Search

Showing total 3,589 results

Search Constraints

Start Over You searched for: Journal computer journal Remove constraint Journal: computer journal
3,589 results

Search Results

351. Effectively Detecting Operational Anomalies In Large-Scale IoT Data Infrastructures By Using A GAN-Based Predictive Model.

352. Efficient Deep Learning Approach To IoT Intrusion Detection.

353. Privacy-Enhanced Federated Generative Adversarial Networks for Internet of Things.

354. Efficient Robustness Verification of the Deep Neural Networks for Smart IoT Devices.

355. Practical Blockchain-Based Steganographic Communication Via Adversarial AI: A Case Study In Bitcoin.

356. Event-B-Based Approach to Model and Verify Behaviors for Component-Based Applications.

357. Fingerprint Template Protection Using Irreversible Minutiae Tetrahedrons.

358. Ensemble Technique to Predict Breast Cancer on Multiple Datasets.

359. Improved Collision Detection Of MD5 Using Sufficient Condition Combination.

360. Social Network Link Prediction Method Based on Stacked Generalization.

361. Tunicate Swarm Magnetic Optimization With Deep Convolution Neural Network For Collaborative Filter Recommendation.

362. Context-Aware Authentication with Dynamic Credentials using Electricity Consumption Data.

363. One-Dimensional Probabilistic Convolutional Neural Network for Prediction of Breast Cancer Survivability.

364. Friends-Based Crowdsourcing: Algorithms For Task Dissemination Over Social Groups.

365. Analysis of Machine Learning and Deep Learning Frameworks for Opinion Mining on Drug Reviews.

366. Optimized Scale-Invariant Feature Transform with Local Tri-directional Patterns for Facial Expression Recognition with Deep Learning Model.

367. h-Restricted Connectivity of a Class of Hypercube-Based Compound Networks.

368. Bat Ant Lion Optimization-Based Generative Adversarial Network For Structural Heath Monitoring In IoT.

369. Improved Meet-in-the-Middle Attacks on Reduced-Round Tweakable Block Cipher Deoxys-BC.

370. Security Analysis and Improvement of a Redactable Consortium Blockchain for Industrial Internet-of-Things.

371. Efficient Multi-Signature Scheme Using Lattice.

372. Modeling Higher-Order Interactions in Complex Networks by Edge Product of Graphs.

373. On the g-Extra Connectivity of the Enhanced Hypercubes.

374. Hybridized Cuckoo Search with Multi-Verse Optimization-Based Patch Matching and Deep Learning Concept for Enhancing Video Inpainting.

375. Research on Unexpected DNS Response from Open DNS Resolvers.

376. Detecting Malicious Domain Names with Abnormal WHOIS Records Using Feature-Based Rules.

377. Observations on the Security of COMET.

378. Bio-Key Based AES for Personalized Image Cryptography.

379. Structure Fault-Tolerance of the Generalized Hypercube.

380. A Hybrid Decentralized Coordinated Approach for Multi-Robot Exploration Task.

381. Efficient Certificateless Signcryption in the Standard Model: Revisiting Luo and Wan's Scheme from Wireless Personal Communications (2018).

382. Algorithmic Government: Automating Public Services and Supporting Civil Servants in using Data Science Technologies.

383. Conceptual Approach for Supporting Traffic Data Wrangling Tasks.

384. Authorized Function Homomorphic Signature.

385. Refinement of Key Mismatch Attack on NewHope.

386. Novel Image Thresholding Method Combining Entropy With Parzen Window Estimation.

387. Reliability of k-Ary n-Cube Based on Component Connectivity.

388. Guess-and-Determine Attacks on AEGIS.

389. Rider Chicken Optimization Algorithm-Based Recurrent Neural Network for Big Data Classification in Spark Architecture.

390. Performance Evaluation of Machine Learning Techniques for Fault Diagnosis in Vehicle Fleet Tracking Modules.

391. eCK-Secure Authenticated Key Exchange against Auxiliary Input Leakage.

392. Secure and Differentiated Fog-Assisted Data Access for Internet of Things.

393. On the Hardness of Sparsely Learning Parity with Noise.

394. Detecting Cyberbullying across Social Media Platforms in Saudi Arabia Using Sentiment Analysis: A Case Study.

395. Automatic Diagnosis of Diabetic Retinopathy from Retinal Abnormalities: Improved Jaya-Based Feature Selection and Recurrent Neural Network.

396. Matching Preclusion of Enhanced Hypercubes.

397. (Im)Possibility on Constructing Verifiable Random Functions.

398. Optimization Enabled Black Hole Entropic Fuzzy Clustering Approach for Medical Data.

399. Differentially Private Publication For Correlated Non-Numerical Data.

400. MBSO Algorithm For Handling Energy-Throughput Trade-Off In Cognitive Radio Networks.