


default search action
IEEE Transactions on Emerging Topics in Computational Intelligence, Volume 4
Volume 4, February 2020
- Qilian Liang
, Gary G. Yen
, Tariq S. Durrani, Wei Wang
, Xin Wang:
Guest Editorial: Special Issue on Computational Intelligence for Communications and Sensing. 1-4 - Xin Liu
, Min Jia:
Intelligent Spectrum Resource Allocation Based on Joint Optimization in Heterogeneous Cognitive Radio. 5-12 - Zhuo Sun
, Song Kong, Wenbo Wang
:
Sparse Learning of Higher-Order Statistics for Communications and Sensing. 13-22 - Shuang Liu
, Xiaolong Hao
:
Pedestrian Retrieval Using Generated Samples and Multistream Layer in Sensor Networks. 23-31 - Wei Wang
, Min Zhang:
Tensor Deep Learning Model for Heterogeneous Data Fusion in Internet of Things. 32-41 - Xiu Zhang
, Xin Zhang
, Zhou Wu:
Utility- and Fairness-Based Spectrum Allocation of Cellular Networks by an Adaptive Particle Swarm Optimization Algorithm. 42-50 - Zhong Zhang
, Meiyan Huang:
Person Re-Identification Based on Heterogeneous Part-Based Deep Network in Camera Networks. 51-60 - Mu Zhou
, Yixin Lin
, Nan Zhao
, Qing Jiang, Xiaolong Yang, Zengshan Tian:
Indoor WLAN Intelligent Target Intrusion Sensing Using Ray-Aided Generative Adversarial Network. 61-73 - Jie Ren
, Jing Liang
, Yuanyuan Zhao:
Soil PH Measurement Based on Compressive Sensing and Deep Image Prior. 74-82 - Yanan Liu, Xianbin Wang
, Gary Boudreau, Akram Bin Sediq, Hatem Abou-zeid:
Deep Learning Based Hotspot Prediction and Beam Management for Adaptive Virtual Small Cell in 5G Networks. 83-94
Volume 4, Number 2, April 2020
- Feng Xia
, Jiaying Liu
, Hansong Nie
, Yonghao Fu, Liangtian Wan
, Xiangjie Kong
:
Random Walks: A Review of Algorithms and Applications. 95-107 - Maoguo Gong
, Cheng Chen, Yu Xie
, Shanfeng Wang:
Community Preserving Network Embedding Based on Memetic Algorithm. 108-118 - Xiao-Kang Liu
, He Jiang
, Yan-Wu Wang
, Haibo He
:
A Distributed Iterative Learning Framework for DC Microgrids: Current Sharing and Voltage Regulation. 119-129 - Animesh Chaturvedi
, Aruna Tiwari
:
System Network Complexity: Network Evolution Subgraphs of System State Series. 130-139 - Simone Scardapane
, Steven Van Vaerenbergh
, Amir Hussain
, Aurelio Uncini:
Complex-Valued Neural Networks With Nonparametric Activation Functions. 140-150 - Haonan Guo
, Shenghong Li
, Kaiyue Qi
, Ying Guo
, Zhengwu Xu:
Learning Automata Based Competition Scheme to Train Deep Neural Networks. 151-158 - Tharun Kumar Reddy
, Vipul Arora
, Laxmidhar Behera
:
HJB-Equation-Based Optimal Learning Scheme for Neural Networks With Applications in Brain-Computer Interface. 159-170 - Stephen D. Liang
:
Optimization for Deep Convolutional Neural Networks: How Slim Can It Go? 171-179 - Venkatanareshbabu Kuppili
, Mainak Biswas
, Damodar Reddy Edla
, K. J. Ravi Prasad, Jasjit S. Suri
:
A Mechanics-Based Similarity Measure for Text Classification in Machine Learning Paradigm. 180-200
Volume 4, Number 3, June 2020
- Celimuge Wu
, Yaochu Jin
, Jie Li
, Kok-Lim Alvin Yau
, Junaid Qadir
:
Guest Editorial Special Issue on Big Data and Computational Intelligence for Agile Wireless IoT. 202-205 - Caijuan Chen, Kaoru Ota
, Mianxiong Dong
, Chen Yu
, Hai Jin
:
WITM: Intelligent Traffic Monitoring Using Fine-Grained Wireless Signal. 206-215 - Yu Gu
, Yantong Wang, Tao Liu, Yusheng Ji
, Zhi Liu
, Peng Li, Xiaoyan Wang
, Xin An
, Fuji Ren
:
EmoSense: Computational Intelligence Driven Emotion Sensing via Wireless Channel Data. 216-226 - Zhenyu Zhou
, Haijun Liao, Bo Gu
, Shahid Mumtaz
, Jonathan Rodriguez:
Resource Sharing and Task Offloading in IoT Fog Computing: A Contract-Learning Approach. 227-240 - Qichao Xu
, Zhou Su
, Kuan Zhang
, Peng Li
:
Intelligent Cache Pollution Attacks Detection for Edge Computing Enabled Mobile Social Networks. 241-252 - Kian Hamedani
, Lingjia Liu
, Shiyan Hu, Jonathan D. Ashdown
, Jinsong Wu
, Yang Yi
:
Detecting Dynamic Attacks in Smart Grids Using Reservoir Computing: A Spiking Delayed Feedback Reservoir Based Approach. 253-264 - Yan Huang
, Xin Guan
, Hongyang Chen
, Yi Liang, Shanshan Yuan, Tomoaki Ohtsuki
:
Risk Assessment of Private Information Inference for Motion Sensor Embedded IoT Devices. 265-275 - FeiYi Xie
, Hong Wen
, Jinsong Wu
, Wenjing Hou, Huanhuan Song
, Tengyue Zhang, Runfa Liao, Yixin Jiang:
Data Augmentation for Radio Frequency Fingerprinting via Pseudo-Random Integration. 276-286 - Yangyang Li
, Guangyuan Liu
, Gao Lu
, Licheng Jiao
, Naresh Marturi
, Ronghua Shang
:
Hyper-Parameter Optimization Using MARS Surrogate for Machine-Learning Algorithms. 287-297 - Chao Jiang
, Zhen Ni
, Yi Guo
, Haibo He
:
Pedestrian Flow Optimization to Reduce the Risk of Crowd Disasters Through Human-Robot Interaction. 298-311 - Wenbo Du
, Wen Ying, Peng Yang
, Xianbin Cao
, Gang Yan
, Ke Tang
, Dapeng Oliver Wu
:
Network-Based Heterogeneous Particle Swarm Optimization and Its Application in UAV Communication Coverage. 312-323 - Pei-Qiu Huang
, Yong Wang
, Kezhi Wang
, Kun Yang
:
Differential Evolution With a Variable Population Size for Deployment Optimization in a UAV-Assisted IoT Data Collection System. 324-335 - Seyed Mohammad Nekooei
, Gang Chen
:
Cooperative Coevolution Design of Multilevel Fuzzy Logic Controllers for Media Access Control in Wireless Body Area Networks. 336-350 - Vesna Sesum-Cavic
, Eva Kühn, Lukas Fleischhacker
:
Efficient Search and Lookup in Unstructured P2P Overlay Networks Inspired by Swarm Intelligence. 351-368 - Yongliang Chen
, Jinghui Zhong
, Liang Feng
, Jun Zhang
:
An Adaptive Archive-Based Evolutionary Framework for Many-Task Optimization. 369-384 - Junwen Ding
, Liji Shen, Zhipeng Lü, Liping Xu, Una Benlic:
A Hybrid Memetic Algorithm for the Parallel Machine Scheduling Problem With Job Deteriorating Effects. 385-397 - Jiahai Wang
, Binzhong Cen, Shangce Gao
, Zizhen Zhang, Yuren Zhou:
Cooperative Evolutionary Framework With Focused Search for Many-Objective Optimization. 398-412
Volume 4, Number 4, August 2020
- Zixing Zhang
, Dimitris N. Metaxas, Hung-yi Lee
, Björn W. Schuller
:
Guest Editorial Special Issue on Adversarial Learning in Computational Intelligence. 414-416 - Chenggang Mi
, Lei Xie
, Yanning Zhang
:
Improving Adversarial Neural Machine Translation for Morphologically Rich Language. 417-426 - Giovanni Apruzzese
, Mauro Andreolini, Michele Colajanni
, Mirco Marchetti
:
Hardening Random Forest Cyber Detectors Against Adversarial Attacks. 427-439 - Yu-Ying Yeh
, Yen-Cheng Liu, Wei-Chen Chiu
, Yu-Chiang Frank Wang
:
Static2Dynamic: Video Inference From a Deep Glimpse. 440-449 - Koosha Sadeghi
, Ayan Banerjee
, Sandeep K. S. Gupta
:
A System-Driven Taxonomy of Attacks and Defenses in Adversarial Machine Learning. 450-467 - Wen-Chin Huang
, Hao Luo
, Hsin-Te Hwang, Chen-Chou Lo
, Yu-Huai Peng, Yu Tsao
, Hsin-Min Wang
:
Unsupervised Representation Disentanglement Using Cross Domain Features and Adversarial Learning in Variational Autoencoder Based Voice Conversion. 468-479 - Yufeng Xiao
, Huan Zhao
, Tingting Li:
Learning Class-Aligned and Generalized Domain-Invariant Representations for Speech Emotion Recognition. 480-489 - Akshay Chaturvedi
, Utpal Garain
:
Attacking VQA Systems via Adversarial Background Noise. 490-499 - Zhaoqing Pan
, Weijie Yu, Bosi Wang, Haoran Xie
, Victor S. Sheng
, Jianjun Lei
, Sam Kwong
:
Loss Functions of Generative Adversarial Networks (GANs): Opportunities and Challenges. 500-522 - Nathan K. Long
, Karl Sammut
, Daniel Sgarioto, Matthew Garratt
, Hussein A. Abbass
:
A Comprehensive Review of Shepherding as a Bio-Inspired Swarm-Robotics Guidance Approach. 523-537 - Alexandre Sawczuk da Silva
, Hui Ma
, Yi Mei
, Mengjie Zhang
:
A Survey of Evolutionary Computation for Web Service Composition: A Technical Perspective. 538-554 - Batchu Rajasekhar
, Wayes Tushar
, Clement Lork
, Yuren Zhou
, Chau Yuen
, Naran M. Pindoriya
, Kristin L. Wood
:
A Survey of Computational Intelligence Techniques for Air-Conditioners Energy Management. 555-570 - Lidia Ghosh
, Amit Konar
, Pratyusha Rakshit
, Atulya K. Nagar
:
Mimicking Short-Term Memory in Shape-Reconstruction Task Using an EEG-Induced Type-2 Fuzzy Deep Brain Learning Network. 571-588
Volume 4, Number 5, October 2020
- Yuan Yuan, Xuyun Zhang
, Jie Tang
:
Guest Editorial Special Issue on Privacy and Security in Computational Intelligence. 590-592 - Zhili Zhou
, Q. M. Jonathan Wu
, Shaohua Wan
, Wendi Sun, Xingming Sun:
Integrating SIFT and CNN Feature Matching for Partial-Duplicate Image Detection. 593-604 - Xiaolong Xu
, Shucun Fu, Weimin Li
, Fei Dai
, Honghao Gao
, Victor Chang
:
Multi-Objective Data Placement for Workflow Management in Cloud Infrastructure Using NSGA-II. 605-615 - Ruili Wang
, Wanting Ji
:
Computational Intelligence for Information Security: A Survey. 616-629 - Amir Namavar Jahromi, Sattar Hashemi, Ali Dehghantanha
, Reza M. Parizi
, Kim-Kwang Raymond Choo
:
An Enhanced Stacked LSTM Method With No Random Initialization for Malware Threat Hunting in Safety and Time-Critical Systems. 630-640 - Shih-Chao Cha
, Hao Wang
, Zhiyuan Tan
, Yuh-Jzer Joung, Yen-Chung Tseng, Kuo-Hui Yeh
:
On Privacy Aware Carriers for Value-Possessed e-Invoices Considering Intelligence Mining. 641-652 - Gaolei Li
, Mianxiong Dong
, Laurence T. Yang
, Kaoru Ota
, Jun Wu
, Jianhua Li:
Preserving Edge Knowledge Sharing Among IoT Services: A Blockchain-Based Approach. 653-665 - Shanshan Zhao
, Shancang Li
, Lianyong Qi
, Li Da Xu:
Computational Intelligence Enabled Cybersecurity for the Internet of Things. 666-674 - Guanfeng Liu
, Yurong Wang
, Bolong Zheng, Zhixu Li
, Kai Zheng
:
Strong Social Graph Based Trust-Oriented Graph Pattern Matching With Multiple Constraints. 675-685 - Romi Banerjee
, Sankar K. Pal
:
Z*-Numbers, Data Structures, and Thinking in Machine-Mind Architecture. 686-695 - Tao Song, Pan Zheng, M. L. Dennis Wong
, Min Jiang
, Xiangxiang Zeng
:
On the Computational Power of Asynchronous Axon Membrane Systems. 696-704 - Lien-Wu Chen
, Yung-En Li, Jun-Xian Liu, Hsi-Min Chen, Ming-Fong Tsai:
Intelligent Item Searching With Gesture-Based Interfaces Through Mobile Cloud Computing. 705-716 - Ning Shan, Daniel Stanley Tan
, Melkamu S. Denekew
, Yung-Yao Chen
, Wen-Huang Cheng
, Kai-Lung Hua
:
Photobomb Defusal Expert: Automatically Remove Distracting People From Photos. 717-727 - Manu Goyal
, Neil D. Reeves
, Adrian K. Davison
, Satyan Rajbhandari, Jennifer Spragg, Moi Hoon Yap
:
DFUNet: Convolutional Neural Networks for Diabetic Foot Ulcer Classification. 728-739
Volume 4, Number 6, December 2020
- Muhammad Asim
, Yong Wang
, Kezhi Wang
, Pei-Qiu Huang
:
A Review on Computational Intelligence Techniques in Cloud and Edge Computing. 742-763 - Zhihao Liu, Zhigang Zeng
, Cheng Lian
:
Multidomain Features Fusion for Zero-Shot Learning. 764-773 - Nikolaos Passalis
, Anastasios Tefas
, Juho Kanniainen
, Moncef Gabbouj
, Alexandros Iosifidis
:
Temporal Bag-of-Features Learning for Predicting Mid Price Movements Using High Frequency Limit Order Book Data. 774-785 - Masoumeh Heidari Kapourchali
, Bonny Banerjee
:
State Estimation via Communication for Monitoring. 786-793 - Indranil Pan
, Dirk Bester:
Marginal Likelihood Based Model Comparison in Fuzzy Bayesian Learning. 794-799

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.