nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Adaptive incremental transfer learning for efficient performance modeling of big data workloads
|
Garralda-Barrio, Mariano |
|
|
166 |
C |
p. |
artikel |
2 |
Adaptive Stochastic Gradient Descent (SGD) for erratic datasets
|
Dagal, Idriss |
|
|
166 |
C |
p. |
artikel |
3 |
A decentralized asynchronous federated learning framework for edge devices
|
Wang, Bin |
|
|
166 |
C |
p. |
artikel |
4 |
Advancing anomaly detection in computational workflows with active learning
|
Raghavan, Krishnan |
|
|
166 |
C |
p. |
artikel |
5 |
Advancing cuffless arterial blood pressure estimation: A patient-specific optimized approach reducing computational requirements
|
González-Nóvoa, José A. |
|
|
166 |
C |
p. |
artikel |
6 |
A Framework for testing Federated Learning algorithms using an edge-like environment
|
Schwanck, Felipe Machado |
|
|
166 |
C |
p. |
artikel |
7 |
A hierarchical control for application placement and load distribution in Edge Computing
|
Maia, Adyson M. |
|
|
166 |
C |
p. |
artikel |
8 |
AISAW: An adaptive interference-aware scheduling algorithm for acceleration of deep learning workloads training on distributed heterogeneous systems
|
Bi, Yushen |
|
|
166 |
C |
p. |
artikel |
9 |
A Kubernetes-based scheme for efficient resource allocation in containerized workflow
|
Liu, Danyang |
|
|
166 |
C |
p. |
artikel |
10 |
A mask guided cross data augmentation method for industrial defect detection
|
Wang, Xubin |
|
|
166 |
C |
p. |
artikel |
11 |
An efficient blockchain for decentralized ABAC policy decision point
|
Hu, Qiwei |
|
|
166 |
C |
p. |
artikel |
12 |
An enhanced list scheduling algorithm for heterogeneous computing using an optimized Predictive Cost Matrix
|
Wang, Min |
|
|
166 |
C |
p. |
artikel |
13 |
A protocol generation model for protocol-unknown IoT devices
|
Gao, Zheng |
|
|
166 |
C |
p. |
artikel |
14 |
Artificial intelligence integration for extension of big data for decision-making
|
Fatnassi, khaoula |
|
|
166 |
C |
p. |
artikel |
15 |
A sampling-based acceleration method for heterogeneous chiplet NoC simulations
|
Xiong, Ruoting |
|
|
166 |
C |
p. |
artikel |
16 |
Automated generation of deployment descriptors for managing microservices-based applications in the cloud to edge continuum
|
DesLauriers, James |
|
|
166 |
C |
p. |
artikel |
17 |
A vehicular edge computing offloading and task caching solution based on spatiotemporal prediction
|
Zhu, Lin |
|
|
166 |
C |
p. |
artikel |
18 |
Blockchain and digital twin empowered edge caching for D2D wireless networks
|
Du, Jianbo |
|
|
166 |
C |
p. |
artikel |
19 |
Blockchain and timely auction mechanism-based spectrum management
|
Zhang, Hongyi |
|
|
166 |
C |
p. |
artikel |
20 |
Click-level supervision for online action detection extended from SCOAD
|
Zhang, Xing |
|
|
166 |
C |
p. |
artikel |
21 |
Contribution prediction in federated learning via client behavior evaluation
|
Al-Saedi, Ahmed A. |
|
|
166 |
C |
p. |
artikel |
22 |
Cooperative metric learning-based hybrid transformer for automatic recognition of standard echocardiographic multi-views
|
Li, Yiran |
|
|
166 |
C |
p. |
artikel |
23 |
CyberAIBot: Artificial Intelligence in an intrusion detection system for CyberSecurity in the IoT
|
Serrano, Will |
|
|
166 |
C |
p. |
artikel |
24 |
Devising an actor-based middleware support to federated learning experiments and systems
|
Bechini, Alessio |
|
|
166 |
C |
p. |
artikel |
25 |
Distributed and heterogeneous tensor–vector contraction algorithms for high performance computing
|
Martinez-Ferrer, Pedro J. |
|
|
166 |
C |
p. |
artikel |
26 |
DLST-MQTT: Dynamic and lightweight security over topics MQTT
|
De Rango, Floriano |
|
|
166 |
C |
p. |
artikel |
27 |
DP-LTGAN: Differentially private trajectory publishing via Locally-aware Transformer-based GAN
|
Zhang, R. |
|
|
166 |
C |
p. |
artikel |
28 |
Dual-channel meta-federated graph learning with robust aggregation and privacy enhancement
|
Huang, Jingtong |
|
|
166 |
C |
p. |
artikel |
29 |
Dynamic neighborhood grouping-based multi-objective scheduling algorithm for workflow in hybrid cloud
|
Guo, Yulin |
|
|
166 |
C |
p. |
artikel |
30 |
EC5: Edge–cloud collaborative computing framework with compressive communication
|
Tan, Jingwei |
|
|
166 |
C |
p. |
artikel |
31 |
Editorial Board
|
|
|
|
166 |
C |
p. |
artikel |
32 |
Efficient distributed matrix for resolving computational intensity in remote sensing
|
Zou, Weitao |
|
|
166 |
C |
p. |
artikel |
33 |
Efficient Number Theoretic Transform accelerator on the versal platform powered by the AI Engine
|
Bao, Zhenshan |
|
|
166 |
C |
p. |
artikel |
34 |
Energy-aware scheduling and two-tier coordinated load balancing for streaming applications in apache flink
|
Li, Hongjian |
|
|
166 |
C |
p. |
artikel |
35 |
Enhancing E-business in industry 4.0: Integrating fog/edge computing with Data LakeHouse for IIoT
|
Routaib, Hayat |
|
|
166 |
C |
p. |
artikel |
36 |
Enhancing IoT security: Assessing instantaneous communication trust to detect man-in-the-middle attacks
|
Basri, Rabeya |
|
|
166 |
C |
p. |
artikel |
37 |
Enhancing performance of machine learning tasks on edge-cloud infrastructures: A cross-domain Internet of Things based framework
|
Almurshed, Osama |
|
|
166 |
C |
p. |
artikel |
38 |
ENNigma: A framework for Private Neural Networks
|
Barbosa, Pedro |
|
|
166 |
C |
p. |
artikel |
39 |
Ensuring the federation correctness: Formal verification of Federated Learning in industrial cyber-physical systems
|
Guendouzi, Badra Souhila |
|
|
166 |
C |
p. |
artikel |
40 |
Enterprise architecture of IoT-based applications: A review
|
Li, Xuemei |
|
|
166 |
C |
p. |
artikel |
41 |
Evolutionary optimization of spatially-distributed multi-sensors placement for indoor surveillance environments with security levels
|
Moreno-Saavedra, Luis M. |
|
|
166 |
C |
p. |
artikel |
42 |
FedCOLA: Federated learning with heterogeneous feature concatenation and local acceleration for non-IID data
|
Chung, Wu-Chun |
|
|
166 |
C |
p. |
artikel |
43 |
FedDSHAR: A dual-strategy federated learning approach for human activity recognition amid noise label user
|
Lin, Ziqian |
|
|
166 |
C |
p. |
artikel |
44 |
FedShufde: A privacy preserving framework of federated learning for edge-based smart UAV delivery system
|
Yao, Aiting |
|
|
166 |
C |
p. |
artikel |
45 |
Finding BERT errors by clustering activation vectors
|
Andreopoulos, William B. |
|
|
166 |
C |
p. |
artikel |
46 |
Flexible hybrid post-quantum bidirectional multi-factor authentication and key agreement framework using ECC and KEM
|
Braeken, A. |
|
|
166 |
C |
p. |
artikel |
47 |
Flow timeout matters: Investigating the impact of active and idle timeouts on the performance of machine learning models in detecting security threats
|
Janati Idrissi, Meryem |
|
|
166 |
C |
p. |
artikel |
48 |
Formal definition and implementation of reproducibility tenets for computational workflows
