nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Adaptive neural network asymptotic control design for MIMO nonlinear systems based on event-triggered mechanism
|
Liu, Yongchao |
|
|
603 |
C |
p. 91-105 |
artikel |
2 |
A lightweight data representation for phishing URLs detection in IoT environments
|
Bustio-Martínez, Lázaro |
|
|
603 |
C |
p. 42-59 |
artikel |
3 |
An optimization viewpoint on evaluation-based interval-valued multi-attribute three-way decision model
|
Jiang, Haibo |
|
|
603 |
C |
p. 60-90 |
artikel |
4 |
BMP: A blockchain assisted meme prediction method through exploring contextual factors from social networks
|
Yang, Fan |
|
|
603 |
C |
p. 262-288 |
artikel |
5 |
Cauchy regularized broad learning system for noisy data regression
|
Liu, Licheng |
|
|
603 |
C |
p. 210-221 |
artikel |
6 |
CORK: A privacy-preserving and lossless federated learning scheme for deep neural network
|
Zhao, Jiaqi |
|
|
603 |
C |
p. 190-209 |
artikel |
7 |
Design alternative assessment and selection: A novel Z-cloud rough number-based BWM-MABAC model
|
Huang, Guangquan |
|
|
603 |
C |
p. 149-189 |
artikel |
8 |
3D joints estimation of human body using part segmentation
|
Xu, Tianxu |
|
|
603 |
C |
p. 1-15 |
artikel |
9 |
Editorial Board
|
|
|
|
603 |
C |
p. ii |
artikel |
10 |
Event-triggered adaptive consensus for stochastic multi-agent systems with saturated input and partial state constraints
|
Zhao, Yong |
|
|
603 |
C |
p. 16-41 |
artikel |
11 |
Fuzzy hierarchical network embedding fusing structural and neighbor information
|
Liu, Qun |
|
|
603 |
C |
p. 130-148 |
artikel |
12 |
How to aggregate uncertain and incomplete cognitive evaluation information in lung cancer treatment plan selection? A method based on Dempster-Shafer theory
|
Fang, Ran |
|
|
603 |
C |
p. 222-243 |
artikel |
13 |
Self-organizing Divisive Hierarchical Voronoi Tessellation-based classifier
|
Gu, Xiaowei |
|
|
603 |
C |
p. 106-129 |
artikel |
14 |
Susceptibility & defense of satellite image-trained convolutional networks to backdoor attacks
|
Brewer, Ethan |
|
|
603 |
C |
p. 244-261 |
artikel |