Journal: Comput. J.

Volume 65, Issue 9

2247 -- 2261Zheng Xu, Yongqiang Li, Mingsheng Wang. Observations on the Security of COMET
2262 -- 2275Yanan Cheng, Tingting Chai, Zhaoxin Zhang, Keyu Lu, Yuejin Du. Detecting Malicious Domain Names with Abnormal WHOIS Records Using Feature-Based Rules
2276 -- 2298Keyu Lu, Tingting Chai, Haiyan Xu, Shitala Prasad, Jianen Yan, Zhaoxin Zhang. Research on Unexpected DNS Response from Open DNS Resolvers
2299 -- 2314Charles Bouillaguet, Florette Martinez, Damien Vergnaud. Cryptanalysis of Modular Exponentiation Outsourcing Protocols
2315 -- 2338B. Janardhana Rao, Y. Chakrapani, S. Srinivas Kumar. Hybridized Cuckoo Search with Multi-Verse Optimization-Based Patch Matching and Deep Learning Concept for Enhancing Video Inpainting
2339 -- 2346Shanshan Yin, Liqiong Xu. g-Extra Connectivity of the Enhanced Hypercubes
2347 -- 2359Yucheng Wang, Yuhao Yi, Wanyue Xu, Zhongzhi Zhang. Modeling Higher-Order Interactions in Complex Networks by Edge Product of Graphs
2360 -- 2376Salim el Khediri, Adel Thaljaoui, Fayez Alfayez. A Novel Decision-Making Process for COVID-19 Fighting Based on Association Rules and Bayesian Methods
2377 -- 2391Binlei Cai, Qin Guo, Junfeng Yu. LraSched: Admitting More Long-Running Applications via Auto-Estimating Container Size and Affinity
2392 -- 2399Sadia Sharmin. An Experimental Approach to Exact and Random Boolean-Widths and Their Comparison with Other Width Parameters
2400 -- 2410Pingyuan Zhang, Han Jiang, Zhihua Zheng, Hao Wang 0007, Qiuliang Xu. A New and Efficient Lattice-Based Online/Offline Signature From Perspective of Abort
2411 -- 2420Manman Li, Shaozhen Chen. Improved Meet-in-the-Middle Attacks on Reduced-Round Tweakable Block Cipher Deoxys-BC
2421 -- 2429Meenakshi Kansal, Amit Kumar Singh, Ratna Dutta. Efficient Multi-Signature Scheme Using Lattice
2430 -- 2438Wei Gao, Liqun Chen, Chunming Rong, Kaitai Liang, Xianghan Zheng, Jiangshan Yu. Security Analysis and Improvement of a Redactable Consortium Blockchain for Industrial Internet-of-Things
2439 -- 2453Yoganand S, Chithra S. Bat Ant Lion Optimization-Based Generative Adversarial Network For Structural Heath Monitoring In IoT
2454 -- 2469Jinyu Lu, Yunwen Liu, Tomer Ashur, Chao Li. On the Effect of the Key-Expansion Algorithm in Simon-like Ciphers
2470 -- 2483Fatiha Youbi, Nesma Settouti. Analysis of Machine Learning and Deep Learning Frameworks for Opinion Mining on Drug Reviews
2484 -- 2492Tarek Moulahi. Joining Formal Concept Analysis to Feature Extraction for Data Pruning in Cloud of Things
2493 -- 2505Bashar Al-Shboul, Abdullateef Rabab'ah, Mahmoud Al-Ayyoub, Yaser Jararweh, Thar Baker. Social Network Analysis of the Panama Papers Concentrating on the MENA Region
2506 -- 2527Gurukumar Lokku, Gangireddy Harinatha Reddy, M. N. Giri Prasad. Optimized Scale-Invariant Feature Transform with Local Tri-directional Patterns for Facial Expression Recognition with Deep Learning Model
2528 -- 2534Xiaowang Li, Shuming Zhou, Tianlong Ma, Xia Guo, Xiangyu Ren. h-Restricted Connectivity of a Class of Hypercube-Based Compound Networks
2535 -- 2546Abidin Çaliskan. A New Ensemble Approach for Congestive Heart Failure and Arrhythmia Classification Using Shifted One-Dimensional Local Binary Patterns with Long Short-Term Memory

