Personal Thermal Sensation Model for Personalized Conditioning System in Office Buildings

Volume 64, Issue 2

155 -- 168Yuhong Dong, Zetian Fu, Stevan Stankovski, Yaoqi Peng, Xinxing Li. A Cotton Disease Diagnosis Method Using a Combined Algorithm of Case-Based Reasoning and Fuzzy Logic
169 -- 184Dattatray P. Gandhmal, Kumar Kannan. Wrapper-Enabled Feature Selection and CPLM-Based NARX Model for Stock Market Prediction
185 -- 194Alak Roy, Nityananda Sarma. Multichannel Ordered Contention MAC Protocol For Underwater Wireless Sensor Networks
195 -- 210Muhammad Salek Ali, Massimo Vecchio, Fabio Antonelli. A Blockchain-Based Framework for IoT Data Monetization Services
211 -- 223Nithya Balasubramanian, Naveen Ranjan, A. Justin Gopinath. Performance Analysis of Prioritization and Contention Control Algorithm in Wireless Body Area Networks
224 -- 235Wen Cheng, Yuqi Zou, Lingfang Zeng, Yang Wang. Hercules: Intelligent Coupling of Dual-Mode Flash Memory and Hard Disk Drive
236 -- 244Yi Qi, Wanyue Xu, Liwang Zhu, Zhongzhi Zhang. Real-World Networks Are Not Always Fast Mixing
245 -- 253A. K. Tripathy, S. K. Tripathy, S. R. Pattanaik, S. K. Das. A New Algorithm For Reconstruction Of A Computer-Generated Hologram (CGH)
254 -- 263Rahil Gandotra, Levi Perigo. SDVoIP - A Software-Defined VoIP Framework For SIP And Dynamic QoS
264 -- 280Hui Cai, Yanmin Zhu, Jie Li 0002, Jiadi Yu. A Profit-maximizing Mechanism for Query-based Data Trading with Personalized Differential Privacy

Volume 64, Issue 12

1785 -- 1800Anterpreet Kaur Bedi, Ramesh Kumar Sunkaria, Deepti Mittal. Ultrasound Image Despeckling and Enhancement using Modified Multiscale Anisotropic Diffusion Model in Non-Subsampled Shearlet Domain
1801 -- 1813Anup Aprem, Stephen Roberts 0001. A Bayesian Optimization Approach to Compute Nash Equilibrium of Potential Games Using Bandit Feedback
1814 -- 1831Li Lu 0008, Jian Liu 0001, Jiadi Yu, Yingying Chen 0001, Yanmin Zhu, Linghe Kong, Minglu Li 0001. Enable Traditional Laptops with Virtual Writing Capability Leveraging Acoustic Signals
1832 -- 1839Sana Khanam, Safdar Tanweer, Syed Sibtain Khalid. Artificial Intelligence Surpassing Human Intelligence: Factual or Hoax
1840 -- 1847Utkarsh Mahadeo Khaire, R. Dhanalakshmi 0001. Effects of Random Forest Parameters in the Selection of Biomarkers
1848 -- 1860Rim Afdhal, Ridha Ejbali, Mourad Zaied. Primary Emotions and Recognition of Their Intensities
1861 -- 1875Vishan Kumar Gupta, Prashant Singh Rana. Ensemble Technique for Toxicity Prediction of Small Drug Molecules of the Antioxidant Response Element Signalling Pathway
1876 -- 1885Mahmoud Elmezain, Hani M. Ibrahem. Retrieving Semantic Image Using Shape Descriptors and Latent-Dynamic Conditional Random Fields
1886 -- 1906S. Veluchamy, L. R. Karlmarx, K. Michael Mahesh. Detection and Localization of Abnormalities in Surveillance Video Using Timerider-Based Neural Network

Volume 64, Issue 11

1617 -- 1632Akshma Chadha, Baijnath Kaushik. A Survey on Prediction of Suicidal Ideation Using Machine and Ensemble Learning
1633 -- 1655Mohammad Farhad Bulbul, Saiful Islam, Yatong Zhou, Hazrat Ali. Improving Human Action Recognition Using Hierarchical Features And Multiple Classifier Ensembles
1656 -- 1671Zhenjun Tang, Mengzhu Yu, Heng Yao, Hanyun Zhang, Chunqiang Yu, Xianquan Zhang. Robust Image Hashing With Singular Values Of Quaternion SVD
1672 -- 1679Ayesha Ata, Muhammad Adnan Khan, Sagheer Abbas, Muhammad Saleem Khan, Gulzar Ahmad. Adaptive IoT Empowered Smart Road Traffic Congestion Control System Using Supervised Machine Learning Algorithm
1680 -- 1691Reza Gharibi, Atefeh Safdel, Seyed Mostafa Fakhrahmad, Mohammad Hadi Sadreddini. A Content-Based Model for Tag Recommendation in Software Information Sites
1692 -- 1704V. Vinolin, M. Sucharitha. Hierarchical Categorization and Review of Recent Techniques on Image Forgery Detection
1705 -- 1714Zhijun Liu, Xuefeng Pan, Yuan Peng. Character Recognition Algorithm Based on Fusion Probability Model and Deep Learning
1715 -- 1730Tayyip Özcan, Alper Bastürk. Performance Improvement Of Pre-trained Convolutional Neural Networks For Action Recognition
1731 -- 1746Talha Mahboob Alam, Kamran Shaukat, Mubbashar Mushtaq, Yasir Ali, Matloob Khushi, Suhuai Luo, Abdul Wahab. Corporate Bankruptcy Prediction: An Approach Towards Better Corporate World
1747 -- 1759V. Nancy, G. Balakrishnan. Thermal Image-Based Object Classification for Guiding the Visually Impaired
1760 -- 1774S. Guruvammal, T. Chellatamilan, L. Jegatha Deborah. Optimal Feature Selection and Hybrid Classification for Autism Detection in Young Children
1775 -- 1783Ahmet Gökçen. Computer-Aided Diagnosis System for Chronic Obstructive Pulmonary Disease Using Empirical Wavelet Transform on Auscultation Sounds

