callback( { "result":{ "query":"data* in network*", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"272.56" }, "completions":{ "@total":"8", "@computed":"8", "@sent":"0" }, "hits":{ "@total":"17021", "@computed":"1000", "@sent":"1000", "@first":"0", "hit":[{ "@score":"4", "@id":"168", "info":{"authors":{"author":[{"@pid":"147/8841","text":"Dongxiao Liu"},{"@pid":"s/XueminShen","text":"Xuemin (Sherman) Shen"}]},"title":"Blockchain-Based Data Security in Heterogeneous Communications Networks","venue":"Wireless Networks","pages":"1-189","publisher":"Springer","year":"2024","type":"Books and Theses","access":"closed","key":"series/wn/LiuS24","doi":"10.1007/978-3-031-52477-6","ee":"https://doi.org/10.1007/978-3-031-52477-6","url":"https://dblp.org/rec/series/wn/LiuS24"}, "url":"URL#168" }, { "@score":"4", "@id":"876", "info":{"authors":{"author":[{"@pid":"262/0824","text":"Rahma Gantassi"},{"@pid":"256/1385","text":"Sana Messous"},{"@pid":"230/2661","text":"Zaki Masood"},{"@pid":"343/6530","text":"Quota Alief Sias"},{"@pid":"39/1018","text":"Yonghoon Choi"}]},"title":"Enhanced Network QoS in Large Scale and High Sensor Node Density Wireless Sensor Networks Using (IR-DV-Hop) Localization Algorithm and Mobile Data Collector (MDC).","venue":"IEEE Access","volume":"12","pages":"37957-37973","year":"2024","type":"Journal Articles","access":"open","key":"journals/access/GantassiMMSC24","doi":"10.1109/ACCESS.2024.3370432","ee":"https://doi.org/10.1109/ACCESS.2024.3370432","url":"https://dblp.org/rec/journals/access/GantassiMMSC24"}, "url":"URL#876" }, { "@score":"5", "@id":"920", "info":{"authors":{"author":[{"@pid":"54/157","text":"Panagiotis K. Gkonis"},{"@pid":"119/7755","text":"Nikolaos Nomikos"},{"@pid":"43/1775","text":"Panagiotis Trakadas"},{"@pid":"67/2236","text":"Lambros Sarakis"},{"@pid":"23/202","text":"George Xylouris"},{"@pid":"04/4820","text":"Xavi Masip-Bruin"},{"@pid":"30/8385","text":"Josep Martrat"}]},"title":"Leveraging Network Data Analytics Function and Machine Learning for Data Collection, Resource Optimization, Security and Privacy in 6G Networks.","venue":"IEEE Access","volume":"12","pages":"21320-21336","year":"2024","type":"Journal Articles","access":"open","key":"journals/access/GkonisNTSXMM24","doi":"10.1109/ACCESS.2024.3359992","ee":"https://doi.org/10.1109/ACCESS.2024.3359992","url":"https://dblp.org/rec/journals/access/GkonisNTSXMM24"}, "url":"URL#920" }, { "@score":"4", "@id":"940", "info":{"authors":{"author":[{"@pid":"318/4558","text":"Dalia Grendaite"},{"@pid":"249/9558","text":"Linas Petkevicius"}]},"title":"Identification of Algal Blooms in Lakes in the Baltic States Using Sentinel-2 Data and Artificial Neural Networks.","venue":"IEEE Access","volume":"12","pages":"27973-27988","year":"2024","type":"Journal Articles","access":"open","key":"journals/access/GrendaiteP24","doi":"10.1109/ACCESS.2024.3366491","ee":"https://doi.org/10.1109/ACCESS.2024.3366491","url":"https://dblp.org/rec/journals/access/GrendaiteP24"}, "url":"URL#940" }, { "@score":"3", "@id":"1257", "info":{"authors":{"author":[{"@pid":"271/0227","text":"Osama Ahmed Khashan"},{"@pid":"225/2684","text":"Nour Mahmoud Khafajah"},{"@pid":"215/5147","text":"Waleed Alomoush"},{"@pid":"268/9537","text":"Mohammad Alshinwan"}]},"title":"Innovative Energy-Efficient Proxy Re-Encryption for Secure Data Exchange in Wireless Sensor Networks.","venue":"IEEE Access","volume":"12","pages":"23290-23304","year":"2024","type":"Journal Articles","access":"open","key":"journals/access/KhashanKAA24","doi":"10.1109/ACCESS.2024.3360488","ee":"https://doi.org/10.1109/ACCESS.2024.3360488","url":"https://dblp.org/rec/journals/access/KhashanKAA24"}, "url":"URL#1257" }, { "@score":"3", "@id":"1355", "info":{"authors":{"author":[{"@pid":"215/3028","text":"Jungmin Kwon"},{"@pid":"97/758","text":"Hyunggon Park"}]},"title":"Data Dissemination Framework Using Low-Rank Approximation in Edge Networks.","venue":"IEEE Access","volume":"12","pages":"1266-1279","year":"2024","type":"Journal Articles","access":"open","key":"journals/access/KwonP24","doi":"10.1109/ACCESS.2023.3347928","ee":"https://doi.org/10.1109/ACCESS.2023.3347928","url":"https://dblp.org/rec/journals/access/KwonP24"}, "url":"URL#1355" }, { "@score":"3", "@id":"2032", "info":{"authors":{"author":[{"@pid":"259/1353","text":"Eldar Sabanovic"},{"@pid":"306/3195","text":"Paulius Kojis"},{"@pid":"143/2881","text":"Valentin G. Ivanov"},{"@pid":"242/3106","text":"Miguel Dhaens"},{"@pid":"259/1057","text":"Viktor Skrickij"}]},"title":"Development and Evaluation of Artificial Neural Networks for Real-World Data-Driven Virtual Sensors in Vehicle Suspension.","venue":"IEEE Access","volume":"12","pages":"13183-13195","year":"2024","type":"Journal Articles","access":"open","key":"journals/access/SabanovicKIDS24","doi":"10.1109/ACCESS.2024.3356715","ee":"https://doi.org/10.1109/ACCESS.2024.3356715","url":"https://dblp.org/rec/journals/access/SabanovicKIDS24"}, "url":"URL#2032" }, { "@score":"3", "@id":"2709", "info":{"authors":{"author":[{"@pid":"17/4932","text":"Zheng Zhou"},{"@pid":"16/3621-2","text":"Juan Liu 0002"},{"@pid":"282/9595","text":"Chixiong Mao"}]},"title":"Age of Information Oriented Data Collection via Energy-Constrained UAVs in Wireless Sensor Networks.","venue":"IEEE Access","volume":"12","pages":"11897-11908","year":"2024","type":"Journal Articles","access":"open","key":"journals/access/ZhouLM24","doi":"10.1109/ACCESS.2024.3356175","ee":"https://doi.org/10.1109/ACCESS.2024.3356175","url":"https://dblp.org/rec/journals/access/ZhouLM24"}, "url":"URL#2709" }, { "@score":"3", "@id":"2814", "info":{"authors":{"author":[{"@pid":"175/3324","text":"Hao Chen"},{"@pid":"98/2482","text":"Hua Qin"},{"@pid":"83/6700","text":"Gelan Yang"},{"@pid":"58/2119","text":"Yang Peng"}]},"title":"HDS: Heterogeneity-aware dual-interface scheduling for energy-efficient delay-constrained data collection in IoT.","venue":"Ad Hoc Networks","volume":"155","pages":"103405","year":"2024","type":"Journal Articles","access":"closed","key":"journals/adhoc/ChenQYP24","doi":"10.1016/J.ADHOC.2024.103405","ee":"https://doi.org/10.1016/j.adhoc.2024.103405","url":"https://dblp.org/rec/journals/adhoc/ChenQYP24"}, "url":"URL#2814" }, { "@score":"3", "@id":"2883", "info":{"authors":{"author":[{"@pid":"365/9072","text":"Adel Salah Ould Khaoua"},{"@pid":"127/3687","text":"Abdelmadjid Boukra"},{"@pid":"166/2185","text":"Fella Bey"}]},"title":"On estimating the interest satisfaction ratio in IEEE 802.15.4-based named-data networks.","venue":"Ann. des Télécommunications","volume":"79","number":"1","pages":"111-130","year":"2024","type":"Journal Articles","access":"closed","key":"journals/adt/KhaouaBB24","doi":"10.1007/S12243-023-00983-6","ee":"https://doi.org/10.1007/s12243-023-00983-6","url":"https://dblp.org/rec/journals/adt/KhaouaBB24"}, "url":"URL#2883" }, { "@score":"4", "@id":"3640", "info":{"authors":{"author":[{"@pid":"30/10768","text":"Cong Wu"},{"@pid":"92/5798","text":"Hongxin Li"},{"@pid":"300/2450","text":"Jiajia Ren"},{"@pid":"293/4764","text":"K. Marimuthu"},{"@pid":"214/3701","text":"Priyan Malarvizhi Kumar"}]},"title":"Correction to: Artificial neural network based high dimensional data visualization technique for interactive data exploration in E-commerce.","venue":"Ann. Oper. Res.","volume":"332","number":"1","pages":"1197-1198","year":"2024","type":"Journal Articles","access":"closed","key":"journals/anor/WuLRMK24","doi":"10.1007/S10479-021-04479-1","ee":"https://doi.org/10.1007/s10479-021-04479-1","url":"https://dblp.org/rec/journals/anor/WuLRMK24"}, "url":"URL#3640" }, { "@score":"3", "@id":"4067", "info":{"authors":{"author":[{"@pid":"255/5703","text":"S. Jerald Nirmal Kumar"},{"@pid":"204/0271","text":"M. M. Gowthul Alam"},{"@pid":"328/8967","text":"Michael Raj TF"},{"@pid":"328/9012","text":"Uma Mageswari R"}]},"title":"Golden Search Optimization based adaptive and diagonal kernel convolution neural network for disease prediction and securing IoT data in cloud.","venue":"Appl. Soft Comput.","volume":"151","pages":"111137","year":"2024","type":"Journal Articles","access":"closed","key":"journals/asc/KumarATR24","doi":"10.1016/J.ASOC.2023.111137","ee":"https://doi.org/10.1016/j.asoc.2023.111137","url":"https://dblp.org/rec/journals/asc/KumarATR24"}, "url":"URL#4067" }, { "@score":"3", "@id":"4781", "info":{"authors":{"author":[{"@pid":"369/7020","text":"Diego Mañanes"},{"@pid":"369/6322","text":"Inés Rivero-García"},{"@pid":"353/5871","text":"Carlos Relaño"},{"@pid":"13/4980","text":"Miguel Torres"},{"@pid":"31/7522","text":"David Sancho"},{"@pid":"136/1112","text":"Daniel Jimenez-Carretero"},{"@pid":"134/3640","text":"Carlos Torroja Fungairino"},{"@pid":"06/4013","text":"Fátima Sánchez-Cabo"}]},"title":"SpatialDDLS: an R package to deconvolute spatial transcriptomics data using neural networks.","venue":"Bioinform.","volume":"40","number":"2","year":"2024","type":"Journal Articles","access":"closed","key":"journals/bioinformatics/MananesRRTSJFS24","doi":"10.1093/BIOINFORMATICS/BTAE072","ee":"https://doi.org/10.1093/bioinformatics/btae072","url":"https://dblp.org/rec/journals/bioinformatics/MananesRRTSJFS24"}, "url":"URL#4781" }, { "@score":"3", "@id":"5950", "info":{"authors":{"author":[{"@pid":"134/9861","text":"Xiaoke Hao"},{"@pid":"274/2637","text":"Jiawang Li"},{"@pid":"70/6082","text":"Mingming Ma"},{"@pid":"00/1015-1","text":"Jing Qin 0001"},{"@pid":"03/2763","text":"Daoqiang Zhang"},{"@pid":"77/1318","text":"Feng Liu"}]},"title":"Hypergraph convolutional network for longitudinal data analysis in Alzheimer's disease.","venue":"Comput. Biol. Medicine","volume":"168","pages":"107765","year":"2024","type":"Journal Articles","access":"closed","key":"journals/cbm/HaoLMQZL24","doi":"10.1016/J.COMPBIOMED.2023.107765","ee":"https://doi.org/10.1016/j.compbiomed.2023.107765","url":"https://dblp.org/rec/journals/cbm/HaoLMQZL24"}, "url":"URL#5950" }, { "@score":"3", "@id":"6079", "info":{"authors":{"author":[{"@pid":"262/9068","text":"Alireza Rafiei"},{"@pid":"211/4282","text":"Milad Ghiasi Rad"},{"@pid":"352/5677","text":"Andrea Sikora"},{"@pid":"05/9204","text":"Rishikesan Kamaleswaran"}]},"title":"Improving mixed-integer temporal modeling by generating synthetic data using conditional generative adversarial networks: A case study of fluid overload prediction in the intensive care unit.","venue":"Comput. Biol. Medicine","volume":"168","pages":"107749","year":"2024","type":"Journal Articles","access":"closed","key":"journals/cbm/RafieiRSK24","doi":"10.1016/J.COMPBIOMED.2023.107749","ee":"https://doi.org/10.1016/j.compbiomed.2023.107749","url":"https://dblp.org/rec/journals/cbm/RafieiRSK24"}, "url":"URL#6079" }, { "@score":"3", "@id":"6150", "info":{"authors":{"author":[{"@pid":"307/5997","text":"Xutao Weng"},{"@pid":"09/4495","text":"Hong Song"},{"@pid":"91/10638","text":"Yucong Lin"},{"@pid":"16/8675","text":"You Wu"},{"@pid":"87/1222","text":"Xi Zhang"},{"@pid":"41/1201","text":"Bowen Liu"},{"@pid":"181/2854","text":"Jian Yang"}]},"title":"A joint learning method for incomplete and imbalanced data in electronic health record based on generative adversarial networks.","venue":"Comput. Biol. Medicine","volume":"168","pages":"107687","year":"2024","type":"Journal Articles","access":"closed","key":"journals/cbm/WengSLWZLY24","doi":"10.1016/J.COMPBIOMED.2023.107687","ee":"https://doi.org/10.1016/j.compbiomed.2023.107687","url":"https://dblp.org/rec/journals/cbm/WengSLWZLY24"}, "url":"URL#6150" }, { "@score":"3", "@id":"6721", "info":{"authors":{"author":[{"@pid":"331/3477","text":"Sunita S. Patil"},{"@pid":"66/10016","text":"Thangamuthu Senthil Kumaran"}]},"title":"Fuzzy based rendezvous points selection for mobile data gathering in wireless sensor network.","venue":"Comput. Intell.","volume":"40","number":"1","year":"2024","type":"Journal Articles","access":"closed","key":"journals/ci/PatilK24","doi":"10.1111/COIN.12486","ee":"https://doi.org/10.1111/coin.12486","url":"https://dblp.org/rec/journals/ci/PatilK24"}, "url":"URL#6721" }, { "@score":"3", "@id":"6884", "info":{"authors":{"author":[{"@pid":"286/9688","text":"Guanqiao Qu"},{"@pid":"123/5600","text":"Chenguang He"},{"@pid":"11/1394-12","text":"Qian Chen 0012"},{"@pid":"11/7195-1","text":"Weixiao Meng 0001"}]},"title":"Tactical Data-Oriented Decentralized Communication Scheme in Vehicle-Assisted Networks: Challenges and Solutions.","venue":"IEEE Commun. Mag.","volume":"62","number":"1","pages":"56-61","year":"2024","type":"Journal Articles","access":"closed","key":"journals/cm/QuHCM24","doi":"10.1109/MCOM.001.2200793","ee":"https://doi.org/10.1109/MCOM.001.2200793","url":"https://dblp.org/rec/journals/cm/QuHCM24"}, "url":"URL#6884" }, { "@score":"4", "@id":"7085", "info":{"authors":{"author":[{"@pid":"94/8851","text":"Roberto Doriguzzi Corin"},{"@pid":"164/7946","text":"Luis Augusto Dias Knob"},{"@pid":"352/3459","text":"Luca Mendozzi"},{"@pid":"88/10062","text":"Domenico Siracusa"},{"@pid":"146/8141","text":"Marco Savi"}]},"title":"Introducing packet-level analysis in programmable data planes to advance Network Intrusion Detection.","venue":"Comput. Networks","volume":"239","pages":"110162","year":"2024","type":"Journal Articles","access":"closed","key":"journals/cn/CorinKMSS24","doi":"10.1016/J.COMNET.2023.110162","ee":"https://doi.org/10.1016/j.comnet.2023.110162","url":"https://dblp.org/rec/journals/cn/CorinKMSS24"}, "url":"URL#7085" }, { "@score":"3", "@id":"7522", "info":{"authors":{"author":[{"@pid":"323/3831","text":"Vladimir V. Fedorenko"},{"@pid":"348/8162","text":"Irina Samoylenko"},{"@pid":"348/8178","text":"Vladimir Samoylenko"}]},"title":"Fragmentation of data packets in wireless sensor network with variable temperature and channel conditions.","venue":"Comput. Commun.","volume":"214","pages":"201-214","year":"2024","type":"Journal Articles","access":"closed","key":"journals/comcom/FedorenkoSS24","doi":"10.1016/J.COMCOM.2023.12.001","ee":"https://doi.org/10.1016/j.comcom.2023.12.001","url":"https://dblp.org/rec/journals/comcom/FedorenkoSS24"}, "url":"URL#7522" }, { "@score":"3", "@id":"7711", "info":{"authors":{"author":{"@pid":"369/6152","text":"Complexity"}},"title":"Retracted: Adoption of Convolutional Neural Network Algorithm Combined with Augmented Reality in Building Data Visualization and Intelligent Detection.","venue":"Complex.","volume":"2024","pages":"9810679:1-9810679:1","year":"2024","type":"Journal Articles","access":"open","key":"journals/complexity/Complexity24j","doi":"10.1155/2024/9810679","ee":"https://doi.org/10.1155/2024/9810679","url":"https://dblp.org/rec/journals/complexity/Complexity24j"}, "url":"URL#7711" }, { "@score":"4", "@id":"8015", "info":{"authors":{"author":[{"@pid":"278/1431","text":"Gopinathan Rajeswari"},{"@pid":"331/4809","text":"R. Arthi"},{"@pid":"46/2951","text":"Krishnan Murugan"}]},"title":"Nature-inspired donkey and smuggler algorithm for optimal data gathering in partitioned wireless sensor networks for restoring network connectivity.","venue":"Computing","volume":"106","number":"3","pages":"759-787","year":"2024","type":"Journal Articles","access":"closed","key":"journals/computing/RajeswariAM24","doi":"10.1007/S00607-023-01251-0","ee":"https://doi.org/10.1007/s00607-023-01251-0","url":"https://dblp.org/rec/journals/computing/RajeswariAM24"}, "url":"URL#8015" }, { "@score":"4", "@id":"8116", "info":{"authors":{"author":[{"@pid":"367/8407","text":"Insozhan Nagasundharamoorthi"},{"@pid":"367/8686","text":"Prabhu Venkatesan"},{"@pid":"260/1688","text":"Parthasarathy Velusamy"}]},"title":"Hash message authentication codes for securing data in wireless body area networks.","venue":"Concurr. Comput. Pract. Exp.","volume":"36","number":"5","year":"2024","type":"Journal Articles","access":"closed","key":"journals/concurrency/NagasundharamoorthiVV24","doi":"10.1002/CPE.7934","ee":"https://doi.org/10.1002/cpe.7934","url":"https://dblp.org/rec/journals/concurrency/NagasundharamoorthiVV24"}, "url":"URL#8116" }, { "@score":"3", "@id":"8437", "info":{"authors":{"author":[{"@pid":"293/5533","text":"Jiayi Deng"},{"@pid":"187/4084","text":"Danyang Huang"},{"@pid":"89/5503","text":"Yi Ding"},{"@pid":"160/9444","text":"Yingqiu Zhu"},{"@pid":"15/8051","text":"Bingyi Jing"},{"@pid":"36/2259","text":"Bo Zhang"}]},"title":"Subsampling spectral clustering for stochastic block models in large-scale networks.","venue":"Comput. Stat. Data Anal.","volume":"189","pages":"107835","year":"2024","type":"Journal Articles","access":"closed","key":"journals/csda/DengHDZJZ24","doi":"10.1016/J.CSDA.2023.107835","ee":"https://doi.org/10.1016/j.csda.2023.107835","url":"https://dblp.org/rec/journals/csda/DengHDZJZ24"}, "url":"URL#8437" }, { "@score":"3", "@id":"9233", "info":{"authors":{"author":[{"@pid":"295/8613","text":"Hélder Alves"},{"@pid":"01/6920","text":"Paula Brito"},{"@pid":"02/378-1","text":"Pedro Campos 0001"}]},"title":"Community detection in interval-weighted networks.","venue":"Data Min. Knowl. Discov.","volume":"38","number":"2","pages":"653-698","year":"2024","type":"Journal Articles","access":"closed","key":"journals/datamine/AlvesB024","doi":"10.1007/S10618-023-00975-Z","ee":"https://doi.org/10.1007/s10618-023-00975-z","url":"https://dblp.org/rec/journals/datamine/AlvesB024"}, "url":"URL#9233" }, { "@score":"3", "@id":"10020", "info":{"authors":{"author":[{"@pid":"365/1668","text":"Faxing Yu"},{"@pid":"155/7093","text":"Chunna Li"},{"@pid":"11/9843","text":"Yuanhai Shao 0001"}]},"title":"DNTC: An unsupervised Deep Networks for Temperature Compensation in non-stationary data.","venue":"Eng. Appl. Artif. Intell.","volume":"127","number":"Part B","pages":"107319","year":"2024","type":"Journal Articles","access":"closed","key":"journals/eaai/YuLS24","doi":"10.1016/J.ENGAPPAI.2023.107319","ee":"https://doi.org/10.1016/j.engappai.2023.107319","url":"https://dblp.org/rec/journals/eaai/YuLS24"}, "url":"URL#10020" }, { "@score":"3", "@id":"11482", "info":{"authors":{"author":[{"@pid":"07/6956","text":"Xueping Li"},{"@pid":"361/5279","text":"Linbo Hu"},{"@pid":"91/7802-3","text":"Zhigang Lu 0003"}]},"title":"Detection of false data injection attack in power grid based on spatial-temporal transformer network.","venue":"Expert Syst. Appl.","volume":"238","number":"Part A","pages":"121706","year":"2024","type":"Journal Articles","access":"closed","key":"journals/eswa/LiHL24","doi":"10.1016/J.ESWA.2023.121706","ee":"https://doi.org/10.1016/j.eswa.2023.121706","url":"https://dblp.org/rec/journals/eswa/LiHL24"}, "url":"URL#11482" }, { "@score":"3", "@id":"11766", "info":{"authors":{"author":[{"@pid":"324/8231","text":"P. V. Sabique"},{"@pid":"361/5302","text":"Ganesh Pasupathy"},{"@pid":"361/5459","text":"Sivaramakrishnan Ramachandran"}]},"title":"A data driven recurrent neural network approach for reproduction of variable visuo-haptic force feedback in surgical tool insertion.","venue":"Expert Syst. Appl.","volume":"238","number":"Part E","pages":"122221","year":"2024","type":"Journal Articles","access":"closed","key":"journals/eswa/SabiquePR24","doi":"10.1016/J.ESWA.2023.122221","ee":"https://doi.org/10.1016/j.eswa.2023.122221","url":"https://dblp.org/rec/journals/eswa/SabiquePR24"}, "url":"URL#11766" }, { "@score":"3", "@id":"11968", "info":{"authors":{"author":[{"@pid":"99/6515","text":"Gang Wu"},{"@pid":"48/5388-1","text":"Liang Hu 0001"},{"@pid":"360/0966","text":"Xuelin Mao"},{"@pid":"237/8120","text":"Yongheng Xing"},{"@pid":"90/4225-14","text":"Feng Wang 0014"}]},"title":"A data fusion framework based on heterogeneous information network embedding for trigger-action programming in IoT.","venue":"Expert Syst. Appl.","volume":"235","pages":"121065","year":"2024","type":"Journal Articles","access":"closed","key":"journals/eswa/WuHMXW24","doi":"10.1016/J.ESWA.2023.121065","ee":"https://doi.org/10.1016/j.eswa.2023.121065","url":"https://dblp.org/rec/journals/eswa/WuHMXW24"}, "url":"URL#11968" }, { "@score":"3", "@id":"12280", "info":{"authors":{"author":[{"@pid":"226/3684","text":"Yuzi Yi"},{"@pid":"120/1300","text":"Nafei Zhu"},{"@pid":"21/6810","text":"Jingsha He"},{"@pid":"15/2870","text":"Anca Delia Jurcut"},{"@pid":"288/3958","text":"Xiangjun Ma"},{"@pid":"343/7475","text":"Yehong Luo"}]},"title":"A privacy-sensitive data identification model in online social networks.","venue":"Trans. Emerg. Telecommun. Technol.","volume":"35","number":"1","year":"2024","type":"Journal Articles","access":"closed","key":"journals/ett/YiZHJML24","doi":"10.1002/ETT.4876","ee":"https://doi.org/10.1002/ett.4876","url":"https://dblp.org/rec/journals/ett/YiZHJML24"}, "url":"URL#12280" }, { "@score":"3", "@id":"12670", "info":{"authors":{"author":{"@pid":"32/1303","text":"Bartlomiej Placzek"}},"title":"Prediction-based data reduction with dynamic target node selection in IoT sensor networks.","venue":"Future Gener. Comput. Syst.","volume":"152","pages":"225-238","year":"2024","type":"Journal Articles","access":"closed","key":"journals/fgcs/Placzek24","doi":"10.1016/J.FUTURE.2023.11.007","ee":"https://doi.org/10.1016/j.future.2023.11.007","url":"https://dblp.org/rec/journals/fgcs/Placzek24"}, "url":"URL#12670" }, { "@score":"4", "@id":"12714", "info":{"authors":{"author":[{"@pid":"360/5436","text":"Mohammed Bellaj"},{"@pid":"27/9057","text":"Najib Naja"},{"@pid":"25/9057","text":"Abdellah Jamali"}]},"title":"Distributed Mobility Management Support for Low-Latency Data Delivery in Named Data Networking for UAVs.","venue":"Future Internet","volume":"16","number":"2","pages":"57","year":"2024","type":"Journal Articles","access":"open","key":"journals/fi/BellajNJ24","doi":"10.3390/FI16020057","ee":"https://doi.org/10.3390/fi16020057","url":"https://dblp.org/rec/journals/fi/BellajNJ24"}, "url":"URL#12714" }, { "@score":"3", "@id":"13471", "info":{"authors":{"author":[{"@pid":"14/6508","text":"Jing Jia"},{"@pid":"369/9176","text":"Jing Hua"}]},"title":"Dynamic SFC placement with parallelized VNFs in Data Center Networks: A DRL-based approach.","venue":"ICT Express","volume":"10","number":"1","pages":"104-110","year":"2024","type":"Journal Articles","access":"open","key":"journals/ict-express/JiaH24","doi":"10.1016/J.ICTE.2023.07.005","ee":"https://doi.org/10.1016/j.icte.2023.07.005","url":"https://dblp.org/rec/journals/ict-express/JiaH24"}, "url":"URL#13471" }, { "@score":"3", "@id":"14136", "info":{"authors":{"author":[{"@pid":"139/3145","text":"Abdulmohsen Almalawi"},{"@pid":"368/5618","text":"Shabbir Hassan"},{"@pid":"130/7854","text":"Adil Fahad"},{"@pid":"24/10544","text":"Asif Irshad Khan"}]},"title":"A Hybrid Cryptographic Mechanism for Secure Data Transmission in Edge AI Networks.","venue":"Int. J. Comput. Intell. Syst.","volume":"17","number":"1","pages":"24","year":"2024","type":"Journal Articles","access":"open","key":"journals/ijcisys/AlmalawiHFK24","doi":"10.1007/S44196-024-00417-8","ee":"https://doi.org/10.1007/s44196-024-00417-8","url":"https://dblp.org/rec/journals/ijcisys/AlmalawiHFK24"}, "url":"URL#14136" }, { "@score":"3", "@id":"14174", "info":{"authors":{"author":[{"@pid":"50/671","text":"Yu Zhang"},{"@pid":"11/4684","text":"Ningjiang Chen"},{"@pid":"135/8812","text":"Siyu Yu"},{"@pid":"221/5928","text":"Liangqing Hu"}]},"title":"Transient Data Caching Based on Maximum Entropy Actor-Critic in Internet-of-Things Networks.","venue":"Int. J. Comput. Intell. Syst.","volume":"17","number":"1","pages":"20","year":"2024","type":"Journal Articles","access":"open","key":"journals/ijcisys/ZhangCYH24","doi":"10.1007/S44196-023-00377-5","ee":"https://doi.org/10.1007/s44196-023-00377-5","url":"https://dblp.org/rec/journals/ijcisys/ZhangCYH24"}, "url":"URL#14174" }, { "@score":"3", "@id":"15838", "info":{"authors":{"author":[{"@pid":"370/6147","text":"Nischay Kumar Hegde"},{"@pid":"173/0651","text":"Linganagouda Kulkarni"}]},"title":"Data survivability in unattended wireless sensor networks with optimal clustering and hybrid encryption algorithm.","venue":"Int. J. Wirel. Mob. Comput.","volume":"26","number":"2","pages":"137-156","year":"2024","type":"Journal Articles","access":"closed","key":"journals/ijwmc/HegdeK24","doi":"10.1504/IJWMC.2024.137176","ee":"https://doi.org/10.1504/IJWMC.2024.137176","url":"https://dblp.org/rec/journals/ijwmc/HegdeK24"}, "url":"URL#15838" }, { "@score":"3", "@id":"16157", "info":{"authors":{"author":[{"@pid":"30/9639-3","text":"Weiwei Jiang 0003"},{"@pid":"257/5633","text":"Haoyu Han"},{"@pid":"06/6785","text":"Yang Zhang"},{"@pid":"219/8608","text":"Jianbin Mu"}]},"title":"Federated split learning for sequential data in satellite-terrestrial integrated networks.","venue":"Inf. Fusion","volume":"103","pages":"102141","year":"2024","type":"Journal Articles","access":"closed","key":"journals/inffus/JiangHZM24","doi":"10.1016/J.INFFUS.2023.102141","ee":"https://doi.org/10.1016/j.inffus.2023.102141","url":"https://dblp.org/rec/journals/inffus/JiangHZM24"}, "url":"URL#16157" }, { "@score":"3", "@id":"16328", "info":{"authors":{"author":{"@pid":"307/5502","text":"Niki Hrovatin"}},"title":"Enabling Decentralized Privacy Preserving Data Processing in Sensor Networks.","venue":"Informatica","volume":"48","number":"1","year":"2024","type":"Journal Articles","access":"open","key":"journals/informaticaSI/Hrovatin24","doi":"10.31449/INF.V48I1.5739","ee":"https://doi.org/10.31449/inf.v48i1.5739","url":"https://dblp.org/rec/journals/informaticaSI/Hrovatin24"}, "url":"URL#16328" }, { "@score":"3", "@id":"16657", "info":{"authors":{"author":[{"@pid":"236/1037","text":"Sedat Bilgili"},{"@pid":"292/8256","text":"Alper Kamil Demir"},{"@pid":"99/4251","text":"Shahid Alam"}]},"title":"IfNot: An approach towards mitigating interest flooding attacks in Named Data Networking of Things.","venue":"Internet Things","volume":"25","pages":"101076","year":"2024","type":"Journal Articles","access":"closed","key":"journals/iot/BilgiliDA24","doi":"10.1016/J.IOT.2024.101076","ee":"https://doi.org/10.1016/j.iot.2024.101076","url":"https://dblp.org/rec/journals/iot/BilgiliDA24"}, "url":"URL#16657" }, { "@score":"3", "@id":"16818", "info":{"authors":{"author":[{"@pid":"334/5178","text":"Aliia Beishenalieva"},{"@pid":"54/1969","text":"Sang-Jo Yoo"}]},"title":"UAV Path Planning for Data Gathering in Wireless Sensor Networks: Spatial and Temporal Substate-Based Q-Learning.","venue":"IEEE Internet Things J.","volume":"11","number":"6","pages":"9572-9586","year":"2024","type":"Journal Articles","access":"closed","key":"journals/iotj/BeishenalievaY24","doi":"10.1109/JIOT.2023.3323921","ee":"https://doi.org/10.1109/JIOT.2023.3323921","url":"https://dblp.org/rec/journals/iotj/BeishenalievaY24"}, "url":"URL#16818" }, { "@score":"3", "@id":"16871", "info":{"authors":{"author":[{"@pid":"161/2611","text":"Chang-Jae Chun"},{"@pid":"93/376","text":"Cheol Jeong"}]},"title":"Data-Driven Resource Allocation for Deep Learning in IoT Networks.","venue":"IEEE Internet Things J.","volume":"11","number":"2","pages":"2082-2096","year":"2024","type":"Journal Articles","access":"closed","key":"journals/iotj/ChunJ24","doi":"10.1109/JIOT.2023.3293206","ee":"https://doi.org/10.1109/JIOT.2023.3293206","url":"https://dblp.org/rec/journals/iotj/ChunJ24"}, "url":"URL#16871" }, { "@score":"3", "@id":"16881", "info":{"authors":{"author":[{"@pid":"156/7867","text":"Murat Dener"},{"@pid":"365/6900","text":"Celil Okur"},{"@pid":"309/9169","text":"Samed Al"},{"@pid":"163/9217","text":"Abdullah Orman"}]},"title":"WSN-BFSF: A New Data Set for Attacks Detection in Wireless Sensor Networks.","venue":"IEEE Internet Things J.","volume":"11","number":"2","pages":"2109-2125","year":"2024","type":"Journal Articles","access":"closed","key":"journals/iotj/DenerOAO24","doi":"10.1109/JIOT.2023.3292209","ee":"https://doi.org/10.1109/JIOT.2023.3292209","url":"https://dblp.org/rec/journals/iotj/DenerOAO24"}, "url":"URL#16881" }, { "@score":"3", "@id":"17043", "info":{"authors":{"author":[{"@pid":"223/9751","text":"Kalaivanan Karunanithy"},{"@pid":"223/9769","text":"Bhanumathi Velusamy"},{"@pid":"367/7664","text":"Sivasankari Krishnakumar"},{"@pid":"03/6222","text":"V. Jawahar Senthilkumar"}]},"title":"Energy-Efficient Data Routing in Landslide-Prone Area Using Wireless Sensor Networks With Drone.","venue":"IEEE Internet Things J.","volume":"11","number":"3","pages":"4497-4507","year":"2024","type":"Journal Articles","access":"closed","key":"journals/iotj/KarunanithyVKS24","doi":"10.1109/JIOT.2023.3301955","ee":"https://doi.org/10.1109/JIOT.2023.3301955","url":"https://dblp.org/rec/journals/iotj/KarunanithyVKS24"}, "url":"URL#17043" }, { "@score":"3", "@id":"17248", "info":{"authors":{"author":[{"@pid":"70/8538","text":"Bin Qu"},{"@pid":"124/3254","text":"De Li"},{"@pid":"81/4000","text":"Xianxian Li"}]},"title":"Optimizing Dynamic Cache Allocation in Vehicular Edge Networks: A Method Combining Multisource Data Prediction and Deep Reinforcement Learning.","venue":"IEEE Internet Things J.","volume":"11","number":"6","pages":"9955-9968","year":"2024","type":"Journal Articles","access":"closed","key":"journals/iotj/QuLL24","doi":"10.1109/JIOT.2023.3324381","ee":"https://doi.org/10.1109/JIOT.2023.3324381","url":"https://dblp.org/rec/journals/iotj/QuLL24"}, "url":"URL#17248" }, { "@score":"3", "@id":"17255", "info":{"authors":{"author":[{"@pid":"34/2753","text":"Yanli Ren"},{"@pid":"346/4765","text":"Cien Chen"},{"@pid":"249/5391","text":"Mingqi Hu"},{"@pid":"44/2296","text":"Guorui Feng"},{"@pid":"01/3442-1","text":"Xinpeng Zhang 0001"}]},"title":"BFDAC: A Blockchain-Based and Fog-Computing-Assisted Data Access Control Scheme in Vehicular Social Networks.","venue":"IEEE Internet Things J.","volume":"11","number":"2","pages":"3510-3523","year":"2024","type":"Journal Articles","access":"closed","key":"journals/iotj/RenCHFZ24","doi":"10.1109/JIOT.2023.3296906","ee":"https://doi.org/10.1109/JIOT.2023.3296906","url":"https://dblp.org/rec/journals/iotj/RenCHFZ24"}, "url":"URL#17255" }, { "@score":"3", "@id":"17311", "info":{"authors":{"author":[{"@pid":"368/9790","text":"Qingming Sun"},{"@pid":"122/5743","text":"Jinping Niu"},{"@pid":"20/4512","text":"Xiangwei Zhou"},{"@pid":"87/7054","text":"Ting Jin"},{"@pid":"64/377","text":"Yanyan Li"}]},"title":"AoI and Data Rate Optimization in Aerial IRS-Assisted IoT Networks.","venue":"IEEE Internet Things J.","volume":"11","number":"4","pages":"6481-6493","year":"2024","type":"Journal Articles","access":"closed","key":"journals/iotj/SunNZJL24","doi":"10.1109/JIOT.2023.3315054","ee":"https://doi.org/10.1109/JIOT.2023.3315054","url":"https://dblp.org/rec/journals/iotj/SunNZJL24"}, "url":"URL#17311" }, { "@score":"3", "@id":"17412", "info":{"authors":{"author":[{"@pid":"77/1243","text":"Wei Xia"},{"@pid":"355/6064","text":"Deming He"},{"@pid":"219/3070","text":"Lisha Yu"}]},"title":"Locational Detection of False Data Injection Attacks in Smart Grids: A Graph Convolutional Attention Network Approach.","venue":"IEEE Internet Things J.","volume":"11","number":"6","pages":"9324-9337","year":"2024","type":"Journal Articles","access":"closed","key":"journals/iotj/XiaHY24","doi":"10.1109/JIOT.2023.3323565","ee":"https://doi.org/10.1109/JIOT.2023.3323565","url":"https://dblp.org/rec/journals/iotj/XiaHY24"}, "url":"URL#17412" }, { "@score":"4", "@id":"18367", "info":{"authors":{"author":{"@pid":"261/7124","text":"Huilong Jiang"}},"title":"Exploration on load balancing data aggregation algorithm in wireless sensor network based on big data artificial intelligence.","venue":"Internet Technol. Lett.","volume":"7","number":"2","year":"2024","type":"Journal Articles","access":"closed","key":"journals/itl/Jiang24","doi":"10.1002/ITL2.488","ee":"https://doi.org/10.1002/itl2.488","url":"https://dblp.org/rec/journals/itl/Jiang24"}, "url":"URL#18367" }, { "@score":"3", "@id":"18631", "info":{"authors":{"author":[{"@pid":"320/7281","text":"Srinivasulu Boyineni"},{"@pid":"28/7031","text":"K. Kavitha"},{"@pid":"320/7305","text":"Meruva Sreenivasulu"}]},"title":"Rapidly-exploring random tree-based obstacle-aware mobile sink trajectory for data collection in wireless sensor networks.","venue":"J. Ambient Intell. Humaniz. Comput.","volume":"15","number":"1","pages":"607-621","year":"2024","type":"Journal Articles","access":"closed","key":"journals/jaihc/BoyineniKS24","doi":"10.1007/S12652-023-04717-3","ee":"https://doi.org/10.1007/s12652-023-04717-3","url":"https://dblp.org/rec/journals/jaihc/BoyineniKS24"}, "url":"URL#18631" }, { "@score":"3", "@id":"18940", "info":{"authors":{"author":[{"@pid":"366/3268","text":"Mohamed H. Behiry"},{"@pid":"360/2980","text":"Mohammed Aly"}]},"title":"Cyberattack detection in wireless sensor networks using a hybrid feature reduction technique with AI and machine learning methods.","venue":"J. Big Data","volume":"11","number":"1","pages":"16","year":"2024","type":"Journal Articles","access":"open","key":"journals/jbd/BehiryA24","doi":"10.1186/S40537-023-00870-W","ee":"https://doi.org/10.1186/s40537-023-00870-w","url":"https://dblp.org/rec/journals/jbd/BehiryA24"}, "url":"URL#18940" }, { "@score":"3", "@id":"19469", "info":{"authors":{"author":[{"@pid":"331/8000","text":"Jyrki Oraskari"},{"@pid":"22/47","text":"Seppo Törmä"},{"@pid":"136/9371","text":"Mehmet Yalcinkaya"},{"@pid":"50/7541","text":"Vishal Singh"},{"@pid":"88/537","text":"Jakob Beetz"}]},"title":"Sharing Linked Building Data in a Peer-to-Peer Network: ifcOWL Meets InterPlanetary File System.","venue":"J. Comput. Civ. Eng.","volume":"38","number":"1","year":"2024","type":"Journal Articles","access":"closed","key":"journals/jccee/OraskariTYSB24","doi":"10.1061/JCCEE5.CPENG-5381","ee":"https://doi.org/10.1061/jccee5.cpeng-5381","url":"https://dblp.org/rec/journals/jccee/OraskariTYSB24"}, "url":"URL#19469" }, { "@score":"4", "@id":"19761", "info":{"authors":{"author":[{"@pid":"233/0234","text":"Murk Marvi"},{"@pid":"28/10836","text":"Adnan Aijaz"},{"@pid":"335/5213","text":"Anam Qureshi"},{"@pid":"17/9468","text":"Muhammad Khurram"}]},"title":"Development of an AI-Enabled Q-Agent for Making Data Offloading Decisions in a Multi-RAT Wireless Network.","venue":"J. Comput. Networks Commun.","volume":"2024","pages":"9571987:1-9571987:13","year":"2024","type":"Journal Articles","access":"open","key":"journals/jcnc/MarviAQK24","doi":"10.1155/2024/9571987","ee":"https://doi.org/10.1155/2024/9571987","url":"https://dblp.org/rec/journals/jcnc/MarviAQK24"}, "url":"URL#19761" }, { "@score":"4", "@id":"20026", "info":{"authors":{"author":[{"@pid":"25/11529","text":"Sida Yuan"},{"@pid":"96/2408","text":"Qiong Yang"}]},"title":"Network Rumor Detection Using Attention Mechanism and BiGRU Neural Network in Big Data Environment.","venue":"J. Circuits Syst. Comput.","volume":"33","number":"1","year":"2024","type":"Journal Articles","access":"closed","key":"journals/jcsc/YuanY24","doi":"10.1142/S0218126624500099","ee":"https://doi.org/10.1142/s0218126624500099","url":"https://dblp.org/rec/journals/jcsc/YuanY24"}, "url":"URL#20026" }, { "@score":"3", "@id":"20146", "info":{"authors":{"author":{"@pid":"38/2773","text":"Leo Egghe"}},"title":"Extended Lorenz majorization and frequencies of distances in an undirected network.","venue":"J. Data Inf. Sci.","volume":"9","number":"1","pages":"1-10","year":"2024","type":"Journal Articles","access":"open","key":"journals/jdis/Egghe24","doi":"10.2478/JDIS-2024-0007","ee":"https://doi.org/10.2478/jdis-2024-0007","url":"https://dblp.org/rec/journals/jdis/Egghe24"}, "url":"URL#20146" }, { "@score":"3", "@id":"20300", "info":{"authors":{"author":[{"@pid":"00/2166","text":"Qiang Zhao"},{"@pid":"365/9475","text":"Yaxin Huo"},{"@pid":"70/1726","text":"Meng Li"},{"@pid":"34/2896","text":"Yinghua Han"}]},"title":"Data-driven reliable prediction of production indicators in the blast furnace using TS fuzzy neural network based on bat algorithm.","venue":"J. Exp. Theor. Artif. Intell.","volume":"36","number":"2","pages":"213-234","year":"2024","type":"Journal Articles","access":"closed","key":"journals/jetai/ZhaoHLH24","doi":"10.1080/0952813X.2022.2090614","ee":"https://doi.org/10.1080/0952813x.2022.2090614","url":"https://dblp.org/rec/journals/jetai/ZhaoHLH24"}, "url":"URL#20300" }, { "@score":"3", "@id":"20537", "info":{"authors":{"author":[{"@pid":"91/9453","text":"Weimin Gao"},{"@pid":"151/4528","text":"Jiaming Zhong"},{"@pid":"370/8532","text":"Caihong Peng"},{"@pid":"249/9901","text":"Xinlong Li"},{"@pid":"217/7196","text":"Xiangbai Liao"}]},"title":"Fine-grained load balancing with proactive prediction and adaptive rerouting in data center.","venue":"J. High Speed Networks","volume":"30","number":"1","pages":"83-96","year":"2024","type":"Journal Articles","access":"closed","key":"journals/jhsn/GaoZPLL24","doi":"10.3233/JHS-230003","ee":"https://doi.org/10.3233/JHS-230003","url":"https://dblp.org/rec/journals/jhsn/GaoZPLL24"}, "url":"URL#20537" }, { "@score":"3", "@id":"21643", "info":{"authors":{"author":[{"@pid":"117/3040","text":"Wanqi Yang"},{"@pid":"13/3788-2","text":"Pengfei Chen 0002"},{"@pid":"248/2943","text":"Guangba Yu"},{"@pid":"22/1887","text":"Haibin Zhang"},{"@pid":"71/10367","text":"Huxing Zhang"}]},"title":"Network shortcut in data plane of service mesh with eBPF.","venue":"J. Netw. Comput. Appl.","volume":"222","pages":"103805","year":"2024","type":"Journal Articles","access":"closed","key":"journals/jnca/YangCYZZ24","doi":"10.1016/J.JNCA.2023.103805","ee":"https://doi.org/10.1016/j.jnca.2023.103805","url":"https://dblp.org/rec/journals/jnca/YangCYZZ24"}, "url":"URL#21643" }, { "@score":"3", "@id":"21840", "info":{"authors":{"author":[{"@pid":"206/0396","text":"Pavlos Maniotis"},{"@pid":"87/929","text":"Daniel M. Kuchta"}]},"title":"Exploring the benefits of using co-packaged optics in data center and AI supercomputer networks: a simulation-based analysis [Invited].","venue":"J. Opt. Commun. Netw.","volume":"16","number":"2","pages":"143","year":"2024","type":"Journal Articles","access":"closed","key":"journals/jocnet/ManiotisK24","doi":"10.1364/JOCN.501427","ee":"https://doi.org/10.1364/jocn.501427","url":"https://dblp.org/rec/journals/jocnet/ManiotisK24"}, "url":"URL#21840" }, { "@score":"3", "@id":"21848", "info":{"authors":{"author":[{"@pid":"311/1381","text":"Nilton Flávio S. Seixas"},{"@pid":"203/9418","text":"Sabidur Rahman"},{"@pid":"29/2875","text":"Gustavo B. Figueiredo"}]},"title":"Data-driven decision-making framework for optical fronthaul slice resizing in 6G networks.","venue":"J. Opt. Commun. Netw.","volume":"16","number":"3","pages":"358-368","year":"2024","type":"Journal Articles","access":"closed","key":"journals/jocnet/SeixasRF24","doi":"10.1364/JOCN.504313","ee":"https://doi.org/10.1364/JOCN.504313","url":"https://dblp.org/rec/journals/jocnet/SeixasRF24"}, "url":"URL#21848" }, { "@score":"3", "@id":"21859", "info":{"authors":{"author":[{"@pid":"348/2470","text":"Zhiqun Zhai"},{"@pid":"10/10585","text":"Liang Dou"},{"@pid":"06/2917","text":"Yan He"},{"@pid":"50/4813","text":"Alan Pak Tao Lau"},{"@pid":"60/7397","text":"Chongjin Xie"}]},"title":"Open-source data for QoT estimation in optical networks from Alibaba.","venue":"J. Opt. Commun. Netw.","volume":"16","number":"1","pages":"1-3","year":"2024","type":"Journal Articles","access":"closed","key":"journals/jocnet/ZhaiDHLX24","doi":"10.1364/JOCN.504549","ee":"https://doi.org/10.1364/JOCN.504549","url":"https://dblp.org/rec/journals/jocnet/ZhaiDHLX24"}, "url":"URL#21859" }, { "@score":"4", "@id":"22109", "info":{"authors":{"author":[{"@pid":"256/8586","text":"Tim Breitenbach"},{"@pid":"369/5638","text":"Shrikanth Malavalli Divakar"},{"@pid":"314/3186","text":"Lauritz Rasbach"},{"@pid":"177/6589","text":"Patrick Jahnke"}]},"title":"ML-driven risk estimation for memory failure in a data center environment with convolutional neural networks, self-supervised data labeling and distribution-based model drift determination.","venue":"J. Parallel Distributed Comput.","volume":"185","pages":"104800","year":"2024","type":"Journal Articles","access":"closed","key":"journals/jpdc/BreitenbachDRJ24","doi":"10.1016/J.JPDC.2023.104800","ee":"https://doi.org/10.1016/j.jpdc.2023.104800","url":"https://dblp.org/rec/journals/jpdc/BreitenbachDRJ24"}, "url":"URL#22109" }, { "@score":"4", "@id":"22354", "info":{"authors":{"author":[{"@pid":"184/0946","text":"Momina Shaheen"},{"@pid":"181/3017","text":"Muhammad Shoaib Farooq"},{"@pid":"02/9608","text":"Tariq Umer"}]},"title":"Reduction in Data Imbalance for Client-Side Training in Federated Learning for the Prediction of Stock Market Prices.","venue":"J. Sens. Actuator Networks","volume":"13","number":"1","pages":"1","year":"2024","type":"Journal Articles","access":"open","key":"journals/jsan/ShaheenFU24","doi":"10.3390/JSAN13010001","ee":"https://doi.org/10.3390/jsan13010001","url":"https://dblp.org/rec/journals/jsan/ShaheenFU24"}, "url":"URL#22354" }, { "@score":"3", "@id":"24273", "info":{"authors":{"author":[{"@pid":"57/6633-5","text":"Kai Hu 0005"},{"@pid":"181/2689","text":"Qing Li"},{"@pid":"56/9489","text":"Jie Xie"},{"@pid":"369/6022","text":"Yingyan Pu"},{"@pid":"17/8090","text":"Ya Guo"}]},"title":"Using pre-trained models and graph convolution networks to find the causal relations among events in the Chinese financial text data.","venue":"Multim. Tools Appl.","volume":"83","number":"7","pages":"18699-18720","year":"2024","type":"Journal Articles","access":"closed","key":"journals/mta/0005LXPG24","doi":"10.1007/S11042-023-15496-6","ee":"https://doi.org/10.1007/s11042-023-15496-6","url":"https://dblp.org/rec/journals/mta/0005LXPG24"}, "url":"URL#24273" }, { "@score":"3", "@id":"24286", "info":{"authors":{"author":[{"@pid":"370/9727","text":"Ali Abedi"},{"@pid":"66/4624","text":"Shehroz S. Khan"}]},"title":"FedSL: Federated split learning on distributed sequential data in recurrent neural networks.","venue":"Multim. Tools Appl.","volume":"83","number":"10","pages":"28891-28911","year":"2024","type":"Journal Articles","access":"closed","key":"journals/mta/AbediK24","doi":"10.1007/S11042-023-15184-5","ee":"https://doi.org/10.1007/s11042-023-15184-5","url":"https://dblp.org/rec/journals/mta/AbediK24"}, "url":"URL#24286" }, { "@score":"3", "@id":"25329", "info":{"authors":{"author":[{"@pid":"48/9358","text":"Newton Spolaôr"},{"@pid":"46/2623","text":"Huei Diana Lee"},{"@pid":"224/0458","text":"Ana Isabel Mendes"},{"@pid":"370/3251","text":"Conceição Veloso Nogueira"},{"@pid":"177/1796","text":"Antonio Rafael Sabino Parmezan"},{"@pid":"218/2857","text":"Weber Shoity Resende Takaki"},{"@pid":"70/2468","text":"Cláudio Saddy Rodrigues Coy"},{"@pid":"77/4760","text":"Feng Chung Wu"},{"@pid":"203/1075","text":"Rui Fonseca-Pinto"}]},"title":"Fine-tuning pre-trained neural networks for medical image classification in small clinical datasets.","venue":"Multim. Tools Appl.","volume":"83","number":"9","pages":"27305-27329","year":"2024","type":"Journal Articles","access":"closed","key":"journals/mta/SpolaorLMNPTCWF24","doi":"10.1007/S11042-023-16529-W","ee":"https://doi.org/10.1007/s11042-023-16529-w","url":"https://dblp.org/rec/journals/mta/SpolaorLMNPTCWF24"}, "url":"URL#25329" }, { "@score":"3", "@id":"25372", "info":{"authors":{"author":[{"@pid":"348/2771","text":"Nagamani Tenali"},{"@pid":"348/2608","text":"Gatram Rama Mohan Babu"}]},"title":"HQDCNet: Hybrid Quantum Dilated Convolution Neural Network for detecting covid-19 in the context of Big Data Analytics.","venue":"Multim. Tools Appl.","volume":"83","number":"1","pages":"2145-2171","year":"2024","type":"Journal Articles","access":"closed","key":"journals/mta/TenaliB24","doi":"10.1007/S11042-023-15515-6","ee":"https://doi.org/10.1007/s11042-023-15515-6","url":"https://dblp.org/rec/journals/mta/TenaliB24"}, "url":"URL#25372" }, { "@score":"3", "@id":"26005", "info":{"authors":{"author":[{"@pid":"369/8399","text":"Tiago D. Martins"},{"@pid":"369/8060","text":"Sandra D. Martins"},{"@pid":"369/7909","text":"Silmara Montalvão"},{"@pid":"369/8177","text":"Mohamad Al Bannoud"},{"@pid":"369/7791","text":"Gabriel Y. Ottaiano"},{"@pid":"369/7780","text":"Letícia Q. Silva"},{"@pid":"369/8379","text":"Stephany C. Huber"},{"@pid":"369/8242","text":"Tassiana S. P. Diaz"},{"@pid":"369/8417","text":"Carolina Wroclawski"},{"@pid":"369/7907","text":"Cyrillo Cavalheiro Filho"},{"@pid":"37/974","text":"Rubens Maciel Filho"},{"@pid":"290/9115","text":"Joyce Maria Annichino-Bizzacchi"}]},"title":"Combining artificial neural networks and hematological data to diagnose Covid-19 infection in Brazilian population.","venue":"Neural Comput. Appl.","volume":"36","number":"8","pages":"4387-4399","year":"2024","type":"Journal Articles","access":"closed","key":"journals/nca/MartinsMMBOSHDW24","doi":"10.1007/S00521-023-09312-3","ee":"https://doi.org/10.1007/s00521-023-09312-3","url":"https://dblp.org/rec/journals/nca/MartinsMMBOSHDW24"}, "url":"URL#26005" }, { "@score":"4", "@id":"26225", "info":{"authors":{"author":[{"@pid":"35/4713","text":"David Pisinger"},{"@pid":"365/3517","text":"Siv Sørensen"}]},"title":"Topology reconstruction using time series data in telecommunication networks.","venue":"Networks","volume":"83","number":"2","pages":"408-427","year":"2024","type":"Journal Articles","access":"open","key":"journals/networks/PisingerS24","doi":"10.1002/NET.22196","ee":"https://doi.org/10.1002/net.22196","url":"https://dblp.org/rec/journals/networks/PisingerS24"}, "url":"URL#26225" }, { "@score":"3", "@id":"27188", "info":{"authors":{"author":[{"@pid":"65/4423","text":"Chen Chen"},{"@pid":"59/8419","text":"Muhammad Aleem"}]},"title":"A model for new media data mining and analysis in online English teaching using long short-term memory (LSTM) network.","venue":"PeerJ Comput. Sci.","volume":"10","pages":"e1869","year":"2024","type":"Journal Articles","access":"open","key":"journals/peerj-cs/ChenA24","doi":"10.7717/PEERJ-CS.1869","ee":"https://doi.org/10.7717/peerj-cs.1869","url":"https://dblp.org/rec/journals/peerj-cs/ChenA24"}, "url":"URL#27188" }, { "@score":"3", "@id":"27249", "info":{"authors":{"author":[{"@pid":"371/5594","text":"Firdous Qaiser"},{"@pid":"63/3527","text":"Mudassar Hussain"},{"@pid":"117/6802","text":"Abdul Ahad"},{"@pid":"167/8491","text":"Ivan Miguel Pires"}]},"title":"Controller-driven vector autoregression model for predicting content popularity in programmable named data networking devices.","venue":"PeerJ Comput. Sci.","volume":"10","pages":"e1854","year":"2024","type":"Journal Articles","access":"open","key":"journals/peerj-cs/QaiserHAP24","doi":"10.7717/PEERJ-CS.1854","ee":"https://doi.org/10.7717/peerj-cs.1854","url":"https://dblp.org/rec/journals/peerj-cs/QaiserHAP24"}, "url":"URL#27249" }, { "@score":"5", "@id":"27568", "info":{"authors":{"author":[{"@pid":"255/0406","text":"Jay Gandhi"},{"@pid":"139/1051","text":"Zunnun Narmawala"}]},"title":"A case study on the estimation of sensor data generation in smart cities and the role of opportunistic networks in sensor data collection.","venue":"Peer Peer Netw. Appl.","volume":"17","number":"1","pages":"337-357","year":"2024","type":"Journal Articles","access":"closed","key":"journals/ppna/GandhiN24","doi":"10.1007/S12083-023-01607-5","ee":"https://doi.org/10.1007/s12083-023-01607-5","url":"https://dblp.org/rec/journals/ppna/GandhiN24"}, "url":"URL#27568" }, { "@score":"4", "@id":"27950", "info":{"authors":{"author":[{"@pid":"299/1703","text":"Naili Xing"},{"@pid":"228/6099","text":"Shaofeng Cai"},{"@pid":"67/6383-1","text":"Gang Chen 0001"},{"@pid":"169/3426","text":"Zhaojing Luo"},{"@pid":"o/BengChinOoi","text":"Beng Chin Ooi"},{"@pid":"p/JianPei","text":"Jian Pei"}]},"title":"Database Native Model Selection: Harnessing Deep Neural Networks in Database Systems.","venue":"Proc. VLDB Endow.","volume":"17","number":"5","pages":"1020-1033","year":"2024","type":"Journal Articles","access":"open","key":"journals/pvldb/XingCCLOP24","ee":"https://www.vldb.org/pvldb/vol17/p1020-xing.pdf","url":"https://dblp.org/rec/journals/pvldb/XingCCLOP24"}, "url":"URL#27950" }, { "@score":"3", "@id":"29576", "info":{"authors":{"author":[{"@pid":"15/2639","text":"Xiyuan