


default search action
Information Sciences, Volume 546
Volume 546, February 2021
- Farough Ashkouti
, Keyhan Khamforoosh
, Amir Sheikhahmadi
:
DI-Mondrian: Distributed improved Mondrian for satisfaction of the L-diversity privacy model using Apache Spark. 1-24 - Ke Huang
, Xiaosong Zhang, Yi Mu, Fatemeh Rezaeibagha
, Xiaojiang Du:
Scalable and redactable blockchain with update and anonymity. 25-41 - Bin Bai, Zhiwei Guo, Ce Zhou, Wei Zhang, Junyi Zhang:
Application of adaptive reliability importance sampling-based extended domain PSO on single mode failure in reliability engineering. 42-59 - Federica Cena, Luca Console, Fabiana Vernero:
Logical foundations of knowledge-based recommender systems: A unifying spectrum of alternatives. 60-73 - Joaquín Taverner
, Emilio Vivancos
, Vicent J. Botti:
A fuzzy appraisal model for affective agents adapted to cultural environments using the pleasure and arousal dimensions. 74-86 - Mohit Kumar
, Michael Rossbory, Bernhard Alois Moser
, Bernhard Freudenthaler:
An optimal (∊, δ)-differentially private learning of distributed deep fuzzy models. 87-120 - Surendra Nagar
, Ankush Jain
, Pramod Kumar Singh, Ajay Kumar:
Mixed-noise robust face super-resolution through residual-learning based error suppressed nearest neighbor representation. 121-145 - Fadi Dornaika
, Abdullah Baradaaji
, Youssof El Traboulsi:
Semi-supervised classification via simultaneous label and discriminant embedding estimation. 146-165 - En Zhang
, Ming Li
, Siu-Ming Yiu, Jiao Du
, Jun-Zhe Zhu, Ganggang Jin:
Fair hierarchical secret sharing scheme based on smart contract. 166-176 - Xiang Gao
, Jia Yu
, Wenting Shen, Yan Chang, Shibin Zhang, Ming Yang, Bin Wu:
Achieving low-entropy secure cloud data auditing with file and authenticator deduplication. 177-191 - Zhong-Hua Pang
, Lan-Zhi Fan, Jian Sun
, Kun Liu, Guo-Ping Liu
:
Detection of stealthy false data injection attacks against networked control systems via active data modification. 192-205 - Bosheng Song
, Xiangxiang Zeng
, Alfonso Rodríguez-Patón:
Monodirectional tissue P systems with channel states. 206-219 - Pengxu Li
, Panshuo Li
, Jing Zhao, Bin Zhang:
Robust gain-scheduling static output-feedback H∞ control of vehicle lateral stability with heuristic approach. 220-233 - Jinling Wang, Jinling Liang, Cheng-Tang Zhang:
Dissipativity analysis and synthesis for positive Roesser systems under the switched mechanism and Takagi-Sugeno fuzzy rules. 234-252 - Chaoyang Li
, Yuan Tian, Xiubo Chen, Jian Li
:
An efficient anti-quantum lattice-based blind signature for blockchain-enabled systems. 253-264 - Keke Huang, Haofei Wen, Han Liu, Chunhua Yang
, Weihua Gui:
A geometry constrained dictionary learning method for industrial process monitoring. 265-282 - Yiping Luo
, Xing Xiao, Jinde Cao
, Anping Li
, Guohan Lin:
Event-triggered guaranteed cost consensus control for second-order multi-agent systems based on observers. 283-297 - Xu Wang
, Peng Hu, Liangli Zhen
, Dezhong Peng:
DRSL: Deep Relational Similarity Learning for Cross-modal Retrieval. 298-311 - Feng Jin, Jun Zhao, Ying Liu, Wei Wang, Qingshan Xu:
A scheduling approach with uncertainties in generation and consumption for converter gas system in steel industry. 312-328 - Yanan Wang, Jun Wang
, Haiying Wang, Ruilin Zhang, Ming Li:
Users' mobility enhances information diffusion in online social networks. 329-348 - Ali Ahrari
, Saber M. Elsayed
, Ruhul A. Sarker
, Daryl Essam
, Carlos A. Coello Coello:
Weighted pointwise prediction method for dynamic multiobjective optimization. 349-367 - Lei Chen
, Quansen Sun, Fanhai Wang:
Attention-adaptive and deformable convolutional modules for dynamic scene deblurring. 368-377 - Nicolas Gutowski
, Tassadit Amghar, Olivier Camp
, Fabien Chhel
:
Gorthaur-EXP3: Bandit-based selection from a portfolio of recommendation algorithms balancing the accuracy-diversity dilemma. 378-396 - Jiangxiong Fang, Huaxiang Liu, Liting Zhang, Jun Liu, Hesheng Liu:
Region-edge-based active contours driven by hybrid and local fuzzy region-based energy for image segmentation. 397-419 - Suyeon Yoo, Sungjin Kim, Seungjae Kim, Brent ByungHoon Kang:
AI-HydRa: Advanced hybrid approach using random forest and deep learning for malware classification. 420-435 - Yige Xue, Yong Deng
, Harish Garg
:
Uncertain database retrieval with measure - Based belief function attribute values under intuitionistic fuzzy set. 436-447 - Xiaodong Feng
, Sen Wu
:
Robust sparse coding via self-paced learning for data representation. 448-468 - Gleb Beliakov
:
On the derivatives of set functions in matrix representation. 469-480 - Donghoon Chang, Surabhi Garg
, Mohona Ghosh, Munawar Hasan:
BIOFUSE: A framework for multi-biometric fusion on biocryptosystem level. 481-511 - Ying Sun, Derui Ding
, Hongli Dong, Hongjian Liu:
Event-based resilient filtering for stochastic nonlinear systems via innovation constraints. 512-525 - Omid Keivani, Kaushik Sinha:
Random projection-based auxiliary information can improve tree-based nearest neighbor search. 526-542 - Weichen Wu, Yitian Xu
, Xinying Pang:
A hybrid acceleration strategy for nonparallel support vector machine. 543-558 - Feng Wang
, Jinhua She, Yasuhiro Ohyama, Wenjun Jiang, Geyong Min, Guojun Wang, Min Wu:
Maximizing positive influence in competitive social networks: A trust-based solution. 559-572 - Xiaowu Mu
, Xin Li
, Jianyin Fang, Xihui Wu
:
Reliable observer-based finite-time H∞ control for networked nonlinear semi-Markovian jump systems with actuator fault and parameter uncertainties via dynamic event-triggered scheme. 573-595 - Xiaohui Kuang, Xianfeng Gao, Lianfang Wang, Gang Zhao, Lishan Ke, Quanxin Zhang:
A discrete cosine transform-based query efficient attack on black-box object detectors. 596-607 - Boshan Shi
, Jiuzhen Liang
, Lan Di
, Chen Chen
, Zhenjie Hou:
Fabric defect detection via low-rank decomposition with gradient information and structured graph algorithm. 608-626 - Feng Sun
, Xiao-Bing Qu:
A common characterization for migrative uni-nullnorms. 627-632 - Weijie Han
, Jingfeng Xue, Yong Wang, Fuquan Zhang, Xianwei Gao:
APTMalInsight: Identify and cognize APT malware based on system call information and ontology knowledge framework. 633-664 - Pawel B. Myszkowski
, Maciej Laszczyk:
Diversity based selection for many-objective evolutionary optimisation problems with constraints. 665-700 - Roberto Corizzo
, Michelangelo Ceci
, Hadi Fanaee-T
, João Gama:
Multi-aspect renewable energy forecasting. 701-722 - Yapei Gu, Xiang Yu, Kexin Guo, Jianzhong Qiao, Lei Guo
:
Detection, estimation, and compensation of false data injection attack for UAVs. 723-741 - Yumei Sun
, Lei Zhang:
Fixed-time adaptive fuzzy control for uncertain strict feedback switched systems. 742-752 - Dan Liu, Dan Ye
:
Observer-based synchronization control for complex networks against asynchronous attacks. 753-768 - Zheng Hui
, Jie Li, Xinbo Gao
, Xiumei Wang:
Progressive perception-oriented network for single image super-resolution. 769-786 - Dazhi Jiang
, Geng Tu, Donghui Jin, Kaichao Wu
, Cheng Liu, Lin Zheng
, Teng Zhou
:
A hybrid intelligent model for acute hypotensive episode prediction with large-scale data. 787-802 - Wenqiang Xu, Liangxiao Jiang
, Chaoqun Li:
Improving data and model quality in crowdsourcing using cross-entropy-based noise correction. 803-814 - Fei Zou, Gary G. Yen, Lixin Tang, Chunfeng Wang:
A reinforcement learning approach for dynamic multi-objective optimization. 815-834 - Yuzhu Ji, Haijun Zhang
, Zhao Zhang
, Ming Liu
:
CNN-based encoder-decoder networks for salient object detection: A comprehensive review and recent advances. 835-857 - Yuanshu Zhang, Yong Ma, Xiaobing Dai
, Hao Li
, Xiaoguang Mei
, Jiayi Ma:
Locality-constrained sparse representation for hyperspectral image classification. 858-870 - Weiwei Xu, Heng Zhang
, Xianghui Cao, Ruilong Deng
, Hongran Li, Jian Zhang
:
Securing wireless relaying communication for dual unmanned aerial vehicles with unknown eavesdropper. 871-882 - Xin Bi
, Chao Zhang
, Yao He, Xiangguo Zhao, Yongjiao Sun, Yuliang Ma:
Explainable time-frequency convolutional neural network for microseismic waveform classification. 883-896 - Liang Zhao
, Xingfeng Wang, Xinyi Huang:
Verifiable single-server private information retrieval from LWE with binary errors. 897-923 - Peng Wang, Tao Xiang
, Xiaoguo Li, Hong Xiang:
Access control encryption without sanitizers for Internet of Energy. 924-942 - Hong Lin
, James Lam
, Zheng Wang:
Secure state estimation for systems under mixed cyber-attacks: Security and performance analysis. 943-960 - Dan Jiang, Rongbin Xu, Xin Xu, Ying Xie:
Multi-view feature transfer for click-through rate prediction. 961-976 - Wilson Calmon
, Mariana Albi:
Estimating the number of clusters in a ranking data context. 977-995 - Sathishkumar Moorthy
, Young Hoon Joo
:
Multi-expert visual tracking using hierarchical convolutional feature fusion via contextual information. 996-1013 - Jianjun Qian, Shumin Zhu, Wai Keung Wong, Hengmin Zhang
, Zhihui Lai, Jian Yang:
Dual robust regression for pattern classification. 1014-1029 - Chunliang Zhao, Yuren Zhou, Zefeng Chen:
Decomposition-based evolutionary algorithm with automatic estimation to handle many-objective optimization problem. 1030-1046 - Ling Chen
, Heqing Huang, Donghui Chen:
Join cardinality estimation by combining operator-level deep neural networks. 1047-1062 - Zhongyun Hua
, Zhihua Zhu, Shuang Yi, Zheng Zhang
, Hejiao Huang:
Cross-plane colour image encryption using a two-dimensional logistic tent modular map. 1063-1083 - Zhen Duan, Xian Sun, Shu Zhao, Jie Chen, Yanping Zhang, Jie Tang:
Hierarchical community structure preserving approach for network embedding. 1084-1096 - Alon Bartal
, Gilad Ravid:
Analyzing a large and unobtainable relationship graph using a streaming activity graph. 1097-1112 - Meifan Zhang, Hongzhi Wang
:
LAQP: Learning-based approximate query processing. 1113-1134 - Jiandong Zhou
, Qingpeng Zhang
, Xiang Li:
Fuzzy factorization machine. 1135-1147 - Rui Wang
, Wubin Ma
, Mao Tan
, Guohua Wu
, Ling Wang
, Dunwei Gong, Jian Xiong
:
Preference-inspired coevolutionary algorithm with active diversity strategy for multi-objective multi-modal optimization. 1148-1165 - Min Gao
, Junwei Zhang
, Junliang Yu
, Jundong Li, Junhao Wen
, Qingyu Xiong:
Recommender systems based on generative adversarial networks: A problem-driven perspective. 1166-1185 - Zhenjun Ming, Anand Balu Nellippallil, Guoxin Wang, Yan Yan, Janet K. Allen, Farrokh Mistree
:
A performance based method for information acquisition in engineering design under multi-parameter uncertainty. 1186-1207 - Chien-Ming Chen
, Lili Chen, Wensheng Gan
, Lina Qiu, Weiping Ding:
Discovering high utility-occupancy patterns from uncertain data. 1208-1229 - Kunming Zheng
, Qiuju Zhang, Youmin Hu, Bo Wu:
Design of fuzzy system-fuzzy neural network-backstepping control for complex robot system. 1230-1255 - Ling Zheng, Fei Chao
, Neil Mac Parthaláin
, Defu Zhang
, Qiang Shen
:
Feature grouping and selection: A graph-based approach. 1256-1272 - Antonio Caliò, Andrea Tagarelli
:
Attribute based diversification of seeds for targeted influence maximization. 1273-1305 - Sun Geol Baek
, Sungkil Lee
, Young Ik Eom
:
Efficient single-pair all-shortest-path query processing for massive dynamic networks. 1306-1327

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.