nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Access control encryption without sanitizers for Internet of Energy
|
Wang, Peng |
|
|
546 |
C |
p. 924-942 |
artikel |
2 |
Achieving low-entropy secure cloud data auditing with file and authenticator deduplication
|
Gao, Xiang |
|
|
546 |
C |
p. 177-191 |
artikel |
3 |
A common characterization for migrative uni-nullnorms
|
Sun, Feng |
|
|
546 |
C |
p. 627-632 |
artikel |
4 |
A discrete cosine transform-based query efficient attack on black-box object detectors
|
Kuang, Xiaohui |
|
|
546 |
C |
p. 596-607 |
artikel |
5 |
A fuzzy appraisal model for affective agents adapted to cultural environments using the pleasure and arousal dimensions
|
Taverner, Joaquin |
|
|
546 |
C |
p. 74-86 |
artikel |
6 |
A geometry constrained dictionary learning method for industrial process monitoring
|
Huang, Keke |
|
|
546 |
C |
p. 265-282 |
artikel |
7 |
A hybrid acceleration strategy for nonparallel support vector machine
|
Wu, Weichen |
|
|
546 |
C |
p. 543-558 |
artikel |
8 |
A hybrid intelligent model for acute hypotensive episode prediction with large-scale data
|
Jiang, Dazhi |
|
|
546 |
C |
p. 787-802 |
artikel |
9 |
AI-HydRa: Advanced hybrid approach using random forest and deep learning for malware classification
|
Yoo, Suyeon |
|
|
546 |
C |
p. 420-435 |
artikel |
10 |
Analyzing a large and unobtainable relationship graph using a streaming activity graph
|
Bartal, Alon |
|
|
546 |
C |
p. 1097-1112 |
artikel |
11 |
An efficient anti-quantum lattice-based blind signature for blockchain-enabled systems
|
Li, Chaoyang |
|
|
546 |
C |
p. 253-264 |
artikel |
12 |
An optimal ( ∊ , δ ) -differentially private learning of distributed deep fuzzy models
|
Kumar, Mohit |
|
|
546 |
C |
p. 87-120 |
artikel |
13 |
A performance based method for information acquisition in engineering design under multi-parameter uncertainty
|
Ming, Zhenjun |
|
|
546 |
C |
p. 1186-1207 |
artikel |
14 |
Application of adaptive reliability importance sampling-based extended domain PSO on single mode failure in reliability engineering
|
Bai, Bin |
|
|
546 |
C |
p. 42-59 |
artikel |
15 |
APTMalInsight: Identify and cognize APT malware based on system call information and ontology knowledge framework
|
Han, Weijie |
|
|
546 |
C |
p. 633-664 |
artikel |
16 |
A reinforcement learning approach for dynamic multi-objective optimization
|
Zou, Fei |
|
|
546 |
C |
p. 815-834 |
artikel |
17 |
A scheduling approach with uncertainties in generation and consumption for converter gas system in steel industry
|
Jin, Feng |
|
|
546 |
C |
p. 312-328 |
artikel |
18 |
Attention-adaptive and deformable convolutional modules for dynamic scene deblurring
|
Chen, Lei |
|
|
546 |
C |
p. 368-377 |
artikel |
19 |
Attribute based diversification of seeds for targeted influence maximization
|
Caliò, Antonio |
|
|
546 |
C |
p. 1273-1305 |
artikel |
20 |
BIOFUSE: A framework for multi-biometric fusion on biocryptosystem level
|
Chang, Donghoon |
|
|
546 |
C |
p. 481-511 |
artikel |
21 |
CNN-based encoder-decoder networks for salient object detection: A comprehensive review and recent advances
|
Ji, Yuzhu |
|
|
546 |
C |
p. 835-857 |
artikel |
22 |
Cross-plane colour image encryption using a two-dimensional logistic tent modular map
|
Hua, Zhongyun |
|
|
546 |
C |
p. 1063-1083 |
artikel |
23 |
Decomposition-based evolutionary algorithm with automatic estimation to handle many-objective optimization problem
|
Zhao, Chunliang |
|
|
546 |
C |
p. 1030-1046 |
artikel |
24 |
Design of fuzzy system-fuzzy neural network-backstepping control for complex robot system
|
Zheng, Kunming |
|
|