Chen"},{"@pid":"21/6824","text":"Xiaoping Ma"},{"@pid":"89/161","text":"Limin Jia"},{"@pid":"49/4941","text":"Zhipeng Zhang"},{"@pid":"81/4345","text":"Fei Chen"},{"@pid":"345/7455","text":"Ruojin Wang"}]},"title":"Causative analysis of freight railway accident in specific scenes using a data-driven Bayesian network.","venue":"Reliab. Eng. Syst. Saf.","volume":"243","pages":"109781","year":"2024","type":"Journal Articles","access":"closed","key":"journals/ress/ChenMJZCW24","doi":"10.1016/J.RESS.2023.109781","ee":"https://doi.org/10.1016/j.ress.2023.109781","url":"https://dblp.org/rec/journals/ress/ChenMJZCW24"}, "url":"URL#29576" }, { "@score":"3", "@id":"29892", "info":{"authors":{"author":[{"@pid":"323/2803","text":"Goragod Pongthanisorn"},{"@pid":"c/GenciCapi","text":"Genci Capi"}]},"title":"Genetic Algorithm-Based Data Optimization for Efficient Transfer Learning in Convolutional Neural Networks: A Brain-Machine Interface Implementation.","venue":"Robotics","volume":"13","number":"1","pages":"14","year":"2024","type":"Journal Articles","access":"open","key":"journals/robotics/PongthanisornC24","doi":"10.3390/ROBOTICS13010014","ee":"https://doi.org/10.3390/robotics13010014","url":"https://dblp.org/rec/journals/robotics/PongthanisornC24"}, "url":"URL#29892" }, { "@score":"3", "@id":"30340", "info":{"authors":{"author":[{"@pid":"01/6377","text":"Feng Shan"},{"@pid":"219/5050","text":"Dongqi Li"}]},"title":"Research on Detection Technology of Abnormal Data in College Physical Education Network Teaching Test Results.","venue":"Scalable Comput. Pract. Exp.","volume":"25","number":"1","pages":"285-298","year":"2024","type":"Journal Articles","access":"closed","key":"journals/scpe/ShanL24","doi":"10.12694/SCPE.V25I1.2295","ee":"https://doi.org/10.12694/scpe.v25i1.2295","url":"https://dblp.org/rec/journals/scpe/ShanL24"}, "url":"URL#30340" }, { "@score":"3", "@id":"30761", "info":{"authors":{"author":[{"@pid":"337/8519","text":"Roman Glazkov"},{"@pid":"50/5725","text":"Dmitri Moltchanov"},{"@pid":"00/4190","text":"Srikathyayani Srikanteswara"},{"@pid":"27/9954","text":"Andrey Samuylov"},{"@pid":"97/10237","text":"Gabriel E. Arrobo"},{"@pid":"64/6544","text":"Yi Zhang"},{"@pid":"46/4184-2","text":"Hao Feng 0002"},{"@pid":"20/4102","text":"Nageen Himayat"},{"@pid":"237/7758","text":"Marcin Spoczynski"},{"@pid":"10/5061","text":"Yevgeni Koucheryavy"}]},"title":"Provisioning of Fog Computing over Named-Data Networking in Dynamic Wireless Mesh Systems.","venue":"Sensors","volume":"24","number":"4","pages":"1120","year":"2024","type":"Journal Articles","access":"open","key":"journals/sensors/GlazkovMSSAZFHSK24","doi":"10.3390/S24041120","ee":"https://doi.org/10.3390/s24041120","url":"https://dblp.org/rec/journals/sensors/GlazkovMSSAZFHSK24"}, "url":"URL#30761" }, { "@score":"3", "@id":"30809", "info":{"authors":{"author":[{"@pid":"149/5850","text":"Mahmood Ul Hassan"},{"@pid":"347/7025","text":"Amin A. Al-Awady"},{"@pid":"81/11165-1","text":"Abid Ali 0001"},{"@pid":"214/5925","text":"Muhammad Munwar Iqbal"},{"@pid":"24/232","text":"Muhammad Akram"},{"@pid":"296/8681","text":"Harun Jamil"}]},"title":"Smart Resource Allocation in Mobile Cloud Next-Generation Network (NGN) Orchestration with Context-Aware Data and Machine Learning for the Cost Optimization of Microservice Applications.","venue":"Sensors","volume":"24","number":"3","pages":"865","year":"2024","type":"Journal Articles","access":"open","key":"journals/sensors/HassanAAIAJ24","doi":"10.3390/S24030865","ee":"https://doi.org/10.3390/s24030865","url":"https://dblp.org/rec/journals/sensors/HassanAAIAJ24"}, "url":"URL#30809" }, { "@score":"3", "@id":"30990", "info":{"authors":{"author":[{"@pid":"308/0857","text":"Malgorzata Lacka"},{"@pid":"98/6938","text":"Jacek Lubczonek"}]},"title":"Methodology for Creating a Digital Bathymetric Model Using Neural Networks for Combined Hydroacoustic and Photogrammetric Data in Shallow Water Areas.","venue":"Sensors","volume":"24","number":"1","pages":"175","year":"2024","type":"Journal Articles","access":"open","key":"journals/sensors/LackaL24","doi":"10.3390/S24010175","ee":"https://doi.org/10.3390/s24010175","url":"https://dblp.org/rec/journals/sensors/LackaL24"}, "url":"URL#30990" }, { "@score":"3", "@id":"31412", "info":{"authors":{"author":[{"@pid":"324/9888","text":"Anurag Sinha"},{"@pid":"196/4305","text":"Turki Aljrees"},{"@pid":"251/7707","text":"Saroj Kumar Pandey"},{"@pid":"52/7766","text":"Ankit Kumar"},{"@pid":"358/0141","text":"Pallab Banerjee"},{"@pid":"362/0141","text":"Biresh Kumar"},{"@pid":"298/5214","text":"Kamred Udham Singh"},{"@pid":"239/6230","text":"Teekam Singh"},{"@pid":"225/0900","text":"Pooja Jha"}]},"title":"Semi-Supervised Clustering-Based DANA Algorithm for Data Gathering and Disease Detection in Healthcare Wireless Sensor Networks (WSN).","venue":"Sensors","volume":"24","number":"1","pages":"18","year":"2024","type":"Journal Articles","access":"open","key":"journals/sensors/SinhaAPKBKSSJ24","doi":"10.3390/S24010018","ee":"https://doi.org/10.3390/s24010018","url":"https://dblp.org/rec/journals/sensors/SinhaAPKBKSSJ24"}, "url":"URL#31412" }, { "@score":"3", "@id":"31446", "info":{"authors":{"author":[{"@pid":"318/3324","text":"Zhiyao Sun"},{"@pid":"03/4601","text":"Guifen Chen"}]},"title":"Enhancing Data Freshness in Air-Ground Collaborative Heterogeneous Networks through Contract Theory and Generative Diffusion-Based Mobile Edge Computing.","venue":"Sensors","volume":"24","number":"1","pages":"74","year":"2024","type":"Journal Articles","access":"open","key":"journals/sensors/SunC24","doi":"10.3390/S24010074","ee":"https://doi.org/10.3390/s24010074","url":"https://dblp.org/rec/journals/sensors/SunC24"}, "url":"URL#31446" }, { "@score":"3", "@id":"31458", "info":{"authors":{"author":[{"@pid":"132/7814","text":"Long Suo"},{"@pid":"92/1173","text":"Han Ma"},{"@pid":"143/0847","text":"Wanguo Jiao"},{"@pid":"l/XiaomingLiu-18","text":"Xiaoming Liu 0018"}]},"title":"Job-Deadline-Guarantee-Based Joint Flow Scheduling and Routing Scheme in Data Center Networks.","venue":"Sensors","volume":"24","number":"1","pages":"216","year":"2024","type":"Journal Articles","access":"open","key":"journals/sensors/SuoMJL24","doi":"10.3390/S24010216","ee":"https://doi.org/10.3390/s24010216","url":"https://dblp.org/rec/journals/sensors/SuoMJL24"}, "url":"URL#31458" }, { "@score":"3", "@id":"32662", "info":{"authors":{"author":[{"@pid":"352/3180","text":"Yezhuo Zhang"},{"@pid":"371/5361","text":"Zinan Zhou"},{"@pid":"128/0297","text":"Xuanpeng Li"}]},"title":"Generative adversarial networks with Gramian angular field for handling imbalanced data in specific emitter identification.","venue":"Signal Image Video Process.","volume":"18","number":"3","pages":"2929-2938","year":"2024","type":"Journal Articles","access":"closed","key":"journals/sivp/ZhangZL24","doi":"10.1007/S11760-023-02960-X","ee":"https://doi.org/10.1007/s11760-023-02960-x","url":"https://dblp.org/rec/journals/sivp/ZhangZL24"}, "url":"URL#32662" }, { "@score":"3", "@id":"32712", "info":{"authors":{"author":[{"@pid":"351/1903","text":"Chuanyi Ning"},{"@pid":"65/4149","text":"Zhiyu Xi"}]},"title":"Improved Stealthy False Data Injection Attacks in Networked Control Systems.","venue":"IEEE Syst. J.","volume":"18","number":"1","pages":"505-515","year":"2024","type":"Journal Articles","access":"closed","key":"journals/sj/NingX24","doi":"10.1109/JSYST.2024.3350179","ee":"https://doi.org/10.1109/JSYST.2024.3350179","url":"https://dblp.org/rec/journals/sj/NingX24"}, "url":"URL#32712" }, { "@score":"3", "@id":"32851", "info":{"authors":{"author":[{"@pid":"366/2677","text":"J. V. N. Raghava Deepthi"},{"@pid":"214/0337","text":"Ajoy Kumar Khan"},{"@pid":"305/4730","text":"Tapodhir Acharjee"}]},"title":"Multi-level Data Integrity Model with Dual Immutable Digital Key Based Forensic Analysis in IoT Network.","venue":"SN Comput. Sci.","volume":"5","number":"1","pages":"90","year":"2024","type":"Journal Articles","access":"closed","key":"journals/sncs/DeepthiKA24","doi":"10.1007/S42979-023-02337-4","ee":"https://doi.org/10.1007/s42979-023-02337-4","url":"https://dblp.org/rec/journals/sncs/DeepthiKA24"}, "url":"URL#32851" }, { "@score":"3", "@id":"32983", "info":{"authors":{"author":[{"@pid":"190/6154","text":"Jagannath E. Nalavade"},{"@pid":"362/9450","text":"Akshta Patil"},{"@pid":"97/11140","text":"Amar Buchade"},{"@pid":"340/4690","text":"Nagesh Jadhav"}]},"title":"Deep Neural Network and GAN-Based Reversible Data Hiding in Encrypted Images: A Privacy-Preserving Approach.","venue":"SN Comput. Sci.","volume":"5","number":"1","pages":"45","year":"2024","type":"Journal Articles","access":"closed","key":"journals/sncs/NalavadePBJ24","doi":"10.1007/S42979-023-02347-2","ee":"https://doi.org/10.1007/s42979-023-02347-2","url":"https://dblp.org/rec/journals/sncs/NalavadePBJ24"}, "url":"URL#32983" }, { "@score":"5", "@id":"33127", "info":{"authors":{"author":[{"@pid":"65/1664","text":"Jinho Kim"},{"@pid":"17/4306","text":"Taehoon Kim"}]},"title":"Adolescent network positions and memory performance in adulthood: Evidence from sibling fixed effects models with sociometric network data.","venue":"Soc. Networks","volume":"76","pages":"112-119","year":"2024","type":"Journal Articles","access":"closed","key":"journals/socnet/KimK24","doi":"10.1016/J.SOCNET.2023.08.002","ee":"https://doi.org/10.1016/j.socnet.2023.08.002","url":"https://dblp.org/rec/journals/socnet/KimK24"}, "url":"URL#33127" }, { "@score":"3", "@id":"35534", "info":{"authors":{"author":[{"@pid":"119/8223","text":"Weizhi Nie"},{"@pid":"348/8882","text":"Yuhe Yu"},{"@pid":"94/4084","text":"Chen Zhang"},{"@pid":"33/4189-6","text":"Dan Song 0006"},{"@pid":"63/5874","text":"Lina Zhao"},{"@pid":"256/5589","text":"Yunpeng Bai"}]},"title":"Temporal-Spatial Correlation Attention Network for Clinical Data Analysis in Intensive Care Unit.","venue":"IEEE Trans. Biomed. Eng.","volume":"71","number":"2","pages":"583-595","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tbe/NieYZSZB24","doi":"10.1109/TBME.2023.3309956","ee":"https://doi.org/10.1109/TBME.2023.3309956","url":"https://dblp.org/rec/journals/tbe/NieYZSZB24"}, "url":"URL#35534" }, { "@score":"3", "@id":"36266", "info":{"authors":{"author":[{"@pid":"78/2545","text":"Zhaoyi Li"},{"@pid":"13/4208-1","text":"Jiawei Huang 0001"},{"@pid":"284/2210","text":"Shiqi Wang 0012"},{"@pid":"75/2669-1","text":"Jianxin Wang 0001"}]},"title":"Achieving Low Latency for Multipath Transmission in RDMA Based Data Center Network.","venue":"IEEE Trans. Cloud Comput.","volume":"12","number":"1","pages":"337-346","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tcc/LiHWW24","doi":"10.1109/TCC.2024.3365075","ee":"https://doi.org/10.1109/TCC.2024.3365075","url":"https://dblp.org/rec/journals/tcc/LiHWW24"}, "url":"URL#36266" }, { "@score":"3", "@id":"36281", "info":{"authors":{"author":[{"@pid":"192/3652","text":"Mohammud Junaid Bocus"},{"@pid":"81/1832-5","text":"Xiaoyang Wang 0005"},{"@pid":"03/6813","text":"Robert J. Piechocki"}]},"title":"Streamlining Multimodal Data Fusion in Wireless Communication and Sensor Networks.","venue":"IEEE Trans. Cogn. Commun. Netw.","volume":"10","number":"1","pages":"252-262","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tccn/BocusWP24","doi":"10.1109/TCCN.2023.3322983","ee":"https://doi.org/10.1109/TCCN.2023.3322983","url":"https://dblp.org/rec/journals/tccn/BocusWP24"}, "url":"URL#36281" }, { "@score":"3", "@id":"36463", "info":{"authors":{"author":[{"@pid":"158/6913","text":"Zhixiang Gao"},{"@pid":"34/4149-1","text":"Aijun Liu 0001"},{"@pid":"66/3874","text":"Xin Xu"},{"@pid":"174/6441","text":"Xiaohu Liang"},{"@pid":"33/8598","text":"Chen Han"},{"@pid":"08/2373","text":"Xian Liu"}]},"title":"Sum Data Minimization in LEO Satellite-UAV Integrated Multi-Tier Computing Networks: A Game-Theoretic Multiple Access Approach.","venue":"IEEE Trans. Commun.","volume":"72","number":"3","pages":"1701-1715","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tcom/GaoLXLHL24","doi":"10.1109/TCOMM.2023.3332932","ee":"https://doi.org/10.1109/TCOMM.2023.3332932","url":"https://dblp.org/rec/journals/tcom/GaoLXLHL24"}, "url":"URL#36463" }, { "@score":"3", "@id":"36464", "info":{"authors":{"author":[{"@pid":"193/3073","text":"Jiangping Han"},{"@pid":"94/5600","text":"Kaiping Xue"},{"@pid":"33/5448-31","text":"Jian Li 0031"},{"@pid":"246/9429","text":"Yitao Xing"},{"@pid":"123/0475","text":"Ruozhou Yu"},{"@pid":"65/4599","text":"David S. L. Wei"},{"@pid":"64/4394","text":"Guoliang Xue"}]},"title":"FMPTCP: Achieving High Bandwidth Utilization and Low Latency in Data Center Networks.","venue":"IEEE Trans. Commun.","volume":"72","number":"1","pages":"317-333","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tcom/HanXLXYWX24","doi":"10.1109/TCOMM.2023.3323670","ee":"https://doi.org/10.1109/TCOMM.2023.3323670","url":"https://dblp.org/rec/journals/tcom/HanXLXYWX24"}, "url":"URL#36464" }, { "@score":"3", "@id":"36554", "info":{"authors":{"author":[{"@pid":"76/1584","text":"Xin Zhang"},{"@pid":"54/2780-1","text":"Zheng Chang 0001"},{"@pid":"h/TimoHamalainen2","text":"Timo Hämäläinen 0002"},{"@pid":"96/3727","text":"Geyong Min"}]},"title":"AoI-Energy Tradeoff for Data Collection in UAV-Assisted Wireless Networks.","venue":"IEEE Trans. Commun.","volume":"72","number":"3","pages":"1849-1861","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tcom/ZhangCHM24","doi":"10.1109/TCOMM.2023.3337400","ee":"https://doi.org/10.1109/TCOMM.2023.3337400","url":"https://dblp.org/rec/journals/tcom/ZhangCHM24"}, "url":"URL#36554" }, { "@score":"3", "@id":"38045", "info":{"authors":{"author":[{"@pid":"244/8662","text":"Dongji Li"},{"@pid":"94/5218","text":"Shaoyi Xu"},{"@pid":"345/9012","text":"Chengyu Zhao"},{"@pid":"118/3675","text":"Yuanjie Wang"},{"@pid":"93/4025","text":"Rongtao Xu"},{"@pid":"85/6463-1","text":"Bo Ai 0001"}]},"title":"Data Collection in Laser-Powered UAV-Assisted IoT Networks: Phased Scheme Design Based on Improved Clustering Algorithm.","venue":"IEEE Trans. Green Commun. Netw.","volume":"8","number":"1","pages":"482-497","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tgcn/LiXZWXA24","doi":"10.1109/TGCN.2023.3330791","ee":"https://doi.org/10.1109/TGCN.2023.3330791","url":"https://dblp.org/rec/journals/tgcn/LiXZWXA24"}, "url":"URL#38045" }, { "@score":"3", "@id":"38218", "info":{"authors":{"author":[{"@pid":"293/3871","text":"Songwei Gu"},{"@pid":"69/5182","text":"Yun Zhou"},{"@pid":"31/5383","text":"Long Zhao"},{"@pid":"68/9625","text":"Mingguo Ma"},{"@pid":"153/9271","text":"Xiaojun She"},{"@pid":"74/8997","text":"Lifu Zhang"},{"@pid":"96/13","text":"Yao Li"}]},"title":"A Fast Generative Adversarial Network Combined With Transformer for Downscaling GRACE Terrestrial Water Storage Data in Southwestern China.","venue":"IEEE Trans. Geosci. Remote. Sens.","volume":"62","pages":"1-16","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tgrs/GuZZMSZL24","doi":"10.1109/TGRS.2024.3349548","ee":"https://doi.org/10.1109/TGRS.2024.3349548","url":"https://dblp.org/rec/journals/tgrs/GuZZMSZL24"}, "url":"URL#38218" }, { "@score":"3", "@id":"38453", "info":{"authors":{"author":[{"@pid":"28/8996","text":"Lizhi Miao"},{"@pid":"335/3309","text":"Xinting Li"},{"@pid":"73/1218","text":"Xinxin Zhou"},{"@pid":"65/8847","text":"Ling Yao"},{"@pid":"340/3083","text":"Yamei Deng"},{"@pid":"334/8574","text":"Tian Hang"},{"@pid":"137/6347","text":"Yuchao Zhou"},{"@pid":"366/2110","text":"Haozhou Yang"}]},"title":"SNUNet3+: A Full-Scale Connected Siamese Network and a Dataset for Cultivated Land Change Detection in High-Resolution Remote-Sensing Images.","venue":"IEEE Trans. Geosci. Remote. Sens.","volume":"62","pages":"1-18","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tgrs/MiaoLZYDHZY24","doi":"10.1109/TGRS.2023.3344284","ee":"https://doi.org/10.1109/TGRS.2023.3344284","url":"https://dblp.org/rec/journals/tgrs/MiaoLZYDHZY24"}, "url":"URL#38453" }, { "@score":"3", "@id":"38588", "info":{"authors":{"author":[{"@pid":"06/2293","text":"Rui Wang"},{"@pid":"354/4713","text":"Yaming Ding"},{"@pid":"160/0761-2","text":"Zhengwei Xu 0002"},{"@pid":"41/9897","text":"Michael S. Zhdanov"},{"@pid":"271/5488","text":"Minghao Xian"},{"@pid":"50/671","text":"Yu Zhang"},{"@pid":"116/1011","text":"Jun Li"},{"@pid":"38/2068","text":"Chao Jiang"},{"@pid":"53/7763","text":"Ziqing Guo"}]},"title":"Employing MS-UNets Networks for Multiscale 3-D Gravity Data Inversion: A Case Study in the Nordkapp Basin, Barents Sea.","venue":"IEEE Trans. Geosci. Remote. Sens.","volume":"62","pages":"1-13","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tgrs/WangDXZXZLJG24","doi":"10.1109/TGRS.2024.3362070","ee":"https://doi.org/10.1109/TGRS.2024.3362070","url":"https://dblp.org/rec/journals/tgrs/WangDXZXZLJG24"}, "url":"URL#38588" }, { "@score":"3", "@id":"38902", "info":{"authors":{"author":[{"@pid":"244/5696","text":"Arta Mohammad Alikhani"},{"@pid":"39/11363","text":"Babak Nahid-Mobarakeh"},{"@pid":"122/6740","text":"Min-Fu Hsieh"}]},"title":"One-Dimensional LSTM-Regulated Deep Residual Network for Data-Driven Fault Detection in Electric Machines.","venue":"IEEE Trans. Ind. Electron.","volume":"71","number":"3","pages":"3083-3092","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tie/AlikhaniNH24","doi":"10.1109/TIE.2023.3265054","ee":"https://doi.org/10.1109/TIE.2023.3265054","url":"https://dblp.org/rec/journals/tie/AlikhaniNH24"}, "url":"URL#38902" }, { "@score":"3", "@id":"39589", "info":{"authors":{"author":[{"@pid":"176/6509","text":"Xiaoguo Li"},{"@pid":"255/6015","text":"Zixi Huang"},{"@pid":"191/9426","text":"Bowen Zhao"},{"@pid":"78/2235","text":"Guomin Yang"},{"@pid":"22/4460-1","text":"Tao Xiang 0001"},{"@pid":"d/RobertHDeng","text":"Robert H. Deng"}]},"title":"STDA: Secure Time Series Data Analytics With Practical Efficiency in Wide-Area Network.","venue":"IEEE Trans. Inf. Forensics Secur.","volume":"19","pages":"1440-1454","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tifs/LiHZYXD24","doi":"10.1109/TIFS.2023.3336512","ee":"https://doi.org/10.1109/TIFS.2023.3336512","url":"https://dblp.org/rec/journals/tifs/LiHZYXD24"}, "url":"URL#39589" }, { "@score":"3", "@id":"39811", "info":{"authors":{"author":[{"@pid":"354/8878","text":"Jiashu Fang"},{"@pid":"65/3632","text":"Le Zheng"},{"@pid":"256/6516","text":"Chongru Liu"}]},"title":"A Novel Method for Missing Data Reconstruction in Smart Grid Using Generative Adversarial Networks.","venue":"IEEE Trans. Ind. Informatics","volume":"20","number":"3","pages":"4408-4417","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tii/FangZL24","doi":"10.1109/TII.2023.3306366","ee":"https://doi.org/10.1109/TII.2023.3306366","url":"https://dblp.org/rec/journals/tii/FangZL24"}, "url":"URL#39811" }, { "@score":"3", "@id":"39893", "info":{"authors":{"author":[{"@pid":"14/9463","text":"Houjun Li"},{"@pid":"52/8539","text":"Chunxia Dou"},{"@pid":"72/4106-1","text":"Dong Yue 0001"},{"@pid":"44/2703","text":"Gerhard P. Hancke 0001"},{"@pid":"98/6997","text":"Zeng Zeng"},{"@pid":"71/6601-10","text":"Wei Guo 0010"},{"@pid":"19/360","text":"Lei Xu"}]},"title":"End-Edge-Cloud Collaboration-Based False Data Injection Attack Detection in Distribution Networks.","venue":"IEEE Trans. Ind. Informatics","volume":"20","number":"2","pages":"1786-1797","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tii/LiDYHZGX24","doi":"10.1109/TII.2023.3281664","ee":"https://doi.org/10.1109/TII.2023.3281664","url":"https://dblp.org/rec/journals/tii/LiDYHZGX24"}, "url":"URL#39893" }, { "@score":"3", "@id":"41843", "info":{"authors":{"author":[{"@pid":"331/5234","text":"Jyotirindra Dandapat"},{"@pid":"21/4433","text":"Nishant Gupta"},{"@pid":"125/2194","text":"Satyam Agarwal"},{"@pid":"150/0199","text":"Brijesh Kumbhani"}]},"title":"Service Time Maximization for Data Collection in Multi-UAV-Aided Networks.","venue":"IEEE Trans. Intell. Veh.","volume":"9","number":"1","pages":"328-337","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tiv/DandapatGAK24","doi":"10.1109/TIV.2023.3287629","ee":"https://doi.org/10.1109/TIV.2023.3287629","url":"https://dblp.org/rec/journals/tiv/DandapatGAK24"}, "url":"URL#41843" }, { "@score":"3", "@id":"42062", "info":{"authors":{"author":[{"@pid":"268/6540","text":"Emmanuel Ahishakiye"},{"@pid":"239/6297","text":"Waweru Mwangi"},{"@pid":"133/5053","text":"Petronilla Muriithi"},{"@pid":"319/3131","text":"Fredrick Kanobe"},{"@pid":"194/5582","text":"Godliver Owomugisha"},{"@pid":"366/0560","text":"Danison Taremwa"},{"@pid":"249/2078","text":"Lenard Nkalubo"}]},"title":"Deep Gaussian convolutional neural network model in classification of cassava diseases using spectral data.","venue":"J. Supercomput.","volume":"80","number":"1","pages":"463-485","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/AhishakiyeMMKOTN24","doi":"10.1007/S11227-023-05498-4","ee":"https://doi.org/10.1007/s11227-023-05498-4","url":"https://dblp.org/rec/journals/tjs/AhishakiyeMMKOTN24"}, "url":"URL#42062" }, { "@score":"3", "@id":"42215", "info":{"authors":{"author":[{"@pid":"207/1752","text":"Divya Rani"},{"@pid":"56/5125","text":"Sachin Tripathi"}]},"title":"Design of blockchain-based authentication and key agreement protocol for health data sharing in cooperative hospital network.","venue":"J. Supercomput.","volume":"80","number":"2","pages":"2681-2717","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/RaniT24","doi":"10.1007/S11227-023-05577-6","ee":"https://doi.org/10.1007/s11227-023-05577-6","url":"https://dblp.org/rec/journals/tjs/RaniT24"}, "url":"URL#42215" }, { "@score":"3", "@id":"42340", "info":{"authors":{"author":[{"@pid":"160/8524","text":"Hui-Jia Li"},{"@pid":"239/2903","text":"Yuhao Feng"},{"@pid":"62/7618","text":"Chengyi Xia"},{"@pid":"39/6191-1","text":"Jie Cao 0001"}]},"title":"Overlapping Graph Clustering in Attributed Networks via Generalized Cluster Potential Game.","venue":"ACM Trans. Knowl. Discov. Data","volume":"18","number":"1","pages":"27:1-27:26","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tkdd/LiFXC24","doi":"10.1145/3597436","ee":"https://doi.org/10.1145/3597436","url":"https://dblp.org/rec/journals/tkdd/LiFXC24"}, "url":"URL#42340" }, { "@score":"4", "@id":"42351", "info":{"authors":{"author":[{"@pid":"37/2109-25","text":"Gang Liu 0025"},{"@pid":"342/8313","text":"Eric Inae"},{"@pid":"202/0890","text":"Tengfei Luo"},{"@pid":"69/339-1","text":"Meng Jiang 0001"}]},"title":"Rationalizing Graph Neural Networks with Data Augmentation.","venue":"ACM Trans. Knowl. Discov. Data","volume":"18","number":"4","pages":"86:1-86:23","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tkdd/LiuILJ24","doi":"10.1145/3638781","ee":"https://doi.org/10.1145/3638781","url":"https://dblp.org/rec/journals/tkdd/LiuILJ24"}, "url":"URL#42351" }, { "@score":"4", "@id":"42382", "info":{"authors":{"author":[{"@pid":"70/6155-5","text":"Huan Wang 0005"},{"@pid":"89/9686","text":"Guoquan Liu"},{"@pid":"62/1925","text":"Po Hu"}]},"title":"TDAN: Transferable Domain Adversarial Network for Link Prediction in Heterogeneous Social Networks.","venue":"ACM Trans. Knowl. Discov. Data","volume":"18","number":"1","pages":"11:1-11:22","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tkdd/WangLH24","doi":"10.1145/3610229","ee":"https://doi.org/10.1145/3610229","url":"https://dblp.org/rec/journals/tkdd/WangLH24"}, "url":"URL#42382" }, { "@score":"3", "@id":"42383", "info":{"authors":{"author":[{"@pid":"70/6155-5","text":"Huan Wang 0005"},{"@pid":"11/9165","text":"Ruigang Liu"},{"@pid":"359/7866","text":"Chuanqi Shi"},{"@pid":"196/7893","text":"Junyang Chen"},{"@pid":"66/5168-1","text":"Lei Fang 0001"},{"@pid":"121/6146","text":"Shun Liu"},{"@pid":"95/6295","text":"Zhiguo Gong"}]},"title":"Resisting the Edge-Type Disturbance for Link Prediction in Heterogeneous Networks.","venue":"ACM Trans. Knowl. Discov. Data","volume":"18","number":"2","pages":"45:1-45:24","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tkdd/WangLSCFLG24","doi":"10.1145/3614099","ee":"https://doi.org/10.1145/3614099","url":"https://dblp.org/rec/journals/tkdd/WangLSCFLG24"}, "url":"URL#42383" }, { "@score":"3", "@id":"42400", "info":{"authors":{"author":[{"@pid":"209/6396","text":"Ahmad Zareie"},{"@pid":"48/2","text":"Rizos Sakellariou"}]},"title":"Maximizing the Diversity of Exposure in Online Social Networks by Identifying Users with Increased Susceptibility to Persuasion.","venue":"ACM Trans. Knowl. Discov. Data","volume":"18","number":"2","pages":"42:1-42:21","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tkdd/ZareieS24","doi":"10.1145/3625826","ee":"https://doi.org/10.1145/3625826","url":"https://dblp.org/rec/journals/tkdd/ZareieS24"}, "url":"URL#42400" }, { "@score":"3", "@id":"42416", "info":{"authors":{"author":[{"@pid":"59/983","text":"Yixin Chen"},{"@pid":"50/6288","text":"Di Jiang"},{"@pid":"180/5927","text":"Conghui Tan"},{"@pid":"129/4071","text":"Yuanfeng Song"},{"@pid":"133/9850","text":"Chen Jason Zhang"},{"@pid":"c/LeiChen0002","text":"Lei Chen 0002"}]},"title":"Neural Moderation of ASMR Erotica Content in Social Networks.