Journal: Comput. J.

Volume 66, Issue 9

2077 -- 2101Kaiju Li, Hao Wang. Federated Learning Communication-Efficiency Framework via Corset Construction
2102 -- 2117Zaki Brahmi, Afef Selmi. Coordinate System-Based Trust-Aware Web Services Composition in Edge and Cloud Environment
2118 -- 2122Yayu Yang, Mingzu Zhang, Jixiang Meng, Rongda Chen. a-average Degree Edge-Connectivity of Bijective Connection Networks
2123 -- 2137Marriam Daud, Ali Afzal Malik. Construction and Validation of Early Software Size Estimation Models Based on ADAF-Adjusted ACD Metrics
2138 -- 2154Xiaoyang Liu 0001, Shanghong Dai, Giacomo Fiumara, Pasquale De Meo. Target-specific sentiment analysis method combining word-masking data enhancement and adversarial learning
2155 -- 2168Zhenhua Chen, Jingjing Nie, Zhanli Li, Chunpeng Ge, Willy Susilo. Geometric Searchable Encryption Without False Positive And Its Applications
2169 -- 2180Talha Mahboob Alam, Kamran Shaukat, Adel Khelifi, Hanan Aljuaid, Malaika Shafqat, Usama Ahmed, Sadeem Ahmad Nafees, Suhuai Luo. A Fuzzy Inference-Based Decision Support System for Disease Diagnosis
2181 -- 2190Aleksandr S. Tvardovskii, Nina Yevtushenko 0001. Deriving homing sequences for Finite State Machines with timeouts
2191 -- 2207B. Mathan Kumar, Bharati S. Ainapure, Suryabhan Pratap Singh, Sumit Vyas. Feature Extraction Based Deep Indexing by Deep Fuzzy Clustering for Image Retrieval Using Jaro Winkler Distance
2208 -- 2219Talal H. Noor. Behavior Analysis-Based IoT Services For Crowd Management
2220 -- 2229Xiao Zeng, Guowu Yang, Xiaoyu Song, Marek A. Perkowski, Gang Chen. Detecting Affine Equivalence Of Boolean Functions And Circuit Transformation
2230 -- 2253Michael Simpson 0001, Venkatesh Srinivasan 0001, Alex Thomo. Scalable Misinformation Mitigation in Social Networks Using Reverse Sampling
2254 -- 2264Parul Tomar, Gyanendra Kumar, Lal Pratap Verma. Path-Rank-Based Data Chunk Scheduling for Concurrent Multipath Transmission
2265 -- 2278Zhe Jiang, Kai Zhang 0016, Liangliang Wang, Jianting Ning. Forward Secure Public-key Authenticated Encryption with Conjunctive Keyword Search
2279 -- 2295Yaqi Xu, Baofeng Wu, Dongdai Lin. New Strategies To Improve Differential-Linear Attacks With Applications To Chaskey
2296 -- 2316Wided Selmi, Hager Kammoun, Ikram Amous. Semantic-Based Hybrid Query Reformulation for Biomedical Information Retrieval
2317 -- 2328Gokhan Ozogur, Mehmet Ali Ertürk, Gulsum Zeynep Gurkas Aydin, Muhammed Ali Aydin. Android Malware Detection in Bytecode Level Using TF-IDF and XGBoost
2329 -- 0. Correction to: Learning Disjunctive Multiplicity Expressions and Disjunctive Generalize Multiplicity Expressions From Both Positive and Negative Examples

