949 | -- | 958 | Chao Tong, Xiang Yin 0004, Jun Li 0045, Tongyu Zhu, Renli Lv, Liang Sun, Joel J. P. C. Rodrigues. A shilling attack detector based on convolutional neural network for collaborative recommender system in social aware network |
959 | -- | 970 | Jieren Cheng, Jinghe Zhou, Qiang Liu 0004, Xiangyan Tang, Yanxiang Guo. A DDoS Detection Method for Socially Aware Networking Based on Forecasting Fusion Feature Sequence |
971 | -- | 986 | Noor Ullah, Xiangjie Kong, Liangtian Wan, Honglong Chen, Zhibo Wang, Feng Xia 0001. A Social Utility-Based Dissemination Scheme for Emergency Warning Messages in Vehicular Social Networks |
987 | -- | 997 | Jiaqi Wang, Yunyao Lu, Xiaojie Wang, Jing Dong, Xiping Hu. SAR: A Social-Aware Route Recommendation System for Intelligent Transportation |
998 | -- | 1014 | Mostafa Haghir Chehreghani, Albert Bifet, Talel Abdessalem. Discriminative Distance-Based Network Indices with Application to Link Prediction |
1015 | -- | 1037 | Xiaogang Fu, Jianyong Sun. Reference-Inspired Many-Objective Evolutionary Algorithm Based on Decomposition |
1038 | -- | 1063 | Alexey Stakhov. Mission-Critical Systems, Paradox of Hamming Code, Row Hammer Effect, 'Trojan Horse' of the Binary System and Numeral Systems with Irrational Bases |
1064 | -- | 1074 | Yonghong Hou, Lin Xue, Shuo Li 0003, Jiaming Xing. User-Experience-Oriented Fuzzy Logic Controller for Adaptive Streaming |
1075 | -- | 1098 | Wassim Derguech, Sami Bhiri, Edward Curry. Using Ontologies for Business Capability modelling: Describing What Services and Processes Achieve |
1099 | -- | 1108 | C. Harriet Linda, G. Wiselin Jiji. Hierarchical Approach to Detect Fractures in CT DICOM Images |