| 169 | -- | 177 | Huiru Zhang, Ruixiao Liu, Huijuan Liu. Information security based on featureless attack algorithm |
| 178 | -- | 187 | Xianmeng Meng, Cuicui Cai, Linglong Tan, Qijian Wang. Resource allocation for wireless networks based on enhanced Harris hawks optimisation algorithm |
| 188 | -- | 198 | Zhilei Ying, Yanan Meng, Ruoxi Chen, Jianlou Lou. HKB-YOLO: transmission line fire detection method based on hierarchical feature fusion |
| 199 | -- | 209 | P. S. Rohini, I. Sowmy. Hybrid VGG-DenseNet for anomalous behaviour detection in crowded video scenes |
| 210 | -- | 223 | Kiruthika Jagannathan, Shina Sheen. Dynamic deception-based technique for crypto-ransomware detection |