Volume 66, Issue 8

1817 -- 1828Jianen Yan, Haiyan Xu 0004, Ning Li 0003, Zhaoxin Zhang. Large-Scale Emulation Network Topology Partition Based on Community Detection With the Weight of Vertex Similarity
1829 -- 1839Guoying Sun, Feng Ye, Tingting Chai, Zhaoxin Zhang, Xiaojun Tong, Shitala Prasad. Gambling Domain Name Recognition via Certificate and Textual Analysis
1840 -- 1855Fareeha Rasheed, Abdul Wahid. An Unobtrusive Approach to Emotion Detection in E-Learning Systems
1856 -- 1869Rafiul Haq, Xiaowang Zhang, Wahab Khan, Zhiyong Feng. Urdu Named Entity Recognition System Using Deep Learning Approaches
1870 -- 1881Zhongkun Yu, Junfeng Wang 0003, Binhui Tang, Li Lu. Tactics And Techniques Classification In Cyber Threat Intelligence
1882 -- 1892Zhang Long, Jinsong Wang. Network Traffic Classification Based On A Deep Learning Approach Using NetFlow Data
1893 -- 1912Pawan Meena, Mahesh Kumar Pawar, Anjana Pandey. Comparative Analysis of Overlap Community Detection Techniques on Social Media Platform
1913 -- 1921Yunxia Ren, Shiying Wang. The Local Diagnosability of a Class of Cayley Graphs with Conditional Faulty Edges Under the PMC Model
1922 -- 1935Mingzhe Zhu, Wanyue Xu, Zhongzhi Zhang, Haibin Kan, Guanrong Chen. Resistance Distances In Simplicial Networks
1936 -- 1948Saleh Albahli, Waleed Albattah. Crime Type Prediction in Saudi Arabia Based on Intelligence Gathering
1949 -- 1964J. C. Smitha, Ambily Jane, Lekshmi Chandran. 3D Flattering Amplified Neural Network-Based Segmentation of Amygdala and Hippocampus
1965 -- 1981Hui Dong, Jianxi Fan, Baolei Cheng, Yan Wang 0078, Li Xu. Hamiltonian Properties of the Data Center Network HSDC with Faulty Elements
1982 -- 1999Manisha Kumawat, Arti Khaparde. Development of Adaptive Time-Weighted Dynamic Time Warping for Time Series Vegetation Classification Using Satellite Images in Solapur District
2000 -- 2010Chen Guo 0005, Qiuming Liu, Zhifang Xiao, Shuo Peng. The Diagnosability of Interconnection Networks with Missing Edges and Broken-Down Nodes Under the PMC and MM* Models
2011 -- 2032Jaspreet Kaur, Prabhpreet Kaur. Automated Computer-Aided Diagnosis of Diabetic Retinopathy Based on Segmentation and Classification using K-nearest neighbor algorithm in retinal images
2033 -- 2042Xueli Sun, Jianxi Fan, Baolei Cheng, Jingya Zhou, Yan Wang 0078. Relationship Between Component Connectivity And Component Diagnosability Of Some Regular Networks
2043 -- 2058Abhishek Bhatt, Vandana Thakur. An Optimized Deep Belief Network for Land Cover Classification Using Synthetic-Aperture Radar Images and Landsat Images
2059 -- 2074Satish Muppidi, Kishore Bhamidipati, Sajeev Ram Arumugam 0001. SPDPOA: Student Psychology Dragonfly Political Optimizer Algorithm-Based Soil Moisture and Heat-Level Prediction for Plant Health Monitoring in Internet of Things
2075 -- 0. Correction to: Adaptive Laplacian Support Vector Machine for Semi-supervised Learning

Volume 66, Issue 7

1565 -- 1572Jan A. Bergstra, John V. Tucker. On The Axioms Of Common Meadows: Fracterm Calculus, Flattening And Incompleteness
1573 -- 1585Zhiruo Zhao, Lei Cao 0007, Xiliang Chen, Jun Lai, Legui Zhang. Improvement of MADRL Equilibrium Based on Pareto Optimization
1586 -- 1594Tiziana Calamoneri, Daniele Tavernelli. Modeling and Approximating the Visit of a Set of Sites With a Fleet of UAVs
1595 -- 1608Aravindkumar Sekar, Varalakshmi Perumal. A Novel SGD-U-Network-Based Pixel-Level Road Crack Segmentation and Classification
1609 -- 1621Lingyuan Yin, Jing Xu 0002, Zhenfeng Zhang. Interopera: An Efficient Cross-Chain Trading Protocol
1622 -- 1643Poongodi K, Dhananjay Kumar. Mining Frequent Serial Positioning Episode Rules with Forward and Backward Search Technique from Event Sequences
1644 -- 1663Anjushi Verma, Tirthankar Gayen. Reliability Assessment of Combined Hardware-Software Non-repairable Time-Critical Systems
1664 -- 1686Wanwan Zheng, Mingzhe Jin. Improving the Performance of Feature Selection Methods with Low-Sample-Size Data
1687 -- 1697Samer Kais Jameel, Jafar Majidpour, Abdulbasit K. Al-Talabani, Jihad Anwar Qadir. Face Identification Using Conditional Generative Adversarial Network
1698 -- 1716Elham Raisi Sarbizhan, Mohammad Mehdi Zahedi, Marzieh Shamsizadeh. L-graph Automata And Some Applications
1717 -- 1732Shiyou Xu, Jian Wang, Liangliang Wang. Indistinguishable Leakage-Resilient Circuit Compiler
1733 -- 1748Yeting Li, Haiming Chen, Zixuan Chen. Learning Disjunctive Multiplicity Expressions and Disjunctive Generalize Multiplicity Expressions From Both Positive and Negative Examples
1749 -- 1760Muath AlShaikh. A Novel Reduced Reference Image Quality Assessment Based on Formal Concept Analysis
1761 -- 1776He Li 0006, Yanna Liu, Shuqi Yang, Yishuai Lin, Yi Yang, Jaesoo Yoo. An Improved Hill Climbing Algorithm for Graph Partitioning
1777 -- 1783Muhammad Umar Nasir, Urva Rehmat, Imran Ahmad. Social Media Analysis of Customer Emotions in Pizza Industry
1784 -- 1801Veluguri Sureshkumar, Rajasomashekar Somarajadikshitar, B. Sarala Beeram. A Novel Representation and Prediction Initiative for Underground Water by Using Deep Learning Technique of Remote Sensing Images
1802 -- 1816Diego Teijeiro, Margarita Amor, Ramón Doallo, David Deibe. Interactive Visualization of Large Point Clouds Using an Autotuning Multiresolution Out-Of-Core Strategy

Volume 66, Issue 6

1311 -- 0Tomer Ashur, Chris J. Mitchell. Special Issue on Failed Approaches and Insightful Losses in Cryptology - Foreword
1312 -- 1319Tomer Ashur, Mohammad Mahzoun, Dilara Toprakhisar. How Not To Design An Efficient FHE-Friendly Block Cipher: Seljuk
1320 -- 1334Nina Bindel, Sarah McCarthy. The Need for Being Explicit: Failed Attempts to Construct Implicit Certificates from Lattices
1335 -- 1341Chitchanok Chuengsatiansup, Eyal Ronen, Gregory G. Rose, Yuval Yarom. Row, Row, Row Your Boat: How to Not Find Weak Keys in Pilsung
1342 -- 1349Daniel Shumow. Incorrectly Generated RSA Keys: How I Learned To Stop Worrying And Recover Lost Plaintexts
1350 -- 1365Satish Muppidi, Om Prakash P. G, B. Kishore. Dragonfly Political Optimizer Algorithm-Based Rider Deep Long Short-Term Memory for Soil Moisture and Heat Level Prediction in IoT
1366 -- 1375Hieu Minh Truong, Hieu Trung Huynh. A Novel Approach For CT-Based COVID-19 Classification and Lesion Segmentation Based On Deep Learning
1376 -- 1399Shichang Wang, Meicheng Liu, Dongdai Lin, Li Ma. On Grain-Like Small State Stream Ciphers Against Fast Correlation Attacks: Cryptanalysis of Plantlet, Fruit-v2 and Fruit-80
1400 -- 1418Shusen Wu, Xiaoshe Dong, Heng Chen 0002, Longxiang Wang, Qiang Wang, Zhengdong Zhu. Simplified High Level Parallelism Expression on Heterogeneous Systems through Data Partition Pattern Description
1419 -- 1433Yi Chen, Yantian Shen, Hongbo Yu, Sitong Yuan. A New Neural Distinguisher Considering Features Derived From Multiple Ciphertext Pairs
1434 -- 1451Hailong Zhang 0001, Wei Yang. Template Attack Assisted Linear Cryptanalysis on Outer Rounds Protected DES Implementations
1452 -- 1476Hisaki Kobayashi, Yuichi Sudo, Hirotsugu Kakugawa, Toshimitsu Masuzawa. A Self-Stabilizing Distributed Algorithm for the Generalized Dominating Set Problem With Safe Convergence
1477 -- 1506Damian Arellanes, Kung-Kiu Lau, Rizos Sakellariou. Decentralized Data Flows for the Functional Scalability of Service-Oriented IoT Systems
1507 -- 1524Ti Wang, Yongbin Zhou, Hui Ma 0002, Rui Zhang. Flexible and Controllable Access Policy Update for Encrypted Data Sharing in the Cloud
1525 -- 1540Sinam Ajitkumar Singh, Ningthoujam Dinita Devi, Swanirbhar Majumder. An Improved Unsegmented Phonocardiogram Classification Using Nonlinear Time Scattering Features
1541 -- 1548Ahmet Gökçen, Alkim Gokcen, Savas Sahin. Prediction of Li-Ion Battery Discharge Patterns in IoT Devices Under Random Use Via Machine Learning Algorithms
1549 -- 1562Pravin Narayan Kathavate. Role of Machine Learning on Key Extraction for Data Privacy Preservation of Health Care Sectors in IoT Environment
1563 -- 0. Corrigendum to: IoT Data Quality Issues and Potential Solutions: A Literature Review
1564 -- 0. Corrigendum to: A Multi-Objective Randomly Updated Beetle Swarm and Multi-Verse Optimization for Brain Tumor Segmentation and Classification

