Journal: J. Inf. Sci. Eng.

Volume 39, Issue 6

691 -- 709Chien-Yao Wang, I-Hau Yeh, Hong-Yuan Mark Liao. You Only Learn One Representation: Unified Network for Multiple Tasks
975 -- 995Chien-Yao Wang, Hong-Yuan Mark Liao, I-Hau Yeh. Designing Network Design Strategies Through Gradient Path Analysis
1233 -- 1246V. Gokula Krishnan, Abdul P. A. Saleem, N. Kirubakaran, Sankaradass Veeramalai, ATA Kishore Kumar, C. Jehan, J. Deepa, G. Dhanalakshmi. Ensemble Deep Learning Classifier with Optimized Cluster Head Selection for NIDS in MANET
1247 -- 1263Gaofeng Hong, Wei Su 0006, Xindi Hou, Lisheng Ma. A Green Cluster-based Traffic Information Acquisition Method in Vehicular Networks
1265 -- 1303Xifeng Wang, Limin Sun, Chao Wang, Hongsong Zhu, Lian Zhao, Shujie Yang, Changqiao Xu. Intelligent Connected Vehicle Security: Threats, Attacks and Defenses
1305 -- 1319Xianchuan Ling, Zhang Xin, Huiru Wang, Guozhu Zhao, Huanhuan Zhao, Sheng-Hui Zhao, Zenghui Ding. A Schizophrenia Screening Method Based on Fine-grained Voice Features and Network Isolation Privacy Protection
1321 -- 1339Shiyang Ma, Yulong Shen, Xuewen Dong, Wei Tong 0003, Lingxiao Yang. Link-ability: A Compatibility Prediction Method of Wireless Service based on Markov Process
1341 -- 1355Bao Gui, Sheng-Hui Zhao, Gui-Lin Chen 0001, Bin Yang 0010. Rate Fairness Maximization via a DRL Algorithm in Vehicular Networks
1357 -- 1369Muhammet Pakyürek, Selman Kulac. A Dynamic Optimization based Algorithm for Pilot Assignment in Massive MIMO
1371 -- 1382Mehdi Merouane. Convenient Detection Method for Anonymous Networks "I2P vs Tor"
1383 -- 1401Ravi Kumar Suggala, M. Vamsi Krishna 0001, Sangram Keshari Swain. Discover the New Factor for Dengue Fever Outbreaks and Predicted using Bayes Network-PSO (BN-PSO)
1403 -- 1420Yi-Yuan Chen, Kuochen Wang, Hao-Wei Chung, Chien-Chih Chen, Bohau Huang, I-Wei Lu. Multi-Person Pose Estimation using an Ordinal Depth-Guided Convolutional Neural Network
1421 -- 1436Xiaowen Zhang, Jing Shan, Wen-Yi Tang, Li Yan 0001, Zongmin Ma 0001. Inconsistency Detection for Spatiotemporal Knowledge Graph with Entity Semantics and Spatiotemporal Features
1437 -- 1457Duen-Ren Liu, Yang Huang, Ching-Yi Tseng, Shin-Jye Lee. Hybrid Generative Adversarial Networks for News Recommendation

