nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Adaptive tensor networks decomposition for high-order tensor recovery and compression
|
Nie, Chang |
|
|
629 |
C |
p. 667-684 |
artikel |
2 |
An adversarial domain adaptation approach combining dual domain pairing strategy for IoT intrusion detection under few-shot samples
|
Ma, Wengang |
|
|
629 |
C |
p. 719-745 |
artikel |
3 |
An efficient feature selection algorithm based on the description vector and hypergraph
|
Yang, Tian |
|
|
629 |
C |
p. 746-759 |
artikel |
4 |
A new method for weighted fusion of evidence based on the unified trust distribution mechanism and the reward-punishment mechanism
|
Ji, Zhengxiong |
|
|
629 |
C |
p. 798-815 |
artikel |
5 |
A non-linear multi-objective technique for hybrid peer-to-peer communication
|
Das, Santosh Kumar |
|
|
629 |
C |
p. 413-439 |
artikel |
6 |
A novel topic clustering algorithm based on graph neural network for question topic diversity
|
Wu, Yongliang |
|
|
629 |
C |
p. 685-702 |
artikel |
7 |
A population state evaluation-based improvement framework for differential evolution
|
Li, Chunlei |
|
|
629 |
C |
p. 15-38 |
artikel |
8 |
A structure-enhanced generative adversarial network for knowledge graph zero-shot relational learning
|
Li, Xuewei |
|
|
629 |
C |
p. 169-183 |
artikel |
9 |
Avoiding flatness in factoring ordinal data
|
Bartl, Eduard |
|
|
629 |
C |
p. 471-487 |
artikel |
10 |
Bayesian estimation of fractional difference parameter in ARFIMA models and its application
|
Fazlalipour Miyandoab, Masoud |
|
|
629 |
C |
p. 144-154 |
artikel |
11 |
Deep self-learning based dynamic secret key generation for novel secure and efficient hashing algorithm
|
Ullah, Fasee |
|
|
629 |
C |
p. 488-501 |
artikel |
12 |
Develop a multi-linear-trend fuzzy information granule based short-term time series forecasting model with k-medoids clustering
|
Li, Fang |
|
|
629 |
C |
p. 358-375 |
artikel |
13 |
Domain adaptation for few-sample nonlinear process monitoring with deep networks
|
Wang, Yalin |
|
|
629 |
C |
p. 456-470 |
artikel |
14 |
Editorial Board
|
|
|
|
629 |
C |
p. ii |
artikel |
15 |
EGC2: Enhanced graph classification with easy graph compression
|
Chen, Jinyin |
|
|
629 |
C |
p. 376-397 |
artikel |
16 |
EHDHE: Enhancing security of healthcare documents in IoT-enabled digital healthcare ecosystems using blockchain
|
Sharma, Pratima |
|
|
629 |
C |
p. 703-718 |
artikel |
17 |
Encoding words into interval type-2 fuzzy sets: The retained region approach
|
Li, Hao |
|
|
629 |
C |
p. 760-777 |
artikel |
18 |
Ensemble k-nearest neighbors based on centroid displacement
|
Wang, Alex X. |
|
|
629 |
C |
p. 313-323 |
artikel |
19 |
EvaGoNet: An integrated network of variational autoencoder and Wasserstein generative adversarial network with gradient penalty for binary classification tasks
|
Luo, Changfan |
|
|
629 |
C |
p. 109-122 |
artikel |
20 |
Federated probability memory recall for federated continual learning
|
Wang, Zhe |
|
|
629 |
C |
p. 551-565 |
artikel |
21 |
GNN-based long and short term preference modeling for next-location prediction
|
Liu, Jinbo |
|
|
629 |
C |
p. 1-14 |
artikel |
22 |
Granular approximations: A novel statistical learning approach for handling data inconsistency with respect to a fuzzy relation
|
Palangetić, Marko |
|
|
629 |
C |
p. 249-275 |
artikel |
23 |
Interval type-2 fuzzy neural networks with asymmetric MFs based on the twice optimization algorithm for nonlinear system identification
|
Liu, Jiapu |
|
|
629 |
C |
p. 123-143 |
artikel |
24 |
Invertible mask network for face privacy preservation
|
Yang, Yang |
|
|
629 |
C |
p. 566-579 |
artikel |
25 |
