default search action
Web Intelligence, Volume 19
Volume 19, Numbers 1-2, 2021
- Ganesh Viswanathan, Prabhu J:
A hybrid threat model for system-centric and attack-centric for effective security design in SDLC. 1-11 - Guangxu Yu:
Path coverage enhancement in wireless sensor networks based on CVT model. 13-25 - Wei Shu, Dajiang He, Jun Shu:
A novel gateway node reconfiguration method of IOT based on hierarchical coding particle swarm optimization. 27-40 - Hanumantha Rao Nadendla, Srikrishna Atluri, Gangadhara Rao Kancherla:
Rider and Sunflower optimization-driven neural network for image classification. 41-61 - Catherine Sotirakou, Damian Trilling, Panagiotis Germanakos, Dimitrios Alexandros Sinis, Constantinos Mourlas:
Understanding the link between audience engagement metrics and the perceived quality of online news using machine learning. 63-86 - Hiromi Nakagawa, Yusuke Iwasawa, Yutaka Matsuo:
Graph-based knowledge tracing: Modeling student proficiency using graph neural networks. 87-102 - Xuetao Mao, Wei Duan, Lin Li, Jianwei Zhang:
A prison term prediction model based on fact descriptions by capturing long historical information. 103-113 - Haiyang Huang, Zhanlei Shang:
Fast mining method of network heterogeneous fault tolerant data based on K-means clustering. 115-124 - Chen Chen, Li Yang, Xunan Jia:
A bit-object-based method for mining maximum frequent patterns in intensive cloud computing data. 125-133 - Ruohan Sun, Meihui Hu, Jinping Cao, Wanxing Xiao, Xinying Guo:
Feature mining method of information system operation and maintenance big data based on window function. 135-145 - Li Qian:
Research on complex attribute big data classification based on iterative fuzzy clustering algorithm. 147-158 - Linlin Zhang, Sujuan Zhang:
Research on information classification and storage in cloud computing data center based on group collaboration intelligent clustering. 159-168
Volume 19, Number 3, 2021
- Sudhir Kumar Patnaik, C. Narendra Babu:
Trends in web data extraction using machine learning. 169-190 - Yuanyuan Li, Jidong Sha, Rongna Geng:
Research on internal network data security monitoring method based on NB-IoT. 191-202 - Lin Tang:
Integrity protection method for trusted data of IoT nodes based on transfer learning. 203-213 - Yinghua Feng, Wei Yang:
Packet loss rate monitoring model of IoT based on differential evolution algorithm. 215-226 - Xianghong Li:
An anti-tampering model of sensitive data in link network based on blockchain technology. 227-237 - Weiwei Wu:
A secure encryption method of communication channel based on cloud computing technology. 239-251
Volume 19, Number 4, 2021
- Huixian Wang, Hongjiang Zheng:
Advanced ant colony algorithm for high dimensional abnormal data mining in Internet of things. 253-262 - Jingyi Li:
Research on dynamic and secure storage of financial data based on cloud platform. 263-274 - Pamarthi NagaRaju, Nallamothu Nagamalleswara Rao:
Exponential Ant-Lion Rider Optimization for Privacy Preservation in Cloud Computing. 275-293 - Kapil Netaji Vhatkar, Girish P. Bhole:
A comprehensive survey on container resource allocation approaches in cloud computing: State-of-the-art and research challenges. 295-316 - Naiyue Chen, Yi Jin, Yinglong Li, Luxin Cai:
Trust-based federated learning for network anomaly detection. 317-327 - Lin Li, Sijie Long, Jianxiu Bi, Guowei Wang, Jianwei Zhang, Xiaohui Tao:
A federated learning based semi-supervised credit prediction approach enhanced by multi-layer label mean. 329-342
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.