
default search action
Information Sciences, Volume 512
Volume 512, February 2020
- Nan Jiang
, Dong Xu
, Jie Zhou, Hongyang Yan, Tao Wan, Jiaqi Zheng:
Toward optimal participant decisions with voting-based incentive model for crowd sensing. 1-17 - Shudong Huang
, Zenglin Xu
, Ivor W. Tsang
, Zhao Kang
:
Auto-weighted multi-view co-clustering with bipartite graphs. 18-30 - Gnaneswaran Nagamani
, Young Hoon Joo
, G. Soundararajan
, Reza Mohajerpoor
:
Robust event-triggered reliable control for T-S fuzzy uncertain systems via weighted based inequality. 31-49 - Vicenç Torra
, Yasuo Narukawa, Michio Sugeno:
On the f-divergence for discrete non-additive measures. 50-63 - Ming Yang
, Aimin Zhou
, Changhe Li
, Jing Guan, Xuesong Yan:
CCFR2: A more efficient cooperative co-evolutionary framework for large-scale global optimization. 64-79 - Shaofei Wang
, Depeng Dang
:
Incentive mechanism for the listing item task in crowdsourcing. 80-95 - Rajeev Kumar
, Ki-Hyun Jung
:
Robust reversible data hiding scheme based on two-layer embedding strategy. 96-107 - Huidong Wang, Xiaohong Pan, Jun Yan
, Jinli Yao, Shifan He:
A projection-based regret theory method for multi-attribute decision making under interval type-2 fuzzy sets environment. 108-122 - Seok-Jun Bu
, Sung-Bae Cho
:
A convolutional neural-based learning classifier system for detecting database intrusion via insider attack. 123-136 - Qingqing Han, Jingmei Liu, Zhiwei Shen, Jingwei Liu, Fengkui Gong:
Vector partitioning quantization utilizing K-means clustering for physical layer secret key generation. 137-160 - Guoyin Jiang
, Xiaodong Feng, Wenping Liu, Xingjun Liu
:
Clicking position and user posting behavior in online review systems: A data-driven agent-based modeling approach. 161-174 - Hao Fei, Yafeng Ren
, Donghong Ji:
A tree-based neural network model for biomedical event trigger detection. 175-185 - Haibin Sun
, Guangdeng Zong
, C. L. Philip Chen:
Adaptive decentralized output feedback PI tracking control design for uncertain interconnected nonlinear systems with input quantization. 186-206 - Hongfa Ding
, Youliang Tian, Changgen Peng, Youshan Zhang
, Shuwen Xiang:
Inference attacks on genomic privacy with an improved HMM and an RCNN model for unrelated individuals. 207-218 - Francielle Santo Pedro
, Estevão Esmi
, Laécio Carvalho de Barros:
Calculus for linearly correlated fuzzy function using Fréchet derivative and Riemann integral. 219-237 - Charith Perera
, Mahmoud Barhamgi
, Arosha K. Bandara
, Muhammad Ajmal Azad, Blaine A. Price
, Bashar Nuseibeh
:
Designing privacy-aware internet of things applications. 238-257 - Henrik Sloot
, Matthias Scherer
:
A probabilistic view on semilinear copulas. 258-276 - Myeongjun Jang, Seungwan Seo, Pilsung Kang:
Corrigendum to "Recurrent neural network-based semantic variational autoencoder for Sequence-to-sequence learning" [Information Sciences 490 (2019) 59-73]. 277 - Liangli Zhen
, Miqing Li
, Dezhong Peng, Xin Yao
:
Objective reduction for visualising many-objective solution sets. 278-294 - Bao Zhao
, Juntong Xi
:
Efficient and accurate 3D modeling based on a novel local feature descriptor. 295-314 - Jianyi Huang, Yuyuan Tang, Ying Hu, Jianjiang Li, Changjun Hu:
Predicting the active period of popularity evolution: A case study on Twitter hashtags. 315-326 - Xiaowei Jiang, Xiangyong Chen, Ming Chi
, Ming-Feng Ge
:
Optimal performance of LTI systems over power constrained erasure channels. 327-337 - Hui Lü, Wangli He
, Qing-Long Han
, Xiaohua Ge
, Chen Peng
:
Finite-time containment control for nonlinear multi-agent systems with external disturbances. 338-351 - Cuiping Wei
