nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Adaptive annealing dynamic Q-learning based on subroute optimization for solving the traveling salesman problem
|
Sun, Liming |
|
|
28 |
7 |
|
artikel |
2 |
Adaptive Gazelle optimization algorithm: a novel solution for complex optimization problems
|
Huang, Haidong |
|
|
28 |
7 |
|
artikel |
3 |
A deep learning-based anomaly detector for CAN bus networks in autonomous cars
|
Boumiza, Safa |
|
|
28 |
7 |
|
artikel |
4 |
Advancing code completion through rotary position embedding
|
Yin, Yiming |
|
|
28 |
7 |
|
artikel |
5 |
Adversarial examples detection for object detectors using consistency check framework
|
Zhang, Zhaoxin |
|
|
28 |
7 |
|
artikel |
6 |
A genetic and graph-guided feature learning strategy for improving decision tree construction
|
Karabadji, Nour Elislem |
|
|
28 |
7 |
|
artikel |
7 |
A hybrid Blockchain-Based framework for securing intrusion detection systems in internet of things
|
Nandanwar, Himanshu |
|
|
28 |
7 |
|
artikel |
8 |
A multi-strategy improved manta ray foraging optimization for engineering applications
|
Wang, Kewen |
|
|
28 |
7 |
|
artikel |
9 |
An efficient improved quasi-random fractal search for hyperparameter optimization: case study with lung disease classification
|
Houssein, Essam H. |
|
|
28 |
7 |
|
artikel |
10 |
An evolutionary algorithm with enhanced clustering genetic strategies and its application to double-layer spraying trajectory planning
|
Yang, Junhong |
|
|
28 |
7 |
|
artikel |
11 |
An improved heuristic service deployment algorithm based on multi-parameter priority in edge computing
|
Yin, Zhenyu |
|
|
28 |
7 |
|
artikel |
12 |
An intrusion detection system for industrial IoT using CNN-LSTM and reptile search algorithm
|
Chen, Yang |
|
|
28 |
7 |
|
artikel |
13 |
A particle swarm optimizer with a scoring-based multi-neighborhood selection mechanism for multimodal multi-objective problems
|
Wang, Zhennan |
|
|
28 |
7 |
|
artikel |
14 |
Apstgcn: adaptive parallel spatio-temporal graph convolution network for traffic forecasting
|
Yu, Xiaohan |
|
|
28 |
7 |
|
artikel |
15 |
A robust U-net-based cascaded model for brain tumor substructures segmentation using magnetic resonance imaging
|
Ali, Saqib |
|
|
28 |
7 |
|
artikel |
16 |
A systematic review on security mechanisms for serverless computing
|
Escaleira, Pedro |
|
|
28 |
7 |
|
artikel |
17 |
A two-way trust-based routing approach to identify malicious and energy-aware nodes in fog computing
|
Wang, Sili |
|
|
28 |
7 |
|
artikel |
18 |
BE-DSN: leveraging blockchain for improving data availability and security in distributed storage networks
|
Hameed, Zeeshan |
|
|
28 |
7 |
|
artikel |
19 |
Cloudlock: secure data sharing using a hybrid cryptosystem in multi-cloud data storage
|
Bharot, Nitesh |
|
|
28 |
7 |
|
artikel |
20 |
Comparative evaluation of pairing-free and pairing-based CP-ABE schemes for resource constrained environments
|
Bhaskar, Sourabh |
|
|
28 |
7 |
|
artikel |
21 |
Comprehensive evaluation of data preprocessing and visualization techniques for enhanced classification and sampling
|
Dagal, Idriss |
|
|
28 |
7 |
|
artikel |
22 |
Confidentiality, integrity, and non-repudiation of automobile event data: a TEE-based secure transmission scheme between automobile and cloud
|
Chen, Zigang |
|
|
28 |
7 |
|
artikel |
23 |
Continuous reasoning for adaptive container image distribution in the cloud–edge continuum
|
Azzolini, Damiano |
|
|
28 |
7 |
|
artikel |
24 |
Dhole optimization algorithm: a new metaheuristic algorithm for solving optimization problems
|
Mohammed, Bnyad O. |
|
|
28 |
7 |
|
artikel |
25 |
Dynamic-timeout prediction and proactive eviction for SDN flow table overflow mitigation
|
Humayun, Usman |
|
|
28 |
7 |
|
artikel |
26 |
Energy efficient routing algorithm for UWSNs using Fuzzy sampling on nodes filtered by energy distribution analysis
|
Navya, Solagudi |
|
|
28 |
7 |
|
artikel |
27 |
Enhanced anomaly-based network intrusion detection leveraging a modified picture fuzzy clustering approach
|
Seniaray, Sumedha |
|
|
28 |
7 |
|
artikel |
28 |
Enhanced chimp optimization algorithm using crossover and mutation techniques with machine learning for IoT intrusion detection system
|
Nasayreh, Ahmad |
|
|
28 |
7 |
|
artikel |
29 |
Enhancing data credibility in 6G-enabled IoT-fog environment using secured blockchain scheme
|
Jena, Kalyan Kumar |
|
|
28 |
7 |
|
artikel |
30 |
Enhancing malware detection through ensemble learning techniques
|
Moujoud, Loubna |
|
|
28 |
7 |
|
artikel |
31 |
Explainable AI for enhancing IDS against advanced persistent kill chain