Volume 66, Issue 5

1053 -- 1068Sudhin Chandran, R. Rajesh, M. Dev Anand. Laser Beam Welded Aluminum-Titanium Dissimilar Sheet Metals: Neural Network Based Strength and Hardness Prediction Model
1069 -- 1082Hao Guo, Zhiyu Zhang, Qianqian Yang, Lei Hu, Yiyuan Luo. A New Method To Find All The High-Probability Word-Oriented Truncated Differentials: Application To <tt>Midori</tt>, <tt>SKINNY</tt> And <tt>CRAFT</tt>
1083 -- 1101Md Abu Marjan, Md. Palash Uddin, Masud Ibn Afjal. An Educational Data Mining System For Predicting And Enhancing Tertiary Students' Programming Skill
1102 -- 1110Bin-Bin Cai, Yusen Wu, Jing Dong, Su-Juan Qin, Fei Gao 0001, Qiao-Yan Wen. Quantum Attacks on 1K-AES and PRINCE
1111 -- 1125GuoFeng Tang, Zhenfeng Zhang. Two-Party Signing For ISO/IEC Digital Signature Standards
1126 -- 1138K. Suresh, S. S. Sreeja Mole, A. Joseph Selva Kumar. F2SO: An Energy Efficient Cluster Based Routing Protocol Using Fuzzy Firebug Swarm Optimization Algorithm in WSN
1139 -- 1155Shobhan Kumar, Arun Chauhan 0002. A Transformer Based Encodings for Detection of Semantically Equivalent Questions in cQA
1156 -- 1166Yanna Wang, Bo Zhou. Residual Closeness, Matching Number and Chromatic Number
1167 -- 1183Xiaodi Wang, Xiaoge Pan, Tian Yang, Jianhua Xie, Mingwei Tang. Aspect-Based Sentiment Analysis Using Interaction Matrix And Global Attention Neural Network
1184 -- 1194Yanze Huang, Limei Lin, Eddie Cheng 0001, Li Xu 0002. Component Fault Diagnosis and Fault Tolerance of Alternating Group Graphs
1195 -- 1212Xiaoli Dong, Yongzhuang Wei, Wen Gao, Jie Chen. New Meet-in-the-Middle Attacks on FOX Block Cipher
1213 -- 1227LuMing Yang, Shaojing Fu, Yongjun Wang, Kaitai Liang, Fan Mo, Bo Liu. DEV-ETA: An Interpretable Detection Framework for Encrypted Malicious Traffic
1228 -- 1240Mona Mosa, Nedaa Agami, Ghada Elkhayat, Mohamed Kholief. A Novel Hybrid Segmentation Approach for Decision Support: A Case Study in Banking
1241 -- 1255Mengzhu Yu, Zhenjun Tang, Zhixin Li 0001, Xiaoping Liang, Xianquan Zhang. Robust Image Hashing With Saliency Map And Sparse Model
1256 -- 1267Bishal Basak Papan, Protik Bose Pranto, Md. Saidur Rahman 0001. On 2-Interval Pairwise Compatibility Properties of Two Classes of Grid Graphs
1268 -- 1278Zhen Shi, Chenhui Jin. Linear Attacks On SNOW 3G And SNOW-V Using Automatic Search
1279 -- 1294J. Shobana, M. Murali. An Improved Self Attention Mechanism Based on Optimized BERT-BiLSTM Model for Accurate Polarity Prediction
1295 -- 1309Bo Pang, Gang Liang, Jin Yang, Yijing Chen, Xinyi Wang, Wenbo He. CWSOGG: Catching Web Shell Obfuscation Based on Genetic Algorithm and Generative Adversarial Network

Volume 66, Issue 4

785 -- 795Sweta Jain, Pruthviraj Choudhari, Mahesh Gour. Pulmonary Lung Nodule Detection from Computed Tomography Images Using Two-Stage Convolutional Neural Network
796 -- 814Karine Altisen, Stéphane Devismes, Erwan Jahier. sasa: a SimulAtor of Self-stabilizing Algorithms
815 -- 825Bharathi Gopal, Anandharaj Ganesan. Sentiment Classification of Tourist's Opinion on Tourist Places of Interest in South India using Tweet Reviews
826 -- 841Qianru Zhou, Shuming Zhou, Xiaoqing Liu, Zhengqin Yu. Cluster Connectivity And Super Cluster Connectivity Of DQcube
842 -- 865Jixin Zhang, Jiageng Chen. Efficient Traceable Attribute-Based Signature With Update-Free Revocation For Blockchain
866 -- 872Mehmet Duran Toksari, Berrin Atalay. Some Scheduling Problems With Job Rejection And A Learning Effect
873 -- 887R. Sekar 0003, Ravi G. 0001. Taylor Sun Flower Optimization-Based Compressive Sensing for Image Compression and Recovery
888 -- 906Cheng Zhang, Bo Ou, Xiaolong Li 0001, Jianqin Xiong. Human Visual System Guided Reversible Data Hiding Based On Multiple Histograms Modification
907 -- 923Simone Faro, Thierry Lecroq, Kunsoo Park, Stefano Scafiti. On the Longest Common Cartesian Substring Problem
924 -- 940Yanwei Zhou, Zhaolong Wang, Zirui Qiao, Ying Wang, Bo Yang 0003, Yi Mu 0001, Mingwu Zhang. Identity-Based Encryption With Continuous Leakage-Resilient CCA Security From Static Complexity Assumption
941 -- 962Yue Li, Jianfang Qi, Xiaoquan Chu, Weisong Mu. Customer Segmentation Using K-Means Clustering and the Hybrid Particle Swarm Optimization Algorithm
963 -- 969Amitabha Acharya, Aman Aryan, Sujay Saha, Anupam Ghosh. Impact of COVID-19 on the Human Personality: An Analysis Based on Document Modeling Using Machine Learning Tools
970 -- 986Jialiang Hua, Tai Liu, Yulong Cui, Lingyue Qin, Xiaoyang Dong, Huiyong Cui. Low-Data Cryptanalysis On SKINNY Block Cipher
987 -- 1016Hailun Yan, Serge Vaudenay, Daniel Collins, Andrea Caforio. Optimal Symmetric Ratcheting for Secure Communication
1017 -- 1029Li Zhang 0108, Wenling Wu, Yafei Zheng, Bolin Wang. Cryptanalysis on Reduced-Round 3D and Saturnin
1030 -- 1039K. Ravishankar, C. Jothikumar. Analysis Performance Of Image Processing Technique Its Application by Decision Support Systems On Covid-19 Disease Prediction Using Convolution Neural Network
1040 -- 1052Erdogan Berkay Tekincan, Tülin Erçelebi Ayyildiz, Nizam Ayyildiz. Performance Evaluation of FPGA-Based LSTM Neural Networks for Pulse Signal Detection on Real-Time Radar Warning Receivers

