| 2209 | -- | 2219 | Gang Xue, Shifeng Liu 0001, Yicao Ma. A hybrid deep learning-based fruit classification using attention model and convolution autoencoder |
| 2221 | -- | 2235 | Hao Zhang, Yuxin Shi, Bin Qiu. Applying catastrophe progression method to evaluate the service quality of cold chain logistics |
| 2237 | -- | 2248 | Jikai Huang, Xianliang Shi. Solving the location problem of front distribution center for omni-channel retailing |
| 2249 | -- | 2256 | Yan Yan, Xinyue Di, Yuanyuan Zhang. Optimization-driven distribution of relief materials in emergency disasters |
| 2257 | -- | 2270 | Yinyun Yu, CongDong Li. Evaluate the priority of product design factors in the process of complex product innovation |
| 2271 | -- | 2284 | Hongrui Chu, Wensi Zhang, Pengfei Bai, Yahong Chen. Data-driven optimization for last-mile delivery |
| 2285 | -- | 2295 | Li Jiang-ning, Shi Xian Liang, Huang An-qiang, He Ze-fang, Kang Yu-xuan, Li Dong. Forecasting emergency medicine reserve demand with a novel decomposition-ensemble methodology |
| 2297 | -- | 2312 | Lijuan Huang, Guojie Xie 0001, Wende Zhao, Yan Gu, Yi Huang. Regional logistics demand forecasting: a BP neural network approach |
| 2313 | -- | 2320 | Haiju Hu, Yonghui Wei, Yu Zhou. Product-harm crisis intelligent warning system design based on fine-grained sentiment analysis of automobile complaints |
| 2321 | -- | 2332 | Ying Qiu, Meng Shi, Xinna Zhao, Yongping Jing. System dynamics mechanism of cross-regional collaborative dispatch of emergency supplies based on multi-agent game |
| 2333 | -- | 2349 | Ruijian Liu, Fangcheng Tang, Yuhan Wang, Shaofang Zheng. A modified NK algorithm based on BP neural network and DEMATEL for evolution path optimization of urban innovation ecosystem |
| 2351 | -- | 2359 | Hua He. Integration of manufacturing and pricing for downward substitution products decision-making |
| 2361 | -- | 2378 | Jun Zhang, Linze Li, Jing Zhang, Liping Chen, Guojiao Chen. Private-label sustainable supplier selection using a fuzzy entropy-VIKOR-based approach |
| 2379 | -- | 2391 | Huawei Duan, Yusen Ye, Zheng Lei, Mengting Wang. Express delivery logistics with high-speed railway: a perspective of payment scheme and forecast information sharing |
| 2393 | -- | 2411 | Changsong Ma, Tiantong Yuan, Zhong Lei, Liu Wei. Production decision-making system for manufacturing enterprises constrained by carbon reduction policies |
| 2413 | -- | 2428 | Yingzhen Cai, Lan Bai, Fan Jiang, Shi Yin. Subsidy strategy of sharing logistics platform |
| 2429 | -- | 2445 | Jie Guo, Yanli Guo. Optimal coordination and service level of the supply chain in the sharing economy: the perspective of social responsibility |
| 2447 | -- | 2458 | Changsuo Sun, Long Ye, Na Zhang. O2O selection mode portrait and optimization for railway service enterprises based on K-means |
| 2459 | -- | 2473 | Qianqian Zhang 0006, Shifeng Liu 0001, Qun Tu. Knowledge organization of node enterprises' technological innovation under supply chain environment |
| 2475 | -- | 2490 | Zhiguo Wu, Juliang Zhang 0001. A branch-and-price algorithm for two-echelon electric vehicle routing problem |
| 2491 | -- | 2508 | Hongguang Wu, Yuelin Gao, Wanting Wang, Ziyu Zhang. A hybrid ant colony algorithm based on multiple strategies for the vehicle routing problem with time windows |
| 2509 | -- | 2520 | Yadong Li, Xuemei Li. Quantity decisions of two-stage competitive location model based on different location modes |
| 2521 | -- | 2539 | Qiu Heting, Shuihai Dou, Shang Huayan, Zhang Jun. Charging station planning based on the accumulation prospect theory and dynamic user equilibrium |
| 2541 | -- | 2553 | Zhaohua Wang, Xuewei Li, Xin Zhu 0002, Jing Li 0084, Fan Wang, Fei Wang. Big data-driven public transportation network: a simulation approach |
| 2555 | -- | 2569 | Fan Xiong, Dongyi Chen. CEEMDAN-IMFx-PCA-CICA: an improved single-channel blind source separation in multimedia environment for motion artifact reduction in ambulatory ECG |
| 2571 | -- | 2583 | Ke Ma, Beibei Jiang. Voice of urban park visitors: exploring destination attributes influencing behavioural intentions through online review mining |
| 2585 | -- | 2597 | Lu Liu 0007, Dingyu Xue, Shuo Zhang 0002. General type industrial temperature system control based on fuzzy fractional-order PID controller |
| 2599 | -- | 2611 | Mersha Bemnet Wondimagegnehu, David N. Jansen, Hongbin Ma. Angle of attack prediction using recurrent neural networks in flight conditions with faulty sensors in the case of F-16 fighter jet |
| 2613 | -- | 2627 | Yihua Lan, Fang Li, Zijun Li, Binglei Yue, Yin Zhang 0002. Intelligent IoT-based large-scale inverse planning system considering postmodulation factors |
| 2629 | -- | 2649 | Bakkiam David Deebak, Fadi M. Al-Turjman. Secure-user sign-in authentication for IoT-based eHealth systems |
| 2651 | -- | 2664 | G. Kalyani, B. Janakiramaiah 0001, Arava Karuna, L. V. Narasimha Prasad. Diabetic retinopathy detection and classification using capsule networks |
| 2665 | -- | 2683 | Muhammad Attique Khan, Seifedine Nimer Kadry, Pritee Parwekar, Robertas Damasevicius, Asif Mehmood, Junaid Ali Khan, Syed Rameez Naqvi. Human gait analysis for osteoarthritis prediction: a framework of deep learning and kernel extreme learning machine |
| 2685 | -- | 2698 | Manisha Jangra, Sanjeev Kumar Dhull, Krishna Kant Singh, Akansha Singh, Xiaochun Cheng. O-WCNN: an optimized integration of spatial and spectral feature map for arrhythmia classification |
| 2699 | -- | 2711 | Yung-Yao Chen, Yu-Chen Hu, Hsiang-Yun Kao, Yu-Hsiu Lin. Security for eHealth system: data hiding in AMBTC compressed images via gradient-based coding |
| 2713 | -- | 2745 | K. A. Saneera Hemantha Kulathilake, Nor Aniza Abdullah, Aznul Qalid Md Sabri, Khin Wee Lai. A review on Deep Learning approaches for low-dose Computed Tomography restoration |
| 2747 | -- | 2758 | Chen Zhao 0022, Joyce H. Keyak, Jinshan Tang, Tadashi S. Kaneko, Sundeep Khosla, Shreyasee Amin, Elizabeth J. Atkinson, Lan-Juan Zhao, Michael J. Serou, Chaoyang Zhang, Hui Shen 0007, Hong-Wen Deng, Weihua Zhou. ST-V-Net: incorporating shape prior into convolutional neural networks for proximal femur segmentation |
| 2759 | -- | 2772 | O. P. Singh, A. K. Singh. Data hiding in encryption-compression domain |
| 2773 | -- | 2799 | Ayesha Rashid, Muhammad Shoaib Farooq 0001, Adnan Abid, Tariq Umer, Ali Kashif Bashir, Yousaf Bin Zikria. Social media intention mining for sustainable information systems: categories, taxonomy, datasets and challenges |
| 2801 | -- | 2812 | Kun Wang, Xiaofeng Wang, Xuan Lu. POI recommendation method using LSTM-attention in LBSN considering privacy protection |
| 2813 | -- | 2826 | Shashi Shekhar 0001, Hitendra Garg, Rohit Agrawal, Shivendra Shivani, Bhisham Sharma. Hatred and trolling detection transliteration framework using hierarchical LSTM in code-mixed social media text |
| 2827 | -- | 2842 | Jana Papcunová, Marcel Martoncik, Denisa Fedáková, Michal Kentos, Miroslava Bozogánová, Ivan Srba, Róbert Móro, Matús Pikuliak, Marián Simko, Matús Adamkovic. Hate speech operationalization: a preliminary examination of hate speech indicators and their structure |
| 2843 | -- | 2863 | Dilip Kumar Sharma, Sonal Garg. IFND: a benchmark dataset for fake news detection |
| 2865 | -- | 2877 | Xue Zhai, Shanchen Pang, Min Wang 0026, Sibo Qiao, Zhihan Lv. TVS: a trusted verification scheme for office documents based on blockchain |
| 2879 | -- | 2891 | Shankar Biradar, Sunil Saumya, Arun Chauhan 0002. Combating the infodemic: COVID-19 induced fake news recognition in social media networks |
| 2893 | -- | 2914 | José Antonio García-Díaz, Salud María Jiménez Zafra, Miguel Ángel García Cumbreras, Rafael Valencia-García. Evaluating feature combination strategies for hate-speech detection in Spanish using linguistic features and transformers |
| 2915 | -- | 2928 | Dilip Venkata Kumar Vengala, D. Kavitha, A. P. Siva Kumar. Three factor authentication system with modified ECC based secured data transfer: untrusted cloud environment |
| 2929 | -- | 2942 | Li Yang, Xinxin Niu. A genre trust model for defending shilling attacks in recommender systems |
| 2943 | -- | 2955 | M. Jalasri, L. Lakshmanan. Code-based encryption techniques with distributed cluster head and energy consumption routing protocol |
| 2957 | -- | 0 | Abdulmajeed Alsufyani, Youseef Alotaibi, Alaa Omran Almagrabi, Saleh Ahmed Alghamdi, Nawal Alsufyani. RETRACTED ARTICLE: Optimized intelligent data management framework for a cyber-physical system for computational applications |
| 2959 | -- | 2967 | V. Nandan, R. Gowri Shankar Rao. Low-power AES S-box design using dual-basis tower field extension method for cyber security applications |
| 2969 | -- | 2980 | Aijun Liu, Rajendra Prasad Mahapatra, A. V. R. Mayuri. Hybrid design for sports data visualization using AI and big data analytics |
| 2981 | -- | 2991 | Shaji K. A. Theodore, K. Rajiv Gandhi, V. Palanisamy. A novel lightweight authentication and privacy-preserving protocol for vehicular ad hoc networks |
| 2993 | -- | 3010 | Zhichao Cheng, Xinyang Liu. Establishment of the model on the expression and guidance of contemporary college students' demands in the cyberspace environment |
| 3011 | -- | 3021 | Sridhar Mandapati, Seifedine Kadry 0001, R. Lakshmana Kumar, Krongkarn Sutham, Orawit Thinnukool. Deep learning model construction for a semi-supervised classification with feature learning |
| 3023 | -- | 3041 | Sidrah Abdullah, Junaid Arshad, Muhammad Mubashir Khan, Mamoun Alazab, Khaled Salah 0001. PRISED tangle: a privacy-aware framework for smart healthcare data sharing using IOTA tangle |
| 3043 | -- | 3070 | Umer Ahmed Butt, Rashid Amin, Hamza Aldabbas, Senthilkumar Mohan, Bader Alouffi, Ali Ahmadian. Cloud-based email phishing attack using machine and deep learning algorithm |
| 3071 | -- | 3083 | Lixin Zhou, Zhenyu Zhang, Laijun Zhao, Pingle Yang. Microblog sentiment analysis based on deep memory network with structural attention |
| 3085 | -- | 3105 | Jinyu Zhang 0001, Yumeng Yang, Deyu Zhao, Yue Wang. A node selection algorithm with a genetic method based on PBFT in consortium blockchains |
| 3107 | -- | 3114 | Muhammad Aslam 0002. Truncated variable algorithm using DUS-neutrosophic Weibull distribution |
| 3115 | -- | 3130 | Sameh Abd-Elhaleem, Walaa Shoeib, Abdel Azim Sobaih. RETRACTED ARTICLE: Intelligent power management based on multi-objective cost function for plug-in biogas hybrid vehicles under uncertain driving conditions |
| 3131 | -- | 3146 | Xiang Xu, Xianqiang Zhu, Cheng Zhu. GAN-based deep learning framework of network reconstruction |
| 3147 | -- | 3159 | Jun Tang, Baodi Liu, Wenhui Guo, Yanjiang Wang 0001. Two-stream temporal enhanced Fisher vector encoding for skeleton-based action recognition |
| 3161 | -- | 3183 | Sushil Kumar, Rishitosh Kumar Singh, Aryan Chaudhary. A novel non-linear neuron model based on multiplicative aggregation in quaternionic domain |
| 3185 | -- | 3210 | Xin Dong, Zeeshan Ali, Tahir Mahmood 0002, Peide Liu. Yager aggregation operators based on complex interval-valued q-rung orthopair fuzzy information and their application in decision making |
| 3211 | -- | 3228 | Qingqing Liu, Xianpeng Wang, Yao Wang, Xiangman Song. Evolutionary convolutional neural network for image classification based on multi-objective genetic programming with leader-follower mechanism |
| 3229 | -- | 3248 | Herui Heng, Peiji Li, Tuxin Guan, Tianyu Yang. Scene text recognition via context modeling for low-quality image in logistics industry |
| 3249 | -- | 3260 | Shuyang Liu, Yuanchun Li 0002. Dynamic modeling and infinite-dimensional observer-based control for manipulation of flexible beam by a multi-link robot |
| 3261 | -- | 3276 | Junwen Zhang, Xiaolong Zhang, Ziqi Zhu, Chunhua Deng. Efficient combination graph model based on conditional random field for online multi-object tracking |
| 3277 | -- | 3300 | Chonghuan Xu, Xinyao Mei, Dongsheng Liu, Kaidi Zhao, Austin Shijun Ding. An efficient privacy-preserving point-of-interest recommendation model based on local differential privacy |
| 3301 | -- | 3312 | Qian Xiao, Zongmin Li, Xiangdong Wang, Yujie Liu, Yachuan Li, Chaozhi Yang, Feimo Li. Policy decision of curling in real competition scenes |
| 3313 | -- | 3331 | Liang Fan, Handing Wang. Surrogate-assisted evolutionary neural architecture search with network embedding |
| 3333 | -- | 3354 | Iman Mohamad Sharaf. The differential measure for Pythagorean fuzzy multiple criteria group decision-making |
| 3355 | -- | 3366 | Xia Xue, Xia Sun, Hongyu Wang, Hao Zhang, Jun Feng. Neural network fusion with fine-grained adaptation learning for turnover prediction |
| 3367 | -- | 3384 | Qingqing Liu, Xianpeng Wang 0002, Xiangman Song. Two-stage hybrid algorithm for recognition of industrial slab numbers with data quality improvement |
| 3385 | -- | 3398 | Jun-Xian Chen, Yue-jiao Gong, Wei-neng Chen, Xiaolin Xiao. Adaptive encoding-based evolutionary approach for Chinese document clustering |
| 3399 | -- | 3408 | Shimin Xiong, Bin Li 0004, Shiao Zhu. DCGNN: a single-stage 3D object detection network based on density clustering and graph neural network |
| 3409 | -- | 3428 | Cheng Zhang, Jin Wang 0015, Ting Yan, Xiaohui Lu, Guodong Lu, Xiaolin Tang, Bincheng Huang. An instance-based deep transfer learning method for quality identification of Longjing tea from multiple geographical origins |
| 3429 | -- | 3468 | Xuesong Wu 0002, Ye Du 0001, Tao Fan 0001, Junyan Guo, Jie Ren, Runfang Wu, Tianshuai Zheng. Threat analysis for space information network based on network security attributes: a review |
| 3469 | -- | 0 | Man-Chung Yuen, Sin Chun Ng, Man-Fai Leung, Hangjun Che. Correction to: A metaheuristic-based framework for index tracking with practical constraints |
| 3471 | -- | 0 | R. Udendhran, M. Balamurugan. Retraction Note: Towards secure deep learning architecture for smart farming-based applications |