nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Access control encryption with efficient verifiable sanitized decryption
|
Wang, Huige |
|
|
465 |
C |
p. 72-85 |
artikel |
2 |
An incremental attribute reduction method for dynamic data mining
|
Jing, Yunge |
|
|
465 |
C |
p. 202-218 |
artikel |
3 |
A payload-dependent packet rearranging covert channel for mobile VoIP traffic
|
Liang, Chen |
|
|
465 |
C |
p. 162-173 |
artikel |
4 |
A scalable framework for cross-lingual authorship identification
|
Sarwar, Raheem |
|
|
465 |
C |
p. 323-339 |
artikel |
5 |
Block-secure: Blockchain based scheme for secure P2P cloud storage
|
Li, Jiaxing |
|
|
465 |
C |
p. 219-231 |
artikel |
6 |
Consensus rate-based label propagation for semi-supervised classification
|
Yu, Jaehong |
|
|
465 |
C |
p. 265-284 |
artikel |
7 |
DeepPIM: A deep neural point-of-interest imputation model
|
Chang, Buru |
|
|
465 |
C |
p. 61-71 |
artikel |
8 |
Design of optimal lighting control strategy based on multi-variable fractional-order extremum seeking method
|
Yin, Chun |
|
|
465 |
C |
p. 38-60 |
artikel |
9 |
Editorial Board
|
|
|
|
465 |
C |
p. ii |
artikel |
10 |
Efficient and effective influence maximization in social networks: A hybrid-approach
|
Ko, Yun-Yong |
|
|
465 |
C |
p. 144-161 |
artikel |
11 |
Efficient biometric identity-based encryption
|
Li, Xiaoguo |
|
|
465 |
C |
p. 248-264 |
artikel |
12 |
Enabling verifiable multiple keywords search over encrypted cloud data
|
Miao, Yinbin |
|
|
465 |
C |
p. 21-37 |
artikel |
13 |
Entropy based evolutionary algorithm with adaptive reference points for many-objective optimization problems
|
Zhou, Chong |
|
|
465 |
C |
p. 232-247 |
artikel |
14 |
Event-triggered resilient control for cyber-physical systems under asynchronous DoS attacks
|
Sun, Yuan-Cheng |
|
|
465 |
C |
p. 340-352 |
artikel |
15 |
Exploiting lower bounds to accelerate approximate nearest neighbor search on high-dimensional data
|
Liu, Yingfan |
|
|
465 |
C |
p. 484-504 |
artikel |
16 |
Hesitant fuzzy preference envelopment analysis and alternative improvement
|
Zhou, Wei |
|
|
465 |
C |
p. 105-117 |
artikel |
17 |
Improving exploration property of velocity-based artificial bee colony algorithm using chaotic systems
|
Moradi, Parham |
|
|
465 |
C |
p. 130-143 |
artikel |
18 |
Improving imbalanced learning through a heuristic oversampling method based on k-means and SMOTE
|
Douzas, Georgios |
|
|
465 |
C |
p. 1-20 |
artikel |
19 |
Multiattribute decision making based on Shannon's information entropy, non-linear programming methodology, and interval-valued intuitionistic fuzzy values
|
Chen, Shyi-Ming |
|
|
465 |
C |
p. 404-424 |
artikel |
20 |
Multi-label semi-supervised classification through optimum-path forest
|
Amorim, Willian P. |
|
|
465 |
C |
p. 86-104 |
artikel |
21 |
Person name disambiguation on the web in a multilingual context
|
Delgado, Agustín D. |
|
|
465 |
C |
p. 373-387 |
artikel |
22 |
Preselection via classification: A case study on evolutionary multiobjective optimization
|
Zhang, Jinyuan |
|
|
465 |
C |
p. 388-403 |
artikel |
23 |
Relational data imputation with quality guarantee
|
Fan, Fengfeng |
|
|
465 |
C |
p. 305-322 |
artikel |
24 |
Relational regularized risk prediction of acute coronary syndrome using electronic health records
|
Huang, Zhengxing |
|
|
465 |
C |
p. 118-129 |
artikel |
25 |
Reversible data hiding in encrypted image with separable capability and high embedding capacity
|
Qin, Chuan |
|
|
465 |
C |
p. 285-304 |
artikel |
26 |
Scaling up twin support vector regression with safe screening rule
|
Wang, Hongmei |
|
|
465 |
C |
p. 174-190 |
artikel |
27 |
Stability analysis of nonlinear telerobotic systems with time-varying communication channel delays using general integral inequalities
|
Baranitha, R. |
|
|
465 |
C |
p. 353-372 |
artikel |
28 |
Supervisory control of state-tree structures with partial observation
|
Gu, Chan |
|
|
465 |
C |
p. 523-544 |
artikel |
29 |
Switched systems approach to state bounding for time delay systems
|
Chen, Yong |
|
|
465 |
C |
p. 191-201 |
artikel |
30 |
Tolerance rough fuzzy decision tree
|
Zhai, Junhai |
|
|
465 |
C |
p. 425-438 |
artikel |
31 |
UnPART: PART without the ‘partial’ condition of it
|
Ibarguren, Igor |
|
|
465 |
C |
p. 505-522 |
artikel |
32 |
Using Compressed Suffix-Arrays for a compact representation of temporal-graphs
|
R. Brisaboa, Nieves |
|
|
465 |
C |
p. 459-483 |
artikel |
33 |
Wavelet-denoising multiple echo state networks for multivariate time series prediction
|
Xu, Meiling |
|
|
465 |
C |
p. 439-458 |
artikel |