Journal: J. Inf. Sci. Eng.

Volume 39, Issue 4

711 -- 724Christine Dewi, Rung Ching Chen, Hui Yu 0001, Xiaoyi Jiang 0001. XAI for Image Captioning using SHAP
725 -- 738Jing Zhu, Ru-Chun Jia. Research on Data Security Monitoring Method Based on CP-ABE
739 -- 757Meirong Zheng, Ru-Chun Jia. Research on Secure Transmission of Heterogeneous Networks
759 -- 775Haibo Yu, Tao Zhang 0010, Wenhuan Zhu, Li Zhang 0107, Jiali Jin. High-resolution Noise Artifact Tracking network for Image Splicing Forgery Detection
777 -- 796Jianxin Li, Jie Liu, Chao Li, Wenliang Cao, Bin Li, Fei Jiang, Jinyu Huang, Yingxia Guo, Yang Liu. Violence Detection Method Based on Convolution Neural Network and Trajectory
797 -- 807Che-Nan Kuo, Yu-Da Lin, Duc Man Nguyen, Yu-Huei Cheng. Based on Decision Tree Model to Analyze the Influencing Factors of Customer's Insurance Transactions
809 -- 823Fei Jiang, Xiao-Ya Ma, Yi Yi Li, Jian-Xin Li, Wen-Liang Cao, Jin Tong, Qiu Yan Chen, Hai-Fang Chen, Zi Xuan Fu. How Deep Learning Affect Price Forecasting of Agricultural Supply Chain?
825 -- 838Qian Du 0004, Zhao-Feng Wu, Jun Wang, Wenwu Xie, Ya-Lan Li. A Novel Joint Frequency Offset Estimation Scheme for OFDM System
839 -- 854Yunli Cheng, Hainie Meng, Yu-Qiang Chen, Yan-Xian Tan, Jian-Lan Guo. Research on Network Information Security Management System Based on Face Recognition
855 -- 868Yanjun Zhu, Ting Zhu, Jianxin Li, Wenliang Cao, Peng Yong, Fei Jiang, Jie Liu. Classify Text-based Email Using Naive Bayes Method With Small Sample
869 -- 884Siron Anita Susan T., B. Nithya. Firefly Based Energy Efficient Routing of Charging Request in Wireless Rechargeable Sensor Network
885 -- 908Poonam T. Agarkar, Manish D. Chawhan, Kishor D. Kulat, Pratik Ramesh Hajare. MECT-PSO: A Reliable and Energy Efficient Topology Control Protocol for Wireless Sensor Networks
909 -- 933Ravinder Ahuja, S. C. Sharma 0001. B 2 GRUA: BERTweet Bi-Directional Gated Recurrent Unit with Attention Model for Sarcasm Detection
935 -- 950Haixia Hou, Daojun Liang, Mingqiang Zhang, Dongfeng Yuan. A Densely Stacked Attention Method for Cyberattack Detection
951 -- 973Hung-Yi Lin, Rong-Chang Chen. Heuristic Feature Selection with Classification Efficiency Using Soft Cluster Analysis for Biological Datasets
975 -- 995Chien-Yao Wang, Hong-Yuan Mark Liao, I-Hau Yeh. Designing Network Design Strategies Through Gradient Path Analysis