Sign in
Comput. J.
1958
1980
2001
2023
1958
2023
Keyphrases
Publications
volume 66, number 5, 2023
Xiaoli Dong
,
Yongzhuang Wei
,
Wen Gao
,
Jie Chen
New Meet-in-the-Middle Attacks on FOX Block Cipher.
Comput. J.
66 (5) (2023)
Md Abu Marjan
,
Md. Palash Uddin
,
Masud Ibn Afjal
An Educational Data Mining System For Predicting And Enhancing Tertiary Students' Programming Skill.
Comput. J.
66 (5) (2023)
Zhen Shi
,
Chenhui Jin
Linear Attacks On SNOW 3G And SNOW-V Using Automatic Search.
Comput. J.
66 (5) (2023)
Hao Guo
,
Zhiyu Zhang
,
Qianqian Yang
,
Lei Hu
,
Yiyuan Luo
A New Method To Find All The High-Probability Word-Oriented Truncated Differentials: Application To Midori, SKINNY And CRAFT.
Comput. J.
66 (5) (2023)
Xiaodi Wang
,
Xiaoge Pan
,
Tian Yang
,
Jianhua Xie
,
Mingwei Tang
Aspect-Based Sentiment Analysis Using Interaction Matrix And Global Attention Neural Network.
Comput. J.
66 (5) (2023)
Luming Yang
,
Shaojing Fu
,
Yongjun Wang
,
Kaitai Liang
,
Fan Mo
,
Bo Liu
DEV-ETA: An Interpretable Detection Framework for Encrypted Malicious Traffic.
Comput. J.
66 (5) (2023)
Mona Mosa
,
Nedaa Agami
,
Ghada Elkhayat
,
Mohamed Kholief
A Novel Hybrid Segmentation Approach for Decision Support: A Case Study in Banking.
Comput. J.
66 (5) (2023)
Sudhin Chandran
,
R. Rajesh
,
M. Dev Anand
Laser Beam Welded Aluminum-Titanium Dissimilar Sheet Metals: Neural Network Based Strength and Hardness Prediction Model.
Comput. J.
66 (5) (2023)
Guofeng Tang
,
Zhenfeng Zhang
Two-Party Signing For ISO/IEC Digital Signature Standards.
Comput. J.
66 (5) (2023)
Mengzhu Yu
,
Zhenjun Tang
,
Zhixin Li
,
Xiaoping Liang
,
Xianquan Zhang
Robust Image Hashing With Saliency Map And Sparse Model.
Comput. J.
66 (5) (2023)
J. Shobana
,
M. Murali
An Improved Self Attention Mechanism Based on Optimized BERT-BiLSTM Model for Accurate Polarity Prediction.
Comput. J.
66 (5) (2023)
Bin-Bin Cai
,
Yusen Wu
,
Jing Dong
,
Su-Juan Qin
,
Fei Gao
,
Qiao-Yan Wen
Quantum Attacks on 1K-AES and PRINCE.
Comput. J.
66 (5) (2023)
Shobhan Kumar
,
Arun Chauhan
A Transformer Based Encodings for Detection of Semantically Equivalent Questions in cQA.
Comput. J.
66 (5) (2023)
Bo Pang
,
Gang Liang
,
Jin Yang
,
Yijing Chen
,
Xinyi Wang
,
Wenbo He
CWSOGG: Catching Web Shell Obfuscation Based on Genetic Algorithm and Generative Adversarial Network.
Comput. J.
66 (5) (2023)
volume 66, number 6, 2023
Daniel Shumow
Incorrectly Generated RSA Keys: How I Learned To Stop Worrying And Recover Lost Plaintexts.
Comput. J.
66 (6) (2023)
Damian Arellanes
,
Kung-Kiu Lau
,
Rizos Sakellariou
Decentralized Data Flows for the Functional Scalability of Service-Oriented IoT Systems.
Comput. J.
66 (6) (2023)
Hieu Minh Truong
,
Hieu Trung Huynh
A Novel Approach For CT-Based COVID-19 Classification and Lesion Segmentation Based On Deep Learning.
Comput. J.
66 (6) (2023)
Yi Chen
,
Yantian Shen
,
Hongbo Yu
,
Sitong Yuan
A New Neural Distinguisher Considering Features Derived From Multiple Ciphertext Pairs.
Comput. J.
66 (6) (2023)
Ti Wang
,
Yongbin Zhou
,
Hui Ma
,
Rui Zhang
Flexible and Controllable Access Policy Update for Encrypted Data Sharing in the Cloud.
Comput. J.
66 (6) (2023)
Tomer Ashur
,
Mohammad Mahzoun
,
Dilara Toprakhisar
How Not To Design An Efficient FHE-Friendly Block Cipher: Seljuk.
Comput. J.
66 (6) (2023)
Corrigendum to: A Multi-Objective Randomly Updated Beetle Swarm and Multi-Verse Optimization for Brain Tumor Segmentation and Classification.
Comput. J.
66 (6) (2023)
Shusen Wu
,
Xiaoshe Dong
,
Heng Chen
,
Longxiang Wang
,
Qiang Wang
,
Zhengdong Zhu
Simplified High Level Parallelism Expression on Heterogeneous Systems through Data Partition Pattern Description.
Comput. J.
66 (6) (2023)
Shichang Wang
,
Meicheng Liu
,
Dongdai Lin
,
Li Ma
On Grain-Like Small State Stream Ciphers Against Fast Correlation Attacks: Cryptanalysis of Plantlet, Fruit-v2 and Fruit-80.
Comput. J.
66 (6) (2023)
Sinam Ajitkumar Singh
,
Ningthoujam Dinita Devi
,
Swanirbhar Majumder
An Improved Unsegmented Phonocardiogram Classification Using Nonlinear Time Scattering Features.
Comput. J.
66 (6) (2023)
Chitchanok Chuengsatiansup
,
Eyal Ronen
,
Gregory G. Rose
,
Yuval Yarom
Row, Row, Row Your Boat: How to Not Find Weak Keys in Pilsung.
Comput. J.
66 (6) (2023)
Nina Bindel
,
Sarah McCarthy
The Need for Being Explicit: Failed Attempts to Construct Implicit Certificates from Lattices.
Comput. J.
66 (6) (2023)
Corrigendum to: IoT Data Quality Issues and Potential Solutions: A Literature Review.
Comput. J.
66 (6) (2023)
Satish Muppidi
,
Om Prakash P. G
,
B. Kishore
Dragonfly Political Optimizer Algorithm-Based Rider Deep Long Short-Term Memory for Soil Moisture and Heat Level Prediction in IoT.
Comput. J.
66 (6) (2023)
Hisaki Kobayashi
,
Yuichi Sudo
,
Hirotsugu Kakugawa
,
Toshimitsu Masuzawa
A Self-Stabilizing Distributed Algorithm for the Generalized Dominating Set Problem With Safe Convergence.
Comput. J.
66 (6) (2023)
Ahmet Gökçen
,
Alkim Gokcen
,
Savas Sahin
Prediction of Li-Ion Battery Discharge Patterns in IoT Devices Under Random Use Via Machine Learning Algorithms.
Comput. J.
66 (6) (2023)
Hailong Zhang
,
Wei Yang
Template Attack Assisted Linear Cryptanalysis on Outer Rounds Protected DES Implementations.
Comput. J.
66 (6) (2023)
Tomer Ashur
,
Chris J. Mitchell
Special Issue on Failed Approaches and Insightful Losses in Cryptology - Foreword.
Comput. J.
66 (6) (2023)
Pravin Narayan Kathavate
Role of Machine Learning on Key Extraction for Data Privacy Preservation of Health Care Sectors in IoT Environment.
Comput. J.
66 (6) (2023)
volume 66, number 7, 2023
Wanwan Zheng
,
Mingzhe Jin
Improving the Performance of Feature Selection Methods with Low-Sample-Size Data.
Comput. J.
66 (7) (2023)
He Li
,
Yanna Liu
,
Shuqi Yang
,
Yishuai Lin
,
Yi Yang
,
Jaesoo Yoo
An Improved Hill Climbing Algorithm for Graph Partitioning.
Comput. J.
66 (7) (2023)
Shiyou Xu
,
Jian Wang
,
Liangliang Wang
Indistinguishable Leakage-Resilient Circuit Compiler.
Comput. J.
66 (7) (2023)
Yeting Li
,
Haiming Chen
,
Zixuan Chen
Learning Disjunctive Multiplicity Expressions and Disjunctive Generalize Multiplicity Expressions From Both Positive and Negative Examples.
Comput. J.
66 (7) (2023)
Veluguri Sureshkumar
,
Rajasomashekar Somarajadikshitar
,
B. Sarala Beeram
A Novel Representation and Prediction Initiative for Underground Water by Using Deep Learning Technique of Remote Sensing Images.
Comput. J.
66 (7) (2023)
Tiziana Calamoneri
,
Daniele Tavernelli
Modeling and Approximating the Visit of a Set of Sites With a Fleet of UAVs.
Comput. J.
66 (7) (2023)
Muath AlShaikh
A Novel Reduced Reference Image Quality Assessment Based on Formal Concept Analysis.
Comput. J.
66 (7) (2023)
Elham Raisi Sarbizhan
,
Mohammad Mehdi Zahedi
,
Marzieh Shamsizadeh
-graph Automata And Some Applications.
Comput. J.
66 (7) (2023)
Zhiruo Zhao
,
Lei Cao
,
Xiliang Chen
,
Jun Lai
,
Legui Zhang
Improvement of MADRL Equilibrium Based on Pareto Optimization.
Comput. J.
66 (7) (2023)
Aravindkumar Sekar
,
Varalakshmi Perumal
A Novel SGD-U-Network-Based Pixel-Level Road Crack Segmentation and Classification.
Comput. J.
66 (7) (2023)
Poongodi K
,
Dhananjay Kumar
Mining Frequent Serial Positioning Episode Rules with Forward and Backward Search Technique from Event Sequences.
Comput. J.
66 (7) (2023)
Samer Kais Jameel
,
Jafar Majidpour
,
Abdulbasit K. Al-Talabani
,
Jihad Anwar Qadir
Face Identification Using Conditional Generative Adversarial Network.
Comput. J.
66 (7) (2023)
Jan A. Bergstra
,
John V. Tucker
On The Axioms Of Common Meadows: Fracterm Calculus, Flattening And Incompleteness.
Comput. J.
66 (7) (2023)
Anjushi Verma
,
Tirthankar Gayen
Reliability Assessment of Combined Hardware-Software Non-repairable Time-Critical Systems.
Comput. J.
66 (7) (2023)
Diego Teijeiro
,
Margarita Amor
,
Ramón Doallo
,
David Deibe
Interactive Visualization of Large Point Clouds Using an Autotuning Multiresolution Out-Of-Core Strategy.
Comput. J.
66 (7) (2023)
Muhammad Umar Nasir
,
Urva Rehmat
,
Imran Ahmad
Social Media Analysis of Customer Emotions in Pizza Industry.
Comput. J.
66 (7) (2023)
Lingyuan Yin
,
Jing Xu
,
Zhenfeng Zhang
Interopera: An Efficient Cross-Chain Trading Protocol.
Comput. J.
66 (7) (2023)