default search action
Information Sciences, Volume 601
Volume 601, July 2022
- Yilei Wang, Zhaojie Wang, Minghao Zhao, Xueyang Han, Huiyu Zhou, Xiaoying Wang, Arthur Sandor Voundi Koe:
BSM-ether: Bribery selfish mining in blockchain-based healthcare systems. 1-17 - Mengyu Yan, Jinhai Li:
Knowledge discovery and updating under the evolution of network formal contexts based on three-way decision. 18-38 - Seung-Hoon Lee, Myeong-Jin Park, O. M. Kwon:
Improved synchronization and extended dissipativity analysis for delayed neural networks with the sampled-data control. 39-57 - Beijing Chen, Tianmu Li, Weiping Ding:
Detecting deepfake videos based on spatiotemporal attention and convolutional LSTM. 58-70 - Lin Zhang, Fei Zhu, Xinghong Ling, Quan Liu:
Best-in-class imitation: Non-negative positive-unlabeled imitation learning from imperfect demonstrations. 71-89 - Rodrigo M. Silva, Guilherme C. M. Gomes, Mário S. Alvim, Marcos André Gonçalves:
How to build high quality L2R training data: Unsupervised compression-based selective sampling for learning to rank. 90-113 - Honggui Han, Cong Chen, Haoyuan Sun, Shengli Du, Junfei Qiao:
Multi-objective model predictive control with gradient eigenvector algorithm. 114-128 - Ziheng Huang, Weihan Zhang, Dujuan Wang, Yunqiang Yin:
A GAN framework-based dynamic multi-graph convolutional network for origin-destination-based ride-hailing demand prediction. 129-146 - Renhao Lin, Qinglei Zhou, Bin Wu, Xiaofei Nan:
Robustness evaluation for deep neural networks via mutation decision boundaries analysis. 147-161 - Zequn Niu, Jingfeng Xue, Dacheng Qu, Yong Wang, Jun Zheng, Hongfei Zhu:
A novel approach based on adaptive online analysis of encrypted traffic for identifying Malware in IIoT. 162-174 - Dejian Yu, Libo Sheng, Zeshui Xu:
Analysis of evolutionary process in intuitionistic fuzzy set theory: A dynamic perspective. 175-188 - Omar Abdel Wahab, Gaith Rjoub, Jamal Bentahar, Robin Cohen:
Federated against the cold: A trust-based federated learning approach to counter the cold start problem in recommendation systems. 189-206 - Chintoo Kumar, C. Ravindranath Chowdary, Deepika Shukla:
Automatically detecting groups using locality-sensitive hashing in group recommendations. 207-223 - Qian Li, Bojian Hu, Wei Xu, Yunpeng Xiao:
A group behavior prediction model based on sparse representation and complex message interactions. 224-241 - Nima Joorabloo, Mahdi Jalili, Yongli Ren:
Improved recommender systems by denoising ratings in highly sparse datasets through individual rating confidence. 242-254 - Ruitao Hou, Shan Ai, Qi Chen, Hongyang Yan, Teng Huang, Kongyang Chen:
Similarity-based integrity protection for deep learning systems. 255-267 - Paolo Bartesaghi, Gian Paolo Clemente, Rosanna Grassi:
A tensor-based unified approach for clustering coefficients in financial multiplex networks. 268-286 - Xin Yang, Yuxuan Yang, Junfang Luo, Dun Liu, Tianrui Li:
A unified incremental updating framework of attribute reduction for two-dimensionally time-evolving data. 287-305 - Kamal Kumar, Shyi-Ming Chen:
Group decision making based on advanced intuitionistic fuzzy weighted Heronian mean aggregation operator of intuitionistic fuzzy values. 306-322 - Shangjie Li, Xianzhen Huang, Dianhui Wang:
Stochastic configuration networks for multi-dimensional integral evaluation. 323-339 - Zhiming Zhang, Shyi-Ming Chen:
Group decision making based on multiplicative consistency and consensus of Pythagorean fuzzy preference relations. 340-356 - Miles Q. Li, Benjamin C. M. Fung, Philippe Charland:
DyAdvDefender: An instance-based online machine learning model for perturbation-trial-based black-box adversarial defense. 357-373 - Manoranjan Praharaj, Debdoot Sain, B. M. Mohan:
Development, experimental validation, and comparison of interval type-2 Mamdani fuzzy PID controllers with different footprints of uncertainty. 374-402
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.