Volume 64, Issue 10

1465 -- 1476Liqing Qiu, Jianyi Zhang, Xiangbo Tian, Shuang Zhang 0005. Identifying Influential Nodes in Complex Networks Based on Neighborhood Entropy Centrality
1477 -- 1493Kannan Krishnan, B. Yamini, Wael Mohammad Alenazy, M. Nalini. Energy-Efficient Cluster-Based Routing Protocol for WSN Based on Hybrid BSO-TLBO Optimization Model
1494 -- 1513R. Prasath, T. Kumanan. Underwater Image Enhancement With Optimal Histogram Using Hybridized Particle Swarm and Dragonfly
1514 -- 1530R. Cristin, K. Suresh Kumar, P. Anbhazhagan. Severity Level Classification of Brain Tumor based on MRI Images using Fractional-Chicken Swarm Optimization Algorithm
1531 -- 1548A. Francis Alexander Raghu, John Patrick Ananth. Robust Object Detection and Localization Using Semantic Segmentation Network
1549 -- 1564Safikureshi Mondal, Nandini Mukherjee. Pruning of Health Data in Mobile-Assisted Remote Healthcare Service Delivery
1565 -- 1574Hari T. S. Narayanan. Contact Tracing Solution for Global Community
1575 -- 1583Rama Al-Share, Mohammad Shurman, Abdallah Y. Alma'aitah. A Collaborative Learning-Based Algorithm for Task Offloading in UAV-Aided Wireless Sensor Networks
1584 -- 1599Adrien Gausseran, Frédéric Giroire, Brigitte Jaumard, Joanna Moulierac. Be Scalable and Rescue My Slices During Reconfiguration
1600 -- 1616Zhu Yuan, Xindong You, Xueqiang Lv, Ping Xie. SS6: Online Short-Code RAID-6 Scaling by Optimizing New Disk Location and Data Migration

Volume 64, Issue 1

1 -- 6Shu-Li Zhao, Rong-Xia Hao, Sheng-Lung Peng. Reliability Assessment of Some Regular Networks
7 -- 26Michael A. Bekos, Henry Förster, Christian Geckeler, Lukas Holländer, Michael Kaufmann 0001, Amadäus M. Spallek, Jan Splett. A Heuristic Approach Towards Drawings of Graphs With High Crossing Resolution
27 -- 37Tzu-Liang Kung, Hon-Chan Chen, Chia-Hui Lin, Lih-Hsing Hsu. Three Types of Two-Disjoint-Cycle-Cover Pancyclicity and Their Applications to Cycle Embedding in Locally Twisted Cubes
38 -- 53Xiaoyan Li, Cheng-Kuan Lin, Jianxi Fan, Xiaohua Jia, Baolei Cheng, Jingya Zhou. Relationship Between Extra Connectivity And Component Connectivity In Networks
54 -- 63Samer Nofal, Katie Atkinson, Paul E. Dunne. Computing Grounded Extensions Of Abstract Argumentation Frameworks
64 -- 75Eminjan Sabir, Jixiang Meng. Structure Fault Tolerance of Recursive Interconnection Networks
76 -- 92Yibo Zeng, Zhongzhi Zhang. Spectra, Hitting Times and Resistance Distances of q- Subdivision Graphs
93 -- 107Jun Liu, Yicheng Pan, Qifu Hu. Exact Distance Query in Large Graphs through Fast Graph Simplification
108 -- 131Juan Li, Dandan Xiao, Ting Zhang, Chun Liu, Yuan-xiang Li, Gai-Ge Wang. Multi-Swarm Cuckoo Search Algorithm with Q-Learning Model
132 -- 154Stéphane Devismes, Anissa Lamani, Franck Petit, Pascal Raymond, Sébastien Tixeuil. Terminating Exploration Of A Grid By An Optimal Number Of Asynchronous Oblivious Robots