Journal: Comput. J.

Volume 67, Issue 2

407 -- 422Amal Abid 0002, Saoussen Cheikhrouhou, Slim Kallel, Zahir Tari, Mohamed Jmaiel. A Smart Contract-Based Access Control Framework For Smart Healthcare Systems
423 -- 436Zhu Yuan, Xueqiang Lv, Ping Xie, Haojie Ge, Xindong You. CSEA: A Fine-Grained Framework of Climate-Season-Based Energy-Aware in Cloud Storage Systems
437 -- 446Francisco Javier Moreno Arboleda, Georgia Garani, Carlos Daniel Bolivar Zapata. Query Operators for Transactional Data: Detecting Similar and Periodic Transactions
447 -- 462Mengqi Liu, Hang Gao, Xiaofan Xia, Suying Gui, Tiegang Gao. Perceptual Image Hashing Based on Canny Operator and Tensor for Copy-Move Forgery Detection
463 -- 473Changan Liu, Changjun Fan, Zhongzhi Zhang. Finding Influencers in Complex Networks: An Effective Deep Reinforcement Learning Approach
474 -- 484Yaoan Jin, Atsuko Miyaji. Secure and Compact Elliptic Curve Scalar Multiplication with Optimized Inversion
485 -- 497Mingzhe Zhu, Wanyue Xu, Wei Li 0055, Zhongzhi Zhang, Haibin Kan. Hitting Times of Random Walks on Edge Corona Product Graphs
498 -- 507Yuliang Xue, Yuhao Zhu, Zhiying Zhu, Sheng Li, Zhenxing Qian, Xinpeng Zhang 0001. Removing Watermarks For Image Processing Networks Via Referenced Subspace Attention
508 -- 518Reza Ebrahim Pourian, Mehdi Fartash, Javad Akbari Torkestani. A Deep Learning Model for Energy-Aware Task Scheduling Algorithm Based on Learning Automata for Fog Computing
519 -- 526Marzieh Shamsizadeh, Mohammad Mehdi Zahedi, Khadijeh Abolpour. Irreducible Fuzzy Multiset Finite Automaton
527 -- 536Heqin Liu, Dongqin Cheng. Structure Fault Tolerance of Exchanged Hypercube
537 -- 547Jinyu Lu, Guoqiang Liu, Bing Sun 0001, Chao Li 0002, Li Liu. Improved (Related-Key) Differential-Based Neural Distinguishers for SIMON and SIMECK Block Ciphers
548 -- 556Yuxing Yang. Hyper-Hamiltonian Laceability of Cartesian Products of Cycles and Paths
557 -- 580Hireche Samia, Dennai Abdeslem, Boufeldja Kadri. Toward a Novel RESTFUL Big Data-Based Urban Traffic Incident Data Web Service for Connected Vehicles
581 -- 603Xuefeng Zhao. Secure and Efficient Masking of Lightweight Ciphers in Software and Hardware
604 -- 616Yishu Xu, Peng Zhang, Hongtao Yu, Fuzhi Zhang. Detecting Group Shilling Attacks In Recommender Systems Based On User Multi-dimensional Features And Collusive Behaviour Analysis
617 -- 631Zhiwei Chen, Lunzhi Deng, Yu Ruan, Shuai Feng, Tao Wang, Bo Wang. Certificateless Broadcast Encryption with Authorization Suitable for Storing Personal Health Records
632 -- 641Tu-Liang Lin, Hong-Yi Chang, Yuan-Yao Chiang, Shu-Cheng Lin, Tsung-Yen Yang, Chun-Jun Zhuang, Wha-Lee Tseng, Bo-Hao Zhang. Ransomware Detection by Distinguishing API Call Sequences through LSTM and BERT Models
642 -- 657Tian Yang, Sha Ma, Jiaojiao Du, Chengyu Jiang, Qiong Huang 0001. Revocable Public Key Encryption with Equality Test without Pairing in Cloud Storage
658 -- 673Rahman Keramati Hatkeposhti, Meisam Yadollahzadeh Tabari, Mehdi GolsorkhtabariAmiri. Providing an Approach for Early Prediction of Fall in Human Activities Based on Wearable Sensor Data and the Use of Deep Learning Algorithms
674 -- 687Li Zhang, Yu Zhang, Wenling Wu, Yongxia Mao, Yafei Zheng. Explicit Upper Bound Of Impossible Differentials For AES-Like Ciphers: Application To uBlock And Midori
688 -- 693Zhecheng Yu, Liqiong Xu. Reliability Evaluation Of Multiprocessor System Based On The Balanced Complete Multipartite Graphs
694 -- 708Shumin Si, Xiuhan Lin, Puwen Wei. Compressed Zero-Knowledge Proofs for Lattice-Based Accumulator
709 -- 718Hong Zhang, Shuming Zhou, Eddie Cheng 0001. The Cyclic Diagnosability Of Hypercubes Under The PMC Model And The MM* Model
719 -- 727Katharina Boudgoust, Adeline Roux-Langlois. Overfull: Too Large Aggregate Signatures Based on Lattices
728 -- 745Tzong-Jye Liu. Adversarial Attacks on Network Intrusion Detection Systems Using Flow Containers
746 -- 761Hongjin Zhang, Hui Wei 0001, Wang Bo. A New Fuzzy Smoothing Term Model For Stereo Matching
762 -- 776Senxing Lu, Mingming Zhao, ChunLin Li, Quanbing Du, Youlong Luo. Time-Aware Data Partition Optimization and Heterogeneous Task Scheduling Strategies in Spark Clusters
777 -- 781Shijie Zhao, Pingshan Li. On Conditional Edge-Fault-Tolerant Strong Menger Edge Connectivity Of Folded Hypercubes
782 -- 805Hala S. Ali, R. Sridevi. Mobility and Security Aware Real-Time Task Scheduling in Fog-Cloud Computing for IoT Devices: A Fuzzy-Logic Approach
806 -- 0. Correction to: An Attack on a Proposed Construction of Small-State Stream Ciphers and Proposals for New Constructions
807 -- 0. Correction to: Performance Evaluation of FPGA-Based LSTM Neural Networks for Pulse Signal Detection on Real-Time Radar Warning Receivers

