


default search action
Connection Science, Volume 34
Volume 34, Number 1, December 2022
- Zhaohua Zheng, Yize Zhou, Yilong Sun, Zhang Wang, Boyi Liu, Keqiu Li:

Applications of federated learning in smart cities: recent advances, taxonomy, and open challenges. 1-28 - Nankai Lin

, Jinxian Li
, Shengyi Jiang
:
A simple but effective method for Indonesian automatic text summarisation. 29-43 - Shengting Wu, Yuling Liu, Ziran Zou, Tien-Hsiung Weng:

S_I_LSTM: stock price prediction based on multiple data sources and sentiment analysis. 44-62 - Ke Lu

, Xianwen Fang
, Na Fang
, Esther Asare
:
Discovery of effective infrequent sequences based on maximum probability path. 63-82 - Angtai Li, Guohua Tian, Meixia Miao, Jianpeng Gong:

Blockchain-based cross-user data shared auditing. 83-103 - Fangfang Xu, Huan Zhao, Weihua Zhou, Yun Zhou:

Cost-sensitive regression learning on small dataset through intra-cluster product favoured feature selection. 104-123 - Sixian Lian, Mingdong Tang:

API recommendation for Mashup creation based on neural graph collaborative filtering. 124-138 - Jianqiang Hu

, Wei Liang
, Osama Hosam
, Meng-Yen Hsieh, Xin Su:
5GSS: a framework for 5G-secure-smart healthcare monitoring. 139-161 - Likun Xing, Liuyi Ling, Bing Gong, Menglong Zhang:

State-of-charge estimation for Lithium-Ion batteries using Kalman filters based on fractional-order models. 162-184 - Nevena Rankovic

, Dragica Rankovic
, Mirjana Ivanovic
, Ljubomir Lazic
:
COSMIC FP method in software development estimation using artificial neural networks based on orthogonal arrays. 185-204 - Hanqing Xu, Shunxiang Zhang, Guangli Zhu, Hai Yang Zhu:

ALSEE: a framework for attribute-level sentiment element extraction towards product reviews. 205-223 - Erping Song

, Hecheng Li:
A hybrid differential evolution for multi-objective optimisation problems. 224-253 - Shunxiang Zhang, Hongbin Yu, Guangli Zhu:

An emotional classification method of Chinese short comment text based on ELECTRA. 254-273 - Hua-Yi Lin:

Integrate the hierarchical cluster elliptic curve key agreement with multiple secure data transfer modes into wireless sensor networks. 274-300 - Tianyuan Li, Xin Su, Wei Liu, Wei Liang, Meng-Yen Hsieh, Zhuhui Chen, Xuchong Liu, Hong Zhang:

Memory-augmented meta-learning on meta-path for fast adaptation cold-start recommendation. 301-318 - Xiangyong Liu, Guojun Wang, Md. Zakirul Alam Bhuiyan:

Personalised context-aware re-ranking in recommender system. 319-338 - Jingwei Too

, Ali Safaa Sadiq
, Seyed Mohammad Mirjalili
:
A conditional opposition-based particle swarm optimisation for feature selection. 339-361 - Daniel Gerbi Duguma

, Jiyoon Kim
, Sangmin Lee, Nam-Su Jho, Vishal Sharma
, Ilsun You:
A lightweight D2D security protocol with request-forecasting for next-generation mobile networks. 362-386 - Sengathir Janakiraman, A. Rajesh, Gaurav Dhiman, S. Vimal

, C. A. Yogaraja
, Wattana Viriyasitavat:
A novel cluster head selection using Hybrid Artificial Bee Colony and Firefly Algorithm for network lifetime and stability in WSNs. 387-408 - Zhongliang Wei

, Wenjuan Liu, Guangli Zhu, Shunxiang Zhang, Meng-Yen Hsieh:
Sentiment classification of Chinese Weibo based on extended sentiment dictionary and organisational structure of comments. 409-428 - Na Hu, Dafang Zhang, Kun Xie, Wei Liang

, Meng-Yen Hsieh:
Graph learning-based spatial-temporal graph convolutional neural networks for traffic forecasting. 429-448 - Yan Ding, Yunan Zhai, Yujuan Zhai, Jia Zhao

