nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A comparative study of machine translation for multilingual sentence-level sentiment analysis
|
Araújo, Matheus |
|
|
512 |
C |
p. 1078-1102 |
artikel |
2 |
A convolutional neural-based learning classifier system for detecting database intrusion via insider attack
|
Bu, Seok-Jun |
|
|
512 |
C |
p. 123-136 |
artikel |
3 |
Adaptive decentralized output feedback PI tracking control design for uncertain interconnected nonlinear systems with input quantization
|
Sun, Haibin |
|
|
512 |
C |
p. 186-206 |
artikel |
4 |
A fully scalable big data framework for Botnet detection based on network traffic analysis
|
Mousavi, S.H. |
|
|
512 |
C |
p. 629-640 |
artikel |
5 |
A general fragments allocation method for join query in distributed database
|
Gao, Jintao |
|
|
512 |
C |
p. 1249-1263 |
artikel |
6 |
A heterogeneous QUALIFLEX method with criteria interaction for multi-criteria group decision making
|
Liang, Yingying |
|
|
512 |
C |
p. 1481-1502 |
artikel |
7 |
A hybrid convolution network for serial number recognition on banknotes
|
Wang, Feng |
|
|
512 |
C |
p. 952-963 |
artikel |
8 |
A local search algorithm with reinforcement learning based repair procedure for minimum weight independent dominating set
|
Wang, Yiyuan |
|
|
512 |
C |
p. 533-548 |
artikel |
9 |
An adaptive hybrid evolutionary immune multi-objective algorithm based on uniform distribution selection
|
Qiao, Junfei |
|
|
512 |
C |
p. 446-470 |
artikel |
10 |
An adaptive Lagrangian relaxation-based algorithm for a coordinated water supply and wastewater collection network design problem
|
Fathollahi-Fard, Amir Mohammad |
|
|
512 |
C |
p. 1335-1359 |
artikel |
11 |
Analyzing center/surround retinex
|
Lisani, Jose-Luis |
|
|
512 |
C |
p. 741-759 |
artikel |
12 |
An efficient discrete PSO coupled with a fast local search heuristic for the DNA fragment assembly problem
|
Ben Ali, Abdelkamel |
|
|
512 |
C |
p. 880-908 |
artikel |
13 |
An ensemble method for inverse reinforcement learning
|
Lin, Jin-Ling |
|
|
512 |
C |
p. 518-532 |
artikel |
14 |
A new algorithm for positive influence maximization in signed networks
|
Ju, Weijia |
|
|
512 |
C |
p. 1571-1591 |
artikel |
15 |
A non-revisiting genetic algorithm based on a novel binary space partition tree
|
Su, Yansen |
|
|
512 |
C |
p. 661-674 |
artikel |
16 |
A novel approach for learning label correlation with application to feature selection of multi-label data
|
Che, Xiaoya |
|
|
512 |
C |
p. 795-812 |
artikel |
17 |
A novel forecasting model for the long-term fluctuation of time series based on polar fuzzy information granules
|
Luo, Chao |
|
|
512 |
C |
p. 760-779 |
artikel |
18 |
Applying social network analysis to genetic algorithm in optimizing project risk response decisions
|
Wang, Lei |
|
|
512 |
C |
p. 1024-1042 |
artikel |
19 |
A probabilistic view on semilinear copulas
|
Sloot, Henrik |
|
|
512 |
C |
p. 258-276 |
artikel |
20 |
A projection-based regret theory method for multi-attribute decision making under interval type-2 fuzzy sets environment
|
Wang, Huidong |
|
|
512 |
C |
p. 108-122 |
artikel |
21 |
A recursive algorithm to increase the speed of regression-based binary recommendation systems
|
Khadem, Mahla Mohammadzadeh |
|
|
512 |
C |
p. 1324-1334 |
artikel |
22 |
A refined Hölder’s inequality for Choquet expectation by Cauchy-Schwarz’s inequality
|
Agahi, Hamzeh |
|
|
512 |
C |
p. 929-934 |
artikel |
23 |
A scheduling scheme in the cloud computing environment using deep Q-learning
