


default search action
Journal of Information Science and Engineering, Volume 39
Volume 39, Number 1, January 2023
- Wenjin Hu, Jiahao Meng, Li Jia, Fuliang Zeng, Panpan Xue:

Weakly Supervised Semantic Segmentation for Headdress of Thangka Images. 1-18 - Jia-Xin Hu, Yu Song, Yi-Yao Zhang:

Adoption of Gesture Interactive Robot in Music Perception Education with Deep Learning Approach. 19-37 - Yinghao Kong:

Precise Displacement Measurement of Long-Span Spatial Structure of Buildings via Deep Learning and Machine Vision Technology. 39-54 - Yang Liu, Cun Shang Fan, Peng-Xin Liu:

Research on Digital Media Intelligent Art Creation Based on the Fusion of Virtual Reality and Semantic Features. 55-66 - Guiying Zhu:

No-Reference Image Quality Assessment Based on Natural Scene Statistics in NSCT Domain and Spatial Domain. 67-89
- Supriya Sridharan, Swaminathan Venkatraman, K. Somasundaram:

A Novel Variable Lie Hypergraph Technique for Cluster Based Routing in Opportunistic Networks. 91-109 - Ajay K. Gupta, Udai Shanker:

A Predicted Region Enrooted Approach for Efficient Caching in Mobile Environment. 111-127 - Lincoln Herbert Teixeira, Árpád Huszák:

Reinforcement Learning in Path Lifetime Routing Algorithm for VANETs. 129-147 - Fang Ren, Mingyu Yu, Haiyan Xiu, Wei Hou:

A New Symmetric Information Hiding Scheme Based on Cover Randomness. 149-166 - Yi-Chuan Wang, Gui-Ling Zhang, Ya-Ling Zhang:

Analysis of SQL Injection based on Petri Net in Wireless Network. 167-181 - Mostefa Kara, Abdelkader Laouid, Ahcène Bounceur, Mohammad Hammoudeh, Muath AlShaikh:

Perfect Confidentiality through Unconditionally Secure Homomorphic Encryption Using One-Time Pad Method with a Single Pre-Shared Key. 183-195
- Maria I. Ortega, Julio Moreno, Manuel A. Serrano, Eduardo Fernández-Medina:

A Systematic Analysis of Security in Blockchain. 197-222 - Xiafei Yan, Xu Zheng:

Research on Secrecy Law Based on Blockchain Encrypted Traceability Technology. 223-235
Volume 39, Number 2, March 2023
- Chung-Ming Huang, Jheng-Yuan Yu:

Leader-Controlled Real Time and Synchronous Multimedia Presentation for Wireless Mobile Group Touring Services using the Multi-Access Edge Computing (MEC) Technique. 239-267
- Shih-Yu Huang, Chia-Hui Wang:

Cost-Effective Smartphone-Camera-Based Scheme to Distinguish Drivers from Passengers for Texting-While-Driving. 269-289 - Zhi-Yu Hong, Zongmin Ma:

Inconsistency Detection in Knowledge Graph with Entity and Path Semantics. 291-303 - Wei Lin, Liang-Chih Yu:

Scarce Resource Dimensional Sentiment Analysis UsingDomain-distilled BERT. 305-321 - Zhigao Zhang, Xiaoxu Song, Bin Wang, Chuansheng Dong:

Outer Product Enhanced Embedding Information for Recommendation. 323-337 - Jiunn-Tsair Fang, Yu-Liang Tu, Pao-Chi Chang:

Fast Intra Coding Partition Decisions for Feature Video Coding. 339-352 - Ray-Ming Chen:

A Partition-induced Hereditary Metric for Equivalence Classes - Theory and Application. 353-373
- K. Tamilarasan, Jeevaa Katiravan:

An Analytical Approach on User Rate Maximization in Two-Way Relay Communication using NOMA. 375-388 - R. Ponni, T. Jayasankar, K. Vinothkumar:

Investigations on Underwater Acoustic Sensor Networks Framework for RLS Enabled LoRa Networks in Disaster Management Applications. 389-406 - Yan-Jing Wu, Tsang-Ling Sheu, Wei-Luen Li:

HetNet with Overlapping Small Cells for 5G IoT Networks. 407-421
- Xin Xing, Ning Wang:

Entity Matching based on Attribute-aware and Multi-Perspective Similarity Measurement. 423-438 - Shu-Ying Lin, Hui-Yu Lin:

Bond Price Prediction Using Technical Indicators and Machine Learning Techniques. 439-455 - Chien-Yao Wang, I-Hau Yeh, Hong-Yuan Mark Liao:

You Only Learn One Representation: Unified Network for Multiple Tasks. 691-709
Volume 39, Number 3, May 2023
- Iuon-Chang Lin, Yu-Wen Wang, Ting-Xuan Tai:

A Grid-Based Key Pre-Distribution Scheme Using Dependent Keys in Wireless Sensor Networks. 459-472 - Chun-I Fan, Hsin-Nan Kuo, Yung-Sheng Tu, Yuan-Chi Chei, Chu-Chia Chuang, Yu-Chun Tseng, Arijit Karati:

A Secure Cloud Gaming System. 473-487 - Hsiu-Ling Chu, Yu-Chen Dai, Wei-Bin Lee, Ting-Shen Hsieh, Ming-Hung Wang:

Characterizing Behaviors of Sockpuppets in Online Political Discourses. 489-506 - Ruei-Hau Hsu, Lu-Chin Wang, Hsiang-Shian Fan:

Universally Secure Device-to-Device Communications with Privacy Protection and Fine-grained Access Control Based on 5G-enabled Multi-access Edge Computing. 507-524 - Ray-I Chang, Yen-Ting Chang, Chia-Hui Wang:

Outsourced K-means Clustering for High-Dimensional Data Analysis based on Homomorphic Encryption. 525-548 - Ajai John Chemmanam, Bijoy Antony Jose, Asif Moopan:

A Multi-Tasking Model for Object Detection, Instance Segmentation and Keypoint Estimation Tasks. 549-560 - Sheena Kurian K, Sheena Mathew:

High Impact of Rough Set and KMeans Clustering Methods in Extractive Summarization of Journal Articles. 561-574 - Dhanashri Narayan Wategaonkar:

Energy-Efficient Reliable Sector-based Clustering Scheme to Improve the Lifetime of WSN. 575-591 - Mahima Poonia, Rakesh Kumar Bajaj:

On Complex Fuzzy Matrix with Algebraic Operations, Similarity Measure and its Application in Identification of Reference Signal. 593-607 - Seema Safar, Babita Roslind Jose, T. Santhanakrishnan:

Enriching Aspect-based Recommendation System using Social Relation-Item Interaction. 609-621 - Himanshu Dhumras, Rakesh Kumar Bajaj:

On Assembly Robotic Design Evaluation Problem Using Enhanced Quality Function Deployment with q -Rung Orthopair Fuzzy Set Theoretic Environment. 623-636
- Zhifang Liu:

Using Artificial Intelligence in IC Substrate Production Predicting. 637-654
- Yuan-Hao Lin, Chia-Hui Chang, Hsiu-Min Chuang:

EventGo! Mining Events through Semi-Supervised Event Title Recognition and Pattern-based Venue/Date Coupling. 655-670 - Ting-Yi J. T. Kuo, Anthony J. T. Lee:

A Dialogue Model for Customer Support Services. 671-689 - Chien-Yao Wang, I-Hau Yeh, Hong-Yuan Mark Liao:

You Only Learn One Representation: Unified Network for Multiple Tasks. 691-709 - Chien-Yao Wang, Hong-Yuan Mark Liao, I-Hau Yeh:

Designing Network Design Strategies Through Gradient Path Analysis. 975-995
Volume 39, Number 4, July 2023
- Christine Dewi, Rung-Ching Chen, Hui Yu, Xiaoyi Jiang:

XAI for Image Captioning using SHAP. 711-724 - Jing Zhu, Ru-Chun Jia:

Research on Data Security Monitoring Method Based on CP-ABE. 725-738 - Meirong Zheng, Ru-Chun Jia:

