


default search action
Information Sciences, Volume 546
Volume 546, February 2021
- Farough Ashkouti

, Keyhan Khamforoosh
, Amir Sheikhahmadi
:
DI-Mondrian: Distributed improved Mondrian for satisfaction of the L-diversity privacy model using Apache Spark. 1-24 - Ke Huang

, Xiaosong Zhang, Yi Mu, Fatemeh Rezaeibagha
, Xiaojiang Du:
Scalable and redactable blockchain with update and anonymity. 25-41 - Bin Bai, Zhiwei Guo, Ce Zhou, Wei Zhang, Junyi Zhang:

Application of adaptive reliability importance sampling-based extended domain PSO on single mode failure in reliability engineering. 42-59 - Federica Cena, Luca Console, Fabiana Vernero:

Logical foundations of knowledge-based recommender systems: A unifying spectrum of alternatives. 60-73 - Joaquín Taverner

, Emilio Vivancos
, Vicent J. Botti:
A fuzzy appraisal model for affective agents adapted to cultural environments using the pleasure and arousal dimensions. 74-86 - Mohit Kumar

, Michael Rossbory, Bernhard Alois Moser
, Bernhard Freudenthaler:
An optimal (∊, δ)-differentially private learning of distributed deep fuzzy models. 87-120 - Surendra Nagar

, Ankush Jain
, Pramod Kumar Singh, Ajay Kumar:
Mixed-noise robust face super-resolution through residual-learning based error suppressed nearest neighbor representation. 121-145 - Fadi Dornaika

, Abdullah Baradaaji
, Youssof El Traboulsi:
Semi-supervised classification via simultaneous label and discriminant embedding estimation. 146-165 - En Zhang

, Ming Li
, Siu-Ming Yiu, Jiao Du
, Jun-Zhe Zhu, Ganggang Jin:
Fair hierarchical secret sharing scheme based on smart contract. 166-176 - Xiang Gao

, Jia Yu
, Wenting Shen, Yan Chang, Shibin Zhang, Ming Yang, Bin Wu:
Achieving low-entropy secure cloud data auditing with file and authenticator deduplication. 177-191 - Zhong-Hua Pang

, Lan-Zhi Fan, Jian Sun
, Kun Liu, Guo-Ping Liu
:
Detection of stealthy false data injection attacks against networked control systems via active data modification. 192-205 - Bosheng Song

, Xiangxiang Zeng
, Alfonso Rodríguez-Patón
:
Monodirectional tissue P systems with channel states. 206-219 - Pengxu Li

, Panshuo Li
, Jing Zhao, Bin Zhang:
Robust gain-scheduling static output-feedback H∞ control of vehicle lateral stability with heuristic approach. 220-233 - Jinling Wang, Jinling Liang, Cheng-Tang Zhang:

Dissipativity analysis and synthesis for positive Roesser systems under the switched mechanism and Takagi-Sugeno fuzzy rules. 234-252 - Chaoyang Li

, Yuan Tian, Xiubo Chen, Jian Li
:
An efficient anti-quantum lattice-based blind signature for blockchain-enabled systems. 253-264 - Keke Huang, Haofei Wen, Han Liu

, Chunhua Yang
, Weihua Gui:
A geometry constrained dictionary learning method for industrial process monitoring. 265-282 - Yiping Luo

, Xing Xiao, Jinde Cao
, Anping Li
, Guohan Lin:
Event-triggered guaranteed cost consensus control for second-order multi-agent systems based on observers. 283-297 - Xu Wang

, Peng Hu, Liangli Zhen
, Dezhong Peng:
DRSL: Deep Relational Similarity Learning for Cross-modal Retrieval. 298-311 - Feng Jin, Jun Zhao, Ying Liu, Wei Wang, Qingshan Xu:

A scheduling approach with uncertainties in generation and consumption for converter gas system in steel industry. 312-328 - Yanan Wang, Jun Wang

, Haiying Wang, Ruilin Zhang, Ming Li:
Users' mobility enhances information diffusion in online social networks. 329-348 - Ali Ahrari

, Saber M. Elsayed
, Ruhul A. Sarker
, Daryl Essam
, Carlos A. Coello Coello:
Weighted pointwise prediction method for dynamic multiobjective optimization. 349-367 - Lei Chen

, Quansen Sun, Fanhai Wang:
Attention-adaptive and deformable convolutional modules for dynamic scene deblurring. 368-377 - Nicolas Gutowski