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"36","number":"1","pages":"275-280","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tkde/ChenJTSZC24","doi":"10.1109/TKDE.2023.3283501","ee":"https://doi.org/10.1109/TKDE.2023.3283501","url":"https://dblp.org/rec/journals/tkde/ChenJTSZC24"}, "url":"URL#42416" }, { "@score":"4", "@id":"42466", "info":{"authors":{"author":[{"@pid":"269/4189","text":"Efrén Rama-Maneiro"},{"@pid":"49/3184","text":"Juan Carlos Vidal"},{"@pid":"58/4704","text":"Manuel Lama"}]},"title":"Embedding Graph Convolutional Networks in Recurrent Neural Networks for Predictive Monitoring.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"36","number":"1","pages":"137-151","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tkde/RamaManeiroVL24","doi":"10.1109/TKDE.2023.3286017","ee":"https://doi.org/10.1109/TKDE.2023.3286017","url":"https://dblp.org/rec/journals/tkde/RamaManeiroVL24"}, "url":"URL#42466" }, { "@score":"3", "@id":"42475", "info":{"authors":{"author":[{"@pid":"305/7862","text":"Yifu Tang"},{"@pid":"l/JianxinLi","text":"Jianxin Li 0001"},{"@pid":"124/3439","text":"Nur Al Hasan Haldar"},{"@pid":"43/6970","text":"Ziyu Guan"},{"@pid":"20/1590","text":"Jiajie Xu 0001"},{"@pid":"l/ChengfeiLiu","text":"Chengfei Liu"}]},"title":"Reliability-Driven Local Community Search in Dynamic Networks.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"36","number":"2","pages":"809-822","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tkde/TangLHGXL24","doi":"10.1109/TKDE.2023.3290295","ee":"https://doi.org/10.1109/TKDE.2023.3290295","url":"https://dblp.org/rec/journals/tkde/TangLHGXL24"}, "url":"URL#42475" }, { "@score":"3", "@id":"42702", "info":{"authors":{"author":[{"@pid":"95/7206","text":"Lijun He"},{"@pid":"65/7582-1","text":"Jiandong Li 0001"},{"@pid":"72/7715","text":"Yanting Wang"},{"@pid":"49/1013","text":"Jiangbin Zheng"},{"@pid":"42/963","text":"Liang He"}]},"title":"Balancing Total Energy Consumption and Mean Makespan in Data Offloading for Space-Air-Ground Integrated Networks.","venue":"IEEE Trans. Mob. Comput.","volume":"23","number":"1","pages":"209-222","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tmc/HeLWZH24","doi":"10.1109/TMC.2022.3222848","ee":"https://doi.org/10.1109/TMC.2022.3222848","url":"https://dblp.org/rec/journals/tmc/HeLWZH24"}, "url":"URL#42702" }, { "@score":"3", "@id":"42714", "info":{"authors":{"author":[{"@pid":"07/2158","text":"Wenjie Huang"},{"@pid":"89/887","text":"Zhiwei Zhao"},{"@pid":"78/8711","text":"Zi Wang"},{"@pid":"96/3727","text":"Geyong Min"},{"@pid":"54/2780-1","text":"Zheng Chang 0001"},{"@pid":"262/1302","text":"Luwei Fu"},{"@pid":"01/1402","text":"Hancong Duan"}]},"title":"Adaptive Mobile Recharge Scheduling With Rapid Data Sharing in Wireless Rechargeable Networks.","venue":"IEEE Trans. Mob. Comput.","volume":"23","number":"4","pages":"3092-3105","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tmc/HuangZWMCFD24","doi":"10.1109/TMC.2023.3273213","ee":"https://doi.org/10.1109/TMC.2023.3273213","url":"https://dblp.org/rec/journals/tmc/HuangZWMCFD24"}, "url":"URL#42714" }, { "@score":"4", "@id":"43480", "info":{"authors":{"author":[{"@pid":"33/8196","text":"Mingyu Kang"},{"@pid":"31/10608","text":"Ran Zhu"},{"@pid":"223/9507","text":"Duxin Chen"},{"@pid":"86/10620","text":"Xiaolu Liu"},{"@pid":"68/6277","text":"Wenwu Yu"}]},"title":"CM-GAN: A Cross-Modal Generative Adversarial Network for Imputing Completely Missing Data in Digital Industry.","venue":"IEEE Trans. Neural Networks Learn. Syst.","volume":"35","number":"3","pages":"2917-2926","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tnn/KangZCLY24","doi":"10.1109/TNNLS.2023.3284666","ee":"https://doi.org/10.1109/TNNLS.2023.3284666","url":"https://dblp.org/rec/journals/tnn/KangZCLY24"}, "url":"URL#43480" }, { "@score":"3", "@id":"43582", "info":{"authors":{"author":[{"@pid":"35/8418","text":"J. Senthilnath 0001"},{"@pid":"224/7481","text":"Nagaraj G"},{"@pid":"224/7621","text":"Sumanth Simha C"},{"@pid":"177/7306","text":"Sushant Kulkarni"},{"@pid":"224/7432","text":"Meenakumari Thapa"},{"@pid":"224/7631","text":"Indiramma M"},{"@pid":"79/3767","text":"Jón Atli Benediktsson"}]},"title":"DRBM-ClustNet: A Deep Restricted Boltzmann-Kohonen Architecture for Data Clustering.","venue":"IEEE Trans. Neural Networks Learn. Syst.","volume":"35","number":"2","pages":"2560-2574","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tnn/SenthilnathGCKTMB24","doi":"10.1109/TNNLS.2022.3190439","ee":"https://doi.org/10.1109/TNNLS.2022.3190439","url":"https://dblp.org/rec/journals/tnn/SenthilnathGCKTMB24"}, "url":"URL#43582" }, { "@score":"3", "@id":"43749", "info":{"authors":{"author":[{"@pid":"46/9200","text":"Garima Chopra"},{"@pid":"171/5993","text":"Shalli Rani"},{"@pid":"57/9993","text":"Gautam Srivastava 0001"}]},"title":"ACGMA: Adaptive Channel Gain Multiple Access Scheme for Data Rate Improvement in Ultra-Dense Networks.","venue":"IEEE Trans. Netw. Sci. Eng.","volume":"11","number":"2","pages":"2204-2214","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tnse/ChopraRS24","doi":"10.1109/TNSE.2023.3341582","ee":"https://doi.org/10.1109/TNSE.2023.3341582","url":"https://dblp.org/rec/journals/tnse/ChopraRS24"}, "url":"URL#43749" }, { "@score":"3", "@id":"43887", "info":{"authors":{"author":[{"@pid":"32/5332","text":"Hui Zeng"},{"@pid":"67/4307","text":"Zhou Su"},{"@pid":"159/4497","text":"Qichao Xu"},{"@pid":"50/7188-1","text":"Kuan Zhang 0001"},{"@pid":"31/334-2","text":"Qiang Ye 0002"}]},"title":"Game Theoretical Incentive for USV Fleet-Assisted Data Sharing in Maritime Communication Networks.","venue":"IEEE Trans. Netw. Sci. Eng.","volume":"11","number":"2","pages":"1398-1412","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tnse/ZengSXZY24","doi":"10.1109/TNSE.2023.3299462","ee":"https://doi.org/10.1109/TNSE.2023.3299462","url":"https://dblp.org/rec/journals/tnse/ZengSXZY24"}, "url":"URL#43887" }, { "@score":"3", "@id":"43928", "info":{"authors":{"author":[{"@pid":"206/9845","text":"Mohamed Kadry Elhattab"},{"@pid":"36/9808","text":"Maurice Khabbaz"},{"@pid":"353/0916","text":"Nassr Al-Dahabreh"},{"@pid":"139/9731","text":"Ribal Atallah"},{"@pid":"a/ChadiAssi","text":"Chadi Assi"}]},"title":"Leveraging Real-World Data Sets for QoE Enhancement in Public Electric Vehicles Charging Networks.","venue":"IEEE Trans. Netw. Serv. Manag.","volume":"21","number":"1","pages":"217-231","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tnsm/ElhattabKAAA24","doi":"10.1109/TNSM.2023.3293460","ee":"https://doi.org/10.1109/TNSM.2023.3293460","url":"https://dblp.org/rec/journals/tnsm/ElhattabKAAA24"}, "url":"URL#43928" }, { "@score":"3", "@id":"43979", "info":{"authors":{"author":[{"@pid":"27/6045-4","text":"Hua Wu 0004"},{"@pid":"60/7006","text":"Yujie Liu"},{"@pid":"99/4812-1","text":"Guang Cheng 0001"},{"@pid":"66/1557","text":"Xiaoyan Hu"}]},"title":"RT-CBCH: Real-Time VPN Traffic Service Identification Based on Sampled Data in High-Speed Networks.","venue":"IEEE Trans. Netw. Serv. Manag.","volume":"21","number":"1","pages":"88-107","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tnsm/WuLCH24","doi":"10.1109/TNSM.2023.3286446","ee":"https://doi.org/10.1109/TNSM.2023.3286446","url":"https://dblp.org/rec/journals/tnsm/WuLCH24"}, "url":"URL#43979" }, { "@score":"3", "@id":"43980", "info":{"authors":{"author":[{"@pid":"06/6984","text":"Jiaxin Wu"},{"@pid":"21/1136","text":"Jigang Wu"},{"@pid":"64/5725-6","text":"Long Chen 0006"},{"@pid":"27/3389","text":"Yifei Sun"},{"@pid":"18/9166","text":"Yalan Wu"}]},"title":"Joint Dataset Reconstruction and Power Control for Distributed Training in D2D Edge Network.","venue":"IEEE Trans. Netw. Serv. Manag.","volume":"21","number":"1","pages":"132-147","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tnsm/WuWCSW24","doi":"10.1109/TNSM.2023.3288738","ee":"https://doi.org/10.1109/TNSM.2023.3288738","url":"https://dblp.org/rec/journals/tnsm/WuWCSW24"}, "url":"URL#43980" }, { "@score":"3", "@id":"44373", "info":{"authors":{"author":[{"@pid":"162/1613","text":"Jiaqi Zheng 0001"},{"@pid":"308/2220","text":"Zhuoxuan Du"},{"@pid":"369/5752","text":"Zhenqing Zha"},{"@pid":"211/3246","text":"Zixuan Yang"},{"@pid":"95/6947-1","text":"Xiaofeng Gao 0001"},{"@pid":"51/1742","text":"Guihai Chen"}]},"title":"Learning to Configure Converters in Hybrid Switching Data Center Networks.","venue":"IEEE/ACM Trans. Netw.","volume":"32","number":"1","pages":"520-534","year":"2024","type":"Journal Articles","access":"closed","key":"journals/ton/ZhengDZYGC24","doi":"10.1109/TNET.2023.3294803","ee":"https://doi.org/10.1109/TNET.2023.3294803","url":"https://dblp.org/rec/journals/ton/ZhengDZYGC24"}, "url":"URL#44373" }, { "@score":"3", "@id":"44478", "info":{"authors":{"author":[{"@pid":"66/9553-1","text":"Rahul Mishra 0001"},{"@pid":"126/2508","text":"Hari Prabhat Gupta"}]},"title":"A Model Personalization-based Federated Learning Approach for Heterogeneous Participants with Variability in the Dataset.","venue":"ACM Trans. Sens. Networks","volume":"20","number":"1","pages":"22:1-22:28","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tosn/MishraG24","doi":"10.1145/3629978","ee":"https://doi.org/10.1145/3629978","url":"https://dblp.org/rec/journals/tosn/MishraG24"}, "url":"URL#44478" }, { "@score":"5", "@id":"44489", "info":{"authors":{"author":[{"@pid":"286/8076","text":"Yuning Yu"},{"@pid":"286/7928","text":"Shanglin Hsu"},{"@pid":"169/3168","text":"Andre Chen"},{"@pid":"95/7441","text":"Yutian Chen"},{"@pid":"77/5837","text":"Bin Tang"}]},"title":"Truthful and Optimal Data Preservation in Base Station-less Sensor Networks: An Integrated Game Theory and Network Flow Approach.","venue":"ACM Trans. Sens. Networks","volume":"20","number":"1","pages":"5:1-5:40","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tosn/YuHCCT24","doi":"10.1145/3606263","ee":"https://doi.org/10.1145/3606263","url":"https://dblp.org/rec/journals/tosn/YuHCCT24"}, "url":"URL#44489" }, { "@score":"3", "@id":"44862", "info":{"authors":{"author":[{"@pid":"68/2777","text":"Jie Jian"},{"@pid":"09/10216","text":"Jinli Zhao"},{"@pid":"147/1332","text":"Haoran Ji"},{"@pid":"184/7422","text":"Linquan Bai"},{"@pid":"07/1951","text":"Jing Xu"},{"@pid":"83/6353-14","text":"Peng Li 0014"},{"@pid":"11/2350","text":"Jianzhong Wu"},{"@pid":"21/6014","text":"Chengshan Wang"}]},"title":"Supply Restoration of Data Centers in Flexible Distribution Networks With Spatial-Temporal Regulation.","venue":"IEEE Trans. Smart Grid","volume":"15","number":"1","pages":"340-354","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tsg/JianZJBXLWW24","doi":"10.1109/TSG.2023.3286844","ee":"https://doi.org/10.1109/TSG.2023.3286844","url":"https://dblp.org/rec/journals/tsg/JianZJBXLWW24"}, "url":"URL#44862" }, { "@score":"3", "@id":"44989", "info":{"authors":{"author":[{"@pid":"303/0789","text":"Chenghan Zhou"},{"@pid":"213/6349","text":"Guibin Zou"},{"@pid":"350/4408","text":"Maoran Zheng"},{"@pid":"308/5737","text":"Junyang Tian"},{"@pid":"369/8364","text":"Haiyong Li"},{"@pid":"51/3026","text":"Tao Du"}]},"title":"Reference Phasor-Based Data Self-Synchronization Scheme for Line Current Differential Protection in Active Distribution Networks.","venue":"IEEE Trans. Smart Grid","volume":"15","number":"2","pages":"1466-1480","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tsg/ZhouZZTLD24","doi":"10.1109/TSG.2023.3313188","ee":"https://doi.org/10.1109/TSG.2023.3313188","url":"https://dblp.org/rec/journals/tsg/ZhouZZTLD24"}, "url":"URL#44989" }, { "@score":"3", "@id":"45245", "info":{"authors":{"author":[{"@pid":"91/1898","text":"Juan Hu"},{"@pid":"35/1274-1","text":"Lei Zuo 0001"},{"@pid":"v/PKVarshney","text":"Pramod K. Varshney"},{"@pid":"129/8401","text":"Yongchan Gao"}]},"title":"Resource Allocation for Distributed Multitarget Tracking in Radar Networks With Missing Data.","venue":"IEEE Trans. Signal Process.","volume":"72","pages":"718-734","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tsp/HuZVG24","doi":"10.1109/TSP.2024.3352915","ee":"https://doi.org/10.1109/TSP.2024.3352915","url":"https://dblp.org/rec/journals/tsp/HuZVG24"}, "url":"URL#45245" }, { "@score":"3", "@id":"45546", "info":{"authors":{"author":[{"@pid":"128/3823","text":"Stefan Baumgartner"},{"@pid":"169/3551","text":"Gergo Bognár"},{"@pid":"77/2481","text":"Oliver Lang"},{"@pid":"87/983","text":"Mario Huemer"}]},"title":"Neural Network Approaches for Data Estimation in Unique Word OFDM Systems.","venue":"IEEE Trans. Veh. Technol.","volume":"73","number":"3","pages":"3690-3706","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tvt/BaumgartnerBLH24","doi":"10.1109/TVT.2023.3325367","ee":"https://doi.org/10.1109/TVT.2023.3325367","url":"https://dblp.org/rec/journals/tvt/BaumgartnerBLH24"}, "url":"URL#45546" }, { "@score":"3", "@id":"45812", "info":{"authors":{"author":[{"@pid":"182/7362","text":"Maoqiang Wu"},{"@pid":"179/5644","text":"Guoliang Cheng"},{"@pid":"54/80","text":"Dongdong Ye"},{"@pid":"145/4239","text":"Jiawen Kang"},{"@pid":"91/1334","text":"Rong Yu"},{"@pid":"41/5176-1","text":"Yuan Wu 0001"},{"@pid":"16/1033","text":"Miao Pan"}]},"title":"Federated Split Learning With Data and Label Privacy Preservation in Vehicular Networks.","venue":"IEEE Trans. Veh. Technol.","volume":"73","number":"1","pages":"1223-1238","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tvt/WuCYKYWP24","doi":"10.1109/TVT.2023.3304176","ee":"https://doi.org/10.1109/TVT.2023.3304176","url":"https://dblp.org/rec/journals/tvt/WuCYKYWP24"}, "url":"URL#45812" }, { "@score":"3", "@id":"45955", "info":{"authors":{"author":[{"@pid":"25/6052","text":"Minsu Kim"},{"@pid":"37/1760","text":"Jemin Lee"},{"@pid":"21/506","text":"Kaibin Huang"}]},"title":"Precoding Design for Ensuring Data Freshness in Multi-User MISO Networks.","venue":"IEEE Trans. Wirel. Commun.","volume":"23","number":"3","pages":"2383-2395","year":"2024","type":"Journal Articles","access":"closed","key":"journals/twc/KimLH24","doi":"10.1109/TWC.2023.3298000","ee":"https://doi.org/10.1109/TWC.2023.3298000","url":"https://dblp.org/rec/journals/twc/KimLH24"}, "url":"URL#45955" }, { "@score":"3", "@id":"46709", "info":{"authors":{"author":[{"@pid":"369/9193","text":"A. Poobalan"},{"@pid":"172/3488","text":"P. Shanthakumar"},{"@pid":"369/9062","text":"M. Robinson Joel"}]},"title":"Hybrid optimization enabled VM scaling based load distribution and optimal switching strategy in cloud data center.","venue":"Wirel. Networks","volume":"30","number":"2","pages":"1085-1105","year":"2024","type":"Journal Articles","access":"closed","key":"journals/winet/PoobalanSJ24","doi":"10.1007/S11276-023-03532-0","ee":"https://doi.org/10.1007/s11276-023-03532-0","url":"https://dblp.org/rec/journals/winet/PoobalanSJ24"}, "url":"URL#46709" }, { "@score":"3", "@id":"46711", "info":{"authors":{"author":[{"@pid":"178/5547","text":"K. Rajkumar"},{"@pid":"348/3815","text":"U. Hariharan"},{"@pid":"172/5905","text":"V. Dhanakoti"},{"@pid":"159/6671","text":"N. Muthukumaran"}]},"title":"A secure framework for managing data in cloud storage using rapid asymmetric maximum based dynamic size chunking and fuzzy logic for deduplication.","venue":"Wirel. Networks","volume":"30","number":"1","pages":"321-334","year":"2024","type":"Journal Articles","access":"closed","key":"journals/winet/RajkumarHDM24","doi":"10.1007/S11276-023-03448-9","ee":"https://doi.org/10.1007/s11276-023-03448-9","url":"https://dblp.org/rec/journals/winet/RajkumarHDM24"}, "url":"URL#46711" }, { "@score":"3", "@id":"46983", "info":{"authors":{"author":{"@pid":"224/1604","text":"Amine Barrak"}},"title":"Incorporating Serverless Computing into P2P Networks for ML Training: In-Database Tasks and Their Scalability Implications (Student Abstract).","venue":"AAAI","pages":"23439-23440","year":"2024","type":"Conference and Workshop Papers","access":"closed","key":"conf/aaai/Barrak24a","doi":"10.1609/AAAI.V38I21.30419","ee":"https://doi.org/10.1609/aaai.v38i21.30419","url":"https://dblp.org/rec/conf/aaai/Barrak24a"}, "url":"URL#46983" }, { "@score":"3", "@id":"47905", "info":{"authors":{"author":[{"@pid":"366/5743","text":"Dexu Kong"},{"@pid":"359/8180","text":"Anping Zhang"},{"@pid":"37/4190","text":"Yang Li"}]},"title":"Learning Persistent Community Structures in Dynamic Networks via Topological Data Analysis.","venue":"AAAI","pages":"8617-8626","year":"2024","type":"Conference and Workshop Papers","access":"closed","key":"conf/aaai/KongZL24","doi":"10.1609/AAAI.V38I8.28706","ee":"https://doi.org/10.1609/aaai.v38i8.28706","url":"https://dblp.org/rec/conf/aaai/KongZL24"}, "url":"URL#47905" }, { "@score":"3", "@id":"49800", "info":{"authors":{"author":[{"@pid":"255/7615","text":"Luis Carlos Rivera Monroy"},{"@pid":"311/5174","text":"Leonhard Rist"},{"@pid":"165/1747","text":"Martin Eberhardt"},{"@pid":"333/0667","text":"Christian Ostalecki"},{"@pid":"116/1833","text":"Andreas Bauer"},{"@pid":"47/1352","text":"Julio Vera"},{"@pid":"146/6667","text":"Katharina Breininger"},{"@pid":"131/7133","text":"Andreas K. Maier"}]},"title":"Comparative Analysis of Radiomic Features and Gene Expression Profiles in Histopathology Data using Graph Neural Networks.","venue":"Bildverarbeitung für die Medizin","pages":"160-165","year":"2024","type":"Conference and Workshop Papers","access":"closed","key":"conf/bildmed/MonroyREOBVBM24","doi":"10.1007/978-3-658-44037-4_49","ee":"https://doi.org/10.1007/978-3-658-44037-4_49","url":"https://dblp.org/rec/conf/bildmed/MonroyREOBVBM24"}, "url":"URL#49800" }, { "@score":"3", "@id":"50015", "info":{"authors":{"author":[{"@pid":"343/0486","text":"Finn Siegel"},{"@pid":"268/0081","text":"Christian Buj"},{"@pid":"343/1386","text":"Ricarda Merfort"},{"@pid":"25/4650","text":"Andreas Hein 0001"},{"@pid":"59/7923","text":"Frerk Müller-von Aschwege"}]},"title":"Evaluating the Viability of Neural Networks for Analysing Electromyography Data in Home Rehabilitation: Estimating Foot Progression Angle.","venue":"BIOSTEC","pages":"132-141","year":"2024","type":"Conference and Workshop Papers","access":"closed","key":"conf/biostec/SiegelBM0A24","doi":"10.5220/0012385100003657","ee":"https://doi.org/10.5220/0012385100003657","url":"https://dblp.org/rec/conf/biostec/SiegelBM0A24"}, "url":"URL#50015" }, { "@score":"4", "@id":"50043", "info":{"authors":{"author":[{"@pid":"75/3158","text":"Zhe Wang"},{"@pid":"s/AnthonyStell","text":"Anthony Stell"},{"@pid":"371/2728","text":"Jean Paul Vera Soto"},{"@pid":"99/6289","text":"Richard O. Sinnott"}]},"title":"e-Consent in Biomedical Research Registries: A GDPR-Compliant Approach Explored in the Context of the Australasian Diabetes Data Network.","venue":"BIOSTEC","pages":"45-55","year":"2024","type":"Conference and Workshop Papers","access":"closed","key":"conf/biostec/WangSSS24","doi":"10.5220/0012327200003657","ee":"https://doi.org/10.5220/0012327200003657","url":"https://dblp.org/rec/conf/biostec/WangSSS24"}, "url":"URL#50043" }, { "@score":"3", "@id":"50219", "info":{"authors":{"author":[{"@pid":"20/7949","text":"Neminath Hubballi"},{"@pid":"172/1644","text":"Pankaj Chaudhary"},{"@pid":"185/5705","text":"Sameer G. Kulkarni"}]},"title":"PePC: Popularity Based Early Predictive Caching in Named Data Networks.","venue":"CCNC","pages":"478-483","year":"2024","type":"Conference and Workshop Papers","access":"closed","key":"conf/ccnc/HubballiCK24","doi":"10.1109/CCNC51664.2024.10454826","ee":"https://doi.org/10.1109/CCNC51664.2024.10454826","url":"https://dblp.org/rec/conf/ccnc/HubballiCK24"}, "url":"URL#50219" }, { "@score":"4", "@id":"50385", "info":{"authors":{"author":[{"@pid":"371/6288","text":"Siang-Jhen Wu"},{"@pid":"70/538","text":"Chien Chen"},{"@pid":"81/797","text":"Jyh-Cheng Chen"}]},"title":"Design and Implementation of Data Plane Supporting Time-Sensitive Networking in 5G Networks.","venue":"CCNC","pages":"905-911","year":"2024","type":"Conference and Workshop Papers","access":"closed","key":"conf/ccnc/WuCC24","doi":"10.1109/CCNC51664.2024.10454733","ee":"https://doi.org/10.1109/CCNC51664.2024.10454733","url":"https://dblp.org/rec/conf/ccnc/WuCC24"}, "url":"URL#50385" }, { "@score":"3", "@id":"50441", "info":{"authors":{"author":[{"@pid":"261/1308","text":"Shivanjali Khare"},{"@pid":"365/8842","text":"Nahom H. Demoz"},{"@pid":"369/7578","text":"Medha Kanu Baniya"}]},"title":"Data-Driven Approach to Identify Connectivity and Bus stop Importance in Transit Network.","venue":"CCWC","pages":"701-707","year":"2024","type":"Conference and Workshop Papers","access":"closed","key":"conf/ccwc/KhareDB24","doi":"10.1109/CCWC60891.2024.10427841","ee":"https://doi.org/10.1109/CCWC60891.2024.10427841","url":"https://dblp.org/rec/conf/ccwc/KhareDB24"}, "url":"URL#50441" }, { "@score":"3", "@id":"50757", "info":{"authors":{"author":[{"@pid":"227/8031","text":"Meenu Rani Dey"},{"@pid":"369/8902","text":"Vignesh Ravichandra Rao"},{"@pid":"38/10604","text":"Moumita Patra"}]},"title":"RAFDD: Relay-Assisted Fast Data Dissemination in 5G-V2X Networks.","venue":"COMSNETS","pages":"577-581","year":"2024","type":"Conference and Workshop Papers","access":"closed","key":"conf/comsnets/DeyRP24","doi":"10.1109/COMSNETS59351.2024.10427383","ee":"https://doi.org/10.1109/COMSNETS59351.2024.10427383","url":"https://dblp.org/rec/conf/comsnets/DeyRP24"}, "url":"URL#50757" }, { "@score":"3", "@id":"52070", "info":{"authors":{"author":[{"@pid":"351/8939","text":"Maria Kandaurova"},{"@pid":"364/1063","text":"Daniel A. Skog"}]},"title":"Initiating and expanding data network effects: A longitudinal case study of generativity in the evolution of an AI platform.","venue":"HICSS","pages":"6250-6259","year":"2024","type":"Conference and Workshop Papers","access":"open","key":"conf/hicss/KandaurovaS24","ee":"https://hdl.handle.net/10125/107135","url":"https://dblp.org/rec/conf/hicss/KandaurovaS24"}, "url":"URL#52070" }, { "@score":"3", "@id":"52321", "info":{"authors":{"author":[{"@pid":"p/StefanPickl","text":"Stefan Pickl"},{"@pid":"28/909","text":"Alexander B. Bordetsky"},{"@pid":"b/WolfgangWBein","text":"Wolfgang Bein"}]},"title":"Introduction to the Minitrack on Intelligent Decision Support on Networks - Data-driven Optimization, Augmented and Explainable AI in Complex Supply Chains.","venue":"HICSS","pages":"1400","year":"2024","type":"Conference and Workshop Papers","access":"open","key":"conf/hicss/PicklBB24","ee":"https://hdl.handle.net/10125/106550","url":"https://dblp.org/rec/conf/hicss/PicklBB24"}, "url":"URL#52321" }, { "@score":"3", "@id":"53506", "info":{"authors":{"author":[{"@pid":"137/8767-1","text":"Chetna Singhal 0001"},{"@pid":"317/6613","text":"Subhrajit Barick"},{"@pid":"359/9385","text":"Rishabh Sonkar"}]},"title":"Application and Energy-Aware Data Aggregation using Vector Synchronization in Distributed Battery-less IoT Networks.","venue":"ICDCN","pages":"222-231","year":"2024","type":"Conference and Workshop Papers","access":"closed","key":"conf/icdcn/0001BS24","doi":"10.1145/3631461.3631560","ee":"https://doi.org/10.1145/3631461.3631560","url":"https://dblp.org/rec/conf/icdcn/0001BS24"}, "url":"URL#53506" }, { "@score":"3", "@id":"53792", "info":{"authors":{"author":[{"@pid":"369/7381","text":"Sharmin Sharmin"},{"@pid":"182/7695","text":"Ismail Ahmedy"},{"@pid":"93/11067","text":"Rafidah Md Noor"},{"@pid":"44/10129","text":"Habibah Ismail"}]},"title":"Using Hybrid Genetic Algorithm for Data Aggregation in Wireless Sensor Networks.","venue":"IMCOM","pages":"1-7","year":"2024","type":"Conference and Workshop Papers","access":"closed","key":"conf/icuimc/SharminANI24","doi":"10.1109/IMCOM60618.2024.10418358","ee":"https://doi.org/10.1109/IMCOM60618.2024.10418358","url":"https://dblp.org/rec/conf/icuimc/SharminANI24"}, "url":"URL#53792" }, { "@score":"3", "@id":"54051", "info":{"authors":{"author":[{"@pid":"207/3816","text":"Abhishek Saini"},{"@pid":"195/2506","text":"Pratyasa Bhui"}]},"title":"False Data Injection Attacks Detection in Wide Area Damping Control System Using Semi-Supervised Generative Adversarial Network Model.","venue":"ISGT","pages":"1-5","year":"2024","type":"Conference and Workshop Papers","access":"closed","key":"conf/isgt/SainiB24","doi":"10.1109/ISGT59692.2024.10454173","ee":"https://doi.org/10.1109/ISGT59692.2024.10454173","url":"https://dblp.org/rec/conf/isgt/SainiB24"}, "url":"URL#54051" }, { "@score":"3", "@id":"54192", "info":{"authors":{"author":[{"@pid":"91/112","text":"Ying Liu"},{"@pid":"32/333-2","text":"Yufei Ma 0002"},{"@pid":"370/7872","text":"Ninghui Shang"},{"@pid":"141/9929","text":"Tianhao Zhao"},{"@pid":"164/1572","text":"Peiyu Chen"},{"@pid":"19/5921","text":"Meng Wu"},{"@pid":"196/1859","text":"Jiayoon Ru"},{"@pid":"170/2996","text":"Tianyu Jia"},{"@pid":"94/9850","text":"Le Ye"},{"@pid":"217/4026","text":"Zhixuan Wang"},{"@pid":"47/5619","text":"Ru Huang"}]},"title":"30.2 A 22nm 0.26nW/Synapse Spike-Driven Spiking Neural Network Processing Unit Using Time-Step-First Dataflow and Sparsity-Adaptive In-Memory Computing.","venue":"ISSCC","pages":"484-486","year":"2024","type":"Conference and Workshop Papers","access":"closed","key":"conf/isscc/LiuMSZCWRJYWH24","doi":"10.1109/ISSCC49657.2024.10454472","ee":"https://doi.org/10.1109/ISSCC49657.2024.10454472","url":"https://dblp.org/rec/conf/isscc/LiuMSZCWRJYWH24"}, "url":"URL#54192" }, { "@score":"3", "@id":"54678", "info":{"authors":{"author":[{"@pid":"371/4804","text":"Luiz Henrique Quevedo Lima"},{"@pid":"176/1742","text":"Adriana S. Pagano"},{"@pid":"47/2795","text":"Ana Paula Couto da Silva"}]},"title":"Toxic Content Detection in online social networks: a new dataset from Brazilian Reddit Communities.","venue":"PROPOR","pages":"472-482","year":"2024","type":"Conference and Workshop Papers","access":"closed","key":"conf/propor/LimaPS24","ee":"https://aclanthology.org/2024.propor-1.48","url":"https://dblp.org/rec/conf/propor/LimaPS24"}, "url":"URL#54678" }, { "@score":"4", "@id":"55744", "info":{"authors":{"author":[{"@pid":"163/4176","text":"Faisal Rehman"},{"@pid":"345/0715","text":"Hanan Sharif"},{"@pid":"98/7524","text":"Muhammad Anwar"},{"@pid":"20/5675","text":"Naveed Riaz"}]},"title":"Big Data Analytics for Cybersecurity in IoE Networks.","venue":"Cybersecurity Vigilance and Security Engineering of Internet of Everything","pages":"163-176","year":"2024","type":"Parts in Books or Collections","access":"closed","key":"books/sp/24/RehmanSAR24","doi":"10.1007/978-3-031-45162-1_10","ee":"https://doi.org/10.1007/978-3-031-45162-1_10","url":"https://dblp.org/rec/books/sp/24/RehmanSAR24"}, "url":"URL#55744" }, { "@score":"3", "@id":"55823", "info":{"authors":{"author":[{"@pid":"168/8318","text":"Minh Hoàng Hà"},{"@pid":"26/4253","text":"Xingquan Zhu 0001"},{"@pid":"63/4711","text":"My T. Thai"}]},"title":"Computational Data and Social Networks - 12th International Conference, CSoNet 2023, Hanoi, Vietnam, December 11-13, 2023, Proceedings","venue":["CSoNet","Lecture Notes in Computer Science"],"volume":"14479","publisher":"Springer","year":"2024","type":"Editorship","key":"conf/csonet/2023","doi":"10.1007/978-981-97-0669-3","ee":"https://doi.org/10.1007/978-981-97-0669-3","url":"https://dblp.org/rec/conf/csonet/2023"}, "url":"URL#55823" }, { "@score":"3", "@id":"56053", "info":{"authors":{"author":[{"@pid":"253/0389","text":"Michael Aichem"},{"@pid":"19/5555","text":"Karsten Klein 0001"},{"@pid":"98/2841","text":"Stephen G. Kobourov"},{"@pid":"s/FalkSchreiber","text":"Falk Schreiber"}]},"title":"Supplemental Materials for: "De-emphasise, Aggregate, and Hide: A Study on Interactive Visual Transformations for Group Structures in Network Visualisations".","venue":"DaRUS","publisher":"DaRUS","year":"2024","type":"Data and Artifacts","access":"open","key":"data/10/AichemKKS24","doi":"10.18419/DARUS-3706&VERSION=2.0","ee":"https://darus.uni-stuttgart.de/dataset.xhtml?persistentId=doi:10.18419/darus-3706&version=2.0","url":"https://dblp.org/rec/data/10/AichemKKS24"}, "url":"URL#56053" }, { "@score":"3", "@id":"56255", "info":{"authors":{"author":[{"@pid":"38/7211","text":"David López-Pérez"},{"@pid":"97/10238","text":"Antonio De Domenico"},{"@pid":"179/2156","text":"Nicola Piovesan"},{"@pid":"75/4085","text":"Mérouane Debbah"}]},"title":"Data-driven Energy Efficiency Modelling in Large-scale Networks: An Expert Knowledge and ML-based Approach.","venue":"CoRR","volume":"abs/2401.00443","year":"2024","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2401-00443","doi":"10.48550/ARXIV.2401.00443","ee":"https://doi.org/10.48550/arXiv.2401.00443","url":"https://dblp.org/rec/journals/corr/abs-2401-00443"}, "url":"URL#56255" }, { "@score":"3", "@id":"56817", "info":{"authors":{"author":[{"@pid":"338/7804","text":"Andreas Casparsen"},{"@pid":"78/4102","text":"Beatriz Soret"},{"@pid":"67/8332","text":"Jimmy Jessen Nielsen"},{"@pid":"50/3930","text":"Petar Popovski"}]},"title":"Near Real-Time Data-Driven Control of Virtual Reality Traffic in Open Radio Access Network.","venue":"CoRR","volume":"abs/2401.01652","year":"2024","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2401-01652","doi":"10.48550/ARXIV.2401.01652","ee":"https://doi.org/10.48550/arXiv.2401.01652","url":"https://dblp.org/rec/journals/corr/abs-2401-01652"}, "url":"URL#56817" }, { "@score":"3", "@id":"57166", "info":{"authors":{"author":[{"@pid":"125/8978","text":"Botao Zhu"},{"@pid":"54/11255","text":"Ebrahim Bedeer"},{"@pid":"55/1768-1","text":"Ha H. Nguyen 0001"},{"@pid":"81/5580","text":"Robert Barton"},{"@pid":"71/1107-1","text":"Zhen Gao 0001"}]},"title":"UAV Trajectory Planning for AoI-Minimal Data Collection in UAV-Aided IoT Networks by Transformer.","venue":"CoRR","volume":"abs/2401.02425","year":"2024","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2401-02425","doi":"10.48550/ARXIV.2401.02425","ee":"https://doi.org/10.48550/arXiv.2401.02425","url":"https://dblp.org/rec/journals/corr/abs-2401-02425"}, "url":"URL#57166" }, { "@score":"3", "@id":"57530", "info":{"authors":{"author":[{"@pid":"366/5743","text":"Dexu Kong"},{"@pid":"359/8180","text":"Anping Zhang"},{"@pid":"37/4190","text":"Yang Li"}]},"title":"Learning Persistent Community Structures in Dynamic Networks via Topological Data Analysis.","venue":"CoRR","volume":"abs/2401.03194","year":"2024","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2401-03194","doi":"10.48550/ARXIV.2401.03194","ee":"https://doi.org/10.48550/arXiv.2401.03194","url":"https://dblp.org/rec/journals/corr/abs-2401-03194"}, "url":"URL#57530" }, { "@score":"3", "@id":"58146", "info":{"authors":{"author":[{"@pid":"150/8048","text":"Radoslaw A. Kycia"},{"@pid":"141/7640","text":"Agnieszka Niemczynowicz"}]},"title":"Hypercomplex neural network in time series forecasting of stock data.","venue":"CoRR","volume":"abs/2401.04632","year":"2024","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2401-04632","doi":"10.48550/ARXIV.2401.04632","ee":"https://doi.org/10.48550/arXiv.2401.04632","url":"https://dblp.org/rec/journals/corr/abs-2401-04632"}, "url":"URL#58146" }, { "@score":"3", "@id":"58695", "info":{"authors":{"author":[{"@pid":"149/1041","text":"Yahui Fu"},{"@pid":"155/0152","text":"Haiyue Song"},{"@pid":"139/3492","text":"Tianyu Zhao"},{"@pid":"92/635","text":"Tatsuya Kawahara"}]},"title":"Enhancing Personality Recognition in Dialogue by Data Augmentation and Heterogeneous Conversational Graph Networks.","venue":"CoRR","volume":"abs/2401.05871","year":"2024","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2401-05871","doi":"10.48550/ARXIV.2401.05871","ee":"https://doi.org/10.48550/arXiv.2401.05871","url":"https://dblp.org/rec/journals/corr/abs-2401-05871"}, "url":"URL#58695" }, { "@score":"3", "@id":"58842", "info":{"authors":{"author":[{"@pid":"88/3604","text":"Jing Wu"},{"@pid":"92/5921","text":"Mehrtash Harandi"}]},"title":"Scissorhands: Scrub Data Influence via Connection Sensitivity in Networks.","venue":"CoRR","volume":"abs/2401.06187","year":"2024","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2401-06187","doi":"10.48550/ARXIV.2401.06187","ee":"https://doi.org/10.48550/arXiv.2401.06187","url":"https://dblp.org/rec/journals/corr/abs-2401-06187"}, "url":"URL#58842" }, { "@score":"3", "@id":"59283", "info":{"authors":{"author":[{"@pid":"131/6575","text":"Nicola Parolini"},{"@pid":"314/7973","text":"Andrea Poiatti"},{"@pid":"367/1016","text":"Julian Vene'"},{"@pid":"10/2970","text":"Marco Verani"}]},"title":"Structure-preserving neural networks in data-driven rheological models.","venue":"CoRR","volume":"abs/2401.07121","year":"2024","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2401-07121","doi":"10.48550/ARXIV.2401.07121","ee":"https://doi.org/10.48550/arXiv.2401.07121","url":"https://dblp.org/rec/journals/corr/abs-2401-07121"}, "url":"URL#59283" }, { "@score":"3", "@id":"59396", "info":{"authors":{"author":[{"@pid":"327/3518","text":"H. M. Imran Kays"},{"@pid":"322/1883","text":"Khondhaker Al Momin"},{"@pid":"336/2288","text":"K. K. "Muralee" Muraleetharan"},{"@pid":"199/2220","text":"Arif Mohaimin Sadri"}]},"title":"A Data-driven Resilience Framework of Directionality Configuration based on Topological Credentials in Road Networks.","venue":"CoRR","volume":"abs/2401.07371","year":"2024","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2401-07371","doi":"10.48550/ARXIV.2401.07371","ee":"https://doi.org/10.48550/arXiv.2401.07371","url":"https://dblp.org/rec/journals/corr/abs-2401-07371"}, "url":"URL#59396" }, { "@score":"3", "@id":"62213", "info":{"authors":{"author":[{"@pid":"319/9948","text":"David C. Kutner"},{"@pid":"s/IainAStewart","text":"Iain A. Stewart"}]},"title":"Reconfigurable routing in data center networks.","venue":"CoRR","volume":"abs/2401.13359","year":"2024","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2401-13359","doi":"10.48550/ARXIV.2401.13359","ee":"https://doi.org/10.48550/arXiv.2401.13359","url":"https://dblp.org/rec/journals/corr/abs-2401-13359"}, "url":"URL#62213" }, { "@score":"3", "@id":"62339", "info":{"authors":{"author":[{"@pid":"225/7837","text":"Emanuel Vieira"},{"@pid":"29/9486-2","text":"João Almeida 0002"},{"@pid":"70/1729","text":"Joaquim Ferreira 0001"},{"@pid":"33/2329","text":"Paulo C. Bartolomeu"}]},"title":"Enabling Seamless Data Security, Consensus, and Trading in Vehicular Networks.","venue":"CoRR","volume":"abs/2401.13630","year":"2024","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2401-13630","doi":"10.48550/ARXIV.2401.13630","ee":"https://doi.org/10.48550/arXiv.2401.13630","url":"https://dblp.org/rec/journals/corr/abs-2401-13630"}, "url":"URL#62339" }, { "@score":"3", "@id":"62469", "info":{"authors":{"author":[{"@pid":"308/3950","text":"Sinwoong Yun"},{"@pid":"236/3462","text":"Dongsun Kim"},{"@pid":"218/6872","text":"Chanwon Park"},{"@pid":"37/1760","text":"Jemin Lee"}]},"title":"Learning-based sensing and computing decision for data freshness in edge computing-enabled networks.","venue":"CoRR","volume":"abs/2401.13936","year":"2024","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2401-13936","doi":"10.48550/ARXIV.2401.13936","ee":"https://doi.org/10.48550/arXiv.2401.13936","url":"https://dblp.org/rec/journals/corr/abs-2401-13936"}, "url":"URL#62469" }, { "@score":"3", "@id":"63107", "info":{"authors":{"author":[{"@pid":"59/3394","text":"Zhaoyang Qu"},{"@pid":"231/4920","text":"Yunchang Dong"},{"@pid":"37/4190","text":"Yang Li"},{"@pid":"155/6875","text":"Siqi Song"},{"@pid":"j/TaoJiang-2","text":"Tao Jiang 0002"},{"@pid":"82/0","text":"Min Li"},{"@pid":"08/42","text":"Qiming Wang"},{"@pid":"181/2817","text":"Lei Wang"},{"@pid":"284/8879","text":"Xiaoyong Bo"},{"@pid":"367/4731","text":"Jiye Zang"},{"@pid":"84/1680","text":"Qi Xu"}]},"title":"Localization of Dummy Data Injection Attacks in Power Systems Considering Incomplete Topological Information: A Spatio-Temporal Graph Wavelet Convolutional Neural Network Approach.","venue":"CoRR","volume":"abs/2401.15321","year":"2024","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2401-15321","doi":"10.48550/ARXIV.2401.15321","ee":"https://doi.org/10.48550/arXiv.2401.15321","url":"https://dblp.org/rec/journals/corr/abs-2401-15321"}, "url":"URL#63107" }, { "@score":"3", "@id":"63995", "info":{"authors":{"author":[{"@pid":"239/0317","text":"Pablo Guarda"},{"@pid":"143/5963","text":"Sean Qian"}]},"title":"Traffic estimation in unobserved network locations using data-driven macroscopic models.","venue":"CoRR","volume":"abs/2401.17095","year":"2024","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2401-17095","doi":"10.48550/ARXIV.2401.17095","ee":"https://doi.org/10.48550/arXiv.2401.17095","url":"https://dblp.org/rec/journals/corr/abs-2401-17095"}, "url":"URL#63995" }, { "@score":"3", "@id":"64202", "info":{"authors":{"author":[{"@pid":"312/6066","text":"Cagri Ozdemir"},{"@pid":"275/7299","text":"Mohammad Al Olaimat"},{"@pid":"298/6800","text":"Yashu Vashishath"},{"@pid":"57/5723","text":"Serdar Bozdag"},{"@pid":"181/2673","text":"Alzheimer's Disease Neuroimaging Initiative"}]},"title":"IGCN: Integrative Graph Convolutional Networks for Multi-modal Data.","venue":"CoRR","volume":"abs/2401.17612","year":"2024","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2401-17612","doi":"10.48550/ARXIV.2401.17612","ee":"https://doi.org/10.48550/arXiv.2401.17612","url":"https://dblp.org/rec/journals/corr/abs-2401-17612"}, "url":"URL#64202" }, { "@score":"3", "@id":"64843", "info":{"authors":{"author":{"@pid":"359/5511","text":"Mohana Prasad Sathya Moorthy"}},"title":"Prioritising Interactive Flows in Data Center Networks With Central Control.","venue":"CoRR","volume":"abs/2402.00870","year":"2024","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2402-00870","doi":"10.48550/ARXIV.2402.00870","ee":"https://doi.org/10.48550/arXiv.2402.00870","url":"https://dblp.org/rec/journals/corr/abs-2402-00870"}, "url":"URL#64843" }, { "@score":"3", "@id":"68420", "info":{"authors":{"author":[{"@pid":"167/9724","text":"Ondrej Zelenka"},{"@pid":"124/5741","text":"Bernd Brügmann"},{"@pid":"266/9593","text":"Frank Ohme"}]},"title":"Convolutional Neural Networks for signal detection in real LIGO data.","venue":"CoRR","volume":"abs/2402.07492","year":"2024","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2402-07492","doi":"10.48550/ARXIV.2402.07492","ee":"https://doi.org/10.48550/arXiv.2402.07492","url":"https://dblp.org/rec/journals/corr/abs-2402-07492"}, "url":"URL#68420" }, { "@score":"3", "@id":"69394", "info":{"authors":{"author":[{"@pid":"312/1007","text":"Mengna Liu"},{"@pid":"74/1128","text":"Dong Xiang"},{"@pid":"30/828","text":"Xu Cheng"},{"@pid":"43/8119","text":"Xiufeng Liu"},{"@pid":"98/9560-1","text":"Dalin Zhang 0001"},{"@pid":"93/2479","text":"Shengyong Chen"},{"@pid":"j/ChristianSJensen","text":"Christian S. Jensen"}]},"title":"Disentangling Imperfect: A Wavelet-Infused Multilevel Heterogeneous Network for Human Activity Recognition in Flawed Wearable Sensor Data.","venue":"CoRR","volume":"abs/2402.09434","year":"2024","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2402-09434","doi":"10.48550/ARXIV.2402.09434","ee":"https://doi.org/10.48550/arXiv.2402.09434","url":"https://dblp.org/rec/journals/corr/abs-2402-09434"}, "url":"URL#69394" }, { "@score":"3", "@id":"69555", "info":{"authors":{"author":[{"@pid":"326/0222","text":"Pranshav Gajjar"},{"@pid":"366/6778","text":"Azuka J. Chiejina"},{"@pid":"169/4702","text":"Vijay K. Shah"}]},"title":"Preserving Data Privacy for ML-driven Applications in Open Radio Access Networks.","venue":"CoRR","volume":"abs/2402.09710","year":"2024","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2402-09710","doi":"10.48550/ARXIV.2402.09710","ee":"https://doi.org/10.48550/arXiv.2402.09710","url":"https://dblp.org/rec/journals/corr/abs-2402-09710"}, "url":"URL#69555" }, { "@score":"3", "@id":"70425", "info":{"authors":{"author":{"@pid":"228/0600","text":"Atefeh Mohseni-Ejiyeh"}},"title":"Secure, Robust, and Energy-Efficient Authenticated Data Sharing in UAV-Assisted 6G Networks.","venue":"CoRR","volume":"abs/2402.11382","year":"2024","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2402-11382","doi":"10.48550/ARXIV.2402.11382","ee":"https://doi.org/10.48550/arXiv.2402.11382","url":"https://dblp.org/rec/journals/corr/abs-2402-11382"}, "url":"URL#70425" }, { "@score":"3", "@id":"71326", "info":{"authors":{"author":[{"@pid":"42/8069","text":"Kourosh Parand"},{"@pid":"371/1002","text":"Saeed Setayeshi"},{"@pid":"76/7803","text":"Mir Mohsen Pedram"},{"@pid":"371/0867","text":"Ali Yoonesi"},{"@pid":"191/8875","text":"Aida Pakniyat"}]},"title":"Solving the decision-making differential equations from eye fixation data in Unity software by using Hermite Long-Short-Term Memory neural network.","venue":"CoRR","volume":"abs/2402.13027","year":"2024","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2402-13027","doi":"10.48550/ARXIV.2402.13027","ee":"https://doi.org/10.48550/arXiv.2402.13027","url":"https://dblp.org/rec/journals/corr/abs-2402-13027"}, "url":"URL#71326" }, { "@score":"3", "@id":"71583", "info":{"authors":{"author":[{"@pid":"28/6121","text":"Hongtao Huang"},{"@pid":"116/8412","text":"Xiaojun Chang"},{"@pid":"01/6410","text":"Wen Hu"},{"@pid":"56/6651-1","text":"Lina Yao 0001"}]},"title":"MatchNAS: Optimizing Edge AI in Sparse-Label Data Contexts via Automating Deep Neural Network Porting for Mobile Deployment.","venue":"CoRR","volume":"abs/2402.13525","year":"2024","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2402-13525","doi":"10.48550/ARXIV.2402.13525","ee":"https://doi.org/10.48550/arXiv.2402.13525","url":"https://dblp.org/rec/journals/corr/abs-2402-13525"}, "url":"URL#71583" }, { "@score":"3", "@id":"72782", "info":{"authors":{"author":[{"@pid":"157/4784","text":"Waseem Raza"},{"@pid":"80/10098","text":"Fahd Ahmed Khan"},{"@pid":"176/5841","text":"Muhammad Umar Bin Farooq"},{"@pid":"71/7908","text":"Sabit Ekin"},{"@pid":"167/1888","text":"Ali Imran 0001"}]},"title":"Positioning Error Impact Compensation through Data-Driven Optimization in User-Centric Networks.","venue":"CoRR","volume":"abs/2402.15795","year":"2024","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2402-15795","doi":"10.48550/ARXIV.2402.15795","ee":"https://doi.org/10.48550/arXiv.2402.15795","url":"https://dblp.org/rec/journals/corr/abs-2402-15795"}, "url":"URL#72782" }, { "@score":"3", "@id":"73826", "info":{"authors":{"author":[{"@pid":"64/8264","text":"Daniel Leite"},{"@pid":"194/6175","text":"Alisson Silva"},{"@pid":"83/9992","text":"Gabriella Casalino"},{"@pid":"217/2388","text":"Arnab Sharma"},{"@pid":"371/4342","text":"Danielle Fortunato"},{"@pid":"65/4336","text":"Axel-Cyrille Ngonga Ngomo"}]},"title":"EGNN-C+: Interpretable Evolving Granular Neural Network and Application in Classification of Weakly-Supervised EEG Data Streams.","venue":"CoRR","volume":"abs/2402.17792","year":"2024","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2402-17792","doi":"10.48550/ARXIV.2402.17792","ee":"https://doi.org/10.48550/arXiv.2402.17792","url":"https://dblp.org/rec/journals/corr/abs-2402-17792"}, "url":"URL#73826" }, { "@score":"4", "@id":"75150", "info":{"authors":{"author":[{"@pid":"128/5983","text":"Ilya Moiseenko"},{"@pid":"69/549","text":"Dave Oran"}]},"title":"Path Steering in Content-Centric Networking (CCNx) and Named Data Networking (NDN).","venue":"RFC","volume":"9531","pages":"1-19","year":"2024","type":"Informal and Other Publications","access":"closed","key":"journals/rfc/rfc9531","doi":"10.17487/RFC9531","ee":"https://doi.org/10.17487/RFC9531","url":"https://dblp.org/rec/journals/rfc/rfc9531"}, "url":"URL#75150" }, { "@score":"5", "@id":"75244", "info":{"authors":{"author":{"@pid":"125/3551","text":"Angelo Furno"}},"title":"Data-driven Approaches for Enhancing Resilience in Large-scale Transport Networks: A journey through data analysis, traffic modelling, complex networks and flexible software architectures for resilient and sustainable cities.","year":"2023","type":"Books and Theses","access":"closed","key":"books/hal/Furno23","ee":"https://tel.archives-ouvertes.fr/tel-04462782","url":"https://dblp.org/rec/books/hal/Furno23"}, "url":"URL#75244" }, { "@score":"3", "@id":"75263", "info":{"authors":{"author":{"@pid":"91/1805","text":"Moufida Maimour"}},"title":"Contributions for enabling high data rate applications in low-power networks.","year":"2023","type":"Books and Theses","access":"closed","key":"books/hal/Maimour23","ee":"https://tel.archives-ouvertes.fr/tel-04253876","url":"https://dblp.org/rec/books/hal/Maimour23"}, "url":"URL#75263" }, { "@score":"3", "@id":"76080", "info":{"authors":{"author":{"@pid":"194/2579","text":"Jorik Oostenbrink"}},"title":"A Data-Driven Approach to Disaster Resilience in Communication Networks.","year":"2023","type":"Books and Theses","access":"closed","key":"phd/basesearch/Oostenbrink23","doi":"10.4233/UUID:323B614E-C766-4C15-8FFF-8D4890C61806","ee":"http://resolver.tudelft.nl/uuid:323b614e-c766-4c15-8fff-8d4890c61806","url":"https://dblp.org/rec/phd/basesearch/Oostenbrink23"}, "url":"URL#76080" }, { "@score":"3", "@id":"76630", "info":{"authors":{"author":{"@pid":"319/1137","text":"Carina Heßeling"}},"title":"Network Storage Covert Channels in Sensor Data Transmissions based on Recoding IEEE 754-compliant Number Representations.","year":"2023","type":"Books and Theses","access":"closed","key":"phd/dnb/Hesseling23","ee":"https://ub-deposit.fernuni-hagen.de/receive/mir_mods_00001950","url":"https://dblp.org/rec/phd/dnb/Hesseling23"}, "url":"URL#76630" }, { "@score":"3", "@id":"77094", "info":{"authors":{"author":{"@pid":"218/6343","text":"Huanzhuo Wu"}},"title":"Accelerating Audio Data Analysis with In-Network Computing.","year":"2023","type":"Books and Theses","access":"closed","key":"phd/dnb/Wu23","ee":"https://nbn-resolving.org/urn:nbn:de:bsz:14-qucosa2-864977","url":"https://dblp.org/rec/phd/dnb/Wu23"}, "url":"URL#77094" }, { "@score":"3", "@id":"77260", "info":{"authors":{"author":{"@pid":"180/5433","text":"Siamak Solat"}},"title":"Novel fault-tolerant, self-configurable, scalable, secure, decentralized, and high-performance distributed database replication architecture using innovative sharding to enable the use of BFT consensus mechanisms in very large-scale networks.","year":"2023","type":"Books and Theses","access":"closed","key":"phd/fr/Solat2023","ee":"https://theses.hal.science/tel-04500272","url":"https://dblp.org/rec/phd/fr/Solat2023"}, "url":"URL#77260" }, { "@score":"3", "@id":"77563", "info":{"authors":{"author":{"@pid":"273/8117","text":"Kévin Ducharlet"}},"title":"Détection d'anomalies dans les flux de données pour une application dans les réseaux de capteurs. (Outlier detection in data streams with application to wireless sensor networks).","year":"2023","type":"Books and Theses","access":"closed","key":"phd/hal/Ducharlet23","ee":"https://tel.archives-ouvertes.fr/tel-04281671","url":"https://dblp.org/rec/phd/hal/Ducharlet23"}, "url":"URL#77563" }, { "@score":"3", "@id":"77812", "info":{"authors":{"author":{"@pid":"371/0762","text":"Jules Mabon"}},"title":"Learning stochastic geometry models and convolutional neural networks. Application to multiple object detection in aerospatial data sets. (Apprentissage de modèles de géométrie stochastique et réseaux de neurones convolutifs. Application à la détection d'objets multiples dans des jeux de données aérospatiales).","year":"2023","type":"Books and Theses","access":"closed","key":"phd/hal/Mabon23","ee":"https://tel.archives-ouvertes.fr/tel-04404849","url":"https://dblp.org/rec/phd/hal/Mabon23"}, "url":"URL#77812" }, { "@score":"3", "@id":"77842", "info":{"authors":{"author":{"@pid":"322/2987","text":"Gwen Maudet"}},"title":"Exploiting sensor similarity to enhance data collection in massive IoT networks. (Exploiter la similarité des capteurs pour améliorer la collecte de données dans les réseaux IoT massifs).","year":"2023","type":"Books and Theses","access":"closed","key":"phd/hal/Maudet23","ee":"https://tel.archives-ouvertes.fr/tel-04349604","url":"https://dblp.org/rec/phd/hal/Maudet23"}, "url":"URL#77842" }, { "@score":"3", "@id":"78035", "info":{"authors":{"author":{"@pid":"287/2835","text":"Gulshan Sihag"}},"title":"Evaluation of risk factors for falls in the elderly based on a real data set using Bayesian networks. (Evaluation des facteurs de risque de chute chez les personnes âgées à l'aide de réseaux bayésiens basés sur un ensemble de données réelles).","year":"2023","type":"Books and Theses","access":"closed","key":"phd/hal/Sihag23","ee":"https://tel.archives-ouvertes.fr/tel-04217971","url":"https://dblp.org/rec/phd/hal/Sihag23"}, "url":"URL#78035" }, { "@score":"3", "@id":"78280", "info":{"authors":{"author":{"@pid":"341/0653","text":"Anuarbek Amanov"}},"title":"Veri merkezlerinde derin pekiştirmeli öğrenme ile ağ trafik optimizasyonu (Network traffic optimization with deep reinforcement learning in data centers)","year":"2023","type":"Books and Theses","access":"closed","key":"phd/tr/Amanov23","ee":"https://tez.yok.gov.tr/UlusalTezMerkezi/tezDetay.jsp?id=XV6Z54LaE5AiIpL-jS157Q&no=9g45kyFqOAaWSEd6xyQ-0Q","url":"https://dblp.org/rec/phd/tr/Amanov23"}, "url":"URL#78280" }, { "@score":"3", "@id":"78483", "info":{"authors":{"author":[{"@pid":"12/2633-1","text":"Ting Wang 0001"},{"@pid":"50/3402","text":"Bo Li"},{"@pid":"95/573","text":"Mingsong Chen"},{"@pid":"90/3575-1","text":"Shui Yu 0001"}]},"title":"Machine Learning Empowered Intelligent Data Center Networking - Evolution, Challenges and Opportunities","venue":"Springer Briefs in Computer Science","pages":"1-109","publisher":"Springer","year":"2023","type":"Books and Theses","access":"closed","key":"series/sbcs/WangLCY23","doi":"10.1007/978-981-19-7395-6","ee":"https://doi.org/10.1007/978-981-19-7395-6","url":"https://dblp.org/rec/series/sbcs/WangLCY23"}, "url":"URL#78483" }, { "@score":"3", "@id":"78516", "info":{"authors":{"author":[{"@pid":"64/3041","text":"Chuan Shi"},{"@pid":"49/67-17","text":"Xiao Wang 0017"},{"@pid":"49/1457-2","text":"Cheng Yang 0002"}]},"title":"Advances in Graph Neural Networks","venue":"Synthesis Lectures on Data Mining and Knowledge Discovery","pages":"1-198","publisher":"Springer","year":"2023","type":"Books and Theses","access":"closed","key":"series/synthesis-dmk/2023Shi","doi":"10.1007/978-3-031-16174-2","ee":"https://doi.org/10.1007/978-3-031-16174-2","url":"https://dblp.org/rec/series/synthesis-dmk/2023Shi"}, "url":"URL#78516" }, { "@score":"3", "@id":"79077", "info":{"authors":{"author":[{"@pid":"217/7807","text":"Saurabh Kumar Srivastava"},{"@pid":"189/1837","text":"Ankit Vidyarthi"},{"@pid":"87/8467-1","text":"Sandeep Kumar Singh 0001"}]},"title":"Chapter Eleven - Modified ML-KNN: Role of similarity measures and nearest neighbor configuration in multi-label text classification on big social network graph data.","venue":"Adv. Comput.","volume":"128","pages":"287-312","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ac/SrivastavaVS23","doi":"10.1016/BS.ADCOM.2021.10.006","ee":"https://doi.org/10.1016/bs.adcom.2021.10.006","url":"https://dblp.org/rec/journals/ac/SrivastavaVS23"}, "url":"URL#79077" }, { "@score":"3", "@id":"79298", "info":{"authors":{"author":[{"@pid":"57/10003","text":"Ijaz Ahmed"},{"@pid":"75/10581-1","text":"Muhammad Rehan 0001"},{"@pid":"28/1807","text":"Abdul Basit"},{"@pid":"04/4749","text":"Muhammad Tufail"},{"@pid":"25/1761","text":"Keum-Shik Hong"}]},"title":"Neuro-Fuzzy and Networks-Based Data Driven Model for Multi-Charging Scenarios of Plug-in-Electric Vehicles.","venue":"IEEE Access","volume":"11","pages":"87150-87165","year":"2023","type":"Journal Articles","access":"open","key":"journals/access/AhmedRBTH23a","doi":"10.1109/ACCESS.2023.3303963","ee":"https://doi.org/10.1109/ACCESS.2023.3303963","url":"https://dblp.org/rec/journals/access/AhmedRBTH23a"}, "url":"URL#79298" }, { "@score":"4", "@id":"79411", "info":{"authors":{"author":[{"@pid":"263/1044","text":"Nadia Adnan Shiltagh Al-Jamali"},{"@pid":"219/6371","text":"Ibtesam R. K. Al-Saedi"},{"@pid":"359/0685","text":"Ahmed R. Zarzoor"},{"@pid":"62/442","text":"Hongxiang Li"}]},"title":"A New Imputation Technique Based a Multi-Spike Neural Network to Handle Missing Data in the Internet of Things Network (IoT).","venue":"IEEE Access","volume":"11","pages":"112841-112850","year":"2023","type":"Journal Articles","access":"open","key":"journals/access/AlJamaliAZL23","doi":"10.1109/ACCESS.2023.3323435","ee":"https://doi.org/10.1109/ACCESS.2023.3323435","url":"https://dblp.org/rec/journals/access/AlJamaliAZL23"}, "url":"URL#79411" }, { "@score":"3", "@id":"79788", "info":{"authors":{"author":[{"@pid":"354/5859","text":"Reem Amr"},{"@pid":"158/2373","text":"Nawal A. Zaher"},{"@pid":"139/9186","text":"Safa M. Gasser"},{"@pid":"324/6082","text":"Sherif K. El-Diasty"}]},"title":"A New Deep Spiking Architecture for Reconstruction of Compressed Data in Cognitive Radio Networks.","venue":"IEEE Access","volume":"11","pages":"84565-84573","year":"2023","type":"Journal Articles","access":"open","key":"journals/access/AmrZGE23","doi":"10.1109/ACCESS.2022.3213816","ee":"https://doi.org/10.1109/ACCESS.2022.3213816","url":"https://dblp.org/rec/journals/access/AmrZGE23"}, "url":"URL#79788" }, { "@score":"3", "@id":"79837", "info":{"authors":{"author":[{"@pid":"137/8143","text":"Fabio Anselmi"},{"@pid":"49/8284","text":"Luca Manzoni"},{"@pid":"91/1333","text":"Alberto d'Onofrio"},{"@pid":"41/2229","text":"Alex Rodriguez"},{"@pid":"47/6673","text":"Giulio Caravagna"},{"@pid":"32/1171","text":"Luca Bortolussi"},{"@pid":"248/4732","text":"Francesca Cairoli"}]},"title":"Data Symmetries and Learning in Fully Connected Neural Networks.","venue":"IEEE Access","volume":"11","pages":"47282-47290","year":"2023","type":"Journal Articles","access":"open","key":"journals/access/AnselmiMdRCBC23","doi":"10.1109/ACCESS.2023.3274938","ee":"https://doi.org/10.1109/ACCESS.2023.3274938","url":"https://dblp.org/rec/journals/access/AnselmiMdRCBC23"}, "url":"URL#79837" }, { "@score":"4", "@id":"80710", "info":{"authors":{"author":[{"@pid":"359/7286","text":"Suisheng Chen"},{"@pid":"36/3235","text":"Yun Wang"},{"@pid":"10/4661","text":"Wei Zhang"},{"@pid":"42/8498","text":"Hairong Zhang"},{"@pid":"05/9347","text":"Yuchen He"}]},"title":"Leak Detection in Water Supply Network Using a Data-Driven Improved Graph Convolutional Network.","venue":"IEEE Access","volume":"11","pages":"117240-117249","year":"2023","type":"Journal Articles","access":"open","key":"journals/access/ChenWZZH23","doi":"10.1109/ACCESS.2023.3326470","ee":"https://doi.org/10.1109/ACCESS.2023.3326470","url":"https://dblp.org/rec/journals/access/ChenWZZH23"}, "url":"URL#80710" }, { "@score":"3", "@id":"81281", "info":{"authors":{"author":[{"@pid":"254/9564","text":"Zie Eya Ekolle"},{"@pid":"02/1176","text":"Hideki Ochiai"},{"@pid":"68/3626","text":"Ryuji Kohno"}]},"title":"Collabo: A Collaborative Machine Learning Model and Its Application to the Security of Heterogeneous Medical Data in an IoT Network.","venue":"IEEE Access","volume":"11","pages":"142663-142675","year":"2023","type":"Journal Articles","access":"open","key":"journals/access/EkolleOK23","doi":"10.1109/ACCESS.2023.3341837","ee":"https://doi.org/10.1109/ACCESS.2023.3341837","url":"https://dblp.org/rec/journals/access/EkolleOK23"}, "url":"URL#81281" }, { "@score":"3", "@id":"81363", "info":{"authors":{"author":[{"@pid":"262/9645","text":"Marzieh Esmaeili"},{"@pid":"169/7101","text":"Amirhosein Toosi"},{"@pid":"73/10715","text":"Arash Roshanpoor"},{"@pid":"341/1793","text":"Vahid Changizi"},{"@pid":"195/9370","text":"Marjan Ghazisaeedi"},{"@pid":"99/602","text":"Arman Rahmim"},{"@pid":"163/2030","text":"Mohammad Sabokrou"}]},"title":"Generative Adversarial Networks for Anomaly Detection in Biomedical Imaging: A Study on Seven Medical Image Datasets.","venue":"IEEE Access","volume":"11","pages":"17906-17921","year":"2023","type":"Journal Articles","access":"open","key":"journals/access/EsmaeiliTRCGRS23","doi":"10.1109/ACCESS.2023.3244741","ee":"https://doi.org/10.1109/ACCESS.2023.3244741","url":"https://dblp.org/rec/journals/access/EsmaeiliTRCGRS23"}, "url":"URL#81363" }, { "@score":"4", "@id":"81690", "info":{"authors":{"author":[{"@pid":"364/2284","text":"Gian C. Garcia"},{"@pid":"290/6898","text":"Renzo Vargas"},{"@pid":"356/0650","text":"Joel D. Melo"},{"@pid":"08/8848","text":"Ivan R. S. Casella"}]},"title":"Analysis of the Optimized Allocation of Wireless and PLC Data Concentrators in Extensive Low-Voltage Networks Considering the Increase in the Residential Electric Vehicles Charging.","venue":"IEEE Access","volume":"11","pages":"140774-140788","year":"2023","type":"Journal Articles","access":"open","key":"journals/access/GarciaVMC23","doi":"10.1109/ACCESS.2023.3339563","ee":"https://doi.org/10.1109/ACCESS.2023.3339563","url":"https://dblp.org/rec/journals/access/GarciaVMC23"}, "url":"URL#81690" }, { "@score":"3", "@id":"82469", "info":{"authors":{"author":[{"@pid":"57/4206-4","text":"Xuan Huang 0004"},{"@pid":"251/3471","text":"Jiaying Zong"},{"@pid":"214/6599","text":"Qingtian Wang"},{"@pid":"51/3710-252","text":"Yang Liu 0252"},{"@pid":"202/1175","text":"Jianxiu Wang"},{"@pid":"27/7017","text":"Peng Chen"}]},"title":"Placement Approach for the Data Storage Management Function in a RAN-CN Converged Network.","venue":"IEEE Access","volume":"11","pages":"94898-94910","year":"2023","type":"Journal Articles","access":"open","key":"journals/access/HuangZWLWC23","doi":"10.1109/ACCESS.2023.3311852","ee":"https://doi.org/10.1109/ACCESS.2023.3311852","url":"https://dblp.org/rec/journals/access/HuangZWLWC23"}, "url":"URL#82469" }, { "@score":"3", "@id":"83118", "info":{"authors":{"author":[{"@pid":"16/2484","text":"Navneet Kaur"},{"@pid":"204/3600","text":"Sahil Verma"},{"@pid":"50/7625","text":"Kavita"},{"@pid":"238/5807","text":"N. Z. Jhanjhi"},{"@pid":"75/5436-6","text":"Saurabh Singh 0006"},{"@pid":"212/1089","text":"Rania M. Ghoniem"},{"@pid":"39/7441","text":"Sayan Kumar Ray"}]},"title":"Enhanced QoS-Aware Routing Protocol for Delay Sensitive Data in Wireless Body Area Networks.","venue":"IEEE Access","volume":"11","pages":"106000-106012","year":"2023","type":"Journal Articles","access":"open","key":"journals/access/KaurVKJSGR23","doi":"10.1109/ACCESS.2023.3311756","ee":"https://doi.org/10.1109/ACCESS.2023.3311756","url":"https://dblp.org/rec/journals/access/KaurVKJSGR23"}, "url":"URL#83118" }, { "@score":"3", "@id":"83194", "info":{"authors":{"author":[{"@pid":"66/2054-4","text":"Imran Khan 0004"},{"@pid":"149/5764","text":"Anwar Ghani"},{"@pid":"229/3012","text":"Syed Muhammd Saqlain"},{"@pid":"219/7762","text":"Muhammad Usman Ashraf"},{"@pid":"218/1631","text":"Abdulrahman Alzahrani"},{"@pid":"34/10137-1","text":"DoHyeun Kim 0001"}]},"title":"Secure Medical Data Against Unauthorized Access Using Decoy Technology in Distributed Edge Computing Networks.","venue":"IEEE Access","volume":"11","pages":"144560-144573","year":"2023","type":"Journal Articles","access":"open","key":"journals/access/KhanGSAAK23","doi":"10.1109/ACCESS.2023.3344168","ee":"https://doi.org/10.1109/ACCESS.2023.3344168","url":"https://dblp.org/rec/journals/access/KhanGSAAK23"}, "url":"URL#83194" }, { "@score":"3", "@id":"83217", "info":{"authors":{"author":[{"@pid":"212/9275","text":"Asfandyar Khan"},{"@pid":"160/8034","text":"Syed Hamad Shirazi"},{"@pid":"95/2146","text":"Muhammad Adeel"},{"@pid":"275/4167","text":"Muhammad Assam"},{"@pid":"291/8491","text":"Yazeed Yasin Ghadi"},{"@pid":"260/5123","text":"Heba G. Mohamed"},{"@pid":"06/2422","text":"Yong Xie"}]},"title":"A QoS-Aware Data Aggregation Strategy for Resource Constrained IoT-Enabled AMI Network in Smart Grid.","venue":"IEEE Access","volume":"11","pages":"98988-99004","year":"2023","type":"Journal Articles","access":"open","key":"journals/access/KhanSAAGMX23","doi":"10.1109/ACCESS.2023.3312552","ee":"https://doi.org/10.1109/ACCESS.2023.3312552","url":"https://dblp.org/rec/journals/access/KhanSAAGMX23"}, "url":"URL#83217" }, { "@score":"3", "@id":"83806", "info":{"authors":{"author":[{"@pid":"28/970","text":"Jeongjun Lee"},{"@pid":"43/6179-1","text":"Hyun Kim 0001"}]},"title":"Multi-Step Training Framework Using Sparsity Training for Efficient Utilization of Accumulated New Data in Convolutional Neural Networks.","venue":"IEEE Access","volume":"11","pages":"129613-129622","year":"2023","type":"Journal Articles","access":"open","key":"journals/access/LeeK23h","doi":"10.1109/ACCESS.2023.3333902","ee":"https://doi.org/10.1109/ACCESS.2023.3333902","url":"https://dblp.org/rec/journals/access/LeeK23h"}, "url":"URL#83806" }, { "@score":"3", "@id":"83890", "info":{"authors":{"author":[{"@pid":"242/2070","text":"Kanghyun Lee"},{"@pid":"351/4819","text":"Juhun Shin"},{"@pid":"284/1758","text":"Jongyeon Park"},{"@pid":"179/9878","text":"Youngwook Son"},{"@pid":"72/5261","text":"Saewoong Bahk"}]},"title":"Recovering CSI and Data in Dense Network Environments Using IEEE 802.11ax Midamble.","venue":"IEEE Access","volume":"11","pages":"65858-65871","year":"2023","type":"Journal Articles","access":"open","key":"journals/access/LeeSPSB23","doi":"10.1109/ACCESS.2023.3290996","ee":"https://doi.org/10.1109/ACCESS.2023.3290996","url":"https://dblp.org/rec/journals/access/LeeSPSB23"}, "url":"URL#83890" }, { "@score":"3", "@id":"84892", "info":{"authors":{"author":[{"@pid":"252/8039","text":"Yahui Meng"},{"@pid":"259/4584","text":"Amran Ahmad"}]},"title":"Performance Measurement Through Caching in Named Data Networking Based Internet of Things.","venue":"IEEE Access","volume":"11","pages":"120569-120584","year":"2023","type":"Journal Articles","access":"open","key":"journals/access/MengA23","doi":"10.1109/ACCESS.2023.3290312","ee":"https://doi.org/10.1109/ACCESS.2023.3290312","url":"https://dblp.org/rec/journals/access/MengA23"}, "url":"URL#84892" }, { "@score":"4", "@id":"85683", "info":{"authors":{"author":[{"@pid":"338/2199","text":"Hyun-Cheol Park"},{"@pid":"77/4259","text":"In-Pyo Hong"},{"@pid":"268/1408","text":"Sahadev Poudel"},{"@pid":"61/7024","text":"Chang Choi"}]},"title":"Data Augmentation Based on Generative Adversarial Networks for Endoscopic Image Classification.","venue":"IEEE Access","volume":"11","pages":"49216-49225","year":"2023","type":"Journal Articles","access":"open","key":"journals/access/ParkHPC23","doi":"10.1109/ACCESS.2023.3275173","ee":"https://doi.org/10.1109/ACCESS.2023.3275173","url":"https://dblp.org/rec/journals/access/ParkHPC23"}, "url":"URL#85683" }, { "@score":"3", "@id":"85786", "info":{"authors":{"author":[{"@pid":"340/2081","text":"Pascal Penava"},{"@pid":"15/3039","text":"Ricardo Buettner"}]},"title":"A Novel Small-Data Based Approach for Decoding Yes/No-Decisions of Locked-In Patients Using Generative Adversarial Networks.","venue":"IEEE Access","volume":"11","pages":"118849-118864","year":"2023","type":"Journal Articles","access":"open","key":"journals/access/PenavaB23","doi":"10.1109/ACCESS.2023.3326720","ee":"https://doi.org/10.1109/ACCESS.2023.3326720","url":"https://dblp.org/rec/journals/access/PenavaB23"}, "url":"URL#85786" }, { "@score":"3", "@id":"85977", "info":{"authors":{"author":[{"@pid":"309/5416","text":"Meena Pundir"},{"@pid":"220/3667","text":"Jasminder Kaur Sandhu"},{"@pid":"26/2002","text":"Deepali Gupta"},{"@pid":"04/1576","text":"Punit Gupta"},{"@pid":"292/0806","text":"Sapna Juneja"},{"@pid":"245/4705","text":"Ali Nauman"},{"@pid":"167/4331","text":"Amena Mahmoud"}]},"title":"MD-MARS: Maintainability Framework Based on Data Flow Prediction Using Multivariate Adaptive Regression Splines Algorithm in Wireless Sensor Network.","venue":"IEEE Access","volume":"11","pages":"10604-10622","year":"2023","type":"Journal Articles","access":"open","key":"journals/access/PundirSGGJNM23","doi":"10.1109/ACCESS.2023.3240504","ee":"https://doi.org/10.1109/ACCESS.2023.3240504","url":"https://dblp.org/rec/journals/access/PundirSGGJNM23"}, "url":"URL#85977" }, { "@score":"3", "@id":"86158", "info":{"authors":{"author":[{"@pid":"245/4124","text":"Zeeshan Ramzan"},{"@pid":"333/8599","text":"HM Shahzad Asif"},{"@pid":"141/1954","text":"Muhammad Irfan Yousuf"},{"@pid":"73/6941","text":"Muhammad Shahbaz"}]},"title":"A Multimodal Data Fusion and Deep Neural Networks Based Technique for Tea Yield Estimation in Pakistan Using Satellite Imagery.","venue":"IEEE Access","volume":"11","pages":"42578-42594","year":"2023","type":"Journal Articles","access":"open","key":"journals/access/RamzanAYS23","doi":"10.1109/ACCESS.2023.3271410","ee":"https://doi.org/10.1109/ACCESS.2023.3271410","url":"https://dblp.org/rec/journals/access/RamzanAYS23"}, "url":"URL#86158" }, { "@score":"3", "@id":"86605", "info":{"authors":{"author":[{"@pid":"265/1183","text":"Davide Scano"},{"@pid":"35/3298","text":"Alessio Giorgetti"},{"@pid":"74/6741","text":"Francesco Paolucci"},{"@pid":"146/6925","text":"Andrea Sgambelluri"},{"@pid":"120/8584","text":"Javad Chamanara"},{"@pid":"162/2452","text":"John Rothman"},{"@pid":"10/11063","text":"Mustafa Al-Bado"},{"@pid":"128/2566","text":"Edgard Marx"},{"@pid":"225/7184","text":"Sean Ahearne"},{"@pid":"93/3671","text":"Filippo Cugini"}]},"title":"Enabling P4 Network Telemetry in Edge Micro Data Centers With Kubernetes Orchestration.","venue":"IEEE Access","volume":"11","pages":"22637-22653","year":"2023","type":"Journal Articles","access":"open","key":"journals/access/ScanoGPSCRAMAC23","doi":"10.1109/ACCESS.2023.3249105","ee":"https://doi.org/10.1109/ACCESS.2023.3249105","url":"https://dblp.org/rec/journals/access/ScanoGPSCRAMAC23"}, "url":"URL#86605" }, { "@score":"3", "@id":"86711", "info":{"authors":{"author":[{"@pid":"315/0760","text":"Mohammad Shahrul Mohd Shah"},{"@pid":"251/7917","text":"Yu-Beng Leau"},{"@pid":"198/9667","text":"Mohammed Anbar"},{"@pid":"156/9538","text":"Ali Abdulqader Bin-Salem"}]},"title":"Security and Integrity Attacks in Named Data Networking: A Survey.","venue":"IEEE Access","volume":"11","pages":"7984-8004","year":"2023","type":"Journal Articles","access":"open","key":"journals/access/ShahLAB23","doi":"10.1109/ACCESS.2023.3238732","ee":"https://doi.org/10.1109/ACCESS.2023.3238732","url":"https://dblp.org/rec/journals/access/ShahLAB23"}, "url":"URL#86711" }, { "@score":"4", "@id":"86898", "info":{"authors":{"author":[{"@pid":"338/0788","text":"Jae Eun Shim"},{"@pid":"50/7194","text":"Mingu Kang"},{"@pid":"48/7551","text":"Tae Hee Han"}]},"title":"NCDE: In-Network Caching for Directory Entries to Expedite Data Access in Tiled-Chip Multiprocessors.","venue":"IEEE Access","volume":"11","pages":"3080-3095","year":"2023","type":"Journal Articles","access":"open","key":"journals/access/ShimKH23","doi":"10.1109/ACCESS.2023.3234933","ee":"https://doi.org/10.1109/ACCESS.2023.3234933","url":"https://dblp.org/rec/journals/access/ShimKH23"}, "url":"URL#86898" }, { "@score":"3", "@id":"87044", "info":{"authors":{"author":[{"@pid":"296/5984","text":"Nedson Donato Soares"},{"@pid":"32/9021","text":"Regina Braga 0001"},{"@pid":"63/4089","text":"José Maria N. David"},{"@pid":"296/5821","text":"Kennya Beatriz Siqueira"},{"@pid":"88/6600","text":"Victor Ströele A. Menezes"}]},"title":"Data Analysis in Social Networks for Agribusiness: A Systematic Review.","venue":"IEEE Access","volume":"11","pages":"8422-8432","year":"2023","type":"Journal Articles","access":"open","key":"journals/access/SoaresBDSM23","doi":"10.1109/ACCESS.2023.3237984","ee":"https://doi.org/10.1109/ACCESS.2023.3237984","url":"https://dblp.org/rec/journals/access/SoaresBDSM23"}, "url":"URL#87044" }, { "@score":"4", "@id":"87410", "info":{"authors":{"author":[{"@pid":"364/1229","text":"Sakib Uddin Tapu"},{"@pid":"364/2556","text":"Samira Afrin Alam Shopnil"},{"@pid":"364/1914","text":"Rabeya Bosri Tamanna"},{"@pid":"05/1215","text":"M. Ali Akber Dewan"},{"@pid":"00/10963","text":"Md. Golam Rabiul Alam"}]},"title":"Malicious Data Classification in Packet Data Network Through Hybrid Meta Deep Learning.","venue":"IEEE Access","volume":"11","pages":"140609-140625","year":"2023","type":"Journal Articles","access":"open","key":"journals/access/TapuSTDA23","doi":"10.1109/ACCESS.2023.3341911","ee":"https://doi.org/10.1109/ACCESS.2023.3341911","url":"https://dblp.org/rec/journals/access/TapuSTDA23"}, "url":"URL#87410" }, { "@score":"3", "@id":"87812", "info":{"authors":{"author":[{"@pid":"05/3420-4","text":"Jinling Wang 0004"},{"@pid":"358/7732","text":"Wandong Chai"}]},"title":"Application of KNCMA Algorithm Integrating Network Features in Data Resource Scheduling.","venue":"IEEE Access","volume":"11","pages":"111622-111635","year":"2023","type":"Journal Articles","access":"open","key":"journals/access/WangC23c","doi":"10.1109/ACCESS.2023.3319471","ee":"https://doi.org/10.1109/ACCESS.2023.3319471","url":"https://dblp.org/rec/journals/access/WangC23c"}, "url":"URL#87812" }, { "@score":"4", "@id":"88094", "info":{"authors":{"author":[{"@pid":"340/2707","text":"Thomas Weichlein"},{"@pid":"13/218","text":"Shujun Zhang"},{"@pid":"40/8729","text":"Pengzhi Li"},{"@pid":"98/5660","text":"Xu Zhang"}]},"title":"Data Flow Control for Network Load Balancing in IEEE Time Sensitive Networks for Automation.","venue":"IEEE Access","volume":"11","pages":"14044-14060","year":"2023","type":"Journal Articles","access":"open","key":"journals/access/WeichleinZLZ23","doi":"10.1109/ACCESS.2023.3243286","ee":"https://doi.org/10.1109/ACCESS.2023.3243286","url":"https://dblp.org/rec/journals/access/WeichleinZLZ23"}, "url":"URL#88094" }, { "@score":"3", "@id":"88613", "info":{"authors":{"author":[{"@pid":"93/6768","text":"Esma Yildirim"},{"@pid":"353/5159","text":"Arafat Akon"}]},"title":"Predicting Short-Term Variations in End-to-End Cloud Data Transfer Throughput Using Neural Networks.","venue":"IEEE Access","volume":"11","pages":"78656-78670","year":"2023","type":"Journal Articles","access":"open","key":"journals/access/YildirimA23","doi":"10.1109/ACCESS.2023.3299311","ee":"https://doi.org/10.1109/ACCESS.2023.3299311","url":"https://dblp.org/rec/journals/access/YildirimA23"}, "url":"URL#88613" }, { "@score":"3", "@id":"89314", "info":{"authors":{"author":[{"@pid":"318/0148","text":"Naibo Zhu"},{"@pid":"53/8175","text":"Guangyu Zhao"},{"@pid":"48/450-105","text":"Yang Yang 0105"},{"@pid":"42/1222","text":"Han Yang"},{"@pid":"40/6686","text":"Zhi Liu"}]},"title":"AEC_GAN: Unbalanced Data Processing Decision-Making in Network Attacks Based on ACGAN and Machine Learning.","venue":"IEEE Access","volume":"11","pages":"52452-52465","year":"2023","type":"Journal