nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A blockchain-based collaborative training method for multi-party data sharing
|
Yin, Lihua |
|
|
173 |
C |
p. 70-78 |
artikel |
2 |
A cooperative resource allocation model for IoT applications in mobile edge computing
|
Li, Xianwei |
|
|
173 |
C |
p. 183-191 |
artikel |
3 |
A hybrid of neuro-fuzzy inference system and hidden Markov Model for activity-based mobility modeling of cellphone users
|
Rahimipour, Shiva |
|
|
173 |
C |
p. 79-94 |
artikel |
4 |
A Survivable Communication Game based Approach for a network of cooperative UAVs
|
Nemer, Ibrahim A. |
|
|
173 |
C |
p. 120-133 |
artikel |
5 |
Attack sample generation algorithm based on data association group by GAN in industrial control dataset
|
Zhou, Wen |
|
|
173 |
C |
p. 206-213 |
artikel |
6 |
Collision-free and low delay MAC protocol based on multi-level quorum system in underwater wireless sensor networks
|
Sun, Ning |
|
|
173 |
C |
p. 56-69 |
artikel |
7 |
Comprehensive study of schedulability tests and optimal design for rate-monotonic scheduling
|
Li, Yang |
|
|
173 |
C |
p. 107-119 |
artikel |
8 |
Editorial Board
|
|
|
|
173 |
C |
p. ii-iii |
artikel |
9 |
Hidden terminal-aware access point selection for IEEE 802.11ah networks
|
Han, Jung-Han |
|
|
173 |
C |
p. 1-13 |
artikel |
10 |
Linking handover delay to load balancing in SDN-based heterogeneous networks
|
Alotaibi, Modhawi |
|
|
173 |
C |
p. 170-182 |
artikel |
11 |
Multi-feature fusion for fault diagnosis of rotating machinery based on convolutional neural network
|
Liu, Shaoqing |
|
|
173 |
C |
p. 160-169 |
artikel |
12 |
Multi-layer and multi-order fine-grained feature learning for artwork attribute recognition
|
Gao, Yang |
|
|
173 |
C |
p. 214-219 |
artikel |
13 |
Multi-source fusion for weak target images in the Industrial Internet of Things
|
Mao, Keming |
|
|
173 |
C |
p. 150-159 |
artikel |
14 |
Osprey: A fast and accurate patch presence test framework for binaries
|
Sun, Peiyuan |
|
|
173 |
C |
p. 95-106 |
artikel |
15 |
PPaaS: Privacy Preservation as a Service
|
Chamikara, M.A.P. |
|
|
173 |
C |
p. 192-205 |
artikel |
16 |
Representation method of cooperative social network features based on Node2Vec model
|
You, Xuemei |
|
|
173 |
C |
p. 21-26 |
artikel |
17 |
Resource allocation for downlink non-orthogonal multiple access in joint transmission coordinated multi-point networks
|
Awad, Mohamad Khattar |
|
|
173 |
C |
p. 134-149 |
artikel |
18 |
Sparse auto-encoder combined with kernel for network attack detection
|
Han, Xiaolu |
|
|
173 |
C |
p. 14-20 |
artikel |
19 |
TEAP: Traffic Engineering and ALR policy based Power-aware solutions for green routing and planning problems in backbone networks
|
Zhang, Jinhong |
|
|
173 |
C |
p. 27-44 |
artikel |
20 |
Three-factor authentication protocol using physical unclonable function for IoV
|
Jiang, Qi |
|
|
173 |
C |
p. 45-55 |
artikel |