Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             74 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 Access control encryption without sanitizers for Internet of Energy Wang, Peng

546 C p. 924-942
artikel
2 Achieving low-entropy secure cloud data auditing with file and authenticator deduplication Gao, Xiang

546 C p. 177-191
artikel
3 A common characterization for migrative uni-nullnorms Sun, Feng

546 C p. 627-632
artikel
4 A discrete cosine transform-based query efficient attack on black-box object detectors Kuang, Xiaohui

546 C p. 596-607
artikel
5 A fuzzy appraisal model for affective agents adapted to cultural environments using the pleasure and arousal dimensions Taverner, Joaquin

546 C p. 74-86
artikel
6 A geometry constrained dictionary learning method for industrial process monitoring Huang, Keke

546 C p. 265-282
artikel
7 A hybrid acceleration strategy for nonparallel support vector machine Wu, Weichen

546 C p. 543-558
artikel
8 A hybrid intelligent model for acute hypotensive episode prediction with large-scale data Jiang, Dazhi

546 C p. 787-802
artikel
9 AI-HydRa: Advanced hybrid approach using random forest and deep learning for malware classification Yoo, Suyeon

546 C p. 420-435
artikel
10 Analyzing a large and unobtainable relationship graph using a streaming activity graph Bartal, Alon

546 C p. 1097-1112
artikel
11 An efficient anti-quantum lattice-based blind signature for blockchain-enabled systems Li, Chaoyang

546 C p. 253-264
artikel
12 An optimal ( ∊ , δ ) -differentially private learning of distributed deep fuzzy models Kumar, Mohit

546 C p. 87-120
artikel
13 A performance based method for information acquisition in engineering design under multi-parameter uncertainty Ming, Zhenjun

546 C p. 1186-1207
artikel
14 Application of adaptive reliability importance sampling-based extended domain PSO on single mode failure in reliability engineering Bai, Bin

546 C p. 42-59
artikel
15 APTMalInsight: Identify and cognize APT malware based on system call information and ontology knowledge framework Han, Weijie

546 C p. 633-664
artikel
16 A reinforcement learning approach for dynamic multi-objective optimization Zou, Fei

546 C p. 815-834
artikel
17 A scheduling approach with uncertainties in generation and consumption for converter gas system in steel industry Jin, Feng

546 C p. 312-328
artikel
18 Attention-adaptive and deformable convolutional modules for dynamic scene deblurring Chen, Lei

546 C p. 368-377
artikel
19 Attribute based diversification of seeds for targeted influence maximization Caliò, Antonio

546 C p. 1273-1305
artikel
20 BIOFUSE: A framework for multi-biometric fusion on biocryptosystem level Chang, Donghoon

546 C p. 481-511
artikel
21 CNN-based encoder-decoder networks for salient object detection: A comprehensive review and recent advances Ji, Yuzhu

546 C p. 835-857
artikel
22 Cross-plane colour image encryption using a two-dimensional logistic tent modular map Hua, Zhongyun

546 C p. 1063-1083
artikel
23 Decomposition-based evolutionary algorithm with automatic estimation to handle many-objective optimization problem Zhao, Chunliang

546 C p. 1030-1046
artikel
24 Design of fuzzy system-fuzzy neural network-backstepping control for complex robot system Zheng, Kunming

546 C p. 1230-1255
artikel
25 Detection, estimation, and compensation of false data injection attack for UAVs Gu, Yapei

546 C p. 723-741
artikel
26 Detection of stealthy false data injection attacks against networked control systems via active data modification Pang, Zhong-Hua

546 C p. 192-205
artikel
27 DI-Mondrian: Distributed improved Mondrian for satisfaction of the L-diversity privacy model using Apache Spark Ashkouti, Farough

546 C p. 1-24
artikel
28 Discovering high utility-occupancy patterns from uncertain data Chen, Chien-Ming

546 C p. 1208-1229
artikel
29 Dissipativity analysis and synthesis for positive Roesser systems under the switched mechanism and Takagi-Sugeno fuzzy rules Wang, Jinling

546 C p. 234-252
artikel
30 Diversity based selection for many-objective evolutionary optimisation problems with constraints Myszkowski, Paweł B.

546 C p. 665-700
artikel
31 DRSL: Deep Relational Similarity Learning for Cross-modal Retrieval Wang, Xu

546 C p. 298-311
artikel
32 Dual robust regression for pattern classification Qian, Jianjun

546 C p. 1014-1029
artikel
33 Editorial Board
546 C p. ii
artikel
34 Efficient single-pair all-shortest-path query processing for massive dynamic networks Geol Baek, Sun

546 C p. 1306-1327
artikel
35 Estimating the number of clusters in a ranking data context Calmon, Wilson

546 C p. 977-995
artikel
36 Event-based resilient filtering for stochastic nonlinear systems via innovation constraints Sun, Ying

546 C p. 512-525
artikel
37 Event-triggered guaranteed cost consensus control for second-order multi-agent systems based on observers Luo, Yiping

