nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A compliance-based architecture for supporting GDPR accountability in cloud computing
|
Zhou, Chen |
|
|
145 |
C |
p. 104-120 |
artikel |
2 |
A decentralised messaging system robust against the unauthorised forwarding of private content
|
Franco, Mirko |
|
|
145 |
C |
p. 211-222 |
artikel |
3 |
ALPS: Achieving accuracy-aware location privacy service via assisted regions
|
Zhang, Shaobo |
|
|
145 |
C |
p. 189-199 |
artikel |
4 |
A novel authentication and key agreement scheme for Internet of Vehicles
|
Yang, Qing |
|
|
145 |
C |
p. 415-428 |
artikel |
5 |
A novel bi-anomaly-based intrusion detection system approach for industry 4.0
|
Alem, Salwa |
|
|
145 |
C |
p. 267-283 |
artikel |
6 |
A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security
|
Yang, Aimin |
|
|
145 |
C |
p. 293-302 |
artikel |
7 |
Architecture for IoT applications based on reactive microservices: A performance evaluation
|
Lira, Cleber |
|
|
145 |
C |
p. 223-238 |
artikel |
8 |
A recommendation management defense mechanism based on trust model in underwater acoustic sensor networks
|
Zhang, Mengjie |
|
|
145 |
C |
p. 466-477 |
artikel |
9 |
A remote sensing data transmission strategy based on the combination of satellite-ground link and GEO relay under dynamic topology
|
Chen, Jing |
|
|
145 |
C |
p. 337-353 |
artikel |
10 |
A survey on the efficiency, reliability, and security of data query in blockchain systems
|
Zhang, Qizhi |
|
|
145 |
C |
p. 303-320 |
artikel |
11 |
A two-stage federated optimization algorithm for privacy computing in Internet of Things
|
Zhang, Jiangjiang |
|
|
145 |
C |
p. 354-366 |
artikel |
12 |
Automatic diagnosis of multi-task in essential tremor: Dynamic handwriting analysis using multi-modal fusion neural network
|
Ma, Chenbin |
|
|
145 |
C |
p. 429-441 |
artikel |
13 |
Cloud computing virtual machine consolidation based on stock trading forecast techniques
|
Vila, Sergi |
|
|
145 |
C |
p. 321-336 |
artikel |
14 |
Context-aware workflow management for smart manufacturing: A literature review of semantic web-based approaches
|
Ochoa, William |
|
|
145 |
C |
p. 38-55 |
artikel |
15 |
Curriculum classification network based on margin balancing multi-loss and ensemble learning
|
Du, Shaoyi |
|
|
145 |
C |
p. 150-163 |
artikel |
16 |
Distance transform learning for structural and functional analysis of coronary artery from dual-view angiography
|
Zhang, Dong |
|
|
145 |
C |
p. 136-149 |
artikel |
17 |
Dynamic GPU power capping with online performance tracing for energy efficient GPU computing using DEPO tool
|
Krzywaniak, Adam |
|
|
145 |
C |
p. 396-414 |
artikel |
18 |
Editorial Board
|
|
|
|
145 |
C |
p. ii |
artikel |
19 |
Identifying performance anomalies in fluctuating cloud environments: A robust correlative-GNN-based explainable approach
|
Song, Yujia |
|
|
145 |
C |
p. 77-86 |
artikel |
20 |
Incentive mechanism and path planning for Unmanned Aerial Vehicle (UAV) hitching over traffic networks
|
Lu, Ziyi |
|
|
145 |
C |
p. 521-535 |
artikel |
21 |
Intraoperative enhancement of effective connectivity in the default mode network predicts postoperative delirium following cardiovascular surgery
|
Zeng, Xuanwei |
|
|
145 |
C |
p. 27-37 |
artikel |
22 |
Investigating the effect of network latency on users’ performance in Collaborative Virtual Environments using navigation aids
|
Khalid, Shah |
|
|
145 |
C |
p. 68-76 |
artikel |
23 |
Jointly optimized resource allocation for SDN control and forwarding planes in edge-cloud SDN-based networks
|
Nguyen, Duong Tuan |
|
|
145 |
C |
p. 176-188 |
artikel |
24 |
LAFED: A lightweight authentication mechanism for blockchain-enabled federated learning system
|
Ji, Shan |
|
|
145 |
C |
p. 56-67 |
artikel |
25 |
Leveraging transition exploratory bonus for efficient exploration in Hard-Transiting reinforcement learning problems
|
Yang, Shangdong |
|
|
145 |
C |
p. 442-453 |
artikel |
26 |
Many-objective many-task optimization using reference-points-based nondominated sorting approach
|
Cheng, Yan-Yang |
|
|
145 |
C |
p. 496-510 |
artikel |
27 |
MFE-ResNet: A new extraction framework for land cover characterization in mining areas
|
Wang, Chen |
|
|
145 |
C |
p. 550-562 |
artikel |
28 |
Modeling GPU Dynamic Parallelism for self similar density workloads
|
Quezada, Felipe A. |
|
|
145 |
C |
p. 239-253 |
artikel |
29 |
Multi-type task offloading for wireless Internet of Things by federated deep reinforcement learning
|
Tong, Zhao |
|
|
145 |
C |
p. 536-549 |
artikel |
30 |
Non-interactive and privacy-preserving neural network learning using functional encryption
|
Deng, Guoqiang |
|
|
145 |
C |
p. 454-465 |
artikel |
31 |
On the building of efficient self-adaptable health data science services by using dynamic patterns
|
Sanchez-Gallegos, Genaro |
|
|
145 |
C |
p. 478-495 |
artikel |
32 |
On the gathering of Tor onion addresses
|
Pastor-Galindo, Javier |
|
|
145 |
C |
p. 12-26 |
artikel |
33 |
Performability analysis of adaptive drone computation offloading with fog computing
|
Machida, Fumio |
|
|
145 |
C |
p. 121-135 |
artikel |
34 |
PIHA: Detection method using perceptual image hashing against query-based adversarial attacks
|
Choi, Seok-Hwan |
|
|
145 |
C |
p. 563-577 |
artikel |
35 |
Power and thermal-aware virtual machine scheduling optimization in cloud data center
|
Chen, Rui |
|
|
145 |
C |
p. 578-589 |
artikel |
36 |
PPUP-GAN: A GAN-based privacy-protecting method for aerial photography
|
Yao, Zhexin |
|
|
145 |
C |
p. 284-292 |
artikel |
37 |
Privacy for IoT: Informed consent management in Smart Buildings
|
Pathmabandu, Chehara |
|
|
145 |
C |
p. 367-383 |
artikel |
38 |
PROMPT: Learning dynamic resource allocation policies for network applications
|
Penney, Drew |
|
|
145 |
C |
p. 164-175 |
artikel |
39 |
Secure channel free public key authenticated encryption with multi-keyword search on healthcare systems
|
Yang, Pan |
|
|
145 |
C |
p. 511-520 |
artikel |
40 |
Semantic ontology enabled modeling, retrieval and inference for incomplete mobile trajectory data
|
Tao, Ming |
|
|
145 |
C |
p. 1-11 |
artikel |
41 |
Structured encryption for triangle counting on graph data
|
Wu, Yulin |
|
|
145 |
C |
p. 200-210 |
artikel |
42 |
Vehicular intelligent collaborative intersection driving decision algorithm in Internet of Vehicles
|
Shao, Caixing |
|
|
145 |
C |
p. 384-395 |
artikel |
43 |
WGSDMM+GA: A genetic algorithm-based service clustering methodology assimilating dirichlet multinomial mixture model with word embedding
|
Agarwal, Neha |
|
|
145 |
C |
p. 254-266 |
artikel |
44 |
Xel: A cloud-agnostic data platform for the design-driven building of high-availability data science services
|
Barron-Lugo, J. Armando |
|
|
145 |
C |
p. 87-103 |
artikel |