Volume 39, Issue 5

999 -- 1022Bao An Nguyen, Hoang-Thanh Duong, Ling-Ling Tsao, Hsi-Min Chen. An Educational Card Game Approach to Motivating the Learning of Software Engineering
1023 -- 1036Kuo-Hsun Hsu, Zi-Deng Meng, Andrew Weian Hou. The Evaluation of Aspect-Based Refactoring Method with Design Patterns through GQM
1037 -- 1059Han-Lin Lu, Ren-Jie Zhuang, Shih-Kun Huang. Fuzz Testing Process Visualization
1061 -- 1077Chia-Yu Lin, Shin-Jie Lee. An Efficient Autoscaling Cross-Browser Testing Cloud Platform based on Selenium Grid, Kubernetes and KEDA
1079 -- 1100Po-Shen Lin, Nai-Wei Lin, Ming-Hsien Yeh, Chia-Chou Yeh, Hung-Pin Chiu 0002, Mei-Chun Wu. Syndrome Differentiation for Deficiency Syndromes in Traditional Chinese Medicine Based on Fuzzy Sets
1101 -- 1116Chiung-Hon Lee, Tsung-Ju Lee, Yu-Sheng Chiang, Shih-Yi Yuan, Jyh-Hwa Liou. Design and Implement an Intelligent System for Stock Investment Decision Making
1117 -- 1128Wen-Tin Lee, Zhun-Wei Liu. Microservices-based DevSecOps Platform using Pipeline and Open Source Software
1129 -- 1153Shu-Ling Chen, Chien-Hung Liu, Wen-Quan Xiao. A Feedback-Directed Approach to Crawl Android Apps for Increasing Code Coverage
1155 -- 1168Ming-Shium Hsieh, Hideo Yokota, Ming-Dar Tsai. Volume Manipulations for Assisting Joint Surgery Diagnoses and Simulations
1169 -- 1183Shitong Fu, Zhiqiang Yao. Privacy Risk Estimation of Online Social Networks
1185 -- 1207Hui-Kuo Yang, Bing-Li Su, Wen-Chih Peng. SADEM: An Effective Supervised Anomaly Detection Ensemble Model for Alert Account Detection
1209 -- 1230Shu-Ying Lin, An-Chi Wang. Self-Attention Recurrent Conditional Generative Adversarial Networks for Corporate Credit Rating Prediction

Volume 39, Issue 4

711 -- 724Christine Dewi, Rung Ching Chen, Hui Yu 0001, Xiaoyi Jiang 0001. XAI for Image Captioning using SHAP
725 -- 738Jing Zhu, Ru-Chun Jia. Research on Data Security Monitoring Method Based on CP-ABE
739 -- 757Meirong Zheng, Ru-Chun Jia. Research on Secure Transmission of Heterogeneous Networks
759 -- 775Haibo Yu, Tao Zhang 0010, Wenhuan Zhu, Li Zhang 0107, Jiali Jin. High-resolution Noise Artifact Tracking network for Image Splicing Forgery Detection
777 -- 796Jianxin Li, Jie Liu, Chao Li, Wenliang Cao, Bin Li, Fei Jiang, Jinyu Huang, Yingxia Guo, Yang Liu. Violence Detection Method Based on Convolution Neural Network and Trajectory
797 -- 807Che-Nan Kuo, Yu-Da Lin, Duc Man Nguyen, Yu-Huei Cheng. Based on Decision Tree Model to Analyze the Influencing Factors of Customer's Insurance Transactions
809 -- 823Fei Jiang, Xiao-Ya Ma, Yi Yi Li, Jian-Xin Li, Wen-Liang Cao, Jin Tong, Qiu Yan Chen, Hai-Fang Chen, Zi Xuan Fu. How Deep Learning Affect Price Forecasting of Agricultural Supply Chain?
825 -- 838Qian Du 0004, Zhao-Feng Wu, Jun Wang, Wenwu Xie, Ya-Lan Li. A Novel Joint Frequency Offset Estimation Scheme for OFDM System
839 -- 854Yunli Cheng, Hainie Meng, Yu-Qiang Chen, Yan-Xian Tan, Jian-Lan Guo. Research on Network Information Security Management System Based on Face Recognition
855 -- 868Yanjun Zhu, Ting Zhu, Jianxin Li, Wenliang Cao, Peng Yong, Fei Jiang, Jie Liu. Classify Text-based Email Using Naive Bayes Method With Small Sample
869 -- 884Siron Anita Susan T., B. Nithya. Firefly Based Energy Efficient Routing of Charging Request in Wireless Rechargeable Sensor Network
885 -- 908Poonam T. Agarkar, Manish D. Chawhan, Kishor D. Kulat, Pratik Ramesh Hajare. MECT-PSO: A Reliable and Energy Efficient Topology Control Protocol for Wireless Sensor Networks
909 -- 933Ravinder Ahuja, S. C. Sharma 0001. B 2 GRUA: BERTweet Bi-Directional Gated Recurrent Unit with Attention Model for Sarcasm Detection
935 -- 950Haixia Hou, Daojun Liang, Mingqiang Zhang, Dongfeng Yuan. A Densely Stacked Attention Method for Cyberattack Detection
951 -- 973Hung-Yi Lin, Rong-Chang Chen. Heuristic Feature Selection with Classification Efficiency Using Soft Cluster Analysis for Biological Datasets
975 -- 995Chien-Yao Wang, Hong-Yuan Mark Liao, I-Hau Yeh. Designing Network Design Strategies Through Gradient Path Analysis