Volume 66, Issue 3

525 -- 539A Krishan, D. Mittal. Multi-Class Liver Cancer Diseases Classification Using CT Images
540 -- 553Weina Niu, Yuheng Luo, Kangyi Ding, Xiaosong Zhang 0001, Yanping Wang, Beibei Li. A Novel Generation Method for Diverse Privacy Image Based on Machine Learning
554 -- 564K. Durga Devi, P. Uma Maheswari, Phani Kumar Polasi, R. Preetha, M. Vidhyalakshmi. Pattern Matching Model for Recognition of Stone Inscription Characters
565 -- 580Zhiqiang Lv, Jianbo Li, Chuanhao Dong, Zhihao Xu. DeepSTF: A Deep Spatial-Temporal Forecast Model of Taxi Flow
581 -- 602Furkan Gözükara, Selma Ayse Özel. An Incremental Hierarchical Clustering Based System For Record Linkage In E-Commerce Domain
603 -- 614Pramod Ganapathi, Rezaul Chowdhury. A Unified Framework to Discover Permutation Generation Algorithms
615 -- 625Taha Mansouri, Mohammad Reza Sadeghi Moghadam, Fatemeh Monshizadeh, Ahad Zareravasan. IoT Data Quality Issues and Potential Solutions: A Literature Review
626 -- 642Kaiju Li, Chunhua Xiao. PBFL: Communication-Efficient Federated Learning via Parameter Predicting
643 -- 661Jie Ma, Bin Qi, Kewei Lv. Reusable Group Fuzzy Extractor and Group-Shared Bitcoin Wallet
662 -- 677Chuanxiang Ju, Hangqi Ding, Benjia Hu. A Hybrid Strategy Improved Whale Optimization Algorithm for Web Service Composition
678 -- 691Yalan Wu, Jiaquan Yan, Long Chen 0006, Jigang Wu, Yidong Li. Efficient Parameter Server Placement for Distributed Deep Learning in Edge Computing
692 -- 710Zhiwang Xu, Huibin Qin, Shengying Yang, Seyedeh Maryam Arefzadeh. A New Approach for Resource Recommendation in the Fog-Based IoT Using a Hybrid Algorithm
711 -- 726Yuchen Tian, Weizhe Zhang, Andrew Simpson, Yang Liu, Zoe Lin Jiang. Defending Against Data Poisoning Attacks: From Distributed Learning to Federated Learning
727 -- 742Sheela J, Janet B. Caviar-Sunflower Optimization Algorithm-Based Deep Learning Classifier for Multi-Document Summarization
743 -- 762Rahul Ramesh Chakre, Dipak V. Patil. Particle Rider Mutual Information and Dendritic-Squirrel Search Algorithm With Artificial Immune Classifier for Brain Tumor Classification
763 -- 784Maximiliano Cristiá, Andrea Fois, Gianfranco Rossi. Declarative Programming with Intensional Sets in Java Using JSetL

Volume 66, Issue 2

269 -- 279Wenqin Cao, Wentao Zhang, Xuefeng Zhao. The Key-Dependent Capacity in Multidimensional Linear Cryptanalysis
280 -- 294Penta Anil Kumar, R. Gunasundari, R. Aarthi. Fractional Sailfish Optimizer with Deep Convolution Neural Network for Compressive Sensing Based Magnetic Resonance Image Reconstruction
295 -- 317Cinzia Bernardeschi, Andrea Domenici, Adriano Fagiolini, Maurizio Palmieri. Co-simulation and Formal Verification of Co-operative Drone Control With Logic-Based Specifications
318 -- 332Kailun Yan, Jilian Zhang, Yongdong Wu. Improving Bitcoin Transaction Propagation Efficiency through Local Clique Network
333 -- 341Wiselin Jiji Ganasigamony, G. Merlin, Rajesh Athiswamy. Assessment and Monitoring of Salinity of Soils After Tsunami in Nagapattinam Area Using Fuzzy Logic-Based Classification
342 -- 359Subrata Datta, Kalyani Mali, Udit Ghosh, Subrata Bose, Sourav Das, Sourav Ghosh. Rare Correlated Coherent Association Rule Mining With CLS-MMS
360 -- 372Hector B. Hougaard, Atsuko Miyaji. Authenticated Tree-Based R-LWE Group Key Exchange
373 -- 383Cong Lu, Jianbin Huang, Longji Huang. Detecting Urban Anomalies Using Factor Analysis and One Class Support Vector Machine
384 -- 398Shudan Xue, Qingying Deng, Pingshan Li. Fault-Tolerant Strongly Hamiltonian Laceability and Hyper-Hamiltonian Laceability of Cayley Graphs Generated by Transposition Trees
399 -- 415Zahraa E. Mohamed, Hussein H. Saleh. Potential of Machine Learning Based Support Vector Regression for Solar Radiation Prediction
416 -- 428P. Radha, N. Selvakumar, J. Raja Sekar, J. V. Johnsonselva. Density-Based Dynamically Self-Parameterized Clustering for Material Inspection
429 -- 440Piyush Kumar Shukla, Vandana Roy, Prashant Kumar Shukla, Anoop Kumar Chaturvedi, Aumreesh Kumar Saxena, Manish Maheshwari, Parashu Ram Pal. An Advanced EEG Motion Artifacts Eradication Algorithm
441 -- 462Xiao-yan Li, Yufang Zhang, Ximeng Liu, Xiangke Wang, Hongju Cheng. Reliability Evaluation of Clustered Faults for Regular Networks Under the Probabilistic Diagnosis Model
463 -- 478Oswald C. 0001, B. SivaSelvan. Smart Multimedia Compressor - Intelligent Algorithms for Text and Image Compression
479 -- 495Tao Hou, Ting Cui, Jiyan Zhang. Practical Attacks on Reduced-Round 3D and Saturnin
496 -- 507Mohammad Reza Zarrabi 0002, Nasrollah Moghaddam Charkari. Single-Point And Triple-Point Queries Visibility Constrained Minimum Link Paths In Simple Polygons
508 -- 522S. Christina Magneta, C. Sundar, Muniyandi Suruli Thanabal. Lung Lobe Segmentation and Feature Extraction-Based Hierarchical Attention Network for COVID-19 Prediction from Chest X-Ray Images
523 -- 0Gongxian Zeng, Meiqi He, Siu-Ming Yiu, Zhengan Huang. Corrigendum to: A Self-Tallying Electronic Voting Based on Blockchain
524 -- 0Ehsan Ataie, Athanasia Evangelinou, Eugenio Gianniti, Danilo Ardagna. Erratum to: A Hybrid Machine Learning Approach for Performance Modeling of Cloud-Based Big Data Applications