546 |
C |
p. 1230-1255 |
artikel |
25 |
Detection, estimation, and compensation of false data injection attack for UAVs
|
Gu, Yapei |
|
|
546 |
C |
p. 723-741 |
artikel |
26 |
Detection of stealthy false data injection attacks against networked control systems via active data modification
|
Pang, Zhong-Hua |
|
|
546 |
C |
p. 192-205 |
artikel |
27 |
DI-Mondrian: Distributed improved Mondrian for satisfaction of the L-diversity privacy model using Apache Spark
|
Ashkouti, Farough |
|
|
546 |
C |
p. 1-24 |
artikel |
28 |
Discovering high utility-occupancy patterns from uncertain data
|
Chen, Chien-Ming |
|
|
546 |
C |
p. 1208-1229 |
artikel |
29 |
Dissipativity analysis and synthesis for positive Roesser systems under the switched mechanism and Takagi-Sugeno fuzzy rules
|
Wang, Jinling |
|
|
546 |
C |
p. 234-252 |
artikel |
30 |
Diversity based selection for many-objective evolutionary optimisation problems with constraints
|
Myszkowski, Paweł B. |
|
|
546 |
C |
p. 665-700 |
artikel |
31 |
DRSL: Deep Relational Similarity Learning for Cross-modal Retrieval
|
Wang, Xu |
|
|
546 |
C |
p. 298-311 |
artikel |
32 |
Dual robust regression for pattern classification
|
Qian, Jianjun |
|
|
546 |
C |
p. 1014-1029 |
artikel |
33 |
Editorial Board
|
|
|
|
546 |
C |
p. ii |
artikel |
34 |
Efficient single-pair all-shortest-path query processing for massive dynamic networks
|
Geol Baek, Sun |
|
|
546 |
C |
p. 1306-1327 |
artikel |
35 |
Estimating the number of clusters in a ranking data context
|
Calmon, Wilson |
|
|
546 |
C |
p. 977-995 |
artikel |
36 |
Event-based resilient filtering for stochastic nonlinear systems via innovation constraints
|
Sun, Ying |
|
|
546 |
C |
p. 512-525 |
artikel |
37 |
Event-triggered guaranteed cost consensus control for second-order multi-agent systems based on observers
|
Luo, Yiping |
|
|
546 |
C |
p. 283-297 |
artikel |
38 |
Explainable time–frequency convolutional neural network for microseismic waveform classification
|
Bi, Xin |
|
|
546 |
C |
p. 883-896 |
artikel |
39 |
Fabric defect detection via low-rank decomposition with gradient information and structured graph algorithm
|
Shi, Boshan |
|
|
546 |
C |
p. 608-626 |
artikel |
40 |
Fair hierarchical secret sharing scheme based on smart contract
|
Zhang, En |
|
|
546 |
C |
p. 166-176 |
artikel |
41 |
Feature grouping and selection: A graph-based approach
|
Zheng, Ling |
|
|
546 |
C |
p. 1256-1272 |
artikel |
42 |
Fixed-time adaptive fuzzy control for uncertain strict feedback switched systems
|
Sun, Yumei |
|
|
546 |
C |
p. 742-752 |
artikel |
43 |
Fuzzy factorization machine
|
Zhou, Jiandong |
|
|
546 |
C |
p. 1135-1147 |
artikel |
44 |
Gorthaur-EXP3: Bandit-based selection from a portfolio of recommendation algorithms balancing the accuracy-diversity dilemma
|
Gutowski, Nicolas |
|
|
546 |
C |
p. 378-396 |
artikel |
45 |
Hierarchical community structure preserving approach for network embedding
|
Duan, Zhen |
|
|
546 |
C |
p. 1084-1096 |
artikel |
46 |
Improving data and model quality in crowdsourcing using cross-entropy-based noise correction
|
Xu, Wenqiang |
|
|
546 |
C |
p. 803-814 |
artikel |
47 |
Join cardinality estimation by combining operator-level deep neural networks
|
Chen, Ling |
|
|
546 |
C |
p. 1047-1062 |
artikel |
48 |
LAQP: Learning-based approximate query processing
|
Zhang, Meifan |
|
|
546 |
C |
p. 1113-1134 |
artikel |
49 |
Locality-constrained sparse representation for hyperspectral image classification
|
Zhang, Yuanshu |
|
|
546 |
C |
p. 858-870 |
artikel |
50 |
Logical foundations of knowledge-based recommender systems: A unifying spectrum of alternatives
|
