


default search action
Frontiers of Information Technology & Electronic Engineering, Volume 19
Volume 19, Number 1, January 2018
- Yunhe Pan:

2018 special issue on artificial intelligence 2.0: theories and applications. 1-2 - An interview with Dr. Raj Reddy on artificial intelligence. 3-5

- Bin Yu, Karl Kumbier:

Artificial intelligence and statistics. 6-9 - Heung-Yeung Shum

, Xiaodong He, Di Li:
From Eliza to XiaoIce: challenges and opportunities with social chatbots. 10-26 - Quanshi Zhang

, Song-Chun Zhu:
Visual interpretability for deep learning: a survey. 27-39 - Yanmin Qian

, Chao Weng, Xuankai Chang, Shuai Wang, Dong Yu:
Past review, current progress, and challenges ahead on the cocktail party problem. 40-63 - Jian Cheng

, Peisong Wang, Gang Li, Qinghao Hu, Hanqing Lu:
Recent advances in efficient computation of deep convolutional neural networks. 64-77 - Dongrong Xu

, Fei Dai, Yue Lu:
A platform of digital brain using crowd power. 78-90 - Shuang Li, Shiji Song

, Cheng Wu:
Layer-wise domain correction for unsupervised domain adaptation. 91-103 - Xinyu Duan

, Siliang Tang
, Shengyu Zhang, Yin Zhang, Zhou Zhao, Jianru Xue, Yueting Zhuang, Fei Wu:
Temporality-enhanced knowledgememory network for factoid question answering. 104-115 - Huan-gang Wang

, Xin Li, Tao Zhang
:
Generative adversarial network based novelty detection usingminimized reconstruction error. 116-125 - Wei Xiang, Lingyun Sun

, Wei-tao You, Chang-yuan Yang:
Crowdsourcing intelligent design. 126-138 - Yongqiang Ma

, Ziru Wang, Si-yu Yu, Badong Chen
, Nanning Zheng, Pengju Ren
:
A novel spiking neural network of receptive field encoding with groups of neurons decision. 139-150
Volume 19, Number 2, April 2018
- Muhammad Kamran

, Ehsan Ullah Munir:
On the role of optimization algorithms in ownership-preserving data mining. 151-164 - Rodrigo Méndez-Ramírez

, Adrian Arellano-Delgado
, César Cruz-Hernández
, Fausto Abundiz-Pérez, Rigoberto Martínez-Clark:
Chaotic digital cryptosystem using serial peripheral interface protocol and its dsPIC implementation. 165-179 - Karima Rabah, Samir Ladaci

, Mohamed Lashab
:
Bifurcation-based fractional-order PI λ D μ controller design approach for nonlinear chaotic systems. 180-191 - Wenzhe Zhang

, Kai Lu, Xiaoping Wang:
Versionized process based on non-volatile random-access memory for fine-grained fault tolerance. 192-205 - Yang Zhang

, Zuocheng Xing, Cang Liu, Chuan Tang:
CWLP: coordinated warp scheduling and locality-protected cache allocation on GPUs. 206-220 - Youwei Wang

, Lizhou Feng:
A new feature selection method for handling redundant information in text classification. 221-234 - Shu-you Zhang, Ye Gu

, Xiao-Jian Liu
, Jianrong Tan:
A knowledge push technology based on applicable probability matching and multidimensional context driving. 235-245 - Muhammad Asif Zahoor Raja

, Muhammad Saeed Aslam, Naveed Ishtiaq Chaudhary
, Wasim Ullah Khan:
Bio-inspired heuristics hybrid with interior-point method for active noise control systems without identification of secondary path. 246-259 - Xibin Jia, Ya Jin, Ning Li, Xing Su

, Barry Cardiff
, Bir Bhanu
:
Words alignment based on association rules for cross-domain sentiment classification. 260-272 - Peng-kang Xie, Jiazheng Lu, Guo-zhu Chen, Heng-lin Chen

:
Influence of motor cable on common-mode currents in an inverter-fed motor drive system. 273-284 - Eun-Jung Yoon, Jong-Tae Park, Chong-Gun Yu

:
Thermal energy harvesting circuit with maximum power point tracking control for self-powered sensor node applications. 285-296 - Mahmoud Modaresi

, Hamid Lesani:
New method to determine optimum impedance of fault current limiters for symmetrical and/or asymmetrical faults in power systems. 297-307 - Xin Liu

, Yutong Lu, Jie Yu, Peng-Fei Wang, Jieting Wu, Ying Lu:
Erratum to: ONFS: a hierarchical hybrid file system based on memory, SSD, and HDD for high performance computers. 308
Volume 19, Number 3, March 2018
- Shanzhi Chen

, Shaoli Kang:
A tutorial on 5G and the progress in China. 309-321 - Zhiguo Ding

, Mai Xu, Yan Chen, Mugen Peng
, H. Vincent Poor
:
Embracing non-orthogonalmultiple access in future wireless networks. 322-339 - Wenjia Liu

, Xiaolin Hou, Lan Chen:
Enhanced uplink non-orthogonal multiple access for 5G and beyond systems. 340-356 - Jiying Xiang:

Non-ideal space division multiple access and its application. 357-366 - Yunzheng Tao

, Chun-yan Wu, Yuzhen Huang, Ping Zhang:
Aprojected gradient based game theoretic approach for multi-user power control in cognitive radio network. 367-378 - Lu Chen, Dingzhu Wen

, Caijun Zhong
, Guanding Yu:
Hybrid full-/half-duplex cellular networks: user admission and power control. 379-387 - Fanglin Gu

, Shan Wang, Wenwu Wang:
Standard-independent I/Q imbalance estimation and compensation scheme inOFDM. 388-397 - Wei Yang, Jing Mao, Chen Chen

, Xiang Cheng, Liuqing Yang, Haige Xiang:
Resource allocation for physical-layer security in OFDMAdownlinkwith imperfect CSI. 398-408 - Xin Yuan

, Zhiyong Feng, Wenjun Xu, Zhiqing Wei, Ren Ping Liu:
Secure connectivity analysis in unmanned aerial vehicle networks. 409-422 - Minghui Shi, Changle Zhou, Jun Xie, Shaozi Li, Qingyang Hong, Min Jiang

, Fei Chao
, Weifeng Ren, Xiangqian Liu, Dajun Zhou, Tianyu Yang:
Electroencephalogram-based brain-computer interface for the Chinese spelling system: a survey. 423-436 - Pritesh Shah

, Sudhir Agashe, Anand J. Kulkarni:
Design of a fractional PIλDμ controller using the cohort intelligence method. 437-445 - Chun-hua He

:
Tabu search based resource allocation in radiological examination process execution. 446-458 - Xuguang Zuo

, Lu Yu
:
Long-term prediction for hierarchical-B-picture-based coding of video with repeated shots. 459-470
Volume 19, Number 4, April 2018
- Jijun Tong

, Peng Zhang, Yu-xiang Weng, Danhua Zhu:
Kernel sparse representation for MRI image analysis in automatic brain tumor segmentation. 471-480 - Yanwei Zhou

, Bo Yang, Hao Cheng, Qinglong Wang:
Aleakage-resilient certificateless public key encryption scheme with CCA2 security. 481-493 - Jia-xin Jiang

, Zhi-qiu Huang, Wei-wei Ma, Yan Cao:
Using information flow analysis to detect implicit information leaks for web service composition. 494-502 - Rasha Shoitan

, Zaki B. Nossair
, Ibrahim Isamil, Ahmed Tobal:
Improving the reconstruction efficiency of sparsity adaptive matching pursuit based on the Wilkinson matrix. 503-512 - Yue-peng Zou, Jihong Ouyang, Ximing Li

:
Supervised topic models with weighted words: multi-label document classification. 513-523 - Zhonglin Ye

, Haixing Zhao:
Syntactic word embedding based on dependency syntax and polysemous analysis. 524-535 - Yi-qi Xie

, Zhi-guo Yu, Yang Feng, Linna Zhao, Xiao-feng Gu
:
A multistandard and resource-efficient Viterbi decoder for a multimode communication system. 536-543 - Duo Zhang, Meiqin Liu

, Senlin Zhang, Zhen Fan, Qunfei Zhang:
Mutual-information based weighted fusion for target tracking in underwater wireless sensor networks. 544-556 - Jue Wang

, Jun Wang:
Joint compressed sensing imaging and phase adjustment via an iterative method for multistatic passive radar. 557-568 - Meng Wang, Jiaqiang Yang

, Xiang Zhang, Chang-Sheng Zhu:
Accurate two-degree-of-freedom discrete-time current controller design for PMSM using complex vectors. 569-581 - Yanmin Qian

, Chao Weng, Xuankai Chang, Shuai Wang, Dong Yu:
Erratum to: Past review, current progress, and challenges ahead on the cocktail party problem. 582
Volume 19, Number 5, May 2018
- Bo Yu

, Ying Fang, Qiang Yang, Yong Tang, Liu Liu:
A survey of malware behavior description and analysis. 583-603 - Da-peng Tan, Shuting Chen

, Guanjun Bao, Li-bin Zhang:
An embedded lightweight GUI component library and ergonomics optimization method for industry process monitoring. 604-625 - Huanfeng Peng, Zhi-qiu Huang

, LinYuan Liu, Yong Li, Dajuan Fan, Yuqing Wang:
Preserving privacy information flow security in composite service evolution. 626-638 - Ke Guo

, Xiabi Liu, Lunhao Guo, Zongjie Li, Zengmin Geng:
A new constrained maximum margin approach to discriminative learning of Bayesian classifiers. 639-650 - Yaojie Lu

, Mu Xu, Changxing Wu, Deyi Xiong
, Hongji Wang, Jinsong Su:
Cross-lingual implicit discourse relation recognition with co-training. 651-661 - Feng Wei

, Wei-xia Zou:
Suboptimal network coding subgraph algorithms for 5G minimum-cost multicast networks. 662-673 - Shang Liu, Ishtiaq Ahmad, Ping Zhang, Zhi Zhang:

Multi-user rate and power analysis in a cognitive radio network with massive multi-input multi-output. 674-684 - Lai Teng

, Zhong-he Jin:
A composite optimization method for separation parameters of large-eccentricity pico-satellites. 685-698
Volume 19, Number 6, June 2018
- Divya Pandove

, Shivani Goel, Rinkle Rani:
An intuitive general rank-based correlation coefficient. 699-711 - Ahmad Firdaus

, Nor Badrul Anuar
, Ahmad Karim, Mohd Faizal Ab Razak
:
Discovering optimal features using static analysis and a genetic search based method for Android malware detection. 712-736 - Deng Chen

, Yanduo Zhang, Wei Wei, Rongcun Wang, Xiaolin Li, Wei Liu, Shixun Wang
, Rui Zhu:
An oversampling approach for mining program specifications. 737-754 - Qiang Lan, Lin-Bo Qiao

, Yijie Wang:
Stochastic extra-gradient based alternating direction methods for graph-guided regularized minimization. 755-762 - Rabia Irfan

, Sharifullah Khan, Kashif Rajpoot
, Ali Mustafa Qamar
:
TIE algorithm: a layer over clustering-based taxonomy generation for handling evolving data. 763-782 - Guopeng Xu

, Haitang Lu, Feifei Zhang, Qirong Mao:
Affective rating ranking based on face images in arousal-valence dimensional space. 783-795 - Zhenyu Liu

, Shi-en Zhou, Jin Cheng, Chan Qiu, Jianrong Tan:
Assembly variation analysis of flexible curved surfaces based on Bézier curves. 796-808 - Chao Fang

, Yang Xiang, Keqi Qi
:
A general method of designing phase-shifting algorithms for grating lateral shearing interferometry. 809-814
Volume 19, Number 7, July 2018
- T. T. Dhivyaprabha

, P. Subashini, M. Krishnaveni
:
Synergistic fibroblast optimization: a novel nature-inspired computing algorithm. 815-833 - Zaisheng Pan

, Xuanhao Zhou, Peng Chen:
Development and application of a neural network based coating weight control system for a hot-dip galvanizing line. 834-846 - Fangting Huang

, Dan Feng, Wen Xia, Wen Zhou, Yucheng Zhang, Min Fu, Chuntao Jiang, Yukun Zhou:
Enhancing security of NVM-based main memory with dynamic Feistel network mapping. 847-863 - Lov Kumar

, Anand Tirkey, Santanu Ku. Rath:
An effective fault prediction model developed using an extreme learning machine with various kernel methods. 864-888 - Xiaolong Shen

, Yong Dou, Steven Mills
, David M. Eyers
, Huan Feng, Zhiyi Huang:
Distributed sparse bundle adjustment algorithm based on three-dimensional point partition and asynchronous communication. 889-904 - Yi Lin

, Jianwei Zhang, Hong Liu:
An algorithm for trajectory prediction of flight plan based on relative motion between positions. 905-916 - Xin Chen

, Ding Wang, Rui-rui Liu, Jie-xin Yin, Ying Wu:
Structural total least squares algorithm for locating multiple disjoint sources based on AOA/TOA/FOA in the presence of system error. 917-936 - Shan Nan

, Xudong Lu
, Pieter Van Gorp
, Hendrikus H. M. Korsten, Richard Vdovjak, Uzay Kaymak
, Huilong Duan:
Design and implementation of a platform for configuring clinical dynamic safety checklist applications. 937-946
Volume 19, Number 8, August 2018
- Wen Xu

, Yuanliang Ma, Fumin Zhang
, Daniel Rouseff, Fei Ji, Jun-Hong Cui, Hussein Yahia:
Marine information technology: the best is yet to come. 947-950 - Jianguo Huang, Han Wang

, ChengBing He
, QunFei Zhang, Lianyou Jing:
Underwater acoustic communication and the general performance evaluation criteria. 951-971 - Lan-jun Liu

, Jian-fen Li, Lin Zhou, Peng Zhai, Hao Zhao, Jiu-cai Jin, Zhichao Lv:
An underwater acoustic direct sequence spread spectrum communication system using dual spread spectrum code. 972-983 - Rongxin Zhang

, Xiaoli Ma, Deqing Wang, Fei Yuan, En Cheng:
Underwater video transceiver designs based on channel state information and video content. 984-998 - Hua-yan Chen, Meiqin Liu

, Senlin Zhang:
Energy-efficient localization and target tracking via underwater mobile sensor networks. 999-1012 - Qiuyang Tao, Yuehai Zhou, Feng Tong, Aijun Song, Fumin Zhang

:
Evaluating acousticcommunication performance of micro autonomous underwater vehicles in confined spaces. 1013-1023 - Bo Li

, Yuanxin Xu, Shuang-shuang Fan, Wen Xu
:
Underwater docking of an under-actuated autonomous underwater vehicle: system design and control implementation. 1024-1041 - Ching Soon Tan, Phooi Yee Lau

, Paulo L. Correia
, Aida Campos
:
Automatic analysis of deep-water remotely operated vehicle footage for estimation of Norway lobster abundance. 1042-1055 - Hussein M. Yahia

, Véronique Garçon, Joël Sudre
, Christophe Maes:
Effect of wind stress forcing on ocean dynamics at air-sea interface. 1056-1062
Volume 19, Number 9, September 2018
- Che Lin, Ronghao Zheng

, Gangfeng Yan, Shiyuan Lu:
Convergence analysis of distributed Kalman filtering for relative sensing networks. 1063-1075 - Yi Long, Zhijiang Du, Weidong Wang, Long He, Xi-Wang Mao, Wei Dong:

Physical human-robot interaction estimation based control scheme for a hydraulically actuated exoskeleton designed for power amplification. 1076-1085 - Jing-lin Hu

, Xiu-xia Sun, Lei He, Ri Liu, Xiong-feng Deng:
Adaptive output feedback formation tracking for a class of multiagent systems with quantized input signals. 1086-1097 - Meng-zhou Gao

, Dongin Feng:
Stochastic stability analysis of networked control systems with random cryptographic protection under random zero-measurement attacks. 1098-1111 - Chaochao Bai, Weiqiang Wang, Tong Zhao

, Ruxin Wang, Mingqiang Li
:
Deep learning compact binary codes for fingerprint indexing. 1112-1123 - Hao Luo

, Zheng-ping Luo
, Chao Xu, Wei Jiang
:
Optical plasma boundary reconstruction based on least squares for EAST Tokamak. 1124-1134 - Jia Li

, Renchao Xie, Tao Huang
, Li Sun:
A novel forwarding and routing mechanism design in SDN-based NDN architecture. 1135-1150 - Zhihua Lu

, Mengyao Zhu, Qingwei Ye, Yu Zhou:
Performance analysis of two EM-based measurement bias estimation processes for tracking systems. 1151-1165 - Qunwei Xu

, Jin-xiang Zhan, Long Xiao, Guozhu Chen:
A multi-modular shunt active power filter system and its novel fault-tolerant strategy based on split-phase control and real-time bus communication. 1166-1179 - Saeed Khorashadizadeh

, Mohammad-Hassan Majidi
:
Synchronization of two different chaotic systems using Legendre polynomials with applications in secure communications. 1180-1190 - Shafqat Ullah Khan

, M. K. A. Rahim, Liaqat Ali
:
Correction of array failure using grey wolf optimizer hybridized with an interior point algorithm. 1191-1202
Volume 19, Number 10, October 2018
- Zuoning Chen, Jack J. Dongarra, Zhiwei Xu:

Post-exascale supercomputing: research opportunities abound. 1203-1208 - Xiaobo Sharon Hu

, Michael T. Niemier
:
Cross-layer efforts for energy-efficient computing: towards peta operations per second per watt. 1209-1223 - Xiang-Hui Xie

, Xun Jia:
Exploring high-performance processor architecture beyond the exascale. 1224-1229 - Dhabaleswar K. Panda, Xiaoyi Lu

, Hari Subramoni:
Networking and communication challenges for post-exascale systems. 1230-1235 - Xiangke Liao, Kai Lu

, Canqun Yang, Jin-wen Li, Yuan Yuan, Ming-che Lai, Libo Huang, Pingjing Lu, Jianbin Fang
, Jing Ren, Jie Shen:
Moving from exascale to zettascale computing: challenges and techniques. 1236-1244 - Ninghui Sun

, Yungang Bao, Dongrui Fan
:
The rise of high-throughput computing. 1245-1250 - Zeyao Mo

:
Extreme-scale parallel computing: bottlenecks and strategies. 1251-1260 - Jidong Zhai

, Wen-Guang Chen:
A vision of post-exascale programming. 1261-1266 - Guangwen Yang

, Haohuan Fu:
Application software beyond exascale: challenges and possible trends. 1267-1272 - Wei Hu

, Guangming Liu, Yanhuang Jiang:
FTRP: a new fault tolerance framework using process replication and prefetching for high-performance computing. 1273-1290 - Wenbing Han

