1653 | -- | 1665 | Fei Zhu, Xun Yi, Alsharif Abuadbba, Ibrahim Khalil, Surya Nepal, Xinyi Huang 0001. Forward-Secure Edge Authentication for Graphs |
1666 | -- | 1678 | Faisal Khurshid, Yan Zhu 0007, Jie Hu, Muqeet Ahmad, Mushtaq Ahmad. Battering Review Spam Through Ensemble Learning in Imbalanced Datasets |
1679 | -- | 1691 | Jiang Che, Wanyue Xu, Xiaotian Zhou, Zhongzhi Zhang, Haibin Kan. Some Combinatorial Problems in Power-Law Graphs |
1692 | -- | 1701 | Jianchang Lai, Xinyi Huang 0001, Debiao He, Wei Wu 0001. Provably Secure Online/Offline Identity-Based Signature Scheme Based on SM9 |
1702 | -- | 1716 | Intissar Khalifa, Ridha Ejbali, Raimondo Schettini, Mourad Zaied. Deep Multi-Stage Approach For Emotional Body Gesture Recognition In Job Interview |
1717 | -- | 1725 | M. Ramchandran, E. N. Ganesh. MBSO Algorithm For Handling Energy-Throughput Trade-Off In Cognitive Radio Networks |
1726 | -- | 1739 | Hao Wang, Huan Wang. Differentially Private Publication For Correlated Non-Numerical Data |
1740 | -- | 1751 | Talha Mahboob Alam, Kamran Shaukat, Haris Mahboob, Muhammad Umer Sarwar, Farhat Iqbal, Adeel Nasir, Ibrahim A. Hameed, Suhuai Luo. A Machine Learning Approach for Identification of Malignant Mesothelioma Etiological Factors in an Imbalanced Dataset |
1752 | -- | 1759 | G. S. Smrithy, Ramadoss Balakrishnan. A Statistical-Based Light-Weight Anomaly Detection Framework for Wireless Body Area Networks |
1760 | -- | 1775 | Wenzheng Zhang, Zirui Qiao, Bo Yang 0003, Yanwei Zhou, Mingwu Zhang. Continuous Leakage-Amplified Public-Key Encryption With CCA Security |
1776 | -- | 1786 | Siyuan Chen, Peng Zeng 0002, Kim-Kwang Raymond Choo. A New Code-Based Blind Signature Scheme |
1787 | -- | 1794 | Suliman Mohamed Fati. Detecting Cyberbullying across Social Media Platforms in Saudi Arabia Using Sentiment Analysis: A Case Study |
1795 | -- | 1811 | Antony Jaya Mabel Rani, Albert Pravin. Optimization Enabled Black Hole Entropic Fuzzy Clustering Approach for Medical Data |
1812 | -- | 1825 | T. Daniya, S. Vigneshwari. Deep Neural Network for Disease Detection in Rice Plant Using the Texture and Deep Features |
1826 | -- | 1845 | Shujiao Cao, Rui Xue. The (Im)Possibility on Constructing Verifiable Random Functions |
1846 | -- | 1859 | Yanbo Wang, Fasheng Wang, Chang Wang, Fuming Sun, Jianjun He. Learning Saliency-Aware Correlation Filters for Visual Tracking |
1860 | -- | 1873 | Pradeep Krishnadoss, L. Javid Ali, Gobalakrishnan Natesan, C. J. Raman, Manikandan Nanjappan. CWOA: Hybrid Approach for Task Scheduling in Cloud Environment |
1874 | -- | 1890 | Shiying Wang, Xiaolei Ma. The Matching Preclusion of Enhanced Hypercubes |
1891 | -- | 1903 | Maximiliano Cristiá, Ricardo D. Katz, Gianfranco Rossi. Proof Automation in the Theory of Finite Sets and Finite Set Relation Algebra |
1904 | -- | 1922 | Lavanya Ravala, Rajini G. K. Automatic Diagnosis of Diabetic Retinopathy from Retinal Abnormalities: Improved Jaya-Based Feature Selection and Recurrent Neural Network |
1923 | -- | 1936 | V. Betcy Thanga Shoba, I. Shatheesh Sam. Aging Facial Recognition for Feature Extraction Using Adaptive Fully Recurrent Deep Neural Learning |
1937 | -- | 0 | Yonghong Hou, Lin Xue, Shuo Li 0003, Jiaming Xing. Corrigendum: User-Experience-Oriented Fuzzy Logic Controller for Adaptive Streaming |
1938 | -- | 0 | Juan Li, Dandan Xiao, Ting Zhang, Chun Liu, Yuan-xiang Li, Gaige Wang. Q-Learning Model |