default search action
Information Sciences, Volume 633
Volume 633, July 2023
- Yangming Hu, Chao Liu, Zhiming Yuan:
Distributed L2 - L∞ containment control with nonconvex constraints for multi-agent systems. 1-9 - Lipeng Pan, Xiaozhuan Gao:
Evidential Markov decision-making model based on belief entropy to predict interference effects. 10-26 - Xiao Hu, Yiqing Chen, Long Ren, Zeshui Xu:
Investor preference analysis: An online optimization approach with missing information. 27-40 - Minhao Zou, Zhongxue Gan, Ruizhi Cao, Chun Guan, Siyang Leng:
Similarity-navigated graph neural networks for node classification. 41-69 - Guoqing Zhang, Weisi Lin, Arun Kumar Chandran, Xuan Jing:
Complementary networks for person re-identification. 70-84 - Junkai Wang, Lianlei Lin, Sheng Gao, Zongwei Zhang:
Deep generation network for multivariate spatio-temporal data based on separated attention. 85-103 - Qiuhua Wang, Rui Zhang, Chuangchuang Li, Chengyu Li, Yeru Wang, Yizhi Ren, Kim-Kwang Raymond Choo:
S-DeepTrust: A deep trust prediction method based on sentiment polarity perception. 104-121 - Lara Mauri, Bruno Apolloni, Ernesto Damiani:
Robust ML model ensembles via risk-driven anti-clustering of training data. 122-140 - Nataliya Chukhrova, Arne Johannssen:
Employing fuzzy hypothesis testing to improve modified p charts for monitoring the process fraction nonconforming. 141-157 - Chen Wang, Jianhui Wang, Yongping Du, Chunliang Zhang, Zhi Liu, C. L. Philip Chen:
Fixed-time event-triggered fuzzy adaptive control for uncertain nonlinear systems with full-state constraints. 158-169 - Jordan J. Bird, Abdallah Naser, Ahmad Lotfi:
Writer-independent signature verification; Evaluation of robotic and generative adversarial attacks. 170-181 - Guanli Yue, Ansheng Deng, Yanpeng Qu, Hui Cui, Xueying Wang:
Stratified multi-density spectral clustering using Gaussian mixture model. 182-203 - Ran Li, Hongchang Chen, Shuxin Liu, Xing Li, Yingle Li, Biao Wang:
Incomplete mixed data-driven outlier detection based on local-global neighborhood information. 204-225 - Zhize Sun, Lijie Wang, Yang Liu, Liang Cao:
RESO-based distributed bipartite tracking control for stochastic MASs with actuator nonlinearity. 226-244 - Shuaiying Yuan, Ziyang He, Jianhui Zhao, Zhiyong Yuan, Adi Alhudhaif, Fayadh Alenezi:
Hypergraph and cross-attention-based unsupervised domain adaptation framework for cross-domain myocardial infarction localization. 245-263 - Sen Qiu, Tianqi Fan, Junhan Jiang, Zhelong Wang, Yongzhen Wang, Junnan Xu, Tao Sun, Nan Jiang:
A novel two-level interactive action recognition model based on inertial data fusion. 264-279 - Pengwei Zhou, Zuhua Xu, Xiaoping Zhu, Jun Zhao, Chunyue Song, Zhijiang Shao:
Safe reinforcement learning method integrating process knowledge for real-time scheduling of gas supply network. 280-304 - Yuqiang Luo, Zidong Wang, Hongli Dong, Jingfeng Mao, Fuad E. Alsaadi:
A novel sequential switching quadratic particle swarm optimization scheme with applications to fast tuning of PID controllers. 305-320 - En Zhang, Zihao Nie, Qiang Yang, Yiqiao Wang, Dong Liu, Sang-Woon Jeon, Jun Zhang:
Heterogeneous cognitive learning particle swarm optimization for large-scale optimization problems. 321-342 - Hua Zhang, Kaixuan Li, Teng Huang, Xin Zhang, Wenmin Li, Zhengping Jin, Fei Gao, Minghui Gao:
Publishing locally private high-dimensional synthetic data efficiently. 343-356 - Fanlong Zhang, Yi Che, Tiancai Liang, Wenchao Jiang:
Clone consistent-defect prediction based on deep learning method. 357-369 - Peifeng Liang, Gang Liu, Zenggang Xiong, Honghui Fan, Hongjin Zhu, Xuemin Zhang:
A facial geometry based detection model for face manipulation using CNN-LSTM architecture. 370-383 - Ting Yu, Mengchi Liu, Zujie Ren, Ji Zhang:
A fast approximate method for k-edge connected component detection in graphs with high accuracy. 384-409 - Hui Bai, Xixun Yu, Zheng Yan, Jialei Zhang, Laurence T. Yang:
VeriORouting: Verification on intelligent routing outsourced to the cloud. 410-430 - Rui Yin, Xuejun Pan, Liyong Zhang, Jianhua Yang, Wei Lu:
A rule-based deep fuzzy system with nonlinear fuzzy feature transform for data classification. 431-452 - Hong Xie, Haoran Gu, Zhi Qi:
Efficient algorithms for multi-armed bandits with additional feedbacks: Modeling and algorithms. 453-468 - Jana Herzog, Janez Brest, Borko Boskovic:
Analysis based on statistical distributions: A practical approach for stochastic solvers using discrete and continuous problems. 469-490 - Jinlai Zhang, Lyujie Chen, Binbin Liu, Bo Ouyang, Qizhi Xie, Jihong Zhu, Weiming Li, Yanmei Meng:
3D adversarial attacks beyond point cloud. 491-503 - Yajing Ma, Zhanjie Li:
Neural network-based secure event-triggered control of uncertain industrial cyber-physical systems against deception attacks. 504-516 - Chang-Bing Zheng, Zhong-Hua Pang, Jing-Xu Wang, Shengnan Gao, Jian Sun, Guo-Ping Liu:
Time-varying formation prescribed performance control with collision avoidance for multi-agent systems subject to mismatched disturbances. 517-530 - Yongliang Wu, Shuliang Zhao, Shimao Dou, Jinghui Li:
ParsingPhrase: Parsing-based automated quality phrase mining. 531-548 - Zhou-Jing Wang:
Saaty's consistency trapezoidal fuzzy extension and optimized fuzzy utility vector acquisition. 549-572 - Guobing Qian, Xin Yu, Jiaojiao Mei, Junzhu Liu, Shiyuan Wang:
A class of adaptive filtering algorithms based on improper complex correntropy. 573-596 - Yamei Ju, Guoliang Wei, Wangyan Li:
Distributed fault estimation over sensor networks: A bit rate allocation scheme. 597-612 - Zhengkang Zuo, Zhicheng Zeng, Wei Su, Qing Huang, Yuhan Ke, Zengxin Liu, Changjing Wang, Wei Liang:
Specification transformation method for functional program generation based on partition-recursion refinement rule. 613-632
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.