Research on Secure Transmission of Heterogeneous Networks. 739-757 - Haibo Yu, Tao Zhang, Wenhuan Zhu, Li Zhang, Jiali Jin:

High-resolution Noise Artifact Tracking network for Image Splicing Forgery Detection. 759-775 - Jianxin Li, Jie Liu, Chao Li, Wenliang Cao, Bin Li, Fei Jiang, Jinyu Huang, Yingxia Guo, Yang Liu:

Violence Detection Method Based on Convolution Neural Network and Trajectory. 777-796 - Che-Nan Kuo, Yu-Da Lin, Duc-Man Nguyen, Yu-Huei Cheng:

Based on Decision Tree Model to Analyze the Influencing Factors of Customer's Insurance Transactions. 797-807 - Fei Jiang, Xiao-Ya Ma, Yi Yi Li, Jian-Xin Li, Wen-Liang Cao, Jin Tong, Qiu Yan Chen, Hai-Fang Chen, Zi Xuan Fu:

How Deep Learning Affect Price Forecasting of Agricultural Supply Chain? 809-823 - Qian Du, Zhao-Feng Wu, Jun Wang, Wenwu Xie, Ya-Lan Li:

A Novel Joint Frequency Offset Estimation Scheme for OFDM System. 825-838 - Yunli Cheng, Hainie Meng, Yu-Qiang Chen, Yan-Xian Tan, Jian-Lan Guo:

Research on Network Information Security Management System Based on Face Recognition. 839-854 - Yanjun Zhu, Ting Zhu, Jianxin Li, Wenliang Cao, Peng Yong, Fei Jiang, Jie Liu:

Classify Text-based Email Using Naive Bayes Method With Small Sample. 855-868 - Siron Anita Susan T., B. Nithya:

Firefly Based Energy Efficient Routing of Charging Request in Wireless Rechargeable Sensor Network. 869-884
- Poonam T. Agarkar, Manish D. Chawhan, Kishor D. Kulat, Pratik Ramesh Hajare:

MECT-PSO: A Reliable and Energy Efficient Topology Control Protocol for Wireless Sensor Networks. 885-908 - Ravinder Ahuja, S. C. Sharma:

B 2 GRUA: BERTweet Bi-Directional Gated Recurrent Unit with Attention Model for Sarcasm Detection. 909-933 - Haixia Hou, Daojun Liang, Mingqiang Zhang, Dongfeng Yuan:

A Densely Stacked Attention Method for Cyberattack Detection. 935-950
- Hung-Yi Lin, Rong-Chang Chen:

Heuristic Feature Selection with Classification Efficiency Using Soft Cluster Analysis for Biological Datasets. 951-973
- Chien-Yao Wang, Hong-Yuan Mark Liao, I-Hau Yeh:

Designing Network Design Strategies Through Gradient Path Analysis. 975-995
Volume 39, Number 5, September 2023
- Bao-An Nguyen, Hoang-Thanh Duong, Ling-Ling Tsao, Hsi-Min Chen:

An Educational Card Game Approach to Motivating the Learning of Software Engineering. 999-1022 - Kuo-Hsun Hsu, Zi-Deng Meng, Andrew Weian Hou:

The Evaluation of Aspect-Based Refactoring Method with Design Patterns through GQM. 1023-1036 - Han-Lin Lu, Ren-Jie Zhuang, Shih-Kun Huang:

Fuzz Testing Process Visualization. 1037-1059 - Chia-Yu Lin, Shin-Jie Lee:

An Efficient Autoscaling Cross-Browser Testing Cloud Platform based on Selenium Grid, Kubernetes and KEDA. 1061-1077 - Po-Shen Lin, Nai-Wei Lin, Ming-Hsien Yeh, Chia-Chou Yeh, Hung-Pin Chiu, Mei-Chun Wu:

Syndrome Differentiation for Deficiency Syndromes in Traditional Chinese Medicine Based on Fuzzy Sets. 1079-1100 - Chiung Hon Lee, Tsung-Ju Lee, Yu-Sheng Chiang, Shih-Yi Yuan, Jyh-Hwa Liou:

Design and Implement an Intelligent System for Stock Investment Decision Making. 1101-1116 - Wen-Tin Lee, Zhun-Wei Liu:

Microservices-based DevSecOps Platform using Pipeline and Open Source Software. 1117-1128 - Shu-Ling Chen, Chien-Hung Liu, Wen-Quan Xiao:

A Feedback-Directed Approach to Crawl Android Apps for Increasing Code Coverage. 1129-1153
- Ming-Shium Hsieh, Hideo Yokota, Ming-Dar Tsai:

Volume Manipulations for Assisting Joint Surgery Diagnoses and Simulations. 1155-1168
- Shitong Fu, Zhiqiang Yao:

Privacy Risk Estimation of Online Social Networks. 1169-1183
- Hui-Kuo Yang, Bing-Li Su, Wen-Chih Peng:

SADEM: An Effective Supervised Anomaly Detection Ensemble Model for Alert Account Detection. 1185-1207 - Shu-Ying Lin, An-Chi Wang:

Self-Attention Recurrent Conditional Generative Adversarial Networks for Corporate Credit Rating Prediction. 1209-1230
Volume 39, Number 6, November 2023
- Chien-Yao Wang, I-Hau Yeh, Hong-Yuan Mark Liao:

You Only Learn One Representation: Unified Network for Multiple Tasks. 691-709 - Chien-Yao Wang, Hong-Yuan Mark Liao, I-Hau Yeh:

Designing Network Design Strategies Through Gradient Path Analysis. 975-995 - V. Gokula Krishnan, Abdul P. A. Saleem, N. Kirubakaran, Sankaradass Veeramalai, ATA Kishore Kumar, C. Jehan, J. Deepa, G. Dhanalakshmi:

Ensemble Deep Learning Classifier with Optimized Cluster Head Selection for NIDS in MANET. 1233-1246 - Gaofeng Hong, Wei Su, Xindi Hou, Lisheng Ma:

A Green Cluster-based Traffic Information Acquisition Method in Vehicular Networks. 1247-1263 - Xifeng Wang, Limin Sun, Chao Wang, Hongsong Zhu, Lian Zhao, Shujie Yang, Changqiao Xu:

Intelligent Connected Vehicle Security: Threats, Attacks and Defenses. 1265-1303 - Xianchuan Ling, Zhang Xin, Huiru Wang, Guozhu Zhao, Huanhuan Zhao, Sheng-Hui Zhao, Zenghui Ding:

A Schizophrenia Screening Method Based on Fine-grained Voice Features and Network Isolation Privacy Protection. 1305-1319 - Shiyang Ma, Yulong Shen, Xuewen Dong, Wei Tong, Lingxiao Yang:

Link-ability: A Compatibility Prediction Method of Wireless Service based on Markov Process. 1321-1339 - Bao Gui, Sheng-Hui Zhao, Gui-Lin Chen, Bin Yang:

Rate Fairness Maximization via a DRL Algorithm in Vehicular Networks. 1341-1355 - Muhammet Pakyürek, Selman Kulac:

A Dynamic Optimization based Algorithm for Pilot Assignment in Massive MIMO. 1357-1369 - Mehdi Merouane:

Convenient Detection Method for Anonymous Networks "I2P vs Tor". 1371-1382 - Ravi Kumar Suggala, M. Vamsi Krishna, Sangram Keshari Swain:

Discover the New Factor for Dengue Fever Outbreaks and Predicted using Bayes Network-PSO (BN-PSO). 1383-1401 - Yi-Yuan Chen, Kuochen Wang, Hao-Wei Chung, Chien-Chih Chen, Bohau Huang, I-Wei Lu:

Multi-Person Pose Estimation using an Ordinal Depth-Guided Convolutional Neural Network. 1403-1420 - Xiaowen Zhang, Jing Shan, Wen-Yi Tang, Li Yan, Zongmin Ma:

Inconsistency Detection for Spatiotemporal Knowledge Graph with Entity Semantics and Spatiotemporal Features. 1421-1436 - Duen-Ren Liu, Yang Huang, Ching-Yi Tseng, Shin-Jye Lee:

Hybrid Generative Adversarial Networks for News Recommendation. 1437-1457

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














