nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A blockchain-based privacy-preserving anti-collusion data auction mechanism with an off-chain approach
|
Emami, Ashkan |
|
|
80 |
6 |
p. 7507-7556 |
artikel |
2 |
Advancements in scalability of blockchain infrastructure through IPFS and dual blockchain methodology
|
Mahmud, Minhaz |
|
|
80 |
6 |
p. 8383-8405 |
artikel |
3 |
A graph attention network-based model for anomaly detection in multivariate time series
|
Zhang, Wei |
|
|
80 |
6 |
p. 8529-8549 |
artikel |
4 |
A hybrid four-stage detection model to pre-identify the sustainable manufacturing process of Li-ion battery pack
|
Chen, You-Shyang |
|
|
80 |
6 |
p. 7624-7661 |
artikel |
5 |
A hybrid framework for detection of autism using ConvNeXt-T and embedding clusters
|
Kanwal, Ayesha |
|
|
80 |
6 |
p. 8156-8178 |
artikel |
6 |
An adaptive XGBoost-based optimized sliding window for concept drift handling in non-stationary spatiotemporal data streams classifications
|
Angbera, Ature |
|
|
80 |
6 |
p. 7781-7811 |
artikel |
7 |
An effective link prediction method for industrial knowledge graphs by incorporating entity description and neighborhood structure information
|
Shu, Yiming |
|
|
80 |
6 |
p. 8297-8329 |
artikel |
8 |
An efficient optimization algorithm for nonlinear 2D fractional optimal control problems
|
Moradikashkooli, A. |
|
|
80 |
6 |
p. 7906-7930 |
artikel |
9 |
An energy-efficient task scheduling method for heterogeneous cloud computing systems using capuchin search and inverted ant colony optimization algorithm
|
Rostami, Safdar |
|
|
80 |
6 |
p. 7812-7848 |
artikel |
10 |
A new decomposition transform method for solving nonlinear fractional logistic differential equation
|
Khalouta, Ali |
|
|
80 |
6 |
p. 8179-8201 |
artikel |
11 |
A novel model for Sybil attack detection in online social network using optimal three-stream double attention network
|
Antony, Blessy |
|
|
80 |
6 |
p. 7433-7482 |
artikel |
12 |
ARdetector: android ransomware detection framework
|
Li, Dan |
|
|
80 |
6 |
p. 7557-7584 |
artikel |
13 |
A survey on IoT trust model frameworks
|
Ferraris, Davide |
|
|
80 |
6 |
p. 8259-8296 |
artikel |
14 |
A three-phase framework for secure storage and sharing of healthcare data based on blockchain, IPFS, proxy re-encryption and group communication
|
Mittal, Shweta |
|
|
80 |
6 |
p. 7955-7992 |
artikel |
15 |
Attention-based variable-size feature compression module for edge inference
|
Li, Shibao |
|
|
80 |
6 |
p. 8469-8484 |
artikel |
16 |
Blockchain-enabled federated learning for prevention of power terminals threats in IoT environment using edge zero-trust model
|
Al Shahrani, Ali M. |
|
|
80 |
6 |
p. 7849-7875 |
artikel |
17 |
Chipping value prediction for dicing saw based on sparrow search algorithm and neural networks
|
Shi, Jun |
|
|
80 |
6 |
p. 7483-7506 |
artikel |
18 |
Correction: K-means tree: an optimal clustering tree for unsupervised learning
|
Tavallali, Pooya |
|
|
80 |
6 |
p. 8551 |
artikel |
19 |
Correction to: A trustworthy neural architecture search framework for pneumonia image classification utilizing blockchain technology
|
Yang, Yi |
|
|
80 |
6 |
p. 8550 |
artikel |
20 |
Depression clinical detection model based on social media: a federated deep learning approach
|
Liu, Yang |
|
|
80 |
6 |
p. 7931-7954 |
artikel |
21 |
Distributed independent vector machine for big data classification problems
|
Almaspoor, Mohammad Hassan |
|
|
80 |
6 |
p. 7207-7244 |
artikel |
22 |
Entropy-driven differential privacy protection scheme based on social graphlet attributes
|
Zhang, Jing |
|
|
80 |
6 |
p. 7399-7432 |
artikel |
23 |
Extracting gait and balance pattern features from skeleton data to diagnose attention deficit/hyperactivity disorder in children
|
Rohani, Faezeh |
|
|
80 |
6 |
p. 8330-8356 |
artikel |
24 |
Frequency-domain characteristic analysis of PCNN
|
Deng, Xiangyu |
|
|
80 |
6 |
p. 8060-8093 |
artikel |
25 |
GLNET: global–local CNN's-based informed model for detection of breast cancer categories from histopathological slides
