407 | -- | 422 | Amal Abid 0002, Saoussen Cheikhrouhou, Slim Kallel, Zahir Tari, Mohamed Jmaiel. A Smart Contract-Based Access Control Framework For Smart Healthcare Systems |
423 | -- | 436 | Zhu Yuan, Xueqiang Lv, Ping Xie, Haojie Ge, Xindong You. CSEA: A Fine-Grained Framework of Climate-Season-Based Energy-Aware in Cloud Storage Systems |
437 | -- | 446 | Francisco Javier Moreno Arboleda, Georgia Garani, Carlos Daniel Bolivar Zapata. Query Operators for Transactional Data: Detecting Similar and Periodic Transactions |
447 | -- | 462 | Mengqi Liu, Hang Gao, Xiaofan Xia, Suying Gui, Tiegang Gao. Perceptual Image Hashing Based on Canny Operator and Tensor for Copy-Move Forgery Detection |
463 | -- | 473 | Changan Liu, Changjun Fan, Zhongzhi Zhang. Finding Influencers in Complex Networks: An Effective Deep Reinforcement Learning Approach |
474 | -- | 484 | Yaoan Jin, Atsuko Miyaji. Secure and Compact Elliptic Curve Scalar Multiplication with Optimized Inversion |
485 | -- | 497 | Mingzhe Zhu, Wanyue Xu, Wei Li 0055, Zhongzhi Zhang, Haibin Kan. Hitting Times of Random Walks on Edge Corona Product Graphs |
498 | -- | 507 | Yuliang Xue, Yuhao Zhu, Zhiying Zhu, Sheng Li, Zhenxing Qian, Xinpeng Zhang 0001. Removing Watermarks For Image Processing Networks Via Referenced Subspace Attention |
508 | -- | 518 | Reza Ebrahim Pourian, Mehdi Fartash, Javad Akbari Torkestani. A Deep Learning Model for Energy-Aware Task Scheduling Algorithm Based on Learning Automata for Fog Computing |
519 | -- | 526 | Marzieh Shamsizadeh, Mohammad Mehdi Zahedi, Khadijeh Abolpour. Irreducible Fuzzy Multiset Finite Automaton |
527 | -- | 536 | Heqin Liu, Dongqin Cheng. Structure Fault Tolerance of Exchanged Hypercube |
537 | -- | 547 | Jinyu Lu, Guoqiang Liu, Bing Sun 0001, Chao Li 0002, Li Liu. Improved (Related-Key) Differential-Based Neural Distinguishers for SIMON and SIMECK Block Ciphers |
548 | -- | 556 | Yuxing Yang. Hyper-Hamiltonian Laceability of Cartesian Products of Cycles and Paths |
557 | -- | 580 | Hireche Samia, Dennai Abdeslem, Boufeldja Kadri. Toward a Novel RESTFUL Big Data-Based Urban Traffic Incident Data Web Service for Connected Vehicles |
581 | -- | 603 | Xuefeng Zhao. Secure and Efficient Masking of Lightweight Ciphers in Software and Hardware |
604 | -- | 616 | Yishu Xu, Peng Zhang, Hongtao Yu, Fuzhi Zhang. Detecting Group Shilling Attacks In Recommender Systems Based On User Multi-dimensional Features And Collusive Behaviour Analysis |
617 | -- | 631 | Zhiwei Chen, Lunzhi Deng, Yu Ruan, Shuai Feng, Tao Wang, Bo Wang. Certificateless Broadcast Encryption with Authorization Suitable for Storing Personal Health Records |
632 | -- | 641 | Tu-Liang Lin, Hong-Yi Chang, Yuan-Yao Chiang, Shu-Cheng Lin, Tsung-Yen Yang, Chun-Jun Zhuang, Wha-Lee Tseng, Bo-Hao Zhang. Ransomware Detection by Distinguishing API Call Sequences through LSTM and BERT Models |
642 | -- | 657 | Tian Yang, Sha Ma, Jiaojiao Du, Chengyu Jiang, Qiong Huang 0001. Revocable Public Key Encryption with Equality Test without Pairing in Cloud Storage |
658 | -- | 673 | Rahman Keramati Hatkeposhti, Meisam Yadollahzadeh Tabari, Mehdi GolsorkhtabariAmiri. Providing an Approach for Early Prediction of Fall in Human Activities Based on Wearable Sensor Data and the Use of Deep Learning Algorithms |
674 | -- | 687 | Li Zhang, Yu Zhang, Wenling Wu, Yongxia Mao, Yafei Zheng. Explicit Upper Bound Of Impossible Differentials For AES-Like Ciphers: Application To uBlock And Midori |
688 | -- | 693 | Zhecheng Yu, Liqiong Xu. Reliability Evaluation Of Multiprocessor System Based On The Balanced Complete Multipartite Graphs |
694 | -- | 708 | Shumin Si, Xiuhan Lin, Puwen Wei. Compressed Zero-Knowledge Proofs for Lattice-Based Accumulator |
709 | -- | 718 | Hong Zhang, Shuming Zhou, Eddie Cheng 0001. The Cyclic Diagnosability Of Hypercubes Under The PMC Model And The MM* Model |
719 | -- | 727 | Katharina Boudgoust, Adeline Roux-Langlois. Overfull: Too Large Aggregate Signatures Based on Lattices |
728 | -- | 745 | Tzong-Jye Liu. Adversarial Attacks on Network Intrusion Detection Systems Using Flow Containers |
746 | -- | 761 | Hongjin Zhang, Hui Wei 0001, Wang Bo. A New Fuzzy Smoothing Term Model For Stereo Matching |
762 | -- | 776 | Senxing Lu, Mingming Zhao, ChunLin Li, Quanbing Du, Youlong Luo. Time-Aware Data Partition Optimization and Heterogeneous Task Scheduling Strategies in Spark Clusters |
777 | -- | 781 | Shijie Zhao, Pingshan Li. On Conditional Edge-Fault-Tolerant Strong Menger Edge Connectivity Of Folded Hypercubes |
782 | -- | 805 | Hala S. Ali, R. Sridevi. Mobility and Security Aware Real-Time Task Scheduling in Fog-Cloud Computing for IoT Devices: A Fuzzy-Logic Approach |
806 | -- | 0 | . Correction to: An Attack on a Proposed Construction of Small-State Stream Ciphers and Proposals for New Constructions |
807 | -- | 0 | . Correction to: Performance Evaluation of FPGA-Based LSTM Neural Networks for Pulse Signal Detection on Real-Time Radar Warning Receivers |