no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
Adaptive fault-tolerant control for nonlinear multi-agent systems with DoS attacks
|
Zhao, Liang |
|
|
526 |
C |
p. 39-53 |
article |
2 |
An efficient aggregation scheme resisting on malicious data mining attacks for smart grid
|
Shen, Hua |
|
|
526 |
C |
p. 289-300 |
article |
3 |
Block diagonal representation learning for robust subspace clustering
|
Wang, Lijuan |
|
|
526 |
C |
p. 54-67 |
article |
4 |
ECC2: Error correcting code and elliptic curve based cryptosystem
|
Zhang, Fangguo |
|
|
526 |
C |
p. 301-320 |
article |
5 |
Editorial Board
|
|
|
|
526 |
C |
p. ii |
article |
6 |
Exposing splicing forgery in realistic scenes using deep fusion network
|
Liu, Bo |
|
|
526 |
C |
p. 133-150 |
article |
7 |
Fuzzy robust fault-tolerant control for offshore ship-mounted crane system
|
Guo, Bin |
|
|
526 |
C |
p. 119-132 |
article |
8 |
Generating behavior features for cold-start spam review detection with adversarial learning
|
Tang, Xiaoya |
|
|
526 |
C |
p. 274-288 |
article |
9 |
Incremental and decremental fuzzy bounded twin support vector machine
|
Mello, Alexandre R. |
|
|
526 |
C |
p. 20-38 |
article |
10 |
Interval-valued intuitionistic fuzzy analytic network process
|
Yang, Yang |
|
|
526 |
C |
p. 102-118 |
article |
11 |
Knowledge base enrichment by relation learning from social tagging data
|
Dong, Hang |
|
|
526 |
C |
p. 203-220 |
article |
12 |
Nature-inspired multiobjective patient stratification from cancer gene expression data
|
Wang, Yunhe |
|
|
526 |
C |
p. 245-262 |
article |
13 |
Novel fairness-aware co-scheduling for shared cache contention game on chip multiprocessors
|
Xiao, Zheng |
|
|
526 |
C |
p. 68-85 |
article |
14 |
Novel methods to finite-time Mittag-Leffler synchronization problem of fractional-order quaternion-valued neural networks
|
Xiao, Jianying |
|
|
526 |
C |
p. 221-244 |
article |
15 |
Plaintext-related image encryption algorithm based on perceptron-like network
|
Zhang, Yong |
|
|
526 |
C |
p. 180-202 |
article |
16 |
Privacy preservation for machine learning training and classification based on homomorphic encryption schemes
|
Li, Jing |
|
|
526 |
C |
p. 166-179 |
article |
17 |
SOAP: Semantic outliers automatic preprocessing
|
Trujillo, Leonardo |
|
|
526 |
C |
p. 86-101 |
article |
18 |
Stability analysis of a SAIR rumor spreading model with control strategies in online social networks
|
Zhu, Linhe |
|
|
526 |
C |
p. 1-19 |
article |
19 |
Stacked autoencoder-based community detection method via an ensemble clustering framework
|
Xu, Rongbin |
|
|
526 |
C |
p. 151-165 |
article |
20 |
Super Resolution Perception for Smart Meter Data
|
Liu, Guolong |
|
|
526 |
C |
p. 263-273 |
article |