|
Tong, Zhao |
|
|
512 |
C |
p. 1170-1191 |
artikel |
24 |
A time-varying mirrored S-shaped transfer function for binary particle swarm optimization
|
Beheshti, Zahra |
|
|
512 |
C |
p. 1503-1542 |
artikel |
25 |
A tree-based neural network model for biomedical event trigger detection
|
Fei, Hao |
|
|
512 |
C |
p. 175-185 |
artikel |
26 |
Auto-weighted multi-view co-clustering with bipartite graphs
|
Huang, Shudong |
|
|
512 |
C |
p. 18-30 |
artikel |
27 |
A vague multidimensional dependency structure: Conditional versus Unconditional fuzzy copula models
|
Romagnoli, Silvia |
|
|
512 |
C |
p. 1202-1213 |
artikel |
28 |
Calculus for linearly correlated fuzzy function using Fréchet derivative and Riemann integral
|
Santo Pedro, Francielle |
|
|
512 |
C |
p. 219-237 |
artikel |
29 |
CCFR2: A more efficient cooperative co-evolutionary framework for large-scale global optimization
|
Yang, Ming |
|
|
512 |
C |
p. 64-79 |
artikel |
30 |
Clicking position and user posting behavior in online review systems: A data-driven agent-based modeling approach
|
Jiang, Guoyin |
|
|
512 |
C |
p. 161-174 |
artikel |
31 |
Conditional Wasserstein generative adversarial network-gradient penalty-based approach to alleviating imbalanced data classification
|
Zheng, Ming |
|
|
512 |
C |
p. 1009-1023 |
artikel |
32 |
Consensus of multi-agent systems with finite-time and fixed-time observation
|
Yu, Zhiyong |
|
|
512 |
C |
p. 909-928 |
artikel |
33 |
Constrained Relational Topic Models
|
Terragni, Silvia |
|
|
512 |
C |
p. 581-594 |
artikel |
34 |
Corrigendum to “Recurrent neural network-based semantic variational autoencoder for Sequence-to-sequence learning” [Information Sciences 490 (2019) 59-73]
|
Jang, Myeongjun |
|
|
512 |
C |
p. 277 |
artikel |
35 |
Designing privacy-aware internet of things applications
|
Perera, Charith |
|
|
512 |
C |
p. 238-257 |
artikel |
36 |
Determining the most representative image on a Web page
|
Vyas, Krishna |
|
|
512 |
C |
p. 1234-1248 |
artikel |
37 |
2D Hybrid chaos map for image security transform based on framelet and cellular automata
|
Khedmati, Y. |
|
|
512 |
C |
p. 855-879 |
artikel |
38 |
Editorial Board
|
|
|
|
512 |
C |
p. ii |
artikel |
39 |
Efficient and accurate 3D modeling based on a novel local feature descriptor
|
Zhao, Bao |
|
|
512 |
C |
p. 295-314 |
artikel |
40 |
Efficient digital signatures from RSA without random oracles
|
Seo, Jae Hong |
|
|
512 |
C |
p. 471-480 |
artikel |
41 |
Efficient distance join query processing in distributed spatial data management systems
|
García-García, Francisco |
|
|
512 |
C |
p. 985-1008 |
artikel |
42 |
Enhanced digital chaotic maps based on bit reversal with applications in random bit generators
|
Alawida, Moatsum |
|
|
512 |
C |
p. 1155-1169 |
artikel |
43 |
Event-based fault-tolerant control for networked control systems applied to aircraft engine system
|
Li, Tao |
|
|
512 |
C |
p. 1063-1077 |
artikel |
44 |
Extended decision field theory with social-learning for long-term decision-making processes in social networks
|
Lee, Seunghan |
|
|
512 |
C |
p. 1293-1307 |
artikel |
45 |
Fabric defect inspection based on lattice segmentation and template statistics
|
Jia, Liang |
|
|
512 |
C |
p. 964-984 |
artikel |
46 |
Face hallucination via multiple feature learning with hierarchical structure
|
Liu, Licheng |
|
|
512 |
C |
p. 416-430 |
artikel |
47 |
Finite-time containment control for nonlinear multi-agent systems with external disturbances
|
Lü, Hui |
|
|
512 |
C |
p. 338-351 |
artikel |
48 |
GraPASA: Parametric graph embedding via siamese architecture
|
Chen, Yujun |
|
|
512 |
C |
p. 1442-1457 |
artikel |
49 |
H ∞ bumpless transfer reliable control of Markovian switching LPV systems subject to actuator failures
|
Yang, Dong |
|
|
512 |
C |
p. 431-445 |
artikel |
50 |
How to securely outsource the extended euclidean algorithm for large-scale polynomials over finite fields
|
Zhou, Qiang |
|
|
512 |
C |
p. 641-660 |
artikel |
51 |
Identification of influencers in complex networks by local information dimensionality
|
Wen, Tao |
|
|
512 |
C |
p. 549-562 |
artikel |
52 |
Improving network embedding with partially available vertex and edge content
|
Lan, Lin |
|
|
512 |
C |
p. 935-951 |
artikel |
53 |
Incentive mechanism for the listing item task in crowdsourcing
|
Wang, Shaofei |
|
|
512 |
C |
p. 80-95 |
artikel |
54 |
Incremental route inference from low-sampling GPS data: An opportunistic approach to online map matching
|
Luo, Linbo |
|
|
512 |
C |
p. 1407-1423 |
artikel |
55 |
Inference attacks on genomic privacy with an improved HMM and an RCNN model for unrelated individuals
|
Ding, Hongfa |
|
|
512 |
C |
p. 207-218 |
artikel |
56 |
Interpretable multiclass classification by MDL-based rule lists
|
Proença, Hugo M. |
|
|
512 |
C |
p. 1372-1393 |
artikel |
57 |
Intrusion-resilient public cloud auditing scheme with authenticator update
|
Xu, Yan |
|
|
512 |
C |
p. 616-628 |
artikel |
58 |
Kernel density estimation based sampling for imbalanced class distribution
|
Kamalov, Firuz |
|
|
512 |
C |
p. 1192-1201 |
artikel |
59 |
Learning heterogeneous traffic patterns for travel time prediction of bus journeys
|
He, Peilan |
|
|
512 |
C |
p. 1394-1406 |
artikel |
60 |
Learning imbalanced datasets based on SMOTE and Gaussian distribution
|
Pan, Tingting |
|
|
512 |
C |
p. 1214-1233 |
artikel |
61 |
LSC: Online auto-update smart contracts for fortifying blockchain-based log systems
|
Shao, Wei |
|
|
512 |
C |
p. 506-517 |
artikel |
62 |
Making use of observable parameters in evolutionary dynamic optimization
|
Zhu, Tao |
|
|
512 |
C |
p. 708-725 |
artikel |
63 |
Minimizing rumor influence in multiplex online social networks based on human individual and social behaviors
|
Hosni, Adil Imad Eddine |
|
|
512 |
C |
p. 1458-1480 |
artikel |
64 |
Movement patterns of a particle swarm in high dimensional spaces
|
Oldewage, Elre T. |
|
|
512 |
C |
p. 1043-1062 |
artikel |
65 |
MP3 steganalysis based on joint point-wise and block-wise correlations
|
Wang, Yuntao |
|
|
512 |
C |
p. 1118-1133 |
artikel |
66 |
Multiattribute group decision making based on intuitionistic fuzzy partitioned Maclaurin symmetric mean operators
|
Liu, Peide |
|
|
512 |
C |
p. 830-854 |
artikel |
67 |
Multifactorial optimization via explicit multipopulation evolutionary framework
|
Li, Genghui |
|
|
512 |
C |
p. 1555-1570 |
artikel |
68 |
Note on entropies of hesitant fuzzy linguistic term sets and their applications
|
Wei, Cuiping |
|
|
512 |
C |
p. 352-368 |
artikel |
69 |
Novel equal division values based on players’ excess vectors and their applications to logistics enterprise coalitions
|
Liu, Jia-Cai |
|
|
512 |
C |
p. 1543-1554 |
artikel |
70 |
Nullnorms on bounded lattices derived from t-norms and t-conorms
|
Çaylı, Gül Deniz |
|
|
512 |
C |
p. 1134-1154 |
artikel |
71 |
Objective reduction for visualising many-objective solution sets
|
Zhen, Liangli |
|
|
512 |
C |
p. 278-294 |
artikel |
72 |
On efficiently diversified top-k geo-social keyword query processing in road networks
