nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A comprehensive review on ensemble deep learning: Opportunities and challenges
|
Mohammed, Ammar |
|
|
35 |
2 |
p. 757-774 |
artikel |
2 |
A natural language interface for automatic generation of data flow diagram using web extraction techniques
|
Cheema, Sehrish Munawar |
|
|
35 |
2 |
p. 626-640 |
artikel |
3 |
An Enhanced Static Taint Analysis Approach to Detect Input Validation Vulnerability
|
Marashdih, Abdalla Wasef |
|
|
35 |
2 |
p. 682-701 |
artikel |
4 |
A novel bitwise arithmetic optimization algorithm for the rule base optimization of deep neuro-fuzzy system
|
Talpur, Noureen |
|
|
35 |
2 |
p. 821-842 |
artikel |
5 |
A novel color image privacy-preserving method: Combining breadth and depth visual encryption with chaotic system
|
An, Dezhi |
|
|
35 |
2 |
p. 576-589 |
artikel |
6 |
Artificial intelligence-based classification of pollen grains using attention-guided pollen features aggregation network
|
Mahmood, Tahir |
|
|
35 |
2 |
p. 740-756 |
artikel |
7 |
Aspect sentiment classification using syntactic neighbour based attention network
|
Sharma, Tanu |
|
|
35 |
2 |
p. 612-625 |
artikel |
8 |
A systematic literature review on phishing website detection techniques
|
Safi, Asadullah |
|
|
35 |
2 |
p. 590-611 |
artikel |
9 |
Blockchain-based dynamic trust access control game mechanism
|
Deng, Xianhui |
|
|
35 |
2 |
p. 702-725 |
artikel |
10 |
Data aggregation protocols for WSN and IoT applications – A comprehensive survey
|
Begum, Beneyaz Ara |
|
|
35 |
2 |
p. 651-681 |
artikel |
11 |
DCC-IACJS: A novel bio-inspired duty cycle-based clustering approach for energy-efficient wireless sensor networks
|
Liu, Yang |
|
|
35 |
2 |
p. 775-790 |
artikel |
12 |
Efficient hybrid centralized and blockchain-based authentication architecture for heterogeneous IoT systems
|
Khashan, Osama A. |
|
|
35 |
2 |
p. 726-739 |
artikel |
13 |
GAM-SpCaNet: Gradient awareness minimization-based spinal convolution attention network for brain tumor classification
|
Tang, Chaosheng |
|
|
35 |
2 |
p. 560-575 |
artikel |
14 |
Multi objective trust aware task scheduling algorithm in cloud computing using whale optimization
|
Mangalampalli, Sudheer |
|
|
35 |
2 |
p. 791-809 |
artikel |
15 |
NFT-IoT Pharma Chain : IoT Drug traceability system based on Blockchain and Non Fungible Tokens (NFTs)
|
Turki, Mariem |
|
|
35 |
2 |
p. 527-543 |
artikel |
16 |
Priority-based task scheduling and resource allocation in edge computing for health monitoring system
|
Sharif, Zubair |
|
|
35 |
2 |
p. 544-559 |
artikel |
17 |
Privacy-preserving association rule mining via multi-key fully homomorphic encryption
|
Jia, Peiheng |
|
|
35 |
2 |
p. 641-650 |
artikel |
18 |
SECS: An effective CNN joint construction strategy for breast cancer histopathological image classification
|
Yu, Dianzhi |
|
|
35 |
2 |
p. 810-820 |
artikel |