Volume 66, Issue 12

2861 -- 2873Kexin Xu, Benjamin Hong Meng Tan, Li-Ping Wang, Khin Mi Mi Aung, Huaxiong Wang. Threshold Homomorphic Encryption From Provably Secure NTRU
2874 -- 2886Junfeng Tian, Haoyi Jia, Wenqing Bai. CCESHP: Causal Consistency Model of Edge Storage Based on Hash Ring and Partial Geo-Replication
2887 -- 2896Ching-Kuo Hsu. A Dueling DQN-Based Computational Offloading Method in MEC-Enabled IIoT Network
2897 -- 2907Shitala Prasad, Tingting Chai, Jiahui Li, Zhaoxin Zhang. CR Loss: Improving Biometric Using ClassRoom Learning Approach
2908 -- 2920Areeb Ahmed Bhutta, Hasnain Ahmed. Edge-Based Congestion-Aware Datacenter Load Balancing with Smart Probing
2921 -- 2927Jing Wang, Fangmin Li. FQn
2928 -- 2947Jincheng Zhong, Shuhui Chen, Biao Han. FPGA-CPU Architecture Accelerated Regular Expression Matching With Fast Preprocessing
2948 -- 2960Jiahui Yao, Lingling Xu. Online/Offline Attribute-Based Boolean Keyword Search For Internet Of Things
2961 -- 2973Yong Zhao, Shao-Jun Yang, Wei Wu 0001, Xinyi Huang. A Lattice-Based Redactable Signature Scheme using Cryptographic Accumulators for Trees
2974 -- 2989Hao Lin, Shi-Feng Sun, Mingqiang Wang, Joseph K. Liu, Weijia Wang. Shorter Linkable Ring Signature Based on Middle-Product Learning with Errors Problem
2990 -- 2999Canan Çiftçi, Vecdi Aytaç. Disjunctive Total Domination In Harary Graphs
3000 -- 3014Jie Li, Guoying Sun. RSCOEWR: Radical-Based Sentiment Classification of Online Education Website Reviews
3015 -- 3028Nan Zhao, Nianmin Yao, Zhenguo Gao. An Adaptive MAC Protocol Based on Time-Domain Interference Alignment for UWANs
3029 -- 3037Gildas Avoine, Xavier Carpent, Diane Leblanc-Albarel. Rainbow Tables: How Far Can CPU Go?
3038 -- 3051R. Sudhakar, P. V. Venkateswara Rao. Digital Image Anti-Forensic Model Using Exponential Chaotic Biogeography-Based Optimization Algorithm
3052 -- 3068Yin Lv, Danping Shi, Yi Guo, Qiu Chen, Lei Hu, Zihui Guo. Automatic Demirci-Selçuk Meet-In-The-Middle Attack On SIMON
3069 -- 3091Congming Wei, Xiaoyang Dong, Willi Meier, Lingyue Qin, Ximing Fu. Differential-Aided Preimage Attacks On Round-Reduced Keccak
3092 -- 3106Li Feng, Xiaoling Ni, Zhen Ling, Liangmin Wang. Strong Anonymous Communication System Based on Segment Routing Over SDN
3107 -- 3118Pingshan Liu, Shuyue Lv. Chinese RoBERTa Distillation For Emotion Classification
3119 -- 3128Lina Ba, Yaxian Zhang, Heping Zhang. n-cubes

