default search action
Connection Science, Volume 34
Volume 34, Number 1, December 2022
- Zhaohua Zheng, Yize Zhou, Yilong Sun, Zhang Wang, Boyi Liu, Keqiu Li:
Applications of federated learning in smart cities: recent advances, taxonomy, and open challenges. 1-28 - Nankai Lin, Jinxian Li, Shengyi Jiang:
A simple but effective method for Indonesian automatic text summarisation. 29-43 - Shengting Wu, Yuling Liu, Ziran Zou, Tien-Hsiung Weng:
S_I_LSTM: stock price prediction based on multiple data sources and sentiment analysis. 44-62 - Ke Lu, Xianwen Fang, Na Fang, Esther Asare:
Discovery of effective infrequent sequences based on maximum probability path. 63-82 - Angtai Li, Guohua Tian, Meixia Miao, Jianpeng Gong:
Blockchain-based cross-user data shared auditing. 83-103 - Fangfang Xu, Huan Zhao, Weihua Zhou, Yun Zhou:
Cost-sensitive regression learning on small dataset through intra-cluster product favoured feature selection. 104-123 - Sixian Lian, Mingdong Tang:
API recommendation for Mashup creation based on neural graph collaborative filtering. 124-138 - Jianqiang Hu, Wei Liang, Osama Hosam, Meng-Yen Hsieh, Xin Su:
5GSS: a framework for 5G-secure-smart healthcare monitoring. 139-161 - Likun Xing, Liuyi Ling, Bing Gong, Menglong Zhang:
State-of-charge estimation for Lithium-Ion batteries using Kalman filters based on fractional-order models. 162-184 - Nevena Rankovic, Dragica Rankovic, Mirjana Ivanovic, Ljubomir Lazic:
COSMIC FP method in software development estimation using artificial neural networks based on orthogonal arrays. 185-204 - Hanqing Xu, Shunxiang Zhang, Guangli Zhu, Hai Yang Zhu:
ALSEE: a framework for attribute-level sentiment element extraction towards product reviews. 205-223 - Erping Song, Hecheng Li:
A hybrid differential evolution for multi-objective optimisation problems. 224-253 - Shunxiang Zhang, Hongbin Yu, Guangli Zhu:
An emotional classification method of Chinese short comment text based on ELECTRA. 254-273 - Hua-Yi Lin:
Integrate the hierarchical cluster elliptic curve key agreement with multiple secure data transfer modes into wireless sensor networks. 274-300 - Tianyuan Li, Xin Su, Wei Liu, Wei Liang, Meng-Yen Hsieh, Zhuhui Chen, Xuchong Liu, Hong Zhang:
Memory-augmented meta-learning on meta-path for fast adaptation cold-start recommendation. 301-318 - Xiangyong Liu, Guojun Wang, Md. Zakirul Alam Bhuiyan:
Personalised context-aware re-ranking in recommender system. 319-338 - Jingwei Too, Ali Safaa Sadiq, Seyed Mohammad Mirjalili:
A conditional opposition-based particle swarm optimisation for feature selection. 339-361 - Daniel Gerbi Duguma, Jiyoon Kim, Sangmin Lee, Nam-Su Jho, Vishal Sharma, Ilsun You:
A lightweight D2D security protocol with request-forecasting for next-generation mobile networks. 362-386 - Sengathir Janakiraman, A. Rajesh, Gaurav Dhiman, S. Vimal, C. A. Yogaraja, Wattana Viriyasitavat:
A novel cluster head selection using Hybrid Artificial Bee Colony and Firefly Algorithm for network lifetime and stability in WSNs. 387-408 - Zhongliang Wei, Wenjuan Liu, Guangli Zhu, Shunxiang Zhang, Meng-Yen Hsieh:
Sentiment classification of Chinese Weibo based on extended sentiment dictionary and organisational structure of comments. 409-428 - Na Hu, Dafang Zhang, Kun Xie, Wei Liang, Meng-Yen Hsieh:
Graph learning-based spatial-temporal graph convolutional neural networks for traffic forecasting. 429-448 - Yan Ding, Yunan Zhai, Yujuan Zhai, Jia Zhao:
Explore deep auto-coder and big data learning to hard drive failure prediction: a two-level semi-supervised model. 449-471 - Xi Chen, Hua-Yi Feng, Jia-Le Wang:
Robust coal granularity estimation via deep neural network with an image enhancement layer. 472-491 - Yang Li, Hong-Ning Dai, Zibin Zheng:
Selective transfer learning with adversarial training for stock movement prediction. 492-510 - Xixi Yan, Pei Yin, Yongli Tang, Suwei Feng:
Multi-keywords fuzzy search encryption supporting dynamic update in an intelligent edge network. 511-528 - Bo Li, Minrui Wu, Zhongcheng Li, Yi Sun:
A pricing model for subscriptions in data transactions. 529-550 - Shaokang Cai, Dezhi Han, Xinming Yin, Dun Li, Chin-Chen Chang:
A Hybrid parallel deep learning model for efficient intrusion detection based on metric learning. 551-577 - Jeremiah Osei-Kwakye, Fei Han, Alfred Adutwum Amponsah, Qinghua Ling, Timothy Apasiba Abeo:
A hybrid optimization method by incorporating adaptive response strategy for Feedforward neural network. 578-607 - Xiaoshu Zhou, Fei Zhu, Peiyao Zhao:
Predicting before acting: improving policy quality by taking a vision of consequence. 608-629 - Wenliang Wu, Xingshe Zhou, Bo Shen:
Comprehensive evaluation of the intelligence levels for unmanned swarms based on the collective OODA loop and group extension cloud model. 630-651 - Likai Wang, Jinyan Chen, Zhenghang Chen, Yuxin Liu, Haolin Yang:
Multi-stream part-fused graph convolutional networks for skeleton-based gait recognition. 652-669 - Wei Zhao, Shan Zhao, Shuhui Chen, Tien-Hsiung Weng, Wenjie Kang:
Entity and relation collaborative extraction approach based on multi-head attention and gated mechanism. 670-686 - Zihua Chen, Chuanli Wang, Huawei Jin, Jingzhao Li, Shunxiang Zhang, Qichun Ouyang:
Hierarchical-fuzzy allocation and multi-parameter adjustment prediction for industrial loading optimisation. 687-708 - Wenhui Xiao, Zhaohui Tang, Ce Yang, Wei Liang, Meng-Yen Hsieh:
ASM-VoFDehaze: a real-time defogging method of zinc froth image. 709-731 - Wenjin Hu, Panpan Xue, Guoyuan He, Huiyuan Tang, Huafei Song, Chaoyang Yue:
Few shot object detection for headdresses and seats in Thangka Yidam based on ResNet and deformable convolution. 732-748 - Jyun-Siang Huang, Wuu Yang, Yi-Ping You:
Profile-guided optimisation for indirect branches in a binary translator. 749-765 - Xiaoli Sun, Qiwei Wang, Xiujun Zhang, Chen Xu, Weiqiang Zhang:
Deep blur detection network with boundary-aware multi-scale features. 766-784 - Wen-Sheng Chen, Xiya Ge, Binbin Pan:
A novel general kernel-based non-negative matrix factorisation approach for face recognition. 785-810 - Xingsi Xue, Haolin Wang, Xin Zhou, Guojun Mao, Hai Zhu:
Matching heterogeneous ontologies with adaptive evolutionary algorithm. 811-828 - Wei Li, Yafeng Sun, Ying Huang, Jianbing Yi:
An adaptive differential evolution algorithm using fitness distance correlation and neighbourhood-based mutation strategy. 829-856 - Hui Du, Yanting Hao, Zhihe Wang:
An improved density peaks clustering algorithm by automatic determination of cluster centres. 857-873 - Lei Wu, Xia Wei, Lingzhen Meng, Shengnan Zhao, Hao Wang:
Privacy-preserving location-based traffic density monitoring. 874-894 - Jun Zhang, Yonghang Tai:
Secure medical digital twin via human-centric interaction and cyber vulnerability resilience. 895-910 - Jian Xie, Wenan Tan, Zhibin Yang, Shuming Li, Linquan Xing, Zhiqiu Huang:
SysML-based compositional verification and safety analysis for safety-critical cyber-physical systems. 911-941 - Haiyan Chen, Ying Yu, Yizhen Jia, Linghui Zhang:
Safe transductive support vector machine. 942-959 - Mingyang Wang, Tianyi Sun, Kang Song, Shuang Li, Jing Jiang, Linjun Sun:
An efficient sparse pruning method for human pose estimation. 960-974 - Jiaxiang Wu, Pan Zeng, Peizhong Liu, Guorong Lv:
Automatic classification method of liver ultrasound standard plane images using pre-trained convolutional neural network. 975-989 - Zaiyang Yu, Shuang Li, Linjun Sun, Liang Liu, Haining Wang:
Multi-distribution noise quantisation: an extreme compression scheme for transformer according to parameter distribution. 990-1004 - Boyu Yang, Anmin Cai, Weirong Lin:
Analysis of early fault vibration detection and analysis of offshore wind power transmission based on deep neural network. 1005-1017 - Shao-Hua Wang, Chia-Heng Tu, Jyh-Ching Juang:
Automatic traffic modelling for creating digital twins to facilitate autonomous vehicle development. 1018-1037 - Li Zhang, Jianbo Xu:
Blockchain-based anonymous authentication for traffic reporting in VANETs. 1038-1065 - Cruz E. Borges, Evgenia Kapassa, Marios Touloupou, Jon Legarda Macón, Diego Casado-Mansilla:
Blockchain application in P2P energy markets: social and legal aspects. 1066-1088 - Hua-Yi Lin, Meng-Yen Hsieh:
A dynamic key management and secure data transfer based on m-tree structure with multi-level security framework for Internet of vehicles. 1089-1118 - Zhaohua Zheng, Zhaobin Qin, Keqiu Li, Tie Qiu:
A team-based multitask data acquisition scheme under time constraints in mobile crowd sensing. 1119-1145 - Guopeng Liu, Jianbin Ma, Tongle Hu, Xiaoying Gao:
A feature selection method with feature ranking using genetic programming. 1146-1168 - Wenjing Shan:
Digital streaming media distribution and transmission process optimisation based on adaptive recurrent neural network. 1169-1180 - Hongwei Tao, Yixiang Chen, Hengyang Wu:
Theoretical and empirical validation of software trustworthiness measure based on the decomposition of attributes. 1181-1200 - Zhenhui Wang, Dezhi Han, Ming Li, Han Liu, Mingming Cui:
The abnormal traffic detection scheme based on PCA and SSH. 1201-1220 - Hok-Leung Kung, Shu-Jun Yang, Kuo-Chan Huang:
An improved Monte Carlo Tree Search approach to workflow scheduling. 1221-1251 - Chuan Zhao, Xin Li, Zezhi Shao, Hongji Yang, Fei Wang:
Multi-featured spatial-temporal and dynamic multi-graph convolutional network for metro passenger flow prediction. 1252-1272 - Jitendra Singh Yadav, Narendra Singh Yadav, Akhilesh Kumar Sharma:
Security analysis of smart contract based rating and review systems: the perilous state of blockchain-based recommendation practices. 1273-1298 - Yi Zhao, Hancheng Huang, Zhixiang Li, Huang Yiwang, Manjie Lu:
Intelligent garbage classification system based on improve MobileNetV3-Large. 1299-1321 - Xin Liu, Ziang Liu, Yingli Zhang, Wenqiang Zhang, Dong Lv, Qingguo Zhou:
TCN enhanced novel malicious traffic detection for IoT devices. 1322-1341 - Ruiqi Luo, Bangchao Wang, Yu Feng, Zaihui Deng, Xian Zhong:
Conceptual semantic enhanced representation learning for event recognition in still images. 1342-1366 - Li Hai-Dong, Yang Ya-Juan, Lei Lu:
In the context of COVID-19: the impact of employees' risk perception on work engagement. 1367-1383 - Lu Liang, Yong Li, Ming Wen, Ying Liu:
KG4Py: A toolkit for generating Python knowledge graph and code semantic search. 1384-1400 - Ioannis Stellios, Kostas Mokos, Panayiotis Kotzanikolaou:
Assessing smart light enabled cyber-physical attack paths on urban infrastructures and services. 1401-1429 - Jing Zheng, Xiaoliang Wang, Qing Yang, Wenhui Xiao, Yapeng Sun, Wei Liang:
A blockchain-based lightweight authentication and key agreement scheme for internet of vehicles. 1430-1453 - Xiangjuan Wu, Yuping Wang, Ziqing Wang:
A centerline symmetry and double-line transformation based algorithm for large-scale multi-objective optimization. 1454-1481 - Beibei Jin, Dong Liu, Li Li:
Research on social recommendation algorithm based on fuzzy subjective trust. 1541-1556 - Wenbo Mi, Yong Li, Ming Wen, Youren Chen:
Using active learning selection approach for cross-project software defect prediction. 1482-1499 - Pan Liu, Wulan Huang:
A graph algorithm for the time constrained shortest path. 1500-1518 - Guanting Du, Fei Zhu, Quan Liu:
Vital node searcher: find out critical node measure with deep reinforcement learning. 1519-1539 - Weizhong Wang, Hai-Lin Liu, Hongjian Shi:
A multi-objective bilevel optimisation evolutionary algorithm with dual populations lower-level search. 1556-1581 - Li Ruan, Xiangrong Xu, Limin Xiao, Lei Ren, Nasro Min-Allah, Yunzhi Xue:
Evaluating performance variations cross cloud data centres using multiview comparative workload traces analysis. 1582-1608 - Qinghao Zhang, Miao Ye, Xiaofang Deng:
A novel anomaly detection method for multimodal WSN data flow via a dynamic graph neural network. 1609-1637 - Xinguang Li, Xiaoning Li, Shuai Chen, Shanxian Ma, Fenfang Xie:
Neural-based automatic scoring model for Chinese-English interpretation with a multi-indicator assessment. 1638-1653 - Shixiong Yao, Pujie Jing, Pei Li, Jiageng Chen:
A multi-dimension traceable privacy-preserving prevention and control scheme of the COVID-19 epidemic based on blockchain. 1654-1677 - Li Li, Zhongqun Wang, Chen Li, Linjun Chen, Yong Wang:
Collaborative filtering recommendation using fusing criteria against shilling attacks. 1678-1696 - Jisheng Qin, Xiaoqin Zeng, Shengli Wu, Yang Zou:
Feature recommendation strategy for graph convolutional network. 1697-1718 - Ching-Chun Chang:
Automation of reversible steganographic coding with nonlinear discrete optimisation. 1719-1735 - Xingyuan Chen, Peng Jin, Ping Cai, Hongjun Wang, Xinyu Dai, Jiajun Chen:
The detection of distributional discrepancy for language GANs. 1736-1750 - Liutao Zhao, Jiawan Zhang, Lin Zhong:
A blockchain-based transaction system with payment statistics and supervision. 1751-1771 - Dawei Yang, Yan Du, Hongli Yao, Liyan Bao:
Image semantic segmentation with hierarchical feature fusion based on deep neural network. 1772-1784 - Subo Wei, Guangli Zhu, Zhengyan Sun, Xiaoqing Li, Tien-Hsiung Weng:
GP-GCN: Global features of orthogonal projection and local dependency fused graph convolutional networks for aspect-level sentiment classification. 1785-1806 - R. Priya, N. Sivakumar:
Resisting bad mouth attack in vehicular platoon using node-centric weight-based trust management algorithm (NC-WTM). 1807-1832 - Catalin Negru, George-Alexandru Musat, Madalin Colezea, Constantin Anghel, Alexandru Dumitrascu, Florin Pop, Carmen De Maio, Aniello Castiglione:
Dependable workflow management system for smart farms. 1833-1854 - R. Sudharsan, E. N. Ganesh:
A Swish RNN based customer churn prediction for the telecom industry with a novel feature selection strategy. 1855-1876 - Shunxiang Zhang, Houyue Wu, Xin Xu, Guangli Zhu, Meng-Yen Hsieh:
CL-ECPE: contrastive learning with adversarial samples for emotion-cause pair extraction. 1877-1894 - Zhendong Liu, Xi Chen, Dongyan Li, Xinrong Lv, Mengying Qin, Ke Bai, Zhiqiang He, Yurong Yang, Xiaofeng Li, Qionghai Dai:
Predicting algorithm of attC site based on combination optimization strategy. 1895-1912 - Mengyang Qin:
Application of efficient recognition algorithm based on deep neural network in English teaching scene. 1913-1928 - Jia Fu, Bangcan Cao, Xiaoliang Wang, Pengjie Zeng, Wei Liang, Yuzhen Liu:
BFS: A blockchain-based financing scheme for logistics company in supply chain finance. 1929-1955 - Na Fang, Xianwen Fang, Ke Lu:
Online incremental updating for model enhancement based on multi-perspective trusted intervals. 1956-1980 - Khanittha Talordphop, Saowanit Sukparungsee, Yupaporn Areepong:
New modified exponentially weighted moving average-moving average control chart for process monitoring. 1981-1998 - Zeng Wu, Hui Huang, Yuping Zhou, Chenhuang Wu:
A secure and efficient data deduplication framework for the internet of things via edge computing and blockchain. 1999-2025 - Yubin Qu, Tie Bao, Xiang Chen, Long Li, Xianzhen Dou, Meng Yuan, Hongmei Wang:
Do we need to pay technical debt in blockchain software systems? 2026-2047 - Mingxin Tang, Wei Chen, Wen Yang:
Anomaly detection of industrial state quantity time-Series data based on correlation and long short-term memory. 2048-2065 - Shiwen Gong, Dandan Liu, Md. Zakirul Alam Bhuiyan, Xiaoguang Niu:
OCP: an OLAP-based bus crowdedness smart-perceiving mechanism for urban transportation. 2066-2083 - Benqiang Wang, Shunxiang Zhang:
A new locally adaptive K-nearest centroid neighbor classification based on the average distance. 2084-2107 - Hai Huan, Zelin Guo, Tingting Cai, Zichen He:
A text classification method based on a convolutional and bidirectional long short-term memory model. 2108-2124 - Tetsuo Fukuzaki, Shaoying Liu, Michael Butler:
DevFemOps: enhancing maintainability based on microservices using formal engineering methods. 2125-2138 - Tianxiang Xu, Peizhong Liu, Ping Li, Xiaoxia Wang, Huifeng Xue, Jingming Guo, Binhua Dong, Pengming Sun:
RACNet: risk assessment Net of cervical lesions in colposcopic images. 2139-2157 - Francesco Colace, Dajana Conte, Massimo De Santo, Marco Lombardi, Domenico Santaniello, Carmine Valentino:
A content-based recommendation approach based on singular value decomposition. 2158-2176 - Lianlian Fu, Xinsheng Ding, Yuehui Ding:
Ensemble empirical mode decomposition-based preprocessing method with Multi-LSTM for time series forecasting: a case study for hog prices. 2177-2200 - Jianqiang Hu, Yang Liu, Keshou Wu:
Neural network pruning based on channel attention mechanism. 2201-2218 - Chaoxin Cai, Yingpeng Sang, Hui Tian:
A multimodal differential privacy framework based on fusion representation learning. 2219-2239 - Zhao Yang, Qingshuang Sun:
A dynamic global backbone updating for communication-efficient personalised federated learning. 2240-2264 - Mustapha Maimouni, Badr Abou El Majd, Mohsine Bouya:
RFID network planning using a new hybrid ANNs-based approach. 2265-2290 - Weidong Zhao, Lin Zhu, Ming Wang, Xiliang Zhang, Jinming Zhang:
WTL-CNN: a news text classification method of convolutional neural network based on weighted word embedding. 2291-2312 - Jisheng Qin, Xiaoqin Zeng, Shengli Wu, Yang Zou:
Context-sensitive graph representation learning. 2313-2331 - Likun Xing, Liuyi Ling, Xian-Yuan Wu:
Lithium-ion battery state-of-charge estimation based on a dual extended Kalman filter and BPNN correction. 2332-2363 - Zhengkai Ding, Qiming Fu, Jianping Chen, Hong-Jie Wu, You Lu, Fuyuan Hu:
Energy-efficient control of thermal comfort in multi-zone residential HVAC via reinforcement learning. 2364-2394 - Ibrahim Abunadi:
Deep and hybrid learning of MRI diagnosis for early detection of the progression stages in Alzheimer's disease. 2395-2430 - Mounika Jammula, Venkata Vakamulla Mani, Sai Krishna Kondoju:
Hybrid lightweight cryptography with attribute-based encryption standard for secure and scalable IoT system. 2431-2447 - Yuan Zhu, Qingyuan Xia, Wen Jin:
SRDD: a lightweight end-to-end object detection with transformer. 2448-2465 - Haitao Wang, Fangbing Li:
A text classification method based on LSTM and graph attention network. 2466-2480