nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A big data-centric architecture metamodel for Industry 4.0
|
López Martínez, Patricia |
|
|
125 |
C |
p. 263-284 |
artikel |
2 |
A computational drug repositioning model based on hybrid similarity side information powered graph neural network
|
Li, Sumin |
|
|
125 |
C |
p. 24-31 |
artikel |
3 |
ACSIMCD: A 2-phase framework for detecting meaningful communities in dynamic social networks
|
Akachar, Elyazid |
|
|
125 |
C |
p. 399-420 |
artikel |
4 |
Adversarial Deep Learning approach detection and defense against DDoS attacks in SDN environments
|
Novaes, Matheus P. |
|
|
125 |
C |
p. 156-167 |
artikel |
5 |
A fuzzy based Co-Operative Blackmailing Attack detection scheme for Edge Computing nodes in MANET-IOT environment
|
Simpson, Serin V. |
|
|
125 |
C |
p. 544-563 |
artikel |
6 |
Analysis and experimental research on stability characteristics of squatting posture of wearable lower limb exoskeleton robot
|
Zheng, Yi |
|
|
125 |
C |
p. 352-363 |
artikel |
7 |
A novel frog chorusing recognition method with acoustic indices and machine learning
|
Gan, Hongxiao |
|
|
125 |
C |
p. 485-495 |
artikel |
8 |
A novel study on deep learning framework to predict and analyze the financial time series information
|
Yang, Shuigen |
|
|
125 |
C |
p. 812-819 |
artikel |
9 |
A novel sub-Kmeans based on co-training approach by transforming single-view into multi-view
|
Nan, Fengtao |
|
|
125 |
C |
p. 831-843 |
artikel |
10 |
A secure and efficient Internet of Things cloud encryption scheme with forensics investigation compatibility based on identity-based encryption
|
Unal, Devrim |
|
|
125 |
C |
p. 433-445 |
artikel |
11 |
A secure localization scheme based on trust assessment for WSNs using blockchain technology
|
Goyat, Rekha |
|
|
125 |
C |
p. 221-231 |
artikel |
12 |
A Softwarized Intrusion Detection System for the RPL-based Internet of Things networks
|
Violettas, George |
|
|
125 |
C |
p. 698-714 |
artikel |
13 |
Assessing vulnerability to psychological distress during the COVID-19 pandemic through the analysis of microblogging content
|
Viviani, Marco |
|
|
125 |
C |
p. 446-459 |
artikel |
14 |
A study on the AI-based online triage model for hospitals in sustainable smart city
|
Kong, Lingqiang |
|
|
125 |
C |
p. 59-70 |
artikel |
15 |
Attention monitoring for synchronous distance learning
|
Abate, Andrea F. |
|
|
125 |
C |
p. 774-784 |
artikel |
16 |
Basketball shooting angle calculation and analysis by deeply-learned vision model
|
Wang, Yongqiang |
|
|
125 |
C |
p. 949-953 |
artikel |
17 |
Cloud-based privacy- and integrity-protecting density peaks clustering
|
Yang, Haomiao |
|
|
125 |
C |
p. 758-769 |
artikel |
18 |
Collaborative algorithms that combine AI with IoT towards monitoring and control system
|
Zhang, Tao |
|
|
125 |
C |
p. 677-686 |
artikel |
19 |
Collaborative APIs recommendation for Artificial Intelligence of Things with information fusion
|
Xu, Yueshen |
|
|
125 |
C |
p. 471-479 |
artikel |
20 |
Complex event detection for commodity distribution Internet of Things model incorporating radio frequency identification and Wireless Sensor Network
|
Zhu, Xu |
|
|
125 |
C |
p. 100-111 |
artikel |
21 |
Computational resource and cost prediction service for scientific workflows in federated clouds
|
Rosa, Michel J.F. |
|
|
125 |
C |
p. 844-858 |
artikel |
22 |
Conceptualization and cases of study on cyber operations against the sustainability of the tactical edge
|
Sotelo Monge, Marco Antonio |
|
|
125 |
C |
p. 869-890 |
artikel |
23 |
CShield: Enabling code privacy for Cyber–Physical systems
|
Yang, Kai |
|
|
125 |
C |
p. 564-574 |
artikel |
24 |
Data-driven detection and characterization of communities of accounts collaborating in MOOCs
|
Ruipérez-Valiente, José A. |
|
|
125 |
C |
p. 590-603 |
artikel |
25 |
Data-flow driven optimal tasks distribution for global heterogeneous systems
|
Garcia, Jordi |
|
|
125 |
