


default search action
Information Sciences, Volume 634
Volume 634, July 2023
- Shuai Xiao, Zhuo Zhang

, Jiachen Yang, Jiabao Wen, Yang Li:
Manipulation detection of key populations under information measurement. 1-13 - R. Beigmohamadi, Alireza Khastan

, Juan J. Nieto
, Rosana Rodríguez-López:
Existence and uniqueness of non-periodic solutions to boundary value problems for discrete fractional difference equations with uncertainty. 14-26 - Yucheng Long, Zuobin Ying

, Hongyang Yan, Ranqing Fang, Xingyu Li
, Yajie Wang
, Zijie Pan
:
Membership reconstruction attack in deep neural networks. 27-41 - Zhi-Jun Wang

, He-Bei Gao, Xiang-Hong Wang, Shuaiye Zhao, Hong Li
, Xiao-Qin Zhang:
Adaptive learning rate optimization algorithms with dynamic bound based on Barzilai-Borwein method. 42-54 - Shantian Yang

:
Hierarchical graph multi-agent reinforcement learning for traffic signal control. 55-72 - Mohammadreza Chamanbaz

, Roland Bouffanais
:
A sequential deep learning algorithm for sampled mixed-integer optimisation problems. 73-84 - Shengang Hao

, Jun Zheng, Jie Yang, Haipeng Sun
, Quanxin Zhang, Li Zhang
, Nan Jiang, Yuanzhang Li:
Deep reinforce learning for joint optimization of condition-based maintenance and spare ordering. 85-100 - Haiying Wan, Xiaoli Luan

, Vladimir Stojanovic
, Fei Liu
:
Self-triggered finite-time control for discrete-time Markov jump systems. 101-121 - Hong Zhang, Wanli Xing, Yifan Yang, Yan Li, Ding Yuan:

SiamST: Siamese network with spatio-temporal awareness for object tracking. 122-139 - Jiazhong Zhou, Qing Tian, Zhanghu Lu:

Progressive decoupled target-into-source multi-target domain adaptation. 140-156 - Weiping Ding

, Mohamed Abdel-Basset, Reda Mohamed
:
DeepAK-IoT: An effective deep learning model for cyberattack detection in IoT networks. 157-171 - Weimin Li

, Chang Guo, Yanxia Liu, Xiaokang Zhou
, Qun Jin
, Mingjun Xin:
Rumor source localization in social networks based on infection potential energy. 172-188 - Wenhan Liu, Zhoutong Li, Huaicheng Zhang

, Sheng Chang, Hao Wang, Jin He, Qijun Huang:
Dense lead contrast for self-supervised representation learning of multilead electrocardiograms. 189-205 - Xuanchi Chen

, Xiangwei Zheng
, Kai Sun, Weilong Liu, Yuang Zhang:
Self-supervised vision transformer-based few-shot learning for facial expression recognition. 206-226 - Juan Zou, Jian Luo, Yuan Liu

, Shengxiang Yang
, Jinhua Zheng:
A flexible two-stage constrained multi-objective evolutionary algorithm based on automatic regulation. 227-243 - Ming Yin

, Xiaohua Liu, Liuyang Wang, Guoliang He:
Learning latent embedding via weighted projection matrix alignment for incomplete multi-view clustering. 244-258 - Wenbo Dong

, Shaofan Liu, Shiliang Sun:
Safe batch constrained deep reinforcement learning with generative adversarial network. 259-270 - Junkang Ni

, Feiyu Duan, Jinde Cao
:
Prescribed-time distributed observer based practical predefined-time leader-follower output consensus of second-order multiagent system with communication noises. 271-289 - Junghoon Kim, Hyun Ji Jeong, Sungsu Lim

, Jungeun Kim:
Effective and efficient core computation in signed networks. 290-307 - Kuo Wang

, Lingbo Liu, Yang Liu
, Guanbin Li, Fan Zhou, Liang Lin:
Urban regional function guided traffic flow prediction. 308-320 - Massimiliano Kaucic

, Filippo Piccotto
, Gabriele Sbaiz
, Giorgio Valentinuz
:
A hybrid level-based learning swarm algorithm with mutation operator for solving large-scale cardinality-constrained portfolio optimization problems. 321-339 - Francisco Javier Gil Gala

, Marko Durasevic, Ramiro Varela
, Domagoj Jakobovic
:
Ensembles of priority rules to solve one machine scheduling problem in real-time. 340-358 - Yinxin Bao

