nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Adaptive XACML access policies for heterogeneous distributed IoT environments
|
Riad, Khaled |
|
|
548 |
C |
p. 135-152 |
artikel |
2 |
A hybrid interval type-2 semi-supervised possibilistic fuzzy c-means clustering and particle swarm optimization for satellite image analysis
|
Mai, Dinh Sinh |
|
|
548 |
C |
p. 398-422 |
artikel |
3 |
A novel multi-scale fusion framework for detail-preserving low-light image enhancement
|
Xu, Yadong |
|
|
548 |
C |
p. 378-397 |
artikel |
4 |
A periodic iterative learning scheme for finite-iteration tracking of discrete networks based on FlexRay communication protocol
|
Xiong, Wenjun |
|
|
548 |
C |
p. 344-356 |
artikel |
5 |
A robust data simulation technique to improve early detection performance of a classifier in control chart pattern recognition systems
|
Ünlü, Ramazan |
|
|
548 |
C |
p. 18-36 |
artikel |
6 |
Bayesian regression and classification using Gaussian process priors indexed by probability density functions
|
Fradi, A. |
|
|
548 |
C |
p. 56-68 |
artikel |
7 |
Detectability vverification of probabilistic Boolean networks
|
Han, Xiao-Guang |
|
|
548 |
C |
p. 313-327 |
artikel |
8 |
Editorial Board
|
|
|
|
548 |
C |
p. ii |
artikel |
9 |
EGC: Entropy-based gradient compression for distributed deep learning
|
Xiao, Danyang |
|
|
548 |
C |
p. 118-134 |
artikel |
10 |
Exploiting the potentialities of features for speech emotion recognition
|
Li, Dongdong |
|
|
548 |
C |
p. 328-343 |
artikel |
11 |
Finding influential communities in networks with multiple influence types
|
Seo, Jung Hyuk |
|
|
548 |
C |
p. 254-274 |
artikel |
12 |
Fusion of heterogeneous attention mechanisms in multi-view convolutional neural network for text classification
|
Liang, Yunji |
|
|
548 |
C |
p. 295-312 |
artikel |
13 |
Fuzzy approximation-based adaptive finite-time control for nonstrict feedback nonlinear systems with state constraints
|
Liu, Yongchao |
|
|
548 |
C |
p. 101-117 |
artikel |
14 |
Hybrid-triggered-based security controller design for networked control system under multiple cyber attacks
|
Cao, Jie |
|
|
548 |
C |
p. 69-84 |
artikel |
15 |
Improved I-nice clustering algorithm based on density peaks mechanism
|
He, Yulin |
|
|
548 |
C |
p. 177-190 |
artikel |
16 |
Information synergy entropy based multi-feature information fusion for the operating condition identification in aluminium electrolysis
|
Chen, Zuguo |
|
|
548 |
C |
p. 275-294 |
artikel |
17 |
Link prediction based on feature representation and fusion
|
Xiao, Yunpeng |
|
|
548 |
C |
p. 1-17 |
artikel |
18 |
LPQ++: A discriminative blur-insensitive textural descriptor with spatial-channel interaction
|
Zhu, Zihao |
|
|
548 |
C |
p. 191-211 |
artikel |
19 |
Membership-function-dependent stability analysis and local controller design for T–S fuzzy systems: A space-enveloping approach
|
Zheng, Hua |
|
|
548 |
C |
p. 233-253 |
artikel |
20 |
Microaggregation heuristic applied to statistical disclosure control
|
Fadel, Augusto César |
|
|
548 |
C |
p. 37-55 |
artikel |
21 |
Mobility and marginal gain based content caching and placement for cooperative edge-cloud computing
|
Li, Chunlin |
|
|
548 |
C |
p. 153-176 |
artikel |
22 |
Objective function-based rough membership C-means clustering
|
Ubukata, Seiki |
|
|
548 |
C |
p. 479-496 |
artikel |
23 |
Optimal sensor attacks in cyber-physical systems with Round-Robin protocol
|
Zhang, Xiao-Guang |
|
|
548 |
C |
p. 85-100 |
artikel |
24 |
Pattern classification with Evolving Long-term Cognitive Networks
|
Nápoles, Gonzalo |
|
|
548 |
C |
p. 461-478 |
artikel |
25 |
PPCL: Privacy-preserving collaborative learning for mitigating indirect information leakage
|
Yan, Hongyang |
|
|
548 |
C |
p. 423-437 |
artikel |
26 |
Privacy-preserving and verifiable online crowdsourcing with worker updates
|
Zhang, Xiaoyu |
|
|
548 |
C |
p. 212-232 |
artikel |
27 |
Quantum resistant key-exposure free chameleon hash and applications in redactable blockchain
|
Wu, Chunhui |
|
|
548 |
C |
p. 438-449 |
artikel |
28 |
Selecting green third party logistics providers for a loss-averse fourth party logistics provider in a multiattribute reverse auction
|
Qian, Xiaohu |
|
|
548 |
C |
p. 357-377 |
artikel |
29 |
Transfer learning based countermeasure against label flipping poisoning attack
|
Chan, Patrick P.K. |
|
|
548 |
C |
p. 450-460 |
artikel |
30 |
Why you should stop predicting customer churn and start using uplift models
|
Devriendt, Floris |
|
|
548 |
C |
p. 497-515 |
artikel |