Volume 65, Issue 8

1939 -- 1947Di Yan, Hanlin Liu, Shuoyao Zhao, Yu Yu 0001. On the Hardness of Sparsely Learning Parity with Noise
1948 -- 1963Ping Yu, Wei Ni 0001, Hua Zhang 0001, Ren Ping Liu, Qiaoyan Wen, Wenmin Li 0001, Fei Gao 0001. Secure and Differentiated Fog-Assisted Data Access for Internet of Things
1964 -- 1976Zhen Bao Fan, Yi-Na Li, Kang Zhang 0001, Jinhui Yu, Mao Lin Huang. Measuring and Evaluating the Visual Complexity Of Chinese Ink Paintings
1977 -- 1997Rung-Shiang Cheng, Yin-Ming Li, Chung-Ming Huang. The Collision Avoidance and Situation-Aware Media Access Scheme Using the Registered-Backoff-Time Method for the IEEE 802.11ah-Based IoT Wireless Networks
1998 -- 2015Morteza Rakhshaninejad, Mohammad Fathian, Babak Amiri, Navid Yazdanjue. An Ensemble-Based Credit Card Fraud Detection Algorithm Using an Efficient Voting Strategy
2016 -- 2033Zhenghao Zhang, Jianbin Huang, Qinglin Tan. Multi-view Dynamic Heterogeneous Information Network Embedding
2034 -- 2043Yifan Xia, Baosheng Liang, Zhaotong Li, Song Gao. Gaze Estimation Using Neural Network And Logistic Regression
2044 -- 2062Veruska Borges Santos, Carlos Eduardo S. Pires, Dimas Cassimiro do Nascimento, Andreza Raquel Monteiro de Queiroz. A Decision Tree Ensemble Model for Predicting Bus Bunching
2063 -- 2072Sujuan Li, Futai Zhang. eCK-Secure Authenticated Key Exchange against Auxiliary Input Leakage
2073 -- 2086Luis H. M. Sepulvene, Isabela Drummond, Bruno Tardiole Kuehne, Rafael M. D. Frinhani, Dionisio Machado Leite Filho, Maycon L. M. Peixoto, Stephan Reiff-Marganiec, Bruno G. Batista. Performance Evaluation of Machine Learning Techniques for Fault Diagnosis in Vehicle Fleet Tracking Modules
2087 -- 2097Hussein El Ghor, Maryline Chetto. Optimal Real-Time Scheduling Algorithm for Wireless Sensors with Regenerative Energy
2098 -- 2132May S. Altulyan, Lina Yao 0001, Xianzhi Wang 0001, Chaoran Huang 0001, Salil S. Kanhere, Quan Z. Sheng. A Survey on Recommender Systems for Internet of Things: Techniques, Applications and Future Directions
2133 -- 2145Taotao Li, Dequan Li, Mingsheng Wang. Blockchain-based Fair and Decentralized Data Trading Model
2146 -- 2163Maher Alrahhal, Supreethi K. P.. COVID-19 Diagnostic System Using Medical Image Classification and Retrieval: A Novel Method for Image Analysis
2164 -- 2182Weidong Wang, Xiaofeng Li, He Zhao 0011. DCAF: Dynamic Cross-Chain Anchoring Framework using Smart Contracts
2183 -- 2196R. Vinoth, J. P. Ananth. Rider Chicken Optimization Algorithm-Based Recurrent Neural Network for Big Data Classification in Spark Architecture
2197 -- 2208Mengjie Lv, Jianxi Fan, Jingya Zhou, Jia Yu 0005, Xiaohua Jia. n-Cube Based on Component Connectivity
2209 -- 2220Xue Zhang, Zhongxiang Zheng, Anyu Wang 0003. A Refinement of Key Mismatch Attack on NewHope
2221 -- 2230Lin Jiao, Yongqiang Li 0001, Shaoyu Du. Guess-and-Determine Attacks on AEGIS
2231 -- 2244Fusong Xiong, Jian Zhang, Yun Ling, Zhiqiang Zhang. A Novel Image Thresholding Method Combining Entropy With Parzen Window Estimation
2245 -- 0Muhammad Sajid, Nouman Ali, Naeem Iqbal Ratyal, Muhammad Usman, Faisal Mehmood Butt, Imran Riaz, Usman Musaddiq, Mirza Jabbar Aziz Baig, Shahbaz Baig, Umair Ahmad Salaria. Corrigendum to: Deep Learning in Age-invariant Face Recognition: A Comparative Study

Volume 65, Issue 7

1653 -- 1665Fei Zhu, Xun Yi, Alsharif Abuadbba, Ibrahim Khalil, Surya Nepal, Xinyi Huang 0001. Forward-Secure Edge Authentication for Graphs
1666 -- 1678Faisal Khurshid, Yan Zhu 0007, Jie Hu, Muqeet Ahmad, Mushtaq Ahmad. Battering Review Spam Through Ensemble Learning in Imbalanced Datasets
1679 -- 1691Jiang Che, Wanyue Xu, Xiaotian Zhou, Zhongzhi Zhang, Haibin Kan. Some Combinatorial Problems in Power-Law Graphs
1692 -- 1701Jianchang Lai, Xinyi Huang 0001, Debiao He, Wei Wu 0001. Provably Secure Online/Offline Identity-Based Signature Scheme Based on SM9
1702 -- 1716Intissar Khalifa, Ridha Ejbali, Raimondo Schettini, Mourad Zaied. Deep Multi-Stage Approach For Emotional Body Gesture Recognition In Job Interview
1717 -- 1725M. Ramchandran, E. N. Ganesh. MBSO Algorithm For Handling Energy-Throughput Trade-Off In Cognitive Radio Networks
1726 -- 1739Hao Wang, Huan Wang. Differentially Private Publication For Correlated Non-Numerical Data
1740 -- 1751Talha Mahboob Alam, Kamran Shaukat, Haris Mahboob, Muhammad Umer Sarwar, Farhat Iqbal, Adeel Nasir, Ibrahim A. Hameed, Suhuai Luo. A Machine Learning Approach for Identification of Malignant Mesothelioma Etiological Factors in an Imbalanced Dataset
1752 -- 1759G. S. Smrithy, Ramadoss Balakrishnan. A Statistical-Based Light-Weight Anomaly Detection Framework for Wireless Body Area Networks
1760 -- 1775Wenzheng Zhang, Zirui Qiao, Bo Yang 0003, Yanwei Zhou, Mingwu Zhang. Continuous Leakage-Amplified Public-Key Encryption With CCA Security
1776 -- 1786Siyuan Chen, Peng Zeng 0002, Kim-Kwang Raymond Choo. A New Code-Based Blind Signature Scheme
1787 -- 1794Suliman Mohamed Fati. Detecting Cyberbullying across Social Media Platforms in Saudi Arabia Using Sentiment Analysis: A Case Study
1795 -- 1811Antony Jaya Mabel Rani, Albert Pravin. Optimization Enabled Black Hole Entropic Fuzzy Clustering Approach for Medical Data
1812 -- 1825T. Daniya, S. Vigneshwari. Deep Neural Network for Disease Detection in Rice Plant Using the Texture and Deep Features
1826 -- 1845Shujiao Cao, Rui Xue. The (Im)Possibility on Constructing Verifiable Random Functions
1846 -- 1859Yanbo Wang, Fasheng Wang, Chang Wang, Fuming Sun, Jianjun He. Learning Saliency-Aware Correlation Filters for Visual Tracking
1860 -- 1873Pradeep Krishnadoss, L. Javid Ali, Gobalakrishnan Natesan, C. J. Raman, Manikandan Nanjappan. CWOA: Hybrid Approach for Task Scheduling in Cloud Environment
1874 -- 1890Shiying Wang, Xiaolei Ma. The Matching Preclusion of Enhanced Hypercubes
1891 -- 1903Maximiliano Cristiá, Ricardo D. Katz, Gianfranco Rossi. Proof Automation in the Theory of Finite Sets and Finite Set Relation Algebra
1904 -- 1922Lavanya Ravala, Rajini G. K. Automatic Diagnosis of Diabetic Retinopathy from Retinal Abnormalities: Improved Jaya-Based Feature Selection and Recurrent Neural Network
1923 -- 1936V. Betcy Thanga Shoba, I. Shatheesh Sam. Aging Facial Recognition for Feature Extraction Using Adaptive Fully Recurrent Deep Neural Learning
1937 -- 0Yonghong Hou, Lin Xue, Shuo Li 0003, Jiaming Xing. Corrigendum: User-Experience-Oriented Fuzzy Logic Controller for Adaptive Streaming
1938 -- 0Juan Li, Dandan Xiao, Ting Zhang, Chun Liu, Yuan-xiang Li, Gaige Wang. Q-Learning Model