:
Explore deep auto-coder and big data learning to hard drive failure prediction: a two-level semi-supervised model. 449-471 - Xi Chen

, Hua-Yi Feng, Jia-Le Wang:
Robust coal granularity estimation via deep neural network with an image enhancement layer. 472-491 - Yang Li

, Hong-Ning Dai
, Zibin Zheng
:
Selective transfer learning with adversarial training for stock movement prediction. 492-510 - Xixi Yan

, Pei Yin
, Yongli Tang, Suwei Feng:
Multi-keywords fuzzy search encryption supporting dynamic update in an intelligent edge network. 511-528 - Bo Li, Minrui Wu, Zhongcheng Li, Yi Sun:

A pricing model for subscriptions in data transactions. 529-550 - Shaokang Cai

, Dezhi Han, Xinming Yin, Dun Li
, Chin-Chen Chang:
A Hybrid parallel deep learning model for efficient intrusion detection based on metric learning. 551-577 - Jeremiah Osei-Kwakye

, Fei Han, Alfred Adutwum Amponsah
, Qinghua Ling, Timothy Apasiba Abeo:
A hybrid optimization method by incorporating adaptive response strategy for Feedforward neural network. 578-607 - Xiaoshu Zhou, Fei Zhu, Peiyao Zhao:

Predicting before acting: improving policy quality by taking a vision of consequence. 608-629 - Wenliang Wu

, Xingshe Zhou, Bo Shen:
Comprehensive evaluation of the intelligence levels for unmanned swarms based on the collective OODA loop and group extension cloud model. 630-651 - Likai Wang

, Jinyan Chen, Zhenghang Chen, Yuxin Liu, Haolin Yang:
Multi-stream part-fused graph convolutional networks for skeleton-based gait recognition. 652-669 - Wei Zhao, Shan Zhao, Shuhui Chen, Tien-Hsiung Weng, Wenjie Kang:

Entity and relation collaborative extraction approach based on multi-head attention and gated mechanism. 670-686 - Zihua Chen

, Chuanli Wang
, Huawei Jin, Jingzhao Li, Shunxiang Zhang, Qichun Ouyang:
Hierarchical-fuzzy allocation and multi-parameter adjustment prediction for industrial loading optimisation. 687-708 - Wenhui Xiao, Zhaohui Tang, Ce Yang, Wei Liang

, Meng-Yen Hsieh:
ASM-VoFDehaze: a real-time defogging method of zinc froth image. 709-731 - Wenjin Hu, Panpan Xue, Guoyuan He, Huiyuan Tang, Huafei Song, Chaoyang Yue:

Few shot object detection for headdresses and seats in Thangka Yidam based on ResNet and deformable convolution. 732-748 - Jyun-Siang Huang, Wuu Yang, Yi-Ping You:

Profile-guided optimisation for indirect branches in a binary translator. 749-765 - Xiaoli Sun

, Qiwei Wang, Xiujun Zhang
, Chen Xu, Weiqiang Zhang:
Deep blur detection network with boundary-aware multi-scale features. 766-784 - Wen-Sheng Chen, Xiya Ge, Binbin Pan:

A novel general kernel-based non-negative matrix factorisation approach for face recognition. 785-810 - Xingsi Xue, Haolin Wang

, Xin Zhou, Guojun Mao, Hai Zhu:
Matching heterogeneous ontologies with adaptive evolutionary algorithm. 811-828 - Wei Li, Yafeng Sun, Ying Huang

, Jianbing Yi:
An adaptive differential evolution algorithm using fitness distance correlation and neighbourhood-based mutation strategy. 829-856 - Hui Du, Yanting Hao, Zhihe Wang:

An improved density peaks clustering algorithm by automatic determination of cluster centres. 857-873 - Lei Wu

, Xia Wei, Lingzhen Meng, Shengnan Zhao, Hao Wang:
Privacy-preserving location-based traffic density monitoring. 874-894 - Jun Zhang, Yonghang Tai:

Secure medical digital twin via human-centric interaction and cyber vulnerability resilience. 895-910 - Jian Xie, Wenan Tan, Zhibin Yang, Shuming Li, Linquan Xing, Zhiqiu Huang:

SysML-based compositional verification and safety analysis for safety-critical cyber-physical systems. 911-941 - Haiyan Chen

