nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Android malware adversarial attacks based on feature importance prediction
|
Guo, Yanping |
|
|
14 |
6 |
p. 2087-2097 |
artikel |
2 |
A novel framework based on the multi-label classification for dynamic selection of classifiers
|
Elmi, Javad |
|
|
14 |
6 |
p. 2137-2154 |
artikel |
3 |
Context-sensitive graph representation learning
|
Qin, Jisheng |
|
|
14 |
6 |
p. 2193-2203 |
artikel |
4 |
Conv-PVT: a fusion architecture of convolution and pyramid vision transformer
|
Zhang, Xin |
|
|
14 |
6 |
p. 2127-2136 |
artikel |
5 |
Correction to: robust two-phase registration method for three-dimensional point set under the bayesian mixture framework
|
Yang, Lijuan |
|
|
14 |
6 |
p. 2287-2288 |
artikel |
6 |
Enhanced feature Fusion structure of YOLO v5 for detecting small defects on metal surfaces
|
Zhu, Xingfei |
|
|
14 |
6 |
p. 2041-2051 |
artikel |
7 |
GCN recommendation model based on the fusion of dynamic multiple-view latent interest topics
|
Liu, Feng |
|
|
14 |
6 |
p. 2023-2039 |
artikel |
8 |
Global-local information based oversampling for multi-class imbalanced data
|
Han, Mingming |
|
|
14 |
6 |
p. 2071-2086 |
artikel |
9 |
Image blending-based noise synthesis and attention-guided network for single image marine snow denoising
|
Zhao, Zeyu |
|
|
14 |
6 |
p. 2205-2219 |
artikel |
10 |
Incremental approaches for optimal scale selection in dynamic multi-scale set-valued decision tables
|
Huang, Yuandong |
|
|
14 |
6 |
p. 2251-2270 |
artikel |
11 |
Method for three-way decisions using similarity in incomplete information systems
|
Tu, Jing |
|
|
14 |
6 |
p. 2053-2070 |
artikel |
12 |
Multilayer discriminative extreme learning machine for classification
|
Lai, Jie |
|
|
14 |
6 |
p. 2111-2125 |
artikel |
13 |
Multiview nonnegative matrix factorization with dual HSIC constraints for clustering
|
Wang, Sheng |
|
|
14 |
6 |
p. 2007-2022 |
artikel |
14 |
On development of multimodal named entity recognition using part-of-speech and mixture of experts
|
Chen, Jianying |
|
|
14 |
6 |
p. 2181-2192 |
artikel |
15 |
Progressive image dehazing network based on dual feature extraction modules
|
Yang, Yong |
|
|
14 |
6 |
p. 2169-2180 |
artikel |
16 |
Pyramid feature boosted network for single image dehazing
|
Hu, Guangrui |
|
|
14 |
6 |
p. 2099-2110 |
artikel |
17 |
Robust non-negative supervised low-rank discriminant embedding (NSLRDE) for feature extraction
|
Wan, Minghua |
|
|
14 |
6 |
p. 2155-2168 |
artikel |
18 |
Robust two-phase registration method for three-dimensional point set under the Bayesian mixture framework
|
Yang, Lijuan |
|
|
14 |
6 |
p. 2271-2285 |
artikel |
19 |
Social activity matching with graph neural network in event-based social networks
|
Sun, Bingyi |
|
|
14 |
6 |
p. 1989-2005 |
artikel |
20 |
Software defect prediction ensemble learning algorithm based on adaptive variable sparrow search algorithm
|
Tang, Yu |
|
|
14 |
6 |
p. 1967-1987 |
artikel |
21 |
Training fuzzy deep neural network with honey badger algorithm for intrusion detection in cloud environment
|
Jain, Deepak Kumar |
|
|
14 |
6 |
p. 2221-2237 |
artikel |
22 |
Twin attentive deep reinforcement learning for multi-agent defensive convoy
|
Fan, Dongyu |
|
|
14 |
6 |
p. 2239-2250 |
artikel |