nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A cellular traffic prediction method based on diffusion convolutional GRU and multi-head attention mechanism
|
Xiao, Junbi |
|
|
28 |
2 |
|
artikel |
2 |
Adaptive reinforcement learning based joint approach for energy efficiency in ultra dense networks: ARJUN model
|
Rajule, Nilakshee |
|
|
28 |
2 |
|
artikel |
3 |
A deep residual SConv1D-attention intrusion detection model for industrial Internet of Things
|
Wang, Zhendong |
|
|
28 |
2 |
|
artikel |
4 |
Advancing elderly social care dropout prediction with federated learning: client selection and imbalanced data management
|
Nikolaidis, Christos Chrysanthos |
|
|
28 |
2 |
|
artikel |
5 |
AE-CIAM: a hybrid AI-enabled framework for low-rate DDoS attack detection in cloud computing
|
Najar, Ashfaq Ahmad |
|
|
28 |
2 |
|
artikel |
6 |
A fast-flying particle swarm optimization for resolving constrained optimization and feature selection problems
|
Mahapatra, Ajit Kumar |
|
|
28 |
2 |
|
artikel |
7 |
A heuristic task scheduling algorithm in cloud computing environment: an overall cost minimization approach
|
Boroumand, Ali |
|
|
28 |
2 |
|
artikel |
8 |
A hybrid PSO and GA algorithm with rescheduling for task offloading in device–edge–cloud collaborative computing
|
Wang, Yuping |
|
|
28 |
2 |
|
artikel |
9 |
A Jaya algorithm based on self-adaptive method for parameters identification of photovoltaic cell and module
|
Feng, Zhiyu |
|
|
28 |
2 |
|
artikel |
10 |
A multi-agent deep reinforcement learning approach for optimal resource management in serverless computing
|
Singh, Ashutosh Kumar |
|
|
28 |
2 |
|
artikel |
11 |
A multi-strategy enhanced reptile search algorithm for global optimization and engineering optimization design problems
|
Zhou, Liping |
|
|
28 |
2 |
|
artikel |
12 |
An enhanced DV-hop localization algorithm based on hop distance correction and multi-strategy modified Aquila Optimizer in HWSNs
|
Wu, Suqian |
|
|
28 |
2 |
|
artikel |
13 |
A path planning method in three-dimensional complex space based on Bézier curves and a hybrid zebra optimization algorithm
|
Huang, Hanqiao |
|
|
28 |
2 |
|
artikel |
14 |
A secure lightweight authentication model with interference aware routing and attack detection approach in VANET
|
Kaur, Gurjot |
|
|
28 |
2 |
|
artikel |
15 |
Blockchain for securing electronic voting systems: a survey of architectures, trends, solutions, and challenges
|
Ohize, Henry O. |
|
|
28 |
2 |
|
artikel |
16 |
Botnet detection and information leakage mitigation with differential privacy under generative adversarial networks
|
Feizi, Sanaz |
|
|
28 |
2 |
|
artikel |
17 |
Bppfl: a blockchain-based framework for privacy-preserving federated learning
|
Asad, Muhammad |
|
|
28 |
2 |
|
artikel |
18 |
Combination of ant colony and student psychology based optimization for the multi-depot electric vehicle routing problem with time windows
|
Wei, Xiaoxu |
|
|
28 |
2 |
|
artikel |
19 |
Combining genetic algorithms and bayesian neural networks for resource usage prediction in multi-tenant container environments
|
Park, Soyeon |
|
|
28 |
2 |
|
artikel |
20 |
Deadline and budget-constrained archimedes optimization algorithm for workflow scheduling in cloud
|
Kushwaha, Shweta |
|
|
28 |
2 |
|
artikel |
21 |
Deep learning fusion for effective malware detection: leveraging visual features
|
Johny, Jahez Abraham |
|
|
28 |
2 |
|
artikel |
22 |
Dependent task offloading for air-ground integrated MEC networks: a multi-agent collaboration approach
|
Wang, Yuchen |
|
|
28 |
2 |
|
artikel |
23 |
3DLBS-BCHO: a three-dimensional deep learning approach based on branch splitter and binary chimp optimization for intrusion detection in IoT
|
Zareh Farkhady, Roya |
|
|
28 |
2 |
|
artikel |
24 |
