Journal: Comput. J.

Volume 68, Issue 9

1087 -- 1104Han Sun, Yan Zhang 0014, Huiping Zhuang, Jiatong Li, Zhen Xu 0009, Liji Wu. PEAR: privacy-preserving and effective aggregation for byzantine-robust federated learning in real-world scenarios
1105 -- 1117Kexiang Yan, Gang Liang, Lei Wang, Mingxu Sun, Kui Zhao. Dual-feature adaptive framework for multimodal disinformation detection
1118 -- 1127Weina Zhou, Wei Shao, Wenhua Hu. A Yolo-like lightweight ship detection network for unmanned surface vehicles
1128 -- 1136Song Yu, Wenlong Liu, Hannan Wu, Zhifang Liao. GitHub project recommendation based on knowledge graph and developer similarity
1137 -- 1149Yuheng Zhang, Guojun Wang, Peiqiang Li, Wanyi Gu, Houji Chen. FRACE: Front-Running Attack Classification on Ethereum using Ensemble Learning
1150 -- 1162Faeiz Alserhani. Advanced social media crime prevention via deep learning and cryptographic data encryption
1163 -- 1180Yongshan Wang, Siyuan Pang, Zijing Fan, Shang Shang, Yepeng Yao, Zhengwei Jiang, Baoxu Liu. Advanced code slicing with pre-trained model fine-tuned for open-source component malware detection
1181 -- 1196Abdulkawi Yahya Radman Al-Shamiri, Dong-jun Yu, Peipei Li 0001, Balqis Yahya Ali Abdullah Al-Mahweeti. Use of data Mining in Identifying the risk factors of optic neuropathy
1197 -- 1207Enting Guo, Chunhua Su, Peng Li 0017. Efficient unlearning for data security in deep learning systems
1208 -- 1224Önder Çoban, Seyma Yücel Altay. Arming text-based gender inference with partition membership filtering and feature selection for online social network users
1225 -- 1236Qianhua Luo, Bo Xie, Jiahuan Wang, Jiaqi Shuai, Haixia Cui. A hybrid approach to task offloading optimization: integrating hybrid whale genetic algorithm and reinforcement learning
1237 -- 1251Cheng Zhang 0019, Jinxin Lv, Jingxu Cao, JiaChuan Sheng, Dawei Song 0001, Tiancheng Zhang 0009. Unravelling the semantic mysteries of transformers layer by layer
1252 -- 1262Jinyan He, Haitong Yang. Multilingual knowledge graph completion based on structural features
1263 -- 1284Manoj Kumar Prabhakaran, Abinaya Devi Chandrasekar, Parvathy Meenakshi Sundaram. PHISH_ATTENTION: achieving robust phishing website detection with balanced datasets and advanced URL features
1285 -- 1299Gengjian Liao, Shiyu Shao, Zhenni Feng. Balancing privacy and model performance in federated learning through contract-based data trading
1300 -- 1314Zhaobin Ma, Zhiqiang Lv, Zhihao Xu 0002, Rongkun Ye, Jianbo Li. Spatio-temporal traffic flow forecasting based on second-order continuous graph neural network
1315 -- 1328Cenman Wang, Ye Tian 0004, Yiwen Wu, Xinming Zhang 0001. Confluence: improving network monitoring accuracy on multi-pipeline data plane
1329 -- 1344Sumin Li, Jinhua Lin, Yijin Gang, Xiuqin Pan. Small object detection in remote sensing images through multi-scale feature fusion

