nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A Deep Neural Network Combined with Radial Basis Function for Abnormality Classification
|
Jafarpisheh, Noushin |
|
|
26 |
6 |
p. 2318-2328 |
artikel |
2 |
A Fine-Grained Attribute Based Data Retrieval with Proxy Re-Encryption Scheme for Data Outsourcing Systems
|
Hong, Hanshu |
|
|
26 |
6 |
p. 2509-2514 |
artikel |
3 |
A Multi-modal Data Platform for Diagnosis and Prediction of Alzheimer’s Disease Using Machine Learning Methods
|
Pang, Zhen |
|
|
26 |
6 |
p. 2341-2352 |
artikel |
4 |
A Novel Visual Medical Image Encryption for Secure Transmission of Authenticated Watermarked Medical Images
|
Priya, S. |
|
|
26 |
6 |
p. 2501-2508 |
artikel |
5 |
Artificial Intelligence in Collaborative Computing
|
Wang, Xinheng |
|
|
26 |
6 |
p. 2389-2391 |
artikel |
6 |
A Survey of Android Mobile Phone Authentication Schemes
|
Kunda, Douglas |
|
|
26 |
6 |
p. 2558-2566 |
artikel |
7 |
A Survey On Log Research Of AIOps: Methods and Trends
|
Zhaoxue, Jiang |
|
|
26 |
6 |
p. 2353-2364 |
artikel |
8 |
Deep Learning Based Customer Preferences Analysis in Industry 4.0 Environment
|
Sun, Qindong |
|
|
26 |
6 |
p. 2329-2340 |
artikel |
9 |
Edge Network Routing Protocol Base on Target Tracking Scenario
|
Zhang, Zhongyi |
|
|
26 |
6 |
p. 2230-2241 |
artikel |
10 |
Edge User Allocation in Overlap Areas for Mobile Edge Computing
|
Liu, Fangzheng |
|
|
26 |
6 |
p. 2423-2433 |
artikel |
11 |
Editorial: Deep Learning for Big Data Analytics
|
Wu, Yulei |
|
|
26 |
6 |
p. 2315-2317 |
artikel |
12 |
Fast Blind Deblurring of QR Code Images Based on Adaptive Scale Control
|
Chen, Rongjun |
|
|
26 |
6 |
p. 2472-2487 |
artikel |
13 |
Fine-grained Trust-based Routing Algorithm for Wireless Sensor Networks
|
Gong, Liangyi |
|
|
26 |
6 |
p. 2515-2524 |
artikel |
14 |
Formal analysis and automated validation of privacy-preserving AICE protocol in mobile edge computing
|
Yin, Jiaqi |
|
|
26 |
6 |
p. 2258-2271 |
artikel |
15 |
Fuzzy Logic with Expert Judgment to Implement an Adaptive Risk-Based Access Control Model for IoT
|
Atlam, Hany F. |
|
|
26 |
6 |
p. 2545-2557 |
artikel |
16 |
Mapping the Evolution of Intellectual Structure in Information Management Using Author Co-citation Analysis
|
González-Valiente, Carlos Luis |
|
|
26 |
6 |
p. 2374-2388 |
artikel |
17 |
New Engineering Method for the Risk Assessment: Case Study Signal Jamming of the M-Health Networks
|
Karoui, Kamel |
|
|
26 |
6 |
p. 2525-2544 |
artikel |
18 |
Point-of-Interest Recommendation with User’s Privacy Preserving in an IoT Environment
|
Zhang, Guoming |
|
|
26 |
6 |
p. 2445-2460 |
artikel |
19 |
Privacy in Cross-User Data Deduplication
|
Jannati, Hoda |
|
|
26 |
6 |
p. 2567-2579 |
artikel |
20 |
PR-RCUC: A POI Recommendation Model Using Region-Based Collaborative Filtering and User-Based Mobile Context
|
Zeng, Jun |
|
|
26 |
6 |
p. 2434-2444 |
artikel |
21 |
Runtime Verification of Spatio-Temporal Specification Language
|
Li, Tengfei |
|
|
26 |
6 |
p. 2392-2406 |
artikel |
22 |
SDTIOA: Modeling the Timed Privacy Requirements of IoT Service Composition: A User Interaction Perspective for Automatic Transformation from BPEL to Timed Automata
|
Gao, Honghao |
|
|
26 |
6 |
p. 2272-2297 |
artikel |
23 |
Secure and Usable Handshake Based Pairing for Wrist-Worn Smart Devices on Different Users
|
Zhao, Guichuan |
|
|
26 |
6 |
p. 2407-2422 |
artikel |
24 |
Security and Privacy in New Computing Environments (SPNCE 2016)
|
Li, Jin |
|
|
26 |
6 |
p. 2488-2489 |
artikel |
25 |
Self-Organised Collision-Free Flocking Mechanism in Heterogeneous Robot Swarms
|
Ban, Zhe |
|
|
26 |
6 |
p. 2461-2471 |
artikel |
26 |
Special Issue on Deep Learning in Mobile and Wireless Networks: Algorithms, Models and Techniques
|
Xu, Yueshen |
|
|
26 |
6 |
p. 2217-2218 |
artikel |
27 |
TA-BiLSTM: An Interpretable Topic-Aware Model for Misleading Information Detection in Mobile Social Networks
|
Chang, Shuyu |
|
|
26 |
6 |
p. 2298-2314 |
artikel |
28 |
Tiny FCOS: a Lightweight Anchor-Free Object Detection Algorithm for Mobile Scenarios
|
Xu, Xiaolong |
|
|
26 |
6 |
p. 2219-2229 |
artikel |
29 |
Tolerance-Oriented Wi-Fi Advertisement Scheduling: A Near Optimal Study on Accumulative User Interests
|
Xu, Wanru |
|
|
26 |
6 |
p. 2242-2257 |
artikel |
30 |
TORM: Tunicate Swarm Algorithm-based Optimized Routing Mechanism in IoT-based Framework
|
Dogra, Roopali |
|
|
26 |
6 |
p. 2365-2373 |
artikel |
31 |
Verifiable Public-Key Encryption with Keyword Search Secure against Continual Memory Attacks
|
Hu, Chengyu |
|
|
26 |
6 |
p. 2490-2500 |
artikel |