


default search action
The Computer Journal, Volume 68
Volume 68, Number 1, 2025
- Min Peng

, Xianxin Fu
, Benling Ge, Lusheng Wang:
Wi-Crack: a smartphone keystroke recognition system based on multi-dimensional information. 1-12 - Fengjun Zhang

, Lisheng Huang
, Kai Shi
, Shengjie Zhai
, Yunhai Lan
, Qinghua Li
:
Intrusion detection based on hybrid metaheuristic feature selection. 13-22 - Alejandro Díaz-Caro

, Marcos Villagra:
Classically time-controlled quantum automata: definition and properties. 23-31 - Martita Muñoz

, José Fuentes-Sepúlveda
, Cecilia Hernández, Gonzalo Navarro
, Diego Seco
, Fernando Silva-Coira
:
Clustering-based compression for raster time series. 32-46 - Hui Dong, Huaqun Wang

, Mengjie Lv, Weibei Fan:
Disjoint paths construction algorithm in the data center network DPCell. 47-57 - Nasreddine Hajlaoui

, Chaima Bejaoui
, Tayssir Ismail, Houaida Ghanmi, Haifa Touati
:
A hybrid architecture for secure data sharing in multi-clouds system. 58-73 - Juhong Zheng, Lei Zhang, Jingbo Zhang, Meibo Lv:

Maximum fault-free enforcement in Petri nets using supervisory control. 74-83 - Jian Kuang

, Bailin Xie, Jianzhen Luo, Jianhong Li
:
Reliable broadcasting-based content acquisition for named data MANETs. 84-96 - Li-Han Zhang, Shu-Han Yang, Dan-Yang Lv, Ji-Bo Wang

:
Research on convex resource allocation scheduling with exponential time-dependent learning effects. 97-108
Volume 68, Number 2, 2025
- Maohua Guo

, Yuefei Zhu
, Jinlong Fei
:
ProInfer: inference of binary protocol keywords based on probabilistic statistics. 109-125 - Xiaohui Hua

, Qin Zhao:
The h-faulty-block connectivity of k-ary n-cubes. 126-134 - Nayan Kumar Sarkar

, Moirangthem Marjit Singh
, Utpal Nandi:
Image classification with deconvolution operation and augmentation. 135-144 - Yang Zou

:
A comparison of reserved graph grammar and edge-based graph grammar. 145-162 - Lingbin Zeng

, Shixin Yao
, Xinwang Liu
, Liquan Xiao
, Yue Qian
:
A clustering ensemble algorithm for handling deep embeddings using cluster confidence. 163-174 - Meng Han

, Yan Zeng
, Hao Shu, Lupeng Yue, Jilin Zhang, Jian Wan, Yongjian Ren:
Device placement using Laplacian PCA and graph attention networks. 175-186 - Jianan Liu, Yongjuan Wang, Siqi Lu

, Gang Yu, Xiangyu Wang, Peixuan Feng
:
SAAChain: release and storage platform of digital works based on non-fungible tokens. 187-200 - Cuiping Wang, Xiaole Li, Jinwei Tian, Yilong Yin:

Data transmission optimization based on multi-objective deep reinforcement learning. 201-215
Volume 68, Number 3, 2025
- Rakesh Ranjan Behera, Debasis Gountia

:
A secure fault detection for digital microfluidic biochips. 217-227 - Ruiting Liu, Ruixiang Li, Wenqi Shi, Shaoyong Du, Yimin Liu, Xiangyang Luo:

UeLP: accurate user linkage across social platforms against location errors. 228-240 - Yue Zhang

, Chen Jue, Wanxiao Liu
, Yurui Ma:
GRAN: a SDN intrusion detection model based on graph attention network and residual learning. 241-260 - Anastassis Voudouris, Aristomenis Tressos, Apostolis Zarras, Christos Xenakis

:
Game on: a performance comparison of interpolation techniques applied to Shamir's secret sharing. 261-272 - Hangda Liu

, Boyu Diao
, Wenxin Chen, Yongjun Xu
:
A resource-aware workload scheduling method for unbalanced GEMMs on GPUs. 273-282 - Farshad Safaei

, Mohammad Mahdi Emadi Kouchak
:
Error and attack vulnerability of Apollonian networks. 283-305 - Xinyan Yang, Rongchuan Zhang, Shao Li, Gang Liang:

Image forgery localization integrating multi-scale and boundary features. 306-321 - Qing Song, Wenfeng Sun, Donghan Yang, Mengjie Hu

, Chun Liu
:
Semantic Guided Matting Net. 322-330
Volume 68, Number 4, 2025
- Jordan Nelson

