Found: 34
Select item for more details and to access through your institution.
Kth min Threshold Encryption for Privacy-preserving Data Evaluation.
- Published in:
- Computer Journal, 2024, v. 67, n. 5, p. 1941, doi. 10.1093/comjnl/bxad113
- By:
- Publication type:
- Article
Clinical Dataset Classification Using Feature Ranking And Satin Bower Bird Optimized SVMs.
- Published in:
- Computer Journal, 2024, v. 67, n. 5, p. 1993, doi. 10.1093/comjnl/bxad118
- By:
- Publication type:
- Article
Privacy-Preserving Image Retrieval with Multi-Modal Query.
- Published in:
- Computer Journal, 2024, v. 67, n. 5, p. 1979, doi. 10.1093/comjnl/bxad117
- By:
- Publication type:
- Article
GUI: A Geolocation Method for Unreachable IP.
- Published in:
- Computer Journal, 2024, v. 67, n. 5, p. 1963, doi. 10.1093/comjnl/bxad116
- By:
- Publication type:
- Article
Privacy-Preserving Confidential Reporting System With Designated Reporters.
- Published in:
- Computer Journal, 2024, v. 67, n. 5, p. 1951, doi. 10.1093/comjnl/bxad114
- By:
- Publication type:
- Article
Thematic Editorial, It Is Hard To Imagine A World Without Algorithms and Data Science.
- Published in:
- Computer Journal, 2024, v. 67, n. 5, p. 1605, doi. 10.1093/comjnl/bxae046
- By:
- Publication type:
- Article
API Recommendation For Mashup Creation: A Comprehensive Survey.
- Published in:
- Computer Journal, 2024, v. 67, n. 5, p. 1920, doi. 10.1093/comjnl/bxad112
- By:
- Publication type:
- Article
Eager Term Rewriting For The Fracterm Calculus Of Common Meadows.
- Published in:
- Computer Journal, 2024, v. 67, n. 5, p. 1866, doi. 10.1093/comjnl/bxad106
- By:
- Publication type:
- Article
KVFL: Key-Value-Based Persistent Fuzzing for IoT Web Servers.
- Published in:
- Computer Journal, 2024, v. 67, n. 5, p. 1892, doi. 10.1093/comjnl/bxad110
- By:
- Publication type:
- Article
Stealthy Backdoor Attacks On Deep Point Cloud Recognization Networks.
- Published in:
- Computer Journal, 2024, v. 67, n. 5, p. 1879, doi. 10.1093/comjnl/bxad109
- By:
- Publication type:
- Article
Keyframe-guided Video Swin Transformer with Multi-path Excitation for Violence Detection.
- Published in:
- Computer Journal, 2024, v. 67, n. 5, p. 1826, doi. 10.1093/comjnl/bxad103
- By:
- Publication type:
- Article
Enhancing Auditory Brainstem Response Classification Based On Vision Transformer.
- Published in:
- Computer Journal, 2024, v. 67, n. 5, p. 1872, doi. 10.1093/comjnl/bxad107
- By:
- Publication type:
- Article
Anonymization of face images with Contrastive Learning.
- Published in:
- Computer Journal, 2024, v. 67, n. 5, p. 1910, doi. 10.1093/comjnl/bxad111
- By:
- Publication type:
- Article
An Intrusion Detection Method Based on Attention Mechanism to Improve CNN-BiLSTM Model.
- Published in:
- Computer Journal, 2024, v. 67, n. 5, p. 1851, doi. 10.1093/comjnl/bxad105
- By:
- Publication type:
- Article
Leveraging Meta-Learning To Improve Unsupervised Domain Adaptation.
- Published in:
- Computer Journal, 2024, v. 67, n. 5, p. 1838, doi. 10.1093/comjnl/bxad104
- By:
- Publication type:
- Article
Correction to: Automatic Diagnosis of Diabetic Retinopathy from Retinal Abnormalities: Improved Jaya-Based Feature Selection and Recurrent Neural Network.
- Published in:
- 2024
- Publication type:
- Correction Notice
Policy-Based Remote User Authentication From Multi-Biometrics.
- Published in:
- Computer Journal, 2024, v. 67, n. 5, p. 1814, doi. 10.1093/comjnl/bxad102
- By:
- Publication type:
- Article
Gathering Over Heterogeneous Meeting Nodes.
