nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Achieving local differential location privacy protection in 3D space via Hilbert encoding and optimized random response
|
Yan, Yan |
|
|
36 |
6 |
p. |
artikel |
2 |
Adaptive density guided network with CNN and Transformer for underwater fish counting
|
Zheng, Shijian |
|
|
36 |
6 |
p. |
artikel |
3 |
An accurate transformer-based model for transition-based dependency parsing of free word order languages
|
Zuhra, Fatima Tuz |
|
|
36 |
6 |
p. |
artikel |
4 |
An efficient steganography scheme based on wavelet transformation for side-information estimation
|
Wu, Tian |
|
|
36 |
6 |
p. |
artikel |
5 |
An empirical study on the state-of-the-art methods for requirement-to-code traceability link recovery
|
Wang, Bangchao |
|
|
36 |
6 |
p. |
artikel |
6 |
A novel query execution time prediction approach based on operator iterate-aware of the execution plan on the graph database
|
He, Zhenzhen |
|
|
36 |
6 |
p. |
artikel |
7 |
A reference architecture for quantum computing as a service
|
Ahmad, Aakash |
|
|
36 |
6 |
p. |
artikel |
8 |
A review of advances in integrating gene regulatory networks and metabolic networks for designing strain optimization
|
Ananda, Ridho |
|
|
36 |
6 |
p. |
artikel |
9 |
Attribute-based linear homomorphic signature scheme based on key policy for mobile crowdsensing
|
Tian, Yuan |
|
|
36 |
6 |
p. |
artikel |
10 |
Binary metaheuristic algorithms for 0–1 knapsack problems: Performance analysis, hybrid variants, and real-world application
|
Abdel-Basset, Mohamed |
|
|
36 |
6 |
p. |
artikel |
11 |
CoD-DSSE: A practical efficient dynamic searchable symmetric encryption with lightweight clients
|
Zhu, Ze |
|
|
36 |
6 |
p. |
artikel |
12 |
Content-based quality evaluation of scientific papers using coarse feature and knowledge entity network
|
Wang, Zhongyi |
|
|
36 |
6 |
p. |
artikel |
13 |
Corrigendum to “Social media sentiment analysis and opinion mining in public security: Taxonomy, trend analysis, issues and future directions” [J. King Saud Univ. – Comput. Inform. Sci. 35(9) (2023) 101776]
|
Suhaimin, Mohd Suhairi Md |
|
|
36 |
6 |
p. |
artikel |
14 |
Detection of misbehaving individuals in social networks using overlapping communities and machine learning
|
Alshlahy, Wejdan |
|
|
36 |
6 |
p. |
artikel |
15 |
ECG signal fusion reconstruction via hash autoencoder and margin semantic reinforcement
|
Fang, Yixian |
|
|
36 |
6 |
p. |
artikel |
16 |
Enhanced enterprise-student matching with meta-path based graph neural network
|
Li, Fu |
|
|
36 |
6 |
p. |
artikel |
17 |
Enhancing autonomous driving through intelligent navigation: A comprehensive improvement approach
|
Xu, Zihao |
|
|
36 |
6 |
p. |
artikel |
18 |
Fusion of infrared and visible images via multi-layer convolutional sparse representation
|
Zhang, Zhouyu |
|
|
36 |
6 |
p. |
artikel |
19 |
FuzzyTP-BERT: Enhancing extractive text summarization with fuzzy topic modeling and transformer networks
|
Onan, Aytuğ |
|
|
36 |
6 |
p. |
artikel |
20 |
GAIR-U-Net: 3D guided attention inception residual u-net for brain tumor segmentation using multimodal MRI images
|
Rutoh, Evans Kipkoech |
|
|
36 |
6 |
p. |
artikel |
21 |
Improved YOLOv8 algorithms for small object detection in aerial imagery
|
Feng, Fei |
|
|
36 |
6 |
p. |
artikel |
22 |
LightSGM: Local feature matching with lightweight seeded
|
Feng, Shuai |
|
|
36 |
6 |
p. |
artikel |
23 |
MF-Saudi: A multimodal framework for bridging the gap between audio and textual data for Saudi dialect detection
|
Alharbi, Raed |
|
|
36 |
6 |
p. |
artikel |
24 |
Optimized reversible data hiding technique based on multidirectional prediction error histogram and fluctuation-based adaptation
|
Kasasbeh, Dima |
|
|
36 |
6 |
p. |
artikel |
25 |
ORD-WM: A two-stage loop closure detection algorithm for dense scenes
|
Wang, Chengze |
|
|
36 |
6 |
p. |
artikel |
26 |
Pairing-free Proxy Re-Encryption scheme with Equality Test for data security of IoT
|
Han, Gang |
|
|
36 |
6 |
p. |
artikel |
27 |
Physically structured adversarial patch inspired by natural leaves multiply angles deceives infrared detectors
|
Hu, Zhiyang |
|
|
36 |
6 |
p. |
artikel |
28 |
Rumor gatekeepers: Unsupervised ranking of Arabic twitter authorities for information verification
|
Aldahmash, Hend |
|
|
36 |
6 |
p. |
artikel |
29 |
Scalability and diversity of StarGANv2-VC in Arabic emotional voice conversion: Overcoming data limitations and enhancing performance
|
Meftah, Ali H. |
|
|
36 |
6 |
p. |
artikel |
30 |
Study on data storage and verification methods based on improved Merkle mountain range in IoT scenarios
|
Liang, Chufeng |
|
|
36 |
6 |
p. |
artikel |
31 |
TortoiseBFT: An asynchronous consensus algorithm for IoT system
|
Liu, Yang |
|
|
36 |
6 |
p. |
artikel |
32 |
Towards explainability in artificial intelligence frameworks for heartcare: A comprehensive survey
|
Sreeja, M.U. |
|
|
36 |
6 |
p. |
artikel |