, Michalis Pavlidis
, Andrew Fish
, Stelios Kapetanakis
, Nikolaos Polatidis
:
ChatGPT-driven machine learning code generation for android malware detection. 331-345 - Xinyi Chen, Bo Liu

, Xueshu Hong, Wangqun Chen, Houjie Qiu
, Xingkong Ma:
Relation as text: a semantic-preserving method for relational triple extraction. 346-354 - Maoqun Yao

, Ziwei Xue
, Haiwei Li
, Shanhu Shen
:
An optimized hardware implementation of SHA-256 round computation. 355-359 - Yuming Lin, Yinghao Zhang

, Yan Yang, You Li
, Jingwei Zhang:
Self-adaptive smoothing model for cardinality estimation. 360-371 - Wenlong Shi

, Jing Zhang, Xiaoping Chen
, Xiucai Ye
:
PCDP-CRLPPM: a classified regional location privacy-protection model based on personalized clustering with differential privacy in data management. 372-396 - Yuanzhao Guo

, Jun Zhang
:
Remote sensing image dehazing method in mountaineering equipment. 397-406 - Xiaorui Chen, Xiangxue Li

:
TinyThunder: enabling asynchronous Byzantine fault tolerance with optimal communication efficiency. 407-418 - Yingjie Wang, Chengye Zhang

, Fengbo Bai
, Zumin Wang
, Jing Qin
:
FINB: a Japanese named entity recognition model based on multi-feature integration method. 419-430 - Qingqiang Qi, Xingye Yang, Chengyu Hu, Peng Tang, Zhiyuan Su, Shanqing Guo:

FLDS: differentially private federated learning with double shufflers. 431-443
Volume 68, Number 5, 2025
- Avanthika Vineetha Harish

, Kimberly Tam
, Kevin D. Jones
:
Generating training events for building cyber-physical security skills. 445-459 - Shang Shang

, Xinqiang Zhao, Zhongjiang Yao
, Yepeng Yao, Liya Su, Zijing Fan
, Xiaodan Zhang, Zhengwei Jiang
:
Can LLMs deeply detect complex malicious queries? A framework for jailbreaking via obfuscating intent. 460-478 - Hongliang Sun

, Zhihui Liu
, Chao Wang
, Dan Li
:
Admission control algorithm for visible light communication random access network under delay and jitter constraints. 479-486 - Zhongjun Yang

, Jixue Zhang
, Beimin Su
:
Internet of vehicles intrusion detection method based on CFS-COA feature selection and spatio-temporal feature extraction. 487-501 - Lina Ba

, Heping Zhang
:
Structure connectivity of folded cross cubes. 502-509 - Yang Chen, Chunlu Zhao, Jin Pan, Yang Liu:

Verifiable attribute-based multi-keyword ranked search scheme in blockchain. 510-519 - Qiqing Xia, Qianru Zhu, Huiqin Xie, Li Yang:

Algorithm for solving quantum linear systems of equations with coherent superposition and extended applications. 520-538 - Prasanth Aruchamy

, M. Sundarrajan
, Mani Deepak Choudhry
, Akshya Jothi
:
Enhancing security of medical images using code-based intermittent encryption and convolutional neural network. 539-551 - Yaxun Jia, Zhu Yuan

, Haoyang Wang, Yunchao Gong
, Haixiang Yang
, Zuo-Lin Xiang
:
Variations towards an efficient drug-drug interaction. 552-564 - Muhammad Inaam ul haq

, Qianmu Li
, Khalid Mahmood
, Ayesha Shafique, Rizwan Ullah
:
BioElectra-BiLSTM-Dual Attention classifier for optimizing multilabel scientific literature classification. 565-576
Volume 68, Number 6, 2025
- Hongbin Zhang

, Ya Feng, Meng Yuan, Jingyi Hou, Jin Zhang, Guangli Li:
Image sentiment analysis based on distillation and sentiment region localization network. 577-590 - Xin Yuan, Jiapeng Li

, Weiwei Wang, Xiaoteng Zhou, Ning Li
, Changli Yu:
Improved YOLOv9 for underwater side scan sonar target detection. 591-604 - Yuke Li

, Yong Wang
, Bin Jiang:
Offset attention with seed generation for point cloud completion. 605-616 - Yuetian Cao, Jin Liu

, Zijun Yu, Xingye Li, Lai Wei, Zhongdai Wu
:
Vessel re-identification by a hierarchical perceptual aggregation network with inclination-aware attention. 617-634 - Xin Wen, Xiaohui Yang:

MAPBFT: multilevel adaptive PBFT algorithm based on discourse and reputation models. 635-648 - Huihui Zhang

