nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A formal verification approach for composite smart contracts security using FSM
|
Almakhour, Mouhamad |
|
|
35 |
1 |
p. 70-86 |
artikel |
2 |
A Fuzzy-Based Duo-Secure Multi-Modal Framework for IoMT Anomaly Detection
|
Wagan, Shiraz Ali |
|
|
35 |
1 |
p. 131-144 |
artikel |
3 |
An attention-based hybrid deep learning approach for bengali video captioning
|
Zaoad, Md. Shahir |
|
|
35 |
1 |
p. 257-269 |
artikel |
4 |
An end-to-end real-time pollutants spilling recognition in wastewater based on the IoT-ready SENSIPLUS platform
|
Gerevini, Luca |
|
|
35 |
1 |
p. 499-513 |
artikel |
5 |
An energy fault and consumption optimization strategy in wireless sensor networks with edge computing
|
Li, Guozhi |
|
|
35 |
1 |
p. 357-367 |
artikel |
6 |
An immune plasma algorithm based approach for UCAV path planning
|
Aslan, Selcuk |
|
|
35 |
1 |
p. 56-69 |
artikel |
7 |
A novel deterministic substitution box generator over elliptic curves for real-time applications
|
Khan, Mohammad Abdul Mujeeb |
|
|
35 |
1 |
p. 219-236 |
artikel |
8 |
A novel subset-based polynomial design for enhancing the security of short message-digest with inflated avalanche and random responses
|
Karthik, P. |
|
|
35 |
1 |
p. 310-323 |
artikel |
9 |
A privacy scoring framework: Automation of privacy compliance and risk evaluation with standard indicators
|
Kim, Nakyoung |
|
|
35 |
1 |
p. 514-525 |
artikel |
10 |
A robust detection and localization technique for copy-move forgery in digital images
|
Alhaidery, Manaf Mohammed Ali |
|
|
35 |
1 |
p. 449-461 |
artikel |
11 |
Arrhythmia classification using multirate processing metaheuristic optimization and variational mode decomposition
|
Mian Qaisar, Saeed |
|
|
35 |
1 |
p. 26-37 |
artikel |
12 |
Big data analysis using a parallel ensemble clustering architecture and an unsupervised feature selection approach
|
Wang, Yubo |
|
|
35 |
1 |
p. 270-282 |
artikel |
13 |
Bio-inspired robotics enabled schemes in blockchain-fog-cloud assisted IoMT environment
|
lakhan, Abdullah |
|
|
35 |
1 |
p. 1-12 |
artikel |
14 |
BPPIR: Blockchain-assisted privacy-preserving similarity image retrieval over multiple clouds
|
Tian, Miao |
|
|
35 |
1 |
p. 324-334 |
artikel |
15 |
Credit card fraud detection in the era of disruptive technologies: A systematic review
|
Cherif, Asma |
|
|
35 |
1 |
p. 145-174 |
artikel |
16 |
Deep learning framework for congestion detection at public places via learning from synthetic data
|
Basalamah, Saleh |
|
|
35 |
1 |
p. 102-114 |
artikel |
17 |
3D face reconstruction from single image with generative adversarial networks
|
Malah, Mehdi |
|
|
35 |
1 |
p. 250-256 |
artikel |
18 |
Differentially private block coordinate descent
|
Riaz, Shazia |
|
|
35 |
1 |
p. 283-295 |
artikel |
19 |
FinTech enablers, use cases, and role of future internet of things
|
Bhat, Jagadeesha R. |
|
|
35 |
1 |
p. 87-101 |
artikel |
20 |
FPGA-based point processing for denoising of the show-through effect in scanned document images
|
Nazeer, Habibunnisha |
|
|
35 |
1 |
p. 296-309 |
artikel |
21 |
Intention-guided deep semi-supervised document clustering via metric learning
|
Jingnan, Li |
|
|
35 |
1 |
p. 416-425 |
artikel |
22 |
Leveraging feature-level fusion representations and attentional bidirectional RNN-CNN deep models for Arabic affect analysis on Twitter
|
Elfaik, Hanane |
|
|
35 |
1 |
p. 462-482 |
artikel |
23 |
Local generalization and bucketization technique for personalized privacy preservation
|
Li, Boyu |
|
|
35 |
1 |
p. 393-404 |
artikel |
24 |
Missing values imputation using Fuzzy K-Top Matching Value
|
Ali, Azza |
|
|
35 |
1 |
p. 426-437 |
artikel |
25 |
Model-agnostic meta-learning-based region-adaptive parameter adjustment scheme for influenza forecasting
|
Moon, Jaeuk |
|
|
35 |
1 |
p. 175-184 |
artikel |
26 |
MSSRGO: A multimeta-model-based global optimization method using a selection-rank-based infill sampling strategy
|
Li, Mingyang |
|
|
35 |
1 |
p. 382-392 |
artikel |
27 |
Multiple-level thresholding for breast mass detection
|
Yu, Xiang |
|
|
35 |
1 |
p. 115-130 |
artikel |
28 |
Neural POS tagging of shahmukhi by using contextualized word representations
|
Tehseen, Amina |
|
|
35 |
1 |
p. 335-356 |
artikel |
29 |
Opt-CoInfer: Optimal collaborative inference across IoT and cloud for fast and accurate CNN inference
|
Zhang, Zhanhua |
|
|
35 |
1 |
p. 438-448 |
artikel |
30 |
ProRE: An ACO- based programmer recommendation model to precisely manage software bugs
|
Kukkar, Ashima |
|
|
35 |
1 |
p. 483-498 |
artikel |
31 |
SCIPOG: Seeding and constraint support in IPOG strategy for combinatorial t-way testing to generate optimum test cases
|
Aminu Muazu, Aminu |
|
|
35 |
1 |
p. 185-201 |
artikel |
32 |
Texture and material classification with multi-scale ternary and septenary patterns
|
Rachdi, E. |
|
|
35 |
1 |
p. 405-415 |
artikel |
33 |
Theft detection dataset for benchmarking and machine learning based classification in a smart grid environment
|
Zidi, Salah |
|
|
35 |
1 |
p. 13-25 |
artikel |
34 |
Towards distributed and autonomous IoT service placement in fog computing using asynchronous advantage actor-critic algorithm
|
Zare, Mansoureh |
|
|
35 |
1 |
p. 368-381 |
artikel |
35 |
UsAge guidelines: Toward usable Saudi M-Government applications for elderly users
|
Alkhomsan, Mashail N. |
|
|
35 |
1 |
p. 202-218 |
artikel |
36 |
VF-CART: A communication-efficient vertical federated framework for the CART algorithm
|
Xu, Yang |
|
|
35 |
1 |
p. 237-249 |
artikel |
37 |
VODRAC: Efficient and robust correspondence-based point cloud registration with extreme outlier ratios
|
Hu, Enwen |
|
|
35 |
1 |
p. 38-55 |
artikel |