C |
p. 792-805 |
artikel |
26 |
Deep Spatial/temporal-level feature engineering for Tennis-based action recognition
|
Ning, Bai |
|
|
125 |
C |
p. 188-193 |
artikel |
27 |
Deep transfer learning framework for the identification of malicious activities to combat cyberattack
|
Singh, Deepak |
|
|
125 |
C |
p. 687-697 |
artikel |
28 |
Defending CNN against privacy leakage in edge computing via binary neural networks
|
Qiang, Weizhong |
|
|
125 |
C |
p. 460-470 |
artikel |
29 |
Detecting fake images by identifying potential texture difference
|
Yang, Jiachen |
|
|
125 |
C |
p. 127-135 |
artikel |
30 |
Detecting malicious behavior in social platforms via hybrid knowledge- and data-driven systems
|
Paredes, Jose N. |
|
|
125 |
C |
p. 232-246 |
artikel |
31 |
Down for failure: Active power status monitoring
|
Bayat, Niloofar |
|
|
125 |
C |
p. 629-640 |
artikel |
32 |
DroneCOCoNet: Learning-based edge computation offloading and control networking for drone video analytics
|
Qu, Chengyi |
|
|
125 |
C |
p. 247-262 |
artikel |
33 |
E-commerce products recognition based on a deep learning architecture: Theory and implementation
|
Zhang, Peng |
|
|
125 |
C |
p. 672-676 |
artikel |
34 |
Editorial Board
|
|
|
|
125 |
C |
p. ii |
artikel |
35 |
Editorial for FGCS special issue: Intelligent IoT systems for healthcare and rehabilitation
|
Ai, Qingsong |
|
|
125 |
C |
p. 770-773 |
artikel |
36 |
Efficient dynamic multi-replica auditing for the cloud with geographic location
|
Yu, Haiyang |
|
|
125 |
C |
p. 285-298 |
artikel |
37 |
Efficient heterogeneous matrix profile on a CPU + High Performance FPGA with integrated HBM
|
Romero, Jose Carlos |
|
|
125 |
C |
p. 10-23 |
artikel |
38 |
Energy-conscious optimization of Edge Computing through Deep Reinforcement Learning and two-phase immersion cooling
|
Pérez, Sergio |
|
|
125 |
C |
p. 891-907 |
artikel |
39 |
Energy-efficient VM scheduling based on deep reinforcement learning
|
Wang, Bin |
|
|
125 |
C |
p. 616-628 |
artikel |
40 |
ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs
|
Khan, Tayyab |
|
|
125 |
C |
p. 921-943 |
artikel |
41 |
FedRD: Privacy-preserving adaptive Federated learning framework for intelligent hazardous Road Damage detection and warning
|
Yuan, Yachao |
|
|
125 |
C |
p. 385-398 |
artikel |
42 |
Fingerprint pre-processing and feature engineering to enhance agricultural products categorization
|
Zhao, Shajunyi |
|
|
125 |
C |
p. 944-948 |
artikel |
43 |
Hidden space deep sequential risk prediction on student trajectories
|
Prenkaj, Bardh |
|
|
125 |
C |
p. 532-543 |
artikel |
44 |
Higher-Order Multiple-Feature-based Community Evolution Model with Potential Applications in Criminal Network Investigation
|
Li, Xiaoming |
|
|
125 |
C |
p. 364-375 |
artikel |
45 |
High performance ant colony system based on GPU warp specialization with a static–dynamic balanced candidate set strategy
|
Huang, Zhi-bin |
|
|
125 |
C |
p. 136-150 |
artikel |
46 |
Human action recognition using attention based LSTM network with dilated CNN features
|
Muhammad, Khan |
|
|
125 |
C |
p. 820-830 |
artikel |
47 |
Incentive mechanism for collaborative distributed learning in Artificial Intelligence of Things
|
Wang, Guan |
|
|
125 |
C |
p. 376-384 |
artikel |
48 |
ISAG: IoT-enabled and Secrecy Aware Group-based handover scheme for e-health services in M2M communication network
|
Gupta, Shubham |
|
|
125 |
C |
p. 168-187 |
artikel |
49 |
Making data platforms smarter with MOSES
|
Francia, Matteo |
|
|
125 |
C |
p. 299-313 |
artikel |
50 |
Massive-scale complicated human action recognition: Theory and applications
|
Liu, Yishu |
|
|
125 |
C |
p. 806-811 |
artikel |
51 |
Massive-scale graph mining for e-commerce cold chain analysis and optimization
|
Ren, Jiajia |
|
|
125 |
C |
p. 526-531 |
artikel |
52 |
MCFT-CNN: Malware classification with fine-tune convolution neural networks using traditional and transfer learning in Internet of Things
|