Volume 65, Issue 6

1353 -- 1364Yati Phyo, Canh Minh Do, Kazuhiro Ogata 0001. A Divide & Conquer Approach to Leads-to Model Checking
1365 -- 1385C. Venkata Narasimhulu. A New Blind Watermark Embedding Model: Spiral Updated Rider Optimization Algorithm
1386 -- 1411Carlo Blundo, Stelvio Cimato, Luisa Siniscalchi. Role Mining Heuristics for Permission-Role-Usage Cardinality Constraints
1412 -- 1433Tomasz Boinski, Pawel Czarnul. Optimization of Data Assignment for Parallel Processing in a Hybrid Heterogeneous Environment Using Integer Linear Programming
1434 -- 1460Sreenithya Sumesh, Aneesh Krishna. i* Goal Model
1461 -- 1471Lei Wang, Qiang Zhang, Qing Qian, Jishuai Wang, Yujun Pan, Renbing Yang, Wenbo Cheng. Multispectral Palm Print and Palm Vein Acquisition Platform and Recognition Method Based on Convolutional Neural Network
1472 -- 1488Fernando J. Fiori, Waltteri Pakalén, Jorma Tarhio. Approximate String Matching with SIMD
1489 -- 1511Shengyuan Feng, Junqing Gong 0001, Jie Chen. Binary Tree Encryption with Constant-Size Public Key in the Standard Model
1512 -- 1526Tonglai Liu, Jigang Wu, Jiaxing Li, Jingyi Li, Zikai Zhang. Efficient Algorithms For Storage Load Balancing Of Outsourced Data In Blockchain Network
1527 -- 1539Surbhi Gupta, Manoj K. Gupta. Computational Prediction of Cervical Cancer Diagnosis Using Ensemble-Based Classification Algorithm
1540 -- 1559Sahil 0001, Sandeep Kumar Sood. Fog-assisted Energy Efficient Cyber Physical System for Panic-based Evacuation during Disasters
1560 -- 1573Xichao Hu, Yongqiang Li 0001, Lin Jiao, Mingsheng Wang. New Division Property Propagation Table: Applications to Block Ciphers with Large S-boxes
1574 -- 1585Meijuan Huang, Bo Yang 0003, Yanwei Zhou, Xuewei Hu. Continual Leakage-Resilient Hedged Public-Key Encryption
1586 -- 1597G. Gokulkumari. Metaheuristic-Enabled Artificial Neural Network Framework For Multimodal Biometric Recognition With Local Fusion Visual Features
1598 -- 1610Zeyi Liu, Weijuan Zhang, Ji Xiang, Daren Zha, Lei Wang 0135. NP-LFA: Non-profiled Leakage Fingerprint Attacks against Improved Rotating S-box Masking Scheme
1611 -- 1630Selvapandian Arumugam, Nagendra Prabhu Selvaraj, P. Sivakumar 0002, Jagannadha Rao D. B.. Lung Cancer Detection and Severity Level Classification Using Sine Cosine Sail Fish Optimization Based Generative Adversarial Network with CT Images
1631 -- 1638Qiong Sun, Xiankai Huang, Zheng Liu. Tourists' Digital Footprint: Prediction Method of Tourism Consumption Decision Preference
1639 -- 1652I Edwin Albert, A. J. Deepa, A. Lenin Fred. Fidelity Homogenous Genesis Recommendation Model for User Trust with Item Ratings

