


default search action
Information Sciences, Volume 576
Volume 576, October 2021
- Paolo Arena, Luca Patanè, Salvatore Taffara:

Learning risk-mediated traversability maps in unstructured terrains navigation through robot-oriented models. 1-23 - Jin Deng, Weiming Zeng, Sizhe Luo, Wei Kong, Yuhu Shi, Ying Li, Hua Zhang:

Integrating multiple genomic imaging data for the study of lung metastasis in sarcomas using multi-dimensional constrained joint non-negative matrix factorization. 24-36 - ZhongQuan Jian

, GuangYu Zhu:
Affine invariance of meta-heuristic algorithms. 37-53 - Qianghui Zhou

, Xiang Xu, Lu Liu
, Gang Feng
:
Output feedback stabilization of linear systems with infinite distributed input and output delays. 54-67 - Ahmad Taheri

, Keyvan RahimiZadeh
, Ravipudi Venkata Rao:
An efficient Balanced Teaching-Learning-Based optimization algorithm with Individual restarting strategy for solving global optimization problems. 68-104 - Fan Cheng, Feixiang Chu, Lei Zhang:

A multi-objective evolutionary algorithm based on length reduction for large-scale instance selection. 105-121 - C. Treesatayapun:

Impulsive optimal control for drug treatment of influenza A virus in the host with impulsive-axis equivalent model. 122-139 - Xiuwen Fu, Wenfeng Li

, Yongsheng Yang:
Exploring the impact of node mobility on cascading failures in spatial networks. 140-156 - Bo Liu, Xiaodong Chen, Yanshan Xiao, Weibin Li

, Laiwang Liu, Changdong Liu:
An efficient dictionary-based multi-view learning method. 157-172 - Lin Xiao

, Haiyan Tan, Jianhua Dai, Lei Jia, Wensheng Tang:
High-order error function designs to compute time-varying linear matrix equations. 173-186 - Maxwell Hwang, Yu-Jen Chen, Ming-Yi Ju, Wei-Cheng Jiang:

A fuzzy CMAC learning approach to image based visual servoing system. 187-203 - Jing-Yu Ji

, Man Leung Wong:
An improved dynamic multi-objective optimization approach for nonlinear equation systems. 204-227 - Marco Botta, Davide Cavagnino, Roberto Esposito

:
NeuNAC: A novel fragile watermarking algorithm for integrity protection of neural networks. 228-241 - Rami S. Al-Gharaibeh, Mostafa Z. Ali

, Mohammad I. Daoud, Rami Alazrai
, Heba Abdel-Nabi
, Safaa Fawzey Hriez, Ponnuthurai N. Suganthan:
Real-parameter constrained optimization using enhanced quality-based cultural algorithm with novel influence and selection schemes. 242-273 - Hua Huang, Xinxin Liu, Rong Yang:

Image style transfer for autonomous multi-robot systems. 274-287 - Changsong Jiang

, Chunxiang Xu, Yuan Zhang:
PFLM: Privacy-preserving federated learning with membership proof. 288-311 - Amin Emamzadeh Esmaeili Nejad, Mansoor Zolghadri Jahromi, Mohammad Taheri

:
Graph compression based on transitivity for neighborhood query. 312-328 - Yuan Xu

, Gelei Deng
, Tianwei Zhang, Han Qiu, Yungang Bao:
Novel denial-of-service attacks against cloud-based multi-robot systems. 329-344 - Chang Gao, Junkun Yan, Xiaojun Peng, Hongwei Liu:

Signal structure information-based target detection with a fully convolutional network. 345-354 - Nguyen Thi Tam, Vi Thanh Dat, Phan Ngoc Lan, Huynh Thi Thanh Binh, Le Trong Vinh, Ananthram Swami:

Multifactorial evolutionary optimization to maximize lifetime of wireless sensor network. 355-373 - Yansen Su, Kefei Zhou, Xingyi Zhang, Ran Cheng

, Chunhou Zheng:
A parallel multi-objective evolutionary algorithm for community detection in large-scale complex networks. 374-392 - In Seok Park, Chan-eun Park, Nam Kyu Kwon, PooGyeon Park

:
Dynamic output-feedback control for singular interval-valued fuzzy systems: Linear matrix inequality approach. 393-406 - Mahardhika Pratama

, Choiru Za'in, Edwin Lughofer, Eric Pardede, Dwi A. P. Rahayu:
Scalable teacher forcing network for semi-supervised large scale data streams. 407-431 - Xiaohong Pan, Yingming Wang, Shifan He:

The evidential reasoning approach for renewable energy resources evaluation under interval type-2 fuzzy uncertainty. 432-453 - Zakariya Ghalmane, Chantal Cherifi, Hocine Cherifi

, Mohammed El Hassouni:
Extracting modular-based backbones in weighted networks. 454-474 - Huan Wang

, Po Hu
, Hao Wang:
A genetic timing scheduling model for urban traffic signal control. 475-483 - Jun Fu

, Weisheng Li, Jiao Du, Liming Xu:
DSAGAN: A generative adversarial network based on dual-stream attention mechanism for anatomical and functional image fusion. 484-506 - Zhijun Li

, Jianfeng Ma, Yinbin Miao, Ximeng Liu, Kim-Kwang Raymond Choo:
Forward and backward secure keyword search with flexible keyword shielding. 507-521 - Liyan Duan

, Junmin Li
:
Fixed-time synchronization of fuzzy neutral-type BAM memristive inertial neural networks with proportional delays. 522-541 - Dang Nguyen, Sunil Gupta

, Santu Rana
, Alistair Shilton, Svetha Venkatesh:
Fairness improvement for black-box classifiers with Gaussian process. 542-556 - Jing Jiang

, Fei Han, Jie Wang, Qinghua Ling, Henry Han, Zizhu Fan:
Improving decomposition-based multiobjective evolutionary algorithm with local reference point aided search. 557-576 - Firat Artuger, Fatih Özkaynak:

An effective method to improve nonlinearity value of substitution boxes based on random selection. 577-588 - Hongyan Wan, Wanting Ji, Guoqing Wu, Xiaoyun Jia

, Xue Zhan, Mengting Yuan
, Ruili Wang:
A novel webpage layout aesthetic evaluation model for quantifying webpage layout design. 589-608 - Shafiul Alom Ahmed

, Bhabesh Nath
:
Identification of adverse disease agents and risk analysis using frequent pattern mining. 609-641 - Hongyang Liu, Zhu Sun

, Xinghua Qu, Fuyong Yuan:
Top-aware recommender distillation with deep reinforcement learning. 642-657 - Ming Zheng

, Tong Li
, Xiaoyao Zheng, Qingying Yu, Chuanming Chen, Ding Zhou, Changlong Lv, Weiyi Yang:
UFFDFR: Undersampling framework with denoising, fuzzy c-means clustering, and representative sample selection for imbalanced data classification. 658-680 - Guangxia Xu, Mengxiao Hu, Chuang Ma:

Secure and smart autonomous multi-robot systems for opinion spammer detection. 681-693 - Wencheng Huang

, Yue Zhang, Dezhi Yin, Borui Zuo
, Minhao Xu, Rui Zhang:
Using improved Group 2 and Linguistic Z-numbers combined approach to analyze the causes of railway passenger train derailment accident. 694-707 - Xiao-Guang Zhang, Guang-Hong Yang, Saud Wasly

:
Man-in-the-middle attack against cyber-physical systems under random access protocol. 708-724 - Dong Wei, Xiaobo Shen, Quansen Sun, Xizhan Gao, Zhenwen Ren

:
Adaptive graph guided concept factorization on Grassmann manifold. 725-742 - Duhyeon Bang, Jongwuk Lee, Hyunjung Shim:

Distilling from professors: Enhancing the knowledge distillation of teachers. 743-755 - Jun Chen, Ju H. Park, Shengyuan Xu:

Stability analysis for delayed neural networks via an improved negative-definiteness lemma. 756-768 - Yepeng Shi, Guijuan Zhang, Dianjie Lu, Lei Lv, Hong Liu:

Intervention optimization for crowd emotional contagion. 769-789 - Peng Yi, Jiguo Li

, Chengdong Liu, Jinguang Han
, Huaqun Wang, Yichen Zhang, Yu Chen:
An efficient identity-based signature scheme with provable security. 790-799 - Junwei Jin, Yanting Li, Tiejun Yang, Liang Zhao

, Junwei Duan, C. L. Philip Chen:
Discriminative group-sparsity constrained broad learning system for visual recognition. 800-818 - Muwei Jian

, Jiaojin Wang, Hui Yu
, Gai-Ge Wang:
Integrating object proposal with attention networks for video saliency detection. 819-830

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














