default search action
Future Generation Computer Systems, Volume 125
Volume 125, December 2021
- Ying Li, Binbin Fan, Weiping Zhang, Zhiqiang Jiang:
TireNet: A high recall rate method for practical application of tire defect type classification. 1-9 - Jose Carlos Romero, Angeles G. Navarro, Antonio Vilches, Andrés Rodríguez, Francisco Corbera, Rafael Asenjo:
Efficient heterogeneous matrix profile on a CPU + High Performance FPGA with integrated HBM. 10-23
- Sumin Li, Xiuqin Pan:
A computational drug repositioning model based on hybrid similarity side information powered graph neural network. 24-31
- Peng Xu, Ruijie Sun, Wei Wang, Tianyang Chen, Yubo Zheng, Hai Jin:
SDD: A trusted display of FIDO2 transaction confirmation without trusted execution environment. 32-40
- Aaisha Makkar, Neeraj Kumar:
PROTECTOR: An optimized deep learning-based framework for image spam detection and prevention. 41-58
- Lingqiang Kong:
A study on the AI-based online triage model for hospitals in sustainable smart city. 59-70
- Diana Laura Aguilar, Octavio Loyola-González, Miguel Angel Medina-Pérez, Leonardo Cañete-Sifuentes, Kim-Kwang Raymond Choo:
PBC4occ: A novel contrast pattern-based classifier for one-class classification. 71-90
- Haibo Liang, Haifeng Chen, Jialing Zou, Jing Bai:
Technical research on realizing remote intelligent diagnosis of petroleum drilling loss circulation under smart city strategy. 91-99 - Xu Zhu:
Complex event detection for commodity distribution Internet of Things model incorporating radio frequency identification and Wireless Sensor Network. 100-111
- Yifei Zhang, Senlin Luo, Limin Pan, Hanqing Zhang:
Syscall-BSEM: Behavioral semantics enhancement method of system call sequence for high accurate and robust host intrusion detection. 112-126 - Jiachen Yang, Shuai Xiao, Aiyun Li, Guipeng Lan, Huihui Wang:
Detecting fake images by identifying potential texture difference. 127-135 - Zhi-bin Huang, Guang-Tao Fu, Tian-Hao Fa, Dan-Yang Dong, Peng Bai, Xiao Chen:
High performance ant colony system based on GPU warp specialization with a static-dynamic balanced candidate set strategy. 136-150 - Su Hu, Hua Yin:
Research on the optimum synchronous network search data extraction based on swarm intelligence algorithm. 151-155 - Matheus P. Novaes, Luiz Fernando Carvalho, Jaime Lloret, Mario Lemes Proença Jr.:
Adversarial Deep Learning approach detection and defense against DDoS attacks in SDN environments. 156-167 - Shubham Gupta, Balu L. Parne, Narendra S. Chaudhari:
ISAG: IoT-enabled and Secrecy Aware Group-based handover scheme for e-health services in M2M communication network. 168-187 - Bai Ning, Liu Na:
Deep Spatial/temporal-level feature engineering for Tennis-based action recognition. 188-193
- Shaoqiang Wang, Zhenzhen Wu, Gewen He, Shudong Wang, Hongwei Sun, Fangfang Fan:
Semi-supervised classification-aware cross-modal deep adversarial data augmentation. 194-205
- Zhongjin Li, Victor Chang, Haiyang Hu, Maozhong Fu, Jidong Ge, Francesco Piccialli:
Optimizing makespan and resource utilization for multi-DNN training in GPU cluster. 206-220 - Rekha Goyat, Gulshan Kumar, Mamoun Alazab, Rahul Saha, Reji Thomas, Mritunjay Kumar Rai:
A secure localization scheme based on trust assessment for WSNs using blockchain technology. 221-231 - José Paredes, Gerardo I. Simari, Maria Vanina Martinez, Marcelo A. Falappa:
Detecting malicious behavior in social platforms via hybrid knowledge- and data-driven systems. 232-246
- Chengyi Qu, Prasad Calyam, Jeromy Yu, Aditya Vandanapu, Osunkoya Opeoluwa, Ke Gao, Songjie Wang, Raymond L. Chastain, Kannappan Palaniappan:
DroneCOCoNet: Learning-based edge computation offloading and control networking for drone video analytics. 247-262
- Patricia López Martínez, Ricardo Dintén, José María Drake, Marta E. Zorrilla:
A big data-centric architecture metamodel for Industry 4.0. 263-284 - Haiyang Yu, Zhen Yang, Muhammad Waqas, Shanshan Tu, Zhu Han, Zahid Halim, Richard O. Sinnott, Udaya Parampalli:
Efficient dynamic multi-replica auditing for the cloud with geographic location. 285-298 - Matteo Francia, Enrico Gallinucci, Matteo Golfarelli, Anna Giulia Leoni, Stefano Rizzi, Nicola Santolini:
Making data platforms smarter with MOSES. 299-313 - Abdul Basit Darem, Jemal H. Abawajy, Aaisha Makkar, Asma Alhashmi, Sultan Munadi Alanazi:
Visualization and deep-learning-based malware variant detection using OpCode-level features. 314-323 - Zhenyan Ji, Mengdan Wu, Hong Yang, José Enrique Armendáriz-Iñigo:
Temporal sensitive heterogeneous graph neural network for news recommendation. 324-333 - Sudhakar, Sushil Kumar:
MCFT-CNN: Malware classification with fine-tune convolution neural networks using traditional and transfer learning in Internet of Things. 334-351
- Yi Zheng, Youqiang Wang, Jixin Liu:
Analysis and experimental research on stability characteristics of squatting posture of wearable lower limb exoskeleton robot. 352-363
- Xiaoming Li, Guangquan Xu, Changzheng Liu, Wei Yu, Zhao Liu, Zhenhuan Wu, Xiaoping Yang:
Higher-Order Multiple-Feature-based Community Evolution Model with Potential Applications in Criminal Network Investigation. 364-375
- Guan Wang, Jiali Yin, M. Shamim Hossain, Ghulam Muhammad:
Incentive mechanism for collaborative distributed learning in Artificial Intelligence of Things. 376-384
- Yachao Yuan, Yali Yuan, Thar Baker, Lutz Maria Kolbe, Dieter Hogrefe:
FedRD: Privacy-preserving adaptive Federated learning framework for intelligent hazardous Road Damage detection and warning. 385-398
- Elyazid Akachar, Brahim Ouhbi, Bouchra Frikh:
ACSIMCD: A 2-phase framework for detecting meaningful communities in dynamic social networks. 399-420
- Gyeong Ho Lee, Jaeseob Han, Jun Kyun Choi:
MPdist-based missing data imputation for supporting big data analyses in IoT-based applications. 421-432 - Devrim Unal, Abdulla K. Al-Ali, Ferhat Özgür Çatak, Mohammad Hammoudeh:
A secure and efficient Internet of Things cloud encryption scheme with forensics investigation compatibility based on identity-based encryption. 433-445
- Marco Viviani, Cristina Crocamo, Matteo Mazzola, Francesco Bartoli, Giuseppe Carrà, Gabriella Pasi:
Assessing vulnerability to psychological distress during the COVID-19 pandemic through the analysis of microblogging content. 446-459
- Weizhong Qiang, Renwan Liu, Hai Jin:
Defending CNN against privacy leakage in edge computing via binary neural networks. 460-470
- Yueshen Xu, Yinchen Wu, Honghao Gao, Shengli Song, Yuyu Yin, Xichu Xiao:
Collaborative APIs recommendation for Artificial Intelligence of Things with information fusion. 471-479
- Xin Li, Lei Zhang:
Unbalanced data processing using deep sparse learning technique. 480-484 - Hongxiao Gan, Jinglan Zhang, Michael Towsey, Anthony Truskinger, Debra Stark, Berndt van Rensburg, Yuefeng Li, Paul Roe:
A novel frog chorusing recognition method with acoustic indices and machine learning. 485-495 - Helan Liang, Bincheng Ding, Yanhua Du, Fanzhang Li:
Parallel optimization of QoS-aware big service processes with discovery of skyline services. 496-514 - Yuanyuan Shen, Manman Peng, Shiling Wang, Qiang Wu:
Towards parallelism detection of sequential programs with graph neural network. 515-525 - Jiajia Ren, Hongxin Li, Mengmeng Zhang, Cong Wu:
Massive-scale graph mining for e-commerce cold chain analysis and optimization. 526-531
- Bardh Prenkaj, Damiano Distante, Stefano Faralli, Paola Velardi:
Hidden space deep sequential risk prediction on student trajectories. 532-543
- Serin V. Simpson, G. Nagarajan:
A fuzzy based Co-Operative Blackmailing Attack detection scheme for Edge Computing nodes in MANET-IOT environment. 544-563 - Kai Yang, Xiaodong Lin, Limin Sun:
CShield: Enabling code privacy for Cyber-Physical systems. 564-574 - Michal Wrzeszcz, Lukasz Dutka, Renata G. Slota, Jacek Kitowski:
New approach to global data access in computational infrastructures. 575-589
- José A. Ruipérez-Valiente, Daniel Alberto Jaramillo-Morillo, Srecko Joksimovic, Vitomir Kovanovic, Pedro J. Muñoz-Merino, Dragan Gasevic:
Data-driven detection and characterization of communities of accounts collaborating in MOOCs. 590-603
- Hongzhi Zhou, Gan Yu:
Research on pedestrian detection technology based on the SVM classifier trained by HOG and LTP features. 604-615
- Bin Wang, Fagui Liu, Weiwei Lin:
Energy-efficient VM scheduling based on deep reinforcement learning. 616-628 - Niloofar Bayat, Kunal Mahajan, Sam Denton, Vishal Misra, Dan Rubenstein:
Down for failure: Active power status monitoring. 629-640
- Bárbara Silveira, Henrique S. Silva, Fabricio Murai, Ana Paula Couto da Silva:
Predicting user emotional tone in mental disorder online communities. 641-651