Volume 66, Issue 11

2595 -- 2622Hakan Yilmazer, Selma Ayse Özel. ImposeSVD: Incrementing PureSVD For Top-N Recommendations for Cold-Start Problems and Sparse Datasets
2623 -- 2637Junying Yuan, Huicheng Zheng, Jiangqun Ni. Multiple Histograms-Based Reversible Data Hiding Using Fast Performance Optimization and Adaptive Pixel Distribution
2638 -- 2655Shahid Alam. LAM: Scrutinizing Leading APIs For Detecting Suspicious Call Sequences
2656 -- 2673Ning Li 0003, Xin Yuan 0003, José-Fernán Martínez-Ortega, Vicente Hernández Díaz. Trapezoidal Sketch: A Sketch Structure for Frequency Estimation of Data Streams
2674 -- 2704Chengbin Jin, Yongbin Zhou. Enhancing Deep-Learning Based Side-Channel Analysis Through Simultaneously Multi-Byte Training
2705 -- 2720N. V. L. M. Krishna Munagala, A. Daisy Rani, D. V. Rama Koti Reddy. Blockchain-Based Internet-of-Things for Secure Transmission of Medical Data in Rural Areas
2721 -- 2740Yao Li, Zhi Xiong 0001, Tao Zhang, Qinkun Zhang, Ming Fan, Lei Xue. Ensemble Framework Combining Family Information for Android Malware Detection
2741 -- 2757Lv Chen, Dengpan Ye, Yueyun Shang. RTIM Hashing: Robust and Compact Video Hashing With a Rotation- and Translation-Invariant Model
2758 -- 2772Yan Zeng, Yuankai Mu, Junfeng Yuan, Siyuan Teng, Jilin Zhang, Jian Wan, Yongjian Ren, Yunquan Zhang. Adaptive Federated Learning With Non-IID Data
2773 -- 2781Zheng Zhang, Fangguo Zhang. New Obfuscation Scheme for Conjunctions
2782 -- 2793Liqin Xiong, Lei Cao 0007, Xiliang Chen, Jun Lai, Xijian Luo. Character-Based Value Factorization For MADRL
2794 -- 2809Wooyoung Park, Seungbum Jo, Srinivasa Rao Satti. Practical Implementation of Encoding Range Top-2 Queries
2810 -- 2824Zirui Qiao, Qiliang Yang, Yanwei Zhou, Bo Yang 0003, Mingwu Zhang. A Novel Construction Of Certificateless Aggregate Signature Scheme For Healthcare Wireless Medical Sensor Networks
2825 -- 2843Lanlan Rui, Shiyue Dai, Zhipeng Gao, Xuesong Qiu 0001, Xingyu Chen. Double-Lead Content Search And Producer Location Prediction Scheme For Producer Mobility In Named Data Networking
2844 -- 2859Shuai Liu, Yan Zhao 0023. Robust Image Hashing Combining 3D Space Contour and Vector Angle Features

Volume 66, Issue 10

2331 -- 2338Lein Harn, Ching-Fang Hsu 0001, Zhe Xia, Zixuan Li. Multiple Blind Signature for e-Voting and e-Cash
2339 -- 2354Runkai Yang, Jelena V. Misic, Vojislav B. Misic, Xiao Liang, Shenshen Zhou, Xiaolin Chang. Understanding Performance of a Vulnerable Heterogeneous Edge Data Center: A Modeling Approach
2355 -- 2364Wenju Xu, Baocang Wang, Quanbo Qu, Tanping Zhou, Pu Duan. Modified Multi-Key Fully Homomorphic Encryption Scheme in the Plain Model
2365 -- 2378Yangguang Tian, Atsuko Miyaji, Koki Matsubara, Hui Cui 0001, Nan Li. Revocable Policy-Based Chameleon Hash for Blockchain Rewriting
2379 -- 2392Haitang Lu, Jie Chen 0021, Jianting Ning, Kai Zhang 0016. Verifiable Conjunctive Dynamic Searchable Symmetric Encryption With Forward and Backward Privacy
2393 -- 2408He Li 0006, Duo Jin, Xuejiao Li, Hongjie Huang, Jinpeng Yun, Longji Huang. Multi-View Spatial-Temporal Graph Neural Network for Traffic Prediction
2409 -- 2425Mianyang Yao, Long Chen 0006, Yalan Wu, Jigang Wu. Loading Cost-Aware Model Caching And Request Routing In Edge-enabled Wireless Sensor Networks
2426 -- 2436N. S. Jeya Shyla, W. R. Sam Emmanuel. Glaucoma Detection Using Multiple Feature Set With Recurrent Neural Network
2437 -- 2446Öznur Kalkar, Isa Sertkaya, Seher Tutdere. On The Batch Outsourcing Of Pairing Computations
2447 -- 2461Xuanhao Luo, Yong Feng 0004, Chengdong Wang. A Clothoid Curve-Based Intersection Collision Warning Scheme in Internet of Vehicles
2462 -- 2479Wei Zhou 0027, Xiaoxue Ding, Hai-Xia Xu 0001. Anti-Occlusion Target Tracking Based on Joint Confidence
2480 -- 2498Yi Chen, Yantian Shen, Hongbo Yu. Neural-Aided Statistical Attack for Cryptanalysis
2499 -- 2516Vikas Srivastava, Sumit Kumar Debnath. A Multivariate-Based Provably Secure Certificateless Signature Scheme With Applications To The Internet Of Medical Things
2517 -- 2534Zezhou Hou, Jiongjiong Ren, Shaozhen Chen. Practical Attacks of Round-Reduced SIMON Based on Deep Learning
2535 -- 2541Juanjuan Shi, Yongfang Kou, Yulan Hu, Weihua Yang. On The Maximum Cliques Of The Subgraphs Induced By Binary Constant Weight Codes In Powers Of Hypercubes
2542 -- 2553Mingxing Hu, WeiJiong Zhang, Zhen Liu. An Improved Lattice-Based Ring Signature With Unclaimable Anonymity in the Standard Model
2554 -- 2573Keshuo Sun, Haiying Gao. Adaptively Secure KP-ABE For Circuits With Fan-In n And Fan-Out 1
2574 -- 2592Dengli Bu, Junyi Deng, Pengjie Tang, Shuhong Yang. Reversible Circuit Synthesis Method Using Sub-graphs of Shared Functional Decision Diagrams
2593 -- 0. Correction to: Intelligent Forecast of Stock Markets to Handle COVID-19 Economic Crisis by Modified Generative Adversarial Networks

Volume 66, Issue 1

1 -- 15Nagaraj Honnikoll, Ishwar Baidari. Mean Error Rate Weighted Online Boosting Method
16 -- 34Saihua Cai, Jinfu Chen 0001, Haibo Chen 0005, Chi Zhang 0046, Qian Li, Dengzhou Shi, Wei Lin. Minimal Rare Pattern-Based Outlier Detection Approach For Uncertain Data Streams Under Monotonic Constraints
35 -- 46Sana Khanam, Safdar Tanweer, Syed Sibtain Khalid. Youtube Trending Videos: Boosting Machine Learning Results Using Exploratory Data Analysis
47 -- 60Alonso Tenorio-Trigoso, Manuel Castillo-Cara, Giovanny Mondragón-Ruiz, Carmen Carrión 0001, María Blanca Caminero. An Analysis of Computational Resources of Event-Driven Streaming Data Flow for Internet of Things: A Case Study
61 -- 69Jafar Majidpour, Samer Kais Jameel, Jihad Anwar Qadir. Face Identification System Based on Synthesizing Realistic Image using Edge-Aided GANs
70 -- 85Niharika Gupta, Baij Nath Kaushik. Prognosis and Prediction of Breast Cancer Using Machine Learning and Ensemble-Based Training Model
86 -- 100Surbhi Gupta 0002, Manoj Kumar Gupta. Computational Model for Prediction of Malignant Mesothelioma Diagnosis
101 -- 113Parsi Kalpana. Chronological Sailfish Optimizer for Preserving Privacy in Cloud Based on Khatri-Rao Product
114 -- 127Qiaohong Hao, Qi Zhao, Mateu Sbert, Qinghe Feng, Cosmin Ancuti, Miquel Feixas, Màrius Vila, Jiawan Zhang. Information-Theoretic Channel for Multi-exposure Image Fusion
128 -- 143Mohammad Nabipour, Amir Reza Momen. A Novel Approach to Adaptive Resource Allocation for Energy Saving in Reconfigurable Heterogeneous Networks
144 -- 159Ankush Manocha, Gulshan Kumar, Munish Bhatia. IoT Analytics-inspired Real-time Monitoring for Early Prediction of COVID-19 Symptoms
160 -- 173Xiaodan Li, Wenling Wu. Constructing Binary Matrices with Good Implementation Properties for Low-Latency Block Ciphers based on Lai-Massey Structure
174 -- 183Qing Wang, Xi Zhang, Jing Qin, Jixin Ma, Xinyi Huang. A Verifiable Symmetric Searchable Encryption Scheme Based on the AVL Tree
184 -- 196Jinlu Liu, Bo Zhao, Jing Qin 0002, Xi Zhang, Jixin Ma 0001. Multi-Keyword Ranked Searchable Encryption with the Wildcard Keyword for Data Sharing in Cloud Computing
197 -- 207Wenju Xu, Baocang Wang, Yupu Hu, Pu Duan, Benyu Zhang, Momeng Liu. Multi-key Fully Homomorphic Encryption from Additive Homomorphism
208 -- 220Chingfang Hsu, Lein Harn, Zhe Xia, Jianqun Cui, Jingxue Chen. Construction of Lightweight Authenticated Joint Arithmetic Computation for 5G IoT Networks
221 -- 228Yulong Wei, Ronghua Li, Weihua Yang. Hybrid Fault Diagnosis Capability Analysis of Highly Connected Graphs
229 -- 244Mohammad Jalilvand Aghdam Bonab, Ramin Shaghaghi Kandovan. Effective Resource Allocation and Load Balancing in Hierarchical HetNets: Toward QoS-Aware Multi-Access Edge Computing
245 -- 266Ramachandro Majji, R. Rajeswari, Ch. Vidyadhari, Rajan Cristin. Squirrel Search Deer Hunting-Based Deep Recurrent Neural Network for Survival Prediction Using PAN-Cancer Gene Expression Data
267 -- 0Muthumanikandan Vanamoorthy, Valliyammai Chinnaiah. Corrigendum to: Congestion Free Transient Plane(CFTP) using bandwidth sharing during link failures in SDN