Volume 67, Issue 1

1 -- 2Marios C. Angelides. Thematic Editorial: Mostly Artificial Intelligence (AI) or Machine Learning (ML) Now in the Engine Room, in Pursuit of a Green Agenda
3 -- 17Mariem Gnouma, Ridha Ejbali, Mourad Zaied. Deep Hashing and Sparse Representation of Abnormal Events Detection
18 -- 30Ozgur Oksuz. A System For Storing Anonymous Patient Healthcare Data Using Blockchain And Its Applications
31 -- 44He Li 0006, Duo Jin, Xuejiao Li, Shaojie Qiao. A Dynamic Heterogeneous Graph Convolution Network For Traffic Flow Prediction
45 -- 56Tongfeng Li, Ruisheng Zhang, Bojuan Niu, Yabing Yao, Jun Ma, Jing Jiang, Zhili Zhao. Link Prediction Based On Local Structure And Node Information Along Local Paths
57 -- 77Sayaka Kamei, Sébastien Tixeuil. An Asynchronous Maximum Independent Set Algorithm By Myopic Luminous Robots On Grids
78 -- 94Zhuowei Wang 0001, Hao Wang, Xiaoyu Song, Jiahui Wu. Communication-Aware Energy Consumption Model in Heterogeneous Computing Systems
95 -- 109James Walsh 0004, Oluwafunmilola Kesa, Andrew Wang, Mihai Ilas, Patrick O'Hara, Oscar Giles, Neil Dhir, Mark Girolami, Theodoros Damoulas. Near Real-Time Social Distance Estimation In London
110 -- 126Aissam Aouar, Saïd Yahiaoui, Lamia Sadeg, Nadia Nouali-Taboudjemat, Kadda Beghdad Bey. Distributed Partial Simulation for Graph Pattern Matching
127 -- 141Xiaoyang Liu 0001, Luyuan Gao, Giacomo Fiumara, Pasquale De Meo. Key Node Identification Method Integrating Information Transmission Probability and Path Diversity in Complex Network
142 -- 152Xiaoqing Liu, Shuming Zhou, Jiafei Liu, Hong Zhang. Reliability Analysis of the Cactus-Based Networks Based on Subsystem
153 -- 168Qin Luo, Xin Cao. PNCTS: A Prediction and Network Coding-Based Transmission Scheme for Efficient Screen Updates Delivery in DaaS
169 -- 178Vahid Amin Ghafari, Mahmoud Ahmadian-Attari. An Attack on a Proposed Construction of Small-State Stream Ciphers and Proposals for New Constructions
179 -- 194Xiwen Wang, Kai Zhang 0016, Jinguo Li, Mi Wen, Shengmin Xu, Jianting Ning. Non-interactive Boolean Searchable Asymmetric Encryption With Bilateral Access Control
195 -- 209Jiali Shi, Chao Li, Guoqiang Liu. Differential Attack With Constants On μ2 Block Cipher
210 -- 219Yin Lv, Danping Shi, Lei Hu, Zihui Guo, Yi Guo, Caibing Wang. Improved Linear Cryptanalysis of Block Cipher BORON
220 -- 235Andrew Simpson, Matthias Dellago, Daniel W. Woods. Formalizing Attack Trees To Support Economic Analysis
236 -- 252Xu Zhang, Shunjie Wen, Liang Yan, Jiangfan Feng, Ying Xia. A Hybrid-Convolution Spatial-Temporal Recurrent Network For Traffic Flow Prediction
253 -- 273Wenhan Ge, Junfeng Wang 0003. SeqMask: Behavior Extraction Over Cyber Threat Intelligence Via Multi-Instance Learning
274 -- 291Chunning Zhou, Wentao Zhang, Weiwei Cao. A New Approach of Evaluating the Security Against Differential and Linear Cryptanalysis and Its Applications to Serpent, NOEKEON and ASCON
292 -- 303Lin Ding 0001, Zheng Wu, Guixian Zhang, Tairong Shi. Quantum Guess and Determine Attack on Stream Ciphers
304 -- 322K. Ashwini. User Name-Based Compression and Encryption of Images Using Chaotic Compressive Sensing Theory
323 -- 337Ke Wang, Zhenfeng Zhang, Haodong Jiang, Huiqin Xie, Yanjun Li, Ying Sun, Lidong Han. Key Reuse Attacks on Post-quantum Cryptosystems, Revisited
338 -- 346Mozamel M. Saeed. Designing Scenarios for In-Organization Training Using the CyberCIEGE Game
347 -- 361C. Shaji, I. Shatheesh Sam. Encoding with Combination Orientation Technique for RDH in Dual Stego Images
362 -- 375Liqing Qiu, Yuying Liu, Jianyi Zhang. A New Method for Identifying Influential Spreaders in Complex Networks
376 -- 390Joon-Young Paik, Rize Jin. Malware Family Prediction with an Awareness of Label Uncertainty
391 -- 406Nieves R. Brisaboa, Travis Gagie, Adrián Gómez-Brandón, Gonzalo Navarro. Two-Dimensional Block Trees