Anti-compression JPEG steganography over repetitive compression networks | 4 | 0.39 | 2020 |
Short-term load forecasting with clustering–regression model in distributed cluster | 3 | 0.39 | 2019 |
Multi-Source Stego Detection with Low-Dimensional Textural Feature and Clustering Ensembles. | 0 | 0.34 | 2018 |
Unsupervised steganalysis over social networks based on multi-reference sub-image sets. | 1 | 0.35 | 2018 |
Efficient power component identification with long short-term memory and deep neural network | 0 | 0.34 | 2018 |
Efficient steganographer detection over social networks with sampling reconstruction. | 2 | 0.36 | 2018 |
Kernelized random KISS metric learning for person re-identification. | 0 | 0.34 | 2018 |
Robust Batch Steganography in Social Networks With Non-Uniform Payload and Data Decomposition. | 5 | 0.40 | 2018 |
A privacy-aware data dissemination scheme for smart grid with abnormal data traceability. | 0 | 0.34 | 2017 |
Robust K-means algorithm with automatically splitting and merging clusters and its applications for surveillance data. | 5 | 0.40 | 2016 |
A Distributed and Scalable Approach to Semi-Intrusive Load Monitoring. | 3 | 0.39 | 2016 |
CIT: A credit‐based incentive tariff scheme with fraud‐traceability for smart grid | 3 | 0.38 | 2016 |
Unsupervised Hyperspectral Band Selection by Dominant Set Extraction | 11 | 0.49 | 2016 |
Attribute reduction in decision-theoretic rough set model based on minimum decision cost | 3 | 0.38 | 2016 |
Secure Data Deduplication With Reliable Key Management for Dynamic Updates in CPSS. | 9 | 0.48 | 2015 |
Incorporating Energy Heterogeneity into Sensor Network Time Synchronization | 7 | 0.51 | 2015 |
Visual hierarchical cluster structure: A refined co-association matrix based visual assessment of cluster tendency | 0 | 0.34 | 2015 |
EAPA: An efficient authentication protocol against pollution attack for smart grid | 3 | 0.40 | 2015 |
Cost minimization attribute reduction based on mutual information | 1 | 0.36 | 2015 |
Robust local outlier detection with statistical parameter for big data. | 0 | 0.34 | 2015 |
The Meter Tells You Are At Home! Non-Intrusive Occupancy Detection Via Load Curve Data | 3 | 0.40 | 2015 |
A clustering ensemble: Two-level-refined co-association matrix with path-based transformation | 8 | 0.48 | 2015 |
Evolving soft subspace clustering. | 8 | 0.44 | 2014 |
From Landscape To Portrait: A New Approach For Outlier Detection In Load Curve Data | 3 | 0.44 | 2014 |
Building emotional dictionary for sentiment analysis of online news | 54 | 1.44 | 2014 |
An Appliance-Driven Approach to Detection of Corrupted Load Curve Data | 0 | 0.34 | 2014 |
SESA: an efficient searchable encryption scheme for auction in emerging smart grid marketing | 14 | 0.62 | 2014 |
Towards building a social emotion detection system for online news. | 12 | 0.55 | 2014 |
CO-MAP: Improving Mobile Multiple Access Efficiency With Location Input | 4 | 0.38 | 2014 |
A simple model-driven approach to energy disaggregation | 6 | 0.52 | 2014 |
Plug and Play! A Simple, Universal Model for Energy Disaggregation. | 2 | 0.43 | 2014 |
PaRQ: A Privacy-Preserving Range Query Scheme Over Encrypted Metering Data for Smart Grid. | 7 | 0.63 | 2013 |
ECQ: An Efficient Conjunctive Query scheme over encrypted multidimensional data in smart grid. | 4 | 0.39 | 2013 |
Finding Dominating Set from Verbal Contextual Graph for Personalized Search in Folksonomy | 2 | 0.37 | 2013 |
Sse: A Secure Searchable Encryption Scheme For Urban Sensing And Querying | 2 | 0.39 | 2013 |
Is My Electricity Bill Accurate? A Model-Driven Approach to Corrupted Load Data Identification. | 0 | 0.34 | 2013 |
From Landscape to Portrait: A New Approach for Load Curve Data Analysis and Cleansing. | 0 | 0.34 | 2013 |
Semantic Link Analysis for Finding Answer Experts. | 2 | 0.36 | 2012 |
A tag-based solution for data sensing conflicts in multiple sensing agent systems | 1 | 0.36 | 2012 |
Efficient visual tracking by using LBP descriptor | 0 | 0.34 | 2012 |
A formal measurement of the cognitive complexity of texts in cognitive linguistics | 2 | 0.39 | 2012 |
Toward Automatic Answers in User-Interactive Question Answering Systems | 5 | 0.44 | 2011 |
Web Information Systems and Mining: International Conference, WISM 2011, Taiyuan, China, September 24-25, 2011, Proceedings, Part I | 111 | 9.88 | 2011 |
The Formal Design Models of a Universal Array UA and its Implementation | 2 | 0.36 | 2011 |
Emerging Research in Web Information Systems and Mining: International Conference, WISM 2011, Taiyuan, China, September 23-25, 2011. Proceedings | 61 | 8.47 | 2011 |
Web Information Systems and Mining - International Conference, WISM 2010, Sanya, China, October 23-24, 2010. Proceedings | 54 | 5.15 | 2010 |
Stability of equilibrium solution and periodical solution to Cohen-Grossberg neural networks | 1 | 0.35 | 2010 |
Artificial Intelligence and Computational Intelligence - International Conference, AICI 2010, Sanya, China, October 23-24, 2010, Proceedings, Part I | 101 | 9.89 | 2010 |
Recent developments in natural computation | 0 | 0.34 | 2009 |
Web Information Systems and Mining, International Conference, WISM 2009, Shanghai, China, November 7-8, 2009. Proceedings | 60 | 5.06 | 2009 |