Volume 65, Issue 5

0 -- 0. Withdrawn: Editorial
1053 -- 1072Mohammad Bidoki, M. Fakhrahmad, Mohammad R. Moosavi. Text Summarization as a Multi-objective Optimization Task: Applying Harmony Search to Extractive Multi-Document Summarization
1073 -- 1087Marcel Wild. Compression with Wildcards: From CNFs to Orthogonal DNFs by Imposing the Clauses One-by-One
1088 -- 1097Hieu Trung Huynh, Tran Minh Hoang. A Novel Approach for Determining Meal Plan for Gestational Diabetes Mellitus Using Artificial Intelligence
1098 -- 1106Norah Alajlan, Mohammed Hadwan, Dina M. Ibrahim. Effectiveness of Adopting Cloud-Based E-Learning at Qassim University
1107 -- 1128Tao Peng, Thomas Canhao Xu, Yihuai Wang, Fanzhang Li. Deep Belief Network and Closed Polygonal Line for Lung Segmentation in Chest Radiographs
1129 -- 1143Shurong Zhang, Dongyue Liang, Lin Chen, Ronghua Li, Weihua Yang. The Component Diagnosability of Hypercubes with Large-Scale Faulty Nodes
1144 -- 1166Mehdi Ahmed-Nacer, Slim Kallel, Faiez Zalila, Philippe Merle, Walid Gaaloul. Model-Driven Simulation of Elastic OCCI Cloud Resources
1167 -- 1177Anurag Sohane, Ravinder Agarwal. Knee Muscle Force Estimating Model Using Machine Learning Approach
1178 -- 1188Ujjwal Kumar Mishra, Kalpana Mahalingam, Raghavan Rama 0001. Watson-Crick Jumping Finite Automata: Combination, Comparison and Closure
1189 -- 1199Huan Wang, Qing Gao, Hao Li, Hao Wang, Liping Yan, Guanghua Liu. A Structural Evolution-Based Anomaly Detection Method for Generalized Evolving Social Networks
1200 -- 1210Gilad Baruch, Shmuel T. Klein, Dana Shapira. Enhanced Context Sensitive Flash Codes
1211 -- 1224Y. Srinivasa Rao, R. Madhu. Channel Estimation for Millimeter Wave Massive MIMO System: Proposed Hybrid Optimization with Heuristic-Enabled Precoding and Combining
1225 -- 1241A. Francis Alexander Raghu, John Patrick Ananth. Object Detection and Localization Using Sparse-FCM and Optimization-driven Deep Convolutional Neural Network
1242 -- 1256Stephen Wambura, Jianbin Huang, He Li 0006. Robust Anomaly Detection in Feature-Evolving Time Series
1257 -- 1271Afef Abidi, Ibtihel Nouira, Ines Assali, Mohamed Ali Saafi, Mohamed Hedi Bedoui. Hybrid Multi-Channel EEG Filtering Method for Ocular and Muscular Artifact Removal Based on the 3D Spline Interpolation Technique
1272 -- 1292Felix M. Philip, Jayakrishnan V, Ajesh F, Haseena P. Video Anomaly Detection Using the Optimization-Enabled Deep Convolutional Neural Network
1293 -- 1305Hossein Rajaby Faghihi, MohammadAmin Fazli, Jafar Habibi. Hybrid Learning Approach Toward Situation Recognition and Handling
1306 -- 1319Debasish Pattanayak, Kaushik Mondal 0001, Partha Sarathi Mandal 0001, Stefan Schmid 0001. Area Convergence of Monoculus Robots With Additional Capabilities
1320 -- 1337Wenfa Qi, Sirui Guo, Yuxin Liu 0005, Xiang Wang 0009, Zongming Guo. Research on Reversible Visible Watermarking Algorithms Based on Vectorization Compression Method
1338 -- 1351Venkata Vara Prasad, Srinivas Gumparthi, Lokeswari Y. Venkataramana, S. Srinethe, R. M. Sruthi Sree, K. Nishanthi. Prediction of Stock Prices Using Statistical and Machine Learning Models: A Comparative Analysis
1352 -- 0Felix M. Philip, Jayakrishnan V, Ajesh F, Haseena P. Corrigendum to: Video Anomaly Detection Using the Optimization-Enabled Deep Convolutional Neural Network

Volume 65, Issue 4

757 -- 772Anil B. Gavade, Vijay S. Rajpurohit. S-DolLion-MSVNN: A Hybrid Model for Developing the Super-Resolution Image From the Multispectral Satellite Image
773 -- 787David Oro, Carles Fernández, Xavier Martorell, Javier Hernando. Work-Efficient Parallel Non-Maximum Suppression Kernels
788 -- 804Amin Rezaeipanah, Gholamreza Ahmadi. Breast Cancer Diagnosis Using Multi-Stage Weight Adjustment In The MLP Neural Network
805 -- 817Nitesh Pradhan, Vijaypal Singh Dhaka, Geeta Rani, Himanshu Chaudhary. Machine Learning Model for Multi-View Visualization of Medical Images
818 -- 830Luoyang Xue, Ang Xu, Qirong Mao, Lijian Gao, Jie Chen 0069. Weakly Supervised Sentiment-Specific Region Discovery for VSA
831 -- 842Muralidhar Pantula, K. S. Kuppusamy. A Machine Learning-Based Model to Evaluate Readability and Assess Grade Level for the Web Pages
843 -- 857Ravindra Kumar Singh 0001, Harsh Kumar Verma. Redis-Based Messaging Queue and Cache-Enabled Parallel Processing Social Media Analytics Framework
858 -- 873Yang Li, Heli Sun, Liang He, Jianbin Huang, Jiyin Chen, Hui He, Xiaolin Jia. Querying Tenuous Group in Attributed Networks
874 -- 889ChunLin Li, Yihan Zhang, Xiaomei Qu, Youlong Luo. Cost- and Time-Based Data Deployment for Improving Scheduling Efficiency in Distributed Clouds
890 -- 896Liqiong Xu, Litao Guo. Analysis on the Component Connectivity of Enhanced Hypercubes
897 -- 917Thamba Meshach W, Hemajothi S, E. A. Mary Anita. Smart Affect Recognition System for Real-Time Biometric Surveillance Using Hybrid Features and Multilayered Binary Structured Support Vector Machine
918 -- 925Khalid Masood, Muhammad Adnan Khan, Usman Saeed, Mohammad A. Alghamdi, Muhammad Asif 0010, Muhammad Arfan. Semantic Analysis to Identify Students' Feedback
926 -- 939Amita Jain, Kanika Mittal, Kunwar Singh Vaisla. FLAKE: Fuzzy Graph Centrality-based Automatic Keyword Extraction
940 -- 972Muhammad Sajid, Nouman Ali, Naeem Iqbal Ratyal, Muhammad Usman, Faisal Mehmood Butt, Imran Riaz, Usman Musaddiq, Mirza Jabbar Aziz Baig, Shahbaz Baig, Umair Ahmad Salaria. Deep Learning in Age-invariant Face Recognition: A Comparative Study
973 -- 982José Wagner de Andrade Júnior, Rodrigo Duarte Seabra. Fully Retroactive Minimum Spanning Tree Problem
983 -- 996Abhishek Kashyap, B. Suresh, Hariom Gupta. Robust Detection of Copy-Move Forgery Based on Wavelet Decomposition and Firefly Algorithm
997 -- 1005Doaa Wagdy Trabay, Ibrahim M. El-Henawy, Wajeb Gharibi. A Trust Framework Utilization in Cloud Computing Environment Based on Multi-criteria Decision-Making Methods
1006 -- 1019Xiao Lin, Zhi-jie Wang, Lizhuang Ma, Renjie Li, Mei-E. Fang. Salient Object Detection Based on Multiscale Segmentation and Fuzzy Broad Learning
1020 -- 1028Shimin Li, Xin Wang, Rui Xue 0001. Toward Both Privacy and Efficiency of Homomorphic MACs for Polynomial Functions and Its Applications
1029 -- 1052Katukuri Arun Kumar, Ravi Boda. A Multi-Objective Randomly Updated Beetle Swarm and Multi-Verse Optimization for Brain Tumor Segmentation and Classification