, Rosa M. Rodríguez
, Peng Li:
Note on entropies of hesitant fuzzy linguistic term sets and their applications. 352-368 - Na Li, Licheng Liu, Shutao Li
, Hui Lin:
Robust face hallucination via locality-constrained multiscale coding. 369-380 - Pierpaolo D'Urso, Livia De Giovanni
, Riccardo Massari:
Smoothed self-organizing map for robust clustering. 381-401 - Sumit Soman
, Jayadeva
, Rajat Thakur, Mayank Sharma, Suresh Chandra:
Sparsity in function and derivative approximation via the empirical feature space. 402-415 - Licheng Liu, Han Liu, Shutao Li
, C. L. Philip Chen:
Face hallucination via multiple feature learning with hierarchical structure. 416-430 - Dong Yang
, Guangdeng Zong
, Sing Kiong Nguang
:
H∞ bumpless transfer reliable control of Markovian switching LPV systems subject to actuator failures. 431-445 - Junfei Qiao
, Fei Li, Shengxiang Yang
, Cuili Yang, Wenjing Li, Ke Gu:
An adaptive hybrid evolutionary immune multi-objective algorithm based on uniform distribution selection. 446-470 - Jae Hong Seo
:
Efficient digital signatures from RSA without random oracles. 471-480 - Md Meftahul Ferdaus
, Mahardhika Pratama
, Sreenatha G. Anavatti, Matthew A. Garratt, Edwin Lughofer:
PAC: A novel self-adaptive neuro-fuzzy controller for micro aerial vehicles. 481-505 - Wei Shao, Zhi Wang
, Xiaolu Wang, Kefan Qiu, Chunfu Jia, Chong Jiang
:
LSC: Online auto-update smart contracts for fortifying blockchain-based log systems. 506-517 - Jin-Ling Lin, Kao-Shing Hwang, Haobin Shi
, Wei Pan:
An ensemble method for inverse reinforcement learning. 518-532 - Yiyuan Wang
, Shiwei Pan, Chenxi Li, Minghao Yin
:
A local search algorithm with reinforcement learning based repair procedure for minimum weight independent dominating set. 533-548 - Tao Wen
, Yong Deng
:
Identification of influencers in complex networks by local information dimensionality. 549-562 - Dingjie Wang
, Wei Yu, Xiufen Zou:
Tensor-based mathematical framework and new centralities for temporal multilayer networks. 563-580 - Silvia Terragni
, Elisabetta Fersini, Enza Messina
:
Constrained Relational Topic Models. 581-594 - Dmitry Frolov
, Susana Nascimento
, Trevor I. Fenner, Boris G. Mirkin
:
Parsimonious generalization of fuzzy thematic sets in taxonomies applied to the analysis of tendencies of research in data science. 595-615 - Yan Xu, Song Sun, Jie Cui, Hong Zhong
:
Intrusion-resilient public cloud auditing scheme with authenticator update. 616-628 - S. H. Mousavi, Mohammad Khansari
, Rouhollah Rahmani:
A fully scalable big data framework for Botnet detection based on network traffic analysis. 629-640 - Qiang Zhou, Chengliang Tian
, Hanlin Zhang, Jia Yu
, Fengjun Li
:
How to securely outsource the extended euclidean algorithm for large-scale polynomials over finite fields. 641-660 - Yansen Su, Neng Guo, Ye Tian, Xingyi Zhang
:
A non-revisiting genetic algorithm based on a novel binary space partition tree. 661-674 - Jun-Liu Zhong, Chi-Man Pun
:
Two-pass hashing feature representation and searching method for copy-move forgery detection. 675-692 - Jinming Wang
, Zhenyu Xu, Zhangquan Wang, Sen Xu, Jun Jiang:
Rapid compressed sensing reconstruction: A semi-tensor product approach. 693-707 - Tao Zhu
, Wenjian Luo
, Chenyang Bu
, Huansheng Ning
:
Making use of observable parameters in evolutionary dynamic optimization. 708-725 - Zhongjing Yu
, Zhong Zhang
, Haoran Chen, Junming Shao
:
Structured subspace embedding on attributed networks. 726-740 - Jose Luis Lisani
, Jean-Michel Morel
, Ana Belén Petro
, Catalina Sbert
:
Analyzing center/surround retinex. 741-759 - Chao Luo, Xi Song, Yuanjie Zheng:
A novel forecasting model for the long-term fluctuation of time series based on polar fuzzy information granules. 760-779 - Chaoran Cui
, Wenya Yang, Cheng Shi, Meng Wang, Xiushan Nie, Yilong Yin:
Personalized image quality assessment with Social-Sensed aesthetic preference. 780-794 - Xiaoya Che, Degang Chen, Ju-Sheng Mi:
A novel approach for learning label correlation with application to feature selection of multi-label data. 795-812 - Jingwen Zhao, Yunjun Gao, Chunyu Ma, Pengfei Jin, Shiting Wen:
On efficiently diversified top-k geo-social keyword query processing in road networks. 813-829 - Peide Liu
, Shyi-Ming Chen, Yumei Wang:
Multiattribute group decision making based on intuitionistic fuzzy partitioned Maclaurin symmetric mean operators. 830-854 - Yavar Khedmati, Reza Parvaz, Y. Behroo:
2D Hybrid chaos map for image security transform based on framelet and cellular automata. 855-879 - Abdelkamel Ben Ali
, Gabriel Luque, Enrique Alba:
An efficient discrete PSO coupled with a fast local search heuristic for the DNA fragment assembly problem. 880-908 - Zhiyong Yu
, Shuzhen Yu, Haijun Jiang
:
Consensus of multi-agent systems with finite-time and fixed-time observation. 909-928 - Hamzeh Agahi:
A refined Hölder's inequality for Choquet expectation by Cauchy-Schwarz's inequality. 929-934 - Lin Lan
, Pinghui Wang, Junzhou Zhao
, Jing Tao, John C. S. Lui, Xiaohong Guan:
Improving network embedding with partially available vertex and edge content. 935-951 - Feng Wang, Huiqing Zhu, Wei Li, Kangshun Li:
A hybrid convolution network for serial number recognition on banknotes. 952-963 - Liang Jia, Chen Chen
, Shoukun Xu, Ju Shen:
Fabric defect inspection based on lattice segmentation and template statistics. 964-984 - Francisco García-García, Antonio Corral
, Luis Iribarne
, Michael Vassilakopoulos
, Yannis Manolopoulos:
Efficient distance join query processing in distributed spatial data management systems. 985-1008 - Ming Zheng
, Tong Li, Rui Zhu
, Yahui Tang, Mingjing Tang, Leilei Lin, Zifei Ma:
Conditional Wasserstein generative adversarial network-gradient penalty-based approach to alleviating imbalanced data classification. 1009-1023 - Lei Wang
, Tao Sun, Chen Qian, Mark Goh
, Vikas Kumar Mishra:
Applying social network analysis to genetic algorithm in optimizing project risk response decisions. 1024-1042 - Elre T. Oldewage
, Andries P. Engelbrecht
, Christopher W. Cleghorn
:
Movement patterns of a particle swarm in high dimensional spaces. 1043-1062 - Tao Li
, Xiaoling Tang, Jifeng Ge, Shumin Fei:
Event-based fault-tolerant control for networked control systems applied to aircraft engine system. 1063-1077 - Matheus Araújo
, Adriano C. M. Pereira
, Fabrício Benevenuto
:
A comparative study of machine translation for multilingual sentence-level sentiment analysis. 1078-1102 - Xiushan Jiang
, Senping Tian
, Tianliang Zhang
, Weihai Zhang
:
Pareto optimal strategy for linear stochastic systems with H∞ constraint in finite horizon. 1103-1117 - Yuntao Wang
, Xiaowei Yi, Xianfeng Zhao
:
MP3 steganalysis based on joint point-wise and block-wise correlations. 1118-1133 - Gül Deniz Çayli
:
Nullnorms on bounded lattices derived from t-norms and t-conorms. 1134-1154 - Moatsum Alawida
, Azman Samsudin, Je Sen Teh
:
Enhanced digital chaotic maps based on bit reversal with applications in random bit generators. 1155-1169 - Zhao Tong
, Hongjian Chen, Xiaomei Deng, Kenli Li
, Keqin Li:
A scheduling scheme in the cloud computing environment using deep Q-learning. 1170-1191 - Firuz Kamalov
:
