default search action
Information Sciences, Volume 546
Volume 546, February 2021
- Farough Ashkouti, Keyhan Khamforoosh, Amir Sheikhahmadi:
DI-Mondrian: Distributed improved Mondrian for satisfaction of the L-diversity privacy model using Apache Spark. 1-24 - Ke Huang, Xiaosong Zhang, Yi Mu, Fatemeh Rezaeibagha, Xiaojiang Du:
Scalable and redactable blockchain with update and anonymity. 25-41 - Bin Bai, Zhiwei Guo, Ce Zhou, Wei Zhang, Junyi Zhang:
Application of adaptive reliability importance sampling-based extended domain PSO on single mode failure in reliability engineering. 42-59 - Federica Cena, Luca Console, Fabiana Vernero:
Logical foundations of knowledge-based recommender systems: A unifying spectrum of alternatives. 60-73 - Joaquín Taverner, Emilio Vivancos, Vicent J. Botti:
A fuzzy appraisal model for affective agents adapted to cultural environments using the pleasure and arousal dimensions. 74-86 - Mohit Kumar, Michael Rossbory, Bernhard Alois Moser, Bernhard Freudenthaler:
An optimal (∊, δ)-differentially private learning of distributed deep fuzzy models. 87-120 - Surendra Nagar, Ankush Jain, Pramod Kumar Singh, Ajay Kumar:
Mixed-noise robust face super-resolution through residual-learning based error suppressed nearest neighbor representation. 121-145 - Fadi Dornaika, Abdullah Baradaaji, Youssof El Traboulsi:
Semi-supervised classification via simultaneous label and discriminant embedding estimation. 146-165 - En Zhang, Ming Li, Siu-Ming Yiu, Jiao Du, Jun-Zhe Zhu, Ganggang Jin:
Fair hierarchical secret sharing scheme based on smart contract. 166-176 - Xiang Gao, Jia Yu, Wenting Shen, Yan Chang, Shibin Zhang, Ming Yang, Bin Wu:
Achieving low-entropy secure cloud data auditing with file and authenticator deduplication. 177-191 - Zhong-Hua Pang, Lan-Zhi Fan, Jian Sun, Kun Liu, Guo-Ping Liu:
Detection of stealthy false data injection attacks against networked control systems via active data modification. 192-205 - Bosheng Song, Xiangxiang Zeng, Alfonso Rodríguez-Patón:
Monodirectional tissue P systems with channel states. 206-219 - Pengxu Li, Panshuo Li, Jing Zhao, Bin Zhang:
Robust gain-scheduling static output-feedback H∞ control of vehicle lateral stability with heuristic approach. 220-233 - Jinling Wang, Jinling Liang, Cheng-Tang Zhang:
Dissipativity analysis and synthesis for positive Roesser systems under the switched mechanism and Takagi-Sugeno fuzzy rules. 234-252 - Chaoyang Li, Yuan Tian, Xiubo Chen, Jian Li:
An efficient anti-quantum lattice-based blind signature for blockchain-enabled systems. 253-264 - Keke Huang, Haofei Wen, Han Liu, Chunhua Yang, Weihua Gui:
A geometry constrained dictionary learning method for industrial process monitoring. 265-282 - Yiping Luo, Xing Xiao, Jinde Cao, Anping Li, Guohan Lin:
Event-triggered guaranteed cost consensus control for second-order multi-agent systems based on observers. 283-297 - Xu Wang, Peng Hu, Liangli Zhen, Dezhong Peng:
DRSL: Deep Relational Similarity Learning for Cross-modal Retrieval. 298-311 - Feng Jin, Jun Zhao, Ying Liu, Wei Wang, Qingshan Xu:
A scheduling approach with uncertainties in generation and consumption for converter gas system in steel industry. 312-328 - Yanan Wang, Jun Wang, Haiying Wang, Ruilin Zhang, Ming Li:
Users' mobility enhances information diffusion in online social networks. 329-348 - Ali Ahrari, Saber M. Elsayed, Ruhul A. Sarker, Daryl Essam, Carlos A. Coello Coello:
Weighted pointwise prediction method for dynamic multiobjective optimization. 349-367 - Lei Chen, Quansen Sun, Fanhai Wang:
Attention-adaptive and deformable convolutional modules for dynamic scene deblurring. 368-377 - Nicolas Gutowski, Tassadit Amghar, Olivier Camp, Fabien Chhel:
