nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A class of adaptive filtering algorithms based on improper complex correntropy
|
Qian, Guobing |
|
|
633 |
C |
p. 573-596 |
artikel |
2 |
A facial geometry based detection model for face manipulation using CNN-LSTM architecture
|
Liang, Peifeng |
|
|
633 |
C |
p. 370-383 |
artikel |
3 |
A fast approximate method for k-edge connected component detection in graphs with high accuracy
|
Yu, Ting |
|
|
633 |
C |
p. 384-409 |
artikel |
4 |
Analysis based on statistical distributions: A practical approach for stochastic solvers using discrete and continuous problems
|
Herzog, Jana |
|
|
633 |
C |
p. 469-490 |
artikel |
5 |
A novel sequential switching quadratic particle swarm optimization scheme with applications to fast tuning of PID controllers
|
Luo, Yuqiang |
|
|
633 |
C |
p. 305-320 |
artikel |
6 |
A novel two-level interactive action recognition model based on inertial data fusion
|
Qiu, Sen |
|
|
633 |
C |
p. 264-279 |
artikel |
7 |
A rule-based deep fuzzy system with nonlinear fuzzy feature transform for data classification
|
Yin, Rui |
|
|
633 |
C |
p. 431-452 |
artikel |
8 |
Clone consistent-defect prediction based on deep learning method
|
Zhang, Fanlong |
|
|
633 |
C |
p. 357-369 |
artikel |
9 |
Complementary networks for person re-identification
|
Zhang, Guoqing |
|
|
633 |
C |
p. 70-84 |
artikel |
10 |
3D adversarial attacks beyond point cloud
|
Zhang, Jinlai |
|
|
633 |
C |
p. 491-503 |
artikel |
11 |
Deep generation network for multivariate spatio-temporal data based on separated attention
|
Wang, Junkai |
|
|
633 |
C |
p. 85-103 |
artikel |
12 |
Distributed fault estimation over sensor networks: A bit rate allocation scheme
|
Ju, Yamei |
|
|
633 |
C |
p. 597-612 |
artikel |
13 |
Distributed L 2 − L ∞ containment control with nonconvex constraints for multi-agent systems
|
Hu, Yangming |
|
|
633 |
C |
p. 1-9 |
artikel |
14 |
Editorial Board
|
|
|
|
633 |
C |
p. ii |
artikel |
15 |
Efficient algorithms for multi-armed bandits with additional feedbacks: Modeling and algorithms
|
Xie, Hong |
|
|
633 |
C |
p. 453-468 |
artikel |
16 |
Employing fuzzy hypothesis testing to improve modified p charts for monitoring the process fraction nonconforming
|
Chukhrova, Nataliya |
|
|
633 |
C |
p. 141-157 |
artikel |
17 |
Evidential Markov decision-making model based on belief entropy to predict interference effects
|
Pan, Lipeng |
|
|
633 |
C |
p. 10-26 |
artikel |
18 |
Fixed-time event-triggered fuzzy adaptive control for uncertain nonlinear systems with full-state constraints
|
Wang, Chen |
|
|
633 |
C |
p. 158-169 |
artikel |
19 |
Heterogeneous cognitive learning particle swarm optimization for large-scale optimization problems
|
Zhang, En |
|
|
633 |
C |
p. 321-342 |
artikel |
20 |
Hypergraph and cross-attention-based unsupervised domain adaptation framework for cross-domain myocardial infarction localization
|
Yuan, Shuaiying |
|
|
633 |
C |
p. 245-263 |
artikel |
21 |
Incomplete mixed data-driven outlier detection based on local–global neighborhood information
|
Li, Ran |
|
|
633 |
C |
p. 204-225 |
artikel |
22 |
Investor preference analysis: An online optimization approach with missing information
|
Hu, Xiao |
|
|
633 |
C |
p. 27-40 |
artikel |
23 |
Neural network-based secure event-triggered control of uncertain industrial cyber-physical systems against deception attacks
|
Ma, Yajing |
|
|
633 |
C |
p. 504-516 |
artikel |
24 |
ParsingPhrase: Parsing-based automated quality phrase mining
|
Wu, Yongliang |
|
|
633 |
C |
p. 531-548 |
artikel |
25 |
Publishing locally private high-dimensional synthetic data efficiently
|
Zhang, Hua |
|
|
633 |
C |
p. 343-356 |
artikel |
26 |
RESO-based distributed bipartite tracking control for stochastic MASs with actuator nonlinearity
|
Sun, Zhize |
|
|
633 |
C |
p. 226-244 |
artikel |
27 |
Robust ML model ensembles via risk-driven anti-clustering of training data
|
Mauri, Lara |
|
|
633 |
C |
p. 122-140 |
artikel |
28 |
Saaty’s consistency trapezoidal fuzzy extension and optimized fuzzy utility vector acquisition
|
Wang, Zhou-Jing |
|
|
633 |
C |
p. 549-572 |
artikel |
29 |
Safe reinforcement learning method integrating process knowledge for real-time scheduling of gas supply network
|
Zhou, Pengwei |
|
|
633 |
C |
p. 280-304 |
artikel |
30 |
S-DeepTrust: A deep trust prediction method based on sentiment polarity perception
|
Wang, Qiuhua |
|
|
633 |
C |
p. 104-121 |
artikel |
31 |
Similarity-navigated graph neural networks for node classification
|
Zou, Minhao |
|
|
633 |
C |
p. 41-69 |
artikel |
32 |
Specification transformation method for functional program generation based on partition-recursion refinement rule
|
Zuo, Zhengkang |
|
|
633 |
C |
p. 613-632 |
artikel |
33 |
Stratified multi-density spectral clustering using Gaussian mixture model
|
Yue, Guanli |
|
|
633 |
C |
p. 182-203 |
artikel |
34 |
Time-varying formation prescribed performance control with collision avoidance for multi-agent systems subject to mismatched disturbances
|
Zheng, Chang-Bing |
|
|
633 |
C |
p. 517-530 |
artikel |
35 |
VeriORouting: Verification on intelligent routing outsourced to the cloud
|
Bai, Hui |
|
|
633 |
C |
p. 410-430 |
artikel |
36 |
Writer-independent signature verification; Evaluation of robotic and generative adversarial attacks
|
Bird, Jordan J. |
|
|
633 |
C |
p. 170-181 |
artikel |