nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Adaptive learning rate optimization algorithms with dynamic bound based on Barzilai-Borwein method
|
Wang, Zhi-Jun |
|
|
634 |
C |
p. 42-54 |
artikel |
2 |
A flexible two-stage constrained multi-objective evolutionary algorithm based on automatic regulation
|
Zou, Juan |
|
|
634 |
C |
p. 227-243 |
artikel |
3 |
A hybrid level-based learning swarm algorithm with mutation operator for solving large-scale cardinality-constrained portfolio optimization problems
|
Kaucic, Massimiliano |
|
|
634 |
C |
p. 321-339 |
artikel |
4 |
A novel optimization method for geological drilling vertical well
|
Zhou, Yang |
|
|
634 |
C |
p. 550-563 |
artikel |
5 |
A novel spatiotemporal prediction method based on fuzzy Transform: Application to demographic balance data
|
Cardone, Barbara |
|
|
634 |
C |
p. 677-695 |
artikel |
6 |
Artificial bee colony algorithm-based design of discrete-time stable unknown input estimator
|
Satoh, Toshiyuki |
|
|
634 |
C |
p. 621-649 |
artikel |
7 |
A sequential deep learning algorithm for sampled mixed-integer optimisation problems
|
Chamanbaz, Mohammadreza |
|
|
634 |
C |
p. 73-84 |
artikel |
8 |
Category-aware optimal transport for incomplete data classification
|
Liu, Zhen |
|
|
634 |
C |
p. 443-476 |
artikel |
9 |
Co-evolutionary algorithm based on problem analysis for dynamic multiobjective optimization
|
Li, Xiaoli |
|
|
634 |
C |
p. 520-538 |
artikel |
10 |
DeepAK-IoT: An effective deep learning model for cyberattack detection in IoT networks
|
Ding, Weiping |
|
|
634 |
C |
p. 157-171 |
artikel |
11 |
Deep reinforce learning for joint optimization of condition-based maintenance and spare ordering
|
Hao, Shengang |
|
|
634 |
C |
p. 85-100 |
artikel |
12 |
Dense lead contrast for self-supervised representation learning of multilead electrocardiograms
|
Liu, Wenhan |
|
|
634 |
C |
p. 189-205 |
artikel |
13 |
Deriving priorities from the fuzzy best-worst method matrix and its applications: A perspective of incomplete reciprocal preference relation
|
Huang, Jing |
|
|
634 |
C |
p. 761-778 |
artikel |
14 |
Detecting backdoor in deep neural networks via intentional adversarial perturbations
|
Xue, Mingfu |
|
|
634 |
C |
p. 564-577 |
artikel |
15 |
Dynamic multicriteria group decision-making method with automatic reliability and weight calculation
|
Du, Yuan-Wei |
|
|
634 |
C |
p. 400-422 |
artikel |
16 |
Dynamic multi-objective evolutionary algorithms in noisy environments
|
Sahmoud, Shaaban |
|
|
634 |
C |
p. 650-664 |
artikel |
17 |
Editorial Board
|
|
|
|
634 |
C |
p. ii |
artikel |
18 |
Effective and efficient core computation in signed networks
|
Kim, Junghoon |
|
|
634 |
C |
p. 290-307 |
artikel |
19 |
Ensembles of priority rules to solve one machine scheduling problem in real-time
|
Gil-Gala, Francisco J. |
|
|
634 |
C |
p. 340-358 |
artikel |
20 |
Evolutionary algorithm with individual-distribution search strategy and regression-classification surrogates for expensive optimization
|
Li, Genghui |
|
|
634 |
C |
p. 423-442 |
artikel |
21 |
Existence and uniqueness of non-periodic solutions to boundary value problems for discrete fractional difference equations with uncertainty
|
Beigmohamadi, R. |
|
|
634 |
C |
p. 14-26 |
artikel |
22 |
Finite-time synchronization of complex networks with partial communication channels failure
|
Li, Yuanyuan |
|
|
634 |
C |
p. 539-549 |
artikel |
23 |
Hierarchical graph multi-agent reinforcement learning for traffic signal control