, Tassadit Amghar, Olivier Camp
, Fabien Chhel
:
Gorthaur-EXP3: Bandit-based selection from a portfolio of recommendation algorithms balancing the accuracy-diversity dilemma. 378-396 - Jiangxiong Fang, Huaxiang Liu, Liting Zhang, Jun Liu, Hesheng Liu:

Region-edge-based active contours driven by hybrid and local fuzzy region-based energy for image segmentation. 397-419 - Suyeon Yoo, Sungjin Kim, Seungjae Kim, Brent ByungHoon Kang:

AI-HydRa: Advanced hybrid approach using random forest and deep learning for malware classification. 420-435 - Yige Xue

, Yong Deng
, Harish Garg
:
Uncertain database retrieval with measure - Based belief function attribute values under intuitionistic fuzzy set. 436-447 - Xiaodong Feng

, Sen Wu
:
Robust sparse coding via self-paced learning for data representation. 448-468 - Gleb Beliakov

:
On the derivatives of set functions in matrix representation. 469-480 - Donghoon Chang, Surabhi Garg

, Mohona Ghosh, Munawar Hasan:
BIOFUSE: A framework for multi-biometric fusion on biocryptosystem level. 481-511 - Ying Sun, Derui Ding

, Hongli Dong, Hongjian Liu:
Event-based resilient filtering for stochastic nonlinear systems via innovation constraints. 512-525 - Omid Keivani, Kaushik Sinha:

Random projection-based auxiliary information can improve tree-based nearest neighbor search. 526-542 - Weichen Wu, Yitian Xu

, Xinying Pang:
A hybrid acceleration strategy for nonparallel support vector machine. 543-558 - Feng Wang

, Jinhua She, Yasuhiro Ohyama, Wenjun Jiang, Geyong Min, Guojun Wang, Min Wu:
Maximizing positive influence in competitive social networks: A trust-based solution. 559-572 - Xiaowu Mu

, Xin Li
, Jianyin Fang, Xihui Wu
:
Reliable observer-based finite-time H∞ control for networked nonlinear semi-Markovian jump systems with actuator fault and parameter uncertainties via dynamic event-triggered scheme. 573-595 - Xiaohui Kuang, Xianfeng Gao, Lianfang Wang, Gang Zhao, Lishan Ke, Quanxin Zhang:

A discrete cosine transform-based query efficient attack on black-box object detectors. 596-607 - Boshan Shi

, Jiuzhen Liang
, Lan Di
, Chen Chen
, Zhenjie Hou:
Fabric defect detection via low-rank decomposition with gradient information and structured graph algorithm. 608-626 - Feng Sun

, Xiao-Bing Qu:
A common characterization for migrative uni-nullnorms. 627-632 - Weijie Han

, Jingfeng Xue, Yong Wang, Fuquan Zhang, Xianwei Gao:
APTMalInsight: Identify and cognize APT malware based on system call information and ontology knowledge framework. 633-664 - Pawel B. Myszkowski

, Maciej Laszczyk:
Diversity based selection for many-objective evolutionary optimisation problems with constraints. 665-700 - Roberto Corizzo

, Michelangelo Ceci
, Hadi Fanaee-T
, João Gama:
Multi-aspect renewable energy forecasting. 701-722 - Yapei Gu, Xiang Yu, Kexin Guo, Jianzhong Qiao, Lei Guo

:
Detection, estimation, and compensation of false data injection attack for UAVs. 723-741 - Yumei Sun

, Lei Zhang:
Fixed-time adaptive fuzzy control for uncertain strict feedback switched systems. 742-752 - Dan Liu, Dan Ye

:
Observer-based synchronization control for complex networks against asynchronous attacks. 753-768 - Zheng Hui

, Jie Li, Xinbo Gao
, Xiumei Wang:
Progressive perception-oriented network for single image super-resolution. 769-786 - Dazhi Jiang

, Geng Tu, Donghui Jin, Kaichao Wu
, Cheng Liu, Lin Zheng
, Teng Zhou
:
A hybrid intelligent model for acute hypotensive episode prediction with large-scale data. 787-802 - Wenqiang Xu, Liangxiao Jiang

, Chaoqun Li:
Improving data and model quality in crowdsourcing using cross-entropy-based noise correction. 803-814 - Fei Zou, Gary G. Yen, Lixin Tang, Chunfeng Wang:

A reinforcement learning approach for dynamic multi-objective optimization. 815-834 - Yuzhu Ji, Haijun Zhang

, Zhao Zhang
, Ming Liu
:
CNN-based encoder-decoder networks for salient object detection: A comprehensive review and recent advances. 835-857 - Yuanshu Zhang, Yong Ma, Xiaobing Dai