Volume 65, Issue 3

457 -- 472Aqib Mumtaz, Allah Bux Sargano, Zulfiqar Habib. Fast Learning Through Deep Multi-Net CNN Model For Violence Recognition In Video Surveillance
473 -- 483Alev Mutlu, Furkan Göz. SkySlide: A Hybrid Method for Landslide Susceptibility Assessment based on Landslide-Occurring Data Only
484 -- 494Sagheer Abbas, Muhammad Adnan Khan, Atifa Athar, Syed Ali Shan, Anwar Saeed, Tahir Alyas. Enabling Smart City With Intelligent Congestion Control Using Hops With a Hybrid Computational Approach
495 -- 515Omid Davoodi, Mehrdad Ashtiani, Morteza Rajabi. An Approach for the Evaluation and Correction of Manually Designed Video Game Levels Using Deep Neural Networks
516 -- 536Hager Kammoun, Imen Gabsi, Ikram Amous. MeSH-Based Semantic Indexing Approach to Enhance Biomedical Information Retrieval
537 -- 553Kai Zhang, Yuan Zhou 0001, Zheng Chen, Yufei Liu, Zhuo Tang, Li Yin, Jihong Chen. Incorporating Biterm Correlation Knowledge into Topic Modeling for Short Texts
554 -- 572Yu Yang, Beifang Chen, Guoping Zhang, Yongming Li, Daoqiang Sun, Hongbo Liu. Algorithms Based on Path Contraction Carrying Weights for Enumerating Subtrees of Tricyclic Graphs
573 -- 588Jianbin Huang, Heli Sun, He Li 0006, Longji Huang, Ao Li, Xiangyu Wang. Central Station-Based Demand Prediction for Determining Target Inventory in a Bike-Sharing System
589 -- 605Yanze Huang, Limei Lin, Li Xu 0002. Subgraph Reliability of Alternating Group Graph With Uniform and Nonuniform Vertex Fault-Free Probabilities
606 -- 620Anass Nouri, Christophe Charrier, Olivier Lézoray. A Genetically Based Combination of Visual Saliency and Roughness for FR 3D Mesh Quality Assessment: A Statistical Study
621 -- 630Xiaoying Sun, Chen Zhang, Guohong Liu. Improved Tactile Perception of 3D Geometric Bumps Using Coupled Electrovibration and Mechanical Vibration Stimuli
631 -- 654Sukhmani K. Thethi, Ravi Kumar. Dynamic Frequency Scaling of a Single-Core Processor Using Machine Learning Paradigms
655 -- 666Tamil Selvi M, Jaison B. Lemuria: A Novel Future Crop Prediction Algorithm Using Data Mining
667 -- 678Andrew Larkin, Perry Hystad. Integrating Geospatial Data and Social Media in Bidirectional Long-Short Term Memory Models to Capture Human Nature Interactions
679 -- 688Yiqin Luo, Yanpeng Sun, Liang Chang 0003, Tianlong Gu, Chenzhong Bin, Long Li 0005. Considering Fine-Grained and Coarse-Grained Information for Context-Aware Recommendations
689 -- 700Runze Yang, Jian Song, Baoqi Huang, Wuyungerile Li, Guodong Qi. An Energy-Efficient Step-Counting Algorithm for Smartphones
701 -- 717M. KrishnaSiva Prasad, Poonam Sharma. Similarity of Sentences With Contradiction Using Semantic Similarity Measures
718 -- 735Kyriakos Georgiou, Zbigniew Chamski, Andrés Amaya García, David May 0001, Kerstin Eder. Lost In Translation: Exposing Hidden Compiler Optimization Opportunities
736 -- 755Adel Alti, Lamri Laouamer. Agent-Based Autonomic Semantic Context-Aware Platform for Smart Health Monitoring and Disease Detection

