Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             38 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A characteristic standardization method for circuit input vectors based on Hash algorithm Shi, Ying

13 3 p. 1505-1513
artikel
2 Agent grouping recommendation method in edge computing Jakhon, Kayumiy Shokh

13 3 p. 1641-1651
artikel
3 Aitac: an identity-based traceable anonymous communication model Li, Fengyin

13 3 p. 1353-1362
artikel
4 Analysis of user satisfaction of shared bicycles based on SEM Xia, Xiaomei

13 3 p. 1587-1601
artikel
5 An ant colony optimization algorithm with adaptive greedy strategy to optimize path problems Li, Wei

13 3 p. 1557-1571
artikel
6 An efficient lattice-based linkable ring signature scheme with scalability to multiple layer Ren, Yan

13 3 p. 1547-1556
artikel
7 A new entropic criterion model in rational secure two-party computation Zhang, Xinyu

13 3 p. 1363-1372
artikel
8 An interactive role learning and discovery model for multi-department RBAC building based on attribute exploration Shen, Xiajiong

13 3 p. 1373-1382
artikel
9 Anomaly detection for industrial control operations with optimized ABC–SVM and weighted function code correlation analysis Wan, Ming

13 3 p. 1383-1396
artikel
10 A object detection and tracking method for security in intelligence of unmanned surface vehicles Zhang, Wei

13 3 p. 1279-1291
artikel
11 APP-NTS: a network traffic similarity-based framework for repacked Android apps detection Alshehri, Mohammed

13 3 p. 1537-1546
artikel
12 A secure and efficient privacy-preserving data aggregation algorithm Dou, Hui

13 3 p. 1495-1503
artikel
13 Blind image separation based on attentional generative adversarial network Sun, Xiao

13 3 p. 1397-1404
artikel
14 Community detection based on similarities of communication behavior in IP networks Zhang, Shuzhuang

13 3 p. 1451-1461
artikel
15 Data distribution and secure data transmission using IANFIS and MECC in IoT Pampapathi, B. M.

13 3 p. 1471-1484
artikel
16 Deep anomaly detection in expressway based on edge computing and deep learning Wang, Juan

13 3 p. 1293-1305
artikel
17 Design of recommendation system for tourist spot using sentiment analysis based on CNN-LSTM An, Hyeon-woo

13 3 p. 1653-1663
artikel
18 Dictionary learning based on structural self-similarity and convolution neural network Zhang, Ling

13 3 p. 1463-1470
artikel
19 DSCAE: a denoising sparse convolutional autoencoder defense against adversarial examples Ye, Hongwei

13 3 p. 1419-1429
artikel
20 E-commerce payment model using blockchain Kim, Shee-Ihn

13 3 p. 1673-1685
artikel
21 EdgeCRNN: an edge-computing oriented model of acoustic feature enhancement for keyword spotting Wei, Yungen

13 3 p. 1525-1535
artikel
22 Frequency based tactile rendering method for pin-array tactile devices Kim, Sang-Youn

13 3 p. 1665-1672
artikel
23 GUI-based software modularization through module clustering in edge computing based IoT environments Seo, Yeong-Seok

13 3 p. 1625-1639
artikel
24 Multiple vehicle tracking and classification system with a convolutional neural network Kim, HyungJun

13 3 p. 1603-1614
artikel
25 Multi-scale residual denoising GAN model for producing super-resolution CTA images Li, Pengcheng

13 3 p. 1515-1524
artikel
26 Multi-station test scheduling optimization method for industrial robot servo system Tang, Shaomin

13 3 p. 1321-1337
artikel
27 Network performance analysis from binding number prospect Gao, Wei

13 3 p. 1259-1267
artikel
28 Prediction of mortality of premature neonates using neural network and logistic regression Rezaeian, Aramesh

13 3 p. 1269-1277
artikel
29 Research cooperations of blockchain: toward the view of complexity network Wang, Yanli

13 3 p. 1339-1352
artikel
30 Research on adaptive beacon message transmission power in VANETs Wang, Meng

13 3 p. 1307-1319
artikel
31 Single-channel blind source separation based on attentional generative adversarial network Sun, Xiao

13 3 p. 1443-1450
artikel
32 Special issue on new advanced techniques in security of artificial intelligence Atiquzzaman, Mohammed

13 3 p. 1255-1257
artikel
33 Special issue on user behavior analysis in edge computing based Internet-of-Things Jeong, Young-Sik

13 3 p. 1573-1574
artikel
34 Towards accurate seismic events detection using motion sensors on smartphones Yuan, Zhaohui

13 3 p. 1485-1494
artikel
35 Trust-based secure directed diffusion routing protocol in WSN Yu, Xinying

13 3 p. 1405-1417
artikel
36 Trusted information project platform based on blockchain for sharing strategy Lee, Eunhee

13 3 p. 1575-1585
artikel
37 Verifiable and privacy preserving federated learning without fully trusted centers Han, Gang

13 3 p. 1431-1441
artikel
38 Visualization of knowledge map for monitoring knowledge diagnoses Choi, Jae-Young

13 3 p. 1615-1623
artikel
                             38 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland