


default search action
Information Sciences, Volume 512
Volume 512, February 2020
- Nan Jiang

, Dong Xu
, Jie Zhou, Hongyang Yan, Tao Wan, Jiaqi Zheng:
Toward optimal participant decisions with voting-based incentive model for crowd sensing. 1-17 - Shudong Huang

, Zenglin Xu
, Ivor W. Tsang
, Zhao Kang
:
Auto-weighted multi-view co-clustering with bipartite graphs. 18-30 - Gnaneswaran Nagamani

, Young Hoon Joo
, G. Soundararajan
, Reza Mohajerpoor
:
Robust event-triggered reliable control for T-S fuzzy uncertain systems via weighted based inequality. 31-49 - Vicenç Torra

, Yasuo Narukawa, Michio Sugeno:
On the f-divergence for discrete non-additive measures. 50-63 - Ming Yang

, Aimin Zhou
, Changhe Li
, Jing Guan, Xuesong Yan:
CCFR2: A more efficient cooperative co-evolutionary framework for large-scale global optimization. 64-79 - Shaofei Wang

, Depeng Dang
:
Incentive mechanism for the listing item task in crowdsourcing. 80-95 - Rajeev Kumar

, Ki-Hyun Jung
:
Robust reversible data hiding scheme based on two-layer embedding strategy. 96-107 - Huidong Wang, Xiaohong Pan, Jun Yan

, Jinli Yao, Shifan He:
A projection-based regret theory method for multi-attribute decision making under interval type-2 fuzzy sets environment. 108-122 - Seok-Jun Bu

, Sung-Bae Cho
:
A convolutional neural-based learning classifier system for detecting database intrusion via insider attack. 123-136 - Qingqing Han, Jingmei Liu, Zhiwei Shen, Jingwei Liu, Fengkui Gong:

Vector partitioning quantization utilizing K-means clustering for physical layer secret key generation. 137-160 - Guoyin Jiang

, Xiaodong Feng, Wenping Liu, Xingjun Liu
:
Clicking position and user posting behavior in online review systems: A data-driven agent-based modeling approach. 161-174 - Hao Fei, Yafeng Ren

, Donghong Ji:
A tree-based neural network model for biomedical event trigger detection. 175-185 - Haibin Sun

, Guangdeng Zong
, C. L. Philip Chen:
Adaptive decentralized output feedback PI tracking control design for uncertain interconnected nonlinear systems with input quantization. 186-206 - Hongfa Ding

, Youliang Tian, Changgen Peng, Youshan Zhang
, Shuwen Xiang:
Inference attacks on genomic privacy with an improved HMM and an RCNN model for unrelated individuals. 207-218 - Francielle Santo Pedro

, Estevão Esmi
, Laécio Carvalho de Barros:
Calculus for linearly correlated fuzzy function using Fréchet derivative and Riemann integral. 219-237 - Charith Perera

, Mahmoud Barhamgi
, Arosha K. Bandara
, Muhammad Ajmal Azad, Blaine A. Price
, Bashar Nuseibeh
:
Designing privacy-aware internet of things applications. 238-257 - Henrik Sloot

, Matthias Scherer
:
A probabilistic view on semilinear copulas. 258-276 - Myeongjun Jang, Seungwan Seo, Pilsung Kang:

Corrigendum to "Recurrent neural network-based semantic variational autoencoder for Sequence-to-sequence learning" [Information Sciences 490 (2019) 59-73]. 277 - Liangli Zhen

, Miqing Li
, Dezhong Peng, Xin Yao
:
Objective reduction for visualising many-objective solution sets. 278-294 - Bao Zhao

, Juntong Xi
:
Efficient and accurate 3D modeling based on a novel local feature descriptor. 295-314 - Jianyi Huang, Yuyuan Tang, Ying Hu, Jianjiang Li, Changjun Hu:

Predicting the active period of popularity evolution: A case study on Twitter hashtags. 315-326 - Xiaowei Jiang, Xiangyong Chen, Ming Chi

, Ming-Feng Ge
:
Optimal performance of LTI systems over power constrained erasure channels. 327-337 - Hui Lü, Wangli He

, Qing-Long Han
, Xiaohua Ge
, Chen Peng
:
Finite-time containment control for nonlinear multi-agent systems with external disturbances. 338-351 - Cuiping Wei

, Rosa M. Rodríguez
, Peng Li:
Note on entropies of hesitant fuzzy linguistic term sets and their applications. 352-368 - Na Li, Licheng Liu, Shutao Li

, Hui Lin:
Robust face hallucination via locality-constrained multiscale coding. 369-380 - Pierpaolo D'Urso, Livia De Giovanni

, Riccardo Massari:
Smoothed self-organizing map for robust clustering. 381-401 - Sumit Soman

, Jayadeva
, Rajat Thakur, Mayank Sharma, Suresh Chandra:
Sparsity in function and derivative approximation via the empirical feature space. 402-415 - Licheng Liu, Han Liu, Shutao Li

, C. L. Philip Chen:
Face hallucination via multiple feature learning with hierarchical structure. 416-430 - Dong Yang

, Guangdeng Zong
, Sing Kiong Nguang
:
H∞ bumpless transfer reliable control of Markovian switching LPV systems subject to actuator failures. 431-445 - Junfei Qiao

, Fei Li, Shengxiang Yang
, Cuili Yang, Wenjing Li, Ke Gu:
An adaptive hybrid evolutionary immune multi-objective algorithm based on uniform distribution selection. 446-470 - Jae Hong Seo

:
Efficient digital signatures from RSA without random oracles. 471-480 - Md Meftahul Ferdaus

, Mahardhika Pratama
, Sreenatha G. Anavatti, Matthew A. Garratt, Edwin Lughofer:
PAC: A novel self-adaptive neuro-fuzzy controller for micro aerial vehicles. 481-505 - Wei Shao, Zhi Wang

, Xiaolu Wang, Kefan Qiu, Chunfu Jia, Chong Jiang
:
LSC: Online auto-update smart contracts for fortifying blockchain-based log systems. 506-517 - Jin-Ling Lin, Kao-Shing Hwang, Haobin Shi

, Wei Pan:
An ensemble method for inverse reinforcement learning. 518-532 - Yiyuan Wang

, Shiwei Pan, Chenxi Li, Minghao Yin
:
A local search algorithm with reinforcement learning based repair procedure for minimum weight independent dominating set. 533-548 - Tao Wen

, Yong Deng
:
Identification of influencers in complex networks by local information dimensionality. 549-562 - Dingjie Wang

, Wei Yu, Xiufen Zou:
Tensor-based mathematical framework and new centralities for temporal multilayer networks. 563-580 - Silvia Terragni

, Elisabetta Fersini, Enza Messina
:
Constrained Relational Topic Models. 581-594 - Dmitry Frolov

, Susana Nascimento
, Trevor I. Fenner, Boris G. Mirkin
:
Parsimonious generalization of fuzzy thematic sets in taxonomies applied to the analysis of tendencies of research in data science. 595-615 - Yan Xu, Song Sun, Jie Cui, Hong Zhong

:
Intrusion-resilient public cloud auditing scheme with authenticator update. 616-628 - S. H. Mousavi, Mohammad Khansari

, Rouhollah Rahmani:
A fully scalable big data framework for Botnet detection based on network traffic analysis. 629-640 - Qiang Zhou, Chengliang Tian

, Hanlin Zhang, Jia Yu
, Fengjun Li
:
How to securely outsource the extended euclidean algorithm for large-scale polynomials over finite fields. 641-660 - Yansen Su, Neng Guo, Ye Tian, Xingyi Zhang

:
A non-revisiting genetic algorithm based on a novel binary space partition tree. 661-674 - Jun-Liu Zhong, Chi-Man Pun

:
Two-pass hashing feature representation and searching method for copy-move forgery detection. 675-692 - Jinming Wang

, Zhenyu Xu, Zhangquan Wang, Sen Xu, Jun Jiang
:
Rapid compressed sensing reconstruction: A semi-tensor product approach. 693-707 - Tao Zhu

, Wenjian Luo
, Chenyang Bu
, Huansheng Ning
:
Making use of observable parameters in evolutionary dynamic optimization. 708-725 - Zhongjing Yu

, Zhong Zhang
, Haoran Chen, Junming Shao
:
Structured subspace embedding on attributed networks. 726-740 - Jose Luis Lisani

, Jean-Michel Morel
, Ana Belén Petro
, Catalina Sbert
:
Analyzing center/surround retinex. 741-759 - Chao Luo, Xi Song, Yuanjie Zheng:

A novel forecasting model for the long-term fluctuation of time series based on polar fuzzy information granules. 760-779 - Chaoran Cui

, Wenya Yang, Cheng Shi, Meng Wang, Xiushan Nie, Yilong Yin:
Personalized image quality assessment with Social-Sensed aesthetic preference. 780-794 - Xiaoya Che, Degang Chen, Ju-Sheng Mi:

A novel approach for learning label correlation with application to feature selection of multi-label data. 795-812 - Jingwen Zhao, Yunjun Gao, Chunyu Ma, Pengfei Jin, Shiting Wen:

On efficiently diversified top-k geo-social keyword query processing in road networks. 813-829 - Peide Liu

, Shyi-Ming Chen, Yumei Wang:
Multiattribute group decision making based on intuitionistic fuzzy partitioned Maclaurin symmetric mean operators. 830-854 - Yavar Khedmati, Reza Parvaz, Y. Behroo:

2D Hybrid chaos map for image security transform based on framelet and cellular automata. 855-879 - Abdelkamel Ben Ali

, Gabriel Luque, Enrique Alba:
An efficient discrete PSO coupled with a fast local search heuristic for the DNA fragment assembly problem. 880-908 - Zhiyong Yu

, Shuzhen Yu, Haijun Jiang
:
Consensus of multi-agent systems with finite-time and fixed-time observation. 909-928 - Hamzeh Agahi:

A refined Hölder's inequality for Choquet expectation by Cauchy-Schwarz's inequality. 929-934 - Lin Lan

, Pinghui Wang, Junzhou Zhao
, Jing Tao, John C. S. Lui, Xiaohong Guan:
Improving network embedding with partially available vertex and edge content. 935-951 - Feng Wang, Huiqing Zhu, Wei Li, Kangshun Li:

A hybrid convolution network for serial number recognition on banknotes. 952-963 - Liang Jia, Chen Chen

, Shoukun Xu, Ju Shen:
Fabric defect inspection based on lattice segmentation and template statistics. 964-984 - Francisco García-García, Antonio Corral

, Luis Iribarne
, Michael Vassilakopoulos
, Yannis Manolopoulos:
Efficient distance join query processing in distributed spatial data management systems. 985-1008 - Ming Zheng

, Tong Li, Rui Zhu
, Yahui Tang, Mingjing Tang, Leilei Lin, Zifei Ma:
Conditional Wasserstein generative adversarial network-gradient penalty-based approach to alleviating imbalanced data classification. 1009-1023 - Lei Wang

, Tao Sun, Chen Qian, Mark Goh
, Vikas Kumar Mishra:
Applying social network analysis to genetic algorithm in optimizing project risk response decisions. 1024-1042 - Elre T. Oldewage

, Andries P. Engelbrecht
, Christopher W. Cleghorn
:
Movement patterns of a particle swarm in high dimensional spaces. 1043-1062 - Tao Li

, Xiaoling Tang, Jifeng Ge, Shumin Fei:
Event-based fault-tolerant control for networked control systems applied to aircraft engine system. 1063-1077 - Matheus Araújo

, Adriano C. M. Pereira
, Fabrício Benevenuto
:
A comparative study of machine translation for multilingual sentence-level sentiment analysis. 1078-1102 - Xiushan Jiang

, Senping Tian
, Tianliang Zhang
, Weihai Zhang
:
Pareto optimal strategy for linear stochastic systems with H∞ constraint in finite horizon. 1103-1117 - Yuntao Wang

, Xiaowei Yi, Xianfeng Zhao
:
MP3 steganalysis based on joint point-wise and block-wise correlations. 1118-1133 - Gül Deniz Çayli

:
Nullnorms on bounded lattices derived from t-norms and t-conorms. 1134-1154 - Moatsum Alawida

, Azman Samsudin, Je Sen Teh
:
Enhanced digital chaotic maps based on bit reversal with applications in random bit generators. 1155-1169 - Zhao Tong

, Hongjian Chen, Xiaomei Deng, Kenli Li
, Keqin Li:
A scheduling scheme in the cloud computing environment using deep Q-learning. 1170-1191 - Firuz Kamalov

:
Kernel density estimation based sampling for imbalanced class distribution. 1192-1201 - Silvia Romagnoli

:
A vague multidimensional dependency structure: Conditional versus Unconditional fuzzy copula models. 1202-1213 - Tingting Pan

, Junhong Zhao, Wei Wu, Jie Yang
:
Learning imbalanced datasets based on SMOTE and Gaussian distribution. 1214-1233 - Krishna Vyas

, Flavius Frasincar
:
Determining the most representative image on a Web page. 1234-1248 - Jin-Tao Gao

, Wenjie Liu, Zhanhuai Li, Jian Zhang, Li Shen:
A general fragments allocation method for join query in distributed database. 1249-1263 - Selen Ayas

, Murat Ekinci:
Single image super resolution using dictionary learning and sparse coding with multi-scale and multi-directional Gabor feature representation. 1264-1278 - Aminu Da'u

, Naomie Salim, Idris Rabiu
, Akram Osman
:
Recommendation system exploiting aspect-based opinion mining with deep learning method. 1279-1292 - Seunghan Lee

, Young-Jun Son
:
Extended decision field theory with social-learning for long-term decision-making processes in social networks. 1293-1307 - Junseok Kwon

:
Robust visual tracking based on variational auto-encoding Markov chain Monte Carlo. 1308-1323 - Mahla Mohammadzadeh Khadem, Yahya Forghani

:
A recursive algorithm to increase the speed of regression-based binary recommendation systems. 1324-1334 - Amir Mohammad Fathollahi-Fard

, Mostafa Hajiaghaei-Keshteli
, Guangdong Tian, Zhiwu Li
:
An adaptive Lagrangian relaxation-based algorithm for a coordinated water supply and wastewater collection network design problem. 1335-1359 - Zhishan Dong, Shuangshuang Wang, Qun Liu

:
Spectral based hypothesis testing for community detection in complex networks. 1360-1371 - Hugo Manuel Proença

, Matthijs van Leeuwen
:
Interpretable multiclass classification by MDL-based rule lists. 1372-1393 - Peilan He, Guiyuan Jiang

, Siew-Kei Lam, Yidan Sun
:
Learning heterogeneous traffic patterns for travel time prediction of bus journeys. 1394-1406 - Linbo Luo, Xiangting Hou, Wentong Cai

, Bin Guo
:
Incremental route inference from low-sampling GPS data: An opportunistic approach to online map matching. 1407-1423 - Chang Li

, Yu Liu
, Juan Cheng, Rencheng Song
, Jiayi Ma, Chenhong Sui, Xun Chen:
Sparse unmixing of hyperspectral data with bandwise model. 1424-1441 - Yujun Chen, Ke Sun, Juhua Pu, Zhang Xiong, Xiangliang Zhang

:
GraPASA: Parametric graph embedding via siamese architecture. 1442-1457 - Adil Imad Eddine Hosni

, Kan Li, Sadique Ahmad
:
Minimizing rumor influence in multiplex online social networks based on human individual and social behaviors. 1458-1480 - Yingying Liang, Jindong Qin, Luis Martínez

, Jun Liu:
A heterogeneous QUALIFLEX method with criteria interaction for multi-criteria group decision making. 1481-1502 - Zahra Beheshti

:
A time-varying mirrored S-shaped transfer function for binary particle swarm optimization. 1503-1542 - Jia-Cai Liu

, Wen-Jian Zhao, Benjamin Lev
, Deng-Feng Li
, Jiuh-Biing Sheu, Yong-Wu Dai:
Novel equal division values based on players' excess vectors and their applications to logistics enterprise coalitions. 1543-1554 - Genghui Li

, Qiuzhen Lin
, Weifeng Gao:
Multifactorial optimization via explicit multipopulation evolutionary framework. 1555-1570 - Weijia Ju, Ling Chen, Bin Li, Wei Liu, Jun Sheng, Yuwei Wang:

A new algorithm for positive influence maximization in signed networks. 1571-1591 - Xiaohua Ge

, Qing-Long Han
, Xian-Ming Zhang
, Derui Ding
, Fuwen Yang
:
Resilient and secure remote monitoring for a class of cyber-physical systems against attacks. 1592-1605

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














