nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Accelerated learning algorithms of general fuzzy min-max neural network using a novel hyperbox selection rule
|
Khuat, Thanh Tung |
|
|
547 |
C |
p. 887-909 |
artikel |
2 |
A comprehensive bibliometric analysis of uncertain group decision making from 1980 to 2019
|
Wang, Xinxin |
|
|
547 |
C |
p. 328-353 |
artikel |
3 |
Adaptive fault estimation for cyber-physical systems with intermittent DoS attacks
|
Yan, Jing-Jing |
|
|
547 |
C |
p. 746-762 |
artikel |
4 |
A differential evolution based feature combination selection algorithm for high-dimensional data
|
Guan, Boxin |
|
|
547 |
C |
p. 870-886 |
artikel |
5 |
A distributed sensor-fault detection and diagnosis framework using machine learning
|
Jan, Sana Ullah |
|
|
547 |
C |
p. 777-796 |
artikel |
6 |
Advantages of direct input-to-output connections in neural networks: The Elman network for stock index forecasting
|
Wang, Yaoli |
|
|
547 |
C |
p. 1066-1079 |
artikel |
7 |
A hardware-aware CPU power measurement based on the power-exponent function model for cloud servers
|
Lin, Weiwei |
|
|
547 |
C |
p. 1045-1065 |
artikel |
8 |
An efficient policy evaluation engine for XACML policy management
|
Deng, Fan |
|
|
547 |
C |
p. 1105-1121 |
artikel |
9 |
An efficient scheduling algorithm for dataflow architecture using loop-pipelining
|
Li, Yi |
|
|
547 |
C |
p. 1136-1153 |
artikel |
10 |
A new robust fuzzy clustering validity index for imbalanced data sets
|
Liu, Yun |
|
|
547 |
C |
p. 579-591 |
artikel |
11 |
A new unified image encryption algorithm based on a lifting transformation and chaos
|
Zhang, Yong |
|
|
547 |
C |
p. 307-327 |
artikel |
12 |
An incremental density-based clustering framework using fuzzy local clustering
|
Laohakiat, Sirisup |
|
|
547 |
C |
p. 404-426 |
artikel |
13 |
Approximate nonparametric quantile regression in reproducing kernel Hilbert spaces via random projection
|
Zhang, Fode |
|
|
547 |
C |
p. 244-254 |
artikel |
14 |
A problem-specific non-dominated sorting genetic algorithm for supervised feature selection
|
Zhou, Yu |
|
|
547 |
C |
p. 841-859 |
artikel |
15 |
A theory of incremental compression
|
Franz, Arthur |
|
|
547 |
C |
p. 28-48 |
artikel |
16 |
Attention guided for partial domain adaptation
|
Zhang, Changchun |
|
|
547 |
C |
p. 860-869 |
artikel |
17 |
Blockchain-based multi-party proof of assets with privacy preservation
|
Wang, Huaqun |
|
|
547 |
C |
p. 609-621 |
artikel |
18 |
Collaboratively augmented UIP – Filtered RIP with relevancy mapping for personalization of web search
|
Goel, Shubham |
|
|
547 |
C |
p. 163-186 |
artikel |
19 |
Consensus of large-scale group decision making in social network: the minimum cost model based on robust optimization
|
Lu, Yanling |
|
|
547 |
C |
p. 910-930 |
artikel |
20 |
D.C. programming for sparse proximal support vector machines
|
Li, Guoquan |
|
|
547 |
C |
p. 187-201 |
artikel |
21 |
Design and analysis of a decision intelligent system based on enzymatic numerical technology
|
Pang, Shanchen |
|
|
547 |
C |
p. 450-469 |
artikel |
22 |
Detection against randomly occurring complex attacks on distributed state estimation
|
Yang, Wen |
|
|
547 |
C |
p. 539-552 |
artikel |
23 |
DFM: A parameter-shared deep fused model for knowledge base question answering
|
Zhou, Guangyou |
|
|
547 |
C |
p. 103-118 |
artikel |
24 |
Dig users’ intentions via attention flow network for personalized recommendation
|
Chen, Yan |
|
|
547 |
C |
p. 1122-1135 |
