Abstract is missing.
- VOABE: An Efficient Verifiable Outsourced Attribute-Based Encryption for Healthcare SystemsJunze Lu, Chunqiang Hu, Tao Xiang 0001, Wei Li 0059, Jiguo Yu. 3-14 [doi]
- Topological Network-Control Games Played on GraphsZihui Liang, Bakh Khoussainov, Haidong Yang. 15-26 [doi]
- FAIR: Accurate Data Acquisition for Mobile CrowdsensingFuyuan Xia, Chenhao Ying 0001, Wei Chen, Xikun Jiang, Liwei Lin, Yuan Luo 0003. 27-39 [doi]
- *) ModelAoshuai Tan, Chen Guo 0005, Shengbo Chen, Yaoyao Luo, Xin He, Ming Tu, Zhonghao Yao. 40-52 [doi]
- Sponsored Search Auction Design Beyond Single Utility MaximizationChangfeng Xu, Chao Peng 0004, Chenyang Xu 0002, Zhengfeng Yang. 53-65 [doi]
- An On-Orbit Data Balancing Online Algorithm For LEO Satellite Cluster: A Repeated Stochastic Game ApproachYing Qiao, Juan Luo, Shuyang Teng. 66-78 [doi]
- Resource-Limited Network Security Games with General Contagious AttacksRufan Bai, Chao Xu, Chenyang Xu 0002, Ruilong Zhang 0001. 79-91 [doi]
- HR-Tree: A Hybrid PMem-DRAM and Write-Optimized R-Tree for Spatial Data StorageRui Zhang, Yukai Huang, Lulu Chen, Shangyi Sun, Ming Yan, Jie Wu 0003. 92-103 [doi]
- A Distributed Computation Offloading Scheme Based on Stackelberg Game in MECWeifeng Sun, Yixing Qin, Bowei Zhang. 104-115 [doi]
- Target Influence Maximization Against Overexposure Under Threshold-Dependent Model in Online Social NetworksXiaoping Zhu, Jianming Zhu, Guoqing Wang, Peikun Ni. 116-127 [doi]
- A Partition-and-Merge Algorithm for Solving the Steiner Tree Problem in Large GraphsMing Sun, Xinyu Wu, Yi Zhou 0016, Jin-Kao Hao, Zhang-Hua Fu. 128-139 [doi]
- Analyzing the Vulnerabilities of Targets in Clean-Label Data Poisoning AttacksYaoyu Jin, Xiaochun Yang 0001, Jian Li, Rong Pu, Yujie Wang, Bin Wang 0015. 140-151 [doi]
- An Approach to Tight I/O Lower Bounds for Algorithms with Composite ProceduresRui Xia, Ligang Cao, Huajian Zhang, Jihu Guo, Xiaowei Guo, Jie Liu 0002, Huaimin Wang. 152-163 [doi]
- Hedonic Games for Federated Learning with Model Sharing DataYuqing Zhu 0002, Chuanwen Luo, Deying Li 0001. 164-175 [doi]
- K-Division Framework Enhances GNNs' Expressive PowerDun Ma, Suixiang Gao, Wenguo Yang. 176-188 [doi]
- An Innovative Irregular Nesting Algorithm for Flaw AvoidanceHongji Zhu, Liping Chen, Shuguang Han. 189-201 [doi]
- Efficient Partitioning Algorithms for Optimizing Big Graph ComputationBaoling Ning, Yupeng Gao. 202-213 [doi]
- Distributed Generalized Deutsch-Jozsa AlgorithmHao Li, Daowen Qiu, Le Luo. 214-225 [doi]
- Average AoI Optimization at Wireless-Powered Network Edge with Stochastic ArrivalsQuan Chen 0003, Jungen Xia, Jing Li 0093, Yuan Chai, Hong Gao 0001, Zhipeng Cai 0001. 226-237 [doi]
- Proactive Bi-objective Multi-path Planning for Wireless Sensor NetworksYamin Wang, Xiaoping Li 0001, Shuai Ma, Yuan Li, Qianfan Jia, Yizheng Li, Zhiqiang Wu, Qing Feng. 238-251 [doi]
- TCFNet: Temporal-Correlated Feature Fused Network for Multivariate Time Series ClassificationWenlong Liang, Chenghao Li, Yahui Zhao, Zhenguo Zhang. 252-264 [doi]
- Strong Chromatic Index of Graphs with Small GirthYuehua Bu, Hongrui Zheng, Hongguo Zhu. 265-271 [doi]
- A Space Efficient Algorithm for Multiset Multicover with Multiplicity Constraints Problem via Algebraic MethodPu Wu, Huiqin Jiang, Zehui Shao, Jin Xu 0002. 272-286 [doi]
- Generative Flow Networks for Influence Maximization in Social NetworksZizhen Zhang, Deying Li 0001, Yongcai Wang, Wenping Chen, Yuqing Zhu 0002. 287-299 [doi]
- Construction Algorithm of Vertex-Disjoint Paths in Circulant-Based Recursive NetworksXiaoqing Liu, Hai Liu 0001, Baolei Cheng, Yan Wang 0078, Jianxi Fan. 300-312 [doi]
- Enumerating Floorplans with Any Set of ColumnsYosuke Kikuchi, Shin-Ichi Nakano. 313-323 [doi]
- Streaming Algorithm for Balance Gain and Cost with Cardinality Constraint on the Integer LatticeJingjing Tan, Cuiping Ge, Fengmin Wang, Ziyang Li. 324-331 [doi]
- Enhancing Crowding Event Detection on Campus with Multidimensional Logs: A Meta-Heuristic Search ApproachMaoyi Wang, Jiajie Shen, Jack Mao, Jihan Dai, Bochun Wu, Yun Xiong, Xin Wang 0002. 332-342 [doi]
- Construction of Binary Cooperative MSR Codes with Multiple Repair DegreesLei Li, Xinchun Yu, Yaqian Zhang, Liang Chen, Yuanyuan Dong, Chenhao Ying 0001, Yuan Luo 0003. 343-354 [doi]
- Opportunistic Routing Using Q-Learning with Context InformationXiaojing Liu, Jiayu Cui, Winston K. G. Seah, Xiaodong Xu, Gang Xu, Celimuge Wu. 355-367 [doi]
- A Combinatorial View of Holant Problems on Higher DomainsYin Liu. 368-380 [doi]
- Labor: Adaptive Lazy Compaction for Learned Index in LSM-TreeChunpu Huang, Yukai Huang, Lulu Chen, Rui Zhang, Ming Yan, Jie Wu 0003. 381-393 [doi]
- A Distributed Algorithm for Rumor Blocking on Social NetworksRuidong Yan, Zhenhua Guo 0003, Yaqian Zhao, RenGang Li, Xingjian Ding. 394-406 [doi]
- Convex-Area-Wise Linear Regression and Algorithms for Data AnalysisBohan Lyu 0002, Jianzhong Li 0001. 407-419 [doi]
- Approximating Continuous Multi-agent Contracts with Lyapunov Function MethodsQinqin Gong, Donglei Du, Ling Gai, Dachuan Xu, Ruiqi Yang. 420-431 [doi]
- Privacy-Preserving Byzantine-Robust Federated Learning via Multiparty Homomorphic EncryptionWenhao Jiang, Songwei Luo, Shaojing Fu, Lin Liu 0018, Yuchuan Luo. 432-446 [doi]
- Perfect Indistinguishability Obfuscation for Boolean Polynomial Vector Spaces via LearningNing Ding. 447-461 [doi]
- IterLara: A Concise General-Purpose Algebraic ModelHongxiao Li, Wanling Gao, Lei Wang 0004, Jianfeng Zhan. 462-477 [doi]
- The Voronoi Diagram of Weakly Smooth Planar Point Sets in O(log n) Deterministic Rounds on the Congested CliqueJesper Jansson 0001, Christos Levcopoulos, Andrzej Lingas, Quan Xue. 478-489 [doi]
- Binary Jumbled Pattern Matching: Suffix Tree IndexingLuís Cunha, Mário Medina. 490-501 [doi]
- GraphDHV: Graph Neural Network with Dual Hybrid View on Imbalanced Node ClassificationLongqing Du, Guangquan Lu, Yadan Han, Zhiping Luo, Guoqiu Wen, Liang Zhang, Wanxin Chen, Shichao Zhang 0001. 502-513 [doi]
- Accelerating Topic-Sensitive PageRank by Exploiting the Query HistoryShufeng Gong, Zhixin Zhang, Jing Lu, Yanfeng Zhang, Cong Fu, Ge Yu 0001. 514-525 [doi]
- Extracting Representative Co-location Patterns Considering Distributions of Spatial Features and InstancesXuguang Bao, Shuaikang Yuan, Liang Chang 0003. 526-537 [doi]
- Parallel Truss Maintenance Algorithms for Dynamic HypergraphsMeng Wang, Qiang-Sheng Hua, Yefei Wang, Hai Jin 0001, Zhiyuan Shao. 538-550 [doi]
- Topological Vulnerability-Based Imperceptible Node Injection Attack Against Dynamic Graph Neural NetworkHui Xia 0001, Yanan Jiang, Mingda Ma, Rui Zhang 0050, Yang You. 551-562 [doi]