


default search action
Information Sciences, Volume 552
Volume 552, April 2021
- Fan Zhou, Xiuxiu Qi
, Chunjing Xiao
, Jiahao Wang:
MetaRisk: Semi-supervised few-shot operational risk classification in banking industry. 1-16 - Lianting Hu
, Huiying Liang, Long Lu:
Splicing learning: A novel few-shot learning approach. 17-28 - Francisco Erivaldo Fernandes Junior
, Gary G. Yen:
Pruning Deep Convolutional Neural Networks Architectures with Evolution Strategy. 29-47 - Ying Zhang, Baohang Zhou
, Xiaoke Ding, Jiawei Ouyang, Xiangrui Cai, Jinyang Gao, Xiaojie Yuan:
Adversarially learned one-class novelty detection with confidence estimation. 48-64 - Zichen Zhang, Shifei Ding, Yuting Sun:
MBSVR: Multiple birth support vector regression. 65-79 - Muhammad Irfan, Jiangbin Zheng, Muhammad Iqbal, Muhammad Hassan Arif:
A novel lifelong learning model based on cross domain knowledge extraction and transfer to classify underwater images. 80-101 - Han Zhou, Hongpeng Yin, Yanxia Li, Yi Chai
:
Multiview clustering via exclusive non-negative subspace learning and constraint propagation. 102-117 - Gül Deniz Çayli
:
Generating nullnorms on some special classes of bounded lattices via closure and interior operators. 118-141 - Chunyao Song, Yao Ge, Tingjian Ge, Haixia Wu, Zhutian Lin, Hong Kang, Xiaojie Yuan:
Similar but foreign: Link recommendation across communities. 142-166 - Jinjian Wu, Wen Yang, Leida Li, Weisheng Dong, Guangming Shi, Weisi Lin:
Blind image quality prediction with hierarchical feature aggregation. 167-182 - Fengwei Wang, Hui Zhu, Rongxing Lu, Yandong Zheng, Hui Li:
A privacy-preserving and non-interactive federated learning scheme for regression training with gradient descent. 183-200 - Xinxin Wang, Chengjun Li, Jiarui Zhu, Qinxue Meng:
L-SHADE-E: Ensemble of two differential evolution algorithms originating from L-SHADE. 201-219 - Sara Charoghchi, Samaneh Mashhadi
:
Three (t, n)-secret image sharing schemes based on homogeneous linear recursion. 220-243 - Xinjun Peng, Dong Xu, De Chen:
Robust distribution-based nonnegative matrix factorizations for dimensionality reduction. 244-260 - Yibang Ruan
, Yanshan Xiao, Zhifeng Hao, Bo Liu:
A nearest-neighbor search model for distance metric learning. 261-277 - Nabanita Mukherjee (Ganguly), Goutam Paul, Sanjoy Kumar Saha:
Two-point FFT-based high capacity image steganography using calendar based message encoding. 278-290 - Xinyu Wang, Xiaoyuan Luo, Mingyue Zhang, Zhong-Ping Jiang, Xinping Guan:
Detection and localization of biased load attacks in smart grids via interval observer. 291-309 - Jiulong Zhang
, Gang Kou, Yi Peng, Yu Zhang
:
Estimating priorities from relative deviations in pairwise comparison matrices. 310-327 - Jiajia Wang, Xueling Ma, Zeshui Xu, Jianming Zhan
:
Three-way multi-attribute decision making under hesitant fuzzy environments. 328-351 - María Muñoz Guillermo:
Image encryption using q-deformed logistic map. 352-364

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.