546 C p. 283-297
artikel
38 Explainable time–frequency convolutional neural network for microseismic waveform classification Bi, Xin

546 C p. 883-896
artikel
39 Fabric defect detection via low-rank decomposition with gradient information and structured graph algorithm Shi, Boshan

546 C p. 608-626
artikel
40 Fair hierarchical secret sharing scheme based on smart contract Zhang, En

546 C p. 166-176
artikel
41 Feature grouping and selection: A graph-based approach Zheng, Ling

546 C p. 1256-1272
artikel
42 Fixed-time adaptive fuzzy control for uncertain strict feedback switched systems Sun, Yumei

546 C p. 742-752
artikel
43 Fuzzy factorization machine Zhou, Jiandong

546 C p. 1135-1147
artikel
44 Gorthaur-EXP3: Bandit-based selection from a portfolio of recommendation algorithms balancing the accuracy-diversity dilemma Gutowski, Nicolas

546 C p. 378-396
artikel
45 Hierarchical community structure preserving approach for network embedding Duan, Zhen

546 C p. 1084-1096
artikel
46 Improving data and model quality in crowdsourcing using cross-entropy-based noise correction Xu, Wenqiang

546 C p. 803-814
artikel
47 Join cardinality estimation by combining operator-level deep neural networks Chen, Ling

546 C p. 1047-1062
artikel
48 LAQP: Learning-based approximate query processing Zhang, Meifan

546 C p. 1113-1134
artikel
49 Locality-constrained sparse representation for hyperspectral image classification Zhang, Yuanshu

546 C p. 858-870
artikel
50 Logical foundations of knowledge-based recommender systems: A unifying spectrum of alternatives Cena, Federica

546 C p. 60-73
artikel
51 Maximizing positive influence in competitive social networks: A trust-based solution Wang, Feng

546 C p. 559-572
artikel
52 Mixed-noise robust face super-resolution through residual-learning based error suppressed nearest neighbor representation Nagar, Surendra

546 C p. 121-145
artikel
53 Monodirectional tissue P systems with channel states Song, Bosheng

546 C p. 206-219
artikel
54 Multi-aspect renewable energy forecasting Corizzo, Roberto

546 C p. 701-722
artikel
55 Multi-expert visual tracking using hierarchical convolutional feature fusion via contextual information Moorthy, Sathishkumar

546 C p. 996-1013
artikel
56 Multi-view feature transfer for click-through rate prediction Jiang, Dan

546 C p. 961-976
artikel
57 Observer-based synchronization control for complex networks against asynchronous attacks Liu, Dan

546 C p. 753-768
artikel
58 On the derivatives of set functions in matrix representation Beliakov, Gleb

546 C p. 469-480
artikel
59 Preference-inspired coevolutionary algorithm with active diversity strategy for multi-objective multi-modal optimization Wang, Rui

546 C p. 1148-1165
artikel
60 Progressive perception-oriented network for single image super-resolution Hui, Zheng

546 C p. 769-786
artikel
61 Random projection-based auxiliary information can improve tree-based nearest neighbor search Keivani, Omid

546 C p. 526-542
artikel
62 Recommender systems based on generative adversarial networks: A problem-driven perspective Gao, Min

546 C p. 1166-1185
artikel
63 Region-edge-based active contours driven by hybrid and local fuzzy region-based energy for image segmentation Fang, Jiangxiong

546 C p. 397-419
artikel
64 Reliable observer-based finite-time H ∞ control for networked nonlinear semi-Markovian jump systems with actuator fault and parameter uncertainties via dynamic event-triggered scheme Mu, Xiaowu

546 C p. 573-595
artikel
65 Robust gain-scheduling static output-feedback H ∞ control of vehicle lateral stability with heuristic approach Li, Pengxu

546 C p. 220-233
artikel
66 Robust sparse coding via self-paced learning for data representation Feng, Xiaodong

546 C p. 448-468
artikel
67 Scalable and redactable blockchain with update and anonymity Huang, Ke

546 C p. 25-41
artikel
68 Secure state estimation for systems under mixed cyber-attacks: Security and performance analysis Lin, Hong

546 C p. 943-960
artikel
69 Securing wireless relaying communication for dual unmanned aerial vehicles with unknown eavesdropper Xu, Weiwei

546 C p. 871-882
artikel
70 Semi-supervised classification via simultaneous label and discriminant embedding estimation Dornaika, F.

546 C p. 146-165
artikel
71 Uncertain database retrieval with measure – Based belief function attribute values under intuitionistic fuzzy set Xue, Yige

546 C p. 436-447
artikel
72 Users’ mobility enhances information diffusion in online social networks Wang, Yanan

546 C p. 329-348
artikel
73 Verifiable single-server private information retrieval from LWE with binary errors Zhao, Liang

546 C p. 897-923
artikel
74 Weighted pointwise prediction method for dynamic multiobjective optimization Ahrari, Ali

546 C p. 349-367
artikel
                             74 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland