nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A coding computation scheme for secure aggregation
|
Yang, Ze |
|
|
36 |
5 |
p. |
artikel |
2 |
Adaptive K values and training subsets selection for optimal K-NN performance on FPGA
|
El Bouazzaoui, Achraf |
|
|
36 |
5 |
p. |
artikel |
3 |
A feature matching and compensation method based on importance weighting for occluded human pose estimation
|
Jiang, Jiahong |
|
|
36 |
5 |
p. |
artikel |
4 |
A high speed inference architecture for multimodal emotion recognition based on sparse cross modal encoder
|
Cui, Lin |
|
|
36 |
5 |
p. |
artikel |
5 |
A label learning approach using competitive population optimization algorithm feature selection to improve multi-label classification algorithms
|
Cui, Lianhe |
|
|
36 |
5 |
p. |
artikel |
6 |
A look into smart factory for Industrial IoT driven by SDN technology: A comprehensive survey of taxonomy, architectures, issues and future research orientations
|
Josbert, Nteziriza Nkerabahizi |
|
|
36 |
5 |
p. |
artikel |
7 |
An efficient online/offline heterogeneous proxy signcryption for secure communication in UAV networks
|
Hundera, Negalign Wake |
|
|
36 |
5 |
p. |
artikel |
8 |
A new version of the greedy perimeter stateless routing scheme in flying ad hoc networks
|
Hosseinzadeh, Mehdi |
|
|
36 |
5 |
p. |
artikel |
9 |
Automatic rumor recognition for public health and safety: A strategy combining topic classification and multi-dimensional feature fusion
|
Zhang, Yuxuan |
|
|
36 |
5 |
p. |
artikel |
10 |
Cipher-image compression by using compressive sensing and interweaving permutation
|
Zhang, Bo |
|
|
36 |
5 |
p. |
artikel |
11 |
Digital transformation in wireless networks: A comprehensive analysis of mobile data offloading techniques, challenges, and future prospects
|
Rosele, Noryusra |
|
|
36 |
5 |
p. |
artikel |
12 |
Energy-aware task scheduling for streaming applications on NoC-based MPSoCs
|
Abd Ishak, Suhaimi |
|
|
36 |
5 |
p. |
artikel |
13 |
Enhanced centroid-based energy-efficient clustering routing protocol for serverless based wireless sensor networks
|
Karim, Seemab |
|
|
36 |
5 |
p. |
artikel |
14 |
Evaluating the deep learning software tools for large-scale enterprises using a novel TODIFFA-MCDM framework
|
Gligorić, Zoran |
|
|
36 |
5 |
p. |
artikel |
15 |
Group recommendation fueled by noise-based graph contrastive learning
|
Hong, Tao |
|
|
36 |
5 |
p. |
artikel |
16 |
H 2 GCN: A hybrid hypergraph convolution network for skeleton-based action recognition
|
Shao, Yiming |
|
|
36 |
5 |
p. |
artikel |
17 |
Hierarchical classified storage and incentive consensus scheme for building IoT under blockchain
|
Wu, Xiaohua |
|
|
36 |
5 |
p. |
artikel |
18 |
Hybrid deduplication system with content-based cache for cloud environment
|
Godavari, Amdewar |
|
|
36 |
5 |
p. |
artikel |
19 |
Improved lion swarm optimization algorithm to solve the multi-objective rescheduling of hybrid flowshop with limited buffer
|
Guan, Tingyu |
|
|
36 |
5 |
p. |
artikel |
20 |
Joint subchannel power allocation for downlink NOMA systems based on quantum carnivorous plant algorithm
|
Gao, Hongyuan |
|
|
36 |
5 |
p. |
artikel |
21 |
Knowledge ontology enhanced model for explainable knowledge tracing
|
Wang, Yao |
|
|
36 |
5 |
p. |
artikel |
22 |
Meta graph network recommendation based on multi-behavior encoding
|
Liu, Xiaoyang |
|
|
36 |
5 |
p. |
artikel |
23 |
MRME-Net: Towards multi-semantics learning and long-tail problem of efficient event detection from social messages
|
Wu, Ruihan |
|
|
36 |
5 |
p. |
artikel |
24 |
Multi-model feature aggregation for classification of laser welding images with vision transformer
|
Din, Nasir Ud |
|
|
36 |
5 |
p. |
artikel |
25 |
New simultaneous Diophantine attacks on generalized RSA key equations
|
Ruzai, Wan Nur Aqlili |
|
|
36 |
5 |
p. |
artikel |
26 |
On the security risk of pre-image attack on cancelable biometrics
|
Dong, Xingbo |
|
|
36 |
5 |
p. |
artikel |
27 |
Predicting DNA sequence splice site based on graph convolutional network and DNA graph construction
|
Rentao, Luo |
|
|
36 |
5 |
p. |
artikel |
28 |
RA-MRS: A high efficient attribute reduction algorithm in big data
|
Yin, Linzi |
|
|
36 |
5 |
p. |
artikel |
29 |
Reinforcement learning-based unmanned aerial vehicle trajectory planning for ground users’ mobility management in heterogeneous networks
|
Ullah, Yasir |
|
|
36 |
5 |
p. |
artikel |
30 |
Reversible data hiding based on global and local automatic contrast enhancement of low-light color images
|
Han, Libo |
|
|
36 |
5 |
p. |
artikel |
31 |
RNN-LSTM: From applications to modeling techniques and beyond—Systematic review
|
Al-Selwi, Safwan Mahmood |
|
|
36 |
5 |
p. |
artikel |
32 |
Robust biometric identity authentication scheme using quantum voice encryption and quantum secure direct communications for cybersecurity
|
Abdelfatah, Roayat Ismail |
|
|
36 |
5 |
p. |
artikel |
33 |
Using Twitter as a digital insight into public stance on societal behavioral dynamics
|
Azmi, Aqil M. |
|
|
36 |
5 |
p. |
artikel |