nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Accuracy-enhanced E-commerce recommendation based on deep learning and locality-sensitive hashing
|
Li, Dejuan |
|
|
30 |
9 |
p. 7305-7320 |
artikel |
2 |
A high-capacity slicing PBFT protocol based on reputation evaluation model
|
Chen, Pengyu |
|
|
30 |
9 |
p. 7469-7482 |
artikel |
3 |
A machine learning-based analytical intelligence system for forecasting demand of new products based on chlorophyll: a hybrid approach
|
Rodriguez-Aguilar, Roman |
|
|
30 |
9 |
p. 7457-7468 |
artikel |
4 |
An advanced actor critic deep reinforcement learning technique for gamification of WiFi environment
|
Shakya, Vandana |
|
|
30 |
9 |
p. 7239-7256 |
artikel |
5 |
An efficient algorithm for optimal route node sensing in smart tourism Urban traffic based on priority constraints
|
Ding, Xichen |
|
|
30 |
9 |
p. 7189-7206 |
artikel |
6 |
A positioning method based on map and single base station towards 6G networks
|
Wang, Youqing |
|
|
30 |
9 |
p. 7335-7346 |
artikel |
7 |
Bag of tricks for backdoor learning
|
Hou, Ruitao |
|
|
30 |
9 |
p. 7569-7579 |
artikel |
8 |
Beam prediction and tracking mechanism with enhanced LSTM for mmWave aerial base station
|
Zhang, Jinli |
|
|
30 |
9 |
p. 7513-7525 |
artikel |
9 |
Clustering routing algorithm of wireless sensor network based on swarm intelligence
|
Tang, Quan |
|
|
30 |
9 |
p. 7227-7238 |
artikel |
10 |
Computer vision-driven forest wildfire and smoke recognition via IoT drone cameras
|
Wang, Yupeng |
|
|
30 |
9 |
p. 7603-7616 |
artikel |
11 |
Cooperative parking search strategy through V2X communications: an agent-based decision
|
Ameur, Mohamed E. L. Amine |
|
|
30 |
9 |
p. 7167-7188 |
artikel |
12 |
Deep reinforcement learning based computation offloading for xURLLC services with UAV-assisted IoT-based multi-access edge computing system
|
Fatima, Nida |
|
|
30 |
9 |
p. 7275-7291 |
artikel |
13 |
Detection of malicious URLs using machine learning
|
Reyes-Dorta, Nuria |
|
|
30 |
9 |
p. 7543-7560 |
artikel |
14 |
Edge-enabled anomaly detection and information completion for social network knowledge graphs
|
Lu, Fan |
|
|
30 |
9 |
p. 7483-7495 |
artikel |
15 |
Empowered edge intelligent aquaculture with lightweight Kubernetes and GPU-embedded
|
Fathoni, Halim |
|
|
30 |
9 |
p. 7321-7333 |
artikel |
16 |
Energy efficient multi-carrier NOMA and power controlled resource allocation for B5G/6G networks
|
Binzagr, Faisal |
|
|
30 |
9 |
p. 7347-7359 |
artikel |
17 |
Enhancing IOT based software defect prediction in analytical data management using war strategy optimization and Kernel ELM
|
Zada, Islam |
|
|
30 |
9 |
p. 7207-7225 |
artikel |
18 |
Genetically optimized TD3 algorithm for efficient access control in the internet of vehicles
|
Al-Atawi, Abdullah A. |
|
|
30 |
9 |
p. 7581-7601 |
artikel |
19 |
Genetic electro-search optimization for optimum energy consumption in edge computing-based internet of healthcare things
|
Köse, Utku |
|
|
30 |
9 |
p. 7361-7368 |
artikel |
20 |
Impact of neural cyberattacks on a realistic neuronal topology from the primary visual cortex of mice
|
López Madejska, Victoria Magdalena |
|
|
30 |
9 |
p. 7391-7405 |
artikel |
21 |
ImprovedRain removal network clarity and object detection performance in heavy rain images using complementary structure
|
Chen, Chi-Han |
|
|
30 |
9 |
p. 7293-7303 |
artikel |
22 |
Infrared and visible image fusion in a rolling guided filtering framework based on deep feature extraction
|
Cheng, Wei |
|
|
30 |
9 |
p. 7561-7568 |
artikel |
23 |
Malware cyberattacks detection using a novel feature selection method based on a modified whale optimization algorithm
|
Al Ogaili, Riyadh Rahef Nuiaa |
|
|
30 |
9 |
p. 7257-7273 |
artikel |
24 |
MF-Informer for long-term QoS prediction in edge-cloud collaboration environments
|
Wang, Min |
|
|
30 |
9 |
p. 7497-7512 |
artikel |
25 |
Mitigating communications threats in decentralized federated learning through moving target defense
|
Martínez Beltrán, Enrique Tomás |
|
|
30 |
9 |
p. 7407-7421 |
artikel |
26 |
Novel energy consumption and reduces number of transmission attempts (ECRTA) model for heterogeneous wireless muti-hop network
|
Pandi, V. Samuthira |
|
|
30 |
9 |
p. 7445-7455 |
artikel |
27 |
On the use of MiniCPS for conducting rigorous security experiments in Software-Defined Industrial Control Systems
|
Etxezarreta, Xabier |
|
|
30 |
9 |
p. 7377-7390 |
artikel |
28 |
Optimized fuzzy type 1 Mamdani controller to enhance transient stability of AC-power system
|
Reddy, V. Suryanarayana |
|
|
30 |
9 |
p. 7617-7632 |
artikel |
29 |
Packing stretched convex polygons in an optimized rectangle
|
Bennell, Julia |
|
|
30 |
9 |
p. 7369-7376 |
artikel |
30 |
Tiny ML-based reconfigurable IoT platform design for brackish water aquaculture monitoring
|
Sowmiya, V. |
|
|
30 |
9 |
p. 7153-7165 |
artikel |
31 |
Transfer and online learning for IP maliciousness prediction in a concept drift scenario
|
Escudero García, David |
|
|
30 |
9 |
p. 7423-7444 |
artikel |
32 |
Updated exploration of the Tor network: advertising, availability and protocols of onion services
|
Buitrago López, Alejandro |
|
|
30 |
9 |
p. 7527-7541 |
artikel |