artikel |
25 |
Distributed adaptive security consensus control for a class of multi-agent systems under network decay and intermittent attacks
|
Jin, Xiaozheng |
|
|
547 |
C |
p. 88-102 |
artikel |
26 |
Distributed approach for computing rough set approximations of big incomplete information systems
|
Hamed, Ahmed |
|
|
547 |
C |
p. 427-449 |
artikel |
27 |
Distributed set-membership filtering for discrete-time systems subject to denial-of-service attacks and fading measurements: A zonotopic approach
|
Li, Xin |
|
|
547 |
C |
p. 49-67 |
artikel |
28 |
DNA sequence reconstruction based on innovated hybridization technique of probabilistic cellular automata and particle swarm optimization
|
Elsayed, Wesam M. |
|
|
547 |
C |
p. 828-840 |
artikel |
29 |
D4Net: De-deformation defect detection network for non-rigid products with large patterns
|
Xu, Xuemiao |
|
|
547 |
C |
p. 763-776 |
artikel |
30 |
Double hierarchy hesitant fuzzy linguistic entropy-based TODIM approach using evidential theory
|
Liu, Peide |
|
|
547 |
C |
p. 223-243 |
artikel |
31 |
DsNet: Dual stack network for detecting diabetes mellitus and chronic kidney disease
|
Zhang, Qi |
|
|
547 |
C |
p. 945-962 |
artikel |
32 |
EARC: Evidential association rule-based classification
|
Geng, Xiaojiao |
|
|
547 |
C |
p. 202-222 |
artikel |
33 |
Editorial Board
|
|
|
|
547 |
C |
p. ii |
artikel |
34 |
Enhancing gene expression programming based on space partition and jump for symbolic regression
|
Lu, Qiang |
|
|
547 |
C |
p. 553-567 |
artikel |
35 |
Ensemble learning based on approximate reducts and bootstrap sampling
|
Jiang, Feng |
|
|
547 |
C |
p. 797-813 |
artikel |
36 |
Event-triggered adaptive control for multiple high-speed trains with deception attacks in bottleneck sections
|
Zhao, Hui |
|
|
547 |
C |
p. 470-481 |
artikel |
37 |
Fast human motion transfer based on a meta network
|
Pan, Jian |
|
|
547 |
C |
p. 367-383 |
artikel |
38 |
Fractal sorting matrix and its application on chaotic image encryption
|
Xian, Yongjin |
|
|
547 |
C |
p. 1154-1169 |
artikel |
39 |
Fuzzy best-worst method based on triangular fuzzy numbers for multi-criteria decision-making
|
Dong, Jiuying |
|
|
547 |
C |
p. 1080-1104 |
artikel |
40 |
Generalized combination rule for evidential reasoning approach and Dempster–Shafer theory of evidence
|
Du, Yuan-Wei |
|
|
547 |
C |
p. 1201-1232 |
artikel |
41 |
GGA: A modified genetic algorithm with gradient-based local search for solving constrained optimization problems
|
D’Angelo, Gianni |
|
|
547 |
C |
p. 136-162 |
artikel |
42 |
Graph cells: Top-k structural-textual aggregated query over information networks
|
Wang, Yishu |
|
|
547 |
C |
p. 354-366 |
artikel |
43 |
Hierarchical multi-view context modelling for 3D object classification and retrieval
|
Liu, An-An |
|
|
547 |
C |
p. 984-995 |
artikel |
44 |
Inclusion and similarity measures for interval-valued fuzzy sets based on aggregation and uncertainty assessment
|
Pękala, Barbara |
|
|
547 |
C |
p. 1182-1200 |
artikel |
45 |
Inference Approach Based on Petri Nets
|
Luo, JiLiang |
|
|
547 |
C |
p. 1008-1024 |
artikel |
46 |
Interval type-2 fuzzy sets improved by Simulated Annealing for locating the electric charging stations
|
Türk, Seda |
|
|
547 |
C |
p. 641-666 |
artikel |
47 |
Learning a consensus affinity matrix for multi-view clustering via subspaces merging on Grassmann manifold
|
Rong, Wentao |
|
|
547 |
C |
p. 68-87 |
artikel |
48 |
Local discriminant coding based convolutional feature representation for multimodal finger recognition
|
Li, Shuyi |
|
|
547 |
C |
p. 1170-1181 |
artikel |
49 |
Many-objective evolutionary algorithm based on relative non-dominance matrix
|
Zhang, Maoqing |
|
|
547 |
C |
p. 963-983 |
artikel |
50 |
M-BPR: A novel approach to improving BPR for recommendation with multi-type pair-wise preferences
|
Lee, Yeon-Chang |
|
|
547 |
C |
p. 255-270 |
artikel |
51 |
Morphogenetic systems for resource bounded computation and modeling
|
Sosík, Petr |
|
|
547 |
C |
p. 814-827 |
artikel |
52 |
Multi-subject data augmentation for target subject semantic decoding with deep multi-view adversarial learning
|
Li, Dan |
|
|
547 |
C |
p. 1025-1044 |
artikel |
53 |
Multi-view Gaussian processes with posterior consistency
|
Sun, Shiliang |
|
|
547 |
C |
p. 710-722 |
artikel |
54 |
Multi-view spectral clustering for uncertain objects
|
Sharma, Krishna Kumar |
|
|
547 |
C |
p. 723-745 |
artikel |
55 |
Network-based evidential three-way theoretic model for large-scale group decision analysis
|
Liu, Zeyi |
|
|
547 |
C |
p. 689-709 |
artikel |
56 |
Nonconvex regularizer and latent pattern based robust regression for face recognition
|
Sang, Xiaoshuang |
|
|
547 |
C |
p. 384-403 |
artikel |
57 |
Optimal discriminative feature and dictionary learning for image set classification
|
Zhang, Guoqing |
|
|
547 |
C |
p. 498-513 |
artikel |
58 |
Partial-neurons-based state estimation for delayed neural networks with state-dependent noises under redundant channels
|
Liu, Shuai |
|
|
547 |
C |
p. 931-944 |
artikel |
59 |
Probabilistic convergence analysis of the stochastic particle swarm optimization model without the stagnation assumption
|
Hu, Difeng |
|
|
547 |
C |
p. 996-1007 |
artikel |
60 |
Reference-point-based multi-objective optimization algorithm with opposition-based voting scheme for multi-label feature selection
|
Asilian Bidgoli, Azam |
|
|
547 |
C |
p. 1-17 |
artikel |
61 |
Secure synchronization of stochastic complex networks subject to deception attack with nonidentical nodes and internal disturbance
|
Feng, Jianwen |
|
|
547 |
C |
p. 514-525 |
artikel |
62 |
Simultaneous learning coefficient matrix and affinity graph for multiple kernel clustering
|
Ren, Zhenwen |
|
|
547 |
C |
p. 289-306 |
artikel |
63 |
SMKFC-ER: Semi-supervised multiple kernel fuzzy clustering based on entropy and relative entropy
|
Salehi, Fariba |
|
|
547 |
C |
p. 667-688 |
artikel |
64 |
Sparse graph based self-supervised hashing for scalable image retrieval
|
Wang, Weiwei |
|
|
547 |
C |
p. 622-640 |
artikel |
65 |
Time works well: Dynamic time warping based on time weighting for time series data mining
|
Li, Hailin |
|
|
547 |
C |
p. 592-608 |
artikel |
66 |
Towards real-time demand-aware sequential POI recommendation
|
Wang, Honglian |
|
|
547 |
C |
p. 482-497 |
artikel |
67 |
Transfer learning based intrusion detection scheme for Internet of vehicles
|
Li, Xinghua |
|
|
547 |
C |
p. 119-135 |
artikel |
68 |
Transfer learning-based one-class dictionary learning for recommendation data stream
|
Xie, Haoxin |
|
|
547 |
C |
p. 526-538 |
artikel |
69 |
Two-stage three-way enhanced technique for ensemble learning in inclusive policy text classification
|
Liang, Decui |
|
|
547 |
C |
p. 271-288 |
artikel |
70 |
Understanding adversarial robustness via critical attacking route
|
Li, Tianlin |
|
|
547 |
C |
p. 568-578 |
artikel |
71 |
Weights for short quartic Boolean functions
|
Cusick, Thomas W. |
|
|
547 |
C |
p. 18-27 |
artikel |