Cena, Federica |
|
|
546 |
C |
p. 60-73 |
artikel |
51 |
Maximizing positive influence in competitive social networks: A trust-based solution
|
Wang, Feng |
|
|
546 |
C |
p. 559-572 |
artikel |
52 |
Mixed-noise robust face super-resolution through residual-learning based error suppressed nearest neighbor representation
|
Nagar, Surendra |
|
|
546 |
C |
p. 121-145 |
artikel |
53 |
Monodirectional tissue P systems with channel states
|
Song, Bosheng |
|
|
546 |
C |
p. 206-219 |
artikel |
54 |
Multi-aspect renewable energy forecasting
|
Corizzo, Roberto |
|
|
546 |
C |
p. 701-722 |
artikel |
55 |
Multi-expert visual tracking using hierarchical convolutional feature fusion via contextual information
|
Moorthy, Sathishkumar |
|
|
546 |
C |
p. 996-1013 |
artikel |
56 |
Multi-view feature transfer for click-through rate prediction
|
Jiang, Dan |
|
|
546 |
C |
p. 961-976 |
artikel |
57 |
Observer-based synchronization control for complex networks against asynchronous attacks
|
Liu, Dan |
|
|
546 |
C |
p. 753-768 |
artikel |
58 |
On the derivatives of set functions in matrix representation
|
Beliakov, Gleb |
|
|
546 |
C |
p. 469-480 |
artikel |
59 |
Preference-inspired coevolutionary algorithm with active diversity strategy for multi-objective multi-modal optimization
|
Wang, Rui |
|
|
546 |
C |
p. 1148-1165 |
artikel |
60 |
Progressive perception-oriented network for single image super-resolution
|
Hui, Zheng |
|
|
546 |
C |
p. 769-786 |
artikel |
61 |
Random projection-based auxiliary information can improve tree-based nearest neighbor search
|
Keivani, Omid |
|
|
546 |
C |
p. 526-542 |
artikel |
62 |
Recommender systems based on generative adversarial networks: A problem-driven perspective
|
Gao, Min |
|
|
546 |
C |
p. 1166-1185 |
artikel |
63 |
Region-edge-based active contours driven by hybrid and local fuzzy region-based energy for image segmentation
|
Fang, Jiangxiong |
|
|
546 |
C |
p. 397-419 |
artikel |
64 |
Reliable observer-based finite-time H ∞ control for networked nonlinear semi-Markovian jump systems with actuator fault and parameter uncertainties via dynamic event-triggered scheme
|
Mu, Xiaowu |
|
|
546 |
C |
p. 573-595 |
artikel |
65 |
Robust gain-scheduling static output-feedback H ∞ control of vehicle lateral stability with heuristic approach
|
Li, Pengxu |
|
|
546 |
C |
p. 220-233 |
artikel |
66 |
Robust sparse coding via self-paced learning for data representation
|
Feng, Xiaodong |
|
|
546 |
C |
p. 448-468 |
artikel |
67 |
Scalable and redactable blockchain with update and anonymity
|
Huang, Ke |
|
|
546 |
C |
p. 25-41 |
artikel |
68 |
Secure state estimation for systems under mixed cyber-attacks: Security and performance analysis
|
Lin, Hong |
|
|
546 |
C |
p. 943-960 |
artikel |
69 |
Securing wireless relaying communication for dual unmanned aerial vehicles with unknown eavesdropper
|
Xu, Weiwei |
|
|
546 |
C |
p. 871-882 |
artikel |
70 |
Semi-supervised classification via simultaneous label and discriminant embedding estimation
|
Dornaika, F. |
|
|
546 |
C |
p. 146-165 |
artikel |
71 |
Uncertain database retrieval with measure – Based belief function attribute values under intuitionistic fuzzy set
|
Xue, Yige |
|
|
546 |
C |
p. 436-447 |
artikel |
72 |
Users’ mobility enhances information diffusion in online social networks
|
Wang, Yanan |
|
|
546 |
C |
p. 329-348 |
artikel |
73 |
Verifiable single-server private information retrieval from LWE with binary errors
|
Zhao, Liang |
|
|
546 |
C |
p. 897-923 |
artikel |
74 |
Weighted pointwise prediction method for dynamic multiobjective optimization
|
Ahrari, Ali |
|
|
546 |
C |
p. 349-367 |
artikel |