


default search action
Information Sciences, Volume 628
Volume 628, May 2023
- Linghao Chen

, He Li, Wanyuan Zhang, Jianbin Huang, Xiaoke Ma, Jiangtao Cui, Ning Li, Jaesoo Yoo:
AnomMAN: Detect anomalies on multi-view attributed networks. 1-21 - Yue Fu

, Xinyi Yu, Yongliang Wu
, Xueyi Ding, Shuliang Zhao:
Robust representation learning for heterogeneous attributed networks. 22-49 - Lei Li, Jun Yang

, Yulin Ma, Xuefeng Kong
:
Pseudo-labeling Integrating Centers and Samples with Consistent Selection Mechanism for Unsupervised Domain Adaptation. 50-69 - Hadi Moazen

, Sajjad Molaei, Leili Farzinvash
, Masoud Sabaei:
PSO-ELPM: PSO with elite learning, enhanced parameter updating, and exponential mutation operator. 70-91 - Heba Abdel-Nabi

, Mostafa Z. Ali
, Arafat Awajan, Rami Alazrai
, Mohammad I. Daoud, Ponnuthurai N. Suganthan:
An iterative cyclic tri-strategy hybrid stochastic fractal with adaptive differential algorithm for global numerical optimization. 92-133 - Xiaofei Zhou, Weipeng Cao

, Hanxiao Gao, Zhong Ming, Jiyong Zhang:
STI-Net: Spatiotemporal integration network for video saliency detection. 134-147 - Antonio Garrido

:
Learning cost action planning models with perfect precision via constraint propagation. 148-176 - Manuel Curado

, Leandro Tortosa, Jose F. Vicent:
A novel measure to identify influential nodes: Return Random Walk Gravity Centrality. 177-195 - Dawei Li, Di Liu

, Ying Guo, Yangkun Ren, Jieyu Su, Jianwei Liu:
Defending against model extraction attacks with physical unclonable function. 196-207 - Jianwen Wang

, Shiping Wang, Mingwei Lin
, Zeshui Xu
, Wenzhong Guo
:
Learning speaker-independent multimodal representation for sentiment analysis. 208-225 - Luyuan Chen, Yong Deng

, Kang Hao Cheong:
The Distance of Random Permutation Set. 226-239 - Xingjian Sun

, Lei Zhang
, Juping Gu:
Neural-network based adaptive sliding mode control for Takagi-Sugeno fuzzy systems. 240-253 - Jaewan Moon, Yoonki Jeong

, Dong-Kyu Chae
, Jaeho Choi, Hyunjung Shim
, Jongwuk Lee
:
CoMix: Collaborative filtering with mixup for implicit datasets. 254-268 - Yunxuan Dong

, Ling Xiao, Jiasheng Wang
, Jujie Wang:
A time series attention mechanism based model for tourism demand forecasting. 269-290 - Dan Liu, Dan Ye:

Secure synchronization against link attacks in complex networks with event-triggered coupling. 291-306 - Dasol Hwang, Sojin Lee, Joonmyung Choi, Je-Keun Rhee, Hyunwoo J. Kim:

Robust auxiliary learning with weighting function for biased data. 307-319 - Lukasz Galka

, Pawel Karczmarek, Mikhail Tokovarov
:
Effective enhancement of isolation Forest method based on Minimal Spanning tree clustering. 320-338 - Lan Huang, Shiqi Sun, Jia Zeng, Wencong Wang, Wei Pang

, Kangping Wang
:
U-DARTS: Uniform-space differentiable architecture search. 339-349 - Peitao Gao

, Yinhe Wang, Yi Peng
, LiLi Zhang, Shengping Li:
Tracking control of the nodes for the complex dynamical network with the auxiliary links dynamics. 350-359 - Zhang Zhang, Yifeng Zeng, Wenhui Jiang, Yinghui Pan, Jing Tang:

Intention recognition for multiple agents. 360-376 - Pian Qi, Diletta Chiaro

, Fabio Giampaolo, Francesco Piccialli:
A blockchain-based secure Internet of medical things framework for stress detection. 377-390 - Husheng Guo, Haosen Xia, Hai Li, Wenjian Wang

:
Concept evolution detection based on noise reduction soft boundary. 391-408 - Yuli Jiang

, Huaijia Lin, Ye Li, Yu Rong
, Hong Cheng, Xin Huang
:
Exploiting node-feature bipartite graph in graph convolutional networks. 409-423 - Wenjuan Ren, Zhanpeng Yang, Xiang Wang

:
A two-branch symmetric domain adaptation neural network based on Ulam stability theory. 424-438 - Teng Huang, Jiahui Huang

, Yan Pang
, Hongyang Yan:
Smart contract watermarking based on code obfuscation. 439-448 - Lingling Wang

, Xueqin Zhao, Zhongkai Lu, Lin Wang, Shouxun Zhang:
Enhancing privacy preservation and trustworthiness for decentralized federated learning. 449-468 - Choujun Zhan

, Yufan Zheng
, Lujiao Shao, Guanrong Chen
, Haijun Zhang:
Modeling the spread dynamics of multiple-variant coronavirus disease under public health interventions: A general framework. 469-487 - Hang Geng, Zidong Wang

, Jun Hu, Fuad E. Alsaadi, Yuhua Cheng:
Outlier-resistant sequential filtering fusion for cyber-physical systems with quantized measurements under denial-of-service attacks. 488-503 - Junyi Guan, Sheng Li, Xiongxiong He, Jiajia Chen:

Clustering by fast detection of main density peaks within a peak digraph. 504-521 - Hai-Long Yang

, Ye Wang, Zhi-Lian Guo:
Three-way conflict analysis based on hybrid situation tables. 522-541 - K. Venkatachalam, Zaoli Yang, Pavel Trojovský

, Nebojsa Bacanin
, Muhammet Deveci, Weiping Ding
:
Bimodal HAR-An efficient approach to human activity analysis and recognition using bimodal hybrid classifiers. 542-557 - Guo Feng Anders Yeo, David V. Akman, Irene Lena Hudson, Jeffrey Chan

:
A stochastic approximation approach to fixed instance selection. 558-579

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