:
Unbiased training framework on deep reinforcement learning. 649-662 - Jinyong Wang

, Ce Zhang
:
Optimal selection of software reliability growth model for open-source software using weighted Grey relational analysis method. 663-674 - Ying Pan

, Na Lyu:
Attack-Oblivious Node Protection Strategy for survivable routing in airborne tactical networks under uncertainty. 675-683 - Yan Zhang, Liangliang Wang

, Yiyuan Luo
, Kai Zhang
, Yu Long, Kefei Chen:
TBFL: blockchain-enabled trusted byzantine-robust federated learning framework for photovoltaic power generation forecasting. 684-696 - Sumin Li, Zhen Xie, Xiuqin Pan

:
Feature refinement and attention enhancement for click-through rate prediction. 697-705 - Du Qi

, Feng Wang, Hui Huang, Jinlin Chen
:
Improving LAMMPS performance for molecular dynamic simulation on large-scale HPC systems. 706-716
Volume 68, Number 7, 2025
- Neamah Al-Naffakh

, Nathan L. Clarke
, Fudong Li
, Paul S. Haskell-Dowland
:
Real-world continuous smartwatch-based user authentication. 717-733 - Wen Cheng, Shengxia Tu, Yi Liu

, Lingfang Zeng, Yang Wang
, André Brinkmann
:
FlashFox: a secret-sharing approach to securing data deletion for Flash-based SSD. 734-748 - Shihan Qin

, Yuting Xiao
, Yansen Xin
, Birou Gao
, Rui Zhang
:
Practical and veritable threshold multi-factor authentication for mobile devices. 749-762 - Wenyang Zhao, Xiaoyao Yang, Yong Wang

:
RADNet: a highly and robust dynamic network for object detection in complex road scenes. 763-774 - Zhijin Chen, Nankai Lin, Aimin Yang, Dong Zhou:

Filter-enhanced Contrast Variational AutoEncoders for sequential recommendation. 775-787 - Ligeng Chen

, Zhongling He, Yi Qian
, Bing Mao:
CATI++: empirical study and evaluation for adjacent instruction enhanced type inference. 788-803 - Xiaoyang Zhang

, Jian Bai
, Guanchao Qiao
, Xiao Xiao
, Liwei Meng
, Shaogang Hu
:
YOLO-fall: a YOLO-based fall detection model with high precision, shrunk size, and low latency. 804-812 - Yuedong Pan

, Lixin Zhao, Tao Leng, Chaofei Li
, Aimin Yu, Lijun Cai:
TaintAttack: rapid attack investigation based on information flow tracking. 813-829 - Lingxiao Shan, Jian Li, Guanjun Liu

:
Alternating-update-strategy based Graph Autoencoder for graph neural network. 830-838 - Xiaoyang Wen, Shaopeng Guan

:
Improving recommendation fairness with dependency-based graph collaborative filtering. 839-858
Volume 68, Number 8, 2025
- Nabil Mohamed Eldakhly

:
Optimizing arrhythmia identification using chaos theory and deep learning analysis. 859-871 - Jing Zhan, Bo Li, Jiang Zhao, Yong Zhao:

zk-DCIAExchange: SGX protected fair exchange with distributed zero knowledge proof for data confidentiality and authentication. 872-890 - Shu Liu

, Zain Ul Abideen
, Tongming Wan, Inzamam Shahzad
, Waseem Abbas
, Yushan Pan:
MuST-GAN MFAS: Multi-semantic spoof tracer GAN with transformer layers for multi-modal face anti-spoofing. 891-907 - Wenmin Ma:

Learning to optimize based on rate decay. 908-925 - Weikang zhang

, Zhi Liu, Tongxin Bai
, Furong Zheng, Wenming Jin, Yang Wang
:
DuoSQL: towards elastic data warehousing via separated data management and processing. 926-938 - Chuanyin Wang, Yifei Zhang

, Neng Gao
:
Towards effective privacy preservation in federated learning with automatic gradient clipping and gradient transformation perturbation. 939-952 - Yanchang Feng

, Junchao Ma
, Haojun Xia, Da Zhang
, Bibo Tu
:
BLFair: enabling proportional I/O sharing for NVMe SSD in SPDK para-virtualization architecture. 953-967 - Faris A. Almalki:

Developing an intelligent framework with Blockchain capabilities for environmental monitoring using a CubeSat. 968-984 - Hui Dong

, Huaqun Wang
, Mengjie Lv, Weibei Fan:
Fault tolerance assessment of the data center network DPCell based on g-good-neighbor conditions. 985-997 - Jinguo Li

