nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A Blind and Robust Image Watermarking Algorithm in the Spatial Domain using Two-level Partition
|
Li, Liangjia |
|
|
29 |
5 |
p. 1705-1718 |
artikel |
2 |
An Algorithm of Image Encryption based on AES & Rossler Hyperchaotic Modeling
|
Yi, Guohong |
|
|
29 |
5 |
p. 1451-1459 |
artikel |
3 |
An Effective Transformation-Encoding-Attention Framework for Multivariate Time Series Anomaly Detection in IoT Environment
|
Zhang, Rui |
|
|
29 |
5 |
p. 1551-1563 |
artikel |
4 |
Application of Visual Communication in Image Enhancement and Optimization of Human–Computer Interface
|
Ma, Kexiang |
|
|
29 |
5 |
p. 1460-1466 |
artikel |
5 |
A Stacked Ensemble Approach to Generalize the Classifier Prediction for the Detection of DDoS Attack in Cloud Network
|
Verma, Priyanka |
|
|
29 |
5 |
p. 1618-1632 |
artikel |
6 |
A Stochastic Performance Model and Mobility Analysis in the Integrated Cloud-Fog-Edge Computing System
|
Kırsal, Yönal |
|
|
29 |
5 |
p. 1529-1550 |
artikel |
7 |
A Task Offloading Algorithm using Multi-Objective Optimization under Hybrid Mode in Mobile Edge Computing
|
Hou, Haole |
|
|
29 |
5 |
p. 1577-1593 |
artikel |
8 |
Cloud-Edge Intelligence Collaborative Computing: Software, Communication and Human
|
Gao, Honghao |
|
|
29 |
5 |
p. 1526-1528 |
artikel |
9 |
Cloud-Edge Multi-Service Data Offloading Optimization for New Type Distribution Grid
|
Li, Lisheng |
|
|
29 |
5 |
p. 1424-1432 |
artikel |
10 |
Data Privacy Protection Model Based on Graph Convolutional Neural Network
|
Gu, Tao |
|
|
29 |
5 |
p. 1433-1440 |
artikel |
11 |
Deep Learning and Dempster-Shafer Theory Based Insider Threat Detection
|
Tian, Zhihong |
|
|
29 |
5 |
p. 1680-1689 |
artikel |
12 |
Document Vector Representation with Enhanced Features Based on Doc2VecC
|
Gang, Li |
|
|
29 |
5 |
p. 1406-1415 |
artikel |
13 |
Dynamic System Reconfiguration in Stable and Green Edge Service Provisioning
|
Xiang, Zhengzhe |
|
|
29 |
5 |
p. 1663-1679 |
artikel |
14 |
Editorial: Heterogeneous High Performance Computing for Intelligent Data Analysis
|
Zheng, Zhigao |
|
|
29 |
5 |
p. 1403-1405 |
artikel |
15 |
Energy-Efficient joint Resource Allocation and Computation Offloading in NOMA-enabled Vehicular Fog Computing
|
Lin, Zhijian |
|
|
29 |
5 |
p. 1564-1576 |
artikel |
16 |
Enhancing Energy Efficiency in IoT Networks Through Fuzzy Clustering and Optimization
|
Javadpour, Amir |
|
|
29 |
5 |
p. 1594-1617 |
artikel |
17 |
Enhancing Security of Medical Images Using Deep Learning, Chaotic Map, and Hash Table
|
Kumar, Piyush |
|
|
29 |
5 |
p. 1489-1503 |
artikel |
18 |
Few-Shot Malware Classification via Attention-Based Transductive Learning Network
|
Deng, Liting |
|
|
29 |
5 |
p. 1690-1704 |
artikel |
19 |
5G Edge Intelligence-based Refined Power Distribution Monitoring Technology and Application
|
Wen, Kehuan |
|
|
29 |
5 |
p. 1441-1450 |
artikel |
20 |
Intrusion Detection Method Based on Denoising Diffusion Probabilistic Models for UAV Networks
|
Wang, Yingshu |
|
|
29 |
5 |
p. 1467-1476 |
artikel |
21 |
Multichannel Pipelined Scheduling for Raw Data Convergecast in Sensor-Cloud
|
Sen, Biplab Kanti |
|
|
29 |
5 |
p. 1646-1662 |
artikel |
22 |
Parallel Implementation of Key Algorithms for Intelligent Processing of Graphic Signal Data of Consumer Digital Equipment
|
Huang, Changbing |
|
|
29 |
5 |
p. 1416-1423 |
artikel |
23 |
PPFL-IDS: Privacy-Preserving Federated Learning Based IDS Against Poisoning Attacks
|
Xu, Mengfan |
|
|
29 |
5 |
p. 1514-1525 |
artikel |
24 |
Risk Assessment Method of IoT Host Based on Attack Graph
|
Yang, Hongyu |
|
|
29 |
5 |
p. 1504-1513 |
artikel |
25 |
SEA: Secure and Efficient Public Auditing for Edge-Assisted IoT Aggregated Data Sharing
|
Liu, Mingxi |
|
|
29 |
5 |
p. 1477-1488 |
artikel |
26 |
ZTMP: Zero Touch Management Provisioning Algorithm for the On-boarding of Cloud-native Virtual Network Functions
|
Arulappan, Arunkumar |
|
|
29 |
5 |
p. 1633-1645 |
artikel |