Volume 65, Issue 2

155 -- 176Syed Saqib Ali Kazmi, Mehreen Ahmed, Rafia Mumtaz, Zahid Anwar. Spatiotemporal Clustering and Analysis of Road Accident Hotspots by Exploiting GIS Technology and Kernel Density Estimation
177 -- 191Lei Wang, Qing Qian, Qiang Zhang, Jishuai Wang, Wenbo Cheng, Wei Yan. Classification Model on Big Data in Medical Diagnosis Based on Semi-Supervised Learning
192 -- 202Imen Touati, Mariem Ellouze, Marwa Graja, Lamia Hadrich Belguith. Appraisal of Two Arabic Opinion Summarization Methods: Statistical Versus Machine Learning
203 -- 216Xinpeng Zhang, Jigang Wu, Min Meng. Small Target Recognition Using Dynamic Time Warping and Visual Attention
217 -- 236Ping-Chi Hsieh, Der-Juinn Horng, Hong-Yi Chang. International Expansion Selection Model by Machine Learning - A Proprietary Model
237 -- 250Safia Naveed, Geetha G, Leninisha S. Early Diabetes Discovery From Tongue Images
251 -- 260Xia-an Bi, Hao Wu, Xi Hu, Yu Fu, Shaoliang Peng. Clustering-Evolutionary Random Support Vector Machine Ensemble for fMRI-Based Asperger Syndrome Diagnosis
261 -- 274Qinglong Wang, Xiaoying Sun, Dekun Cao, Guohong Liu. Enhanced Interactive Performance of Zoom-In/Out Gestures Using Electrostatic Tactile Feedback on Touchscreens
275 -- 296R. Geetha, S. Karthika, Ponnurangam Kumaraguru. 'Will I Regret for This Tweet?' - Twitter User's Behavior Analysis System for Private Data Disclosure
297 -- 309Zolfaghar Salmanian, Habib Izadkhah, Ayaz Isazadeh. Auto-Scale Resource Provisioning In IaaS Clouds
310 -- 330Patrick Erik Bradley, Markus Wilhelm Jahn. On the Behaviour of p -Adic Scaled Space Filling Curve Indices for High-Dimensional Data
331 -- 344Syed Saqib Raza Rizvi, Muhammad Adnan Khan, Sagheer Abbas, Muhammad AsadUllah, Nida Anwer, Areej Fatima. Deep Extreme Learning Machine-Based Optical Character Recognition System for Nastalique Urdu-Like Script Languages
345 -- 354S. Hasanzadeh, S. M. Fakhrahmad, M. Taheri. Review-Based Recommender Systems: A Proposed Rating Prediction Scheme Using Word Embedding Representation of Reviews
355 -- 370Shitala Prasad, Tingting Chai. Palmprint for Individual's Personality Behavior Analysis
371 -- 381Dong Xu, Wei Dong, Han Zhou. Sclera Recognition Based on Efficient Sclera Segmentation and Significant Vessel Matching
382 -- 395M. Gokuldhev, G. Singaravel. Local Pollination-Based Moth Search Algorithm for Task-Scheduling Heterogeneous Cloud Environment
396 -- 409Negin Manshouri, Mesut Melek, Temel Kayikçioglu. Detection of 2D and 3D Video Transitions Based on EEG Power
410 -- 422Wangli Hao, Meng Han, Shancang Li, Fuzhong Li. An Attention Enhanced Cross-Modal Image-Sound Mutual Generation Model for Birds
423 -- 435Anwer Mustafa Hilal, Fahd N. Al-Wesabi, Abdelzahir Abdelmaboud, Manar Ahmed Hamza, Mohammad Mahzari, Abdulkhaleq Q. A. Hassan. A Hybrid Intelligent Text Watermarking and Natural Language Processing Approach for Transferring and Receiving an Authentic English Text Via Internet
436 -- 455P. Suthanthiradevi, S. Karthika. Rumor Identification and Verification for Text in Social Media Content

