


default search action
Information Sciences, Volume 552
Volume 552, April 2021
- Fan Zhou, Xiuxiu Qi

, Chunjing Xiao
, Jiahao Wang:
MetaRisk: Semi-supervised few-shot operational risk classification in banking industry. 1-16 - Lianting Hu

, Huiying Liang, Long Lu:
Splicing learning: A novel few-shot learning approach. 17-28 - Francisco Erivaldo Fernandes Junior

, Gary G. Yen:
Pruning Deep Convolutional Neural Networks Architectures with Evolution Strategy. 29-47 - Ying Zhang, Baohang Zhou

, Xiaoke Ding, Jiawei Ouyang, Xiangrui Cai, Jinyang Gao, Xiaojie Yuan:
Adversarially learned one-class novelty detection with confidence estimation. 48-64 - Zichen Zhang, Shifei Ding, Yuting Sun:

MBSVR: Multiple birth support vector regression. 65-79 - Muhammad Irfan, Jiangbin Zheng, Muhammad Iqbal, Muhammad Hassan Arif:

A novel lifelong learning model based on cross domain knowledge extraction and transfer to classify underwater images. 80-101 - Han Zhou, Hongpeng Yin, Yanxia Li, Yi Chai

:
Multiview clustering via exclusive non-negative subspace learning and constraint propagation. 102-117 - Gül Deniz Çayli

:
Generating nullnorms on some special classes of bounded lattices via closure and interior operators. 118-141 - Chunyao Song, Yao Ge, Tingjian Ge, Haixia Wu, Zhutian Lin, Hong Kang, Xiaojie Yuan:

Similar but foreign: Link recommendation across communities. 142-166 - Jinjian Wu, Wen Yang, Leida Li

, Weisheng Dong, Guangming Shi, Weisi Lin:
Blind image quality prediction with hierarchical feature aggregation. 167-182 - Fengwei Wang, Hui Zhu, Rongxing Lu, Yandong Zheng, Hui Li:

A privacy-preserving and non-interactive federated learning scheme for regression training with gradient descent. 183-200 - Xinxin Wang

, Chengjun Li, Jiarui Zhu, Qinxue Meng:
L-SHADE-E: Ensemble of two differential evolution algorithms originating from L-SHADE. 201-219 - Sara Charoghchi, Samaneh Mashhadi

:
Three (t, n)-secret image sharing schemes based on homogeneous linear recursion. 220-243 - Xinjun Peng, Dong Xu, De Chen:

Robust distribution-based nonnegative matrix factorizations for dimensionality reduction. 244-260 - Yibang Ruan

, Yanshan Xiao, Zhifeng Hao, Bo Liu:
A nearest-neighbor search model for distance metric learning. 261-277 - Nabanita Mukherjee (Ganguly), Goutam Paul, Sanjoy Kumar Saha:

Two-point FFT-based high capacity image steganography using calendar based message encoding. 278-290 - Xinyu Wang

, Xiaoyuan Luo, Mingyue Zhang, Zhong-Ping Jiang, Xinping Guan:
Detection and localization of biased load attacks in smart grids via interval observer. 291-309 - Jiulong Zhang

, Gang Kou, Yi Peng, Yu Zhang
:
Estimating priorities from relative deviations in pairwise comparison matrices. 310-327 - Jiajia Wang, Xueling Ma, Zeshui Xu

, Jianming Zhan
:
Three-way multi-attribute decision making under hesitant fuzzy environments. 328-351 - María Muñoz Guillermo:

Image encryption using q-deformed logistic map. 352-364

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














