Login / Signup
Comput. J.
1958
1979
2003
2024
1958
2024
Keyphrases
Publications
volume 67, number 1, 2024
Mozamel M. Saeed
Designing Scenarios for In-Organization Training Using the CyberCIEGE Game.
Comput. J.
67 (1) (2024)
Xiaoyang Liu
,
Luyuan Gao
,
Giacomo Fiumara
,
Pasquale De Meo
Key Node Identification Method Integrating Information Transmission Probability and Path Diversity in Complex Network.
Comput. J.
67 (1) (2024)
Yin Lv
,
Danping Shi
,
Lei Hu
,
Zihui Guo
,
Yi Guo
,
Caibing Wang
Improved Linear Cryptanalysis of Block Cipher BORON.
Comput. J.
67 (1) (2024)
Nieves R. Brisaboa
,
Travis Gagie
,
Adrián Gómez-Brandón
,
Gonzalo Navarro
Two-Dimensional Block Trees.
Comput. J.
67 (1) (2024)
Vahid Amin-Ghafari
,
Mahmoud Ahmadian-Attari
An Attack on a Proposed Construction of Small-State Stream Ciphers and Proposals for New Constructions.
Comput. J.
67 (1) (2024)
Chunning Zhou
,
Wentao Zhang
,
Weiwei Cao
A New Approach of Evaluating the Security Against Differential and Linear Cryptanalysis and Its Applications to Serpent, NOEKEON and ASCON.
Comput. J.
67 (1) (2024)
Wenhan Ge
,
Junfeng Wang
SeqMask: Behavior Extraction Over Cyber Threat Intelligence Via Multi-Instance Learning.
Comput. J.
67 (1) (2024)
Joon-Young Paik
,
Rize Jin
Malware Family Prediction with an Awareness of Label Uncertainty.
Comput. J.
67 (1) (2024)
Ke Wang
,
Zhenfeng Zhang
,
Haodong Jiang
,
Huiqin Xie
,
Yanjun Li
,
Ying Sun
,
Lidong Han
Key Reuse Attacks on Post-quantum Cryptosystems, Revisited.
Comput. J.
67 (1) (2024)
Andrew Simpson
,
Matthias Dellago
,
Daniel Woods
Formalizing Attack Trees To Support Economic Analysis.
Comput. J.
67 (1) (2024)
Aissam Aouar
,
Saïd Yahiaoui
,
Lamia Sadeg
,
Nadia Nouali-Taboudjemat
,
Kadda Beghdad Bey
Distributed Partial Simulation for Graph Pattern Matching.
Comput. J.
67 (1) (2024)
Qin Luo
,
Xin Cao
PNCTS: A Prediction and Network Coding-Based Transmission Scheme for Efficient Screen Updates Delivery in DaaS.
Comput. J.
67 (1) (2024)
He Li
,
Duo Jin
,
Xuejiao Li
,
Shaojie Qiao
A Dynamic Heterogeneous Graph Convolution Network For Traffic Flow Prediction.
Comput. J.
67 (1) (2024)
Mariem Gnouma
,
Ridha Ejbali
,
Mourad Zaied
Deep Hashing and Sparse Representation of Abnormal Events Detection.
Comput. J.
67 (1) (2024)
Xu Zhang
,
Shunjie Wen
,
Liang Yan
,
Jiangfan Feng
,
Ying Xia
A Hybrid-Convolution Spatial-Temporal Recurrent Network For Traffic Flow Prediction.
Comput. J.
67 (1) (2024)
Xiaoqing Liu
,
Shuming Zhou
,
Jiafei Liu
,
Hong Zhang
Reliability Analysis of the Cactus-Based Networks Based on Subsystem.
Comput. J.
67 (1) (2024)
Sayaka Kamei
,
Sébastien Tixeuil
An Asynchronous Maximum Independent Set Algorithm By Myopic Luminous Robots On Grids.
Comput. J.
67 (1) (2024)
Lin Ding
,
Zheng Wu
,
Guixian Zhang
,
Tairong Shi
Quantum Guess and Determine Attack on Stream Ciphers.
Comput. J.
67 (1) (2024)
Jiali Shi
,
Chao Li
,
Guoqiang Liu
Differential Attack With Constants On μ2 Block Cipher.
Comput. J.
67 (1) (2024)
C. Shaji
,
I. Shatheesh Sam
Encoding with Combination Orientation Technique for RDH in Dual Stego Images.
Comput. J.
67 (1) (2024)
Tongfeng Li
,
Ruisheng Zhang
,
Bojuan Niu
,
Yabing Yao
,
Jun Ma
,
Jing Jiang
,
Zhili Zhao
Link Prediction Based On Local Structure And Node Information Along Local Paths.
Comput. J.
67 (1) (2024)
Marios C. Angelides
Thematic Editorial: Mostly Artificial Intelligence (AI) or Machine Learning (ML) Now in the Engine Room, in Pursuit of a Green Agenda.
Comput. J.
67 (1) (2024)
Xiwen Wang
,
Kai Zhang
,
Jinguo Li
,
Mi Wen
,
Shengmin Xu
,
Jianting Ning
Non-interactive Boolean Searchable Asymmetric Encryption With Bilateral Access Control.
Comput. J.
67 (1) (2024)
James Walsh
,
Oluwafunmilola Kesa
,
Andrew Wang
,
Mihai Ilas
,
Patrick O'Hara
,
Oscar Giles
,
Neil Dhir
,
Mark Girolami
,
Theodoros Damoulas
Near Real-Time Social Distance Estimation In London.
Comput. J.
67 (1) (2024)
Zhuowei Wang
,
Hao Wang
,
Xiaoyu Song
,
Jiahui Wu
Communication-Aware Energy Consumption Model in Heterogeneous Computing Systems.
