


default search action
ACM Transactions on Internet Technology, Volume 21
Volume 21, Number 1, February 2021
Visions Paper
- Paolo Boldi, Georgios Gousios:

Fine-Grained Network Analysis for Modern Software Ecosystems. 1:1-1:14
- Liwei Huang, Yutao Ma

, Yanbo Liu, Keqing He:
DAN-SNR: A Deep Attentive Network for Social-aware Next Point-of-interest Recommendation. 2:1-2:27 - Wensheng Gan, Jerry Chun-Wei Lin

, Philippe Fournier-Viger, Han-Chieh Chao
, Philip S. Yu:
Beyond Frequency: Utility Mining with Varied Item-specific Minimum Utility. 3:1-3:32
- Sabah Mohammed, Jinan Fiaidhi, Carlos Ramos

, Tai-Hoon Kim, Wai-Chi Fang, Tarek F. Abdelzaher:
Blockchain in eCommerce: A Special Issue of the ACM Transactions on Internet of ThingsBlockchain in eCommerce: A Special Issue of the ACM Transactions on Internet of Things. 11-55 - Yongjun Ren, Jian Qi, Yepeng Liu

, Jin Wang, Gwang-Jun Kim:
Integrity Verification Mechanism of Sensor Data Based on Bilinear Map Accumulator. 5:1-5:19 - Honghao Gao, Wanqiu Huang, Yucong Duan:

The Cloud-edge-based Dynamic Reconfiguration to Service Workflow for Mobile Ecommerce Environments: A QoS Prediction Perspective. 6:1-6:23 - Xiaolong Xu

, Dawei Zhu, Xiaoxian Yang, Shuo Wang, Lianyong Qi, Wanchun Dou:
Concurrent Practical Byzantine Fault Tolerance for Integration of Blockchain and Supply Chain. 7:1-7:17 - Junho Kim, Mucheol Kim:

Intelligent Mediator-based Enhanced Smart Contract for Privacy Protection. 8:1-8:16 - Shuiguang Deng

, Guanjie Cheng, Hailiang Zhao
, Honghao Gao, Jianwei Yin:
Incentive-Driven Computation Offloading in Blockchain-Enabled E-Commerce. 9:1-9:19 - Liang Chen, Jiaying Peng, Yang Liu

, Jintang Li, Fenfang Xie, Zibin Zheng
:
Phishing Scams Detection in Ethereum Transaction Network. 10:1-10:16 - Lichen Cheng

, Jiqiang Liu, Yi Jin, Yidong Li, Wei Wang:
Account Guarantee Scheme: Making Anonymous Accounts Supervised in Blockchain. 11:1-11:19 - Zhitao Guan, Naiyu Wang, Xunfeng Fan, Xueyan Liu, Longfei Wu, Shaohua Wan

:
Achieving Secure Search over Encrypted Data for e-Commerce: A Blockchain Approach. 12:1-12:17 - Qun Song, Yuhao Chen, Yan Zhong, Kun Lan, Simon Fong

, Rui Tang:
A Supply-chain System Framework Based on Internet of Things Using Blockchain Technology. 13:1-13:24 - Junho Jeong

, Donghyo Kim, Sun-Young Ihm, Yangsun Lee
, Yunsik Son
:
Multilateral Personal Portfolio Authentication System Based on Hyperledger Fabric. 14:1-14:17 - You Sun, Rui Xue, Rui Zhang, Qianqian Su

, Sheng Gao
:
RTChain: A Reputation System with Transaction and Consensus Incentives for E-commerce Blockchain. 15:1-15:24
- Mahmoud Barhamgi, Michael N. Huhns, Charith Perera, Pinar Yolum:

Introduction to the Special Section on Human-centered Security, Privacy, and Trust in the Internet of Things. 16:1-16:3 - Zheng Yan

, Li Peng, Wei Feng, Laurence T. Yang
:
Social-Chain: Decentralized Trust Evaluation Based on Blockchain in Pervasive Social Networking. 17:1-17:28 - Amit Kumar Singh

, Sriti Thakur, Alireza Jolfaei
, Gautam Srivastava
, Mohamed Elhoseny
, Anand Mohan:
Joint Encryption and Compression-Based Watermarking Technique for Security of Digital Documents. 18:1-18:20 - Cong Peng

