default search action
Information Sciences, Volume 512
Volume 512, February 2020
- Nan Jiang, Dong Xu, Jie Zhou, Hongyang Yan, Tao Wan, Jiaqi Zheng:
Toward optimal participant decisions with voting-based incentive model for crowd sensing. 1-17 - Shudong Huang, Zenglin Xu, Ivor W. Tsang, Zhao Kang:
Auto-weighted multi-view co-clustering with bipartite graphs. 18-30 - Gnaneswaran Nagamani, Young Hoon Joo, G. Soundararajan, Reza Mohajerpoor:
Robust event-triggered reliable control for T-S fuzzy uncertain systems via weighted based inequality. 31-49 - Vicenç Torra, Yasuo Narukawa, Michio Sugeno:
On the f-divergence for discrete non-additive measures. 50-63 - Ming Yang, Aimin Zhou, Changhe Li, Jing Guan, Xuesong Yan:
CCFR2: A more efficient cooperative co-evolutionary framework for large-scale global optimization. 64-79 - Shaofei Wang, Depeng Dang:
Incentive mechanism for the listing item task in crowdsourcing. 80-95 - Rajeev Kumar, Ki-Hyun Jung:
Robust reversible data hiding scheme based on two-layer embedding strategy. 96-107 - Huidong Wang, Xiaohong Pan, Jun Yan, Jinli Yao, Shifan He:
A projection-based regret theory method for multi-attribute decision making under interval type-2 fuzzy sets environment. 108-122 - Seok-Jun Bu, Sung-Bae Cho:
A convolutional neural-based learning classifier system for detecting database intrusion via insider attack. 123-136 - Qingqing Han, Jingmei Liu, Zhiwei Shen, Jingwei Liu, Fengkui Gong:
Vector partitioning quantization utilizing K-means clustering for physical layer secret key generation. 137-160 - Guoyin Jiang, Xiaodong Feng, Wenping Liu, Xingjun Liu:
Clicking position and user posting behavior in online review systems: A data-driven agent-based modeling approach. 161-174 - Hao Fei, Yafeng Ren, Donghong Ji:
A tree-based neural network model for biomedical event trigger detection. 175-185 - Haibin Sun, Guangdeng Zong, C. L. Philip Chen:
Adaptive decentralized output feedback PI tracking control design for uncertain interconnected nonlinear systems with input quantization. 186-206 - Hongfa Ding, Youliang Tian, Changgen Peng, Youshan Zhang, Shuwen Xiang:
Inference attacks on genomic privacy with an improved HMM and an RCNN model for unrelated individuals. 207-218 - Francielle Santo Pedro, Estevão Esmi, Laécio Carvalho de Barros:
Calculus for linearly correlated fuzzy function using Fréchet derivative and Riemann integral. 219-237 - Charith Perera, Mahmoud Barhamgi, Arosha K. Bandara, Muhammad Ajmal Azad, Blaine A. Price, Bashar Nuseibeh:
Designing privacy-aware internet of things applications. 238-257 - Henrik Sloot, Matthias Scherer:
A probabilistic view on semilinear copulas. 258-276 - Myeongjun Jang, Seungwan Seo, Pilsung Kang:
Corrigendum to "Recurrent neural network-based semantic variational autoencoder for Sequence-to-sequence learning" [Information Sciences 490 (2019) 59-73]. 277 - Liangli Zhen, Miqing Li, Dezhong Peng, Xin Yao:
Objective reduction for visualising many-objective solution sets. 278-294 - Bao Zhao, Juntong Xi:
Efficient and accurate 3D modeling based on a novel local feature descriptor. 295-314 - Jianyi Huang, Yuyuan Tang, Ying Hu, Jianjiang Li, Changjun Hu:
Predicting the active period of popularity evolution: A case study on Twitter hashtags. 315-326 - Xiaowei Jiang, Xiangyong Chen, Ming Chi, Ming-Feng Ge:
Optimal performance of LTI systems over power constrained erasure channels. 327-337 - Hui Lü, Wangli He, Qing-Long Han, Xiaohua Ge, Chen Peng:
Finite-time containment control for nonlinear multi-agent systems with external disturbances. 338-351 - Cuiping Wei, Rosa M. Rodríguez, Peng Li:
Note on entropies of hesitant fuzzy linguistic term sets and their applications. 352-368 - Na Li, Licheng Liu, Shutao Li, Hui Lin:
Robust face hallucination via locality-constrained multiscale coding. 369-380 - Pierpaolo D'Urso, Livia De Giovanni, Riccardo Massari:
Smoothed self-organizing map for robust clustering. 381-401 - Sumit Soman, Jayadeva, Rajat Thakur, Mayank Sharma, Suresh Chandra:
Sparsity in function and derivative approximation via the empirical feature space. 402-415 - Licheng Liu, Han Liu, Shutao Li, C. L. Philip Chen:
Face hallucination via multiple feature learning with hierarchical structure. 416-430 - Dong Yang, Guangdeng Zong, Sing Kiong Nguang:
H∞ bumpless transfer reliable control of Markovian switching LPV systems subject to actuator failures. 431-445 - Junfei Qiao, Fei Li, Shengxiang Yang, Cuili Yang, Wenjing Li, Ke Gu:
An adaptive hybrid evolutionary immune multi-objective algorithm based on uniform distribution selection. 446-470 - Jae Hong Seo:
Efficient digital signatures from RSA without random oracles. 471-480 - Md Meftahul Ferdaus, Mahardhika Pratama, Sreenatha G. Anavatti, Matthew A. Garratt, Edwin Lughofer:
PAC: A novel self-adaptive neuro-fuzzy controller for micro aerial vehicles. 481-505 - Wei Shao, Zhi Wang, Xiaolu Wang, Kefan Qiu, Chunfu Jia, Chong Jiang:
LSC: Online auto-update smart contracts for fortifying blockchain-based log systems. 506-517 - Jin-Ling Lin, Kao-Shing Hwang, Haobin Shi, Wei Pan:
An ensemble method for inverse reinforcement learning. 518-532 - Yiyuan Wang, Shiwei Pan, Chenxi Li, Minghao Yin:
A local search algorithm with reinforcement learning based repair procedure for minimum weight independent dominating set. 533-548 - Tao Wen, Yong Deng:
Identification of influencers in complex networks by local information dimensionality. 549-562 - Dingjie Wang, Wei Yu, Xiufen Zou:
Tensor-based mathematical framework and new centralities for temporal multilayer networks. 563-580 - Silvia Terragni, Elisabetta Fersini, Enza Messina:
Constrained Relational Topic Models. 581-594 - Dmitry Frolov, Susana Nascimento, Trevor I. Fenner, Boris G. Mirkin:
Parsimonious generalization of fuzzy thematic sets in taxonomies applied to the analysis of tendencies of research in data science. 595-615 - Yan Xu, Song Sun, Jie Cui, Hong Zhong:
Intrusion-resilient public cloud auditing scheme with authenticator update. 616-628 - S. H. Mousavi, Mohammad Khansari, Rouhollah Rahmani:
A fully scalable big data framework for Botnet detection based on network traffic analysis. 629-640 - Qiang Zhou, Chengliang Tian, Hanlin Zhang, Jia Yu, Fengjun Li:
How to securely outsource the extended euclidean algorithm for large-scale polynomials over finite fields. 641-660 - Yansen Su, Neng Guo, Ye Tian, Xingyi Zhang:
A non-revisiting genetic algorithm based on a novel binary space partition tree. 661-674 - Jun-Liu Zhong, Chi-Man Pun:
Two-pass hashing feature representation and searching method for copy-move forgery detection. 675-692 - Jinming Wang, Zhenyu Xu, Zhangquan Wang, Sen Xu, Jun Jiang:
Rapid compressed sensing reconstruction: A semi-tensor product approach. 693-707 - Tao Zhu, Wenjian Luo, Chenyang Bu, Huansheng Ning:
Making use of observable parameters in evolutionary dynamic optimization. 708-725 - Zhongjing Yu, Zhong Zhang, Haoran Chen, Junming Shao:
Structured subspace embedding on attributed networks. 726-740 - Jose Luis Lisani, Jean-Michel Morel, Ana Belén Petro, Catalina Sbert:
Analyzing center/surround retinex. 741-759 - Chao Luo, Xi Song, Yuanjie Zheng:
A novel forecasting model for the long-term fluctuation of time series based on polar fuzzy information granules. 760-779 - Chaoran Cui, Wenya Yang, Cheng Shi, Meng Wang, Xiushan Nie, Yilong Yin:
Personalized image quality assessment with Social-Sensed aesthetic preference. 780-794 - Xiaoya Che, Degang Chen, Ju-Sheng Mi:
A novel approach for learning label correlation with application to feature selection of multi-label data. 795-812 - Jingwen Zhao, Yunjun Gao, Chunyu Ma, Pengfei Jin, Shiting Wen:
On efficiently diversified top-k geo-social keyword query processing in road networks. 813-829 - Peide Liu, Shyi-Ming Chen, Yumei Wang:
Multiattribute group decision making based on intuitionistic fuzzy partitioned Maclaurin symmetric mean operators. 830-854 - Yavar Khedmati, Reza Parvaz, Y. Behroo:
2D Hybrid chaos map for image security transform based on framelet and cellular automata. 855-879 - Abdelkamel Ben Ali, Gabriel Luque, Enrique Alba:
An efficient discrete PSO coupled with a fast local search heuristic for the DNA fragment assembly problem. 880-908 - Zhiyong Yu, Shuzhen Yu, Haijun Jiang:
Consensus of multi-agent systems with finite-time and fixed-time observation. 909-928 - Hamzeh Agahi:
A refined Hölder's inequality for Choquet expectation by Cauchy-Schwarz's inequality. 929-934 - Lin Lan, Pinghui Wang, Junzhou Zhao, Jing Tao, John C. S. Lui, Xiaohong Guan:
Improving network embedding with partially available vertex and edge content. 935-951 - Feng Wang, Huiqing Zhu, Wei Li, Kangshun Li:
A hybrid convolution network for serial number recognition on banknotes. 952-963 - Liang Jia, Chen Chen, Shoukun Xu, Ju Shen:
Fabric defect inspection based on lattice segmentation and template statistics. 964-984 - Francisco García-García, Antonio Corral, Luis Iribarne, Michael Vassilakopoulos, Yannis Manolopoulos:
Efficient distance join query processing in distributed spatial data management systems. 985-1008 - Ming Zheng, Tong Li, Rui Zhu, Yahui Tang, Mingjing Tang, Leilei Lin, Zifei Ma:
Conditional Wasserstein generative adversarial network-gradient penalty-based approach to alleviating imbalanced data classification. 1009-1023 - Lei Wang, Tao Sun, Chen Qian, Mark Goh, Vikas Kumar Mishra:
Applying social network analysis to genetic algorithm in optimizing project risk response decisions. 1024-1042 - Elre T. Oldewage, Andries P. Engelbrecht, Christopher W. Cleghorn:
Movement patterns of a particle swarm in high dimensional spaces. 1043-1062 - Tao Li, Xiaoling Tang, Jifeng Ge, Shumin Fei:
Event-based fault-tolerant control for networked control systems applied to aircraft engine system. 1063-1077 - Matheus Araújo, Adriano C. M. Pereira, Fabrício Benevenuto:
A comparative study of machine translation for multilingual sentence-level sentiment analysis. 1078-1102 - Xiushan Jiang, Senping Tian, Tianliang Zhang, Weihai Zhang:
Pareto optimal strategy for linear stochastic systems with H∞ constraint in finite horizon. 1103-1117 - Yuntao Wang, Xiaowei Yi, Xianfeng Zhao:
MP3 steganalysis based on joint point-wise and block-wise correlations. 1118-1133 - Gül Deniz Çayli:
Nullnorms on bounded lattices derived from t-norms and t-conorms. 1134-1154 - Moatsum Alawida, Azman Samsudin, Je Sen Teh:
Enhanced digital chaotic maps based on bit reversal with applications in random bit generators. 1155-1169 - Zhao Tong, Hongjian Chen, Xiaomei Deng, Kenli Li, Keqin Li:
A scheduling scheme in the cloud computing environment using deep Q-learning. 1170-1191 - Firuz Kamalov:
Kernel density estimation based sampling for imbalanced class distribution. 1192-1201 - Silvia Romagnoli:
A vague multidimensional dependency structure: Conditional versus Unconditional fuzzy copula models. 1202-1213 - Tingting Pan, Junhong Zhao, Wei Wu, Jie Yang:
Learning imbalanced datasets based on SMOTE and Gaussian distribution. 1214-1233 - Krishna Vyas, Flavius Frasincar:
Determining the most representative image on a Web page. 1234-1248 - Jin-Tao Gao, Wenjie Liu, Zhanhuai Li, Jian Zhang, Li Shen:
A general fragments allocation method for join query in distributed database. 1249-1263 - Selen Ayas, Murat Ekinci:
Single image super resolution using dictionary learning and sparse coding with multi-scale and multi-directional Gabor feature representation. 1264-1278 - Aminu Da'u, Naomie Salim, Idris Rabiu, Akram Osman:
Recommendation system exploiting aspect-based opinion mining with deep learning method. 1279-1292 - Seunghan Lee, Young-Jun Son:
Extended decision field theory with social-learning for long-term decision-making processes in social networks. 1293-1307 - Junseok Kwon:
Robust visual tracking based on variational auto-encoding Markov chain Monte Carlo. 1308-1323 - Mahla Mohammadzadeh Khadem, Yahya Forghani:
A recursive algorithm to increase the speed of regression-based binary recommendation systems. 1324-1334 - Amir Mohammad Fathollahi Fard, Mostafa Hajiaghaei-Keshteli, Guangdong Tian, Zhiwu Li:
An adaptive Lagrangian relaxation-based algorithm for a coordinated water supply and wastewater collection network design problem. 1335-1359 - Zhishan Dong, Shuangshuang Wang, Qun Liu:
Spectral based hypothesis testing for community detection in complex networks. 1360-1371 - Hugo Manuel Proença, Matthijs van Leeuwen:
Interpretable multiclass classification by MDL-based rule lists. 1372-1393 - Peilan He, Guiyuan Jiang, Siew-Kei Lam, Yidan Sun:
Learning heterogeneous traffic patterns for travel time prediction of bus journeys. 1394-1406 - Linbo Luo, Xiangting Hou, Wentong Cai, Bin Guo:
Incremental route inference from low-sampling GPS data: An opportunistic approach to online map matching. 1407-1423 - Chang Li, Yu Liu, Juan Cheng, Rencheng Song, Jiayi Ma, Chenhong Sui, Xun Chen:
Sparse unmixing of hyperspectral data with bandwise model. 1424-1441 - Yujun Chen, Ke Sun, Juhua Pu, Zhang Xiong, Xiangliang Zhang:
GraPASA: Parametric graph embedding via siamese architecture. 1442-1457 - Adil Imad Eddine Hosni, Kan Li, Sadique Ahmad:
Minimizing rumor influence in multiplex online social networks based on human individual and social behaviors. 1458-1480 - Yingying Liang, Jindong Qin, Luis Martínez, Jun Liu:
A heterogeneous QUALIFLEX method with criteria interaction for multi-criteria group decision making. 1481-1502 - Zahra Beheshti:
A time-varying mirrored S-shaped transfer function for binary particle swarm optimization. 1503-1542 - Jia-Cai Liu, Wen-Jian Zhao, Benjamin Lev, Deng-Feng Li, Jiuh-Biing Sheu, Yong-Wu Dai:
Novel equal division values based on players' excess vectors and their applications to logistics enterprise coalitions. 1543-1554 - Genghui Li, Qiuzhen Lin, Weifeng Gao:
Multifactorial optimization via explicit multipopulation evolutionary framework. 1555-1570 - Weijia Ju, Ling Chen, Bin Li, Wei Liu, Jun Sheng, Yuwei Wang:
A new algorithm for positive influence maximization in signed networks. 1571-1591 - Xiaohua Ge, Qing-Long Han, Xian-Ming Zhang, Derui Ding, Fuwen Yang:
Resilient and secure remote monitoring for a class of cyber-physical systems against attacks. 1592-1605
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.