- Bohan Cui, Yan Hu, Tianheng Qu, Yunhua He, Limin Sun. A novel zero-day ransomware detection approach based on CVAE and 1D-CNN. High Confid. Comput., 6(1):100338, 2026.
- Xinyuan Liu, Yinhao Li, Rajiv Ranjan 0001, Devki Nandan Jha. Pluggable AI-based real-time stragglers detection framework in Hadoop. High Confid. Comput., 6(1):100341, 2026.
- Qingcai Luo, Hui Li 0005, Xiaolin Yang, Hong Qin. Secure three-party clustering with identifying malicious behavior. High Confid. Comput., 6(1):100342, 2026.
- Ximeng Chen, Si Wu 0003, Yinlong Xu 0001. Localitycache: Toward efficient straggler tolerance in LRC-coded storage via caching local parity blocks. High Confid. Comput., 6(1):100339, 2026.
- Jingyu Zhang, Wentao Peng, Anyan Xiao, Tao Liu, Junchao Fu, Jian Chen, Zhuo Yan. KANs-DETR: Enhancing Detection Transformer with Kolmogorov-Arnold Networks for small object. High Confid. Comput., 6(1):100336, 2026.
- Gokhan Sahin. A low-complexity decorrelation method for PHY-based key generation. High Confid. Comput., 6(1):100323, 2026.
- Farzana Zahid, Anjalika Sewwandi, Lee Brandon, Vimal Kumar, Roopak Sinha. Securing educational LLMs: A generalised taxonomy of attacks on LLMs and DREAD risk assessment. High Confid. Comput., 6(1):100371, 2026.
- Guangyong Shang, Guangpeng Qi, Jianing Ren, Xianqi Jin, Wanjiang Shen, Junchao Li, Runyu Pan. LwRustIP: Memory-safe and efficient embedded networking stack with ownership semantics. High Confid. Comput., 6(1):100351, 2026.
- Jia Zheng, Wanjin Hou, Hua Zhang, Ming Lv, Huiyu Zhou. A fast gray-box adversarial example generation algorithm based on FakeBob. High Confid. Comput., 6(1):100337, 2026.
- Zhiguo Liu, Yan Huang 0032, Junyu Mai, Wei Li 0059, Zhipeng Cai 0001, Yingshu Li 0001. Is the metaverse really coming to fruition? A survey of applied metaverse and extended reality. High Confid. Comput., 6(1):100376, 2026.