


default search action
Connection Science, Volume 33
Volume 33, Number 1, 2021
- Ao Liu

, Peng Li, Xudong Deng, Liang Ren:
A sigmoid attractiveness based improved firefly algorithm and its applications in IIR filter design. 1-25 - Weihua Liu

, Erh-Wen Hu, Bogong Su, Jian Wang:
Using machine learning techniques for DSP software performance prediction at source code level. 26-41 - Junjie Hu, Zhanquan Wang, Jiequan Chen, Yonghui Dai

:
A community partitioning algorithm based on network enhancement. 42-61 - Xiaoyan Kui

, Jiannan Feng, Xinran Zhou, Huakun Du, Xia Deng
, Ping Zhong
, Xingpo Ma:
Securing top-k query processing in two-tiered sensor networks. 62-80 - Yaming Zhang, Fei Liu, Yaya Hamadou Koura, Hao Wang:

Analysing rumours spreading considering self-purification mechanism. 81-94 - Tingting Xiao, Dezhi Han, Junhui He, Kuan-Ching Li

, Rodrigo Fernandes de Mello:
Multi-Keyword ranked search based on mapping set matching in cloud ciphertext storage system. 95-112
Volume 33, Number 2, 2021
- Jiajia Jiao, Libao Wang, Yanxiang Li, Dezhi Han, Min Yao, Kuan-Ching Li

, Hai Jiang:
CASH: correlation-aware scheduling to mitigate soft error impact on heterogeneous multicores. 113-135 - Yan Jiang

, Wei Liang
, Jintian Tang, Hongbo Zhou, Kuan-Ching Li
, Jean-Luc Gaudiot:
A novel data representation framework based on nonnegative manifold regularisation. 136-152 - Qiaoyun Wang, Guangli Zhu, Shunxiang Zhang, Kuan-Ching Li

, Xiang Chen, Hanqing Xu:
Extending emotional lexicon for improving the classification accuracy of Chinese film reviews. 153-172 - Hang Zhao

, Linbin Yao, Zhixin Zeng, Donghua Li, Jinliang Xie, Weiling Zhu, Jie Tang:
An edge streaming data processing framework for autonomous driving. 173-200 - Jie Zhao, Yutong Song, Fan Liu

, Yong Deng:
The identification of influential nodes based on structure similarity. 201-218 - Shuying Xu, Chin-Chen Chang, Yanjun Liu:

A novel image compression technology based on vector quantisation and linear regression prediction. 219-236 - Ying Liu, Qiqi Liu, JiuLun Fan, Fuping Wang, Jianlong Fu, Yuan Qingan, Tuan Kiang Chiew, Nam Ling:

Tyre pattern image retrieval - current status and challenges. 237-255 - Alireza Khanteymoori, Fatemeh Alamdar

, Farzaneh Ghorbani
:
ARP: asexual reproduction programming. 256-277 - Prativa Das

, Satish Chand:
Extracting road maps from high-resolution satellite imagery using refined DSE-LinkNet. 278-295 - Casper Hesp

, Bram T. Heerebout
, R. Hans Phaf
:
Evolutionary computation for bottom-up hypothesis generation on emotion and communication. 296-320 - Ping Gao, Xiaolun Wang

, Hong Chen, Weihui Dai
, Hong Ling:
What is beautiful is not always good: influence of machine learning-derived photo attractiveness on intention to initiate social interactions in mobile dating applications. 321-340 - Qiang Wu, Baixue Zhu, Binbin Yong, Yongqiang Wei, XueTao Jiang, Rui Zhou, Qingguo Zhou:

ClothGAN: generation of fashionable Dunhuang clothes using generative adversarial networks. 341-358 - Yi-xi Xie, Li-xin Ji, Ling-shu Li, Zehua Guo

, Thar Baker
:
An adaptive defense mechanism to prevent advanced persistent threats. 359-379
- Elizabeth B. Varghese, Sabu M. Thampi