Volume 68, Issue 8

859 -- 871Nabil Mohamed Eldakhly. Optimizing arrhythmia identification using chaos theory and deep learning analysis
872 -- 890Jing Zhan, Bo Li, Jiang Zhao, Yong Zhao. zk-DCIAExchange: SGX protected fair exchange with distributed zero knowledge proof for data confidentiality and authentication
891 -- 907Shu Liu, Zain Ul Abideen, Tongming Wan, Inzamam Shahzad, Abbas Waseem, Yushan Pan. MuST-GAN MFAS: Multi-semantic spoof tracer GAN with transformer layers for multi-modal face anti-spoofing
908 -- 925Wenmin Ma. Learning to optimize based on rate decay
926 -- 938Weikang Zhang, Zhi Liu, Tongxin Bai, Furong Zheng, Wenming Jin, Yang Wang. DuoSQL: towards elastic data warehousing via separated data management and processing
939 -- 952Chuanyin Wang, Yifei Zhang, Neng Gao. Towards effective privacy preservation in federated learning with automatic gradient clipping and gradient transformation perturbation
953 -- 967Yanchang Feng, Junchao Ma, Haojun Xia, Da Zhang, Bibo Tu. BLFair: enabling proportional I/O sharing for NVMe SSD in SPDK para-virtualization architecture
968 -- 984Faris A. Almalki. Developing an intelligent framework with Blockchain capabilities for environmental monitoring using a CubeSat
985 -- 997Hui Dong, Huaqun Wang, Mengjie Lv, Weibei Fan. g-good-neighbor conditions
998 -- 1012Jinguo Li, Peichun Yuan, Jin Zhang 0018, Sheng Shen, Yin He, Ruyang Xiao. F2PQNN: a fast and secure two-party inference on quantized convolutional neural networks
1013 -- 1027Siyuan Zhang, Yixuan Zhang, Jianying Feng. Weighted twin support vector machine with rescaled hinge loss
1028 -- 1049Haizhen Wang, Na Jia, Yang He, Zuozheng Lian. A new DDoS attack detection model based on improved stacked autoencoder and gated recurrent unit for software defined network
1050 -- 1061Nankai Lin, Hongyan Wu, Peijian Zeng, Qifeng Bai, Dong Zhou 0001, Aimin Yang 0002. A novel curriculum learning framework for multi-label emotion classification
1062 -- 1073Yoav Gross, Shmuel T. Klein, Elina Opalinsky, Rivka Revivo, Dana Shapira. Compression Cryptosystem
1074 -- 1085Zhen Wang 0042, Jinfeng Lv, Yuhao Zhou 0002, Jianhui Jiang, Yong Wang 0055. A dual protection technology to thwart hardware Trojan insertion based on observability

Volume 68, Issue 7

717 -- 733Neamah Al-Naffakh, Nathan L. Clarke, Fudong Li 0001, Paul S. Haskell-Dowland. Real-world continuous smartwatch-based user authentication
734 -- 748Wen Cheng, Shengxia Tu, Yi Liu 0090, Lingfang Zeng, Yang Wang 0006, André Brinkmann. FlashFox: a secret-sharing approach to securing data deletion for Flash-based SSD
749 -- 762Shihan Qin, Yuting Xiao, Yansen Xin, Birou Gao, Rui Zhang 0002. Practical and veritable threshold multi-factor authentication for mobile devices
763 -- 774Wenyang Zhao, Xiaoyao Yang, Yong Wang. RADNet: a highly and robust dynamic network for object detection in complex road scenes
775 -- 787Zhijin Chen, Nankai Lin, Aimin Yang 0002, Dong Zhou 0001. Filter-enhanced Contrast Variational AutoEncoders for sequential recommendation
788 -- 803Ligeng Chen, Zhongling He, Yi Qian, Bing Mao 0001. CATI++: empirical study and evaluation for adjacent instruction enhanced type inference
804 -- 812Xiaoyang Zhang, Jian Bai, Guanchao Qiao, Xiao Xiao, Liwei Meng, Shaogang Hu. YOLO-fall: a YOLO-based fall detection model with high precision, shrunk size, and low latency
813 -- 829Yuedong Pan, Lixin Zhao, Tao Leng, Chaofei Li, Aimin Yu, Lijun Cai. TaintAttack: rapid attack investigation based on information flow tracking
830 -- 838Lingxiao Shan, Jian Li, GuanJun Liu. Alternating-update-strategy based Graph Autoencoder for graph neural network
839 -- 858Xiaoyang Wen, Shaopeng Guan. Improving recommendation fairness with dependency-based graph collaborative filtering

Volume 68, Issue 6

577 -- 590Hongbin Zhang, Ya-feng, Meng Yuan, Jingyi Hou, Jin Zhang, Guangli Li. Image sentiment analysis based on distillation and sentiment region localization network
591 -- 604Xin Yuan, Jiapeng Li, Weiwei Wang, Xiaoteng Zhou, Ning Li, Changli Yu. Improved YOLOv9 for underwater side scan sonar target detection
605 -- 616Yuke Li, Yong Wang, Bin Jiang. Offset attention with seed generation for point cloud completion
617 -- 634Yuetian Cao, Jin Liu, Zijun Yu, Xingye Li, Lai Wei, Zhongdai Wu. Vessel re-identification by a hierarchical perceptual aggregation network with inclination-aware attention
635 -- 648Xin Wen, Xiaohui Yang. MAPBFT: multilevel adaptive PBFT algorithm based on discourse and reputation models
649 -- 662HuiHui Zhang. Unbiased training framework on deep reinforcement learning
663 -- 674Jinyong Wang, Ce Zhang. Optimal selection of software reliability growth model for open-source software using weighted Grey relational analysis method
675 -- 683Ying Pan, Na Lyu. Attack-Oblivious Node Protection Strategy for survivable routing in airborne tactical networks under uncertainty
684 -- 696Yan Zhang, Liangliang Wang, Yiyuan Luo, Kai Zhang, Yu Long 0001, Kefei Chen. TBFL: blockchain-enabled trusted byzantine-robust federated learning framework for photovoltaic power generation forecasting
697 -- 705Sumin Li, Zhen Xie, Xiuqin Pan. Feature refinement and attention enhancement for click-through rate prediction
706 -- 716Du Qi, Feng Wang, Hui Huang, Jinlin Chen. Improving LAMMPS performance for molecular dynamic simulation on large-scale HPC systems

Volume 68, Issue 5

445 -- 459Avanthika Vineetha Harish, Kimberly Tam, Kevin D. Jones. Generating training events for building cyber-physical security skills
460 -- 478Shang Shang, Xinqiang Zhao, Zhongjiang Yao, Yepeng Yao, Liya Su, Zijing Fan, Xiaodan Zhang, Zhengwei Jiang. Can LLMs deeply detect complex malicious queries? A framework for jailbreaking via obfuscating intent
479 -- 486Hongliang Sun, Zhihui Liu, Chao Wang, Dan Li. Admission control algorithm for visible light communication random access network under delay and jitter constraints
487 -- 501Zhongjun Yang, Jixue Zhang, Beimin Su. Internet of vehicles intrusion detection method based on CFS-COA feature selection and spatio-temporal feature extraction
502 -- 509Lina Ba, Heping Zhang. Structure connectivity of folded cross cubes
510 -- 519Yang Chen, Chunlu Zhao, Jin Pan, Yang Liu. Verifiable attribute-based multi-keyword ranked search scheme in blockchain
520 -- 538Qiqing Xia, Qianru Zhu, Huiqin Xie, Li Yang. Algorithm for solving quantum linear systems of equations with coherent superposition and extended applications
539 -- 551Prasanth Aruchamy, M. Sundarrajan, Mani Deepak Choudhry, Akshya Jothi. Enhancing security of medical images using code-based intermittent encryption and convolutional neural network
552 -- 564Yaxun Jia, Zhu Yuan, Haoyang Wang, Yunchao Gong, Haixiang Yang, Zuo-Lin Xiang. Variations towards an efficient drug-drug interaction
565 -- 576Muhammad Inaam Ul Haq, Qianmu Li, Khalid Mahmood 0002, Ayesha Shafique, Rizwan Ullah. BioElectra-BiLSTM-Dual Attention classifier for optimizing multilabel scientific literature classification

Volume 68, Issue 4

331 -- 345Jordan Nelson, Michalis Pavlidis, Andrew Fish, Stelios Kapetanakis, Nikolaos Polatidis. ChatGPT-driven machine learning code generation for android malware detection
346 -- 354Xinyi Chen, Bo Liu 0014, Xueshu Hong, WangQun Chen, Houjie Qiu, Xingkong Ma. Relation as text: a semantic-preserving method for relational triple extraction
355 -- 359Maoqun Yao, Ziwei Xue, Haiwei Li, Shanhu Shen. An optimized hardware implementation of SHA-256 round computation
360 -- 371Yuming Lin 0001, Yinghao Zhang, Yan Yang, You Li 0007, Jingwei Zhang 0003. Self-adaptive smoothing model for cardinality estimation
372 -- 396Wenlong Shi, Jing Zhang 0040, Xiaoping Chen, Xiucai Ye. PCDP-CRLPPM: a classified regional location privacy-protection model based on personalized clustering with differential privacy in data management
397 -- 406Yuanzhao Guo, Jun Zhang. Remote sensing image dehazing method in mountaineering equipment
407 -- 418Xiaorui Chen, Xiangxue Li. TinyThunder: enabling asynchronous Byzantine fault tolerance with optimal communication efficiency
419 -- 430Yingjie Wang, Chengye Zhang, Fengbo Bai, Zumin Wang, Jing Qin 0007. FINB: a Japanese named entity recognition model based on multi-feature integration method
431 -- 443Qingqiang Qi, Xingye Yang, Chengyu Hu, Peng Tang, Zhiyuan Su, Shanqing Guo. FLDS: differentially private federated learning with double shufflers

Volume 68, Issue 3

217 -- 227Rakesh Ranjan Behera, Debasis Gountia. A secure fault detection for digital microfluidic biochips
228 -- 240Ruiting Liu, Ruixiang Li, Wenqi Shi, Shaoyong Du, Yimin Liu, Xiangyang Luo. UeLP: accurate user linkage across social platforms against location errors
241 -- 260Yue Zhang, Chen Jue, Wanxiao Liu, Yurui Ma. GRAN: a SDN intrusion detection model based on graph attention network and residual learning
261 -- 272Anastassis Voudouris, Aristomenis Tressos, Apostolis Zarras, Christos Xenakis. Game on: a performance comparison of interpolation techniques applied to Shamir's secret sharing
273 -- 282Hangda Liu, Boyu Diao, Wenxin Chen, Yongjun Xu 0001. A resource-aware workload scheduling method for unbalanced GEMMs on GPUs
283 -- 305Farshad Safaei, Mohammad Mahdi Emadi Kouchak. Error and attack vulnerability of Apollonian networks
306 -- 321Xinyan Yang, Rongchuan Zhang, Shao Li, Gang Liang. Image forgery localization integrating multi-scale and boundary features
322 -- 330Qing Song 0006, Wenfeng Sun, Donghan Yang, Mengjie Hu, Chun Liu 0004. Semantic Guided Matting Net

Volume 68, Issue 2

109 -- 125Maohua Guo, Yuefei Zhu, Jinlong Fei. ProInfer: inference of binary protocol keywords based on probabilistic statistics
126 -- 134Xiaohui Hua, Qin Zhao. n-cubes
135 -- 144Nayan Kumar Sarkar, Moirangthem Marjit Singh, Utpal Nandi. Image classification with deconvolution operation and augmentation
145 -- 162Yang Zou 0001. A comparison of reserved graph grammar and edge-based graph grammar
163 -- 174Lingbin Zeng, Shixin Yao, Xinwang Liu, Liquan Xiao, Yue Qian. A clustering ensemble algorithm for handling deep embeddings using cluster confidence
175 -- 186Meng Han, Yan Zeng, Hao Shu, Lupeng Yue, Jilin Zhang, Jian Wan 0001, Yongjian Ren. Device placement using Laplacian PCA and graph attention networks
187 -- 200Jianan Liu, Yongjuan Wang, Siqi Lu, Gang Yu, Xiangyu Wang, Peixuan Feng. SAAChain: release and storage platform of digital works based on non-fungible tokens
201 -- 215Cuiping Wang, Xiaole Li, Jinwei Tian, Yilong Yin. Data transmission optimization based on multi-objective deep reinforcement learning