Kernel density estimation based sampling for imbalanced class distribution. 1192-1201 - Silvia Romagnoli
:
A vague multidimensional dependency structure: Conditional versus Unconditional fuzzy copula models. 1202-1213 - Tingting Pan
, Junhong Zhao, Wei Wu, Jie Yang
:
Learning imbalanced datasets based on SMOTE and Gaussian distribution. 1214-1233 - Krishna Vyas
, Flavius Frasincar
:
Determining the most representative image on a Web page. 1234-1248 - Jin-Tao Gao
, Wenjie Liu, Zhanhuai Li, Jian Zhang, Li Shen:
A general fragments allocation method for join query in distributed database. 1249-1263 - Selen Ayas
, Murat Ekinci:
Single image super resolution using dictionary learning and sparse coding with multi-scale and multi-directional Gabor feature representation. 1264-1278 - Aminu Da'u
, Naomie Salim, Idris Rabiu
, Akram Osman
:
Recommendation system exploiting aspect-based opinion mining with deep learning method. 1279-1292 - Seunghan Lee
, Young-Jun Son
:
Extended decision field theory with social-learning for long-term decision-making processes in social networks. 1293-1307 - Junseok Kwon
:
Robust visual tracking based on variational auto-encoding Markov chain Monte Carlo. 1308-1323 - Mahla Mohammadzadeh Khadem, Yahya Forghani
:
A recursive algorithm to increase the speed of regression-based binary recommendation systems. 1324-1334 - Amir Mohammad Fathollahi Fard
, Mostafa Hajiaghaei-Keshteli
, Guangdong Tian, Zhiwu Li
:
An adaptive Lagrangian relaxation-based algorithm for a coordinated water supply and wastewater collection network design problem. 1335-1359 - Zhishan Dong, Shuangshuang Wang, Qun Liu
:
Spectral based hypothesis testing for community detection in complex networks. 1360-1371 - Hugo Manuel Proença
, Matthijs van Leeuwen
:
Interpretable multiclass classification by MDL-based rule lists. 1372-1393 - Peilan He, Guiyuan Jiang
, Siew-Kei Lam, Yidan Sun
:
Learning heterogeneous traffic patterns for travel time prediction of bus journeys. 1394-1406 - Linbo Luo, Xiangting Hou, Wentong Cai
, Bin Guo
:
Incremental route inference from low-sampling GPS data: An opportunistic approach to online map matching. 1407-1423 - Chang Li
, Yu Liu
, Juan Cheng, Rencheng Song
, Jiayi Ma, Chenhong Sui, Xun Chen:
Sparse unmixing of hyperspectral data with bandwise model. 1424-1441 - Yujun Chen, Ke Sun, Juhua Pu, Zhang Xiong, Xiangliang Zhang
:
GraPASA: Parametric graph embedding via siamese architecture. 1442-1457 - Adil Imad Eddine Hosni
, Kan Li, Sadique Ahmad
:
Minimizing rumor influence in multiplex online social networks based on human individual and social behaviors. 1458-1480 - Yingying Liang, Jindong Qin, Luis Martínez
, Jun Liu:
A heterogeneous QUALIFLEX method with criteria interaction for multi-criteria group decision making. 1481-1502 - Zahra Beheshti
:
A time-varying mirrored S-shaped transfer function for binary particle swarm optimization. 1503-1542 - Jia-Cai Liu
, Wen-Jian Zhao, Benjamin Lev
, Deng-Feng Li
, Jiuh-Biing Sheu, Yong-Wu Dai:
Novel equal division values based on players' excess vectors and their applications to logistics enterprise coalitions. 1543-1554 - Genghui Li
, Qiuzhen Lin
, Weifeng Gao:
Multifactorial optimization via explicit multipopulation evolutionary framework. 1555-1570 - Weijia Ju, Ling Chen, Bin Li, Wei Liu, Jun Sheng, Yuwei Wang:
A new algorithm for positive influence maximization in signed networks. 1571-1591 - Xiaohua Ge
, Qing-Long Han
, Xian-Ming Zhang
, Derui Ding
, Fuwen Yang
:
Resilient and secure remote monitoring for a class of cyber-physical systems against attacks. 1592-1605
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.