- Published in:
- Computer Journal, 2024, v. 67, n. 5, p. 1794, doi. 10.1093/comjnl/bxad101
- By:
- Publication type:
- Article
Sparse Backdoor Attack Against Neural Networks.
- Published in:
- Computer Journal, 2024, v. 67, n. 5, p. 1783, doi. 10.1093/comjnl/bxad100
- By:
- Publication type:
- Article
An Intelligent Air Monitoring System For Pollution Prediction: A Predictive Healthcare Perspective.
- Published in:
- Computer Journal, 2024, v. 67, n. 5, p. 1763, doi. 10.1093/comjnl/bxad099
- By:
- Publication type:
- Article
SPAW-SMOTE: Space Partitioning Adaptive Weighted Synthetic Minority Oversampling Technique For Imbalanced Data Set Learning.
- Published in:
- Computer Journal, 2024, v. 67, n. 5, p. 1747, doi. 10.1093/comjnl/bxad098
- By:
- Publication type:
- Article
Identifying and Ranking Influential Spreaders in Complex Networks by Localized Decreasing Gravity Model.
- Published in:
- Computer Journal, 2024, v. 67, n. 5, p. 1727, doi. 10.1093/comjnl/bxad097
- By:
- Publication type:
- Article
Cryptanalysis Of A Type Of White-Box Implementations Of The SM4 Block Cipher.
- Published in:
- Computer Journal, 2024, v. 67, n. 5, p. 1663, doi. 10.1093/comjnl/bxad091
- By:
- Publication type:
- Article
Similarity Regression Of Functions In Different Compiled Forms With Neural Attentions On Dual Control-Flow Graphs.
- Published in:
- Computer Journal, 2024, v. 67, n. 5, p. 1710, doi. 10.1093/comjnl/bxad095
- By:
- Publication type:
- Article
Underwater Wireless Sensor Network-Based Delaunay Triangulation (UWSN-DT) Algorithm for Sonar Map Fusion.
- Published in:
- Computer Journal, 2024, v. 67, n. 5, p. 1699, doi. 10.1093/comjnl/bxad094
- By:
- Publication type:
- Article
Lattice-Based Homomorphic Encryption For Privacy-Preserving Smart Meter Data Analytics.
- Published in:
- Computer Journal, 2024, v. 67, n. 5, p. 1687, doi. 10.1093/comjnl/bxad093
- By:
- Publication type:
- Article
Coalitional Double Auction For Ridesharing With Desired Benefit And QoE Constraints.
- Published in:
- Computer Journal, 2024, v. 67, n. 5, p. 1674, doi. 10.1093/comjnl/bxad092
- By:
- Publication type:
- Article
The Orbits of Folded Crossed Cubes.
- Published in:
- Computer Journal, 2024, v. 67, n. 5, p. 1719, doi. 10.1093/comjnl/bxad096
- By:
- Publication type:
- Article
Enumeration Of Subtrees Of Two Families Of Self-Similar Networks Based On Novel Two-Forest Dual Transformations.
- Published in:
- Computer Journal, 2024, v. 67, n. 5, p. 1652, doi. 10.1093/comjnl/bxad090
- By:
- Publication type:
- Article
Online Optimization Method of Learning Process for Meta-Learning.
- Published in:
- Computer Journal, 2024, v. 67, n. 5, p. 1645, doi. 10.1093/comjnl/bxad089
- By:
- Publication type:
- Article
A Hybrid Solution For The Cold Start Problem In Recommendation.
- Published in:
- Computer Journal, 2024, v. 67, n. 5, p. 1637, doi. 10.1093/comjnl/bxad088
- By:
- Publication type:
- Article
A Chinese Grammatical Error Correction Model Based On Grammatical Generalization And Parameter Sharing.
- Published in:
- Computer Journal, 2024, v. 67, n. 5, p. 1628, doi. 10.1093/comjnl/bxad087
- By:
- Publication type:
- Article
Knowledge-Aware Dual-Channel Graph Neural Networks For Denoising Recommendation.
- Published in:
- Computer Journal, 2024, v. 67, n. 5, p. 1607, doi. 10.1093/comjnl/bxad085
- By:
- Publication type:
- Article
AKGF: Automatic Kernel Generation for DNN on CPU-FPGA.
- Published in:
- Computer Journal, 2024, v. 67, n. 5, p. 1619, doi. 10.1093/comjnl/bxad086
- By:
- Publication type:
- Article