nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Adaptively secure certificate-based broadcast encryption and its application to cloud storage service
|
Chen, Liqing |
|
|
538 |
C |
p. 273-289 |
artikel |
2 |
Adaptive stock trading strategies with deep reinforcement learning methods
|
Wu, Xing |
|
|
538 |
C |
p. 142-158 |
artikel |
3 |
A multilevel neighborhood sequential decision approach of three-way granular computing
|
Yang, Xin |
|
|
538 |
C |
p. 119-141 |
artikel |
4 |
An accurate and dynamic predictive model for a smart M-Health system using machine learning
|
Naseer Qureshi, Kashif |
|
|
538 |
C |
p. 486-502 |
artikel |
5 |
Bi-objective optimization of biclustering with binary data
|
Hanafi, Saïd |
|
|
538 |
C |
p. 444-466 |
artikel |
6 |
Covering-based variable precision fuzzy rough sets with PROMETHEE-EDAS methods
|
Zhan, Jianming |
|
|
538 |
C |
p. 314-336 |
artikel |
7 |
Differentially private distributed optimization for multi-agent systems via the augmented Lagrangian algorithm
|
Lv, Yuan-Wei |
|
|
538 |
C |
p. 39-53 |
artikel |
8 |
Differentially private publication of streaming trajectory data
|
Ding, Xiaofeng |
|
|
538 |
C |
p. 159-175 |
artikel |
9 |
Editorial Board
|
|
|
|
538 |
C |
p. ii |
artikel |
10 |
Efficient ciphertext-policy attribute-based encryption with blackbox traceability
|
Xu, Shengmin |
|
|
538 |
C |
p. 19-38 |
artikel |
11 |
Error-tolerant label prior for interactive image segmentation
|
Wang, Tao |
|
|
538 |
C |
p. 384-395 |
artikel |
12 |
Exponential operational laws and new aggregation operators for intuitionistic multiplicative set in multiple-attribute group decision making process
|
Garg, Harish |
|
|
538 |
C |
p. 245-272 |
artikel |
13 |
Generalized decomposition integral
|
Horanská, L'ubomíra |
|
|
538 |
C |
p. 415-427 |
artikel |
14 |
Improved recurrent generative adversarial networks with regularization techniques and a controllable framework
|
Lee, Minhyeok |
|
|
538 |
C |
p. 428-443 |
artikel |
15 |
Intent-based resource matching strategy in cloud
|
He, Li |
|
|
538 |
C |
p. 1-18 |
artikel |
16 |
Measures associated with granularity and rough approximations in interval-valued information tables based on kernel similarity relations
|
Ma, Xi-Ao |
|
|
538 |
C |
p. 337-357 |
artikel |
17 |
Multiattribute decision method for comprehensive logistics distribution center location selection based on 2-dimensional linguistic information
|
Liu, Peide |
|
|
538 |
C |
p. 209-244 |
artikel |
18 |
On relationship between three-way concept lattices
|
Zhao, Xuerong |
|
|
538 |
C |
p. 396-414 |
artikel |
19 |
Ordered pair of normalized real numbers
|
Zhou, Lei |
|
|
538 |
C |
p. 290-313 |
artikel |
20 |
Pareto dominance based Multiobjective Cohort Intelligence algorithm
|
Patil, Mukundraj V. |
|
|
538 |
C |
p. 69-118 |
artikel |
21 |
Posterior concentration and fast convergence rates for generalized Bayesian learning
|
Ho, Lam Si Tung |
|
|
538 |
C |
p. 372-383 |
artikel |
22 |
Publisher’s Note
|
|
|
|
538 |
C |
p. iii |
artikel |
23 |
Quantum generative adversarial network for generating discrete distribution
|
Situ, Haozhen |
|
|
538 |
C |
p. 193-208 |
artikel |
24 |
Ranking via partial ordering for answer selection
|
Jin, Zan-Xia |
|
|
538 |
C |
p. 358-371 |
artikel |
25 |
Remarks on the cryptanalysis of common prime RSA for IoT constrained low power devices
|
Mumtaz, Majid |
|
|
538 |
C |
p. 54-68 |
artikel |
26 |
Resilient decentralized sampled-data H ∞ filter design for linear interconnected systems subject to denial-of-service attacks
|
Gao, Rui |
|
|
538 |
C |
p. 467-485 |
artikel |
27 |
Semantic trajectory representation and retrieval via hierarchical embedding
|
Gao, Chongming |
|
|
538 |
C |
p. 176-192 |
artikel |