|
Yang, Shantian |
|
|
634 |
C |
p. 55-72 |
artikel |
24 |
IEA-GNN: Anchor-aware graph neural network fused with information entropy for node classification and link prediction
|
Zhang, Peiliang |
|
|
634 |
C |
p. 665-676 |
artikel |
25 |
Information granules-based long-term forecasting of time series via BPNN under three-way decision framework
|
Zhu, Chenglong |
|
|
634 |
C |
p. 696-715 |
artikel |
26 |
Learning latent embedding via weighted projection matrix alignment for incomplete multi-view clustering
|
Yin, Ming |
|
|
634 |
C |
p. 244-258 |
artikel |
27 |
Manipulation detection of key populations under information measurement
|
Xiao, Shuai |
|
|
634 |
C |
p. 1-13 |
artikel |
28 |
Membership reconstruction attack in deep neural networks
|
Long, Yucheng |
|
|
634 |
C |
p. 27-41 |
artikel |
29 |
Outlier detection in social networks leveraging community structure
|
Dey, Arnab |
|
|
634 |
C |
p. 578-586 |
artikel |
30 |
PKET-GCN: Prior knowledge enhanced time-varying graph convolution network for traffic flow prediction
|
Bao, Yinxin |
|
|
634 |
C |
p. 359-381 |
artikel |
31 |
Prescribed-time distributed observer based practical predefined-time leader-follower output consensus of second-order multiagent system with communication noises
|
Ni, Junkang |
|
|
634 |
C |
p. 271-289 |
artikel |
32 |
Progressive decoupled target-into-source multi-target domain adaptation
|
Zhou, Jiazhong |
|
|
634 |
C |
p. 140-156 |
artikel |
33 |
Protocol-based zonotopic state and fault estimation for communication-constrained industrial cyber-physical systems
|
Li, Qi |
|
|
634 |
C |
p. 730-743 |
artikel |
34 |
Raven solver: From perception to reasoning
|
Wei, Qinglai |
|
|
634 |
C |
p. 716-729 |
artikel |
35 |
Robust multi-view non-negative matrix factorization with adaptive graph and diversity constraints
|
Li, Chenglu |
|
|
634 |
C |
p. 587-607 |
artikel |
36 |
Rumor source localization in social networks based on infection potential energy
|
Li, Weimin |
|
|
634 |
C |
p. 172-188 |
artikel |
37 |
Safe batch constrained deep reinforcement learning with generative adversarial network
|
Dong, Wenbo |
|
|
634 |
C |
p. 259-270 |
artikel |
38 |
Self-adaptive fuzzy learning ensemble systems with dimensionality compression from data streams
|
Gu, Xiaowei |
|
|
634 |
C |
p. 382-399 |
artikel |
39 |
Self-supervised vision transformer-based few-shot learning for facial expression recognition
|
Chen, Xuanchi |
|
|
634 |
C |
p. 206-226 |
artikel |
40 |
Self-triggered finite-time control for discrete-time Markov jump systems
|
Wan, Haiying |
|
|
634 |
C |
p. 101-121 |
artikel |
41 |
Semi-supervised attribute reduction for partially labelled multiset-valued data via a prediction label strategy
|
Li, Zhaowen |
|
|
634 |
C |
p. 477-504 |
artikel |
42 |
SiamST: Siamese network with spatio-temporal awareness for object tracking
|
Zhang, Hong |
|
|
634 |
C |
p. 122-139 |
artikel |
43 |
Simplification logic for the management of unknown information
|
Pérez-Gámez, Francisco |
|
|
634 |
C |
p. 505-519 |
artikel |
44 |
THAT-Net: Two-layer hidden state aggregation based two-stream network for traffic accident prediction
|
Liu, Wei |
|
|
634 |
C |
p. 744-760 |
artikel |
45 |
Urban regional function guided traffic flow prediction
|
Wang, Kuo |
|
|
634 |
C |
p. 308-320 |
artikel |
46 |
Your lottery ticket is damaged: Towards all-alive pruning for extremely sparse networks
|
Kim, Daejin |
|
|
634 |
C |
p. 608-620 |
artikel |