- Faisal Janjua, Asif Masood, Haider Abbas, Imran Rashid, Malik Muhammad Zaki Murtaza Khan:
Textual analysis of traitor-based dataset through semi supervised machine learning. 652-660
- Jakub Kuzilek, Zdenek Zdráhal, Viktor Fuglik:
Student success prediction using student exam behaviour. 661-671
- Peng Zhang:
E-commerce products recognition based on a deep learning architecture: Theory and implementation. 672-676
- Tao Zhang, Yan Zhao, Wenjing Jia, Mu-Yen Chen:
Collaborative algorithms that combine AI with IoT towards monitoring and control system. 677-686
- Deepak Singh, Anurag Shukla, Mohit Sajwan:
Deep transfer learning framework for the identification of malicious activities to combat cyberattack. 687-697 - George E. Violettas, George Simoglou, Sophia G. Petridou, Lefteris Mamatas:
A Softwarized Intrusion Detection System for the RPL-based Internet of Things networks. 698-714
- Arno Breitfuss, Karen Errou, Anelia Kurteva, Anna Fensel:
Representing emotions with knowledge graphs for movie recommendations. 715-725
- Abd Ullah Khan, Ghulam Abbas, Ziaul Haq Abbas, Wali Ullah Khan, Muhammad Waqas:
Spectrum utilization efficiency in CRNs with hybrid spectrum access and channel reservation: A comprehensive analysis under prioritized traffic. 726-742 - Júnior Löff, Dalvan Griebler, Gabriele Mencagli, Gabriell Alves de Araujo, Massimo Torquati, Marco Danelutto, Luiz Gustavo Fernandes:
The NAS Parallel Benchmarks for evaluating C++ parallel programming frameworks on shared-memory architectures. 743-757
- Haomiao Yang, Shaopeng Liang, Yi Zhang, Xiong Li:
Cloud-based privacy- and integrity-protecting density peaks clustering. 758-769
- Qingsong Ai, Wei Meng, Faycal Bensaali, Xiaojun Zhai, Lu Liu, Nasser Alaraje:
Editorial for FGCS special issue: Intelligent IoT systems for healthcare and rehabilitation. 770-773
- Andrea F. Abate, Lucia Cascone, Michele Nappi, Fabio Narducci, Ignazio Passero:
Attention monitoring for synchronous distance learning. 774-784
- Cong Wu, Hongxin Li, Jiajia Ren:
Research on hierarchical clustering method based on partially-ordered Hasse graph. 785-791 - Jordi Garcia, Francesc Aguiló, Adrià Asensio, Ester Simó, Marisa Zaragozá, Xavi Masip-Bruin:
Data-flow driven optimal tasks distribution for global heterogeneous systems. 792-805 - Yishu Liu, Qi Zhang, Weixiong Chen:
Massive-scale complicated human action recognition: Theory and applications. 806-811 - Shuigen Yang:
A novel study on deep learning framework to predict and analyze the financial time series information. 812-819 - Khan Muhammad, Mustaqeem, Amin Ullah, Ali Shariq Imran, Muhammad Sajjad, Mustafa Servet Kiran, Giovanna Sannino, Victor Hugo C. de Albuquerque:
Human action recognition using attention based LSTM network with dilated CNN features. 820-830 - Fengtao Nan, Yahui Tang, Po Yang, Zhenli He, Yun Yang:
A novel sub-Kmeans based on co-training approach by transforming single-view into multi-view. 831-843 - Michel J. F. Rosa, Célia Ghedini Ralha, Maristela Holanda, Aletéia P. F. Araújo:
Computational resource and cost prediction service for scientific workflows in federated clouds. 844-858
- Sumarga Kumar Sah Tyagi, Shiva Raj Pokhrel, Mahyar Nemati, Deepak Kumar Jain, Gang Li, Jinho Choi:
Redesigning compound TCP with cognitive edge intelligence for WiFi-based IoT. 859-868
- Marco Antonio Sotelo Monge, Jorge Maestre Vidal:
Conceptualization and cases of study on cyber operations against the sustainability of the tactical edge. 869-890 - Sergio Pérez, Patricia Arroba, José Manuel Moya:
Energy-conscious optimization of Edge Computing through Deep Reinforcement Learning and two-phase immersion cooling. 891-907 - Yi Jin, Jiawei Cai, Jiawei Xu, Yuxiang Huan, Yulong Yan, Bin Huang, Yongliang Guo, Lirong Zheng, Zhuo Zou:
Self-aware distributed deep learning framework for heterogeneous IoT edge devices. 908-920
- Tayyab Ali Khan, Karan Singh, Mohd Hilmi Hasan, Khaleel Ahmad, G. Thippa Reddy, Senthilkumar Mohan, Ali Ahmadian:
ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs. 921-943
- Shajunyi Zhao, Dongyuan Ge, Jingfeng Zhao, Wenjiang Xiang:
Fingerprint pre-processing and feature engineering to enhance agricultural products categorization. 944-948 - Yongqiang Wang, Mei Sun, Long Liu:
Basketball shooting angle calculation and analysis by deeply-learned vision model. 949-953
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.