nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A dual boundary robust verification method for neural networks
|
Yang, Yueyue |
|
|
80 |
18 |
p. 25792-25817 |
artikel |
2 |
A hexadecimal scrambling image encryption scheme based on improved four-dimensional chaotic system
|
Geng, Shengtao |
|
|
80 |
18 |
p. 25853-25887 |
artikel |
3 |
An improved dung beetle optimizer for UAV 3D path planning
|
Chen, Qi |
|
|
80 |
18 |
p. 26537-26567 |
artikel |
4 |
An intelligent non-uniform mesh to improve errors of a stable numerical method for time-tempered fractional advection–diffusion equation with weakly singular solution
|
Ahmadinia, Mahdi |
|
|
80 |
18 |
p. 26280-26307 |
artikel |
5 |
An optimized intelligent open-source MLaaS framework for user-friendly clustering and anomaly detection
|
ElDahshan, Kamal A. |
|
|
80 |
18 |
p. 26658-26684 |
artikel |
6 |
A novel Raft consensus algorithm combining comprehensive evaluation partitioning and Byzantine fault tolerance
|
Deng, Xiaohong |
|
|
80 |
18 |
p. 26363-26393 |
artikel |
7 |
A novel reinforcement learning-based hybrid intrusion detection system on fog-to-cloud computing
|
Najafli, Sepide |
|
|
80 |
18 |
p. 26088-26110 |
artikel |
8 |
A semantic model based on ensemble learning and attribute-based encryption to increase security of smart buildings in fog computing
|
Rezapour, Ronita |
|
|
80 |
18 |
p. 26614-26657 |
artikel |
9 |
BAPS: a blockchain-assisted privacy-preserving and secure sharing scheme for PHRs in IoMT
|
Li, Hongzhi |
|
|
80 |
18 |
p. 26197-26225 |
artikel |
10 |
Boosted regression for predicting CPU utilization in the cloud with periodicity
|
Quoc, Khanh Nguyen |
|
|
80 |
18 |
p. 26036-26060 |
artikel |
11 |
CCeACF: content and complementarity enhanced attentional collaborative filtering for cloud API recommendation
|
Chen, Zhen |
|
|
80 |
18 |
p. 26111-26139 |
artikel |
12 |
CiPN-TP: a channel-independent pretrained network via tokenized patching for trajectory prediction
|
Xue, Qifan |
|
|
80 |
18 |
p. 26512-26536 |
artikel |
13 |
Community detection in attributed social networks using deep learning
|
Rashnodi, Omid |
|
|
80 |
18 |
p. 25933-25973 |
artikel |
14 |
Correction to: Sustainable edge computing with mobile crowd computing: a proof-of-concept with a smart HVAC use case
|
Pramanik, Pijush Kanti Dutta |
|
|
80 |
18 |
p. 26685-26686 |
artikel |
15 |
Deep learning-based demand response for short-term operation of renewable-based microgrids
|
Gharehveran, Sina Samadi |
|
|
80 |
18 |
p. 26002-26035 |
artikel |
16 |
Degree-aware embedding-based multi-correlated graph convolutional collaborative filtering
|
Ma, Chao |
|
|
80 |
18 |
p. 25911-25932 |
artikel |
17 |
GMS: an efficient fully homomorphic encryption scheme for secure outsourced matrix multiplication
|
Gao, Jianxin |
|
|
80 |
18 |
p. 26435-26461 |
artikel |
18 |
HADTF: a hybrid autoencoder–decision tree framework for improved RPL-based attack detection in IoT networks based on enhanced feature selection approach
|
Osman, Musa |
|
|
80 |
18 |
p. 26333-26362 |
artikel |
19 |
HFS: an intelligent heuristic feature selection scheme to correct uncertainty
|
Yanli, Liu |
|
|
80 |
18 |
p. 26250-26279 |
artikel |
20 |
Improved grey wolf algorithm based on dynamic weight and logistic mapping for safe path planning of UAV low-altitude penetration
|
Wang, Siwei |
|
|
80 |
18 |
p. 25818-25852 |
artikel |
21 |
Information acquisition optimizer: a new efficient algorithm for solving numerical and constrained engineering optimization problems
|
Wu, Xiao |
|
|
80 |
18 |
p. 25736-25791 |
artikel |
22 |
Lightweight U-Net based on depthwise separable convolution for cloud detection onboard nanosatellite
|
Khalil, Imane |
|
|
80 |
18 |
p. 26308-26332 |
artikel |
23 |
MS-GD-P: priority-based service deployment for cloud-edge-end scenarios
|
Jin, Honghua |
|
|
80 |
18 |
p. 25713-25735 |
artikel |
24 |
Multi-layer collaborative task offloading optimization: balancing competition and cooperation across local edge and cloud resources
|
Ling, Bowen |
|
|
80 |
18 |
p. 26483-26511 |
artikel |
25 |
Multistage strategy for ground point filtering on large-scale datasets
|
Teijeiro Paredes, Diego |
|
|
80 |
18 |
p. 25974-26001 |
artikel |
26 |
Optimizing connectivity: a novel AI approach to assess transmission levels in optical networks
|
Mujawar, Mehaboob |
|
|
80 |
18 |
p. 26568-26588 |
artikel |
27 |
Robustness Analysis of Public Transportation Systems in Seoul Using General Multilayer Network Models
|
Lee, Seokjin |
|
|
80 |
18 |
p. 26589-26613 |
artikel |
28 |
Secure and efficient general matrix multiplication on cloud using homomorphic encryption
|
Gao, Yang |
|
|
80 |
18 |
p. 26394-26434 |
artikel |
29 |
Secure incentive mechanism for energy trading in computing force networks enabled internet of vehicles: a contract theory approach
|
Wen, Wen |
|
|
80 |
18 |
p. 26061-26087 |
artikel |
30 |
SiamMGT: robust RGBT tracking via graph attention and reliable modality weight learning
|
Geng, Lizhi |
|
|
80 |
18 |
p. 25888-25910 |
artikel |
31 |
State ordering and classification for analyzing non-sparse large Markov models
|
Mohagheghi, Mohammadsadegh |
|
|
80 |
18 |
p. 26140-26170 |
artikel |
32 |
TADS: a novel dataset for road traffic accident detection from a surveillance perspective
|
Chai, Yachuang |
|
|
80 |
18 |
p. 26226-26249 |
artikel |
33 |
Three-dimensional DV-Hop based on improved adaptive differential evolution algorithm
|
Mani, Vikas |
|
|
80 |
18 |
p. 26171-26196 |
artikel |
34 |
Ultra-FastNet: an end-to-end learnable network for multi-person posture prediction
|
Peng, Tiandi |
|
|
80 |
18 |
p. 26462-26482 |
artikel |