, Xiaogang Chen, Shunfen Li, Gezi Li, Zhitang Song, Dagang Li
, Shiyan Chen:
A novel non-volatile memory storage system for I/O-intensive applications. 1291-1302
Volume 19, Number 11, November 2018
- Tianyun Dong, Xiangliang Zhang, Tao Liu

:
Artificial muscles for wearable assistance and rehabilitation. 1303-1315 - Fan Xu, Jin Wang

, Guo-Dong Lu:
Adaptive robust neural control of a two-manipulator system holding a rigid object with inaccurate base frame parameters. 1316-1327 - Zhi-feng Zhang, Yan-hu Chen, De-jun Li

, Bo Jin, Canjun Yang, Jun Wang:
Use of a coded voltage signal for cable switching and fault isolation in cabled seafloor observatories. 1328-1339 - Keyong Hu

, Wenjuan Li, Li-dong Wang
, Shihua Cao, Fangming Zhu, Zhou-xiang Shou:
Energy management for multi-microgrid system based on model predictive control. 1340-1351 - Yixiang Huang

, Xiao Liu, Chengliang Liu, Yanming Li:
Intrinsic feature extraction using discriminant diffusion mapping analysis for automated tool wear evaluation. 1352-1361 - Genlang Chen

, Zhiqian Xu, Hai Jiang, Kuan-Ching Li
:
Generic user revocation systems for attribute-based encryption in cloud storage. 1362-1384 - Qin Zhang, Guoqiang Zhong

, Junyu Dong:
An anchor-based spectral clustering method. 1385-1396 - Pan-pan Mu

, Sanyuan Zhang, Yin Zhang, Xiuzi Ye, Xiang Pan:
Image-based 3D model retrieval using manifold learning. 1397-1408 - Wei Song, Ying Liu, Lizhen Liu

, Hanshi Wang:
Semantic composition of distributed representations for query subtopic mining. 1409-1419 - Chen-Wen Chen, Heng Nian

, Long-qi Li:
Improved three-vector based dead-beat model predictive direct power control strategy for grid-connected inverters. 1420-1431 - Lulu Zhao

, Xinglong Jiang
, Li-Min Li, Guoqiang Zeng
, Huijie Liu:
Optimization of a robust collaborative-relay beamforming design for simultaneous wireless information and power transfer. 1432-1443 - Li Xie

, Yi-qun Zhang, Junyan Xu:
Hohmann transfer via constrained optimization. 1444-1458
Volume 19, Number 12, December 2018
- Jiang-xing Wu, Jian-hua Li, Xin-sheng Ji:

Security for cyberspace: challenges and opportunities. 1459-1461 - Jianhua Li

:
Cyber security meets artificial intelligence: a survey. 1462-1474 - Fan Zhang

, Ziyuan Liang, Bolin Yang, Xinjie Zhao, Shize Guo, Kui Ren:
Survey of design and security evaluation of authenticated encryption algorithms in the CAESAR competition. 1475-1499 - Shen Wang, Jun Wu

, Wu Yang, Longhua Guo:
Novel architectures and security solutions of programmable software-defined networking: a comprehensive survey. 1500-1521 - Ya-wen Wang

, Jiang-xing Wu, Yun-fei Guo, Hong-chao Hu, Wen-yan Liu, Guo-zhen Cheng:
Scientific workflow execution system based on mimic defense in the cloud environment. 1522-1536 - Hao Zhou

, Hongfeng Chai, Mao-lin Qiu:
Fraud detection within bankcard enrollment on mobile device based payment using machine learning. 1537-1545 - Jianwen Xu

, Kaoru Ota
, Mianxiong Dong
, Anfeng Liu, Qiang Li
:
SIoTFog: Byzantine-resilient IoT fog networking. 1546-1557 - Qiang Wang

, Fucai Zhou, Tiemin Ma, Zifeng Xu:
Faster fog-aided private set intersectionwith integrity preserving. 1558-1568

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