, Jianhua Chen, Pandi Vijayakumar, Neeraj Kumar
, Debiao He
:
Efficient Distributed Decryption Scheme for IoT Gateway-based Applications. 19:1-19:23 - Elie Chicha, Bechara al Bouna, Mohamed Nassar

, Richard Chbeir, Ramzi A. Haraty, Mourad Oussalah, Djamal Benslimane, Mansour Naser Alraja
:
A User-Centric Mechanism for Sequentially Releasing Graph Datasets under Blowfish Privacy. 20:1-20:25 - Yekta Said Can

, Cem Ersoy
:
Privacy-preserving Federated Deep Learning for Wearable IoT-based Biomedical Monitoring. 21:1-21:17 - Edy Hourany

, Bachir Habib, Camille Fountaine, Abdallah Makhoul, Benoît Piranda, Julien Bourgeois:
PROLISEAN: A New Security Protocol for Programmable Matter. 22:1-22:29 - Faiza Loukil

, Chirine Ghedira Guegan
, Khouloud Boukadi
, Aïcha-Nabila Benharkat, Elhadj Benkhelifa:
Data Privacy Based on IoT Device Behavior Control Using Blockchain. 23:1-23:20 - Kaixi Hu

, Lin Li
, Jianquan Liu, Daniel Sun
:
DuroNet: A Dual-robust Enhanced Spatial-temporal Learning Network for Urban Crime Prediction. 24:1-24:24 - Vikram Mehta, Daniel Gooch

, Arosha K. Bandara
, Blaine A. Price, Bashar Nuseibeh
:
Privacy Care: A Tangible Interaction Framework for Privacy Management. 25:1-25:32 - Tanusree Sharma, Hunter A. Dyer, Masooda N. Bashir

:
Enabling User-centered Privacy Controls for Mobile Applications: COVID-19 Perspective. 26:1-26:24
Volume 21, Number 2, June 2021
- Xuanzhe Liu

, Shangguang Wang
, Yun Ma, Ying Zhang, Qiaozhu Mei, Yunxin Liu, Gang Huang:
Operating Systems for Resource-adaptive Intelligent Software: Challenges and Opportunities. 27:1-27:19
- Francesco Piccialli, Nik Bessis

, Gwanggil Jeon, Calton Pu:
Introduction to the Special Section on Data Science for Cyber-Physical Systems. 28e:1-28e:7 - Zhihan Lv

, Amit Kumar Singh
:
Big Data Analysis of Internet of Things System. 28:1-28:15 - Muhammad Tanveer

, Sandeep Sharma, Khan Muhammad
:
Large-Scale Least Squares Twin SVMs. 29:1-29:19 - Claudio Savaglio

, Giancarlo Fortino:
A Simulation-driven Methodology for IoT Data Mining Based on Edge Computing. 30:1-30:22 - Kuljeet Kaur

, Sahil Garg, Georges Kaddoum
, Neeraj Kumar
:
Energy and SLA-driven MapReduce Job Scheduling Framework for Cloud-based Cyber-Physical Systems. 31:1-31:24 - Chun-Wei Tsai

, Zhi-Yan Fang:
An Effective Hyperparameter Optimization Algorithm for DNN to Predict Passengers at a Metro Station. 32:1-32:24 - Pin Ni

, Yuming Li, Gangmin Li
, Victor I. Chang
:
A Hybrid Siamese Neural Network for Natural Language Inference in Cyber-Physical Systems. 33:1-33:25 - Chen Zhang

, Zhuo Tang, Kenli Li, Jianzhong Yang, Li Yang:
A Polishing Robot Force Control System Based on Time Series Data in Industrial Internet of Things. 34:1-34:22 - Yuyu Yin

, Haoran Xu, Tingting Liang, Manman Chen, Honghao Gao, Antonella Longo
:
Leveraging Data Augmentation for Service QoS Prediction in Cyber-physical Systems. 35:1-35:25 - Martin Garriga

, Koen Aarns, Christos Tsigkanos
, Damian A. Tamburri
, Willem-Jan van den Heuvel:
DataOps for Cyber-Physical Systems Governance: The Airport Passenger Flow Case. 36:1-36:25 - Iris Weiß, Birgit Vogel-Heuser, Emanuel Trunzer, Simon Kruppa:

Product Quality Monitoring in Hydraulic Presses Using a Minimal Sample of Sensor and Actuator Data. 37:1-37:23
- Kim-Kwang Raymond Choo, Uttam Ghosh, Deepak K. Tosh

, Reza M. Parizi, Ali Dehghantanha:
Introduction to the Special Issue on Decentralized Blockchain Applications and Infrastructures for Next Generation Cyber-Physical Systems. 38e:1-38e:3 - Laizhong Cui, Zhe Xiao, Jiahao Wang, Fei Chen

, Yi Pan, Hua Dai, Jing Qin
:
Improving Vaccine Safety Using Blockchain. 38:1-38:24 - Truc D. T. Nguyen

, My T. Thai:
A Blockchain-based Iterative Double Auction Protocol Using Multiparty State Channels. 39:1-39:22 - Chao Lin

, Debiao He, Sherali Zeadally, Xinyi Huang, Zhe Liu:
Blockchain-based Data Sharing System for Sensing-as-a-Service in Smart Cities. 40:1-40:21 - Jun Feng

, Laurence T. Yang
, Yuxiang Zhu, Nicholaus J. Gati, Yijun Mo:
Blockchain-enabled Tensor-based Conditional Deep Convolutional GAN for Cyber-physical-Social Systems. 41:1-41:17 - Ye Luo, Zehai Su, Wei Zheng, Zhaobin Chen, Fuqin Wang, Zhemin Zhang, Jinjun Chen:

A Novel Memory-hard Password Hashing Scheme for Blockchain-based Cyber-physical Systems. 42:1-42:21 - Hao Wang, Shenglan Ma, Chaonian Guo, Yulei Wu

, Hong-Ning Dai
, Di Wu:
Blockchain-Based Power Energy Trading Management. 43:1-43:16 - Michal Król, Alberto Sonnino, Mustafa Al-Bassam, Argyrios G. Tasiopoulos, Etienne Rivière, Ioannis Psaras:

Proof-of-Prestige: A Useful Work Reward System for Unverifiable Tasks. 44:1-44:27
- Bin Cao, Jiawei Wu, Sichao Wang, Honghao Gao, Jing Fan, Shuiguang Deng, Jianwei Yin, Xuan Liu

:
Unsupervised Derivation of Keyword Summary for Short Texts. 45:1-45:23 - Vandana Bharti

, Bhaskar Biswas, Kaushal Kumar Shukla
:
A Novel Multiobjective GDWCN-PSO Algorithm and Its Application to Medical Data Security. 46:1-46:28 - Shijie Hao, Tao Chen

, Yang Wang, Yanrong Guo, Meng Wang:
Adaptive Multi-Task Dual-Structured Learning with Its Application on Alzheimer's Disease Study. 47:1-47:16 - Yuanpeng Zhang

, Yizhang Jiang, Lianyong Qi, Md. Zakirul Alam Bhuiyan, Pengjiang Qian:
Epilepsy Diagnosis Using Multi-view & Multi-medoid Entropy-based Clustering with Privacy Protection. 48:1-48:21 - Jimmy Ming-Tai Wu

, Gautam Srivastava
, Jerry Chun-Wei Lin
, Qian Teng:
A Multi-Threshold Ant Colony System-based Sanitization Model in Shared Medical Environments. 49:1-49:26 - Bjarne Pfitzner

, Nico Steckhan, Bert Arnrich:
Federated Learning in a Medical Context: A Systematic Literature Review. 50:1-50:31 - Karam Bou Chaaya, Richard Chbeir, Mansour Naser Alraja

, Philippe Arnould, Charith Perera, Mahmoud Barhamgi, Djamal Benslimane:
δ-Risk: Toward Context-aware Multi-objective Privacy Management in Connected Environments. 51:1-51:31 - Abhinav Kumar

, Sanjay Kumar Singh
, K. Lakshmanan, Sonal Saxena, Sameer Shrivastava:
A Novel Cloud-Assisted Secure Deep Feature Classification Framework for Cancer Histopathology Images. 52:1-52:22
Volume 21, Number 3, August 2021
- Amit Kumar Singh, Q. M. Jonathan Wu, Ali Al-Haj, Calton Pu:

Introduction to the Special Section on Security and Privacy of Medical Data for Smart Healthcare. 53:1-53:4 - Mohammed Al-Khafajiy

, Safa Otoum
, Thar Baker
, Muhammad Asim
, Zakaria Maamar
, Moayad Aloqaily
, Mark Taylor, Martin Randles
:
Intelligent Control and Security of Fog Resources in Healthcare Systems via a Cognitive Fog Model. 54:1-54:23 - Zhihan Lv

, Francesco Piccialli
:
The Security of Medical Data on Internet Based on Differential Privacy Technology. 55:1-55:18 - Tao Wang, Zhigao Zheng

, Ali Kashif Bashir
, Alireza Jolfaei
, Yanyan Xu:
FinPrivacy: A Privacy-preserving Mechanism for Fingerprint Identification. 56:1-56:15 - Zijie Yue

, Shuai Ding
, Lei Zhao, Youtao Zhang, Zehong Cao
, Mohammad Tanveer
, Alireza Jolfaei
, Xi Zheng
:
Privacy-preserving Time-series Medical Images Analysis Using a Hybrid Deep Learning Framework. 57:1-57:21 - Kaijian Xia, Xiang Wu, Yaqing Mao, Huanhuan Wang:

Secure DNA Motif-Finding Method Based on Sampling Candidate Pruning. 58:1-58:19 - Bharat Richhariya

, Mohammad Tanveer:
An Efficient Angle-based Universum Least Squares Twin Support Vector Machine for Classification. 59:1-59:24 - Tae-Yeun Kim

, Sung-Hwan Kim
, Hoon Ko
:
Design and Implementation of BCI-based Intelligent Upper Limb Rehabilitation Robot System. 60:1-60:17 - Cong Peng

, Debiao He
, Jianhua Chen, Neeraj Kumar
, Muhammad Khurram Khan
:
EPRT: An Efficient Privacy-Preserving Medical Service Recommendation and Trust Discovery Scheme for eHealth System. 61:1-61:24 - Somanka Maiti

, Ashish Kumar, Smriti Jain, Gaurav Bhatnagar
:
A Novel Image Inpainting Framework Using Regression. 62:1-62:16 - Haolun Li, Chi-Man Pun

, Feng Xu, Longsheng Pan, Rui Zong, Hao Gao
, Huimin Lu:
A Hybrid Feature Selection Algorithm Based on a Discrete Artificial Bee Colony for Parkinson's Diagnosis. 63:1-63:22
- Wei Wei, Ammar Rayes, Wei Wang

, Yiduo Mei:
Special Section on AI-Empowered Internet of Things for Smart Cities. 64:1-64:3 - Mohamad Ali Mehrabi

, Naila Mukhtar, Alireza Jolfaei
:
Power Side-Channel Analysis of RNS GLV ECC Using Machine and Deep Learning Algorithms. 65:1-65:20 - Prateek Garg

, Anirudh Srinivasan Chakravarthy
, Murari Mandal
, Pratik Narang
, Vinay Chamola
, Mohsen Guizani:
ISDNet: AI-enabled Instance Segmentation of Aerial Scenes for Smart Cities. 66:1-66:18 - Guangwei Gao, Dong Zhu, Huimin Lu, Yi Yu, Heyou Chang, Dong Yue:

Robust Facial Image Super-Resolution by Kernel Locality-Constrained Coupled-Layer Regression. 67:1-67:15 - Francesco Piccialli

, Fabio Giampaolo
, Edoardo Prezioso, Danilo Crisci, Salvatore Cuomo
:
Predictive Analytics for Smart Parking: A Deep Learning Approach in Forecasting of IoT Data. 68:1-68:21 - Feiran Huang

, Chaozhuo Li, Boyu Gao, Yun Liu, Sattam Alotaibi, Hao Chen:
Deep Attentive Multimodal Network Representation Learning for Social Media Images. 69:1-69:17 - David K. Y. Chiu, Tao Xu, Iker Gondra

:
Random Graph-based Multiple Instance Learning for Structured IoT Smart City Applications. 70:1-70:17 - Liangtian Wan

, Mingyue Zhang, Lu Sun, Xianpeng Wang
:
Machine Learning Empowered IoT for Intelligent Vehicle Location in Smart Cities. 71:1-71:25 - Laha Ale

, Ning Zhang, Scott A. King
, Jose Guardiola
:
Spatio-temporal Bayesian Learning for Mobile Edge Computing Resource Planning in Smart Cities. 72:1-72:21 - Celestine Iwendi

, Saif Ur Rehman, Abdul Rehman Javed
, Suleman Khan, Gautam Srivastava
:
Sustainable Security for the Internet of Things Using Artificial Intelligence Architectures. 73:1-73:22 - He-Xuan Hu

, Wen-Jie Mao, Zhen-Zhou Lin, Qiang Hu, Ye Zhang
:
Multimodal Brain Tumor Segmentation Based on an Intelligent UNET-LSTM Algorithm in Smart Hospitals. 74:1-74:14
- Qianmu Li, Shunmei Meng, Xiaonan Sang, Hanrui Zhang, Shoujin Wang

, Ali Kashif Bashir
, Keping Yu
, Usman Tariq
:
Dynamic Scheduling Algorithm in Cyber Mimic Defense Architecture of Volunteer Computing. 75:1-75:33 - Wu Chen, Yong Yu, Keke Gai

, Jiamou Liu, Kim-Kwang Raymond Choo
:
Time-Efficient Ensemble Learning with Sample Exchange for Edge Computing. 76:1-76:17 - Mehedi Masud

, Parminder Singh
, Gurjot Singh Gaba, Avinash Kaur
, Roobaea Alroobaea
, Mubarak Alrashoud, Salman Ali AlQahtani
:
CROWD: Crow Search and Deep Learning based Feature Extractor for Classification of Parkinson's Disease. 77:1-77:18 - Shehzad Ashraf Chaudhry

, Azeem Irshad
, Khalid Yahya
, Neeraj Kumar
, Mamoun Alazab
, Yousaf Bin Zikria
:
Rotating behind Privacy: An Improved Lightweight Authentication Scheme for Cloud-based IoT Environment. 78:1-78:19 - Lucia Cascone

, Aniello Castiglione
, Michele Nappi, Fabio Narducci
, Ignazio Passero:
Waiting for Tactile: Robotic and Virtual Experiences in the Fog. 79:1-79:19 - Liang Tan, Na Shi

, Keping Yu
, Moayad Aloqaily
, Yaser Jararweh:
A Blockchain-empowered Access Control Framework for Smart Devices in Green Internet of Things. 80:1-80:20
Volume 21, Number 4, November 2021
- Safa Otoum

, Burak Kantarci, Hussein T. Mouftah:
A Comparative Study of AI-Based Intrusion Detection Techniques in Critical Infrastructures. 81:1-81:22 - Mojtaba Alizadeh, Mohammad Hesam Tadayon, Kouichi Sakurai, Hiroaki Anada, Alireza Jolfaei

:
A Secure Ticket-Based Authentication Mechanism for Proxy Mobile IPv6 Networks in Volunteer Computing. 82:1-82:16 - Zhihan Lv

, Dongliang Chen
, Amit Kumar Singh
:
Big Data Processing on Volunteer Computing. 83:1-83:20 - Bin Yuan

, Chen Lin, Deqing Zou, Laurence Tianruo Yang
, Hai Jin:
Detecting Malicious Switches for a Secure Software-defined Tactile Internet. 84:1-84:23 - Mehedi Masud

, M. Shamim Hossain, Hesham Alhumyani, Sultan S. Alshamrani, Omar Cheikhrouhou, Saleh Ibrahim
, Ghulam Muhammad, Amr Ezz El-Din Rashed, B. B. Gupta
:
Pre-Trained Convolutional Neural Networks for Breast Cancer Detection Using Ultrasound Images. 85:1-85:17 - Farooq Hoseiny, Sadoon Azizi, Mohammad Shojafar, Rahim Tafazolli

:
Joint QoS-aware and Cost-efficient Task Scheduling for Fog-cloud Resources in a Volunteer Computing System. 86:1-86:21 - Ismaeel Al Ridhawi

, Moayad Aloqaily
, Yaser Jararweh
:
An Incentive-based Mechanism for Volunteer Computing Using Blockchain. 87:1-87:22 - Di Wu, Wei Shi

, Xiangyu Ma
:
A Novel Real-time Anti-spam Framework. 88:1-88:27 - Jimmy Ming-Tai Wu, Qian Teng, Gautam Srivastava, Matin Pirouz, Jerry Chun-Wei Lin

:
The Efficient Mining of Skyline Patterns from a Volunteer Computing Network. 89:1-89:20 - Yan-Chun Chen, Ren-Hung Hwang

, Mu-Yen Chen
, Chih-Chin Wen, Chih-Ping Hsu:
Screw Slot Quality Inspection System Based on Tactile Network. 90:1-90:17
- Huimin Lu, Liao Wu

, Giancarlo Fortino, Schahram Dustdar
:
Introduction to the Special Section on Cognitive Robotics on 5G/6G Networks. 91e:1-91e:3 - Zhiyang Lin, Jihua Zhu, Zutao Jiang, Yujie Li, Yaochen Li, Zhongyu Li:

Merging Grid Maps in Diverse Resolutions by the Context-based Descriptor. 91:1-91:21 - Zhihan Lv

, Liang Qiao
, Qingjun Wang:
Cognitive Robotics on 5G Networks. 92:1-92:18 - Xin Jin, Yuwei Duan, Ying Zhang, Yating Huang, Mengdong Li, Ming Mao, Amit Kumar Singh

, Yujie Li:
Fast Search of Lightweight Block Cipher Primitives via Swarm-like Metaheuristics for Cyber Security. 93:1-93:15 - Rushi Lan, Jing Wang, Wenming Huang, Zhenrong Deng, Xiyan Sun, Zhuo Chen, Xiaonan Luo:

Chinese Emotional Dialogue Response Generation via Reinforcement Learning. 94:1-94:17 - Song Deng, Fulin Chen, Xia Dong, Guangwei Gao, Xindong Wu:

Short-term Load Forecasting by Using Improved GEP and Abnormal Load Recognition. 95:1-95:28 - Buddhadeb Pradhan, Nirmal Baran Hui

, Diptendu Sinha Roy, Gautam Srivastava, Jerry Chun-Wei Lin
:
Game-Theoretic Strategic Coordination and Navigation of Multiple Wheeled Robots. 96:1-96:15 - Min Chen, Wenjing Xiao, Long Hu, Yujun Ma

, Yin Zhang, Guangming Tao:
Cognitive Wearable Robotics for Autism Perception Enhancement. 97:1-97:16 - Wenpeng Lu

, Rui Yu, Shoujin Wang
, Can Wang
, Ping Jian, Heyan Huang:
Sentence Semantic Matching Based on 3D CNN for Human-Robot Language Interaction. 98:1-98:24
- Zhihan Lv

, Liang Qiao
, Amit Kumar Singh, Qingjun Wang:
AI-empowered IoT Security for Smart Cities. 99:1-99:21 - Ramesh Sekaran

, Rizwan Patan
, Fadi Al-Turjman
:
A Novel Approach for Efficient Packet Transmission in Volunteered Computing MANET. 100:1-100:15 - Huniya Shahid, Munam Ali Shah, Ahmad Almogren, Hasan Ali Khattak

, Ikram Ud Din
, Neeraj Kumar
, Carsten Maple:
Machine Learning-based Mist Computing Enabled Internet of Battlefield Things. 101:1-101:26 - Li Kuang, Jianbo Zheng

, Kemu Li, Honghao Gao:
Intelligent Traffic Signal Control Based on Reinforcement Learning with State Reduction for Smart Cities. 102:1-102:24 - Rafael Salema Marques, Gregory Epiphaniou, Haider M. Al-Khateeb

, Carsten Maple, Mohammad Hammoudeh
, Paulo André Lima de Castro
, Ali Dehghantanha, Kim-Kwang Raymond Choo
:
A Flow-based Multi-agent Data Exfiltration Detection Architecture for Ultra-low Latency Networks. 103:1-103:30 - Zhihan Lv

, Liang Qiao
, Sahil Verma
, Kavita
:
AI-enabled IoT-Edge Data Analytics for Connected Living. 104:1-104:20 - V. Gomathy

, K. Janarthanan, Fadi Al-Turjman
, Ramachandran Sitharthan, M. Rajesh
, Krishnasamy Vengatesan
, T. Priya Reshma:
Investigating the Spread of Coronavirus Disease via Edge-AI and Air Pollution Correlation. 105:1-105:10 - Wei Wang

, Junyang Chen, Yushu Zhang, Zhiguo Gong, Neeraj Kumar
, Wei Wei:
A Multi-graph Convolutional Network Framework for Tourist Flow Prediction. 106:1-106:13

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














