nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A characteristic standardization method for circuit input vectors based on Hash algorithm
|
Shi, Ying |
|
|
13 |
3 |
p. 1505-1513 |
artikel |
2 |
Agent grouping recommendation method in edge computing
|
Jakhon, Kayumiy Shokh |
|
|
13 |
3 |
p. 1641-1651 |
artikel |
3 |
Aitac: an identity-based traceable anonymous communication model
|
Li, Fengyin |
|
|
13 |
3 |
p. 1353-1362 |
artikel |
4 |
Analysis of user satisfaction of shared bicycles based on SEM
|
Xia, Xiaomei |
|
|
13 |
3 |
p. 1587-1601 |
artikel |
5 |
An ant colony optimization algorithm with adaptive greedy strategy to optimize path problems
|
Li, Wei |
|
|
13 |
3 |
p. 1557-1571 |
artikel |
6 |
An efficient lattice-based linkable ring signature scheme with scalability to multiple layer
|
Ren, Yan |
|
|
13 |
3 |
p. 1547-1556 |
artikel |
7 |
A new entropic criterion model in rational secure two-party computation
|
Zhang, Xinyu |
|
|
13 |
3 |
p. 1363-1372 |
artikel |
8 |
An interactive role learning and discovery model for multi-department RBAC building based on attribute exploration
|
Shen, Xiajiong |
|
|
13 |
3 |
p. 1373-1382 |
artikel |
9 |
Anomaly detection for industrial control operations with optimized ABC–SVM and weighted function code correlation analysis
|
Wan, Ming |
|
|
13 |
3 |
p. 1383-1396 |
artikel |
10 |
A object detection and tracking method for security in intelligence of unmanned surface vehicles
|
Zhang, Wei |
|
|
13 |
3 |
p. 1279-1291 |
artikel |
11 |
APP-NTS: a network traffic similarity-based framework for repacked Android apps detection
|
Alshehri, Mohammed |
|
|
13 |
3 |
p. 1537-1546 |
artikel |
12 |
A secure and efficient privacy-preserving data aggregation algorithm
|
Dou, Hui |
|
|
13 |
3 |
p. 1495-1503 |
artikel |
13 |
Blind image separation based on attentional generative adversarial network
|
Sun, Xiao |
|
|
13 |
3 |
p. 1397-1404 |
artikel |
14 |
Community detection based on similarities of communication behavior in IP networks
|
Zhang, Shuzhuang |
|
|
13 |
3 |
p. 1451-1461 |
artikel |
15 |
Data distribution and secure data transmission using IANFIS and MECC in IoT
|
Pampapathi, B. M. |
|
|
13 |
3 |
p. 1471-1484 |
artikel |
16 |
Deep anomaly detection in expressway based on edge computing and deep learning
|
Wang, Juan |
|
|
13 |
3 |
p. 1293-1305 |
artikel |
17 |
Design of recommendation system for tourist spot using sentiment analysis based on CNN-LSTM
|
An, Hyeon-woo |
|
|
13 |
3 |
p. 1653-1663 |
artikel |
18 |
Dictionary learning based on structural self-similarity and convolution neural network
|
Zhang, Ling |
|
|
13 |
3 |
p. 1463-1470 |
artikel |
19 |
DSCAE: a denoising sparse convolutional autoencoder defense against adversarial examples
|
Ye, Hongwei |
|
|
13 |
3 |
p. 1419-1429 |
artikel |
20 |
E-commerce payment model using blockchain
|
Kim, Shee-Ihn |
|
|
13 |
3 |
p. 1673-1685 |
artikel |
21 |
EdgeCRNN: an edge-computing oriented model of acoustic feature enhancement for keyword spotting
|
Wei, Yungen |
|
|
13 |
3 |
p. 1525-1535 |
artikel |
22 |
Frequency based tactile rendering method for pin-array tactile devices
|
Kim, Sang-Youn |
|
|
13 |
3 |
p. 1665-1672 |
artikel |
23 |
GUI-based software modularization through module clustering in edge computing based IoT environments
|
Seo, Yeong-Seok |
|
|
13 |
3 |
p. 1625-1639 |
artikel |
24 |
Multiple vehicle tracking and classification system with a convolutional neural network
|
Kim, HyungJun |
|
|
13 |
3 |
p. 1603-1614 |
artikel |
25 |
Multi-scale residual denoising GAN model for producing super-resolution CTA images
|
Li, Pengcheng |
|
|
13 |
3 |
p. 1515-1524 |
artikel |
26 |
Multi-station test scheduling optimization method for industrial robot servo system
|
Tang, Shaomin |
|
|
13 |
3 |
p. 1321-1337 |
artikel |
27 |
Network performance analysis from binding number prospect
|
Gao, Wei |
|
|
13 |
3 |
p. 1259-1267 |
artikel |
28 |
Prediction of mortality of premature neonates using neural network and logistic regression
|
Rezaeian, Aramesh |
|
|
13 |
3 |
p. 1269-1277 |
artikel |
29 |
Research cooperations of blockchain: toward the view of complexity network
|
Wang, Yanli |
|
|
13 |
3 |
p. 1339-1352 |
artikel |
30 |
Research on adaptive beacon message transmission power in VANETs
|
Wang, Meng |
|
|
13 |
3 |
p. 1307-1319 |
artikel |
31 |
Single-channel blind source separation based on attentional generative adversarial network
|
Sun, Xiao |
|
|
13 |
3 |
p. 1443-1450 |
artikel |
32 |
Special issue on new advanced techniques in security of artificial intelligence
|
Atiquzzaman, Mohammed |
|
|
13 |
3 |
p. 1255-1257 |
artikel |
33 |
Special issue on user behavior analysis in edge computing based Internet-of-Things
|
Jeong, Young-Sik |
|
|
13 |
3 |
p. 1573-1574 |
artikel |
34 |
Towards accurate seismic events detection using motion sensors on smartphones
|
Yuan, Zhaohui |
|
|
13 |
3 |
p. 1485-1494 |
artikel |
35 |
Trust-based secure directed diffusion routing protocol in WSN
|
Yu, Xinying |
|
|
13 |
3 |
p. 1405-1417 |
artikel |
36 |
Trusted information project platform based on blockchain for sharing strategy
|
Lee, Eunhee |
|
|
13 |
3 |
p. 1575-1585 |
artikel |
37 |
Verifiable and privacy preserving federated learning without fully trusted centers
|
Han, Gang |
|
|
13 |
3 |
p. 1431-1441 |
artikel |
38 |
Visualization of knowledge map for monitoring knowledge diagnoses
|
Choi, Jae-Young |
|
|
13 |
3 |
p. 1615-1623 |
artikel |