Volume 65, Issue 12

2979 -- 2990Yifeng Wang, Baolei Cheng, Jianxi Fan, Yu Qian, Ruofan Jiang. An Algorithm to Construct Completely Independent Spanning Trees in Line Graphs
2991 -- 2997Lin Zhu, Wen Ming Li, Liang Feng Zhang. On the Modulus in Matching Vector Codes
2998 -- 3019Ha Thi Thu Doan, Kazuhiro Ogata 0001. Specifying and Model Checking Distributed Control Algorithms at Meta-level
3020 -- 3034Gongxian Zeng, Meiqi He, Siu-Ming Yiu, Zhengan Huang. A Self-Tallying Electronic Voting Based on Blockchain
3035 -- 3048Alan Ramírez-Noriega, Reyes Juárez-Ramírez, Juan Carlos Leyva López, Samantha Jiménez, J. Francisco Figueroa Pérez. A Method for Building the Quantitative and Qualitative Part of Bayesian Networks for Intelligent Tutoring Systems
3049 -- 3061Parvin Rastegari, Willy Susilo. On Random-Oracle-Free Top-Level Secure Certificateless Signature Schemes
3062 -- 3080Mingjiang Huang, Zhen Xu, Liming Wang. On the Probability and Automatic Search of Rotational-XOR Cryptanalysis on ARX Ciphers
3081 -- 3090Pham The Bao, Tran Anh Tuan 0002, Tran Anh Tuan, Le Nhi Lam Thuy, Jin Young Kim 0002, João Manuel R. S. Tavares. White Matter, Gray Matter and Cerebrospinal Fluid Segmentation from Brain Magnetic Resonance Imaging Using Adaptive U-Net and Local Convolutional Neural Network
3091 -- 3099Mabin Joseph, Gautham Sekar, R. Balasubramanian, G. Venkiteswaran. On the Security of the Stream Ciphers RCR-64 and RCR-32
3100 -- 3105Wenbin Chen, Jianer Chen. ℓ∞-Norm Revisited
3106 -- 3122Zhiyao Li, Siru Ouyang, Xiaofeng Gao 0001, Guihai Chen. Two-Hop Relay Deployment Based on User Trajectory in Wireless Networks
3123 -- 3140Ehsan Ataie, Athanasia Evangelinou, Eugenio Gianniti, Danilo Ardagna. A Hybrid Machine Learning Approach for Performance Modeling of Cloud-Based Big Data Applications
3141 -- 3155Qi Bao, Wanyue Xu, Zhongzhi Zhang. Benchmark for Discriminating Power of Edge Centrality Metrics
3156 -- 3166Lina Ba, Heping Zhang. The Star-Structure Connectivity and Star-Substructure Connectivity of Hypercubes and Folded Hypercubes
3167 -- 3180Satyala Narayana, Suresh Babu Chandanapalli, Mekala Srinivasa Rao, Kalyanapu Srinivas. Ant Cat Swarm Optimization-Enabled Deep Recurrent Neural Network for Big Data Classification Based on Map Reduce Framework
3181 -- 3198Mohan Kumar Chandol, M. Kameswara Rao. Border Collie Cat Optimization for Intrusion Detection System in Healthcare IoT Network Using Deep Recurrent Neural Network
3199 -- 3208Yi Yi, Jianxi Fan, Baolei Cheng, Yan Wang 0078, Jia Yu. The 3-Extra Connectivity of the Data Center Network BCube
3209 -- 3222Pooja Shashank Pol, Vinod Keshaorao Pachghare. Quality of Service Estimation Enabled With Trust-Based Resource Allocation in Collaborative Cloud Using Improved Grey Wolf Optimization
3223 -- 3239Fucai Luo, Saif Al-Kuwari, Changlu Lin, Fuqun Wang, Kefei Chen. Provable Data Possession Schemes from Standard Lattices for Cloud Computing
3240 -- 3249Muthukumaran Vijayakarthick, Eganathan Sivaraman, Santhanam Sathishbabu, Natarajan Vinoth, S. N. Sivaraj. Modelling and Predictive Analytics of COVID-19 Transmission Using Gustafson-Kessel Fuzzy Clustering Approach
3250 -- 3264Ganesan Sornavalli, Angelin Gladston, Harichandran Khanna Nehemiah. Intelligent Forecast of Stock Markets to Handle COVID-19 Economic Crisis by Modified Generative Adversarial Networks
3265 -- 3274S. Arul Antran Vijay, V. Jothi Prakash. A Modified Firefly Deep Ensemble for Microarray Data Classification

Volume 65, Issue 11

2847 -- 2848Honghao Gao, Zhiyuan Tan 0001. Special Issue on Adversarial AI to IoT Security and Privacy Protection: Attacks and Defenses
2849 -- 2859Zhuo Lv, Hongbo Cao, Feng Zhang, Yuange Ren, Bin Wang, Cen Chen, Nuannuan Li, Hao Chang, Wei Wang 0012. AWFC: Preventing Label Flipping Attacks Towards Federated Learning for Intelligent IoT
2860 -- 2869Qingkui Zeng, LiWen Zhou, Zhuotao Lian, Huakun Huang, Jung-Yoon Kim. Privacy-Enhanced Federated Generative Adversarial Networks for Internet of Things
2870 -- 2879Jin Cao, Liwei Lin, Ruhui Ma, Haibing Guan, Mengke Tian, Yong Wang. An Efficient Deep Learning Approach To IoT Intrusion Detection
2880 -- 2893Yan Liu, Haisheng Yu 0001, Wenyong Wang, Sai Zou, Dong Liu, Daobiao Gong, Zhen Li. A Robust Blockchain-Based Distribution Master For Distributing Root Zone Data In DNS
2894 -- 2908Zhaodi Zhang, Jing Liu, Min Zhang, Haiying Sun. Efficient Robustness Verification of the Deep Neural Networks for Smart IoT Devices
2909 -- 2925Peng Chen, Hongyun Liu, Ruyue Xin, Thierry Carval, Jiale Zhao, Yunni Xia, Zhiming Zhao. Effectively Detecting Operational Anomalies In Large-Scale IoT Data Infrastructures By Using A GAN-Based Predictive Model
2926 -- 2938Minxian Wang, Zijian Zhang 0001, Jialing He, Feng Gao, Meng Li 0006, Shubin Xu, Liehuang Zhu. Practical Blockchain-Based Steganographic Communication Via Adversarial AI: A Case Study In Bitcoin
2939 -- 2952Jiawei Wu, Huangfei Cheng, Bin Cao 0004, Jiaxing Wang, Jing Fan. ASCUE: An Adversarial Network-Based Semantical Conformance Checking Method for Unsupervised Event Extraction in Social Internet of Things
2953 -- 2968Peng Zhang 0060, Baoxi Liu, Tun Lu, Hansu Gu, Xianghua Ding, Ning Gu. A Semantic Embedding Enhanced Topic Model For User-Generated Textual Content Modeling In Social Ecosystems
2969 -- 2978Zhaoxi Zhang, Leo Yu Zhang, Xufei Zheng, Bilal Hussain Abbasi, Shengshan Hu. Evaluating Membership Inference Through Adversarial Robustness