Dynamic load balancing of traffic in the IoT edge computing environment using a clustering approach based on deep learning and genetic algorithms
|
Merah, Malha |
|
|
28 |
2 |
|
artikel |
25 |
EBIDS: efficient BERT-based intrusion detection system in the network and application layers of IoT
|
Sattarpour, Shiva |
|
|
28 |
2 |
|
artikel |
26 |
Efficient technique utilizing an embedding hierarchical clustering-based representation into crossed cubes for TSP optimization
|
Selmi, Aymen Takie Eddine |
|
|
28 |
2 |
|
artikel |
27 |
Empowering healthcare with BIEH - blockchain inter-operable electronic health record scheme
|
Gupta, Pallav |
|
|
28 |
2 |
|
artikel |
28 |
Ensembling Harmony Search Algorithm with case-based reasoning for software development effort estimation
|
Mustyala, Sarika |
|
|
28 |
2 |
|
artikel |
29 |
Escape after love: Philoponella prominens optimizer and its application to 3D path planning
|
Gao, Yuansheng |
|
|
28 |
2 |
|
artikel |
30 |
Exploring malware complexities: a behavior and characteristic analysis approach for robust and accurate cybersecurity
|
Wang, Weiye |
|
|
28 |
2 |
|
artikel |
31 |
Feature selection using importance-based two-stage multi-modal multiobjective particle swarm optimization
|
Ling, Qinghua |
|
|
28 |
2 |
|
artikel |
32 |
FedBlocks: federated learning and blockchainbased privacy-preserved pioneering framework for IoT healthcare using IPFS in web 3.0 era
|
Purohit, Ravindrakumar M. |
|
|
28 |
2 |
|
artikel |
33 |
Federated learning client selection algorithm based on gradient similarity
|
Hu, Lingxi |
|
|
28 |
2 |
|
artikel |
34 |
Federated learning incentivize with privacy-preserving for IoT in edge computing in the context of B5G
|
Jalali, Nasir Ahmad |
|
|
28 |
2 |
|
artikel |
35 |
Fedgac: optimizing generalization in personalized federated learning via adaptive initialization and strategic client selection
|
Yu, Yichun |
|
|
28 |
2 |
|
artikel |
36 |
Filter pruning via annealing decaying for deep convolutional neural networks acceleration
|
Huang, Jiawen |
|
|
28 |
2 |
|
artikel |
37 |
HG-Net: a novel neural network with hierarchical grouped convolution for indoor fingerprint positioning
|
Meng, Xiangxu |
|
|
28 |
2 |
|
artikel |
38 |
IG-PGFT: A secure and efficient intelligent grouping PBFT consensus algorithm for the Industrial Internet of Things
|
Wang, Yue |
|
|
28 |
2 |
|
artikel |
39 |
Improved exponential distribution optimizer: enhancing global numerical optimization problem solving and optimizing machine learning parameters
|
Adegboye, Oluwatayomi Rereloluwa |
|
|
28 |
2 |
|
artikel |
40 |
Integrated fuzzy decision tree based blockchain federated safety-as-a-service for IIoT
|
Tripathi, Arun Mani |
|
|
28 |
2 |
|
artikel |
41 |
Integrating binary classification and clustering for multi-class dysarthria severity level classification: a two-stage approach
|
Al-Ali, Afnan S. |
|
|
28 |
2 |
|
artikel |
42 |
Integrating of IOTA-based blockchain with edge computing for task offloading powering the metaverse
|
Priyadarshni, |
|
|
28 |
2 |
|
artikel |
43 |
Intelligent monitoring system for environmental protection during the construction period of pumped storage power station
|
Xu, Shuangquan |
|
|
28 |
2 |
|
artikel |
44 |
Investigating the effects of SQL hints on diverse storage devices through empirical analysis
|
Kim, Changjong |
|
|
28 |
2 |
|
artikel |
45 |
Joint resource allocation and privacy protection for MEC task offloading in industrial Internet
|
Wang, Zhongmin |
|
|
28 |
2 |
|
artikel |
46 |
Latency aware graph-based microservice placement in the edge-cloud continuum
|
Khan, Shawal |
|
|
28 |
2 |
|
artikel |
47 |
Lcsa-fed: a low cost semi-asynchronous federated learning based on lag tolerance for services QoS prediction
|
Cai, Lingru |
|
|
28 |
2 |
|
artikel |
48 |
Leveraging explainable artificial intelligence for emotional label prediction through health sensor monitoring