, Ying Yu, Yizhen Jia, Linghui Zhang:
Safe transductive support vector machine. 942-959 - Mingyang Wang, Tianyi Sun, Kang Song, Shuang Li, Jing Jiang, Linjun Sun:

An efficient sparse pruning method for human pose estimation. 960-974 - Jiaxiang Wu, Pan Zeng, Peizhong Liu, Guorong Lv:

Automatic classification method of liver ultrasound standard plane images using pre-trained convolutional neural network. 975-989 - Zaiyang Yu, Shuang Li, Linjun Sun, Liang Liu, Haining Wang:

Multi-distribution noise quantisation: an extreme compression scheme for transformer according to parameter distribution. 990-1004 - Boyu Yang, Anmin Cai, Weirong Lin:

Analysis of early fault vibration detection and analysis of offshore wind power transmission based on deep neural network. 1005-1017 - Shao-Hua Wang

, Chia-Heng Tu
, Jyh-Ching Juang:
Automatic traffic modelling for creating digital twins to facilitate autonomous vehicle development. 1018-1037 - Li Zhang

, Jianbo Xu:
Blockchain-based anonymous authentication for traffic reporting in VANETs. 1038-1065 - Cruz E. Borges

, Evgenia Kapassa
, Marios Touloupou
, Jon Legarda Macón
, Diego Casado-Mansilla
:
Blockchain application in P2P energy markets: social and legal aspects. 1066-1088 - Hua-Yi Lin, Meng-Yen Hsieh:

A dynamic key management and secure data transfer based on m-tree structure with multi-level security framework for Internet of vehicles. 1089-1118 - Zhaohua Zheng, Zhaobin Qin, Keqiu Li, Tie Qiu:

A team-based multitask data acquisition scheme under time constraints in mobile crowd sensing. 1119-1145 - Guopeng Liu, Jianbin Ma, Tongle Hu, Xiaoying Gao:

A feature selection method with feature ranking using genetic programming. 1146-1168 - Wenjing Shan:

Digital streaming media distribution and transmission process optimisation based on adaptive recurrent neural network. 1169-1180 - Hongwei Tao

, Yixiang Chen, Hengyang Wu:
Theoretical and empirical validation of software trustworthiness measure based on the decomposition of attributes. 1181-1200 - Zhenhui Wang

, Dezhi Han, Ming Li, Han Liu, Mingming Cui:
The abnormal traffic detection scheme based on PCA and SSH. 1201-1220 - Hok-Leung Kung, Shu-Jun Yang, Kuo-Chan Huang:

An improved Monte Carlo Tree Search approach to workflow scheduling. 1221-1251 - Chuan Zhao, Xin Li, Zezhi Shao, Hongji Yang, Fei Wang:

Multi-featured spatial-temporal and dynamic multi-graph convolutional network for metro passenger flow prediction. 1252-1272 - Jitendra Singh Yadav

, Narendra Singh Yadav, Akhilesh Kumar Sharma
:
Security analysis of smart contract based rating and review systems: the perilous state of blockchain-based recommendation practices. 1273-1298 - Yi Zhao, Hancheng Huang, Zhixiang Li, Huang Yiwang, Manjie Lu:

Intelligent garbage classification system based on improve MobileNetV3-Large. 1299-1321 - Xin Liu, Ziang Liu

, Yingli Zhang, Wenqiang Zhang, Dong Lv, Qingguo Zhou:
TCN enhanced novel malicious traffic detection for IoT devices. 1322-1341 - Ruiqi Luo, Bangchao Wang

, Yu Feng, Zaihui Deng, Xian Zhong
:
Conceptual semantic enhanced representation learning for event recognition in still images. 1342-1366 - Li Hai-Dong, Yang Ya-Juan, Lei Lu

:
In the context of COVID-19: the impact of employees' risk perception on work engagement. 1367-1383 - Lu Liang, Yong Li, Ming Wen, Ying Liu:

KG4Py: A toolkit for generating Python knowledge graph and code semantic search. 1384-1400 - Ioannis Stellios, Kostas Mokos, Panayiotis Kotzanikolaou

:
Assessing smart light enabled cyber-physical attack paths on urban infrastructures and services. 1401-1429 - Jing Zheng, Xiaoliang Wang

, Qing Yang, Wenhui Xiao, Yapeng Sun, Wei Liang
:
A blockchain-based lightweight authentication and key agreement scheme for internet of vehicles. 1430-1453 - Xiangjuan Wu

, Yuping Wang, Ziqing Wang:
A centerline symmetry and double-line transformation based algorithm for large-scale multi-objective optimization. 1454-1481 - Beibei Jin, Dong Liu, Li Li:

Research on social recommendation algorithm based on fuzzy subjective trust. 1541-1556 - Wenbo Mi, Yong Li

, Ming Wen, Youren Chen:
Using active learning selection approach for cross-project software defect prediction. 1482-1499 - Pan Liu, Wulan Huang:

A graph algorithm for the time constrained shortest path. 1500-1518 - Guanting Du, Fei Zhu, Quan Liu:

Vital node searcher: find out critical node measure with deep reinforcement learning. 1519-1539 - Weizhong Wang

, Hai-Lin Liu, Hongjian Shi
:
A multi-objective bilevel optimisation evolutionary algorithm with dual populations lower-level search. 1556-1581 - Li Ruan, Xiangrong Xu, Limin Xiao, Lei Ren, Nasro Min-Allah

, Yunzhi Xue:
Evaluating performance variations cross cloud data centres using multiview comparative workload traces analysis. 1582-1608 - Qinghao Zhang, Miao Ye

, Xiaofang Deng:
A novel anomaly detection method for multimodal WSN data flow via a dynamic graph neural network. 1609-1637 - Xinguang Li, Xiaoning Li, Shuai Chen, Shanxian Ma, Fenfang Xie:

Neural-based automatic scoring model for Chinese-English interpretation with a multi-indicator assessment. 1638-1653 - Shixiong Yao

, Pujie Jing
, Pei Li
, Jiageng Chen
:
A multi-dimension traceable privacy-preserving prevention and control scheme of the COVID-19 epidemic based on blockchain. 1654-1677 - Li Li, Zhongqun Wang, Chen Li, Linjun Chen, Yong Wang:

Collaborative filtering recommendation using fusing criteria against shilling attacks. 1678-1696 - Jisheng Qin

, Xiaoqin Zeng, Shengli Wu
, Yang Zou:
Feature recommendation strategy for graph convolutional network. 1697-1718 - Ching-Chun Chang:

Automation of reversible steganographic coding with nonlinear discrete optimisation. 1719-1735 - Xingyuan Chen, Peng Jin

, Ping Cai, Hongjun Wang, Xinyu Dai, Jiajun Chen:
The detection of distributional discrepancy for language GANs. 1736-1750 - Liutao Zhao

, Jiawan Zhang, Lin Zhong:
A blockchain-based transaction system with payment statistics and supervision. 1751-1771 - Dawei Yang, Yan Du

, Hongli Yao, Liyan Bao:
Image semantic segmentation with hierarchical feature fusion based on deep neural network. 1772-1784 - Subo Wei, Guangli Zhu, Zhengyan Sun, Xiaoqing Li, Tien-Hsiung Weng:

GP-GCN: Global features of orthogonal projection and local dependency fused graph convolutional networks for aspect-level sentiment classification. 1785-1806 - R. Priya, N. Sivakumar

:
Resisting bad mouth attack in vehicular platoon using node-centric weight-based trust management algorithm (NC-WTM). 1807-1832 - Catalin Negru

, George-Alexandru Musat, Madalin Colezea, Constantin Anghel, Alexandru Dumitrascu, Florin Pop
, Carmen De Maio, Aniello Castiglione:
Dependable workflow management system for smart farms. 1833-1854 - R. Sudharsan, E. N. Ganesh:

A Swish RNN based customer churn prediction for the telecom industry with a novel feature selection strategy. 1855-1876 - Shunxiang Zhang, Houyue Wu

, Xin Xu, Guangli Zhu, Meng-Yen Hsieh:
CL-ECPE: contrastive learning with adversarial samples for emotion-cause pair extraction. 1877-1894 - Zhendong Liu, Xi Chen, Dongyan Li, Xinrong Lv, Mengying Qin, Ke Bai, Zhiqiang He, Yurong Yang, Xiaofeng Li, Qionghai Dai:

Predicting algorithm of attC site based on combination optimization strategy. 1895-1912 - Mengyang Qin:

Application of efficient recognition algorithm based on deep neural network in English teaching scene. 1913-1928 - Jia Fu

, Bangcan Cao, Xiaoliang Wang
, Pengjie Zeng, Wei Liang
, Yuzhen Liu:
BFS: A blockchain-based financing scheme for logistics company in supply chain finance. 1929-1955 - Na Fang

, Xianwen Fang
, Ke Lu
:
Online incremental updating for model enhancement based on multi-perspective trusted intervals. 1956-1980 - Khanittha Talordphop, Saowanit Sukparungsee

, Yupaporn Areepong
:
New modified exponentially weighted moving average-moving average control chart for process monitoring. 1981-1998 - Zeng Wu, Hui Huang

, Yuping Zhou, Chenhuang Wu
:
A secure and efficient data deduplication framework for the internet of things via edge computing and blockchain. 1999-2025 - Yubin Qu, Tie Bao, Xiang Chen, Long Li, Xianzhen Dou, Meng Yuan, Hongmei Wang:

Do we need to pay technical debt in blockchain software systems? 2026-2047 - Mingxin Tang, Wei Chen, Wen Yang:

Anomaly detection of industrial state quantity time-Series data based on correlation and long short-term memory. 2048-2065 - Shiwen Gong, Dandan Liu, Md. Zakirul Alam Bhuiyan, Xiaoguang Niu:

OCP: an OLAP-based bus crowdedness smart-perceiving mechanism for urban transportation. 2066-2083 - Benqiang Wang, Shunxiang Zhang:

A new locally adaptive K-nearest centroid neighbor classification based on the average distance. 2084-2107 - Hai Huan

, Zelin Guo, Tingting Cai, Zichen He:
A text classification method based on a convolutional and bidirectional long short-term memory model. 2108-2124 - Tetsuo Fukuzaki

, Shaoying Liu, Michael Butler:
DevFemOps: enhancing maintainability based on microservices using formal engineering methods. 2125-2138 - Tianxiang Xu

, Peizhong Liu
, Ping Li, Xiaoxia Wang
, Huifeng Xue, Jingming Guo, Binhua Dong, Pengming Sun
:
RACNet: risk assessment Net of cervical lesions in colposcopic images. 2139-2157 - Francesco Colace, Dajana Conte, Massimo De Santo, Marco Lombardi, Domenico Santaniello

, Carmine Valentino:
A content-based recommendation approach based on singular value decomposition. 2158-2176 - Lianlian Fu, Xinsheng Ding, Yuehui Ding:

Ensemble empirical mode decomposition-based preprocessing method with Multi-LSTM for time series forecasting: a case study for hog prices. 2177-2200 - Jianqiang Hu, Yang Liu, Keshou Wu:

Neural network pruning based on channel attention mechanism. 2201-2218 - Chaoxin Cai, Yingpeng Sang

, Hui Tian:
A multimodal differential privacy framework based on fusion representation learning. 2219-2239 - Zhao Yang

, Qingshuang Sun
:
A dynamic global backbone updating for communication-efficient personalised federated learning. 2240-2264 - Mustapha Maimouni

, Badr Abou El Majd
, Mohsine Bouya
:
RFID network planning using a new hybrid ANNs-based approach. 2265-2290 - Weidong Zhao, Lin Zhu, Ming Wang, Xiliang Zhang, Jinming Zhang:

WTL-CNN: a news text classification method of convolutional neural network based on weighted word embedding. 2291-2312 - Jisheng Qin

, Xiaoqin Zeng, Shengli Wu
, Yang Zou:
Context-sensitive graph representation learning. 2313-2331 - Likun Xing, Liuyi Ling, Xian-Yuan Wu:

Lithium-ion battery state-of-charge estimation based on a dual extended Kalman filter and BPNN correction. 2332-2363 - Zhengkai Ding, Qiming Fu, Jianping Chen, Hong-Jie Wu, You Lu, Fuyuan Hu:

Energy-efficient control of thermal comfort in multi-zone residential HVAC via reinforcement learning. 2364-2394 - Ibrahim Abunadi:

Deep and hybrid learning of MRI diagnosis for early detection of the progression stages in Alzheimer's disease. 2395-2430 - Mounika Jammula

, Venkata Vakamulla Mani, Sai Krishna Kondoju
:
Hybrid lightweight cryptography with attribute-based encryption standard for secure and scalable IoT system. 2431-2447 - Yuan Zhu, Qingyuan Xia, Wen Jin:

SRDD: a lightweight end-to-end object detection with transformer. 2448-2465 - Haitao Wang, Fangbing Li:

A text classification method based on LSTM and graph attention network. 2466-2480 - Lei Zhao, Zhengwei Bao, Zhijun Xie, Guangyan Huang, Zeeshan Ur Rehman:

A point and density map hybrid network for crowd counting and localization based on unmanned aerial vehicles. 2481-2499 - Zhishuang Yang, Yidao Dong, Xiaogang Deng, Laiping Zhang:

AMGNET: multi-scale graph neural networks for flow field prediction. 2500-2519 - Qianqian Wang

, Chifeng Shao
, Xianwen Fang
, Huamin Zhang
:
Business process recommendation method based on cost constraints. 2520-2537 - Zhen Guo

, Kai Huang
, Jun Ye
:
Signal fingerprint feature extraction and recognition method for communication satellite. 2538-2558 - Ensi Chen, Huan Zhao, Bo Li, Xupeng Zha, Haoqian Wang, Song Wang:

Affective feature knowledge interaction for empathetic conversation generation. 2559-2576 - Gulinigeer Abudouwaili

, Kahaerjiang Abiderexiti, Yunfei Shen, Aishan Wumaier:
Research on the Uyghur morphological segmentation model with an attention mechanism. 2577-2596 - Bingyuan Wang, Baisong Liu

, Hao Ren, Xueyuan Zhang, Jiangcheng Qin, Qian Dong, Jiangbo Qian:
Exploiting high-order behaviour patterns for cross-domain sequential recommendation. 2597-2614 - Kaizhi Chen, Chengpei Le, Shangping Zhong, Longkun Guo, Ge Xu:

NNNPE: non-neighbourhood and neighbourhood preserving embedding. 2615-2629 - Hongyu Yang, Yupei Zhang, Liang Zhang, Xiang Cheng:

Malware detection based on visualization of recombined API instruction sequence. 2630-2651 - Weidong Zhao, Xiaotong Liu

, Jun Jing, Rongchang Xi:
Re-LSTM: A long short-term memory network text similarity algorithm based on weighted word embedding. 2652-2670 - Yue Song, Li-yong Wang, Haodong Wang

, Meng-lin Li:
Lane detection based on IBN deep neural network and attention. 2671-2688 - Weiliang Yan, Yuqing Li, Huan Yang, Baoxiang Huang, Zhenkuan Pan:

Semantic-aware multi-task learning for image aesthetic quality assessment. 2689-2713 - K. Janani

, S. Ramamoorthy
:
Threat analysis model to control IoT network routing attacks through deep learning approach. 2714-2754 - Liam Riddell

, Mohiuddin Ahmed
, Paul S. Haskell-Dowland
:
Establishment and mapping of heterogeneous anomalies in network intrusion datasets. 2755-2783 - Lal Hussain

, Shahzad Ahmad Qureshi
, Amjad Aldweesh, Jawad ur Rehman Pirzada, Faisal Mehmood Butt, Elsayed Tag-Eldin, Mushtaq Ali, Abdulmohsen Algarni
, Muhammad Amin Nadim:
Automated breast cancer detection by reconstruction independent component analysis (RICA) based hybrid features using machine learning paradigms. 2784-2806 - Jisheng Qin

, Qianqian Wang, Tao Tao:
Structural reinforcement-based graph convolutional networks. 2807-2821 - Qingye Zhao

, Yi Zhang
, Xuandong Li:
Safe reinforcement learning for dynamical systems using barrier certificates. 2822-2844 - Cuihong Fan, Weina Fu

, Shuai Liu
:
A high-precision correction method in non-rigid 3D motion poses reconstruction. 2845-2859 - Yi-Ping You, Yi-Chiao Su:

Reduced O3 subsequence labelling: a stepping stone towards optimisation sequence prediction. 2860-2877 - Correction. 2878


manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














