Search

Showing total 5,431 results

Search Constraints

Start Over You searched for: Journal computer journal Remove constraint Journal: computer journal
5,431 results

Search Results

151. Early Diabetes Discovery From Tongue Images.

153. Service Function Placement Optimization For Cloud Service With End-to-End Delay Constraints.

154. An Improved Density Peaks Clustering Algorithm Based On Density Ratio.

155. Deep Learning-Based Cyberbullying Detection in Kurdish Language.

156. CM-UTC: A Cost-sensitive Matrix based Method for Unknown Encrypted Traffic Classification.

157. CNN-LSTM Base Station Traffic Prediction Based On Dual Attention Mechanism and Timing Application.

158. Multimodal Sentiment Analysis Based on Composite Hierarchical Fusion.

159. Video Hashing with Tensor Robust PCA and Histogram of Optical Flow for Copy Detection.

160. CFAuditChain: Audit BlockChain Based On Cuckoo Filter.

161. SEDD: Robust Blind Image Watermarking With Single Encoder And Dual Decoders.

162. Discrete-Time Quantum Walks Community Detection in Multi-Domain Networks.

163. Color Patterns And Enhanced Texture Learning For Detecting Computer-Generated Images.

164. Link Residual Closeness of Graphs with Fixed Parameters.

165. A Light Weight Depthwise Separable Layer Optimized CNN Architecture for Object-Based Forgery Detection in Surveillance Videos.

166. Enhancing Aspect Category Detection Through Hybridised Contextualised Neural Language Models: A Case Study In Multi-Label Text Classification.

167. Partitioned 2D Set-Pruning Segment Trees with Compressed Buckets for Multi-Dimensional Packet Classification.

168. Hybrid ITÖ Algorithm for Maximum Scatter Colored Traveling Salesman Problem.

169. Menger-Type Connectivity of Line Graphs of Generalized Hypercubes With Faulty Edges.

170. From Stars to Diamonds: Counting and Listing Almost Complete Subgraphs in Large Networks.

171. Laws of Timed State Machines.

172. Strongly Menger Connectedness of a Class of Recursive Networks.

173. Privacy-Preserving Confidential Reporting System With Designated Reporters.

174. The Orbits of Folded Crossed Cubes.

175. API Recommendation For Mashup Creation: A Comprehensive Survey.

176. Stealthy Backdoor Attacks On Deep Point Cloud Recognization Networks.

177. Keyframe-guided Video Swin Transformer with Multi-path Excitation for Violence Detection.

178. Policy-Based Remote User Authentication From Multi-Biometrics.

179. Sparse Backdoor Attack Against Neural Networks.

180. Cryptanalysis Of A Type Of White-Box Implementations Of The SM4 Block Cipher.

181. Enumeration Of Subtrees Of Two Families Of Self-Similar Networks Based On Novel Two-Forest Dual Transformations.

182. Online Optimization Method of Learning Process for Meta-Learning.

183. A Chinese Grammatical Error Correction Model Based On Grammatical Generalization And Parameter Sharing.

184. AKGF: Automatic Kernel Generation for DNN on CPU-FPGA.

185. Knowledge-Aware Dual-Channel Graph Neural Networks For Denoising Recommendation.

186. A Novel Representation and Prediction Initiative for Underground Water by Using Deep Learning Technique of Remote Sensing Images.

187. A Novel Reduced Reference Image Quality Assessment Based on Formal Concept Analysis.

188. L-graph Automata And Some Applications.

189. Interopera: An Efficient Cross-Chain Trading Protocol.

190. Mining Frequent Serial Positioning Episode Rules with Forward and Backward Search Technique from Event Sequences.

191. Incorrectly Generated RSA Keys: How I Learned To Stop Worrying And Recover Lost Plaintexts.

192. Role of Machine Learning on Key Extraction for Data Privacy Preservation of Health Care Sectors in IoT Environment.

193. How Not To Design An Efficient FHE-Friendly Block Cipher: Seljuk.

194. Decentralized Data Flows for the Functional Scalability of Service-Oriented IoT Systems.

195. Row, Row, Row Your Boat: How to Not Find Weak Keys in Pilsung.

196. A New Neural Distinguisher Considering Features Derived From Multiple Ciphertext Pairs.

197. On Grain-Like Small State Stream Ciphers Against Fast Correlation Attacks: Cryptanalysis of Plantlet, Fruit-v2 and Fruit-80.

198. A Novel Approach For CT-Based COVID-19 Classification and Lesion Segmentation Based On Deep Learning.

199. Simplified High Level Parallelism Expression on Heterogeneous Systems through Data Partition Pattern Description.

200. Quantum Attacks on 1K-AES and PRINCE.