Search

Showing total 1,560 results

Search Constraints

Start Over You searched for: Journal computer journal Remove constraint Journal: computer journal
1,560 results

Search Results

251. Chronological Sailfish Optimizer for Preserving Privacy in Cloud Based on Khatri-Rao Product.

252. Face Identification System Based on Synthesizing Realistic Image using Edge-Aided GANs.

253. 3-Extra Connectivity of the Data Center Network BCube.

254. Modelling and Predictive Analytics of COVID-19 Transmission Using Gustafson–Kessel Fuzzy Clustering Approach.

255. Provable Data Possession Schemes from Standard Lattices for Cloud Computing.

256. Star-Structure Connectivity and Star-Substructure Connectivity of Hypercubes and Folded Hypercubes.

257. Ant Cat Swarm Optimization-Enabled Deep Recurrent Neural Network for Big Data Classification Based on Map Reduce Framework.

258. Benchmark for Discriminating Power of Edge Centrality Metrics.

259. Approximating Closest Vector Problem in ℓ∞-Norm Revisited.

260. On the Security of the Stream Ciphers RCR-64 and RCR-32.

261. On the Probability and Automatic Search of Rotational-XOR Cryptanalysis on ARX Ciphers.

262. Self-Tallying Electronic Voting Based on Blockchain.

263. On the Modulus in Matching Vector Codes.

264. Specifying and Model Checking Distributed Control Algorithms at Meta-level.

265. Algorithm to Construct Completely Independent Spanning Trees in Line Graphs.

266. Practical Blockchain-Based Steganographic Communication Via Adversarial AI: A Case Study In Bitcoin.

267. Efficient Robustness Verification of the Deep Neural Networks for Smart IoT Devices.

268. Effectively Detecting Operational Anomalies In Large-Scale IoT Data Infrastructures By Using A GAN-Based Predictive Model.

269. Efficient Deep Learning Approach To IoT Intrusion Detection.

270. Privacy-Enhanced Federated Generative Adversarial Networks for Internet of Things.

271. Pruning of Health Data in Mobile-Assisted Remote Healthcare Service Delivery.

272. Contact Tracing Solution for Global Community.

273. Revisiting the Performance of DNS Queries on a DNS Hierarchy Testbed over Dual-Stack.

274. Coordinate Graph Grammar for the Specification of Spatial Graphs.

275. Event-B-Based Approach to Model and Verify Behaviors for Component-Based Applications.

276. Improved Collision Detection Of MD5 Using Sufficient Condition Combination.

277. Ensemble Technique to Predict Breast Cancer on Multiple Datasets.

278. Fingerprint Template Protection Using Irreversible Minutiae Tetrahedrons.

279. Social Network Link Prediction Method Based on Stacked Generalization.

280. Tunicate Swarm Magnetic Optimization With Deep Convolution Neural Network For Collaborative Filter Recommendation.

281. One-Dimensional Probabilistic Convolutional Neural Network for Prediction of Breast Cancer Survivability.

282. Context-Aware Authentication with Dynamic Credentials using Electricity Consumption Data.

283. Friends-Based Crowdsourcing: Algorithms For Task Dissemination Over Social Groups.

284. Efficient Multi-Signature Scheme Using Lattice.

285. Bat Ant Lion Optimization-Based Generative Adversarial Network For Structural Heath Monitoring In IoT.

286. Optimized Scale-Invariant Feature Transform with Local Tri-directional Patterns for Facial Expression Recognition with Deep Learning Model.

287. h-Restricted Connectivity of a Class of Hypercube-Based Compound Networks.

288. Security Analysis and Improvement of a Redactable Consortium Blockchain for Industrial Internet-of-Things.

289. Analysis of Machine Learning and Deep Learning Frameworks for Opinion Mining on Drug Reviews.

290. Modeling Higher-Order Interactions in Complex Networks by Edge Product of Graphs.

291. Improved Meet-in-the-Middle Attacks on Reduced-Round Tweakable Block Cipher Deoxys-BC.

292. On the g-Extra Connectivity of the Enhanced Hypercubes.

293. Observations on the Security of COMET.

294. Detecting Malicious Domain Names with Abnormal WHOIS Records Using Feature-Based Rules.

295. Research on Unexpected DNS Response from Open DNS Resolvers.

296. Hybridized Cuckoo Search with Multi-Verse Optimization-Based Patch Matching and Deep Learning Concept for Enhancing Video Inpainting.

297. Refinement of Key Mismatch Attack on NewHope.

298. Novel Image Thresholding Method Combining Entropy With Parzen Window Estimation.

299. Reliability of k-Ary n-Cube Based on Component Connectivity.

300. Rider Chicken Optimization Algorithm-Based Recurrent Neural Network for Big Data Classification in Spark Architecture.