Volume 39, Issue 3

459 -- 472Iuon-Chang Lin, Yu-Wen Wang, Ting-Xuan Tai. A Grid-Based Key Pre-Distribution Scheme Using Dependent Keys in Wireless Sensor Networks
473 -- 487Chun-I Fan, Hsin-Nan Kuo, Yung-Sheng Tu, Yuan-Chi Chei, Chu-Chia Chuang, Yu-Chun Tseng, Arijit Karati. A Secure Cloud Gaming System
489 -- 506Hsiu-Ling Chu, Yu-Chen Dai, Wei-Bin Lee, Ting-Shen Hsieh, Ming-Hung Wang. Characterizing Behaviors of Sockpuppets in Online Political Discourses
507 -- 524Ruei-Hau Hsu, Lu-Chin Wang, Hsiang-Shian Fan. Universally Secure Device-to-Device Communications with Privacy Protection and Fine-grained Access Control Based on 5G-enabled Multi-access Edge Computing
525 -- 548Ray-I Chang, Yen-Ting Chang, Chia-Hui Wang. Outsourced K-means Clustering for High-Dimensional Data Analysis based on Homomorphic Encryption
549 -- 560Ajai John Chemmanam, Bijoy Antony Jose, Asif Moopan. A Multi-Tasking Model for Object Detection, Instance Segmentation and Keypoint Estimation Tasks
561 -- 574Sheena Kurian K, Sheena Mathew. High Impact of Rough Set and KMeans Clustering Methods in Extractive Summarization of Journal Articles
575 -- 591Dhanashri Narayan Wategaonkar. Energy-Efficient Reliable Sector-based Clustering Scheme to Improve the Lifetime of WSN
593 -- 607Mahima Poonia, Rakesh Kumar Bajaj. On Complex Fuzzy Matrix with Algebraic Operations, Similarity Measure and its Application in Identification of Reference Signal
609 -- 621Seema Safar, Babita Roslind Jose, T. Santhanakrishnan. Enriching Aspect-based Recommendation System using Social Relation-Item Interaction
623 -- 636Himanshu Dhumras, Rakesh Kumar Bajaj. On Assembly Robotic Design Evaluation Problem Using Enhanced Quality Function Deployment with q -Rung Orthopair Fuzzy Set Theoretic Environment
637 -- 654Zhifang Liu. Using Artificial Intelligence in IC Substrate Production Predicting
655 -- 670Yuan-Hao Lin, Chia-Hui Chang, Hsiu-Min Chuang. EventGo! Mining Events through Semi-Supervised Event Title Recognition and Pattern-based Venue/Date Coupling
671 -- 689Ting-Yi J. T. Kuo, Anthony J. T. Lee. A Dialogue Model for Customer Support Services
691 -- 709Chien-Yao Wang, I-Hau Yeh, Hong-Yuan Mark Liao. You Only Learn One Representation: Unified Network for Multiple Tasks
975 -- 995Chien-Yao Wang, Hong-Yuan Mark Liao, I-Hau Yeh. Designing Network Design Strategies Through Gradient Path Analysis

