Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             46 results found
no title author magazine year volume issue page(s) type
1 Adaptive learning rate optimization algorithms with dynamic bound based on Barzilai-Borwein method Wang, Zhi-Jun

634 C p. 42-54
article
2 A flexible two-stage constrained multi-objective evolutionary algorithm based on automatic regulation Zou, Juan

634 C p. 227-243
article
3 A hybrid level-based learning swarm algorithm with mutation operator for solving large-scale cardinality-constrained portfolio optimization problems Kaucic, Massimiliano

634 C p. 321-339
article
4 A novel optimization method for geological drilling vertical well Zhou, Yang

634 C p. 550-563
article
5 A novel spatiotemporal prediction method based on fuzzy Transform: Application to demographic balance data Cardone, Barbara

634 C p. 677-695
article
6 Artificial bee colony algorithm-based design of discrete-time stable unknown input estimator Satoh, Toshiyuki

634 C p. 621-649
article
7 A sequential deep learning algorithm for sampled mixed-integer optimisation problems Chamanbaz, Mohammadreza

634 C p. 73-84
article
8 Category-aware optimal transport for incomplete data classification Liu, Zhen

634 C p. 443-476
article
9 Co-evolutionary algorithm based on problem analysis for dynamic multiobjective optimization Li, Xiaoli

634 C p. 520-538
article
10 DeepAK-IoT: An effective deep learning model for cyberattack detection in IoT networks Ding, Weiping

634 C p. 157-171
article
11 Deep reinforce learning for joint optimization of condition-based maintenance and spare ordering Hao, Shengang

634 C p. 85-100
article
12 Dense lead contrast for self-supervised representation learning of multilead electrocardiograms Liu, Wenhan

634 C p. 189-205
article
13 Deriving priorities from the fuzzy best-worst method matrix and its applications: A perspective of incomplete reciprocal preference relation Huang, Jing

634 C p. 761-778
article
14 Detecting backdoor in deep neural networks via intentional adversarial perturbations Xue, Mingfu

634 C p. 564-577
article
15 Dynamic multicriteria group decision-making method with automatic reliability and weight calculation Du, Yuan-Wei

634 C p. 400-422
article
16 Dynamic multi-objective evolutionary algorithms in noisy environments Sahmoud, Shaaban

634 C p. 650-664
article
17 Editorial Board
634 C p. ii
article
18 Effective and efficient core computation in signed networks Kim, Junghoon

634 C p. 290-307
article
19 Ensembles of priority rules to solve one machine scheduling problem in real-time Gil-Gala, Francisco J.

634 C p. 340-358
article
20 Evolutionary algorithm with individual-distribution search strategy and regression-classification surrogates for expensive optimization Li, Genghui

634 C p. 423-442
article
21 Existence and uniqueness of non-periodic solutions to boundary value problems for discrete fractional difference equations with uncertainty Beigmohamadi, R.

634 C p. 14-26
article
22 Finite-time synchronization of complex networks with partial communication channels failure Li, Yuanyuan

634 C p. 539-549
article
23 Hierarchical graph multi-agent reinforcement learning for traffic signal control Yang, Shantian

634 C p. 55-72
article
24 IEA-GNN: Anchor-aware graph neural network fused with information entropy for node classification and link prediction Zhang, Peiliang

634 C p. 665-676
article
25 Information granules-based long-term forecasting of time series via BPNN under three-way decision framework Zhu, Chenglong

634 C p. 696-715
article
26 Learning latent embedding via weighted projection matrix alignment for incomplete multi-view clustering Yin, Ming

634 C p. 244-258
article
27 Manipulation detection of key populations under information measurement Xiao, Shuai

634 C p. 1-13
article
28 Membership reconstruction attack in deep neural networks Long, Yucheng

634 C p. 27-41
article
29 Outlier detection in social networks leveraging community structure Dey, Arnab

634 C p. 578-586
article
30 PKET-GCN: Prior knowledge enhanced time-varying graph convolution network for traffic flow prediction Bao, Yinxin

634 C p. 359-381
article
31 Prescribed-time distributed observer based practical predefined-time leader-follower output consensus of second-order multiagent system with communication noises Ni, Junkang

634 C p. 271-289
article
32 Progressive decoupled target-into-source multi-target domain adaptation Zhou, Jiazhong

634 C p. 140-156
article
33 Protocol-based zonotopic state and fault estimation for communication-constrained industrial cyber-physical systems Li, Qi

634 C p. 730-743
article
34 Raven solver: From perception to reasoning Wei, Qinglai

634 C p. 716-729
article
35 Robust multi-view non-negative matrix factorization with adaptive graph and diversity constraints Li, Chenglu

634 C p. 587-607
article
36 Rumor source localization in social networks based on infection potential energy Li, Weimin

634 C p. 172-188
article
37 Safe batch constrained deep reinforcement learning with generative adversarial network Dong, Wenbo

634 C p. 259-270
article
38 Self-adaptive fuzzy learning ensemble systems with dimensionality compression from data streams Gu, Xiaowei

634 C p. 382-399
article
39 Self-supervised vision transformer-based few-shot learning for facial expression recognition Chen, Xuanchi

634 C p. 206-226
article
40 Self-triggered finite-time control for discrete-time Markov jump systems Wan, Haiying

634 C p. 101-121
article
41 Semi-supervised attribute reduction for partially labelled multiset-valued data via a prediction label strategy Li, Zhaowen

634 C p. 477-504
article
42 SiamST: Siamese network with spatio-temporal awareness for object tracking Zhang, Hong

634 C p. 122-139
article
43 Simplification logic for the management of unknown information Pérez-Gámez, Francisco

634 C p. 505-519
article
44 THAT-Net: Two-layer hidden state aggregation based two-stream network for traffic accident prediction Liu, Wei

634 C p. 744-760
article
45 Urban regional function guided traffic flow prediction Wang, Kuo

634 C p. 308-320
article
46 Your lottery ticket is damaged: Towards all-alive pruning for extremely sparse networks Kim, Daejin

634 C p. 608-620
article
                             46 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands