nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A deep neural network approach with hyper-parameter optimization for vehicle type classification using 3-D magnetic sensor
|
Kolukisa, Burak |
|
|
84 |
C |
p. |
artikel |
2 |
An intelligent blockchain-based access control framework with federated learning for genome-wide association studies
|
Wang, Huanhuan |
|
|
84 |
C |
p. |
artikel |
3 |
A novel small-scale pedestrian detection method base on residual block group of CenterNet
|
Wang, Mingyang |
|
|
84 |
C |
p. |
artikel |
4 |
A parallel programming assessment for stream processing applications on multi-core systems
|
Andrade, Gabriella |
|
|
84 |
C |
p. |
artikel |
5 |
A reputation assessment model for trustful service recommendation
|
Tibermacine, Okba |
|
|
84 |
C |
p. |
artikel |
6 |
A systematic security analysis of EMV protocol
|
Lan, Xiao |
|
|
84 |
C |
p. |
artikel |
7 |
Ciphertext-policy attribute-based encryption supporting policy-hiding and cloud auditing in smart health
|
Wang, Huiyong |
|
|
84 |
C |
p. |
artikel |
8 |
Construction of a high-precision general geographical location words dataset
|
Liu, Yimin |
|
|
84 |
C |
p. |
artikel |
9 |
Determining a core view of research quality in empirical software engineering
|
Molléri, Jefferson Seide |
|
|
84 |
C |
p. |
artikel |
10 |
EDALoCo: Enhancing the accessibility of blockchains through a low-code approach to the development of event-driven applications for smart contract management
|
Rosa-Bilbao, Jesús |
|
|
84 |
C |
p. |
artikel |
11 |
Editorial Board
|
|
|
|
84 |
C |
p. |
artikel |
12 |
Enabling privacy and leakage resistance for dynamic blockchain-based access control systems
|
Wang, Xin |
|
|
84 |
C |
p. |
artikel |
13 |
Energy trading scheme based on consortium blockchain and game theory
|
Chen, Yuling |
|
|
84 |
C |
p. |
artikel |
14 |
Ensemble feature selection and classification methods for machine learning-based coronary artery disease diagnosis
|
Kolukisa, Burak |
|
|
84 |
C |
p. |
artikel |
15 |
Improving transferability of adversarial examples with powerful affine-shear transformation attack
|
Wang, Xiaotong |
|
|
84 |
C |
p. |
artikel |
16 |
Intelligent driver monitoring system: An Internet of Things-based system for tracking and identifying the driving behavior
|
Mohammed, Karrouchi |
|
|
84 |
C |
p. |
artikel |
17 |
Microservice based scalable IoT architecture for device interoperability
|
Rath, Chouhan Kumar |
|
|
84 |
C |
p. |
artikel |
18 |
PPNNP: A privacy-preserving neural network prediction with separated data providers using multi-client inner-product encryption
|
Zhang, Mingwu |
|
|
84 |
C |
p. |
artikel |
19 |
Quantum-safe Anonymous Hierarchical Identity-Based Encryption with Traceable Identities
|
Nguyen, Ngoc Ai Van |
|
|
84 |
C |
p. |
artikel |
20 |
Research on the standardization model of data semantics in the knowledge graph construction of Oil&Gas industry
|
Yuan, Jingshu |
|
|
84 |
C |
p. |
artikel |
21 |
Revocable attribute-based encryption from standard lattices
|
Luo, Fucai |
|
|
84 |
C |
p. |
artikel |
22 |
Securing social platform from misinformation using deep learning
|
Roy, Pradeep Kumar |
|
|
84 |
C |
p. |
artikel |