Search

Showing total 1,541 results

Search Constraints

Start Over You searched for: Journal computer journal Remove constraint Journal: computer journal Publisher oxford university press / usa Remove constraint Publisher: oxford university press / usa
1,541 results

Search Results

251. Privacy-Enhanced Federated Generative Adversarial Networks for Internet of Things.

252. Pruning of Health Data in Mobile-Assisted Remote Healthcare Service Delivery.

253. Contact Tracing Solution for Global Community.

254. Revisiting the Performance of DNS Queries on a DNS Hierarchy Testbed over Dual-Stack.

255. Coordinate Graph Grammar for the Specification of Spatial Graphs.

256. Event-B-Based Approach to Model and Verify Behaviors for Component-Based Applications.

257. Improved Collision Detection Of MD5 Using Sufficient Condition Combination.

258. Ensemble Technique to Predict Breast Cancer on Multiple Datasets.

259. Fingerprint Template Protection Using Irreversible Minutiae Tetrahedrons.

260. Social Network Link Prediction Method Based on Stacked Generalization.

261. Tunicate Swarm Magnetic Optimization With Deep Convolution Neural Network For Collaborative Filter Recommendation.

262. One-Dimensional Probabilistic Convolutional Neural Network for Prediction of Breast Cancer Survivability.

263. Context-Aware Authentication with Dynamic Credentials using Electricity Consumption Data.

264. Friends-Based Crowdsourcing: Algorithms For Task Dissemination Over Social Groups.

265. Efficient Multi-Signature Scheme Using Lattice.

266. Bat Ant Lion Optimization-Based Generative Adversarial Network For Structural Heath Monitoring In IoT.

267. Optimized Scale-Invariant Feature Transform with Local Tri-directional Patterns for Facial Expression Recognition with Deep Learning Model.

268. h-Restricted Connectivity of a Class of Hypercube-Based Compound Networks.

269. Security Analysis and Improvement of a Redactable Consortium Blockchain for Industrial Internet-of-Things.

270. Analysis of Machine Learning and Deep Learning Frameworks for Opinion Mining on Drug Reviews.

271. Modeling Higher-Order Interactions in Complex Networks by Edge Product of Graphs.

272. Improved Meet-in-the-Middle Attacks on Reduced-Round Tweakable Block Cipher Deoxys-BC.

273. On the g-Extra Connectivity of the Enhanced Hypercubes.

274. Observations on the Security of COMET.

275. Detecting Malicious Domain Names with Abnormal WHOIS Records Using Feature-Based Rules.

276. Research on Unexpected DNS Response from Open DNS Resolvers.

277. Hybridized Cuckoo Search with Multi-Verse Optimization-Based Patch Matching and Deep Learning Concept for Enhancing Video Inpainting.

278. Refinement of Key Mismatch Attack on NewHope.

279. Novel Image Thresholding Method Combining Entropy With Parzen Window Estimation.

280. Reliability of k-Ary n-Cube Based on Component Connectivity.

281. Rider Chicken Optimization Algorithm-Based Recurrent Neural Network for Big Data Classification in Spark Architecture.

282. Guess-and-Determine Attacks on AEGIS.

283. eCK-Secure Authenticated Key Exchange against Auxiliary Input Leakage.

284. On the Hardness of Sparsely Learning Parity with Noise.

285. Performance Evaluation of Machine Learning Techniques for Fault Diagnosis in Vehicle Fleet Tracking Modules.

286. Secure and Differentiated Fog-Assisted Data Access for Internet of Things.

287. Transportation Index Computation: A Development Theme Mining-Based Approach.

288. A Blockchain-Based Framework for IoT Data Monetization Services.

289. Automatic Diagnosis of Diabetic Retinopathy from Retinal Abnormalities: Improved Jaya-Based Feature Selection and Recurrent Neural Network.

290. Provably Secure Online/Offline Identity-Based Signature Scheme Based on SM9.

291. Some Combinatorial Problems in Power-Law Graphs.

292. Matching Preclusion of Enhanced Hypercubes.

293. (Im)Possibility on Constructing Verifiable Random Functions.

294. Optimization Enabled Black Hole Entropic Fuzzy Clustering Approach for Medical Data.

295. Detecting Cyberbullying across Social Media Platforms in Saudi Arabia Using Sentiment Analysis: A Case Study.

296. New Code-Based Blind Signature Scheme.

297. Continuous Leakage-Amplified Public-Key Encryption With CCA Security.

298. Statistical-Based Light-Weight Anomaly Detection Framework for Wireless Body Area Networks.

299. Differentially Private Publication For Correlated Non-Numerical Data.

300. MBSO Algorithm For Handling Energy-Throughput Trade-Off In Cognitive Radio Networks.