Journal: Connect. Sci.

Volume 33, Issue 4

0 -- 0. RETRACTED ARTICLE: Cloud enabled robust authenticated key agreement scheme for telecare medical information system
803 -- 834Alfred Adutwum Amponsah, Fei Han 0001, Jeremiah Osei-Kwakye, Ernest Bonah, Qing-Hua Ling. An improved multi-leader comprehensive learning particle swarm optimisation based on gravitational search algorithm
835 -- 853Chin-Chen Chang 0001, Ji-Hwei Horng, Chia-Shou Shih, Xu Wang 0027. VQ-oriented data hiding based on adjustable error compensation strategy
854 -- 869Liqing Qiu, Shiqi Sai, Xiangbo Tian. TsFSIM: a three-step fast selection algorithm for influence maximisation in social network
870 -- 890Bing Tang, Mingdong Tang, Yanmin Xia, Meng-Yen Hsieh. Composition pattern-aware web service recommendation based on depth factorisation machine
891 -- 910Yonghui Dai, Tao Wang. Prediction of customer engagement behaviour response to marketing posts based on machine learning
911 -- 928Zixuan Cao, Yongmei Zhou, Aimin Yang, Sancheng Peng. Deep transfer learning mechanism for fine-grained cross-domain sentiment classification
929 -- 953Fuqing Zhao, Songlin Du, Hao Lu, Weimin Ma, Houbin Song. A hybrid self-adaptive invasive weed algorithm with differential evolution
954 -- 974Rohit Daid, Yogesh Kumar, Yu-Chen Hu, Wu-Lin Chen. An effective scheduling in data centres for efficient CPU usage and service level agreement fulfilment using machine learning
975 -- 994Kaimeng Chen, Chin-Chen Chang 0001. High-capacity separable reversible data-Hiding method in encrypted images based on block-level encryption and Huffman compression coding
995 -- 1010Qian Wang, Xiang Li, Qiaoying Liu. Empirical research of accounting conservatism, corporate governance and stock price collapse risk based on panel data model
1011 -- 1027Song Honglian, K. Deepa Thilak, Tamizharasi G. Seetharam. Research on plantar pressure dynamic distribution characteristics of samba step movements based on biomechanics
1028 -- 1046Huifeng Wang, Achyut Shankar, G. N. Vivekananda. Modelling and simulation of sprinters' health promotion strategy based on sports biomechanics
1047 -- 1059Dongmei Wang. Simulation research on safety detection of pattern rope jumping motion based on large data background
1060 -- 1076Jiale Zhang, Zhen Cheng, Xiang Cheng, Bing Chen. OAC-HAS: outsourced access control with hidden access structures in fog-enhanced IoT systems
1077 -- 1093Nektaria Potha, Vasileios Kouliaridis, Georgios Kambourakis. An extrinsic random-based ensemble approach for android malware detection
1094 -- 1115Honghan Ji, Hongjie Zhang, Lisong Shao, Debiao He, Min Luo 0002. An efficient attribute-based encryption scheme based on SM9 encryption algorithm for dispatching and control cloud
1116 -- 1137Yihui Dong, Jian Shen, Sai Ji, Rongxin Qi, Shuai Liu. A novel appliance-based secure data aggregation scheme for bill generation and demand management in smart grids

Volume 33, Issue 3

407 -- 426Yang Li, Xinzhi Wang, Wei Wang, Zhenyu Zhang, Jianshu Wang, Xiangfeng Luo, Shaorong Xie. Learning adversarial policy in multiple scenes environment via multi-agent reinforcement learning
427 -- 446Feng Chang, Liang Ge, Siyu Li, Kunyan Wu, Yaqian Wang. Self-adaptive spatial-temporal network based on heterogeneous data for air quality prediction
447 -- 462Zuoting Ning, Weiqi Shi, Lijun Xiao, Wei Liang 0005, Tien-hsiung Weng. A novel approach for anti-pollution attacks in network coding
463 -- 481Lei Yu, Yucong Duan, Kuan-Ching Li. A real-world service mashup platform based on data integration, information synthesis, and knowledge fusion
482 -- 494Tzyy-Chyang Lu. CNN Convolutional layer optimisation based on quantum evolutionary algorithm
495 -- 514Hengxiao Chi, Chin-Chen Chang, Yanjun Liu 0002. An SMVQ compressed data hiding scheme based on multiple linear regression prediction
515 -- 531Xiao-Zhu Xie, Chin-Chen Chang 0001, Ji-Hwei Horng. An EMD-based data hiding scheme for JPEG images
532 -- 554Shaik Shakeel Ahamad, Al-Sakib Khan Pathan. A formally verified authentication protocol in secure framework for mobile healthcare during COVID-19-like pandemic
555 -- 575Shiwen Zhang, Tingting Yao, Voundi Koe Arthur Sandor, Tien-hsiung Weng, Wei Liang 0005, Jinshu Su. A novel blockchain-based privacy-preserving framework for online social networks
576 -- 604Xiaotong Wu, Jiaquan Gao, Genlin Ji, Taotao Wu, Yuan Tian 0003, Najla Al-Nabhan. A feature-based intelligent deduplication compression system with extreme resemblance detection
605 -- 622Dingchao Jiang, Hua Qu, Ji-hong Zhao 0001, Jianlong Zhao, Meng-Yen Hsieh. Aggregating multi-scale contextual features from multiple stages for semantic image segmentation
623 -- 644Arko Banerjee, Arun K. Pujari, Chhabi Rani Panigrahi, Bibudhendu Pati, Suvendu Chandan Nayak, Tien-hsiung Weng. A new method for weighted ensemble clustering and coupled ensemble selection
645 -- 673Sk. Meeravali, Debnath Bhattacharyya, Thirupathi Rao N., Yu-Chen Hu. Performance analysis of an improved forked communication network model
674 -- 692Zoltan Geler, Milos Savic 0001, Brankica Bratic, Vladimir Kurbalija, Mirjana Ivanovic, Weihui Dai. Sentiment prediction based on analysis of customers assessments in food serving businesses
693 -- 718Pritom Kumar Mondal, Lizeth P. Aguirre Sanchez, Emmanuele Benedetto, Yao Shen, Minyi Guo. A dynamic network traffic classifier using supervised ML for a Docker-based SDN network
719 -- 734Liu Ying, Zhang Qian Nan, Wang Fu Ping, Tuan Kiang Chiew, Keng Pang Lim, Zhang Heng Chang, Chao Lu, Lu Guo Jun, Nam Ling. Adaptive weights learning in CNN feature fusion for crime scene investigation image classification
735 -- 752Dacheng He, Dafang Zhang, Yanbiao Li, Wei Liang 0005, Meng-Yen Hsieh. An efficient and DoS-resilient name lookup for NDN interest forwarding
753 -- 768Jianlong Xu, Lijun Xiao, Yuhui Li, Mingwei Huang, Zicong Zhuang, Tien-hsiung Weng, Wei Liang 0005. NFMF: neural fusion matrix factorisation for QoS prediction in service selection
769 -- 785Lijun Xiao, Songyou Xie, Dezhi Han, Wei Liang 0005, Jun Guo, Wen-Kuang Chou. A lightweight authentication scheme for telecare medical information system
786 -- 801Gianni D'Angelo, Francesco Palmieri 0002, Antonio Robustelli, Arcangelo Castiglione. Effective classification of android malware families through dynamic features and neural networks

