nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A comprehensive deep learning approach for topic discovering and sentiment analysis of textual information in tourism
|
Díaz-Pacheco, Ángel |
|
|
35 |
9 |
p. |
artikel |
2 |
Adaptive mean center of mass particle swarm optimizer for auto-localization in 3D wireless sensor networks
|
Alhasan, Waseem |
|
|
35 |
9 |
p. |
artikel |
3 |
ADCGNet: Attention-based dual channel Gabor network towards efficient detection and classification of electrocardiogram images
|
Arhin, Joseph Roger |
|
|
35 |
9 |
p. |
artikel |
4 |
Advance brain tumor segmentation using feature fusion methods with deep U-Net model with CNN for MRI data
|
Nizamani, Abdul Haseeb |
|
|
35 |
9 |
p. |
artikel |
5 |
AFCANet: An adaptive feature concatenate attention network for multi-focus image fusion
|
Liu, Shuaiqi |
|
|
35 |
9 |
p. |
artikel |
6 |
A lightweight object detection framework for underwater imagery with joint image restoration and color transformation
|
Zhou, Ming |
|
|
35 |
9 |
p. |
artikel |
7 |
An efficient and secure identity-based integrity auditing scheme for sensitive data with anti-replacement attack on multi-cloud storage
|
Kumar, Mahender |
|
|
35 |
9 |
p. |
artikel |
8 |
An efficient encryption method for smart grid data based on improved CBC mode
|
Li, Yuanjian |
|
|
35 |
9 |
p. |
artikel |
9 |
An efficient method to build music generative model by controlling both general and local note characteristics
|
Do Quang, Thinh |
|
|
35 |
9 |
p. |
artikel |
10 |
A novel model compression method based on joint distillation for deepfake video detection
|
Xu, Xiong |
|
|
35 |
9 |
p. |
artikel |
11 |
An unsolvable pixel reduced authentication method for color images with grayscale invariance
|
Zhou, Xiaoyu |
|
|
35 |
9 |
p. |
artikel |
12 |
A performance analysis of transformer-based deep learning models for Arabic image captioning
|
Alsayed, Ashwaq |
|
|
35 |
9 |
p. |
artikel |
13 |
A robust VVC video encryption scheme based on the dynamical chaotification model
|
Chen, Chen |
|
|
35 |
9 |
p. |
artikel |
14 |
AuSR3: A new block mapping technique for image authentication and self-recovery to avoid the tamper coincidence problem
|
Aminuddin, Afrig |
|
|
35 |
9 |
p. |
artikel |
15 |
C3CPS: CRITIC-CoCoSo-based caching placement strategy using multi-criteria decision method for efficient content distribution in Named Data Networking
|
Negara, Ridha Muldina |
|
|
35 |
9 |
p. |
artikel |
16 |
CGUFS: A clustering-guided unsupervised feature selection algorithm for gene expression data
|
Xu, Zhaozhao |
|
|
35 |
9 |
p. |
artikel |
17 |
Clustering-based return prediction model for stock pre-selection in portfolio optimization using PSO-CNN+MVF
|
Ashrafzadeh, Mahdi |
|
|
35 |
9 |
p. |
artikel |
18 |
C3MW: A novel comprehensive-monitoring-motivated multi-model watermarking scheme for tamper detection and self-recovery
|
Zhang, Qiyuan |
|
|
35 |
9 |
p. |
artikel |
19 |
Combining reinforcement learning method to enhance LEDBAT++ over diversified network environments
|
Tang, Siyuan |
|
|
35 |
9 |
p. |
artikel |
20 |
Cyber resilience in industrial networks: A state of the art, challenges, and future directions
|
Alrumaih, Thuraya N.I. |
|
|
35 |
9 |
p. |
artikel |
21 |
Data traffic reduction for D2D communications in 5G networks using a multilink approach
|
Zhao, Wei |
|
|
35 |
9 |
p. |
artikel |
22 |
Defensive strategies against PCC attacks based on ideal (t,n)-secret sharing scheme
|
Ali, Sijjad |
|
|
35 |
9 |
p. |
artikel |
23 |
Development of abnormal facial temperature detection technology using thermal imaging to prevent the spread of infectious diseases
|
Hong, Hyung Gil |
|
|
35 |
9 |
p. |
artikel |
24 |
Enhancing model quality and scalability for mining business processes with invisible tasks in non-free choice
|
Sungkono, Kelly R. |
|
|
35 |
9 |
p. |
artikel |
25 |
Estimating the relative importance of nodes in complex networks based on network embedding and gravity model
|
Zhao, Na |
|
|
35 |
9 |
p. |
artikel |
26 |
Face recognition using ensemble statistical local descriptors
|
Eleyan, Alaa |
|
|
35 |
9 |
p. |
artikel |
27 |
Factor-bridging algorithm for the prediction of job satisfaction: Developing country perspective
|
Khan, Mohammad Aktaruzzaman |
|
|
35 |
9 |
p. |
artikel |
28 |
Federated learning with hyper-parameter optimization
|
Kundroo, Majid |
|
|
35 |
9 |
p. |
artikel |
29 |
FFSDF: An improved fast face shadow detection framework based on channel spatial attention enhancement
|
Zhou, Hongliang |
|
|
35 |
9 |
p. |
artikel |
30 |
Generative inverse reinforcement learning for learning 2-opt heuristics without extrinsic rewards in routing problems
|
Wang, Qi |
|
|
35 |
9 |
p. |
artikel |
31 |
Highly efficient secure linear algebra for private machine learning classifications over malicious clients in the post-quantum world
|
Kjamilji, Artrim |
|
|
35 |
9 |
p. |
artikel |
32 |
Improved meet-in-the-middle attacks on reduced-round tweakable block ciphers Kiasu-BC and Deoxys-BC
|
Ma, Zhangjun |
|
|
35 |
9 |
p. |
artikel |
33 |
Increasing efficiency for routing in internet of things using Binary Gray Wolf Optimization and fuzzy logic
|
Wang, Zhiqun |
|
|
35 |
9 |
p. |
artikel |
34 |
Integrated dual hyperchaotic and Josephus traversing based 3D confusion-diffusion pattern for image encryption
|
Winarno, Edy |
|
|
35 |
9 |
p. |
artikel |
35 |
Integrating users’ long-term and short-term interests with knowledge graph to improve restaurant recommendation
|
Miao, Lizhi |
|
|
35 |
9 |
p. |
artikel |
36 |
Leveraging artificial intelligence and mutual authentication to optimize content caching in edge data centers
|
Marwan, Mbarek |
|
|
35 |
9 |
p. |
artikel |
37 |
Low-cost relay selection in multihop cooperative networks
|
Rahman, Suryaia |
|
|
35 |
9 |
p. |
artikel |
38 |
LWED: Lightweight white-box encryption communication system for drones over CARX algorithm
|
Yang, Yatao |
|
|
35 |
9 |
p. |
artikel |
39 |
MO-CBACORP: A new energy-efficient secure routing protocol for underwater monitoring wireless sensor network
|
Zhang, Mingyue |
|
|
35 |
9 |
p. |
artikel |
40 |
Multi-criterion multi-UAV task allocation under dynamic conditions
|
Qamar, Rahim Ali |
|
|
35 |
9 |
p. |
artikel |
41 |
Multimodal representative answer extraction in community question answering
|
Li, Ming |
|
|
35 |
9 |
p. |
artikel |
42 |
NT-ARS-RRT: A novel non-threshold adaptive region sampling RRT algorithm for path planning
|
Liu, Yiyang |
|
|
35 |
9 |
p. |
artikel |
43 |
Optimizing jointly mining decision and resource allocation in a MEC-enabled blockchain networks
|
Abdel-Basset, Mohamed |
|
|
35 |
9 |
p. |
artikel |
44 |
Pavement damage identification and evaluation in UAV-captured images using gray level co-occurrence matrix and cloud model
|
He, Jiawei |
|
|
35 |
9 |
p. |
artikel |
45 |
Reconfigure and evaluate consumer satisfaction for Open API in advancing FinTech
|
Wang, Jen-Sheng |
|
|
35 |
9 |
p. |
artikel |
46 |
Relational prompt-based single-module single-step model for relational triple extraction
|
Zhang, Zhi |
|
|
35 |
9 |
p. |
artikel |
47 |
Rethinking interactive networks and regression loss functions for industrial defect detection
|
Su, Zhanzhi |
|
|
35 |
9 |
p. |
artikel |
48 |
Role of transfer functions in PSO to select diagnostic attributes for chronic disease prediction: An experimental study
|
Malakar, Samir |
|
|
35 |
9 |
p. |
artikel |
49 |
Secure-fault-tolerant efficient industrial internet of healthcare things framework based on digital twin federated fog-cloud networks
|
Lakhan, Abdullah |
|
|
35 |
9 |
p. |
artikel |
50 |
Security, trust and privacy risks, responses, and solutions for high-speed smart cities networks: A systematic literature review
|
Iftikhar, Abeer |
|
|
35 |
9 |
p. |
artikel |
51 |
SMFNM: Semi-supervised multimodal fusion network with main-modal for real-time emotion recognition in conversations
|
Yang, Juan |
|
|
35 |
9 |
p. |
artikel |
52 |
Social media sentiment analysis and opinion mining in public security: Taxonomy, trend analysis, issues and future directions
|
Md Suhaimin, Mohd Suhairi |
|
|
35 |
9 |
p. |
artikel |
53 |
Summarization of scholarly articles using BERT and BiGRU: Deep learning-based extractive approach
|
Bano, Sheher |
|
|
35 |
9 |
p. |
artikel |
54 |
The use of IoT-based wearable devices to ensure secure lightweight payments in FinTech applications
|
Bojjagani, Sriramulu |
|
|
35 |
9 |
p. |
artikel |
55 |
Time series classification with random temporal features
|
Ji, Cun |
|
|
35 |
9 |
p. |
artikel |
56 |
Towards the design of personalized adaptive user interfaces for smart TV viewers
|
Khan, Mumtaz |
|
|
35 |
9 |
p. |
artikel |
57 |
Towards the use of Unsupervised Causal Learning in Wireless Networks Operation
|
Sousa, Marco |
|
|
35 |
9 |
p. |
artikel |
58 |
Unsupervised statistical image segmentation using bi-dimensional hidden Markov chains model with application to mammography images
|
Joumad, Abdelali |
|
|
35 |
9 |
p. |
artikel |
59 |
WFP-Collector: Automated dataset collection framework for website fingerprinting evaluations on Tor Browser
|
Mohd Aminuddin, Mohamad Amar Irsyad |
|
|
35 |
9 |
p. |
artikel |