Knowledge extraction from textual data and performance evaluation in an unsupervised context
|
Chasseray, Yohann |
|
|
629 |
C |
p. 324-343 |
artikel |
26 |
Learning spatial variance-key surrounding-aware tracking via multi-expert deep feature fusion
|
Elayaperumal, Dinesh |
|
|
629 |
C |
p. 502-519 |
artikel |
27 |
Loan default prediction using a credit rating-specific and multi-objective ensemble learning scheme
|
Song, Yu |
|
|
629 |
C |
p. 599-617 |
artikel |
28 |
Maximizing the influence with κ-grouping constraint
|
Rao, Guoyao |
|
|
629 |
C |
p. 204-221 |
artikel |
29 |
Metapath-fused heterogeneous graph network for molecular property prediction
|
Ji, Ying |
|
|
629 |
C |
p. 155-168 |
artikel |
30 |
MetaWCE: Learning to Weight for Weighted Cluster Ensemble
|
Wu, Yushan |
|
|
629 |
C |
p. 39-61 |
artikel |
31 |
Multi-modal multi-objective particle swarm optimization with self-adjusting strategy
|
Han, Honggui |
|
|
629 |
C |
p. 580-598 |
artikel |
32 |
Multi-view change point detection in dynamic networks
|
Xie, Yingjie |
|
|
629 |
C |
p. 344-357 |
artikel |
33 |
Novel variable precision fuzzy rough sets and three-way decision model with three strategies
|
Zou, Dandan |
|
|
629 |
C |
p. 222-248 |
artikel |
34 |
Observer-based event-triggered non-PDC control for networked T-S fuzzy systems under actuator failures and aperiodic DoS attacks
|
Guo, Siyi |
|
|
629 |
C |
p. 276-298 |
artikel |
35 |
Physics-informed gated recurrent graph attention unit network for anomaly detection in industrial cyber-physical systems
|
Wu, Weiqiang |
|
|
629 |
C |
p. 618-633 |
artikel |
36 |
Prescribed time tracking control without velocity measurement for dual-arm robots
|
Hu, Heyu |
|
|
629 |
C |
p. 533-550 |
artikel |
37 |
Relationship-aware contrastive learning for social recommendations
|
Ji, Jinchao |
|
|
629 |
C |
p. 778-797 |
artikel |
38 |
Resilient state containment of multi-agent systems against composite attacks via output feedback: A sampled-based event-triggered hierarchical approach
|
Cui, Yukang |
|
|
629 |
C |
p. 77-95 |
artikel |
39 |
Robust low-rank tensor completion via new regularized model with approximate SVD
|
Wu, Fengsheng |
|
|
629 |
C |
p. 646-666 |
artikel |
40 |
RoRED: Bootstrapping labeling rule discovery for robust relation extraction
|
Hou, Wenjun |
|
|
629 |
C |
p. 62-76 |
artikel |
41 |
RVGAN-TL: A generative adversarial networks and transfer learning-based hybrid approach for imbalanced data classification
|
Ding, Hongwei |
|
|
629 |
C |
p. 184-203 |
artikel |
42 |
Secure Internet of Things (IoT) using a novel Brooks Iyengar quantum Byzantine Agreement-centered blockchain Networking (BIQBA-BCN) model in smart healthcare
|
Zhao, Zhenwei |
|
|
629 |
C |
p. 440-455 |
artikel |
43 |
Short-term aviation maintenance technician scheduling based on dynamic task disassembly mechanism
|
Niu, Ben |
|
|
629 |
C |
p. 816-835 |
artikel |
44 |
Solutions of matrix equations with weak fuzzy equivalence relations
|
Medina, Jesús |
|
|
629 |
C |
p. 634-645 |
artikel |
45 |
Statistical learning algorithms for dendritic neuron model artificial neural network based on sine cosine algorithm
|
Gul, Hasan Huseyin |
|
|
629 |
C |
p. 398-412 |
artikel |
46 |
Stochastic configuration networks with chaotic maps and hierarchical learning strategy
|
Qiao, Jinghui |
|
|
629 |
C |
p. 96-108 |
artikel |
47 |
SURE: Screening unlabeled samples for reliable negative samples based on reinforcement learning
|
Li, Ying |
|
|
629 |
C |
p. 299-312 |
artikel |
48 |
Transferable and differentiable discrete network embedding for multi-domains with hierarchical knowledge distillation
|
He, Tao |
|
|
629 |
C |
p. 520-532 |
artikel |