:
Towards the cognitive and psychological perspectives of crowd behaviour: a vision-based analysis. 380-405
Volume 33, Number 3, July 2021
- Yang Li, Xinzhi Wang, Wei Wang, Zhenyu Zhang, Jianshu Wang, Xiangfeng Luo, Shaorong Xie

:
Learning adversarial policy in multiple scenes environment via multi-agent reinforcement learning. 407-426 - Feng Chang, Liang Ge, Siyu Li, Kunyan Wu, Yaqian Wang:

Self-adaptive spatial-temporal network based on heterogeneous data for air quality prediction. 427-446 - Zuoting Ning, Weiqi Shi, Lijun Xiao, Wei Liang

, Tien-Hsiung Weng:
A novel approach for anti-pollution attacks in network coding. 447-462 - Lei Yu, Yucong Duan, Kuan-Ching Li

:
A real-world service mashup platform based on data integration, information synthesis, and knowledge fusion. 463-481 - Tzyy-Chyang Lu:

CNN Convolutional layer optimisation based on quantum evolutionary algorithm. 482-494 - Hengxiao Chi, Chin-Chen Chang, Yanjun Liu:

An SMVQ compressed data hiding scheme based on multiple linear regression prediction. 495-514 - Xiao-Zhu Xie, Chin-Chen Chang, Ji-Hwei Horng

:
An EMD-based data hiding scheme for JPEG images. 515-531 - Shaik Shakeel Ahamad

, Al-Sakib Khan Pathan
:
A formally verified authentication protocol in secure framework for mobile healthcare during COVID-19-like pandemic. 532-554 - Shiwen Zhang

, Tingting Yao, Voundi Koe Arthur Sandor
, Tien-Hsiung Weng, Wei Liang
, Jinshu Su:
A novel blockchain-based privacy-preserving framework for online social networks. 555-575 - Xiaotong Wu

, Jiaquan Gao, Genlin Ji, Taotao Wu, Yuan Tian, Najla Al-Nabhan:
A feature-based intelligent deduplication compression system with extreme resemblance detection. 576-604 - Dingchao Jiang, Hua Qu, Ji-hong Zhao, Jianlong Zhao, Meng-Yen Hsieh:

Aggregating multi-scale contextual features from multiple stages for semantic image segmentation. 605-622 - Arko Banerjee

, Arun K. Pujari, Chhabi Rani Panigrahi
, Bibudhendu Pati
, Suvendu Chandan Nayak, Tien-Hsiung Weng:
A new method for weighted ensemble clustering and coupled ensemble selection. 623-644 - Sk. Meeravali, Debnath Bhattacharyya

, Thirupathi Rao N.
, Yu-Chen Hu:
Performance analysis of an improved forked communication network model. 645-673 - Zoltan Geler

, Milos Savic, Brankica Bratic, Vladimir Kurbalija
, Mirjana Ivanovic
, Weihui Dai
:
Sentiment prediction based on analysis of customers assessments in food serving businesses. 674-692 - Pritom Kumar Mondal

, Lizeth Patricia Aguirre Sanchez, Emmanuele Benedetto
, Yao Shen, Minyi Guo:
A dynamic network traffic classifier using supervised ML for a Docker-based SDN network. 693-718 - Liu Ying, Zhang Qian Nan, Wang Fu Ping, Tuan Kiang Chiew, Keng Pang Lim, Zhang Heng Chang, Chao Lu, Lu Guo Jun, Nam Ling:

Adaptive weights learning in CNN feature fusion for crime scene investigation image classification. 719-734 - Dacheng He, Dafang Zhang, Yanbiao Li, Wei Liang

, Meng-Yen Hsieh:
An efficient and DoS-resilient name lookup for NDN interest forwarding. 735-752 - Jianlong Xu