Gorthaur-EXP3: Bandit-based selection from a portfolio of recommendation algorithms balancing the accuracy-diversity dilemma. 378-396 - Jiangxiong Fang, Huaxiang Liu, Liting Zhang, Jun Liu, Hesheng Liu:
Region-edge-based active contours driven by hybrid and local fuzzy region-based energy for image segmentation. 397-419 - Suyeon Yoo, Sungjin Kim, Seungjae Kim, Brent ByungHoon Kang:
AI-HydRa: Advanced hybrid approach using random forest and deep learning for malware classification. 420-435 - Yige Xue, Yong Deng, Harish Garg:
Uncertain database retrieval with measure - Based belief function attribute values under intuitionistic fuzzy set. 436-447 - Xiaodong Feng, Sen Wu:
Robust sparse coding via self-paced learning for data representation. 448-468 - Gleb Beliakov:
On the derivatives of set functions in matrix representation. 469-480 - Donghoon Chang, Surabhi Garg, Mohona Ghosh, Munawar Hasan:
BIOFUSE: A framework for multi-biometric fusion on biocryptosystem level. 481-511 - Ying Sun, Derui Ding, Hongli Dong, Hongjian Liu:
Event-based resilient filtering for stochastic nonlinear systems via innovation constraints. 512-525 - Omid Keivani, Kaushik Sinha:
Random projection-based auxiliary information can improve tree-based nearest neighbor search. 526-542 - Weichen Wu, Yitian Xu, Xinying Pang:
A hybrid acceleration strategy for nonparallel support vector machine. 543-558 - Feng Wang, Jinhua She, Yasuhiro Ohyama, Wenjun Jiang, Geyong Min, Guojun Wang, Min Wu:
Maximizing positive influence in competitive social networks: A trust-based solution. 559-572 - Xiaowu Mu, Xin Li, Jianyin Fang, Xihui Wu:
Reliable observer-based finite-time H∞ control for networked nonlinear semi-Markovian jump systems with actuator fault and parameter uncertainties via dynamic event-triggered scheme. 573-595 - Xiaohui Kuang, Xianfeng Gao, Lianfang Wang, Gang Zhao, Lishan Ke, Quanxin Zhang:
A discrete cosine transform-based query efficient attack on black-box object detectors. 596-607 - Boshan Shi, Jiuzhen Liang, Lan Di, Chen Chen, Zhenjie Hou:
Fabric defect detection via low-rank decomposition with gradient information and structured graph algorithm. 608-626 - Feng Sun, Xiao-Bing Qu:
A common characterization for migrative uni-nullnorms. 627-632 - Weijie Han, Jingfeng Xue, Yong Wang, Fuquan Zhang, Xianwei Gao:
APTMalInsight: Identify and cognize APT malware based on system call information and ontology knowledge framework. 633-664 - Pawel B. Myszkowski, Maciej Laszczyk:
Diversity based selection for many-objective evolutionary optimisation problems with constraints. 665-700 - Roberto Corizzo, Michelangelo Ceci, Hadi Fanaee-T, João Gama:
Multi-aspect renewable energy forecasting. 701-722 - Yapei Gu, Xiang Yu, Kexin Guo, Jianzhong Qiao, Lei Guo:
Detection, estimation, and compensation of false data injection attack for UAVs. 723-741 - Yumei Sun, Lei Zhang:
Fixed-time adaptive fuzzy control for uncertain strict feedback switched systems. 742-752 - Dan Liu, Dan Ye:
Observer-based synchronization control for complex networks against asynchronous attacks. 753-768 - Zheng Hui, Jie Li, Xinbo Gao, Xiumei Wang:
Progressive perception-oriented network for single image super-resolution. 769-786 - Dazhi Jiang, Geng Tu, Donghui Jin, Kaichao Wu, Cheng Liu, Lin Zheng, Teng Zhou:
A hybrid intelligent model for acute hypotensive episode prediction with large-scale data. 787-802 - Wenqiang Xu, Liangxiao Jiang, Chaoqun Li:
Improving data and model quality in crowdsourcing using cross-entropy-based noise correction. 803-814 - Fei Zou, Gary G. Yen, Lixin Tang, Chunfeng Wang:
A reinforcement learning approach for dynamic multi-objective optimization. 815-834 - Yuzhu Ji, Haijun Zhang, Zhao Zhang, Ming Liu:
CNN-based encoder-decoder networks for salient object detection: A comprehensive review and recent advances. 835-857 - Yuanshu Zhang, Yong Ma, Xiaobing Dai, Hao Li, Xiaoguang Mei, Jiayi Ma:
Locality-constrained sparse representation for hyperspectral image classification. 858-870 - Weiwei Xu, Heng Zhang, Xianghui Cao, Ruilong Deng, Hongran Li, Jian Zhang:
Securing wireless relaying communication for dual unmanned aerial vehicles with unknown eavesdropper. 871-882 - Xin Bi, Chao Zhang, Yao He, Xiangguo Zhao, Yongjiao Sun, Yuliang Ma:
Explainable time-frequency convolutional neural network for microseismic waveform classification. 883-896 - Liang Zhao, Xingfeng Wang, Xinyi Huang:
Verifiable single-server private information retrieval from LWE with binary errors. 897-923 - Peng Wang, Tao Xiang, Xiaoguo Li, Hong Xiang:
Access control encryption without sanitizers for Internet of Energy. 924-942 - Hong Lin, James Lam, Zheng Wang:
Secure state estimation for systems under mixed cyber-attacks: Security and performance analysis. 943-960 - Dan Jiang, Rongbin Xu, Xin Xu, Ying Xie:
Multi-view feature transfer for click-through rate prediction. 961-976 - Wilson Calmon, Mariana Albi:
Estimating the number of clusters in a ranking data context. 977-995 - Sathishkumar Moorthy, Young Hoon Joo:
Multi-expert visual tracking using hierarchical convolutional feature fusion via contextual information. 996-1013 - Jianjun Qian, Shumin Zhu, Wai Keung Wong, Hengmin Zhang, Zhihui Lai, Jian Yang:
Dual robust regression for pattern classification. 1014-1029 - Chunliang Zhao, Yuren Zhou, Zefeng Chen:
Decomposition-based evolutionary algorithm with automatic estimation to handle many-objective optimization problem. 1030-1046 - Ling Chen, Heqing Huang, Donghui Chen:
Join cardinality estimation by combining operator-level deep neural networks. 1047-1062 - Zhongyun Hua, Zhihua Zhu, Shuang Yi, Zheng Zhang, Hejiao Huang:
Cross-plane colour image encryption using a two-dimensional logistic tent modular map. 1063-1083 - Zhen Duan, Xian Sun, Shu Zhao, Jie Chen, Yanping Zhang, Jie Tang:
Hierarchical community structure preserving approach for network embedding. 1084-1096 - Alon Bartal, Gilad Ravid:
Analyzing a large and unobtainable relationship graph using a streaming activity graph. 1097-1112 - Meifan Zhang, Hongzhi Wang:
LAQP: Learning-based approximate query processing. 1113-1134 - Jiandong Zhou, Qingpeng Zhang, Xiang Li:
Fuzzy factorization machine. 1135-1147 - Rui Wang, Wubin Ma, Mao Tan, Guohua Wu, Ling Wang, Dunwei Gong, Jian Xiong:
Preference-inspired coevolutionary algorithm with active diversity strategy for multi-objective multi-modal optimization. 1148-1165 - Min Gao, Junwei Zhang, Junliang Yu, Jundong Li, Junhao Wen, Qingyu Xiong:
Recommender systems based on generative adversarial networks: A problem-driven perspective. 1166-1185 - Zhenjun Ming, Anand Balu Nellippallil, Guoxin Wang, Yan Yan, Janet K. Allen, Farrokh Mistree:
A performance based method for information acquisition in engineering design under multi-parameter uncertainty. 1186-1207 - Chien-Ming Chen, Lili Chen, Wensheng Gan, Lina Qiu, Weiping Ding:
Discovering high utility-occupancy patterns from uncertain data. 1208-1229 - Kunming Zheng, Qiuju Zhang, Youmin Hu, Bo Wu:
Design of fuzzy system-fuzzy neural network-backstepping control for complex robot system. 1230-1255 - Ling Zheng, Fei Chao, Neil Mac Parthaláin, Defu Zhang, Qiang Shen:
Feature grouping and selection: A graph-based approach. 1256-1272 - Antonio Caliò, Andrea Tagarelli:
Attribute based diversification of seeds for targeted influence maximization. 1273-1305 - Sun Geol Baek, Sungkil Lee, Young Ik Eom:
Efficient single-pair all-shortest-path query processing for massive dynamic networks. 1306-1327
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.