, Hao Li
, Xiaoguang Mei
, Jiayi Ma:
Locality-constrained sparse representation for hyperspectral image classification. 858-870 - Weiwei Xu, Heng Zhang

, Xianghui Cao, Ruilong Deng
, Hongran Li, Jian Zhang
:
Securing wireless relaying communication for dual unmanned aerial vehicles with unknown eavesdropper. 871-882 - Xin Bi

, Chao Zhang
, Yao He, Xiangguo Zhao, Yongjiao Sun, Yuliang Ma:
Explainable time-frequency convolutional neural network for microseismic waveform classification. 883-896 - Liang Zhao

, Xingfeng Wang, Xinyi Huang:
Verifiable single-server private information retrieval from LWE with binary errors. 897-923 - Peng Wang, Tao Xiang

, Xiaoguo Li, Hong Xiang:
Access control encryption without sanitizers for Internet of Energy. 924-942 - Hong Lin

, James Lam
, Zheng Wang:
Secure state estimation for systems under mixed cyber-attacks: Security and performance analysis. 943-960 - Dan Jiang, Rongbin Xu, Xin Xu, Ying Xie:

Multi-view feature transfer for click-through rate prediction. 961-976 - Wilson Calmon

, Mariana Albi:
Estimating the number of clusters in a ranking data context. 977-995 - Sathishkumar Moorthy

, Young Hoon Joo
:
Multi-expert visual tracking using hierarchical convolutional feature fusion via contextual information. 996-1013 - Jianjun Qian, Shumin Zhu, Wai Keung Wong, Hengmin Zhang

, Zhihui Lai
, Jian Yang:
Dual robust regression for pattern classification. 1014-1029 - Chunliang Zhao, Yuren Zhou, Zefeng Chen:

Decomposition-based evolutionary algorithm with automatic estimation to handle many-objective optimization problem. 1030-1046 - Ling Chen

, Heqing Huang, Donghui Chen:
Join cardinality estimation by combining operator-level deep neural networks. 1047-1062 - Zhongyun Hua

, Zhihua Zhu, Shuang Yi, Zheng Zhang
, Hejiao Huang:
Cross-plane colour image encryption using a two-dimensional logistic tent modular map. 1063-1083 - Zhen Duan, Xian Sun, Shu Zhao, Jie Chen, Yanping Zhang, Jie Tang:

Hierarchical community structure preserving approach for network embedding. 1084-1096 - Alon Bartal

, Gilad Ravid:
Analyzing a large and unobtainable relationship graph using a streaming activity graph. 1097-1112 - Meifan Zhang, Hongzhi Wang

:
LAQP: Learning-based approximate query processing. 1113-1134 - Jiandong Zhou

, Qingpeng Zhang
, Xiang Li:
Fuzzy factorization machine. 1135-1147 - Rui Wang

, Wubin Ma
, Mao Tan
, Guohua Wu
, Ling Wang
, Dunwei Gong, Jian Xiong
:
Preference-inspired coevolutionary algorithm with active diversity strategy for multi-objective multi-modal optimization. 1148-1165 - Min Gao

, Junwei Zhang
, Junliang Yu
, Jundong Li, Junhao Wen
, Qingyu Xiong:
Recommender systems based on generative adversarial networks: A problem-driven perspective. 1166-1185 - Zhenjun Ming, Anand Balu Nellippallil, Guoxin Wang, Yan Yan, Janet K. Allen, Farrokh Mistree

:
A performance based method for information acquisition in engineering design under multi-parameter uncertainty. 1186-1207 - Chien-Ming Chen

, Lili Chen, Wensheng Gan
, Lina Qiu, Weiping Ding
:
Discovering high utility-occupancy patterns from uncertain data. 1208-1229 - Kunming Zheng

, Qiuju Zhang, Youmin Hu, Bo Wu:
Design of fuzzy system-fuzzy neural network-backstepping control for complex robot system. 1230-1255 - Ling Zheng, Fei Chao

, Neil Mac Parthaláin
, Defu Zhang
, Qiang Shen
:
Feature grouping and selection: A graph-based approach. 1256-1272 - Antonio Caliò, Andrea Tagarelli

:
Attribute based diversification of seeds for targeted influence maximization. 1273-1305 - Sun Geol Baek

, Sungkil Lee
, Young Ik Eom
:
Efficient single-pair all-shortest-path query processing for massive dynamic networks. 1306-1327

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