, Peichun Yuan
, Jin Zhang
, Sheng Shen
, Yin He
, Ruyang Xiao
:
F2PQNN: a fast and secure two-party inference on quantized convolutional neural networks. 998-1012 - Siyuan Zhang, Yixuan Zhang, Jianying Feng:

Weighted twin support vector machine with rescaled hinge loss. 1013-1027 - Haizhen Wang, Na Jia

, Yang He
, Zuozheng Lian
:
A new DDoS attack detection model based on improved stacked autoencoder and gated recurrent unit for software defined network. 1028-1049 - Nankai Lin

, Hongyan Wu
, Peijian Zeng
, Qifeng Bai
, Dong Zhou
, Aimin Yang
:
A novel curriculum learning framework for multi-label emotion classification. 1050-1061 - Yoav Gross

, Shmuel T. Klein, Elina Opalinsky, Rivka Revivo, Dana Shapira:
Compression Cryptosystem. 1062-1073 - Zhen Wang

, Jinfeng Lv
, Yuhao Zhou
, Jianhui Jiang
, Yong Wang
:
A dual protection technology to thwart hardware Trojan insertion based on observability. 1074-1085
Volume 68, Number 9, 2025
- Han Sun, Yan Zhang, Huiping Zhuang, Jiatong Li, Zhen Xu, Liji Wu:

PEAR: privacy-preserving and effective aggregation for byzantine-robust federated learning in real-world scenarios. 1087-1104 - Kexiang Yan

, Gang Liang
, Lei Wang
, Mingxu Sun
, Kui Zhao
:
Dual-feature adaptive framework for multimodal disinformation detection. 1105-1117 - Weina Zhou

, Wei Shao
, Wenhua Hu
:
A Yolo-like lightweight ship detection network for unmanned surface vehicles. 1118-1127 - Song Yu

, Wenlong Liu, Hannan Wu
, Zhifang Liao
:
GitHub project recommendation based on knowledge graph and developer similarity. 1128-1136 - Yuheng Zhang

, Guojun Wang
, Peiqiang Li
, Wanyi Gu
, Houji Chen
:
FRACE: Front-Running Attack Classification on Ethereum using Ensemble Learning. 1137-1149 - Faeiz Alserhani

:
Advanced social media crime prevention via deep learning and cryptographic data encryption. 1150-1162 - Yongshan Wang

, Siyuan Pang
, Zijing Fan
, Shang Shang
, Yepeng Yao
, Zhengwei Jiang
, Baoxu Liu
:
Advanced code slicing with pre-trained model fine-tuned for open-source component malware detection. 1163-1180 - Abdulkawi Yahya Radman Al-Shamiri

, Dong-Jun Yu
, Peipei Li
, Balqis Yahya Ali Abdullah Al-Mahweeti
:
Use of data Mining in Identifying the risk factors of optic neuropathy. 1181-1196 - Enting Guo

, Chunhua Su
, Peng Li
:
Efficient unlearning for data security in deep learning systems. 1197-1207 - Önder Çoban, Seyma Yücel Altay:

Arming text-based gender inference with partition membership filtering and feature selection for online social network users. 1208-1224 - Qianhua Luo, Bo Xie, Jiahuan Wang, Jiaqi Shuai, Haixia Cui:

A hybrid approach to task offloading optimization: integrating hybrid whale genetic algorithm and reinforcement learning. 1225-1236 - Cheng Zhang

, Jinxin Lv
, Jingxu Cao
, Jiachuan Sheng
, Dawei Song
, Tiancheng Zhang
:
Unravelling the semantic mysteries of transformers layer by layer. 1237-1251 - Jinyan He

, Haitong Yang
:
Multilingual knowledge graph completion based on structural features. 1252-1262 - Manoj Kumar Prabhakaran, Abinaya Devi Chandrasekar, Parvathy Meenakshi Sundaram:

PHISH_ATTENTION: achieving robust phishing website detection with balanced datasets and advanced URL features. 1263-1284 - Gengjian Liao

, Shiyu Shao
, Zhenni Feng
:
Balancing privacy and model performance in federated learning through contract-based data trading. 1285-1299 - Zhaobin Ma

, Zhiqiang Lv, Zhihao Xu, Rongkun Ye, Jianbo Li:
Spatio-temporal traffic flow forecasting based on second-order continuous graph neural network. 1300-1314 - Cenman Wang, Ye Tian, Yiwen Wu, Xinming Zhang:

Confluence: improving network monitoring accuracy on multi-pipeline data plane. 1315-1328 - Sumin Li

, Jinhua Lin
, Yijin Gang
, Xiuqin Pan
:
Small object detection in remote sensing images through multi-scale feature fusion. 1329-1344

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














