nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A center-driven image set partition algorithm for efficient structure from motion
|
Sun, Kun |
|
2019 |
479 |
C |
p. 101-115 |
artikel |
2 |
A hand-based biometric system in visible light for mobile environments
|
Barra, Silvio |
|
2019 |
479 |
C |
p. 472-485 |
artikel |
3 |
A novel CNN based security guaranteed image watermarking generation scenario for smart city applications
|
Li, Daming |
|
2019 |
479 |
C |
p. 432-447 |
artikel |
4 |
Data fusion technique in SPIDER Peer-to-Peer networks in smart cities for security enhancements
|
Mocanu, Bogdan |
|
2019 |
479 |
C |
p. 607-621 |
artikel |
5 |
Data source selection for information integration in big data era
|
Lin, Yiming |
|
2019 |
479 |
C |
p. 197-213 |
artikel |
6 |
Distributed dynamic average consensus for nonlinear multi-agent systems in the presence of external disturbances over a directed graph
|
Wang, Zhu |
|
2019 |
479 |
C |
p. 40-54 |
artikel |
7 |
Drawing on the iPad to input fuzzy sets with an application to linguistic data science
|
Yager, Ronald R. |
|
2019 |
479 |
C |
p. 277-291 |
artikel |
8 |
Editorial Board
|
|
|
2019 |
479 |
C |
p. ii |
artikel |
9 |
Efficient attribute-based encryption with attribute revocation for assured data deletion
|
Xue, Liang |
|
2019 |
479 |
C |
p. 640-650 |
artikel |
10 |
Efficient fingerprint matching on smart cards for high security and privacy in smart systems
|
Nedjah, Nadia |
|
2019 |
479 |
C |
p. 622-639 |
artikel |
11 |
Enabling Smart Data: Noise filtering in Big Data classification
|
García-Gil, Diego |
|
2019 |
479 |
C |
p. 135-152 |
artikel |
12 |
Facial semantic descriptors based on information granules
|
Ren, Yan |
|
2019 |
479 |
C |
p. 335-354 |
artikel |
13 |
Forecasting with auxiliary information in forecasts using multivariate singular spectrum analysis
|
Silva, Emmanuel Sirimal |
|
2019 |
479 |
C |
p. 214-230 |
artikel |
14 |
Fuzzy integrated Bayesian Dempster–Shafer theory to defend cross-layer heterogeneity attacks in communication network of Smart Grid
|
Velusamy, Durgadevi |
|
2019 |
479 |
C |
p. 542-566 |
artikel |
15 |
Game theoretic security of quantum bit commitment
|
Zhou, Lu |
|
2019 |
479 |
C |
p. 503-514 |
artikel |
16 |
Group evolution patterns in running races
|
Diez, Y. |
|
2019 |
479 |
C |
p. 20-39 |
artikel |
17 |
Handling uncertainty in citizen science data: Towards an improved amateur-based large-scale classification
|
Jiménez, Manuel |
|
2019 |
479 |
C |
p. 301-320 |
artikel |
18 |
Heuristic target class selection for advancing performance of coverage-based rule learning
|
Liu, Han |
|
2019 |
479 |
C |
p. 164-179 |
artikel |
19 |
HybridORAM: Practical oblivious cloud storage with constant bandwidth
|
Li, Bo |
|
2019 |
479 |
C |
p. 651-663 |
artikel |
20 |
Keyword guessing attacks on a public key encryption with keyword search scheme without random oracle and its improvement
|
Lu, Yang |
|
2019 |
479 |
C |
p. 270-276 |
artikel |
21 |
Learning peer recommendation using attention-driven CNN with interaction tripartite graph
|
Hu, Qintai |
|
2019 |
479 |
C |
p. 231-249 |
artikel |
22 |
Mining weighted frequent sequences in uncertain databases
|
Rahman, Md Mahmudur |
|
2019 |
479 |
C |
p. 76-100 |
artikel |
23 |
Modeling and clustering attacker activities in IoT through machine learning techniques
|
Sun, Peiyuan |
|
2019 |
479 |
C |
p. 456-471 |
artikel |
24 |
New publicly verifiable computation for batch matrix multiplication
|
Zhang, Xiaoyu |
|
2019 |
479 |
C |
p. 664-678 |
artikel |
25 |
New results on dissipativity analysis of singular systems with time-varying delay
|
Zhi, Ya-Li |
|
2019 |
479 |
C |
p. 292-300 |
artikel |
26 |
Novel dynamic multiple classification system for network traffic
|
Xiao, Xi |
|
2019 |
479 |
C |
p. 526-541 |
artikel |
27 |
Personalized recommendation based on hierarchical interest overlapping community
|
Zheng, Jianxing |
|
2019 |
479 |
C |
p. 55-75 |
artikel |
28 |
Predicting disease-genes based on network information loss and protein complexes in heterogeneous network
|
Lei, Xiujuan |
|
2019 |
479 |
C |
p. 386-400 |
artikel |
29 |
Privacy-preserving smart IoT-based healthcare big data storage and self-adaptive access control system
|
Yang, Yang |
|
2019 |
479 |
C |
p. 567-592 |
artikel |
30 |
Protecting internet infrastructure against link flooding attacks: A techno-economic perspective
|
Ma, Xiaobo |
|
2019 |
479 |
C |
p. 486-502 |
artikel |
31 |
Raspberry Pi assisted facial expression recognition framework for smart security in law-enforcement services
|
Sajjad, Muhammad |
|
2019 |
479 |
C |
p. 416-431 |
artikel |
32 |
Revocable attribute-based encryption with decryption key exposure resistance and ciphertext delegation
|
Xu, Shengmin |
|
2019 |
479 |
C |
p. 116-134 |
artikel |
33 |
Robust deadlock control of automated manufacturing systems with multiple unreliable resources
|
Luo, JianChao |
|
2019 |
479 |
C |
p. 401-415 |
artikel |
34 |
Secure weighted possibilistic c-means algorithm on cloud for clustering big data
|
Zhang, Qingchen |
|
2019 |
479 |
C |
p. 515-525 |
artikel |
35 |
Smart collaborative distribution for privacy enhancement in moving target defense
|
Song, Fei |
|
2019 |
479 |
C |
p. 593-606 |
artikel |
36 |
SSIR: Secure similarity image retrieval in IoT
|
Yan, Hongyang |
|
2019 |
479 |
C |
p. 153-163 |
artikel |
37 |
Support driven wavelet frame-based image deblurring
|
He, Liangtian |
|
2019 |
479 |
C |
p. 250-269 |
artikel |
38 |
The transformation of the k-Shortest Steiner trees search problem into binary dynamic problem for effective evolutionary methods application
|
Przewoźniczek, Michał Witold |
|
2019 |
479 |
C |
p. 1-19 |
artikel |
39 |
Triangular bounded consistency of fuzzy preference relations
|
Chang, Wen-Jun |
|
2019 |
479 |
C |
p. 355-371 |
artikel |
40 |
Universal designated verifier signature scheme with non-delegatability in the standard model
|
Rastegari, Parvin |
|
2019 |
479 |
C |
p. 321-334 |
artikel |
41 |
User activity measurement in rating-based online-to-offline (O2O) service recommendation
|
Pan, Yuchen |
|
2019 |
479 |
C |
p. 180-196 |
artikel |
42 |
Using generative adversarial networks for improving classification effectiveness in credit card fraud detection
|
Fiore, Ugo |
|
2019 |
479 |
C |
p. 448-455 |
artikel |
43 |
Verifiable outsourced computation over encrypted data
|
Yu, Xixun |
|
2019 |
479 |
C |
p. 372-385 |
artikel |