Comput. J.
67 (1) (2024)
Liqing Qiu
,
Yuying Liu
,
Jianyi Zhang
A New Method for Identifying Influential Spreaders in Complex Networks.
Comput. J.
67 (1) (2024)
K. Ashwini
User Name-Based Compression and Encryption of Images Using Chaotic Compressive Sensing Theory.
Comput. J.
67 (1) (2024)
Ozgur Oksuz
A System For Storing Anonymous Patient Healthcare Data Using Blockchain And Its Applications.
Comput. J.
67 (1) (2024)
volume 66, number 8, 2023
Mingzhe Zhu
,
Wanyue Xu
,
Zhongzhi Zhang
,
Haibin Kan
,
Guanrong Chen
Resistance Distances In Simplicial Networks.
Comput. J.
66 (8) (2023)
Jianen Yan
,
Haiyan Xu
,
Ning Li
,
Zhaoxin Zhang
Large-Scale Emulation Network Topology Partition Based on Community Detection With the Weight of Vertex Similarity.
Comput. J.
66 (8) (2023)
Manisha Kumawat
,
Arti Khaparde
Development of Adaptive Time-Weighted Dynamic Time Warping for Time Series Vegetation Classification Using Satellite Images in Solapur District.
Comput. J.
66 (8) (2023)
Chen Guo
,
Qiuming Liu
,
Zhifang Xiao
,
Shuo Peng
The Diagnosability of Interconnection Networks with Missing Edges and Broken-Down Nodes Under the PMC and MM* Models.
Comput. J.
66 (8) (2023)
volume 66, number 9, 2023
Aleksandr S. Tvardovskii
,
Nina Yevtushenko
Deriving homing sequences for Finite State Machines with timeouts.
Comput. J.
66 (9) (2023)
Yayu Yang
,
Mingzu Zhang
,
Jixiang Meng
,
Rongda Chen
-average Degree Edge-Connectivity of Bijective Connection Networks.
Comput. J.
66 (9) (2023)
Zhe Jiang
,
Kai Zhang
,
Liangliang Wang
,
Jianting Ning
Forward Secure Public-key Authenticated Encryption with Conjunctive Keyword Search.
Comput. J.
66 (9) (2023)
Wided Selmi
,
Hager Kammoun
,
Ikram Amous
Semantic-Based Hybrid Query Reformulation for Biomedical Information Retrieval.
Comput. J.
66 (9) (2023)
B. Mathan Kumar
,
Bharati S. Ainapure
,
Suryabhan Pratap Singh
,
Sumit Vyas
Feature Extraction Based Deep Indexing by Deep Fuzzy Clustering for Image Retrieval Using Jaro Winkler Distance.
Comput. J.
66 (9) (2023)
Talha Mahboob Alam
,
Kamran Shaukat
,
Adel Khelifi
,
Hanan Aljuaid
,
Malaika Shafqat
,
Usama Ahmed
,
Sadeem Ahmad Nafees
,
Suhuai Luo
A Fuzzy Inference-Based Decision Support System for Disease Diagnosis.
Comput. J.
66 (9) (2023)
Zaki Brahmi
,
Afef Selmi
Coordinate System-Based Trust-Aware Web Services Composition in Edge and Cloud Environment.
Comput. J.
66 (9) (2023)
Marriam Daud
,
Ali Afzal Malik
Construction and Validation of Early Software Size Estimation Models Based on ADAF-Adjusted ACD Metrics.
Comput. J.
66 (9) (2023)
Yaqi Xu
,
Baofeng Wu
,
Dongdai Lin
New Strategies To Improve Differential-Linear Attacks With Applications To Chaskey.
Comput. J.
66 (9) (2023)
Kaiju Li
,
Hao Wang
Federated Learning Communication-Efficiency Framework via Corset Construction.
Comput. J.
66 (9) (2023)
Xiaoyang Liu
,
Shanghong Dai
,
Giacomo Fiumara
,
Pasquale De Meo
Target-specific sentiment analysis method combining word-masking data enhancement and adversarial learning.
Comput. J.
66 (9) (2023)
Xiao Zeng
,
Guowu Yang
,
Xiaoyu Song
,
Marek A. Perkowski
,
Gang Chen
Detecting Affine Equivalence Of Boolean Functions And Circuit Transformation.
Comput. J.
66 (9) (2023)
Parul Tomar
,
Gyanendra Kumar
,
Lal Pratap Verma
Path-Rank-Based Data Chunk Scheduling for Concurrent Multipath Transmission.
Comput. J.
66 (9) (2023)
Michael Simpson
,
Venkatesh Srinivasan
,
Alex Thomo
Scalable Misinformation Mitigation in Social Networks Using Reverse Sampling.
Comput. J.
66 (9) (2023)
Talal H. Noor
Behavior Analysis-Based IoT Services For Crowd Management.
Comput. J.
66 (9) (2023)
Gokhan Ozogur
,
Mehmet Ali Ertürk
,
Gulsum Zeynep Gurkas Aydin
,
Muhammed Ali Aydin
Android Malware Detection in Bytecode Level Using TF-IDF and XGBoost.
Comput. J.
66 (9) (2023)
Zhenhua Chen
,
Jingjing Nie
,
Zhanli Li
,
Chunpeng Ge
,
Willy Susilo
Geometric Searchable Encryption Without False Positive And Its Applications.
Comput. J.
66 (9) (2023)
Correction to: Learning Disjunctive Multiplicity Expressions and Disjunctive Generalize Multiplicity Expressions From Both Positive and Negative Examples.
Comput. J.
66 (9) (2023)