|
Houssein, Essam H. |
|
|
28 |
2 |
|
artikel |
49 |
LIRAD: lightweight tree-based approaches on resource constrained IoT devices for attack detection
|
Mishra, Sanket |
|
|
28 |
2 |
|
artikel |
50 |
Machine learning-centric prediction and decision based resource management in cloud computing environments
|
Kashyap, Shobhana |
|
|
28 |
2 |
|
artikel |
51 |
Metaheuristic-based task scheduling for latency-sensitive IoT applications in edge computing
|
Satouf, Aram |
|
|
28 |
2 |
|
artikel |
52 |
Microservice deployment in cloud-edge environment using enhanced global search grey wolf optimizer-greedy algorithm
|
Wang, Shudong |
|
|
28 |
2 |
|
artikel |
53 |
Modified parallel PSO algorithm in cloud computing for performance improvement
|
Pradhan, Arabinda |
|
|
28 |
2 |
|
artikel |
54 |
Modified Tasmanian devil optimization for solving single and multi-objective optimal power flow in conventional and advanced power systems
|
Farhat, Mohamed |
|
|
28 |
2 |
|
artikel |
55 |
Multiple adaptive fusion network with Mittag Leffler IoU loss for aircraft detection in remote sensing images
|
Wang, Fengxian |
|
|
28 |
2 |
|
artikel |
56 |
Multi-resource maximin share fair allocation in the cloud-edge collaborative computing system with bandwidth demand compression
|
Guo, Hao |
|
|
28 |
2 |
|
artikel |
57 |
Network-aware container scheduling in edge computing
|
Qiao, Ying |
|
|
28 |
2 |
|
artikel |
58 |
Optimizing smart health monitoring systems: enahancing energy efficiency and reducing latency with multi-level clustering and grey wolf optimizer
|
Gharaei, Niayesh |
|
|
28 |
2 |
|
artikel |
59 |
Practical evasion attack against neural network-based macro-malware detection method
|
Mimura, Mamoru |
|
|
28 |
2 |
|
artikel |
60 |
Resilient vehicular fog computing networks: an analytical approach to system reliability under breakdown and vacation interruptions
|
Mohtadi, Hibat Eallah |
|
|
28 |
2 |
|
artikel |
61 |
RETRACTED ARTICLE: Internet of things and distributed security framework for 5G networks
|
Lu, Rui |
|
|
28 |
2 |
|
artikel |
62 |
Retraction Note: Real-time network virtualization based on SDN and Docker container
|
He, Qinlu |
|
|
28 |
2 |
|
artikel |
63 |
Role division approach for firefly algorithm based on t-distribution perturbation and differential mutation
|
Chen, Juan |
|
|
28 |
2 |
|
artikel |
64 |
Secure data transmission in cloud computing using a cyber-security trust model with multi-risk protection scheme in smart IOT application
|
Kamble, Torana |
|
|
28 |
2 |
|
artikel |
65 |
Securing decentralized federated learning: cryptographic mechanisms for privacy and trust
|
Saidi, Ahmed |
|
|
28 |
2 |
|
artikel |
66 |
Securing the future: exploring post-quantum cryptography for authentication and user privacy in IoT devices
|
Mansoor, Khwaja |
|
|
28 |
2 |
|
artikel |
67 |
Security-aware resource allocation in fog computing using a meta-heuristic algorithm
|
Mohammadi, Mina |
|
|
28 |
2 |
|
artikel |
68 |
Sparse dual-weighting ensemble clustering
|
Xu, Pan |
|
|
28 |
2 |
|
artikel |
69 |
Sppdp-fl: adaptive client selection and dimensional projection for performance enhancement in personalized differential privacy federated learning
|
Xiao, Junbi |
|
|
28 |
2 |
|
artikel |
70 |
Symbiotic mechanism-based honey badger algorithm for continuous optimization
|
Xu, Yuefeng |
|
|
28 |
2 |
|
artikel |
71 |
The green marine waste collector routing optimization with puma selection-based neighborhood search algorithm
|
Abdollahzadeh, Benyamin |
|
|
28 |
2 |
|
artikel |
72 |
Three-dimensional dynamic collaborative path planning for multiple UCAVs using an improved NSGAII
|
Zhong, Keyu |
|
|
28 |
2 |
|
artikel |
73 |
Time delay-based routing protocol using genetic algorithm in vehicular Ad Hoc networks
|
Ghaemi, Yashar |
|
|
28 |
2 |
|
artikel |