Volume 68, Issue 12

1857 -- 1869Guoxin Lu, Pingshan Liu, Zhen Yang. TDAF: a bi-level optimization framework for CTR prediction with temporal drift adaptation
1870 -- 1884Nan Xiang, Yaoyao Jiang, Qianxi Liu. Multi-curvature-based adaptive graph fusion for graph clustering
1885 -- 1908Tong Anh Tuan, Nguyen Van Truong, Pham Thuy Sy Nguyen, Hoang Viet Long. ElevateDGA: enhancing botnet classification through prioritized selection learning
1909 -- 1925Chang Hu, Zhuoqun Xia, Wenbing Zhao, Mingfeng Huang, Jianyin Yao, Jingren Pan. TranRAT: a lightweight anomaly detection model based on unsupervised learning for insider stealthy attacks in SAS
1926 -- 1937Tung-Shou Chen, Guan-Zhong Su, Wien Hong, Tsai-Fu Chen. An enhanced dynamic multi-grouping approach for AMBTC images using pairwise grouping
1938 -- 1948Ting Tian, Shumin Zhang, He Li. Cyclic connectivity and cyclic diagnosability of alternating group graphs
1949 -- 1956Yi Liu, Yefang Chen, Yu Xin. A dual graph embedding based node classification method
1957 -- 1966Liwen Tan, Yi Zhou, Yin Liu, Yin Cao. EDTC: enhanced depth of text comprehension in automated audio captioning
1967 -- 1979Yuanjing Luo, Xichen Tan, Jiaohua Qin, Zhiping Cai. BlkInfoM: versatile blockchain-based mapping mechanism for secure information transmission
1980 -- 1995Xiaobing Xiong, Zihan Sha, Hui Shu, Ran Wei. Code obfuscation based on deep integration
1996 -- 2008Sidra Akhtar, S. A. M. Gilani, Aamir Wali, Arshad Ali 0002. High-quality recovery of digital images
2009 -- 2019Chengbo Wang, Guangsheng Feng, Hongwu Lv, Xiao Han, Huiqiang Wang. Digital-twin-enabled task offloading for industrial internet of things based on prospect theory framework
2020 -- 2030Quanbo Yuan, Hongce Chen, Yanpei Li, Guosheng Wei, Huijuan Wang, Juanping Geng, Guohui Jing. Performance enhancement research on channel pruning and semantic decoupling in self-supervised learning networks
2031 -- 2058Ernest Akpaku, Jinfu Chen 0001, Mukhtar Ahmed, William Leslie Brown-Acquaye, Francis Kwadzo Agbenyegah, Rexford Nii Ayitey Sosu. Detecting encrypted malicious traffic with HEAT: a header-focused deep learning approach
2059 -- 2071Xiansheng Cao, Junfeng Wang, Peng Wu. HySELoc: a hybrid semantic-enhanced approach for interpretable vulnerability localization

