| 2 | -- | 4 | Daniel Zeng, Zhaohui Wu. From Artificial Intelligence to Cyborg Intelligence |
| 5 | -- | 13 | Xi Chen, Lan Zhang, Wei Li. A Network Evolution Model for Chinese Traditional Acquaintance Networks |
| 14 | -- | 21 | Daojing He, Sammy Chan, Yan Zhang, Chunming Wu, Bing Wang. How Effective Are the Prevailing Attack-Defense Models for Cybersecurity Anyway? |
| 22 | -- | 29 | Sumanta Kumar Das. Modeling Intelligent Decision-Making Command and Control Agents: An Application to Air Defense |
| 30 | -- | 39 | Wen Gao, YongHong Tian, Tiejun Huang, Siwei Ma, Xianguo Zhang. The IEEE 1857 Standard: Empowering Smart Video Surveillance Systems |
| 40 | -- | 46 | André Klahold, Patrick Uhr, Fazel Ansari, Madjid Fathi. Using Word Association to Detect Multitopic Structures in Text Documents |
| 48 | -- | 56 | Tao Wang, Zhong Liu, Baoxin Xiu, Hong Mo, Qingpeng Zhang. Characterizing the Evolution of Social Computing Research |
| 57 | -- | 61 | Shaheen Fatima, Sarit Kraus, Michael Wooldridge. The Negotiation Game |
| 62 | -- | 69 | Mary Missy Cummings. Man versus Machine or Man + Machine? |
| 70 | -- | 73 | Daniel E. O'Leary. Embedding AI and Crowdsourcing in the Big Data Lake |
| 74 | -- | 77 | Yong Wang, Changle Li, Yulong Duan, Jin Yang, Xiang Cheng. An Energy-Efficient and Swarm Intelligence-Based Routing Protocol for Next-Generation Sensor Networks |
| 78 | -- | 82 | Andrea Sassi, Franco Zambonelli. Coordination Infrastructures for Future Smart Social Mobility Services |
| 84 | -- | 88 | Markus Strohmaier, Claudia Wagner. Computational Social Science for the World Wide Web |