|
Khan, Saif Ur Rehman |
|
|
80 |
6 |
p. 7316-7348 |
artikel |
26 |
Heterogeneous ant colony algorithm based on selective evolution mechanism and game strategy
|
Wu, Lisheng |
|
|
80 |
6 |
p. 7171-7206 |
artikel |
27 |
Highly efficient low-area gate-diffusion-input-based approximate full adders for image processing computing
|
Roodbali, Khadijeh Moeini |
|
|
80 |
6 |
p. 8129-8155 |
artikel |
28 |
Hybrid booting with incremental hibernation for the baseboard management controllers
|
Jang, Joonhyouk |
|
|
80 |
6 |
p. 8485-8504 |
artikel |
29 |
ICS-IDS: application of big data analysis in AI-based intrusion detection systems to identify cyberattacks in ICS networks
|
Ali, Bakht Sher |
|
|
80 |
6 |
p. 7876-7905 |
artikel |
30 |
Integrating Healthcare 4.0 and WBAN: efficient redundancy reduction and adaptive packet scheduling using AR-DRL
|
Gupta, Arti |
|
|
80 |
6 |
p. 8406-8433 |
artikel |
31 |
LBCNet: A lightweight bilateral cascaded feature fusion network for real-time semantic segmentation
|
Song, Yuqin |
|
|
80 |
6 |
p. 7293-7315 |
artikel |
32 |
Malware detection for container runtime based on virtual machine introspection
|
He, Xinfeng |
|
|
80 |
6 |
p. 7245-7268 |
artikel |
33 |
Multi-scale adaptive atrous graph convolution for point cloud analysis
|
Wang, Xiaohong |
|
|
80 |
6 |
p. 7147-7170 |
artikel |
34 |
Online mode development of Korean art learning in the post-epidemic era based on artificial intelligence and deep learning
|
Deng, Kaiyi |
|
|
80 |
6 |
p. 8505-8528 |
artikel |
35 |
Optimized fog community framework with advanced genetic algorithm for enhanced performance dynamics
|
Verma, Nilesh Kumar |
|
|
80 |
6 |
p. 8202-8235 |
artikel |
36 |
PCP–ACO: a hybrid deadline-constrained workflow scheduling algorithm for cloud environment
|
Shobeiri, Peyman |
|
|
80 |
6 |
p. 7750-7780 |
artikel |
37 |
PLEACH: a new heuristic algorithm for pure parsimony haplotyping problem
|
Feizabadi, Reza |
|
|
80 |
6 |
p. 8236-8258 |
artikel |
38 |
Plus-profile energy harvested prediction and adaptive energy management for solar-powered wireless sensor networks
|
Wang, Yuanxiang |
|
|
80 |
6 |
p. 7585-7603 |
artikel |
39 |
REACH: Robust Efficient Authentication for Crowdsensing-based Healthcare
|
Nikooghadam, Mahdi |
|
|
80 |
6 |
p. 8434-8468 |
artikel |
40 |
Research of ReLU output device in ternary optical computer based on parallel fully connected layer
|
Song, Kai |
|
|
80 |
6 |
p. 7269-7292 |
artikel |
41 |
RI-RPL: a new high-quality RPL-based routing protocol using Q-learning algorithm
|
Zahedy, Niloofar |
|
|
80 |
6 |
p. 7691-7749 |
artikel |
42 |
Rumor identification and diffusion impact analysis in real-time text stream using deep learning
|
Singh, Tajinder |
|
|
80 |
6 |
p. 7993-8037 |
artikel |
43 |
ST-YOLOX: a lightweight and accurate object detection network based on Swin Transformer
|
Han, Jingjing |
|
|
80 |
6 |
p. 8038-8059 |
artikel |
44 |
Terahertz video-based hidden object detection using YOLOv5m and mutation-enabled salp swarm algorithm for enhanced accuracy and faster recognition
|
Jayachitra, J. |
|
|
80 |
6 |
p. 8357-8382 |
artikel |
45 |
The use of fuzzy authentication integrated with convolutional neural networks in digital content protection
|
Wang, Junfeng |
|
|
80 |
6 |
p. 7123-7146 |
artikel |
46 |
Three-phases hybrid feature selection for facial expression recognition
|
Sidhom, Ones |
|
|
80 |
6 |
p. 8094-8128 |
artikel |
47 |
Transformer oil leakage detection with sampling-WIoU module
|
Wang, Chenghao |
|
|
80 |
6 |
p. 7349-7368 |
artikel |
48 |
Triple-channel graph attention network for improving aspect-level sentiment analysis
|
Zhu, Chao |
|
|
80 |
6 |
p. 7604-7623 |
artikel |
49 |
Using personalized next session to improve session-based recommender systems
|
Chen, Yen-Liang |
|
|
80 |
6 |
p. 7369-7398 |
artikel |
50 |
Variational auto encoder fused with Gaussian process for unsupervised anomaly detection
|
Guan, Yaonan |
|
|
80 |
6 |
p. 7662-7690 |
artikel |