Volume 68, Issue 11

1595 -- 1609Tenglong Ren, Xiaowang Zhang, Zhiyong Feng 0001. Optimization of Kleene closure regular path query on large RDF graphs
1610 -- 1627Nan Li 0007, Yingjiu Li, Yangguang Tian. STPCH: strongly traceable policy-based chameleon hash for blockchain rewriting
1628 -- 1640Liqin Xiong, Lei Cao 0007, Xiliang Chen, Jun Lai, Xijian Luo, Xiaoyan Wang, Legui Zhang, Haoyang Dong. Improving value factorization for multi-agent deep reinforcement learning via individual contribution
1641 -- 1656Bibhuti Das 0001, Krishnendu Mukhopadhyaya. k -circle formation by asynchronous fat robots
1657 -- 1681Himanshu Nandanwar, Rahul Katarya. Privacy-preserving data sharing in blockchain-enabled IoT healthcare management system
1682 -- 1698Jie Liu, Wei Wang, Weijian Qiu, Gangyong Zuo. Gaussian process regression based on random projections and dynamic pseudo-input selection
1699 -- 1710Fatemeh Taheri, Kambiz Rahbar. Content-based image retrieval based on luminance and texture decomposition
1711 -- 1731Hakan Aydin, Gulsum Zeynep Gurkas Aydin, Ahmet Sertbas, Muhammed Ali Aydin. Design of an autonomous multi-agent-based defense system against DDoS attacks in the Industrial Internet of Things (IIoT) environment
1732 -- 1742Haizhen Wang, Jiawen Shi. Improved HotStuff consensus algorithm based on reputation mechanism grouping
1743 -- 1754Soran Badawi. HopeDetect: a multicomponent deep learning framework for hope detection in Kurdish language
1755 -- 1771Yalan Wang, Liqun Chen, Yangguang Tian, Long Meng, Christopher J. P. Newton. AVPEU: anonymous verifiable presentations with extended usability
1772 -- 1784Yong Liu, Zejun Xiang 0001, Shasha Zhang, Xiangyong Zeng. MILP-based automatic search algorithms for differential-linear distinguishers
1785 -- 1797Jing Zhang, Jian Mao, Zhenxiang Chi, Zhiqiang Wang, Wu Zhang, Jun Liu, Xiu Jin, Yuan Rao 0003. Knowledge distillation with adaptive frequency prompting
1798 -- 1812Yixin Ma, Jiaping Lin, Junhao Zeng, Xinyan Yang, Kui Zhao, Gang Liang. Automated irrelevant individuals recognition algorithm in video via motion trajectories
1813 -- 1825Yang Chen, Dianxi Shi, Huanhuan Yang, Tongyue Li, Zhen Wang 0052. Excellent-student learning method for decentralized MARL with networked agents system
1826 -- 1840Fatema Alshaikh, Nabil Hewahi. An adaptive pedagogical model based on the classifier system and reinforcement learning
1841 -- 1853Xiaolan Zhu, Junfeng Wang 0003, Zihua Song, Peng Wu 0036. RTsFCM: a robust two-stage flow correlation method for traffic tracking in anonymous communication

Volume 68, Issue 10

1345 -- 1354Haitao Wang. Energy efficient data transmission scheme integrating clustering and compressive sensing in wireless sensor networks
1355 -- 1363Angelo Monti, Blerina Sinaimeri. Effects of graph operations on star pairwise compatibility graphs
1364 -- 1376Kai Chen, Bo Pang, Yongqiang Li 0001, Mingsheng Wang. Secure multi-party shuffling with optimal communication
1377 -- 1385Ruidong Chen, Shuiping Guo, Baohua Qiang, Xianyi Yang, Pingping Sun, Shihao Zhang, Yuan Xie 0008. CLIP-based semantic refinement method for image-text retrieval
1386 -- 1423Nikhil Sharma, Prashant Giridhar Shambharkar. Towards secure healthcare: SA-GBO-ODBN model utilizing Blockchain and deep learning for data handling and diagnosis
1424 -- 1435Longxia Huang, Xue Mao, Chengzhi Ge. BDEA: blockchain-based secure deduplication for low-entropy data supporting public auditing
1436 -- 1449Jiadong Shi, Wenjin Wang, Qiang Zhou 0010, Liangmin Wang 0001. Multiscale fingerprinting for robust website fingerprinting attack
1450 -- 1462Ameen Al-Azzawi, Gábor Lencse. Methodology for the security analysis of IPv4-as-a-Service IPv6 transition technologies
1463 -- 1475Qi Zhou, Xuechun Mao, Ying Chen. A DDoS attack detection method combining federated learning and hybrid deep learning in software-defined networking
1476 -- 1484Ayleen Irribarra-Cortés, Roberto Javier Asín Achá, José Fuentes Sepúlveda, Diego Seco. Heuristic-based computation of tailored spanning trees to speed up compact planar graphs
1485 -- 1501Masahiro Shibata, Naoki Kitamura, Ryota Eguchi, Yuichi Sudo, Junya Nakamura 0001, Yonghwan Kim 0001. Partial gathering of mobile agents in dynamic tori
1502 -- 1509Xuemin Wu, Liqiong Xu. n th Cartesian product of the balanced complete multipartite graph under various hypotheses
1510 -- 1522Jinlei Liu, Linbo Zhai. Joint task offloading and resource allocation for vehicle edge computing
1523 -- 1534Qiuyu Li, Zuhe Li, Weihua Liu, Xiaojiang He, Yushan Pan. Sarcasm-GPT: advancing sarcasm detection with large language models
1535 -- 1545Chen Guo 0005, Yaoyao Luo, Zhifang Xiao. Node-edge hybrid diagnosability and conditional node-edge hybrid diagnosability under the HPMC* model
1546 -- 1554Ching-Kuo Hsu. Enhanced SAC-RNN-based collision-avoidance methods in UAV networks with leader-follower scenario
1555 -- 1564Deshun Li, Xinlong Zhao, Qiuling Yang, Yuyin Tan. Research on Reliability of DPCell structure
1565 -- 1578Zengxie Ma, Yao Xin, Ning Hu, Tong Li 0014, Zhaorui Zhang, Feng Zhang 0007. REFS: a novel framework for accelerated receive encrypted flow steering
1579 -- 1593Ahmad Bilal, Hamid Turab Mirza, Adnan Ahmad, Ibrar Hussain 0001, Ali Raza, Helena Garay, Josep Alemany Iturriaga, Imran Ashraf 0003. On the correlation between Google Play Store application icons and downloads

Volume 68, Issue 1

1 -- 12Min Peng, Xianxin Fu, Benling Ge, Lusheng Wang. Wi-Crack: a smartphone keystroke recognition system based on multi-dimensional information
13 -- 22Fengjun Zhang, Lisheng Huang, Kai Shi, Shengjie Zhai, Yunhai Lan, Qinghua Li. Intrusion detection based on hybrid metaheuristic feature selection
23 -- 31Alejandro Díaz-Caro, Marcos Villagra. Classically time-controlled quantum automata: definition and properties
32 -- 46Martita Muñoz, José Fuentes Sepúlveda, Cecilia Hernández, Gonzalo Navarro 0001, Diego Seco, Fernando Silva-Coira. Clustering-based compression for raster time series
47 -- 57Hui Dong, Huaqun Wang, Mengjie Lv, Weibei Fan. Disjoint paths construction algorithm in the data center network DPCell
58 -- 73Nasreddine Hajlaoui, Chaima Bejaoui, Tayssir Ismail, Houaida Ghanmi, Haifa Touati. A hybrid architecture for secure data sharing in multi-clouds system
74 -- 83Juhong Zheng, Lei Zhang, Jingbo Zhang, Meibo Lv. Maximum fault-free enforcement in Petri nets using supervisory control
84 -- 96Jian Kuang, Bailin Xie, Jianzhen Luo, Jianhong Li. Reliable broadcasting-based content acquisition for named data MANETs
97 -- 108Li-Han Zhang, Shu-Han Yang, Dan-Yang Lv, Ji-Bo Wang. Research on convex resource allocation scheduling with exponential time-dependent learning effects