nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A distributed Monte Carlo based linear algebra solver applied to the analysis of large complex networks
|
Magalhães, Filipe |
|
|
127 |
C |
p. 320-330 |
artikel |
2 |
A formal analysis of performance-security tradeoffs under frequent task reconfigurations
|
Alhozaimy, Sarah |
|
|
127 |
C |
p. 252-262 |
artikel |
3 |
AI-assisted Computer Network Operations testbed for Nature-Inspired Cyber Security based adaptive defense simulation and analysis
|
Shandilya, Shishir Kumar |
|
|
127 |
C |
p. 297-308 |
artikel |
4 |
A lightweight supervised intrusion detection mechanism for IoT networks
|
Roy, Souradip |
|
|
127 |
C |
p. 276-285 |
artikel |
5 |
An adaptive federated learning scheme with differential privacy preserving
|
Wu, Xiang |
|
|
127 |
C |
p. 362-372 |
artikel |
6 |
An Anti-Malicious Task Allocation Mechanism in Crowdsensing Systems
|
Wu, Xiaocan |
|
|
127 |
C |
p. 347-361 |
artikel |
7 |
An end-to-end deep learning model for robust smooth filtering identification
|
Zhang, Yujin |
|
|
127 |
C |
p. 263-275 |
artikel |
8 |
Anonymous Traceability protocol based on Group Signature for Blockchain
|
Gong, Bei |
|
|
127 |
C |
p. 160-167 |
artikel |
9 |
A privacy-protected intelligent crowdsourcing application of IoT based on the reinforcement learning
|
Ren, Yingying |
|
|
127 |
C |
p. 56-69 |
artikel |
10 |
A Q-learning approach for the autoscaling of scientific workflows in the Cloud
|
Garí, Yisel |
|
|
127 |
C |
p. 168-180 |
artikel |
11 |
A secure and lightweight certificateless hybrid signcryption scheme for Internet of Things
|
Gong, Bei |
|
|
127 |
C |
p. 23-30 |
artikel |
12 |
Autoencoder-based feature construction for IoT attacks clustering
|
Haseeb, Junaid |
|
|
127 |
C |
p. 487-502 |
artikel |
13 |
Automated evolutionary approach for the design of composite machine learning pipelines
|
Nikitin, Nikolay O. |
|
|
127 |
C |
p. 109-125 |
artikel |
14 |
A wearable-based posture recognition system with AI-assisted approach for healthcare IoT
|
Hong, Zhen |
|
|
127 |
C |
p. 286-296 |
artikel |
15 |
Blockchain-enabled feedback-based combinatorial double auction for cloud markets
|
Ma, Xuyang |
|
|
127 |
C |
p. 225-239 |
artikel |
16 |
Byte embeddings for file fragment classification
|
Haque, Md Enamul |
|
|
127 |
C |
p. 448-461 |
artikel |
17 |
Cost-effective crowdsourced join queries for entity resolution without prior knowledge
|
Yin, Bo |
|
|
127 |
C |
p. 240-251 |
artikel |
18 |
CVFuzz: Detecting complexity vulnerabilities in OpenCL kernels via automated pathological input generation
|
Li, Wentao |
|
|
127 |
C |
p. 384-395 |
artikel |
19 |
DAVINCI: online and Dynamic Adaptation of eVolvable vIrtual Network services over Cloud Infrastructures
|
Lahlou, Laaziz |
|
|
127 |
C |
p. 396-408 |
artikel |
20 |
Discovering prerequisite relations from educational documents through word embeddings
|
Gasparetti, Fabio |
|
|
127 |
C |
p. 31-41 |
artikel |
21 |
Editorial Board
|
|
|
|
127 |
C |
p. ii |
artikel |
22 |
Enabling cross-continent provider fairness in educational recommender systems
|
Gómez, Elizabeth |
|
|
127 |
C |
p. 435-447 |
artikel |
23 |
Energy-efficient and secure mobile fog-based cloud for the Internet of Things
|
Razaque, Abdul |
|
|
127 |
C |
p. 1-13 |
artikel |
24 |
Exploiting multi-level parallel metaheuristics and heterogeneous computing to boost phylogenetics
|
Santander-Jiménez, Sergio |
|
|
127 |
C |
p. 208-224 |
artikel |
25 |
Fault localization based on wide & deep learning model by mining software behavior
|
Wang, TianTian |
|
|
127 |
C |
p. 309-319 |
artikel |
26 |
Feature recognition of irregular pellet images by regularized Extreme Learning Machine in combination with fractal theory
|
Liu, Weixing |
|
|
127 |
C |
p. 92-108 |
artikel |
27 |
FlexVF: Adaptive network device services in a virtualized environment
|
Ekane, Brice |
|
|
127 |
C |
p. 14-22 |
artikel |
28 |
Guest Editorial of the FGCS Special Issue on Advances in Intelligent Systems for Online Education
|
Bonnin, Geoffray |
|
|
127 |
C |
p. 331-333 |
artikel |
29 |
Hybrid market-based resources allocation in Mobile Edge Computing systems under stochastic information
|
Huang, Xiaowen |
|
|
127 |
C |
p. 80-91 |
artikel |
30 |
Is it a good move? Mining effective tutoring strategies from human–human tutorial dialogues
|
Lin, Jionghao |
|
|
127 |
C |
p. 194-207 |
artikel |
31 |
Lattice-based public key searchable encryption with fine-grained access control for edge computing
|
Wang, Peng |
|
|
127 |
C |
p. 373-383 |
artikel |
32 |
Learning behaviours data in programming education: Community analysis and outcome prediction with cleaned data
|
Mai, Tai Tan |
|
|
127 |
C |
p. 42-55 |
artikel |
33 |
Load balancing with traffic isolation in data center networks
|
Zhang, Tao |
|
|
127 |
C |
p. 126-141 |
artikel |
34 |
Network embedding based link prediction in dynamic networks
|
Tripathi, Shashi Prakash |
|
|
127 |
C |
p. 409-420 |
artikel |
35 |
Optimal data placement strategy considering capacity limitation and load balancing in geographically distributed cloud
|
Li, Chunlin |
|
|
127 |
C |
p. 142-159 |
artikel |
36 |
Prostate cancer classification from ultrasound and MRI images using deep learning based Explainable Artificial Intelligence
|
Hassan, Md. Rafiul |
|
|
127 |
C |
p. 462-472 |
artikel |
37 |
PSO-weighted random forest for attractive tourism spots recommendation
|
Zhang, Yuran |
|
|
127 |
C |
p. 421-425 |
artikel |
38 |
Radial Basis Function Network with Differential Privacy
|
Bugshan, Neda |
|
|
127 |
C |
p. 473-486 |
artikel |
39 |
Real-time epileptic seizure recognition using Bayesian genetic whale optimizer and adaptive machine learning
|
Anter, Ahmed M. |
|
|
127 |
C |
p. 426-434 |
artikel |
40 |
Reliable customer analysis using federated learning and exploring deep-attention edge intelligence
|
Ahmed, Usman |
|
|
127 |
C |
p. 70-79 |
artikel |
41 |
Scenario prediction of public health emergencies using infectious disease dynamics model and dynamic Bayes
|
Gao, Shan |
|
|
127 |
C |
p. 334-346 |
artikel |
42 |
XSRU-IoMT: Explainable simple recurrent units for threat detection in Internet of Medical Things networks
|
Khan, Izhar Ahmed |
|
|
127 |
C |
p. 181-193 |
artikel |