nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Adaptive neural self-triggered bipartite secure control for nonlinear MASs subject to DoS attacks
|
Cheng, Fabin |
|
|
631 |
C |
p. 256-270 |
artikel |
2 |
An evolutionary algorithm based on dynamic sparse grouping for sparse large scale multiobjective optimization
|
Zou, Yingjie |
|
|
631 |
C |
p. 449-467 |
artikel |
3 |
Attributed multi-query community search via random walk similarity
|
Li, Qingqing |
|
|
631 |
C |
p. 91-107 |
artikel |
4 |
Balanced neighbor exploration for semi-supervised node classification on imbalanced graph data
|
Zhu, Zonghai |
|
|
631 |
C |
p. 31-44 |
artikel |
5 |
Building rankings encompassing multiple criteria to support qualitative decision-making
|
Serramia, Marc |
|
|
631 |
C |
p. 288-304 |
artikel |
6 |
Calibrated multi-task subspace learning via binary group structure constraint
|
Chang, Wei |
|
|
631 |
C |
p. 271-287 |
artikel |
7 |
Classification and variable selection using the mining of positive and negative association rules
|
Do Van, Thanh |
|
|
631 |
C |
p. 218-240 |
artikel |
8 |
CNN-Fusion: An effective and lightweight phishing detection method based on multi-variant ConvNet
|
Hussain, Musarat |
|
|
631 |
C |
p. 328-345 |
artikel |
9 |
Communication-efficient distributed estimation of partially linear additive models for large-scale data
|
Gao, Junzhuo |
|
|
631 |
C |
p. 185-201 |
artikel |
10 |
Corrigendum to “Some models to manage additive consistency and derive priority weights from hesitant fuzzy preference relations” [Inform. Sci. 586 (2022) 450–467]
|
Xu, Yejun |
|
|
631 |
C |
p. 327 |
artikel |
11 |
Distributed adaptive fuzzy fault-tolerant control for multi-agent systems with node faults and denial-of-service attacks
|
Zhao, Liang |
|
|
631 |
C |
p. 385-395 |
artikel |
12 |
Editorial Board
|
|
|
|
631 |
C |
p. ii |
artikel |
13 |
Effective stabilized self-training on few-labeled graph data
|
Zhou, Ziang |
|
|
631 |
C |
p. 369-384 |
artikel |
14 |
Event-based fault estimation and compensation for discrete-time systems via zonotopes
|
Wang, Xudong |
|
|
631 |
C |
p. 1-14 |
artikel |
15 |
Event-triggered constrained neural critic control of nonlinear continuous-time multiplayer nonzero-sum games
|
Li, Menghua |
|
|
631 |
C |
p. 412-428 |
artikel |
16 |
Finite/fixed-time practical sliding mode: An event-triggered approach
|
Song, Feida |
|
|
631 |
C |
p. 241-255 |
artikel |
17 |
History information-based Hill-Valley technique for multimodal optimization problems
|
Li, Yu |
|
|
631 |
C |
p. 15-30 |
artikel |
18 |
MbSRS: A multi-behavior streaming recommender system
|
Zhao, Yan |
|
|
631 |
C |
p. 145-163 |
artikel |
19 |
Multiple granularity user intention fairness recognition of intelligent government Q & A system via three-way decision
|
Liang, Decui |
|
|
631 |
C |
p. 305-326 |
artikel |
20 |
Multiplicative consistency analysis of interval-valued fuzzy preference relations
|
Wan, Shuping |
|
|
631 |
C |
p. 120-144 |
artikel |
21 |
Observer-based asynchronous feedback H ∞ control for delayed fuzzy implicit jump systems under HMM and event-trigger mechanisms
|
Zhuang, Guangming |
|
|
631 |
C |
p. 45-64 |
artikel |
22 |
Ontology-based hybrid commonsense reasoning framework for handling context abnormalities in uncertain and partially observable environments
|
Moulouel, Koussaila |
|
|
631 |
C |
p. 468-486 |
artikel |
23 |
Path prediction of information diffusion based on a topic-oriented relationship strength network
|
Zhu, Hengmin |
|
|
631 |
C |
p. 108-119 |
artikel |
24 |
Reward inference of discrete-time expert's controllers: A complementary learning approach
|
Perrusquía, Adolfo |
|
|
631 |
C |
p. 396-411 |
artikel |
25 |
Robust and optimal neighborhood graph learning for multi-view clustering
|
Du, Yangfan |
|
|
631 |
C |
p. 429-448 |
artikel |
26 |
The L 2 convergence of stream data mining algorithms based on probabilistic neural networks
|
Rutkowska, Danuta |
|
|
631 |
C |
p. 346-368 |
artikel |
27 |
Three-way decision for probabilistic linguistic conflict analysis via compounded risk preference
|
Wang, Tianxing |
|
|
631 |
C |
p. 65-90 |
artikel |
28 |
Towards provably secure asymmetric image encryption schemes
|
Azam, Naveed Ahmed |
|
|
631 |
C |
p. 164-184 |
artikel |
29 |
Trustworthy sealed-bid auction with low communication cost atop blockchain
|
Zhang, Qian |
|
|
631 |
C |
p. 202-217 |
artikel |