


default search action
Information Sciences, Volume 473
Volume 473, January 2019
- Zhiwei Shen, Jingmei Liu
, Qingqing Han:
A local pilot auxiliary key generation scheme for secure underwater acoustic communication. 1-12 - Xingxing Jia
, Daoshun Wang, Daxin Nie, Xiangyang Luo
, Jonathan Zheng Sun:
A new threshold changeable secret sharing scheme based on the Chinese Remainder Theorem. 13-30 - Yi-Ming Wen, Ling Huang, Chang-Dong Wang, Kun-Yu Lin
:
Direction recovery in undirected social networks based on community structure and popularity. 31-43 - Heng Liu, Zilin Fu, Jungong Han
, Ling Shao
, Shudong Hou, Yuezhong Chu:
Single image super-resolution using multi-scale deep encoder-decoder with phase congruency edge map guidance. 44-58 - Lunke Fei
, Bob Zhang
, Wei Zhang, Shaohua Teng
:
Local apparent and latent direction extraction for palmprint recognition. 59-72 - Ming Li, Changqin Huang
, Dianhui Wang
:
Robust stochastic configuration networks with maximum correntropy criterion for uncertain data regression. 73-86 - Bhaskar DasGupta
, Nasim Mobasheri, Ismael González Yero
:
On analyzing and evaluating privacy measures for social networks under active attack. 87-100 - Zhibin Wu, Jiuping Xu, Xianglan Jiang, Lin Zhong:
Two MAGDM models based on hesitant fuzzy linguistic term sets with possibility distributions: VIKOR and TOPSIS. 101-120 - Chao-Yang Pang
, Ri-Gui Zhou, Ben-Qiong Hu, Wenwen Hu, Ahmed El-Rafei:
Signal and image compression using quantum discrete cosine transform. 121-141 - Junkai Ji
, Shuangbao Song
, Cheng Tang, Shangce Gao
, Zheng Tang, Yuki Todo:
An artificial bee colony algorithm search guided by scale-free networks. 142-165 - Ziyu Lu, Haihui Tan, Wenjie Li
:
An Evolutionary Context-aware Sequential Model for topic evolution of text stream. 166-177 - Dan Ye
, Xiang Yang:
Distributed event-triggered consensus for nonlinear multi-agent systems subject to cyber attacks. 178-189 - Jia Zhu
, Changqin Huang
, Min Yang, Gabriel Pui Cheong Fung:
Context-based prediction for road traffic state using trajectory pattern mining and recurrent convolutional neural networks. 190-201 - Debao Chen
, Feng Zou
, Renquan Lu, Suwen Li:
Backtracking search optimization algorithm based on knowledge learning. 202-226 - Yue Zhao
, Jiahui Wang, Fei Yan
, Yi Shen:
Adaptive sliding mode fault-tolerant control for type-2 fuzzy systems with distributed delays. 227-238

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.