Volume 39, Issue 2

239 -- 267Chung-Ming Huang, Jheng-Yuan Yu. Leader-Controlled Real Time and Synchronous Multimedia Presentation for Wireless Mobile Group Touring Services using the Multi-Access Edge Computing (MEC) Technique
269 -- 289Shih-Yu Huang, Chia-Hui Wang. Cost-Effective Smartphone-Camera-Based Scheme to Distinguish Drivers from Passengers for Texting-While-Driving
291 -- 303Zhi-Yu Hong, Zongmin Ma. Inconsistency Detection in Knowledge Graph with Entity and Path Semantics
305 -- 321Wei Lin, Liang-Chih Yu. Scarce Resource Dimensional Sentiment Analysis UsingDomain-distilled BERT
323 -- 337Zhigao Zhang, Xiaoxu Song, Bin Wang 0015, Chuansheng Dong. Outer Product Enhanced Embedding Information for Recommendation
339 -- 352Jiunn-Tsair Fang, Yu-Liang Tu, Pao-Chi Chang. Fast Intra Coding Partition Decisions for Feature Video Coding
353 -- 373Ray-Ming Chen. A Partition-induced Hereditary Metric for Equivalence Classes - Theory and Application
375 -- 388K. Tamilarasan, Jeevaa Katiravan. An Analytical Approach on User Rate Maximization in Two-Way Relay Communication using NOMA
389 -- 406R. Ponni, T. Jayasankar, K. Vinothkumar. Investigations on Underwater Acoustic Sensor Networks Framework for RLS Enabled LoRa Networks in Disaster Management Applications
407 -- 421Yan-Jing Wu, Tsang-Ling Sheu, Wei-Luen Li. HetNet with Overlapping Small Cells for 5G IoT Networks
423 -- 438Xin-xing, Ning Wang. Entity Matching based on Attribute-aware and Multi-Perspective Similarity Measurement
439 -- 455Shu-Ying Lin, Hui-Yu Lin. Bond Price Prediction Using Technical Indicators and Machine Learning Techniques
691 -- 709Chien-Yao Wang, I-Hau Yeh, Hong-Yuan Mark Liao. You Only Learn One Representation: Unified Network for Multiple Tasks

Volume 39, Issue 1

1 -- 18Wenjin Hu, Jiahao Meng, Li Jia, Fuliang Zeng, Panpan Xue. Weakly Supervised Semantic Segmentation for Headdress of Thangka Images
19 -- 37Jia-Xin Hu, Yu Song, Yi-Yao Zhang. Adoption of Gesture Interactive Robot in Music Perception Education with Deep Learning Approach
39 -- 54Yinghao Kong. Precise Displacement Measurement of Long-Span Spatial Structure of Buildings via Deep Learning and Machine Vision Technology
55 -- 66Yang Liu, Cun Shang Fan, Peng-Xin Liu. Research on Digital Media Intelligent Art Creation Based on the Fusion of Virtual Reality and Semantic Features
67 -- 89Guiying Zhu. No-Reference Image Quality Assessment Based on Natural Scene Statistics in NSCT Domain and Spatial Domain
91 -- 109Supriya Sridharan, Swaminathan Venkataraman, K. Somasundaram. A Novel Variable Lie Hypergraph Technique for Cluster Based Routing in Opportunistic Networks
111 -- 127Ajay K. Gupta 0006, Udai Shanker. A Predicted Region Enrooted Approach for Efficient Caching in Mobile Environment
129 -- 147Lincoln Herbert Teixeira, Árpád Huszák. Reinforcement Learning in Path Lifetime Routing Algorithm for VANETs
149 -- 166Fang Ren, Mingyu Yu, Haiyan Xiu, Wei Hou. A New Symmetric Information Hiding Scheme Based on Cover Randomness
167 -- 181Yi-Chuan Wang, Gui-Ling Zhang, Ya-ling Zhang. Analysis of SQL Injection based on Petri Net in Wireless Network
183 -- 195Mostefa Kara, Abdelkader Laouid, Ahcène Bounceur, Mohammad Hammoudeh, Muath AlShaikh. Perfect Confidentiality through Unconditionally Secure Homomorphic Encryption Using One-Time Pad Method with a Single Pre-Shared Key
197 -- 222Maria I. Ortega, Julio Moreno, Manuel A. Serrano, Eduardo Fernández-Medina. A Systematic Analysis of Security in Blockchain
223 -- 235Xiafei Yan, Xu Zheng. Research on Secrecy Law Based on Blockchain Encrypted Traceability Technology