|
Zhao, Jingwen |
|
|
512 |
C |
p. 813-829 |
artikel |
73 |
On the f-divergence for discrete non-additive measures
|
Torra, Vicenç |
|
|
512 |
C |
p. 50-63 |
artikel |
74 |
Optimal performance of LTI systems over power constrained erasure channels
|
Jiang, Xiao-Wei |
|
|
512 |
C |
p. 327-337 |
artikel |
75 |
PAC: A novel self-adaptive neuro-fuzzy controller for micro aerial vehicles
|
Ferdaus, Md Meftahul |
|
|
512 |
C |
p. 481-505 |
artikel |
76 |
Pareto optimal strategy for linear stochastic systems with H ∞ constraint in finite horizon
|
Jiang, Xiushan |
|
|
512 |
C |
p. 1103-1117 |
artikel |
77 |
Parsimonious generalization of fuzzy thematic sets in taxonomies applied to the analysis of tendencies of research in data science
|
Frolov, Dmitry |
|
|
512 |
C |
p. 595-615 |
artikel |
78 |
Personalized image quality assessment with Social-Sensed aesthetic preference
|
Cui, Chaoran |
|
|
512 |
C |
p. 780-794 |
artikel |
79 |
Predicting the active period of popularity evolution: A case study on Twitter hashtags
|
Huang, Jianyi |
|
|
512 |
C |
p. 315-326 |
artikel |
80 |
Rapid compressed sensing reconstruction: A semi-tensor product approach
|
Wang, Jinming |
|
|
512 |
C |
p. 693-707 |
artikel |
81 |
Recommendation system exploiting aspect-based opinion mining with deep learning method
|
Da'u, Aminu |
|
|
512 |
C |
p. 1279-1292 |
artikel |
82 |
Resilient and secure remote monitoring for a class of cyber-physical systems against attacks
|
Ge, Xiaohua |
|
|
512 |
C |
p. 1592-1605 |
artikel |
83 |
Robust event-triggered reliable control for T-S fuzzy uncertain systems via weighted based inequality
|
Nagamani, G. |
|
|
512 |
C |
p. 31-49 |
artikel |
84 |
Robust face hallucination via locality-constrained multiscale coding
|
Li, Na |
|
|
512 |
C |
p. 369-380 |
artikel |
85 |
Robust reversible data hiding scheme based on two-layer embedding strategy
|
Kumar, Rajeev |
|
|
512 |
C |
p. 96-107 |
artikel |
86 |
Robust visual tracking based on variational auto-encoding Markov chain Monte Carlo
|
Kwon, Junseok |
|
|
512 |
C |
p. 1308-1323 |
artikel |
87 |
Single image super resolution using dictionary learning and sparse coding with multi-scale and multi-directional Gabor feature representation
|
Ayas, Selen |
|
|
512 |
C |
p. 1264-1278 |
artikel |
88 |
Smoothed self-organizing map for robust clustering
|
D’Urso, Pierpaolo |
|
|
512 |
C |
p. 381-401 |
artikel |
89 |
Sparse unmixing of hyperspectral data with bandwise model
|
Li, Chang |
|
|
512 |
C |
p. 1424-1441 |
artikel |
90 |
Sparsity in function and derivative approximation via the empirical feature space
|
Soman, Sumit |
|
|
512 |
C |
p. 402-415 |
artikel |
91 |
Spectral based hypothesis testing for community detection in complex networks
|
Dong, Zhishan |
|
|
512 |
C |
p. 1360-1371 |
artikel |
92 |
Structured subspace embedding on attributed networks
|
Yu, Zhongjing |
|
|
512 |
C |
p. 726-740 |
artikel |
93 |
Tensor-based mathematical framework and new centralities for temporal multilayer networks
|
Wang, Dingjie |
|
|
512 |
C |
p. 563-580 |
artikel |
94 |
Toward optimal participant decisions with voting-based incentive model for crowd sensing
|
Jiang, Nan |
|
|
512 |
C |
p. 1-17 |
artikel |
95 |
Two-pass hashing feature representation and searching method for copy-move forgery detection
|
Zhong, Jun-Liu |
|
|
512 |
C |
p. 675-692 |
artikel |
96 |
Vector partitioning quantization utilizing K-means clustering for physical layer secret key generation
|
Han, Qingqing |
|
|
512 |
C |
p. 137-160 |
artikel |