|
Shaker, Bassam Noori |
|
|
28 |
7 |
|
artikel |
32 |
Explainable artificial intelligence for medical imaging systems using deep learning: a comprehensive review
|
Houssein, Essam H. |
|
|
28 |
7 |
|
artikel |
33 |
Federated learning in intrusion detection: advancements, applications, and future directions
|
Buyuktanir, Busra |
|
|
28 |
7 |
|
artikel |
34 |
FEED: Fair and Equitable Energy Distribution based on permissioned blockchain and predictive analytics
|
Shorya, Rohit |
|
|
28 |
7 |
|
artikel |
35 |
Forecasting GPU type allocation via demand feature extraction in heterogeneous clusters
|
Wang, Sheng |
|
|
28 |
7 |
|
artikel |
36 |
Formal service conflict detection through abstraction and refinement
|
Toman, Sarah Hussein |
|
|
28 |
7 |
|
artikel |
37 |
Freedom from inspiration! Achieving efficient metaheuristic optimization with delta plus
|
Gao, Yuansheng |
|
|
28 |
7 |
|
artikel |
38 |
Improving performance of content-centric networks via decentralized coded caching for multi-level popularity and access
|
Miraftab, Azadeh Sadat |
|
|
28 |
7 |
|
artikel |
39 |
Integrating weighted visibility graphs with IoMT for epileptic seizure detection: a machine learning approach
|
Al-Qurabat, Ali Kadhum M. |
|
|
28 |
7 |
|
artikel |
40 |
Join coalition mechanism for enhancing idle agents’ utility in a macroscopic coalition
|
Lau, Billy Pik Lik |
|
|
28 |
7 |
|
artikel |
41 |
Kanfilter: a simple and effective multi-module point cloud denoising model
|
Zhou, Xiaoyu |
|
|
28 |
7 |
|
artikel |
42 |
Learned image compression with CNN-LocalMamba architectures and multi-context entropy model
|
Zhang, Qian |
|
|
28 |
7 |
|
artikel |
43 |
Modeling and analysis of variable fractional order hyper-chaotic Lü system with radial basis function neural networks
|
Akhtar, Muhammad Waseem |
|
|
28 |
7 |
|
artikel |
44 |
Ms-unet:coal-rock crack image segmentation based on attention mechanism and multi-scale features
|
Jia, Haixin |
|
|
28 |
7 |
|
artikel |
45 |
Nime: a native in-memory compute framework for cluster computing
|
Chen, Chao |
|
|
28 |
7 |
|
artikel |
46 |
Optimizing cardiac radiation therapy in left breast cancer patients using an intelligent hybrid fuzzy model and differential genetic evolution
|
Yan, Pengwei |
|
|
28 |
7 |
|
artikel |
47 |
Post-quantum secure health records: a blockchain-based lattice threshold signcryption scheme
|
Sourav, |
|
|
28 |
7 |
|
artikel |
48 |
Privacy preserving technology for data sharing in cloud-assisted internet of medical things
|
Ling, Jie |
|
|
28 |
7 |
|
artikel |
49 |
QuantumBlock health records: enhancing healthcare data security with quantum cryptography and blockchain technology
|
Chinnasamy, P. |
|
|
28 |
7 |
|
artikel |
50 |
Recent metaheuristic algorithms for multi-objective feature selection: review, applications, open issues and challenges
|
Ouyang, Haibin |
|
|
28 |
7 |
|
artikel |
51 |
ROI-based optimized image watermarking with real-time authentication
|
Awasthi, Divyanshu |
|
|
28 |
7 |
|
artikel |
52 |
RSCNet: an integrated deep learning classification model for tomato leaf diseases
|
Xu, Laixiang |
|
|
28 |
7 |
|
artikel |
53 |
Spatial-aware and load balancing distributed data partitioning strategies for content-based multimedia retrieval
|
Pereira, Gabriel |
|
|
28 |
7 |
|
artikel |
54 |
Strategic joining and optimal pricing in the hybrid cloud system with risk-sensitive service requests
|
Zhao, Yiqian |
|
|
28 |
7 |
|
artikel |
55 |
Task offloading for multi-UAV asset edge computing with deep reinforcement learning
|
Zakaryia, Samah A. |
|
|
28 |
7 |
|
artikel |
56 |
Tcp-based network communication optimized for green cloud computing
|
Fesl, Jan |
|
|
28 |
7 |
|
artikel |
57 |
Time-controllable keyword search with aggregate keys and multi-delegation for secure cloud storage
|
Hu, Xinyi |
|
|
28 |
7 |
|
artikel |
58 |
Towards an asynchronous commit in micro-batch streaming systems with log-structured merge-tree based key-value store
|
Park, Kyuli |
|
|
28 |
7 |
|
artikel |
59 |
Traffic flow forecasting based on dynamic graph convolution and triplet attention
|
Zhang, Hong |
|
|
28 |
7 |
|
artikel |
60 |
Two-stage hierarchical evolutionary algorithm based on multi-population for multi-objective distributed heterogeneous welding flow shop scheduling
|
Xia, Liangcai |
|
|
28 |
7 |
|
artikel |
61 |
Using hybrid mountain gazelle optimization and particle swarm optimization algorithms to improve clustering
|
Mosavi, E. |
|
|
28 |
7 |
|
artikel |
62 |
Using spatial-frequency features for visible and infrared image fusion
|
Zhao, Fen |
|
|
28 |
7 |
|
artikel |