Volume 33, Issue 2

113 -- 135Jiajia Jiao, Libao Wang, Yanxiang Li, Dezhi Han, Min Yao, Kuan-Ching Li, Hai Jiang 0003. CASH: correlation-aware scheduling to mitigate soft error impact on heterogeneous multicores
136 -- 152Yan Jiang, Wei Liang 0005, Jintian Tang, Hongbo Zhou 0012, Kuan-Ching Li, Jean-Luc Gaudiot. A novel data representation framework based on nonnegative manifold regularisation
153 -- 172Qiaoyun Wang, Guangli Zhu, Shunxiang Zhang, Kuan-Ching Li, Xiang Chen, Hanqing Xu. Extending emotional lexicon for improving the classification accuracy of Chinese film reviews
173 -- 200Hang Zhao, Linbin Yao, Zhixin Zeng, Donghua Li, Jinliang Xie, Weiling Zhu, Jie Tang 0003. An edge streaming data processing framework for autonomous driving
201 -- 218Jie Zhao, Yutong Song, Fan Liu, Yong Deng 0001. The identification of influential nodes based on structure similarity
219 -- 236Shuying Xu, Chin-Chen Chang 0001, Yanjun Liu 0002. A novel image compression technology based on vector quantisation and linear regression prediction
237 -- 255Ying Liu 0026, Qiqi Liu, Jiulun Fan 0001, Fuping Wang, Fu Jianlong, Yuan Qingan, Tuan Kiang Chiew, Nam Ling. Tyre pattern image retrieval - current status and challenges
256 -- 277Alireza Khanteymoori, Fatemeh Alamdar, Farzaneh Ghorbani. ARP: asexual reproduction programming
278 -- 295Prativa Das, Satish Chand. Extracting road maps from high-resolution satellite imagery using refined DSE-LinkNet
296 -- 320Casper Hesp, Bram T. Heerebout, R. Hans Phaf. Evolutionary computation for bottom-up hypothesis generation on emotion and communication
321 -- 340Ping Gao, Xiaolun Wang, Hong Chen, Weihui Dai, Hong Ling. What is beautiful is not always good: influence of machine learning-derived photo attractiveness on intention to initiate social interactions in mobile dating applications
341 -- 358Qiang Wu, Baixue Zhu, Binbin Yong, Yongqiang Wei, XueTao Jiang, Rui Zhou 0005, Qingguo Zhou. ClothGAN: generation of fashionable Dunhuang clothes using generative adversarial networks
359 -- 379Yi-xi Xie, Li-Xin Ji, Ling-shu Li, Zehua Guo 0001, Thar Baker. An adaptive defense mechanism to prevent advanced persistent threats
380 -- 405Elizabeth B. Varghese, Sabu M. Thampi. Towards the cognitive and psychological perspectives of crowd behaviour: a vision-based analysis

Volume 33, Issue 1

1 -- 25Ao Liu, Peng Li, Xudong Deng, Liang Ren. A sigmoid attractiveness based improved firefly algorithm and its applications in IIR filter design
26 -- 41Weihua Liu, Erh-Wen Hu, Bogong Su, Jian Wang 0046. Using machine learning techniques for DSP software performance prediction at source code level
42 -- 61Junjie Hu, Zhanquan Wang, Jiequan Chen, Yonghui Dai. A community partitioning algorithm based on network enhancement
62 -- 80Xiaoyan Kui, Jiannan Feng, Xinran Zhou, Huakun Du, Xia Deng, Ping Zhong, Xingpo Ma. Securing top-k query processing in two-tiered sensor networks
81 -- 94Yaming Zhang, Fei Liu, Yaya Hamadou Koura, Hao Wang. Analysing rumours spreading considering self-purification mechanism
95 -- 112Tingting Xiao, Dezhi Han, Junhui He, Kuan-Ching Li, Rodrigo Fernandes de Mello. Multi-Keyword ranked search based on mapping set matching in cloud ciphertext storage system