An Intelligent Signal Processing Data Denoising Method for Control Systems Protection in the Industrial Internet of Things | 0 | 0.34 | 2022 |
Evaluation and Comparative Analysis of Semantic Web-Based Strategies for Enhancing Educational System Development | 0 | 0.34 | 2022 |
An Enhanced 3dcnn-Convlstm For Spatiotemporal Multimedia Data Analysis | 0 | 0.34 | 2021 |
Novel data mining paradigms based on soft computing and machine learning in the current and upcoming information society revolution | 0 | 0.34 | 2020 |
Internet of Knowledge. | 0 | 0.34 | 2020 |
Efficient healthcare service based on Stacking Ensemble. | 0 | 0.34 | 2020 |
XSSPro - XSS Attack Detection Proxy to Defend Social Networking Platforms. | 0 | 0.34 | 2020 |
Multimodal Neuroimaging Game Theoretic Data Fusion in Adversarial Conditions. | 0 | 0.34 | 2020 |
Green resource allocation method for intelligent medical treatment-oriented service in a 5G mobile network: Green RRM for Intelligent Medical Service | 0 | 0.34 | 2020 |
Inter-Beam Interference Cancellation and Physical Layer Security Constraints by 3D Polarized Beamforming in Power Domain NOMA Systems | 0 | 0.34 | 2020 |
A Localization Based on Unscented Kalman Filter and Particle Filter Localization Algorithms. | 4 | 0.43 | 2020 |
Packer identification method based on byte sequences: Packer identification method based on byte sequences | 0 | 0.34 | 2020 |
Robust Decentralised Trust Management for the Internet of Things by Using Game Theory | 2 | 0.37 | 2020 |
Visual saliency guided complex image retrieval | 12 | 0.54 | 2020 |
Generative Neural Networks for Anomaly Detection in Crowded Scenes. | 6 | 0.42 | 2019 |
A Reliable Energy Efficient Dynamic Spectrum Sensing for Cognitive Radio IoT Networks | 8 | 0.43 | 2019 |
Ontology-Based Security Context Reasoning for Power IoT-Cloud Security Service | 0 | 0.34 | 2019 |
An Edge Intelligence Empowered Recommender System Enabling Cultural Heritage Applications | 1 | 0.41 | 2019 |
Moving intelligence of mobile edge computing to maritime network. | 1 | 0.37 | 2019 |
A novel energy-efficient neighbor discovery procedure in a wireless self-organization network. | 1 | 0.36 | 2019 |
Clustered NFV service chaining scheme for ocean observations. | 0 | 0.34 | 2019 |
Medical Information Protection Frameworks for Smart Healthcare based on IoT | 0 | 0.34 | 2019 |
Automatic Maritime Traffic Synthetic Route - A Framework for Route Prediction. | 1 | 0.36 | 2019 |
A reinforcement learning approach for UAV target searching and tracking | 4 | 0.38 | 2019 |
Metamorphic malicious code behavior detection using probabilistic inference methods | 1 | 0.35 | 2019 |
Accelerating temporal action proposal generation via high performance computing | 0 | 0.34 | 2019 |
Localization and Detection of Targets in Underwater Wireless Sensor Using Distance and Angle Based Algorithms. | 1 | 0.36 | 2019 |
A novel CNN based security guaranteed image watermarking generation scenario for smart city applications. | 19 | 0.76 | 2019 |
Microservices Scheduling Model Over Heterogeneous Cloud-Edge Environments As Support for IoT Applications. | 7 | 0.51 | 2018 |
Combined pre-detection and sleeping for energy-efficient spectrum sensing in cognitive radio networks. | 0 | 0.34 | 2018 |
Intelligent Power Equipment Management Based on Distributed Context-Aware Inference in Smart Cities. | 1 | 0.36 | 2018 |
An improved method of automatic text summarization for web contents using lexical chain with semantic-related terms. | 1 | 0.35 | 2018 |
Towards Affective Lifelogging with Information Fusion | 0 | 0.34 | 2018 |
Unsupervised translated word sense disambiguation in constructing bilingual lexical database. | 0 | 0.34 | 2018 |
Power domain NOMA to support group communication in public safety networks. | 1 | 0.36 | 2018 |
Performance analysis of smart cultural heritage protection oriented wireless networks. | 5 | 0.45 | 2018 |
Tensor 2-D DOA Estimation for a Cylindrical Conformal Antenna Array in a Massive MIMO System Under Unknown Mutual Coupling. | 1 | 0.35 | 2018 |
A novel valuation pruning optimization fuzzing test model based on mutation tree for industrial control systems. | 0 | 0.34 | 2018 |
CNN-based malicious user detection in social networks. | 0 | 0.34 | 2018 |
Securing Collaborative Deep Learning in Industrial Applications Within Adversarial Scenarios. | 2 | 0.37 | 2018 |
Study to Improve Security for IoT Smart Device Controller: Drawbacks and Countermeasures. | 1 | 0.35 | 2018 |
Improved performance optimization for massive small files in cloud computing environment. | 2 | 0.37 | 2018 |
Vulnerability Analysis on a Secure USB: Based on a Commercial Product A | 0 | 0.34 | 2018 |
Fine-Grained Big Traffic Data Reverse-charge System: A Method of Saving Expenses. | 0 | 0.34 | 2018 |
Intelligent approaches for security technologies. | 0 | 0.34 | 2018 |
Apt Attack Behavior Pattern Mining Using The Fp-Growth Algorithm | 0 | 0.34 | 2017 |
A Study Of Interference Cancellation For Noma Downlink Near-Far Effect To Support Big Data | 0 | 0.34 | 2017 |
SwiftRank: An Unsupervised Statistical Approach of Keyword and Salient Sentence Extraction for Individual Documents. | 1 | 0.35 | 2017 |
Signaling game based strategy for secure positioning in wireless sensor networks. | 2 | 0.38 | 2017 |
Channel allocation and power control schemes for cross-tier 3GPP LTE networks to support multimedia applications. | 5 | 0.47 | 2017 |