1255 | -- | 1257 | Mohammed Atiquzzaman, Jin Li 0002, Witold Pedrycz. Special issue on new advanced techniques in security of artificial intelligence |
1259 | -- | 1267 | Wei Gao, Li Yan, Yingfang Li, Bo Yang. Network performance analysis from binding number prospect |
1269 | -- | 1277 | Aramesh Rezaeian, Marzieh Rezaeian, Seyede Fatemeh Khatami, Fatemeh Khorashadizadeh, Farshid Pouralizadeh Moghaddam. Prediction of mortality of premature neonates using neural network and logistic regression |
1279 | -- | 1291 | Wei Zhang 0192, Xianzhong Gao, Chifu Yang, Feng Jiang 0001, Zhi-Yuan Chen. A object detection and tracking method for security in intelligence of unmanned surface vehicles |
1293 | -- | 1305 | Juan Wang, Meng Wang 0032, Qingling Liu, Guanxiang Yin, Yuejin Zhang. Deep anomaly detection in expressway based on edge computing and deep learning |
1307 | -- | 1319 | Meng Wang 0032, Tong Chen, Fei Du, Juan Wang, Guanxiang Yin, Yuejin Zhang. Research on adaptive beacon message transmission power in VANETs |
1321 | -- | 1337 | Shaomin Tang, Guixiong Liu, Zhiyu Lin, Xiaobing Li. Multi-station test scheduling optimization method for industrial robot servo system |
1339 | -- | 1352 | Yanli Wang, Yilei Wang, Zhaojie Wang, Guoyu Yang, Xiaomei Yu. Research cooperations of blockchain: toward the view of complexity network |
1353 | -- | 1362 | Fengyin Li, Zhongxing Liu, Yilei Wang, Nan Wu, Jiguo Yu, Chongzhi Gao, Huiyu Zhou 0001. Aitac: an identity-based traceable anonymous communication model |
1363 | -- | 1372 | Xinyu Zhang, Yujun Liu, Yuling Chen. A new entropic criterion model in rational secure two-party computation |
1373 | -- | 1382 | Xiajiong Shen, Jiyong Yang, Lei Zhang 0115, Geying Yang. An interactive role learning and discovery model for multi-department RBAC building based on attribute exploration |
1383 | -- | 1396 | Ming Wan, Jinfang Li, Kai Wang 0014, BaiLing Wang. Anomaly detection for industrial control operations with optimized ABC-SVM and weighted function code correlation analysis |
1397 | -- | 1404 | Xiao Sun, Jindong Xu, Yongli Ma, Tianyu Zhao, Shifeng Ou, Lizhi Peng. Blind image separation based on attentional generative adversarial network |
1405 | -- | 1417 | Xinying Yu, Fengyin Li, Tao Li, Nan Wu, Hua Wang, Huiyu Zhou 0001. Trust-based secure directed diffusion routing protocol in WSN |
1419 | -- | 1429 | Hongwei Ye, Xiaozhang Liu, Chunlai Li. DSCAE: a denoising sparse convolutional autoencoder defense against adversarial examples |
1431 | -- | 1441 | Gang Han, Tiantian Zhang, Yinghui Zhang, Guowen Xu, Jianfei Sun, Jin Cao. Verifiable and privacy preserving federated learning without fully trusted centers |
1443 | -- | 1450 | Xiao Sun, Jindong Xu, Yongli Ma, Tianyu Zhao, Shifeng Ou. Single-channel blind source separation based on attentional generative adversarial network |
1451 | -- | 1461 | Shuzhuang Zhang, Yaning Zhang, Min Zhou, Lizhi Peng. Community detection based on similarities of communication behavior in IP networks |
1463 | -- | 1470 | Ling Zhang, Wenchao Jiang, Wen Xiang. Dictionary learning based on structural self-similarity and convolution neural network |
1471 | -- | 1484 | B. M. Pampapathi, M. Nageswara Guptha, M. S. Hema. Data distribution and secure data transmission using IANFIS and MECC in IoT |
1485 | -- | 1494 | Zhaohui Yuan, Yuqin Zhu, Mei He, Qingping Cao. Towards accurate seismic events detection using motion sensors on smartphones |
1495 | -- | 1503 | Hui Dou, Yuling Chen, Yixian Yang, Yangyang Long. A secure and efficient privacy-preserving data aggregation algorithm |
1505 | -- | 1513 | Ying Shi, Shuyi Huang, Jungang Lou. A characteristic standardization method for circuit input vectors based on Hash algorithm |
1515 | -- | 1524 | Pengcheng Li, Zhangyu Li, Xiongwen Pang, Hui Wang, Weiwei Lin, Wentai Wu. Multi-scale residual denoising GAN model for producing super-resolution CTA images |
1525 | -- | 1535 | Yungen Wei, Zheng Gong, Shunzhi Yang, Kai Ye, Yamin Wen. EdgeCRNN: an edge-computing oriented model of acoustic feature enhancement for keyword spotting |
1537 | -- | 1546 | Mohammed Alshehri. APP-NTS: a network traffic similarity-based framework for repacked Android apps detection |
1547 | -- | 1556 | Yan Ren, Haipeng Guan, Qiuxia Zhao. An efficient lattice-based linkable ring signature scheme with scalability to multiple layer |
1557 | -- | 1571 | Wei Li 0078, Le Xia, Ying Huang 0001, Soroosh Mahmoodi. An ant colony optimization algorithm with adaptive greedy strategy to optimize path problems |
1573 | -- | 1574 | Young-Sik Jeong, Jin Wang, Neil Y. Yen. Special issue on user behavior analysis in edge computing based Internet-of-Things |
1575 | -- | 1585 | Eunhee Lee, Yongik Yoon 0001. Trusted information project platform based on blockchain for sharing strategy |
1587 | -- | 1601 | Xiaomei Xia, Huipeng Jiang, Jin Wang 0001. Analysis of user satisfaction of shared bicycles based on SEM |
1603 | -- | 1614 | HyungJun Kim. Multiple vehicle tracking and classification system with a convolutional neural network |
1615 | -- | 1623 | Jae Young Choi, Jee-Hyong Lee, Younghwa Cho, Suntae Kim, Jeong Ah Kim, Seang-Yong Lee. Visualization of knowledge map for monitoring knowledge diagnoses |
1625 | -- | 1639 | Yeong-Seok Seo, Jun Ho Huh. GUI-based software modularization through module clustering in edge computing based IoT environments |
1641 | -- | 1651 | Kayumiy Shokh Jakhon, Haitao Guo, Kyungeun Cho. Agent grouping recommendation method in edge computing |
1653 | -- | 1663 | Hyeon-woo An, Nammee Moon. Design of recommendation system for tourist spot using sentiment analysis based on CNN-LSTM |
1665 | -- | 1672 | Sang-Youn Kim, Yu-Joon Kim, Dong-Soo Choi, Byeong-Seok Shin. Frequency based tactile rendering method for pin-array tactile devices |
1673 | -- | 1685 | Shee-Ihn Kim, Seung Hee Kim. E-commerce payment model using blockchain |