Volume 65, Issue 10

2547 -- 2569Rajalakshmi Shenbaga Moorthy, P. Pabitha. Accelerating Analytics Using Improved Binary Particle Swarm Optimization for Discrete Feature Selection
2570 -- 2588Binanda Sengupta, Yingjiu Li, Yangguang Tian, Robert H. Deng, Zheng Yang. Policy-Based Editing-Enabled Signatures: Authenticating Fine-Grained and Restricted Data Modification
2589 -- 2609Muhammad Inaam Ul Haq, Qianmu Li, Jun Hou 0002. Analyzing the Research Trends of IoT Using Topic Modeling
2610 -- 2614Michael H. Albert, Vincent Vatter. How Many Pop-Stacks Does It Take To Sort A Permutation?
2615 -- 2630Zhiyao Li, Wei Liu, Xiaofeng Gao 0001, Guihai Chen. Friends-Based Crowdsourcing: Algorithms For Task Dissemination Over Social Groups
2631 -- 2640Elif Ustundag Soykan, Leyli Karaçay, Zeki Bilgin, Emrah Tomur, Mehmet Akif Ersoy, Ferhat Karakoç, Pinar Çomak. Context-Aware Authentication with Dynamic Credentials using Electricity Consumption Data
2641 -- 2653Mohsen Salehi, Jafar Razmara, Shahriar Lotfi, Farnaz Mahan. A One-Dimensional Probabilistic Convolutional Neural Network for Prediction of Breast Cancer Survivability
2654 -- 2663Mehmet Akif Bülbül, Celal Öztürk, Mehmet Fatih Isik. Optimization of Climatic Conditions Affecting Determination of the Amount of Water Needed by Plants in Relation to Their Life Cycle with Particle Swarm Optimization, and Determining the Optimum Irrigation Schedule
2664 -- 2677Shefali Gupta, Ankit Goel, Meenu Dave. Tunicate Swarm Magnetic Optimization With Deep Convolution Neural Network For Collaborative Filter Recommendation
2678 -- 2692S. Guruvammal, T. Chellatamilan, L. Jegatha Deborah. Automatic Detection of Autism in Young Children Using Weighted Logarithmic Transformed Data with Optimized Deep Learning
2693 -- 2708Xiaoyang Liu, Xiang Li. A Social Network Link Prediction Method Based on Stacked Generalization
2709 -- 2719Pramod Ganapathi, Rezaul Chowdhury. Parallel Divide-and-Conquer Algorithms for Bubble Sort, Selection Sort and Insertion Sort
2720 -- 2729Yanzhao Shen, Ting Wu 0001, Gaoli Wang, Xinfeng Dong, Haifeng Qian. Improved Collision Detection Of MD5 Using Sufficient Condition Combination
2730 -- 2740Vikas Chaurasia, Saurabh Pal. Ensemble Technique to Predict Breast Cancer on Multiple Dataset
2741 -- 2754Ayoub Lahmidi, Khalid Minaoui, Chouaib Moujahdi, Mohammed Rziza. Fingerprint Template Protection Using Irreversible Minutiae Tetrahedrons
2755 -- 2768María Magdalena Payeras Capellà, Macià Mut Puigserver, Miquel A. Cabot-Nadal, Llorenç Huguet i Rotger. Blockchain-Based Confidential Multiparty Contract Signing Protocol Without TTP Using Elliptic Curve Cryptography
2769 -- 2779Milad Seddigh, Hadi Soleimany. Flush+Reload Attacks on SEED
2780 -- 2800Amel Mammar, Lazhar Hamel, Mohamed Graiet. An Event-B-Based Approach to Model and Verify Behaviors for Component-Based Applications
2801 -- 2814Sohei Ito, Kenji Osari, Masaya Shimakawa, Shigeki Hagihara, Naoki Yonezaki. Efficient Realizability Checking by Modularization of LTL Specifications
2815 -- 2827Muhammad Asif, Maaz Bin Ahmad, Shiza Mushtaq, Khalid Masood, Toqeer Mahmood, Arfan Ali Nagra. Long Multi-digit Number Recognition from Images Empowered by Deep Convolutional Neural Networks
2828 -- 2844Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo, Yu-Chi Chen. Public-Key Authenticated Encryption with Keyword Search: A Generic Construction and Its Quantum-Resistant Instantiation
2845 -- 0M. KrishnaSiva Prasad, Poonam Sharma. Corrigendum to: Similarity of Sentences With Contradiction Using Semantic Similarity Measures
2846 -- 0Binlin Cheng, Jinjun Liu, Jiejie Chen, Shudong Shi, Xufu Peng, Xingwen Zhang, Haiqing Hai. Erratum to: MoG: Behavior-Obfuscation Resistance Malware Detection

Volume 65, Issue 1

1 -- 17Biswajit Biswas, Swarup Kr Ghosh, Moumita Hore, Anupam Ghosh. SIFT-Based Visual Tracking using Optical Flow and Belief Propagation Algorithm
18 -- 66Amjad Osmani, Jamshid Bagherzadeh Mohasefi, Farhad Soleimanian Gharehchopogh. Sentiment Classification Using Two Effective Optimization Methods Derived From The Artificial Bee Colony Optimization And Imperialist Competitive Algorithm
67 -- 79Sandeep Kumar Sood, Vaishali Sood, Isha Mahajan, Sahil 0001. Fog-Cloud Assisted IoT-Based Hierarchical Approach For Controlling Dengue Infection
80 -- 90Mala Saraswat, Shampa Chakraverty. Enriching Topic Coherence on Reviews for Cross-Domain Recommendation
91 -- 104Mohammed Zubair M. Shamim, Sadatullah Syed, Mohammad Shiblee, Mohammed Usman, Syed Jaffar Ali, Hany S. Hussein, Mohammed Farrag. Automated Detection of Oral Pre-Cancerous Tongue Lesions Using Deep Learning for Early Diagnosis of Oral Cavity Cancer
105 -- 123Qasem Qananwah, Ali Mohammad Alqudah, Moh'd Alodat, Ahmad Dagamseh, Oliver Hayden. Detecting Cognitive Features of Videos Using EEG Signal
124 -- 138Arjun Puri, Manoj Kumar Gupta. Improved Hybrid Bag-Boost Ensemble With K-Means-SMOTE-ENN Technique for Handling Noisy Class Imbalanced Data
139 -- 154Akshma Chadha, Baijnath Kaushik. Performance Evaluation of Learning Models for Identification of Suicidal Thoughts