, Jiali Liu, Qinqin Shen
, Yang Cao
, Weiping Ding
, Quan Shi
:
PKET-GCN: Prior knowledge enhanced time-varying graph convolution network for traffic flow prediction. 359-381 - Xiaowei Gu

:
Self-adaptive fuzzy learning ensemble systems with dimensionality compression from data streams. 382-399 - Yuan-Wei Du, Jiao-Jiao Zhong:

Dynamic multicriteria group decision-making method with automatic reliability and weight calculation. 400-422 - Genghui Li, Lindong Xie

, Zhenkun Wang
, Huajun Wang, Maoguo Gong:
Evolutionary algorithm with individual-distribution search strategy and regression-classification surrogates for expensive optimization. 423-442 - Zhen Liu

, Chuxin Chen, Qianli Ma
:
Category-aware optimal transport for incomplete data classification. 443-476 - Zhaowen Li, Taoli Yang, Jinjin Li:

Semi-supervised attribute reduction for partially labelled multiset-valued data via a prediction label strategy. 477-504 - Francisco Pérez-Gámez

, Pablo Cordero
, Manuel Enciso, Ángel Mora
:
Simplification logic for the management of unknown information. 505-519 - Xiaoli Li

, Anran Cao, Kang Wang
, Xin Li, Quanbo Liu:
Co-evolutionary algorithm based on problem analysis for dynamic multiobjective optimization. 520-538 - Yuanyuan Li, Jing Zhang, Jianquan Lu

, Jungang Lou
:
Finite-time synchronization of complex networks with partial communication channels failure. 539-549 - Yang Zhou, Xin Chen

, Min Wu, Weihua Cao:
A novel optimization method for geological drilling vertical well. 550-563 - Mingfu Xue

, Yinghao Wu, Zhiyu Wu, Yushu Zhang, Jian Wang, Weiqiang Liu
:
Detecting backdoor in deep neural networks via intentional adversarial perturbations. 564-577 - Arnab Dey, B. Rushi Kumar

, Bishakha Das, Arnab Kumar Ghoshal
:
Outlier detection in social networks leveraging community structure. 578-586 - Chenglu Li, Hangjun Che, Man-Fai Leung

, Cheng Liu, Zheng Yan:
Robust multi-view non-negative matrix factorization with adaptive graph and diversity constraints. 587-607 - Daejin Kim, Min-Soo Kim, Hyunjung Shim

, Jongwuk Lee
:
Your lottery ticket is damaged: Towards all-alive pruning for extremely sparse networks. 608-620 - Toshiyuki Satoh

, Shun Nishizawa, Jun-Ya Nagase
, Naoki Saito
, Norihiko Saga
:
Artificial bee colony algorithm-based design of discrete-time stable unknown input estimator. 621-649 - Shaaban A. Sahmoud

, Haluk Rahmi Topcuoglu
:
Dynamic multi-objective evolutionary algorithms in noisy environments. 650-664 - Peiliang Zhang

, Jiatao Chen, Chao Che
, Liang Zhang, Bo Jin, Yongjun Zhu
:
IEA-GNN: Anchor-aware graph neural network fused with information entropy for node classification and link prediction. 665-676 - Barbara Cardone

, Ferdinando Di Martino:
A novel spatiotemporal prediction method based on fuzzy Transform: Application to demographic balance data. 677-695 - Chenglong Zhu, Xueling Ma

, Chao Zhang
, Weiping Ding
, Jianming Zhan
:
Information granules-based long-term forecasting of time series via BPNN under three-way decision framework. 696-715 - Qinglai Wei, Diancheng Chen

, Beiming Yuan, Peijun Ye:
Raven solver: From perception to reasoning. 716-729 - Qi Li, Yufu Zhi, Hailong Tan, Weiguo Sheng:

Protocol-based zonotopic state and fault estimation for communication-constrained industrial cyber-physical systems. 730-743 - Wei Liu, Tao Zhang, Yisheng Lu, Jun Chen, Longsheng Wei

:
THAT-Net: Two-layer hidden state aggregation based two-stream network for traffic accident prediction. 744-760 - Jing Huang, Yejun Xu

, Xiaowei Wen, Xiaotong Zhu, Enrique Herrera-Viedma:
Deriving priorities from the fuzzy best-worst method matrix and its applications: A perspective of incomplete reciprocal preference relation. 761-778

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














