309 | -- | 312 | Yang Li 0111, Xuewei Chao, Sezai Ercisli. Disturbed-entropy: A simple data quality assessment approach |
313 | -- | 321 | Mohammad Wazid, Ashok Kumar Das, Vinay Chamola, Youngho Park 0005. Uniting cyber security and machine learning: Advantages, challenges and future research |
322 | -- | 327 | Nianyi Wang, Jing Nie, Jingbin Li, Kang Wang, ShunKang Ling. A compression strategy to accelerate LSTM meta-learning on FPGA |
328 | -- | 333 | Aurora González-Vidal, Alfonso P. Ramallo-González, Antonio F. Skarmeta. Intrinsic and extrinsic quality of data for open data repositories |
334 | -- | 339 | Sangmi Moon, Young-Hwan You, Cheol Hong Kim, Intae Hwang. Multitask learning-based secure transmission for reconfigurable intelligent surface-aided wireless communications |
340 | -- | 346 | Ramesh T. R., Vijayaragavan M., M. Poongodi, Mounir Hamdi, Huihui Wang, Sami Bourouis. Peer-to-peer trust management in intelligent transportation system: An Aumann's agreement theorem based approach |
347 | -- | 351 | Naili Suri Inthizami, M. Anwar Ma'sum, Machmud Roby Alhamidi, Ahmad Gamal, Ronni Ardhianto, Kurnianingsih, Wisnu Jatmiko. Flood video segmentation on remotely sensed UAV using improved Efficient Neural Network |
352 | -- | 356 | Dongjie Liu, Jong-Hyouk Lee. CFLedger: Preventing chargeback fraud with blockchain |
357 | -- | 362 | Mohammed Asim, Adnan Rashid, Tanvir Ahmad. Scour modeling using deep neural networks based on hyperparameter optimization |
363 | -- | 370 | Seeung Oh, Younho Seong, Sun Yi, Sangsung Park. Investigation of human trust by identifying stimulated brain regions using electroencephalogram |
371 | -- | 378 | Kishore Medhi, Nurzaman Ahmed, Md. Iftekhar Hussain. Dew-based offline computing architecture for healthcare IoT |
379 | -- | 387 | Karishma Pawar, Vahida Attar. Deep learning based detection and localization of road accidents from traffic surveillance videos |
388 | -- | 395 | L. Balaji, A. Dhanalakshmi, Chandrasekaran Raja. Scalable extension of HEVC with adaptive de-blocking filter for bandwidth-limited applications |
396 | -- | 408 | I. Kadek Sastrawan, I Putu Agung Bayupati, Dewa Made Sri Arsa. Detection of fake news using deep learning CNN-RNN based methods |
409 | -- | 413 | Haseong Kim, Hyunjee Lee, Hosung Park. Distributed CRC scheme for low-complexity successive cancellation flip decoding of polar codes |
414 | -- | 418 | Suseela Vappangi, Venkata Vakamulla Mani. Impact of STO and STO-estimation in DST-DCO-OFDM-based visible light communication systems |
419 | -- | 423 | Jeong Seon Yeom, Kab Seok Ko, Hu Jin, Bang Chul Jung. Performance analysis of physical-layer network coding with QPSK modulation in wireless IoT networks |
424 | -- | 431 | Sharfah Ratibah Tuan Mat, Mohd Faizal Ab Razak, Mohd Nizam Mohmad Kahar, Juliza Mohamad Arif, Ahmad Firdaus. A Bayesian probability model for Android malware detection |
432 | -- | 437 | Soyi Jung, Moon-Sik Lee, Jihyung Kim, Mi-Young Yun, Joongheon Kim, Jae-Hyun Kim. Trustworthy handover in LEO satellite mobile networks |
438 | -- | 443 | Minsik Kim, Daeyoung Park. Rate-energy region of MIMO systems with sustainable intelligent reflecting surface |
444 | -- | 462 | Shinho Lee, Wookhyun Jung, Wonrak Lee, Hyung-Geun Oh, Eui Tak Kim. Android malware dataset construction methodology to minimize bias-variance tradeoff |
463 | -- | 467 | Julius Beneoluchi Odili, A. Noraziah, Asegunloluwa Eunice Babalola. A new fitness function for tuning parameters of Peripheral Integral Derivative Controllers |
468 | -- | 472 | Usman Ali 0006, Muhammad Tariq Mahmood. Improving defocus blur measures using robust regularization |
473 | -- | 478 | Jinho Choi 0001, Moldir Yerzhanova, Jihong Park, Yun Hee Kim. Deep learning driven beam selection for orthogonal beamforming with limited feedback |
479 | -- | 483 | DongSu Lee, Minhae Kwon. ADAS-RL: Safety learning approach for stable autonomous driving |