, Lijun Xiao, Yuhui Li, Mingwei Huang, Zicong Zhuang, Tien-Hsiung Weng, Wei Liang
:
NFMF: neural fusion matrix factorisation for QoS prediction in service selection. 753-768 - Lijun Xiao, Songyou Xie

, Dezhi Han, Wei Liang
, Jun Guo, Wen-Kuang Chou:
A lightweight authentication scheme for telecare medical information system. 769-785 - Gianni D'Angelo, Francesco Palmieri, Antonio Robustelli

, Arcangelo Castiglione
:
Effective classification of android malware families through dynamic features and neural networks. 786-801
Volume 33, Number 4, October 2021
- Alfred Adutwum Amponsah

, Fei Han, Jeremiah Osei-Kwakye, Ernest Bonah
, Qing-Hua Ling:
An improved multi-leader comprehensive learning particle swarm optimisation based on gravitational search algorithm. 803-834 - Chin-Chen Chang, Ji-Hwei Horng

, Chia-Shou Shih, Xu Wang:
VQ-oriented data hiding based on adjustable error compensation strategy. 835-853 - Liqing Qiu

, Shiqi Sai, Xiangbo Tian:
TsFSIM: a three-step fast selection algorithm for influence maximisation in social network. 854-869 - Bing Tang

, Mingdong Tang, Yanmin Xia, Meng-Yen Hsieh:
Composition pattern-aware web service recommendation based on depth factorisation machine. 870-890 - Yonghui Dai

, Tao Wang:
Prediction of customer engagement behaviour response to marketing posts based on machine learning. 891-910 - Zixuan Cao, Yongmei Zhou, Aimin Yang, Sancheng Peng:

Deep transfer learning mechanism for fine-grained cross-domain sentiment classification. 911-928 - Fuqing Zhao

, Songlin Du, Hao Lu, Weimin Ma, Houbin Song:
A hybrid self-adaptive invasive weed algorithm with differential evolution. 929-953 - Rohit Daid, Yogesh Kumar, Yu-Chen Hu, Wu-Lin Chen:

An effective scheduling in data centres for efficient CPU usage and service level agreement fulfilment using machine learning. 954-974 - Kaimeng Chen, Chin-Chen Chang:

High-capacity separable reversible data-Hiding method in encrypted images based on block-level encryption and Huffman compression coding. 975-994 - Qian Wang, Xiang Li, Qiaoying Liu:

Empirical research of accounting conservatism, corporate governance and stock price collapse risk based on panel data model. 995-1010 - Song Honglian, K. Deepa Thilak, Tamizharasi G. Seetharam

:
Research on plantar pressure dynamic distribution characteristics of samba step movements based on biomechanics. 1011-1027 - Huifeng Wang, Achyut Shankar

, G. N. Vivekananda
:
Modelling and simulation of sprinters' health promotion strategy based on sports biomechanics. 1028-1046 - Dongmei Wang:

Simulation research on safety detection of pattern rope jumping motion based on large data background. 1047-1059 - Jiale Zhang, Zhen Cheng, Xiang Cheng, Bing Chen:

OAC-HAS: outsourced access control with hidden access structures in fog-enhanced IoT systems. 1060-1076 - Nektaria Potha, Vasileios Kouliaridis

, Georgios Kambourakis
:
An extrinsic random-based ensemble approach for android malware detection. 1077-1093 - Honghan Ji, Hongjie Zhang, Lisong Shao, Debiao He

, Min Luo
:
An efficient attribute-based encryption scheme based on SM9 encryption algorithm for dispatching and control cloud. 1094-1115 - Yihui Dong, Jian Shen

, Sai Ji, Rongxin Qi, Shuai Liu:
A novel appliance-based secure data aggregation scheme for bill generation and demand management in smart grids. 1116-1137 - (Withdrawn) RETRACTED ARTICLE: Cloud enabled robust authenticated key agreement scheme for telecare medical information system. I-XX


manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