|
Pritchard, Nicholas J. |
|
|
166 |
C |
p. |
artikel |
49 |
Forward-Secure multi-user and verifiable dynamic searchable encryption scheme within a zero-trust environment
|
Xu, Zhihao |
|
|
166 |
C |
p. |
artikel |
50 |
Fuzzy energy management strategies for energy harvesting IoT nodes based on a digital twin concept
|
Prauzek, Michal |
|
|
166 |
C |
p. |
artikel |
51 |
Generating hard Ising instances with planted solutions using post-quantum cryptographic protocols
|
Mandrà, Salvatore |
|
|
166 |
C |
p. |
artikel |
52 |
GPartition-store: A multi-group collaborative parallel data storage mechanism for permissioned blockchain sharding
|
Qiu, Lin |
|
|
166 |
C |
p. |
artikel |
53 |
HephaestusForge: Optimal microservice deployment across the Compute Continuum via Reinforcement Learning
|
Santos, José |
|
|
166 |
C |
p. |
artikel |
54 |
Hybrid deep learning-based cyberthreat detection and IoMT data authentication model in smart healthcare
|
Kumar, Manish |
|
|
166 |
C |
p. |
artikel |
55 |
Integrating scientific single-page applications with DevSecOps
|
Drane, Lance |
|
|
166 |
C |
p. |
artikel |
56 |
Integrita: A BFT distributed storage system
|
Taheri Boshrooyeh, Sanaz |
|
|
166 |
C |
p. |
artikel |
57 |
IoVST: An anomaly detection method for IoV based on spatiotemporal feature fusion
|
Cao, Jinhui |
|
|
166 |
C |
p. |
artikel |
58 |
KDRSFL: A knowledge distillation resistance transfer framework for defending model inversion attacks in split federated learning
|
Chen, Renlong |
|
|
166 |
C |
p. |
artikel |
59 |
Leveraging local and global relationships for corrupted label detection
|
Lam, Phong |
|
|
166 |
C |
p. |
artikel |
60 |
LightMOT: Lightweight and anchor-free solution for tracking multiple objects in dense populations
|
Karthikeyan, P |
|
|
166 |
C |
p. |
artikel |
61 |
LineJLocRepair: A line-level method for Automated Vulnerability Repair based on joint training
|
Hou, Jing |
|
|
166 |
C |
p. |
artikel |
62 |
Machine Learning-Based Attack Detection for the Internet of Things
|
Bikila, Dawit Dejene |
|
|
166 |
C |
p. |
artikel |
63 |
MHSC: A meta-heuristic method to optimize throughput and energy using sensitivity rate computing
|
Delavar, Arash Ghorbannia |
|
|
166 |
C |
p. |
artikel |
64 |
MSCPR: A maintainable vector commitment-based stateless cryptocurrency system with privacy preservation and regulatory compliance
|
Yang, Xingyu |
|
|
166 |
C |
p. |
artikel |
65 |
Multilayer multivariate forecasting network for precise resource utilization prediction in edge data centers
|
Tripathi, Shivani |
|
|
166 |
C |
p. |
artikel |
66 |
Multi-Tree Genetic Programming with Elite Recombination for dynamic task scheduling of satellite edge computing
|
Zhang, Changzhen |
|
|
166 |
C |
p. |
artikel |
67 |
Optimizing mobile blockchain networks: A game theoretical approach to cooperative multi-terminal computation
|
Pan, Lin |
|
|
166 |
C |
p. |
artikel |
68 |
Parallel software design of large-scale diamond-structured crystals molecular dynamics simulation
|
Liang, Jianguo |
|
|
166 |
C |
p. |
artikel |
69 |
PHiFL-TL: Personalized hierarchical federated learning using transfer learning
|
Afzali, Afsaneh |
|
|
166 |
C |
p. |
artikel |
70 |
PLangRec: Deep-learning model to predict the programming language from a single line of code
|
Rodriguez-Prieto, Oscar |
|
|
166 |
C |
p. |
artikel |
71 |
Prompting Robotic Modalities (PRM): A structured architecture for centralizing language models in complex systems
|
Benjdira, Bilel |
