default search action
Information Sciences, Volume 479
Volume 479, April 2019
- Michal Witold Przewozniczek, Krzysztof Walkowiak, Arunabha Sen, Marcin Komarnicki, Piotr Lechowicz:
The transformation of the k-Shortest Steiner trees search problem into binary dynamic problem for effective evolutionary methods application. 1-19 - Yago Diez, Marta Fort, Matias Korman, Joan Antoni Sellarès:
Group evolution patterns in running races. 20-39 - Zhu Wang, Dong Wang, Wei Wang:
Distributed dynamic average consensus for nonlinear multi-agent systems in the presence of external disturbances over a directed graph. 40-54 - Jianxing Zheng, Suge Wang, Deyu Li, Bofeng Zhang:
Personalized recommendation based on hierarchical interest overlapping community. 55-75 - Md Mahmudur Rahman, Chowdhury Farhan Ahmed, Carson Kai-Sang Leung:
Mining weighted frequent sequences in uncertain databases. 76-100 - Kun Sun, Wenbing Tao:
A center-driven image set partition algorithm for efficient structure from motion. 101-115 - Shengmin Xu, Guomin Yang, Yi Mu:
Revocable attribute-based encryption with decryption key exposure resistance and ciphertext delegation. 116-134 - Diego García-Gil, Julián Luengo, Salvador García, Francisco Herrera:
Enabling Smart Data: Noise filtering in Big Data classification. 135-152 - Hongyang Yan, Zhe Chen, Chunfu Jia:
SSIR: Secure similarity image retrieval in IoT. 153-163 - Han Liu, Shyi-Ming Chen, Mihaela Cocea:
Heuristic target class selection for advancing performance of coverage-based rule learning. 164-179 - Yuchen Pan, Desheng Wu, Cuicui Luo, Alexandre Dolgui:
User activity measurement in rating-based online-to-offline (O2O) service recommendation. 180-196 - Yiming Lin, Hongzhi Wang, Jianzhong Li, Hong Gao:
Data source selection for information integration in big data era. 197-213 - Emmanuel Sirimal Silva, Hossein Hassani, Mansi Ghodsi, Zara Ghodsi:
Forecasting with auxiliary information in forecasts using multivariate singular spectrum analysis. 214-230 - Qintai Hu, Zhongmei Han, Xiaofan Lin, Qionghao Huang, Xiaomei Zhang:
Learning peer recommendation using attention-driven CNN with interaction tripartite graph. 231-249 - Liangtian He, Yilun Wang, Zhaoyin Xiang:
Support driven wavelet frame-based image deblurring. 250-269 - Yang Lu, Gang Wang, Jiguo Li:
Keyword guessing attacks on a public key encryption with keyword search scheme without random oracle and its improvement. 270-276 - Ronald R. Yager, Marek Z. Reformat, Nhuan D. To:
Drawing on the iPad to input fuzzy sets with an application to linguistic data science. 277-291 - Ya-Li Zhi, Yong He, Min Wu, Qingping Liu:
New results on dissipativity analysis of singular systems with time-varying delay. 292-300 - Manuel Jiménez, Isaac Triguero, Robert I. John:
Handling uncertainty in citizen science data: Towards an improved amateur-based large-scale classification. 301-320 - Parvin Rastegari, Mehdi Berenjkoub, Mohammad Dakhilalian, Willy Susilo:
Universal designated verifier signature scheme with non-delegatability in the standard model. 321-334 - Yan Ren, Wei Guan, Wanquan Liu, Jianhui Xi, Linlin Zhu:
Facial semantic descriptors based on information granules. 335-354 - Wen-Jun Chang, Chao Fu, Dong-Ling Xu, Min Xue:
Triangular bounded consistency of fuzzy preference relations. 355-371 - Xixun Yu, Zheng Yan, Rui Zhang:
Verifiable outsourced computation over encrypted data. 372-385 - Xiujuan Lei, Yuchen Zhang:
Predicting disease-genes based on network information loss and protein complexes in heterogeneous network. 386-400 - Jianchao Luo, Zhiqiang Liu, MengChu Zhou, Keyi Xing, Xinnian Wang, Xiaoling Li, Huixia Liu:
Robust deadlock control of automated manufacturing systems with multiple unreliable resources. 401-415
- Muhammad Sajjad, Mansoor Nasir, Fath U Min Ullah, Khan Muhammad, Arun Kumar Sangaiah, Sung Wook Baik:
Raspberry Pi assisted facial expression recognition framework for smart security in law-enforcement services. 416-431 - Daming Li, Lianbing Deng, Brij Bhooshan Gupta, Haoxiang Wang, Chang Choi:
A novel CNN based security guaranteed image watermarking generation scenario for smart city applications. 432-447 - Ugo Fiore, Alfredo De Santis, Francesca Perla, Paolo Zanetti, Francesco Palmieri:
Using generative adversarial networks for improving classification effectiveness in credit card fraud detection. 448-455 - Peiyuan Sun, Jianxin Li, Md. Zakirul Alam Bhuiyan, Lihong Wang, Bo Li:
Modeling and clustering attacker activities in IoT through machine learning techniques. 456-471 - Silvio Barra, Maria De Marsico, Michele Nappi, Fabio Narducci, Daniel Riccio:
A hand-based biometric system in visible light for mobile environments. 472-485 - Xiaobo Ma, Jianfeng Li, Yajuan Tang, Bo An, Xiaohong Guan:
Protecting internet infrastructure against link flooding attacks: A techno-economic perspective. 486-502 - Lu Zhou, Xin Sun, Chunhua Su, Zhe Liu, Kim-Kwang Raymond Choo:
Game theoretic security of quantum bit commitment. 503-514 - Qingchen Zhang, Laurence T. Yang, Arcangelo Castiglione, Zhikui Chen, Peng Li:
Secure weighted possibilistic c-means algorithm on cloud for clustering big data. 515-525 - Xi Xiao, Rui Li, Haitao Zheng, Runguo Ye, Arun Kumar Sangaiah, Shutao Xia:
Novel dynamic multiple classification system for network traffic. 526-541 - Durgadevi Velusamy, Pugalendhi GaneshKumar:
Fuzzy integrated Bayesian Dempster-Shafer theory to defend cross-layer heterogeneity attacks in communication network of Smart Grid. 542-566 - Yang Yang, Xianghan Zheng, Wenzhong Guo, Ximeng Liu, Victor Chang:
Privacy-preserving smart IoT-based healthcare big data storage and self-adaptive access control system. 567-592 - Fei Song, Yu-Tong Zhou, Yu Wang, Tianming Zhao, Ilsun You, Hongke Zhang:
Smart collaborative distribution for privacy enhancement in moving target defense. 593-606 - Bogdan Mocanu, Florin Pop, Alexandra Mihaita Mocanu, Ciprian Dobre, Aniello Castiglione:
Data fusion technique in SPIDER Peer-to-Peer networks in smart cities for security enhancements. 607-621 - Nadia Nedjah, Rafael Soares Wyant, Luiza de Macedo Mourelle, Brij B. Gupta:
Efficient fingerprint matching on smart cards for high security and privacy in smart systems. 622-639 - Liang Xue, Yong Yu, Yannan Li, Man Ho Au, Xiaojiang Du, Bo Yang:
Efficient attribute-based encryption with attribute revocation for assured data deletion. 640-650 - Bo Li, Yanyu Huang, Zheli Liu, Jin Li, Zhihong Tian, Siu-Ming Yiu:
HybridORAM: Practical oblivious cloud storage with constant bandwidth. 651-663 - Xiaoyu Zhang, Tao Jiang, Kuan-Ching Li, Aniello Castiglione, Xiaofeng Chen:
New publicly verifiable computation for batch matrix multiplication. 664-678
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.