


default search action
Information Sciences, Volume 479
Volume 479, April 2019
- Michal Witold Przewozniczek
, Krzysztof Walkowiak
, Arunabha Sen, Marcin Komarnicki
, Piotr Lechowicz:
The transformation of the k-Shortest Steiner trees search problem into binary dynamic problem for effective evolutionary methods application. 1-19 - Yago Diez
, Marta Fort, Matias Korman, Joan Antoni Sellarès:
Group evolution patterns in running races. 20-39 - Zhu Wang, Dong Wang
, Wei Wang:
Distributed dynamic average consensus for nonlinear multi-agent systems in the presence of external disturbances over a directed graph. 40-54 - Jianxing Zheng, Suge Wang, Deyu Li, Bofeng Zhang:
Personalized recommendation based on hierarchical interest overlapping community. 55-75 - Md Mahmudur Rahman
, Chowdhury Farhan Ahmed, Carson Kai-Sang Leung
:
Mining weighted frequent sequences in uncertain databases. 76-100 - Kun Sun
, Wenbing Tao
:
A center-driven image set partition algorithm for efficient structure from motion. 101-115 - Shengmin Xu, Guomin Yang
, Yi Mu
:
Revocable attribute-based encryption with decryption key exposure resistance and ciphertext delegation. 116-134 - Diego García-Gil
, Julián Luengo
, Salvador García
, Francisco Herrera:
Enabling Smart Data: Noise filtering in Big Data classification. 135-152 - Hongyang Yan, Zhe Chen, Chunfu Jia:
SSIR: Secure similarity image retrieval in IoT. 153-163 - Han Liu
, Shyi-Ming Chen, Mihaela Cocea
:
Heuristic target class selection for advancing performance of coverage-based rule learning. 164-179 - Yuchen Pan
, Desheng Wu, Cuicui Luo, Alexandre Dolgui
:
User activity measurement in rating-based online-to-offline (O2O) service recommendation. 180-196 - Yiming Lin
, Hongzhi Wang
, Jianzhong Li, Hong Gao:
Data source selection for information integration in big data era. 197-213 - Emmanuel Sirimal Silva
, Hossein Hassani, Mansi Ghodsi, Zara Ghodsi:
Forecasting with auxiliary information in forecasts using multivariate singular spectrum analysis. 214-230 - Qintai Hu, Zhongmei Han, Xiaofan Lin
, Qionghao Huang
, Xiaomei Zhang:
Learning peer recommendation using attention-driven CNN with interaction tripartite graph. 231-249 - Liangtian He
, Yilun Wang, Zhaoyin Xiang:
Support driven wavelet frame-based image deblurring. 250-269 - Yang Lu, Gang Wang, Jiguo Li
:
Keyword guessing attacks on a public key encryption with keyword search scheme without random oracle and its improvement. 270-276 - Ronald R. Yager, Marek Z. Reformat
, Nhuan D. To:
Drawing on the iPad to input fuzzy sets with an application to linguistic data science. 277-291 - Ya-Li Zhi, Yong He, Min Wu
, Qingping Liu:
New results on dissipativity analysis of singular systems with time-varying delay. 292-300 - Manuel Jiménez
, Isaac Triguero
, Robert I. John:
Handling uncertainty in citizen science data: Towards an improved amateur-based large-scale classification. 301-320 - Parvin Rastegari, Mehdi Berenjkoub, Mohammad Dakhilalian
, Willy Susilo
:
Universal designated verifier signature scheme with non-delegatability in the standard model. 321-334 - Yan Ren
, Wei Guan, Wanquan Liu
, Jianhui Xi, Linlin Zhu:
Facial semantic descriptors based on information granules. 335-354 - Wen-Jun Chang, Chao Fu, Dong-Ling Xu
, Min Xue:
Triangular bounded consistency of fuzzy preference relations. 355-371 - Xixun Yu, Zheng Yan
, Rui Zhang:
Verifiable outsourced computation over encrypted data. 372-385 - Xiujuan Lei
, Yuchen Zhang
:
Predicting disease-genes based on network information loss and protein complexes in heterogeneous network. 386-400 - Jianchao Luo
, Zhiqiang Liu, MengChu Zhou
, Keyi Xing, Xinnian Wang, Xiaoling Li, Huixia Liu:
Robust deadlock control of automated manufacturing systems with multiple unreliable resources. 401-415
- Muhammad Sajjad, Mansoor Nasir, Fath U Min Ullah
, Khan Muhammad
, Arun Kumar Sangaiah
, Sung Wook Baik:
Raspberry Pi assisted facial expression recognition framework for smart security in law-enforcement services. 416-431 - Daming Li, Lianbing Deng, Brij Bhooshan Gupta
, Haoxiang Wang, Chang Choi
:
A novel CNN based security guaranteed image watermarking generation scenario for smart city applications. 432-447 - Ugo Fiore
, Alfredo De Santis
, Francesca Perla
, Paolo Zanetti
, Francesco Palmieri:
Using generative adversarial networks for improving classification effectiveness in credit card fraud detection. 448-455 - Peiyuan Sun, Jianxin Li, Md. Zakirul Alam Bhuiyan
, Lihong Wang, Bo Li:
Modeling and clustering attacker activities in IoT through machine learning techniques. 456-471 - Silvio Barra
, Maria De Marsico, Michele Nappi, Fabio Narducci
, Daniel Riccio
:
A hand-based biometric system in visible light for mobile environments. 472-485 - Xiaobo Ma
, Jianfeng Li, Yajuan Tang, Bo An, Xiaohong Guan:
Protecting internet infrastructure against link flooding attacks: A techno-economic perspective. 486-502 - Lu Zhou, Xin Sun
, Chunhua Su
, Zhe Liu
, Kim-Kwang Raymond Choo
:
Game theoretic security of quantum bit commitment. 503-514 - Qingchen Zhang, Laurence T. Yang
, Arcangelo Castiglione
, Zhikui Chen, Peng Li:
Secure weighted possibilistic c-means algorithm on cloud for clustering big data. 515-525 - Xi Xiao, Rui Li, Haitao Zheng, Runguo Ye, Arun Kumar Sangaiah, Shutao Xia:
Novel dynamic multiple classification system for network traffic. 526-541 - Durgadevi Velusamy
, Pugalendhi GaneshKumar
:
Fuzzy integrated Bayesian Dempster-Shafer theory to defend cross-layer heterogeneity attacks in communication network of Smart Grid. 542-566 - Yang Yang
, Xianghan Zheng
, Wenzhong Guo, Ximeng Liu, Victor Chang
:
Privacy-preserving smart IoT-based healthcare big data storage and self-adaptive access control system. 567-592 - Fei Song, Yu-Tong Zhou, Yu Wang, Tianming Zhao, Ilsun You
, Hongke Zhang:
Smart collaborative distribution for privacy enhancement in moving target defense. 593-606 - Bogdan Mocanu, Florin Pop
, Alexandra Mihaita Mocanu, Ciprian Dobre
, Aniello Castiglione
:
Data fusion technique in SPIDER Peer-to-Peer networks in smart cities for security enhancements. 607-621 - Nadia Nedjah
, Rafael Soares Wyant, Luiza de Macedo Mourelle
, Brij B. Gupta
:
Efficient fingerprint matching on smart cards for high security and privacy in smart systems. 622-639 - Liang Xue, Yong Yu
, Yannan Li
, Man Ho Au, Xiaojiang Du, Bo Yang:
Efficient attribute-based encryption with attribute revocation for assured data deletion. 640-650 - Bo Li, Yanyu Huang
, Zheli Liu, Jin Li, Zhihong Tian, Siu-Ming Yiu:
HybridORAM: Practical oblivious cloud storage with constant bandwidth. 651-663 - Xiaoyu Zhang, Tao Jiang, Kuan-Ching Li
, Aniello Castiglione
, Xiaofeng Chen:
New publicly verifiable computation for batch matrix multiplication. 664-678

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.