|
|
166 |
C |
p. |
artikel |
72 |
PSPL: A Ponzi scheme smart contracts detection approach via compressed sensing oversampling-based peephole LSTM
|
Wang, Lei |
|
|
166 |
C |
p. |
artikel |
73 |
Quantum machine learning algorithms for anomaly detection: A review
|
Corli, Sebastiano |
|
|
166 |
C |
p. |
artikel |
74 |
QuantuneV2: Compiler-based local metric-driven mixed precision quantization for practical embedded AI applications
|
Kim, Jeongseok |
|
|
166 |
C |
p. |
artikel |
75 |
RADiCe: A Risk Analysis Framework for Data Centers
|
Mastenbroek, Fabian |
|
|
166 |
C |
p. |
artikel |
76 |
Raising user awareness through unsupervised clustering of energy consumption habits
|
Marcello, Francesca |
|
|
166 |
C |
p. |
artikel |
77 |
Regularity-driven pattern extraction and analysis approach by the pre-pruning technique without pattern loss
|
Kim, Heonho |
|
|
166 |
C |
p. |
artikel |
78 |
Regulating CPU temperature with thermal-aware scheduling using a reduced order learning thermal model
|
Dowling, Anthony |
|
|
166 |
C |
p. |
artikel |
79 |
Remote sensing revolutionizing agriculture: Toward a new frontier
|
Wang, Xiaoding |
|
|
166 |
C |
p. |
artikel |
80 |
SAS: Speculative Locality Aware Scheduling for I/O intensive scientific analysis in clouds
|
Zahir, Ali |
|
|
166 |
C |
p. |
artikel |
81 |
Scalable compute continuum
|
Cardellini, Valeria |
|
|
166 |
C |
p. |
artikel |
82 |
Scheduling energy-constrained parallel applications in heterogeneous systems
|
Xu, Hongzhi |
|
|
166 |
C |
p. |
artikel |
83 |
SecDS: A security-aware DAG task scheduling strategy for edge computing
|
Long, Linbo |
|
|
166 |
C |
p. |
artikel |
84 |
Secure blockchain-based reputation system for IIoT-enabled retail industry with resistance to sybil attack
|
Zhao, Wenjia |
|
|
166 |
C |
p. |
artikel |
85 |
Secure integration of 5G in industrial networks: State of the art, challenges and opportunities
|
Michaelides, Sotiris |
|
|
166 |
C |
p. |
artikel |
86 |
Service-driven dynamic QoS on-demand routing algorithm
|
She, Hao |
|
|
166 |
C |
p. |
artikel |
87 |
Smart contract-based public integrity auditing for cloud storage against malicious auditors
|
Tian, Hui |
|
|
166 |
C |
p. |
artikel |
88 |
Straggler mitigation via hierarchical scheduling in elastic stream computing systems
|
Wu, Minghui |
|
|
166 |
C |
p. |
artikel |
89 |
TEMPORISE: Extracting semantic representations of varied input executions for silent data corruption evaluation
|
Ma, Junchi |
|
|
166 |
C |
p. |
artikel |
90 |
Towards efficient privacy-preserving conjunctive keywords search over encrypted cloud data
|
Liu, Yaru |
|
|
166 |
C |
p. |
artikel |
91 |
UD-LDP: A Technique for optimally catalyzing user driven Local Differential Privacy
|
Thedchanamoorthy, Gnanakumar |
|
|
166 |
C |
p. |
artikel |
92 |
Uncertainty-aware scheduling for effective data collection from environmental IoT devices through LEO satellites
|
Xu, Haoran |
|
|
166 |
C |
p. |
artikel |
93 |
Using binary hash tree-based encryption to secure a deep learning model and generated images for social media applications
|
Rohhila, Soniya |
|
|
166 |
C |
p. |
artikel |
94 |
VLCQ: Post-training quantization for deep neural networks using variable length coding
|
Abdel-Salam, Reem |
|
|
166 |
C |
p. |
artikel |
95 |
WFE-Tab: Overcoming limitations of TabPFN in IIoT-MEC environments with a weighted fusion ensemble-TabPFN model for improved IDS performance
|
Ruiz-Villafranca, Sergio |
|
|
166 |
C |
p. |
artikel |