nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A cascade information diffusion prediction model integrating topic features and cross-attention
|
Liu, Xiaoyang |
|
|
35 |
10 |
p. |
artikel |
2 |
Accurate prediction of international trade flows: Leveraging knowledge graphs and their embeddings
|
Rincon-Yanez, Diego |
|
|
35 |
10 |
p. |
artikel |
3 |
A chaotic-based watermarking scheme for ensuring integrity of a face recognition system in public large gathering scenario
|
Alhazmi, Basil Saud |
|
|
35 |
10 |
p. |
artikel |
4 |
A distributed cross-chain mechanism based on notary schemes and group signatures
|
Wu, Xiaohua |
|
|
35 |
10 |
p. |
artikel |
5 |
Advancing IoT security: A systematic review of machine learning approaches for the detection of IoT botnets
|
Nazir, Ahsan |
|
|
35 |
10 |
p. |
artikel |
6 |
A fine-grained detection method for gate-level hardware Trojan based on bidirectional Graph Neural Networks
|
Cheng, Dong |
|
|
35 |
10 |
p. |
artikel |
7 |
A hybrid quantum annealing method for generating ensemble classifiers
|
Yulianti, Lenny Putri |
|
|
35 |
10 |
p. |
artikel |
8 |
A joint Multi-decoder Dual-attention U-Net framework for tumor segmentation in Whole Slide Images
|
Abdel-Nabi, Heba |
|
|
35 |
10 |
p. |
artikel |
9 |
An enhanced adaptive 3D path planning algorithm for mobile robots with obstacle buffering and improved Theta* using minimum snap trajectory smoothing
|
Han, Leng |
|
|
35 |
10 |
p. |
artikel |
10 |
Anomaly detection method based on penalty least squares algorithm and time window entropy for Cyber–Physical Systems
|
Zhang, Jing |
|
|
35 |
10 |
p. |
artikel |
11 |
An optimal energy utilization model for precision agriculture in WSNs using multi-objective clustering and deep learning
|
Pandiyaraju, V. |
|
|
35 |
10 |
p. |
artikel |
12 |
A novel geometrically invariant quantum watermarking scheme utilizing Quantum Error Correction
|
Xing, Zheng |
|
|
35 |
10 |
p. |
artikel |
13 |
A novel Q-learning-based routing scheme using an intelligent filtering algorithm for flying ad hoc networks (FANETs)
|
Hosseinzadeh, Mehdi |
|
|
35 |
10 |
p. |
artikel |
14 |
A reversible and lossless secret image sharing scheme with authentication for color images
|
Li, Wendan |
|
|
35 |
10 |
p. |
artikel |
15 |
A secure multifactor-based clustering scheme for internet of vehicles
|
Karim, Sulaiman M. |
|
|
35 |
10 |
p. |
artikel |
16 |
Autonomous solution for Controller Placement Problem of Software-Defined Networking using MuZero based intelligent agents
|
Benoudifa, Ouafae |
|
|
35 |
10 |
p. |
artikel |
17 |
BDBRC: A Chinese military entity recognition model combining context contribution and residual dilatation convolutional networks
|
Wang, Jintao |
|
|
35 |
10 |
p. |
artikel |
18 |
BrightsightNet: A lightweight progressive low-light image enhancement network and its application in “Rainbow” maglev train
|
Chen, Zhichao |
|
|
35 |
10 |
p. |
artikel |
19 |
Chaotic color multi-image compression-encryption/ LSB data type steganography scheme for NFT transaction security
|
Zhang, Zheyi |
|
|
35 |
10 |
p. |
artikel |
20 |
Color image reversible data hiding based on multi-channel synchronized histogram
|
Peng, Yi |
|
|
35 |
10 |
p. |
artikel |
21 |
ConvAttenMixer: Brain tumor detection and type classification using convolutional mixer with external and self-attention mechanisms
|
Alzahrani, Salha M. |
|
|
35 |
10 |
p. |
artikel |
22 |
1D Convolutional LSTM-based wind power prediction integrated with PkNN data imputation technique
|
Shahid, Farah |
|
|
35 |
10 |
p. |
artikel |
23 |
Deep generative adversarial networks with marine predators algorithm for classification of Alzheimer’s disease using electroencephalogram
|
Sekhar, J.C. |
|
|
35 |
10 |
p. |
artikel |
24 |
Designing quantum blockchain system integrated with 6G network
|
Saini, Rakesh |
|
|
35 |
10 |
p. |
artikel |
25 |
DNA image encryption algorithm based on serrated spiral scrambling and cross bit plane
|
Zhang, Wenjing |
|
|
35 |
10 |
p. |
artikel |
26 |
DRL-based routing algorithm with guaranteed loss, latency and bandwidth in SDN networks: Application of online video conferencing
|
Zhang, Jing |
|
|
35 |
10 |
p. |
artikel |
27 |
DRL-driven zero-RIS assisted energy-efficient task offloading in vehicular edge computing networks
|
Mirza, Muhammad Ayzed |
|
|
35 |
10 |
p. |
artikel |
28 |
Dynamic offloading strategy for computational energy efficiency of wireless power transfer based MEC networks in industry 5.0
|
Aljubayrin, Saad |
|
|
35 |
10 |
p. |
artikel |
29 |
Ecoupon-Chain: Efficient decentralized e-coupon blockchain
|
Ma, Deyin |
|
|
35 |
10 |
p. |
artikel |
30 |
Edge assisted, forecast integrated ensemble learning based service management scheme for delay minimization in smart cities applications
|
Hemant Kumar Reddy, K |
|
|
35 |
10 |
p. |
artikel |
31 |
Efficient learning-driven data transmission algorithm for cloud-to-thing continuum
|
Yi, Haibo |
|
|
35 |
10 |
p. |
artikel |
32 |
Enhanced computer vision applications with blockchain: A review of applications and opportunities
|
Ottakath, Najmath |
|
|
35 |
10 |
p. |
artikel |
33 |
Ensuring reliable network operations and maintenance: The role of PMRF for switch maintenance and upgrades in SDN
|
Khan, Nauman |
|
|
35 |
10 |
p. |
artikel |
34 |
ESTPE: An efficient and stable thumbnail-preserving encryption scheme
|
Xie, Dong |
|
|
35 |
10 |
p. |
artikel |
35 |
Evaluation of land roughness and weather effects on paddy field using cameras mounted on drone: A comprehensive analysis from early to mid-growth stages
|
Hieu Luu, Trong |
|
|
35 |
10 |
p. |
artikel |
36 |
Evolved opposition-based Mountain Gazelle Optimizer to solve optimization problems
|
Sarangi, Priteesha |
|
|
35 |
10 |
p. |
artikel |
37 |
Explaining legal judgments: A multitask learning framework for enhancing factual consistency in rationale generation
|
He, Congqing |
|
|
35 |
10 |
p. |
artikel |
38 |
GDE model: A variable intrusion detection model for few-shot attack
|
Yan, Yu |
|
|
35 |
10 |
p. |
artikel |
39 |
GLOBE: A novel pruning-based sparse modeling with application to time series data representation
|
Omara, A.N. |
|
|
35 |
10 |
p. |
artikel |
40 |
Integrating object-based and pixel-based segmentation for building footprint extraction from satellite images
|
Abujayyab, Sohaib K.M. |
|
|
35 |
10 |
p. |
artikel |
41 |
Joint graph convolution networks and transformer for human pose estimation in sports technique analysis
|
Cheng, Hongren |
|
|
35 |
10 |
p. |
artikel |
42 |
Medical inter-modality volume-to-volume translation
|
Chen, Jinjin |
|
|
35 |
10 |
p. |
artikel |
43 |
Multi-key homomorphic encryption with tightened RGSW ciphertexts without relinearization for ciphertexts product
|
Che, Xiaoliang |
|
|
35 |
10 |
p. |
artikel |
44 |
Multi-view learning-based heterogeneous network representation learning
|
Chen, Lei |
|
|
35 |
10 |
p. |
artikel |
45 |
Network virus propagation and security situation awareness based on Hidden Markov Model
|
Tang, Wei |
|
|
35 |
10 |
p. |
artikel |
46 |
Non-parametric style transfer: Correlation-aware exact distribution matching
|
Lee, Jeong-Sik |
|
|
35 |
10 |
p. |
artikel |
47 |
Quality guided reversible data hiding with contrast enhancement
|
Bian, Zixuan |
|
|
35 |
10 |
p. |
artikel |
48 |
Selection of node with editing rights and privacy protection mechanisms based on dual-blockchain
|
Ge, Lin |
|
|
35 |
10 |
p. |
artikel |
49 |
Simulation based QoS aware dynamic caching scheme for heterogeneous content requests in vehicular edge computing
|
Gu, Xiaodan |
|
|
35 |
10 |
p. |
artikel |
50 |
SMAAMA: A named entity alignment method based on Siamese network character feature and multi-attribute importance feature for Chinese civil aviation
|
Wang, Jintao |
|
|
35 |
10 |
p. |
artikel |
51 |
The resurrection of digital triplet: A cognitive pillar of human-machine integration at the dawn of industry 5.0
|
Alimam, Hassan |
|
|
35 |
10 |
p. |
artikel |
52 |
TLS Guard for TLS 1.3 zero round-trip time (0-RTT) in a distributed environment
|
Abdelhafez, M.E. |
|
|
35 |
10 |
p. |
artikel |
53 |
Towards an integrated swarm intelligence framework for urban mobility:A systematic review and proposed theoretical model
|
Ruiz de Gauna, David E. |
|
|
35 |
10 |
p. |
artikel |
54 |
Towards identifying influential nodes in complex networks using semi-local centrality metrics
|
Zhang, Kun |
|
|
35 |
10 |
p. |
artikel |
55 |
Two-stage heuristic algorithm for vehicle-drone collaborative delivery and pickup based on medical supplies resource allocation
|
Han, Yuhang |
|
|
35 |
10 |
p. |
artikel |
56 |
WQCrowd: Secure blockchain-based crowdsourcing framework with multi-tier worker quality evaluation
|
Kodjiku, Seth Larweh |
|
|
35 |
10 |
p. |
artikel |