Sudhakar, |
|
|
125 |
C |
p. 334-351 |
artikel |
53 |
MPdist-based missing data imputation for supporting big data analyses in IoT-based applications
|
Lee, Gyeong Ho |
|
|
125 |
C |
p. 421-432 |
artikel |
54 |
New approach to global data access in computational infrastructures
|
Wrzeszcz, Michał |
|
|
125 |
C |
p. 575-589 |
artikel |
55 |
Optimizing makespan and resource utilization for multi-DNN training in GPU cluster
|
Li, Zhongjin |
|
|
125 |
C |
p. 206-220 |
artikel |
56 |
Parallel optimization of QoS-aware big service processes with discovery of skyline services
|
Liang, Helan |
|
|
125 |
C |
p. 496-514 |
artikel |
57 |
PBC4occ: A novel contrast pattern-based classifier for one-class classification
|
Aguilar, Diana Laura |
|
|
125 |
C |
p. 71-90 |
artikel |
58 |
Predicting user emotional tone in mental disorder online communities
|
Silveira, Bárbara |
|
|
125 |
C |
p. 641-651 |
artikel |
59 |
PROTECTOR: An optimized deep learning-based framework for image spam detection and prevention
|
Makkar, Aaisha |
|
|
125 |
C |
p. 41-58 |
artikel |
60 |
Redesigning compound TCP with cognitive edge intelligence for WiFi-based IoT
|
Sah Tyagi, Sumarga Kumar |
|
|
125 |
C |
p. 859-868 |
artikel |
61 |
Representing emotions with knowledge graphs for movie recommendations
|
Breitfuss, Arno |
|
|
125 |
C |
p. 715-725 |
artikel |
62 |
Research on hierarchical clustering method based on partially-ordered Hasse graph
|
Wu, Cong |
|
|
125 |
C |
p. 785-791 |
artikel |
63 |
Research on pedestrian detection technology based on the SVM classifier trained by HOG and LTP features
|
Zhou, Hongzhi |
|
|
125 |
C |
p. 604-615 |
artikel |
64 |
Research on the optimum synchronous network search data extraction based on swarm intelligence algorithm
|
Hu, Su |
|
|
125 |
C |
p. 151-155 |
artikel |
65 |
SDD: A trusted display of FIDO2 transaction confirmation without trusted execution environment
|
Xu, Peng |
|
|
125 |
C |
p. 32-40 |
artikel |
66 |
Self-aware distributed deep learning framework for heterogeneous IoT edge devices
|
Jin, Yi |
|
|
125 |
C |
p. 908-920 |
artikel |
67 |
Semi-supervised classification-aware cross-modal deep adversarial data augmentation
|
Wang, Shaoqiang |
|
|
125 |
C |
p. 194-205 |
artikel |
68 |
Spectrum utilization efficiency in CRNs with hybrid spectrum access and channel reservation: A comprehensive analysis under prioritized traffic
|
Khan, Abd Ullah |
|
|
125 |
C |
p. 726-742 |
artikel |
69 |
Student success prediction using student exam behaviour
|
Kuzilek, Jakub |
|
|
125 |
C |
p. 661-671 |
artikel |
70 |
Syscall-BSEM: Behavioral semantics enhancement method of system call sequence for high accurate and robust host intrusion detection
|
Zhang, Yifei |
|
|
125 |
C |
p. 112-126 |
artikel |
71 |
Technical research on realizing remote intelligent diagnosis of petroleum drilling loss circulation under smart city strategy
|
Liang, Haibo |
|
|
125 |
C |
p. 91-99 |
artikel |
72 |
Temporal sensitive heterogeneous graph neural network for news recommendation
|
Ji, Zhenyan |
|
|
125 |
C |
p. 324-333 |
artikel |
73 |
Textual analysis of traitor-based dataset through semi supervised machine learning
|
Janjua, Faisal |
|
|
125 |
C |
p. 652-660 |
artikel |
74 |
The NAS Parallel Benchmarks for evaluating C++ parallel programming frameworks on shared-memory architectures
|
Löff, Júnior |
|
|
125 |
C |
p. 743-757 |
artikel |
75 |
TireNet: A high recall rate method for practical application of tire defect type classification
|
Li, Ying |
|
|
125 |
C |
p. 1-9 |
artikel |
76 |
Towards parallelism detection of sequential programs with graph neural network
|
Shen, Yuanyuan |
|
|
125 |
C |
p. 515-525 |
artikel |
77 |
Unbalanced data processing using deep sparse learning technique
|
Li, Xing |
|
|
125 |
C |
p. 480-484 |
artikel |
78 |
Visualization and deep-learning-based malware variant detection using OpCode-level features
|
Darem, Abdulbasit |
|
|
125 |
C |
p. 314-323 |
artikel |