Articles","access":"open","key":"journals/access/ZhuZYYL23","doi":"10.1109/ACCESS.2023.3280421","ee":"https://doi.org/10.1109/ACCESS.2023.3280421","url":"https://dblp.org/rec/journals/access/ZhuZYYL23"}, "url":"URL#89314" }, { "@score":"3", "@id":"89846", "info":{"authors":{"author":[{"@pid":"338/5076","text":"Yonas Abate Debalki"},{"@pid":"79/1650","text":"Jin Hou"},{"@pid":"306/0976","text":"Hamid Ullah"},{"@pid":"338/4361","text":"Baye Yemataw Adane"}]},"title":"Multi-hop data dissemination using a multi-metric contention-based broadcast suppression strategy in VANETs.","venue":"Ad Hoc Networks","volume":"140","pages":"103070","year":"2023","type":"Journal Articles","access":"closed","key":"journals/adhoc/DebalkiHUA23","doi":"10.1016/J.ADHOC.2022.103070","ee":"https://doi.org/10.1016/j.adhoc.2022.103070","url":"https://dblp.org/rec/journals/adhoc/DebalkiHUA23"}, "url":"URL#89846" }, { "@score":"3", "@id":"89888", "info":{"authors":{"author":[{"@pid":"239/0025","text":"Gurjot Kaur"},{"@pid":"249/8665","text":"Deepti Kakkar"}]},"title":"Fr-Aro: Secure interference aware fuzzy based clustering and hybrid optimization driven data routing in VANETs.","venue":"Ad Hoc Networks","volume":"151","pages":"103298","year":"2023","type":"Journal Articles","access":"closed","key":"journals/adhoc/KaurK23","doi":"10.1016/J.ADHOC.2023.103298","ee":"https://doi.org/10.1016/j.adhoc.2023.103298","url":"https://dblp.org/rec/journals/adhoc/KaurK23"}, "url":"URL#89888" }, { "@score":"3", "@id":"89893", "info":{"authors":{"author":[{"@pid":"19/139-4","text":"Rohit Kumar 0004"},{"@pid":"126/2521","text":"Joy Chandra Mukherjee"}]},"title":"Approximation algorithms for vehicle-aided periodic data collection from mobile sensors with obstacle avoidance in WSNs.","venue":"Ad Hoc Networks","volume":"149","pages":"103239","year":"2023","type":"Journal Articles","access":"closed","key":"journals/adhoc/KumarM23","doi":"10.1016/J.ADHOC.2023.103239","ee":"https://doi.org/10.1016/j.adhoc.2023.103239","url":"https://dblp.org/rec/journals/adhoc/KumarM23"}, "url":"URL#89893" }, { "@score":"5", "@id":"89914", "info":{"authors":{"author":[{"@pid":"313/5936","text":"Ludovica De Lucia"},{"@pid":"43/425","text":"Claudio Enrico Palazzi"},{"@pid":"22/4664","text":"Anna Maria Vegni"}]},"title":"ENSING: Energy saving based data transmission in Internet of Drones for 3D connectivity in 6G networks.","venue":"Ad Hoc Networks","volume":"149","pages":"103211","year":"2023","type":"Journal Articles","access":"open","key":"journals/adhoc/LuciaPV23","doi":"10.1016/J.ADHOC.2023.103211","ee":"https://doi.org/10.1016/j.adhoc.2023.103211","url":"https://dblp.org/rec/journals/adhoc/LuciaPV23"}, "url":"URL#89914" }, { "@score":"3", "@id":"89934", "info":{"authors":{"author":[{"@pid":"94/4865","text":"Maycon L. M. Peixoto"},{"@pid":"232/9148","text":"Edson Mota"},{"@pid":"285/9508","text":"Adriano H. O. Maia"},{"@pid":"210/6093","text":"Wellington Lobato"},{"@pid":"52/3563","text":"Mohammad A. Salahuddin 0001"},{"@pid":"b/RaoufBoutaba","text":"Raouf Boutaba"},{"@pid":"64/7382","text":"Leandro A. Villas"}]},"title":"FogJam: A Fog Service for Detecting Traffic Congestion in a Continuous Data Stream VANET.","venue":"Ad Hoc Networks","volume":"140","pages":"103046","year":"2023","type":"Journal Articles","access":"closed","key":"journals/adhoc/PeixotoMMLSBV23","doi":"10.1016/J.ADHOC.2022.103046","ee":"https://doi.org/10.1016/j.adhoc.2022.103046","url":"https://dblp.org/rec/journals/adhoc/PeixotoMMLSBV23"}, "url":"URL#89934" }, { "@score":"4", "@id":"89953", "info":{"authors":{"author":[{"@pid":"335/1486","text":"Mohammad-Salar Shahryari"},{"@pid":"92/7402","text":"Leili Farzinvash"},{"@pid":"97/7800","text":"Mohammad-Reza Feizi-Derakhshi"},{"@pid":"33/3201","text":"Amir Taherkordi"}]},"title":"High-throughput and energy-efficient data gathering in heterogeneous multi-channel wireless sensor networks using genetic algorithm.","venue":"Ad Hoc Networks","volume":"139","pages":"103041","year":"2023","type":"Journal Articles","access":"closed","key":"journals/adhoc/ShahryariFFT23","doi":"10.1016/J.ADHOC.2022.103041","ee":"https://doi.org/10.1016/j.adhoc.2022.103041","url":"https://dblp.org/rec/journals/adhoc/ShahryariFFT23"}, "url":"URL#89953" }, { "@score":"3", "@id":"89956", "info":{"authors":{"author":[{"@pid":"74/2905","text":"Yanyan Shen"},{"@pid":"292/3456","text":"Weiran Luo"},{"@pid":"130/5774","text":"Shuqiang Wang"},{"@pid":"85/2836","text":"Xiaoxia Huang"}]},"title":"Average AoI minimization for data collection in UAV-enabled IoT backscatter communication systems with the finite blocklength regime.","venue":"Ad Hoc Networks","volume":"145","pages":"103164","year":"2023","type":"Journal Articles","access":"closed","key":"journals/adhoc/ShenLWH23","doi":"10.1016/J.ADHOC.2023.103164","ee":"https://doi.org/10.1016/j.adhoc.2023.103164","url":"https://dblp.org/rec/journals/adhoc/ShenLWH23"}, "url":"URL#89956" }, { "@score":"4", "@id":"89984", "info":{"authors":{"author":[{"@pid":"17/7579","text":"Wenjia Wu"},{"@pid":"181/2812","text":"Hao Wang"},{"@pid":"238/2703","text":"Zisheng Cheng"}]},"title":"ReLoRaWAN: Reliable data delivery in LoRaWAN networks with multiple gateways.","venue":"Ad Hoc Networks","volume":"147","pages":"103203","year":"2023","type":"Journal Articles","access":"closed","key":"journals/adhoc/WuWC23","doi":"10.1016/J.ADHOC.2023.103203","ee":"https://doi.org/10.1016/j.adhoc.2023.103203","url":"https://dblp.org/rec/journals/adhoc/WuWC23"}, "url":"URL#89984" }, { "@score":"4", "@id":"90003", "info":{"authors":{"author":[{"@pid":"26/4189-24","text":"Han Zhang 0024"},{"@pid":"60/7699","text":"Jianbin Xue"},{"@pid":"19/1924","text":"Qi Wang"},{"@pid":"55/6910","text":"Ye Li"}]},"title":"A security optimization scheme for data security transmission in UAV-assisted edge networks based on federal learning.","venue":"Ad Hoc Networks","volume":"150","pages":"103277","year":"2023","type":"Journal Articles","access":"closed","key":"journals/adhoc/ZhangXWL23","doi":"10.1016/J.ADHOC.2023.103277","ee":"https://doi.org/10.1016/j.adhoc.2023.103277","url":"https://dblp.org/rec/journals/adhoc/ZhangXWL23"}, "url":"URL#90003" }, { "@score":"3", "@id":"90028", "info":{"authors":{"author":[{"@pid":"171/1301","text":"Ali Kadhum Idrees"},{"@pid":"343/4358","text":"Lina Waleed Jawad"}]},"title":"Energy-efficient Data Processing Protocol in edge-based IoT networks.","venue":"Ann. des Télécommunications","volume":"78","number":"5-6","pages":"347-362","year":"2023","type":"Journal Articles","access":"closed","key":"journals/adt/IdreesJ23","doi":"10.1007/S12243-023-00957-8","ee":"https://doi.org/10.1007/s12243-023-00957-8","url":"https://dblp.org/rec/journals/adt/IdreesJ23"}, "url":"URL#90028" }, { "@score":"3", "@id":"90276", "info":{"authors":{"author":[{"@pid":"266/8221","text":"Mingrui Ma"},{"@pid":"36/4213","text":"Lansheng Han"},{"@pid":"94/340","text":"Chunjie Zhou"}]},"title":"BTAD: A binary transformer deep neural network model for anomaly detection in multivariate time series data.","venue":"Adv. Eng. Informatics","volume":"56","pages":"101949","year":"2023","type":"Journal Articles","access":"closed","key":"journals/aei/MaHZ23","doi":"10.1016/J.AEI.2023.101949","ee":"https://doi.org/10.1016/j.aei.2023.101949","url":"https://dblp.org/rec/journals/aei/MaHZ23"}, "url":"URL#90276" }, { "@score":"4", "@id":"91232", "info":{"authors":{"author":[{"@pid":"346/4330","text":"S. Muthulakshmi"},{"@pid":"71/340","text":"A. Kannammal"}]},"title":"Security Enhancements Based on Optimal Lightweight Blockchain Model for Data Sharing in Wireless IoT Networks.","venue":"Ad Hoc Sens. Wirel. Networks","volume":"55","number":"3-4","pages":"233-256","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ahswn/MuthulakshmiK23","ee":"https://www.oldcitypublishing.com/journals/ahswn-home/ahswn-issue-contents/ahswn-volume-55-number-3-4-2023/21263-2/","url":"https://dblp.org/rec/journals/ahswn/MuthulakshmiK23"}, "url":"URL#91232" }, { "@score":"3", "@id":"93037", "info":{"authors":{"author":[{"@pid":"162/7295","text":"Aleksandr Alekseev"},{"@pid":"348/3624","text":"Leonid Kozhemyakin"},{"@pid":"348/3644","text":"Vladislav Nikitin"},{"@pid":"348/3418","text":"Julia Bolshakova"}]},"title":"Data Preprocessing and Neural Network Architecture Selection Algorithms in Cases of Limited Training Sets - On an Example of Diagnosing Alzheimer's Disease.","venue":"Algorithms","volume":"16","number":"5","pages":"219","year":"2023","type":"Journal Articles","access":"open","key":"journals/algorithms/AlekseevKNB23","doi":"10.3390/A16050219","ee":"https://doi.org/10.3390/a16050219","url":"https://dblp.org/rec/journals/algorithms/AlekseevKNB23"}, "url":"URL#93037" }, { "@score":"3", "@id":"93101", "info":{"authors":{"author":[{"@pid":"239/3852","text":"Usman Javed Butt"},{"@pid":"16/7716","text":"Osama Hussien"},{"@pid":"364/3330","text":"Krison Hasanaj"},{"@pid":"53/2530","text":"Khaled Shaalan"},{"@pid":"175/0262","text":"Bilal Hassan"},{"@pid":"179/6634","text":"Haider M. Al-Khateeb"}]},"title":"Predicting the Impact of Data Poisoning Attacks in Blockchain-Enabled Supply Chain Networks.","venue":"Algorithms","volume":"16","number":"12","pages":"549","year":"2023","type":"Journal Articles","access":"open","key":"journals/algorithms/ButtHHSHA23","doi":"10.3390/A16120549","ee":"https://doi.org/10.3390/a16120549","url":"https://dblp.org/rec/journals/algorithms/ButtHHSHA23"}, "url":"URL#93101" }, { "@score":"3", "@id":"93594", "info":{"authors":{"author":[{"@pid":"43/7220","text":"Mikhail Zotov"},{"@pid":"361/6348","text":"Dmitry Anzhiganov"},{"@pid":"361/6541","text":"Aleksandr Kryazhenkov"},{"@pid":"361/6371","text":"Dario Barghini"},{"@pid":"361/6768","text":"Matteo Battisti"},{"@pid":"184/0522","text":"Alexander Belov"},{"@pid":"232/4590","text":"Mario Edoardo Bertaina"},{"@pid":"361/6602","text":"Marta Bianciotto"},{"@pid":"248/8998","text":"Francesca Bisconti"},{"@pid":"361/6701","text":"Carl Blaksley"},{"@pid":"361/6566","text":"Sylvie Blin"},{"@pid":"361/6324","text":"Giorgio Cambiè"},{"@pid":"313/3110","text":"Francesca Capel"},{"@pid":"152/4857","text":"Marco Casolino"},{"@pid":"93/1208","text":"Toshikazu Ebisuzaki"},{"@pid":"361/6658","text":"Johannes Eser"},{"@pid":"361/6932","text":"Francesco Fenu"},{"@pid":"361/6921","text":"Massimo Alberto Franceschi"},{"@pid":"361/6786","text":"Alessio Golzio"},{"@pid":"361/6712","text":"Philippe Gorodetzky"},{"@pid":"361/6852","text":"Fumiyoshi Kajino"},{"@pid":"361/6788","text":"Hiroshi Kasuga"},{"@pid":"119/3021","text":"Pavel A. Klimov"},{"@pid":"361/6944","text":"Massimiliano Manfrin"},{"@pid":"361/6346","text":"Laura Marcelli"},{"@pid":"361/6610","text":"Hiroko Miyamoto"},{"@pid":"361/6678","text":"Alexey Murashov"},{"@pid":"361/6965","text":"Tommaso Napolitano"},{"@pid":"361/6376","text":"Hiroshi Ohmori"},{"@pid":"361/6302","text":"Angela Olinto"},{"@pid":"68/9717","text":"Etienne Parizot"},{"@pid":"59/3756","text":"Piergiorgio Picozza"},{"@pid":"156/0414","text":"Lech Wiktor Piotrowski"},{"@pid":"361/6331","text":"Zbigniew Plebaniak"},{"@pid":"361/6464","text":"Guillaume Prévôt"},{"@pid":"361/6505","text":"Enzo Reali"},{"@pid":"41/9512-3","text":"Marco Ricci 0003"},{"@pid":"342/0055","text":"Giulia Romoli"},{"@pid":"361/6605","text":"Naoto Sakaki"},{"@pid":"29/9126","text":"Kenji Shinozaki"},{"@pid":"361/6741","text":"Christophe De La Taille"},{"@pid":"361/6439","text":"Yoshiyuki Takizawa"},{"@pid":"248/9256","text":"Michal Vrábel"},{"@pid":"361/6928","text":"Lawrence Wiencke"}]},"title":"Neural Network Based Approach to Recognition of Meteor Tracks in the Mini-EUSO Telescope Data.","venue":"Algorithms","volume":"16","number":"9","pages":"448","year":"2023","type":"Journal Articles","access":"open","key":"journals/algorithms/ZotovAKBBBBBBBBCCCEEFFGGKKKM23","doi":"10.3390/A16090448","ee":"https://doi.org/10.3390/a16090448","url":"https://dblp.org/rec/journals/algorithms/ZotovAKBBBBBBBBCCCEEFFGGKKKM23"}, "url":"URL#93594" }, { "@score":"4", "@id":"93962", "info":{"authors":{"author":[{"@pid":"268/1090","text":"Yujia He"},{"@pid":"74/10296","text":"Shurong Zhang"},{"@pid":"13/3479","text":"Lin Chen"},{"@pid":"68/3781","text":"Weihua Yang"}]},"title":"The disjoint path cover in the data center network HSDC with prescribed vertices in each path.","venue":"Appl. Math. Comput.","volume":"459","pages":"128262","year":"2023","type":"Journal Articles","access":"closed","key":"journals/amc/HeZCY23","doi":"10.1016/J.AMC.2023.128262","ee":"https://doi.org/10.1016/j.amc.2023.128262","url":"https://dblp.org/rec/journals/amc/HeZCY23"}, "url":"URL#93962" }, { "@score":"3", "@id":"94359", "info":{"authors":{"author":[{"@pid":"225/4082","text":"Younan Zhao"},{"@pid":"33/5231","text":"Peng Gu"},{"@pid":"70/10937","text":"Fanglai Zhu"},{"@pid":"133/4132","text":"Tianyi Liu"},{"@pid":"176/6833","text":"Runjie Shen"}]},"title":"Security control scheme for cyber-physical system with a complex network in physical layer against false data injection attacks.","venue":"Appl. Math. Comput.","volume":"447","pages":"127908","year":"2023","type":"Journal Articles","access":"closed","key":"journals/amc/ZhaoGZLS23","doi":"10.1016/J.AMC.2023.127908","ee":"https://doi.org/10.1016/j.amc.2023.127908","url":"https://dblp.org/rec/journals/amc/ZhaoGZLS23"}, "url":"URL#94359" }, { "@score":"3", "@id":"94621", "info":{"authors":{"author":[{"@pid":"35/9481","text":"Majid Azadi"},{"@pid":"71/8026","text":"Zohreh Moghaddas"},{"@pid":"60/1353","text":"Reza Farzipoor Saen"},{"@pid":"37/2275","text":"Angappa Gunasekaran"},{"@pid":"216/5439","text":"Sachin Kumar Mangla"},{"@pid":"21/8051","text":"Alessio Ishizaka"}]},"title":"Using network data envelopment analysis to assess the sustainability and resilience of healthcare supply chains in response to the COVID-19 pandemic.","venue":"Ann. Oper. Res.","volume":"328","number":"1","pages":"107-150","year":"2023","type":"Journal Articles","access":"closed","key":"journals/anor/AzadiMSGMI23","doi":"10.1007/S10479-022-05020-8","ee":"https://doi.org/10.1007/s10479-022-05020-8","url":"https://dblp.org/rec/journals/anor/AzadiMSGMI23"}, "url":"URL#94621" }, { "@score":"3", "@id":"94798", "info":{"authors":{"author":[{"@pid":"264/2121","text":"Hamid Kiaei"},{"@pid":"60/1353","text":"Reza Farzipoor Saen"},{"@pid":"99/565","text":"Reza Kazemi Matin"}]},"title":"Cross-efficiency evaluation and improvement in two-stage network data envelopment analysis.","venue":"Ann. Oper. Res.","volume":"321","number":"1","pages":"281-309","year":"2023","type":"Journal Articles","access":"closed","key":"journals/anor/KiaeiSM23","doi":"10.1007/S10479-022-04861-7","ee":"https://doi.org/10.1007/s10479-022-04861-7","url":"https://dblp.org/rec/journals/anor/KiaeiSM23"}, "url":"URL#94798" }, { "@score":"3", "@id":"95090", "info":{"authors":{"author":[{"@pid":"356/1249","text":"Ondrej Janca"},{"@pid":"65/6189","text":"Eliska Ochodkova"},{"@pid":"305/6031","text":"Eva Kriegová"},{"@pid":"356/0695","text":"Pavel Horak"},{"@pid":"356/1072","text":"Martina Skacelova"},{"@pid":"81/889","text":"Milos Kudelka"}]},"title":"Real-world data in rheumatoid arthritis: patient similarity networks as a tool for clinical evaluation of disease activity.","venue":"Appl. Netw. Sci.","volume":"8","number":"1","pages":"57","year":"2023","type":"Journal Articles","access":"open","key":"journals/ans/JancaOKHSK23","doi":"10.1007/S41109-023-00582-3","ee":"https://doi.org/10.1007/s41109-023-00582-3","url":"https://dblp.org/rec/journals/ans/JancaOKHSK23"}, "url":"URL#95090" }, { "@score":"4", "@id":"95770", "info":{"authors":{"author":[{"@pid":"304/5279","text":"Sunwon Kang"},{"@pid":"34/6057","text":"Juwan Kim"},{"@pid":"218/3354","text":"Insung Jang"},{"@pid":"24/2952","text":"Byoung-Dai Lee"}]},"title":"C2ShadowGAN: cycle-in-cycle generative adversarial network for shadow removal using unpaired data.","venue":"Appl. Intell.","volume":"53","number":"12","pages":"15067-15079","year":"2023","type":"Journal Articles","access":"open","key":"journals/apin/KangKJL23","doi":"10.1007/S10489-022-04269-7","ee":"https://doi.org/10.1007/s10489-022-04269-7","url":"https://dblp.org/rec/journals/apin/KangKJL23"}, "url":"URL#95770" }, { "@score":"4", "@id":"96208", "info":{"authors":{"author":[{"@pid":"200/6986","text":"Jaime Pérez"},{"@pid":"80/9990","text":"Patricia Arroba"},{"@pid":"09/5886","text":"José Manuel Moya"}]},"title":"Data augmentation through multivariate scenario forecasting in Data Centers using Generative Adversarial Networks.","venue":"Appl. Intell.","volume":"53","number":"2","pages":"1469-1486","year":"2023","type":"Journal Articles","access":"closed","key":"journals/apin/PerezAM23","doi":"10.1007/S10489-022-03557-6","ee":"https://doi.org/10.1007/s10489-022-03557-6","url":"https://dblp.org/rec/journals/apin/PerezAM23"}, "url":"URL#96208" }, { "@score":"3", "@id":"97734", "info":{"authors":{"author":[{"@pid":"217/7511","text":"Miguel Landry Foko Sindjoung"},{"@pid":"72/8033","text":"Mthulisi Velempini"},{"@pid":"38/4379","text":"Clémentin Tayou Djamégni"}]},"title":"A data security and privacy scheme for user quality of experience in a Mobile Edge Computing-based network.","venue":"Array","volume":"19","pages":"100304","year":"2023","type":"Journal Articles","access":"open","key":"journals/array/SindjoungVD23","doi":"10.1016/J.ARRAY.2023.100304","ee":"https://doi.org/10.1016/j.array.2023.100304","url":"https://dblp.org/rec/journals/array/SindjoungVD23"}, "url":"URL#97734" }, { "@score":"3", "@id":"98679", "info":{"authors":{"author":[{"@pid":"248/2405","text":"Rugen Wang"},{"@pid":"195/9134","text":"Zhuyun Chen"},{"@pid":"74/637-4","text":"Weihua Li 0004"}]},"title":"Gradient flow-based meta generative adversarial network for data augmentation in fault diagnosis.","venue":"Appl. Soft Comput.","volume":"142","pages":"110313","year":"2023","type":"Journal Articles","access":"closed","key":"journals/asc/WangCL23","doi":"10.1016/J.ASOC.2023.110313","ee":"https://doi.org/10.1016/j.asoc.2023.110313","url":"https://dblp.org/rec/journals/asc/WangCL23"}, "url":"URL#98679" }, { "@score":"3", "@id":"98725", "info":{"authors":{"author":[{"@pid":"59/2227","text":"Yan Wang"},{"@pid":"93/7133","text":"Haifeng Zhang"},{"@pid":"70/6703","text":"Yongjun Wei"},{"@pid":"70/6155-6","text":"Huan Wang 0006"},{"@pid":"58/4461","text":"Yong Peng"},{"@pid":"345/4142","text":"Zhiyan Bin"},{"@pid":"138/5163","text":"Weilong Li"}]},"title":"An evolutionary computation-based machine learning for network attack detection in big data traffic.","venue":"Appl. Soft Comput.","volume":"138","pages":"110184","year":"2023","type":"Journal Articles","access":"closed","key":"journals/asc/WangZWWPBL23","doi":"10.1016/J.ASOC.2023.110184","ee":"https://doi.org/10.1016/j.asoc.2023.110184","url":"https://dblp.org/rec/journals/asc/WangZWWPBL23"}, "url":"URL#98725" }, { "@score":"3", "@id":"98781", "info":{"authors":{"author":[{"@pid":"123/0511","text":"Nien-Che Yang"},{"@pid":"304/3756","text":"Abhilash Sen"}]},"title":"Parameter estimation in unbalanced three-phase distribution lines using general regression neural networks with inconsistent data handling capacity.","venue":"Appl. Soft Comput.","volume":"133","pages":"109936","year":"2023","type":"Journal Articles","access":"closed","key":"journals/asc/YangS23","doi":"10.1016/J.ASOC.2022.109936","ee":"https://doi.org/10.1016/j.asoc.2022.109936","url":"https://dblp.org/rec/journals/asc/YangS23"}, "url":"URL#98781" }, { "@score":"3", "@id":"98858", "info":{"authors":{"author":[{"@pid":"252/1835","text":"Kanghui Zhang"},{"@pid":"57/4280","text":"Weidong Wang"},{"@pid":"295/6676","text":"Ziqi Lv"},{"@pid":"354/4115","text":"Junda Feng"},{"@pid":"189/3399","text":"Huixuan Li"},{"@pid":"75/8839","text":"Chenglian Zhang"}]},"title":"LKDPNet: Large-Kernel Depthwise-Pointwise convolution neural network in estimating coal ash content via data augmentation.","venue":"Appl. Soft Comput.","volume":"144","pages":"110471","year":"2023","type":"Journal Articles","access":"closed","key":"journals/asc/ZhangWLFLZ23","doi":"10.1016/J.ASOC.2023.110471","ee":"https://doi.org/10.1016/j.asoc.2023.110471","url":"https://dblp.org/rec/journals/asc/ZhangWLFLZ23"}, "url":"URL#98858" }, { "@score":"4", "@id":"100834", "info":{"authors":{"author":[{"@pid":"253/9469","text":"Katherine Abramski"},{"@pid":"244/5009","text":"Salvatore Citraro"},{"@pid":"24/3644","text":"Luigi Lombardi"},{"@pid":"27/10814","text":"Giulio Rossetti"},{"@pid":"140/2776","text":"Massimo Stella"}]},"title":"Cognitive Network Science Reveals Bias in GPT-3, GPT-3.5 Turbo, and GPT-4 Mirroring Math Anxiety in High-School Students.","venue":"Big Data Cogn. Comput.","volume":"7","number":"3","pages":"124","year":"2023","type":"Journal Articles","access":"open","key":"journals/bdcc/AbramskiCLRS23","doi":"10.3390/BDCC7030124","ee":"https://doi.org/10.3390/bdcc7030124","url":"https://dblp.org/rec/journals/bdcc/AbramskiCLRS23"}, "url":"URL#100834" }, { "@score":"4", "@id":"100895", "info":{"authors":{"author":[{"@pid":"252/6455","text":"Donia Gamal"},{"@pid":"177/5288","text":"Marco Alfonse"},{"@pid":"152/6115","text":"Salud María Jiménez Zafra"},{"@pid":"10/8980","text":"Mostafa Aref"}]},"title":"Intelligent Multi-Lingual Cyber-Hate Detection in Online Social Networks: Taxonomy, Approaches, Datasets, and Open Challenges.","venue":"Big Data Cogn. Comput.","volume":"7","number":"2","pages":"58","year":"2023","type":"Journal Articles","access":"open","key":"journals/bdcc/GamalAZA23","doi":"10.3390/BDCC7020058","ee":"https://doi.org/10.3390/bdcc7020058","url":"https://dblp.org/rec/journals/bdcc/GamalAZA23"}, "url":"URL#100895" }, { "@score":"3", "@id":"100924", "info":{"authors":{"author":[{"@pid":"364/3428","text":"Vladislav Kholkin"},{"@pid":"253/3038","text":"Olga Druzhina"},{"@pid":"327/4011","text":"Valerii Vatnik"},{"@pid":"276/9034","text":"Maksim Kulagin"},{"@pid":"207/3707","text":"Timur I. Karimov"},{"@pid":"207/3684","text":"Denis N. Butusov"}]},"title":"Comparing Reservoir Artificial and Spiking Neural Networks in Machine Fault Detection Tasks.","venue":"Big Data Cogn. Comput.","volume":"7","number":"2","pages":"110","year":"2023","type":"Journal Articles","access":"open","key":"journals/bdcc/KholkinDVKKB23","doi":"10.3390/BDCC7020110","ee":"https://doi.org/10.3390/bdcc7020110","url":"https://dblp.org/rec/journals/bdcc/KholkinDVKKB23"}, "url":"URL#100924" }, { "@score":"3", "@id":"100991", "info":{"authors":{"author":[{"@pid":"286/3971","text":"Neelakandan Subramani"},{"@pid":"339/6174","text":"Veerappampalayam Easwaramoorthy Sathishkumar"},{"@pid":"199/3394-1","text":"Prakash Mohan 0001"},{"@pid":"51/9115","text":"Malliga Subramanian"},{"@pid":"338/9771","text":"Velmurugan Sambath"}]},"title":"A Gradient Boosted Decision Tree-Based Influencer Prediction in Social Network Analysis.","venue":"Big Data Cogn. Comput.","volume":"7","number":"1","pages":"6","year":"2023","type":"Journal Articles","access":"open","key":"journals/bdcc/SubramaniSMSS23","doi":"10.3390/BDCC7010006","ee":"https://doi.org/10.3390/bdcc7010006","url":"https://dblp.org/rec/journals/bdcc/SubramaniSMSS23"}, "url":"URL#100991" }, { "@score":"3", "@id":"101007", "info":{"authors":{"author":[{"@pid":"210/4468","text":"William Eduardo Villegas-Ch."},{"@pid":"291/7701","text":"Joselin García-Ortiz"},{"@pid":"210/4533","text":"Angel Jaramillo-Alcázar"}]},"title":"An Approach Based on Recurrent Neural Networks and Interactive Visualization to Improve Explainability in AI Systems.","venue":"Big Data Cogn. Comput.","volume":"7","number":"3","pages":"136","year":"2023","type":"Journal Articles","access":"open","key":"journals/bdcc/VillegasChGJ23","doi":"10.3390/BDCC7030136","ee":"https://doi.org/10.3390/bdcc7030136","url":"https://dblp.org/rec/journals/bdcc/VillegasChGJ23"}, "url":"URL#101007" }, { "@score":"3", "@id":"101034", "info":{"authors":{"author":[{"@pid":"279/2660","text":"Mohammad Khalid Imam Rahmani"},{"@pid":"204/4006","text":"Hayder M. A. Ghanimi"},{"@pid":"172/7493","text":"Syeda Fizzah Jilani"},{"@pid":"47/3349-4","text":"Muhammad Aslam 0004"},{"@pid":"232/7942","text":"Meshal Alharbi"},{"@pid":"212/4703","text":"Roobaea Alroobaea"},{"@pid":"11/8036","text":"Sudhakar Sengan"}]},"title":"Early Pathogen Prediction in Crops Using Nano Biosensors and Neural Network-Based Feature Extraction and Classification.","venue":"Big Data Res.","volume":"34","pages":"100412","year":"2023","type":"Journal Articles","access":"closed","key":"journals/bdr/RahmaniGJAAAS23","doi":"10.1016/J.BDR.2023.100412","ee":"https://doi.org/10.1016/j.bdr.2023.100412","url":"https://dblp.org/rec/journals/bdr/RahmaniGJAAAS23"}, "url":"URL#101034" }, { "@score":"3", "@id":"101224", "info":{"authors":{"author":[{"@pid":"183/3586","text":"Jorge Beltrán"},{"@pid":"242/1722","text":"Lisandra Herrera Belén"},{"@pid":"242/0936","text":"Jorge G. Farias"},{"@pid":"363/6112","text":"Mauricio Zamorano"},{"@pid":"363/6029","text":"Nicolás Lefin"},{"@pid":"363/5334","text":"Javiera Miranda"},{"@pid":"321/7922","text":"Fernanda Parraguez Contreras"}]},"title":"VirusHound-I: prediction of viral proteins involved in the evasion of host adaptive immune response using the random forest algorithm and generative adversarial network for data augmentation.","venue":"Briefings Bioinform.","volume":"25","number":"1","year":"2023","type":"Journal Articles","access":"closed","key":"journals/bib/BeltranBFZLMC23","doi":"10.1093/BIB/BBAD434","ee":"https://doi.org/10.1093/bib/bbad434","url":"https://dblp.org/rec/journals/bib/BeltranBFZLMC23"}, "url":"URL#101224" }, { "@score":"3", "@id":"101328", "info":{"authors":{"author":[{"@pid":"358/8290","text":"Juan D. Henao"},{"@pid":"358/8604","text":"Michael Lauber"},{"@pid":"355/6340","text":"Manuel Azevedo"},{"@pid":"358/8730","text":"Anastasiia Grekova"},{"@pid":"t/FabianJTheis","text":"Fabian J. Theis"},{"@pid":"147/9498","text":"Markus List"},{"@pid":"141/5282","text":"Christoph Ogris"},{"@pid":"121/1174","text":"Benjamin Schubert"}]},"title":"Multi-omics regulatory network inference in the presence of missing data.","venue":"Briefings Bioinform.","volume":"24","number":"5","year":"2023","type":"Journal Articles","access":"closed","key":"journals/bib/HenaoLAGTLOS23","doi":"10.1093/BIB/BBAD309","ee":"https://doi.org/10.1093/bib/bbad309","url":"https://dblp.org/rec/journals/bib/HenaoLAGTLOS23"}, "url":"URL#101328" }, { "@score":"3", "@id":"101362", "info":{"authors":{"author":[{"@pid":"344/6415","text":"Rebecca Elizabeth Kattan"},{"@pid":"344/6553","text":"Deena Ayesh"},{"@pid":"90/10217","text":"Wenqi Wang"}]},"title":"Analysis of affinity purification-related proteomic data for studying protein-protein interaction networks in cells.","venue":"Briefings Bioinform.","volume":"24","number":"2","year":"2023","type":"Journal Articles","access":"closed","key":"journals/bib/KattanAW23","doi":"10.1093/BIB/BBAD010","ee":"https://doi.org/10.1093/bib/bbad010","url":"https://dblp.org/rec/journals/bib/KattanAW23"}, "url":"URL#101362" }, { "@score":"3", "@id":"101479", "info":{"authors":{"author":[{"@pid":"319/2356","text":"Minwoo Pak"},{"@pid":"192/9195","text":"Sangseon Lee"},{"@pid":"276/0825","text":"Inyoung Sung"},{"@pid":"307/1731","text":"Bonil Koo"},{"@pid":"53/1114","text":"Sun Kim"}]},"title":"Improved drug response prediction by drug target data integration via network-based profiling.","venue":"Briefings Bioinform.","volume":"24","number":"2","year":"2023","type":"Journal Articles","access":"closed","key":"journals/bib/PakLSKK23","doi":"10.1093/BIB/BBAD034","ee":"https://doi.org/10.1093/bib/bbad034","url":"https://dblp.org/rec/journals/bib/PakLSKK23"}, "url":"URL#101479" }, { "@score":"3", "@id":"101773", "info":{"authors":{"author":[{"@pid":"318/0718","text":"Panfeng Liu"},{"@pid":"16/729","text":"Longjie Li 0001"},{"@pid":"318/0855","text":"Yanhong Wen"},{"@pid":"239/2925","text":"Shiyu Fang"}]},"title":"Identifying Influential Nodes in Social Networks: Exploiting Self-Voting Mechanism.","venue":"Big Data","volume":"11","number":"4","pages":"296-306","year":"2023","type":"Journal Articles","access":"closed","key":"journals/bigdata/LiuLWF23","doi":"10.1089/BIG.2022.0165","ee":"https://doi.org/10.1089/big.2022.0165","url":"https://dblp.org/rec/journals/bigdata/LiuLWF23"}, "url":"URL#101773" }, { "@score":"3", "@id":"101784", "info":{"authors":{"author":{"@pid":"58/8446","text":"Chen Tao"}},"title":"Applications of Bayesian Neural Networks in Outlier Detection.","venue":"Big Data","volume":"11","number":"5","pages":"369-386","year":"2023","type":"Journal Articles","access":"closed","key":"journals/bigdata/Tao23","doi":"10.1089/BIG.2021.0343","ee":"https://doi.org/10.1089/big.2021.0343","url":"https://dblp.org/rec/journals/bigdata/Tao23"}, "url":"URL#101784" }, { "@score":"3", "@id":"102535", "info":{"authors":{"author":[{"@pid":"370/4873","text":"Luiz Felipe Piochi"},{"@pid":"277/6721","text":"António J. Preto"},{"@pid":"79/4429","text":"Irina S. Moreira"}]},"title":"DELFOS - drug efficacy leveraging forked and specialized networks - benchmarking scRNA-seq data in multi-omics-based prediction of cancer sensitivity.","venue":"Bioinform.","volume":"39","number":"10","year":"2023","type":"Journal Articles","access":"closed","key":"journals/bioinformatics/PiochiPM23","doi":"10.1093/BIOINFORMATICS/BTAD645","ee":"https://doi.org/10.1093/bioinformatics/btad645","url":"https://dblp.org/rec/journals/bioinformatics/PiochiPM23"}, "url":"URL#102535" }, { "@score":"3", "@id":"103187", "info":{"authors":{"author":[{"@pid":"335/4596","text":"Ivan Laktionov"},{"@pid":"358/3700","text":"Grigorii Diachenko"},{"@pid":"337/9418","text":"Valerii Koval"},{"@pid":"358/3575","text":"Mykhailo Yevstratiev"}]},"title":"Computer-Oriented Model for Network Aggregation of Measurement Data in IoT Monitoring of Soil and Climatic Parameters of Agricultural Crop Production Enterprises.","venue":"Balt. J. Mod. Comput.","volume":"11","number":"3","year":"2023","type":"Journal Articles","access":"open","key":"journals/bjmc/LaktionovDKY23","doi":"10.22364/BJMC.2023.11.3.09","ee":"https://doi.org/10.22364/bjmc.2023.11.3.09","url":"https://dblp.org/rec/journals/bjmc/LaktionovDKY23"}, "url":"URL#103187" }, { "@score":"3", "@id":"103573", "info":{"authors":{"author":[{"@pid":"343/6187","text":"Dario Tommasini"},{"@pid":"343/6214","text":"Brent L. Fogel"}]},"title":"multiWGCNA: an R package for deep mining gene co-expression networks in multi-trait expression data.","venue":"BMC Bioinform.","volume":"24","number":"1","pages":"115","year":"2023","type":"Journal Articles","access":"open","key":"journals/bmcbi/TommasiniF23","doi":"10.1186/S12859-023-05233-Z","ee":"https://doi.org/10.1186/s12859-023-05233-z","url":"https://dblp.org/rec/journals/bmcbi/TommasiniF23"}, "url":"URL#103573" }, { "@score":"3", "@id":"104144", "info":{"authors":{"author":[{"@pid":"348/1507","text":"J. Sulthan Alikhan"},{"@pid":"333/8535","text":"Alageswaran Ramaiah"},{"@pid":"05/8830","text":"S. Miruna Joe Amali"}]},"title":"Self-attention convolutional neural network optimized with season optimization algorithm Espoused Chronic Kidney Diseases Diagnosis in Big Data System.","venue":"Biomed. Signal Process. Control.","volume":"85","pages":"105011","year":"2023","type":"Journal Articles","access":"closed","key":"journals/bspc/AlikhanRA23","doi":"10.1016/J.BSPC.2023.105011","ee":"https://doi.org/10.1016/j.bspc.2023.105011","url":"https://dblp.org/rec/journals/bspc/AlikhanRA23"}, "url":"URL#104144" }, { "@score":"3", "@id":"106536", "info":{"authors":{"author":[{"@pid":"267/6630","text":"Aydin Sarraf"},{"@pid":"199/0712","text":"Fatemeh Baharifard"},{"@pid":"130/5615","text":"Kamal Rashedi"}]},"title":"A decoupled physics-informed neural network for recovering a space-dependent force function in the wave equation from integral overdetermination data.","venue":"Comput. Appl. Math.","volume":"42","number":"4","year":"2023","type":"Journal Articles","access":"closed","key":"journals/cam/SarrafBR23","doi":"10.1007/S40314-023-02323-9","ee":"https://doi.org/10.1007/s40314-023-02323-9","url":"https://dblp.org/rec/journals/cam/SarrafBR23"}, "url":"URL#106536" }, { "@score":"3", "@id":"107535", "info":{"authors":{"author":[{"@pid":"15/2171","text":"Jing Zheng"},{"@pid":"143/1833","text":"Chaher Alzaman"},{"@pid":"81/8620","text":"Ali Diabat"}]},"title":"Big data analytics in flexible supply chain networks.","venue":"Comput. Ind. Eng.","volume":"178","pages":"109098","year":"2023","type":"Journal Articles","access":"closed","key":"journals/candie/ZhengAD23","doi":"10.1016/J.CIE.2023.109098","ee":"https://doi.org/10.1016/j.cie.2023.109098","url":"https://dblp.org/rec/journals/candie/ZhengAD23"}, "url":"URL#107535" }, { "@score":"3", "@id":"108245", "info":{"authors":{"author":[{"@pid":"349/6356","text":"Antti Isosalo"},{"@pid":"256/0857","text":"Satu I. Inkinen"},{"@pid":"349/6128","text":"T. Turunen"},{"@pid":"349/6322","text":"Pieta S. Ipatti"},{"@pid":"17/305","text":"Jarmo Reponen"},{"@pid":"235/2916","text":"Miika T. Nieminen"}]},"title":"Independent evaluation of a multi-view multi-task convolutional neural network breast cancer classification model using Finnish mammography screening data.","venue":"Comput. Biol. Medicine","volume":"161","pages":"107023","year":"2023","type":"Journal Articles","access":"closed","key":"journals/cbm/IsosaloITIRN23","doi":"10.1016/J.COMPBIOMED.2023.107023","ee":"https://doi.org/10.1016/j.compbiomed.2023.107023","url":"https://dblp.org/rec/journals/cbm/IsosaloITIRN23"}, "url":"URL#108245" }, { "@score":"3", "@id":"108585", "info":{"authors":{"author":[{"@pid":"25/7700","text":"Lihong Peng"},{"@pid":"303/6593","text":"Xianzhi He"},{"@pid":"337/4503","text":"Xinhuai Peng"},{"@pid":"50/9635","text":"Zejun Li"},{"@pid":"89/5992","text":"Li Zhang"}]},"title":"STGNNks: Identifying cell types in spatial transcriptomics data based on graph neural network, denoising auto-encoder, and k-sums clustering.","venue":"Comput. Biol. Medicine","volume":"166","pages":"107440","year":"2023","type":"Journal Articles","access":"closed","key":"journals/cbm/PengHPLZ23","doi":"10.1016/J.COMPBIOMED.2023.107440","ee":"https://doi.org/10.1016/j.compbiomed.2023.107440","url":"https://dblp.org/rec/journals/cbm/PengHPLZ23"}, "url":"URL#108585" }, { "@score":"3", "@id":"108606", "info":{"authors":{"author":[{"@pid":"361/1908","text":"Weiye Qian"},{"@pid":"02/8125","text":"Zhiyuan Yang"}]},"title":"Identification of cell-type-specific genes in multimodal single-cell data using deep neural network algorithm.","venue":"Comput. Biol. Medicine","volume":"166","pages":"107498","year":"2023","type":"Journal Articles","access":"closed","key":"journals/cbm/QianY23","doi":"10.1016/J.COMPBIOMED.2023.107498","ee":"https://doi.org/10.1016/j.compbiomed.2023.107498","url":"https://dblp.org/rec/journals/cbm/QianY23"}, "url":"URL#108606" }, { "@score":"4", "@id":"108652", "info":{"authors":{"author":[{"@pid":"349/6403","text":"Muhammad Sadaqat"},{"@pid":"163/5201","text":"Muhammad Qasim"},{"@pid":"251/2897","text":"Muhammad Tahir Ul Qamar"},{"@pid":"283/0577","text":"Muhammad Shareef Masoud"},{"@pid":"275/6492","text":"Usman Ali Ashfaq"},{"@pid":"321/8756","text":"Fatima Noor"},{"@pid":"349/6009","text":"Kinza Fatima"},{"@pid":"315/0348","text":"Khaled S. Allemailem"},{"@pid":"349/6299","text":"Faris Alrumaihi"},{"@pid":"302/1509","text":"Ahmad Almatroudi"}]},"title":"Advanced network pharmacology study reveals multi-pathway and multi-gene regulatory molecular mechanism of Bacopa monnieri in liver cancer based on data mining, molecular modeling, and microarray data analysis.","venue":"Comput. Biol. Medicine","volume":"161","pages":"107059","year":"2023","type":"Journal Articles","access":"closed","key":"journals/cbm/SadaqatQQMANFAAA23","doi":"10.1016/J.COMPBIOMED.2023.107059","ee":"https://doi.org/10.1016/j.compbiomed.2023.107059","url":"https://dblp.org/rec/journals/cbm/SadaqatQQMANFAAA23"}, "url":"URL#108652" }, { "@score":"3", "@id":"110025", "info":{"authors":{"author":[{"@pid":"342/3750","text":"Radhwane Derraz"},{"@pid":"194/6781","text":"Farrah Melissa Muharam"},{"@pid":"342/3946","text":"Noraini Ahmad Jaafar"},{"@pid":"97/10403","text":"Keng-Yap Ng"}]},"title":"Trigonometric-Euclidean-Smoother Interpolator (TESI) for continuous time-series and non-time-series data augmentation for deep neural network applications in agriculture.","venue":"Comput. Electron. Agric.","volume":"206","pages":"107646","year":"2023","type":"Journal Articles","access":"closed","key":"journals/cea/DerrazMJN23","doi":"10.1016/J.COMPAG.2023.107646","ee":"https://doi.org/10.1016/j.compag.2023.107646","url":"https://dblp.org/rec/journals/cea/DerrazMJN23"}, "url":"URL#110025" }, { "@score":"3", "@id":"110245", "info":{"authors":{"author":[{"@pid":"181/2634","text":"Dan Lin"},{"@pid":"342/4594","text":"Ákos Kenéz"},{"@pid":"342/3769","text":"Jessica A. A. McArt"},{"@pid":"116/1011-51","text":"Jun Li 0051"}]},"title":"Transformer neural network to predict and interpret pregnancy loss from activity data in Holstein dairy cows.","venue":"Comput. Electron. Agric.","volume":"205","pages":"107638","year":"2023","type":"Journal Articles","access":"closed","key":"journals/cea/LinKML23","doi":"10.1016/J.COMPAG.2023.107638","ee":"https://doi.org/10.1016/j.compag.2023.107638","url":"https://dblp.org/rec/journals/cea/LinKML23"}, "url":"URL#110245" }, { "@score":"3", "@id":"110372", "info":{"authors":{"author":[{"@pid":"08/8357","text":"Rakesh Ranjan"},{"@pid":"342/3962","text":"Kata Sharrer"},{"@pid":"342/3900","text":"Scott Tsukuda"},{"@pid":"342/4133","text":"Christopher Good"}]},"title":"Effects of image data quality on a convolutional neural network trained in-tank fish detection model for recirculating aquaculture systems.","venue":"Comput. Electron. Agric.","volume":"205","pages":"107644","year":"2023","type":"Journal Articles","access":"open","key":"journals/cea/RanjanSTG23","doi":"10.1016/J.COMPAG.2023.107644","ee":"https://doi.org/10.1016/j.compag.2023.107644","url":"https://dblp.org/rec/journals/cea/RanjanSTG23"}, "url":"URL#110372" }, { "@score":"3", "@id":"111170", "info":{"authors":{"author":[{"@pid":"17/7579","text":"Wenjia Wu"},{"@pid":"80/6406","text":"Qi Qi"},{"@pid":"99/8589","text":"Xiaosheng Yu"}]},"title":"Deep learning-based data privacy protection in software-defined industrial networking.","venue":"Comput. Electr. Eng.","volume":"106","pages":"108578","year":"2023","type":"Journal Articles","access":"closed","key":"journals/cee/WuQY23","doi":"10.1016/J.COMPELECENG.2023.108578","ee":"https://doi.org/10.1016/j.compeleceng.2023.108578","url":"https://dblp.org/rec/journals/cee/WuQY23"}, "url":"URL#111170" }, { "@score":"3", "@id":"113193", "info":{"authors":{"author":[{"@pid":"03/4227","text":"Lanlan Rui"},{"@pid":"296/0874","text":"Shiyue Dai"},{"@pid":"25/2165","text":"Zhipeng Gao"},{"@pid":"13/342","text":"Xuesong Qiu 0001"},{"@pid":"59/7651","text":"Xingyu Chen"}]},"title":"Double-Lead Content Search And Producer Location Prediction Scheme For Producer Mobility In Named Data Networking.","venue":"Comput. J.","volume":"66","number":"11","pages":"2825-2843","year":"2023","type":"Journal Articles","access":"closed","key":"journals/cj/RuiDGQC23","doi":"10.1093/COMJNL/BXAC125","ee":"https://doi.org/10.1093/comjnl/bxac125","url":"https://dblp.org/rec/journals/cj/RuiDGQC23"}, "url":"URL#113193" }, { "@score":"3", "@id":"113506", "info":{"authors":{"author":[{"@pid":"355/4155","text":"M. P. G. K. Jayaweera"},{"@pid":"323/7118","text":"W. M. C. J. T. Kithulwatta"},{"@pid":"165/8756","text":"R. M. K. T. Rathnayaka"}]},"title":"Detect anomalies in cloud platforms by using network data: a review.","venue":"Clust. Comput.","volume":"26","number":"5","pages":"3279-3289","year":"2023","type":"Journal Articles","access":"closed","key":"journals/cluster/JayaweeraKR23","doi":"10.1007/S10586-023-04055-1","ee":"https://doi.org/10.1007/s10586-023-04055-1","url":"https://dblp.org/rec/journals/cluster/JayaweeraKR23"}, "url":"URL#113506" }, { "@score":"4", "@id":"114449", "info":{"authors":{"author":[{"@pid":"275/7919","text":"Naemeh Farahani"},{"@pid":"275/7585","text":"Shabnam Ghahari"},{"@pid":"77/4704","text":"Emad Fatemizadeh"},{"@pid":"19/3631","text":"Ali Motie Nasrabadi"}]},"title":"Effective connectivity inference in the whole-brain network by using rDCM method for investigating the distinction between emotional states in fMRI data.","venue":"Comput. methods Biomech. Biomed. Eng. Imaging Vis.","volume":"11","number":"3","pages":"453-466","year":"2023","type":"Journal Articles","access":"closed","key":"journals/cmbbeiv/FarahaniGFN23","doi":"10.1080/21681163.2022.2077235","ee":"https://doi.org/10.1080/21681163.2022.2077235","url":"https://dblp.org/rec/journals/cmbbeiv/FarahaniGFN23"}, "url":"URL#114449" }, { "@score":"3", "@id":"115304", "info":{"authors":{"author":[{"@pid":"316/8957","text":"Ali Aghasi"},{"@pid":"89/6153","text":"Kamal Jamshidi"},{"@pid":"11/8281","text":"Ali Bohlooli"},{"@pid":"79/5060","text":"Bahman Javadi"}]},"title":"A decentralized adaptation of model-free Q-learning for thermal-aware energy-efficient virtual machine placement in cloud data centers.","venue":"Comput. Networks","volume":"224","pages":"109624","year":"2023","type":"Journal Articles","access":"closed","key":"journals/cn/AghasiJBJ23","doi":"10.1016/J.COMNET.2023.109624","ee":"https://doi.org/10.1016/j.comnet.2023.109624","url":"https://dblp.org/rec/journals/cn/AghasiJBJ23"}, "url":"URL#115304" }, { "@score":"4", "@id":"115310", "info":{"authors":{"author":[{"@pid":"349/8269","text":"Alaa Alatram"},{"@pid":"170/2681","text":"Leslie F. Sikos"},{"@pid":"207/0536","text":"Mike Johnstone"},{"@pid":"19/10027","text":"Patryk Szewczyk"},{"@pid":"186/1573","text":"James Jin Kang"}]},"title":"DoS/DDoS-MQTT-IoT: A dataset for evaluating intrusions in IoT networks using the MQTT protocol.","venue":"Comput. Networks","volume":"231","pages":"109809","year":"2023","type":"Journal Articles","access":"open","key":"journals/cn/AlatramSJSK23","doi":"10.1016/J.COMNET.2023.109809","ee":"https://doi.org/10.1016/j.comnet.2023.109809","url":"https://dblp.org/rec/journals/cn/AlatramSJSK23"}, "url":"URL#115310" }, { "@score":"4", "@id":"115315", "info":{"authors":{"author":[{"@pid":"207/1120","text":"Zainab Hassan Ali"},{"@pid":"188/8159","text":"Noha A. Sakr"},{"@pid":"271/6178","text":"Nora El-Rashidy"},{"@pid":"30/2629","text":"Hesham A. Ali"}]},"title":"A reliable position-based routing scheme for controlling excessive data dissemination in vehicular ad-hoc networks.","venue":"Comput. Networks","volume":"229","pages":"109785","year":"2023","type":"Journal Articles","access":"closed","key":"journals/cn/AliSEA23","doi":"10.1016/J.COMNET.2023.109785","ee":"https://doi.org/10.1016/j.comnet.2023.109785","url":"https://dblp.org/rec/journals/cn/AliSEA23"}, "url":"URL#115315" }, { "@score":"4", "@id":"115316", "info":{"authors":{"author":[{"@pid":"186/8834","text":"Lamia Alkwai"},{"@pid":"90/1753","text":"Abdelfettah Belghith"},{"@pid":"50/152","text":"Achraf Gazdar"},{"@pid":"146/6941","text":"Saad Al-Ahmadi 0002"}]},"title":"Transparent consumer mobility management in named data networking under the push communication mode.","venue":"Comput. Networks","volume":"235","pages":"109953","year":"2023","type":"Journal Articles","access":"closed","key":"journals/cn/AlkwaiBGA23","doi":"10.1016/J.COMNET.2023.109953","ee":"https://doi.org/10.1016/j.comnet.2023.109953","url":"https://dblp.org/rec/journals/cn/AlkwaiBGA23"}, "url":"URL#115316" }, { "@score":"4", "@id":"115375", "info":{"authors":{"author":[{"@pid":"172/1644","text":"Pankaj Chaudhary"},{"@pid":"20/7949","text":"Neminath Hubballi"},{"@pid":"185/5705","text":"Sameer G. Kulkarni"}]},"title":"eNCache: Improving content delivery with cooperative caching in Named Data Networking.","venue":"Comput. Networks","volume":"237","pages":"110104","year":"2023","type":"Journal Articles","access":"closed","key":"journals/cn/ChaudharyHK23","doi":"10.1016/J.COMNET.2023.110104","ee":"https://doi.org/10.1016/j.comnet.2023.110104","url":"https://dblp.org/rec/journals/cn/ChaudharyHK23"}, "url":"URL#115375" }, { "@score":"3", "@id":"115380", "info":{"authors":{"author":[{"@pid":"14/3310","text":"Ye Chen"},{"@pid":"40/3387","text":"Yingxu Lai"},{"@pid":"36/9924","text":"Zhaoyi Zhang"},{"@pid":"325/2280","text":"Hanmei Li"},{"@pid":"50/1242","text":"Yuhang Wang"}]},"title":"MDFD: A multi-source data fusion detection framework for Sybil attack detection in VANETs.","venue":"Comput. Networks","volume":"224","pages":"109608","year":"2023","type":"Journal Articles","access":"closed","key":"journals/cn/ChenLZLW23","doi":"10.1016/J.COMNET.2023.109608","ee":"https://doi.org/10.1016/j.comnet.2023.109608","url":"https://dblp.org/rec/journals/cn/ChenLZLW23"}, "url":"URL#115380" }, { "@score":"3", "@id":"115408", "info":{"authors":{"author":[{"@pid":"264/2829","text":"Tho Minh Duong"},{"@pid":"350/8965","text":"Seung-Ho Hyun"},{"@pid":"72/2076","text":"Sungoh Kwon"}]},"title":"Channel modeling and achievable data rate for 1-D molecular communication in bounded environments.","venue":"Comput. Networks","volume":"232","pages":"109852","year":"2023","type":"Journal Articles","access":"closed","key":"journals/cn/DuongHK23","doi":"10.1016/J.COMNET.2023.109852","ee":"https://doi.org/10.1016/j.comnet.2023.109852","url":"https://dblp.org/rec/journals/cn/DuongHK23"}, "url":"URL#115408" }, { "@score":"3", "@id":"115426", "info":{"authors":{"author":[{"@pid":"42/5488","text":"Yanming Fu"},{"@pid":"56/5624","text":"Xian Zhang"},{"@pid":"189/3752","text":"Xiaoqiong Qin"},{"@pid":"272/8612","text":"Qingwen Meng"},{"@pid":"342/5560","text":"Bocheng Huang"}]},"title":"Data collection of multi-player cooperative game based on edge computing in mobile crowd sensing.","venue":"Comput. Networks","volume":"222","pages":"109551","year":"2023","type":"Journal Articles","access":"closed","key":"journals/cn/FuZQMH23","doi":"10.1016/J.COMNET.2022.109551","ee":"https://doi.org/10.1016/j.comnet.2022.109551","url":"https://dblp.org/rec/journals/cn/FuZQMH23"}, "url":"URL#115426" }, { "@score":"4", "@id":"115468", "info":{"authors":{"author":[{"@pid":"314/9693","text":"So-Eun Jeon"},{"@pid":"314/9717","text":"Sun-Jin Lee"},{"@pid":"26/1593","text":"Il-Gu Lee"}]},"title":"Hybrid in-network computing and distributed learning for large-scale data processing.","venue":"Comput. Networks","volume":"226","pages":"109686","year":"2023","type":"Journal Articles","access":"closed","key":"journals/cn/JeonLL23","doi":"10.1016/J.COMNET.2023.109686","ee":"https://doi.org/10.1016/j.comnet.2023.109686","url":"https://dblp.org/rec/journals/cn/JeonLL23"}, "url":"URL#115468" }, { "@score":"4", "@id":"115517", "info":{"authors":{"author":[{"@pid":"68/9982","text":"David Chunhu Li"},{"@pid":"285/1444","text":"Muhamad Rizka Maulana"},{"@pid":"93/6509","text":"Li-Der Chou"}]},"title":"NNSplit-SØREN: Supporting the model implementation of large neural networks in a programmable data plane.","venue":"Comput. Networks","volume":"222","pages":"109537","year":"2023","type":"Journal Articles","access":"closed","key":"journals/cn/LiMC23","doi":"10.1016/J.COMNET.2022.109537","ee":"https://doi.org/10.1016/j.comnet.2022.109537","url":"https://dblp.org/rec/journals/cn/LiMC23"}, "url":"URL#115517" }, { "@score":"3", "@id":"115540", "info":{"authors":{"author":[{"@pid":"76/2081","text":"Zhenpeng Liu"},{"@pid":"63/1591","text":"Shuo Wang"},{"@pid":"97/4626","text":"Yi Liu"}]},"title":"Blockchain-based integrity auditing for shared data in cloud storage with file prediction.","venue":"Comput. Networks","volume":"236","pages":"110040","year":"2023","type":"Journal Articles","access":"closed","key":"journals/cn/LiuWL23","doi":"10.1016/J.COMNET.2023.110040","ee":"https://doi.org/10.1016/j.comnet.2023.110040","url":"https://dblp.org/rec/journals/cn/LiuWL23"}, "url":"URL#115540" }, { "@score":"3", "@id":"115542", "info":{"authors":{"author":[{"@pid":"17/1195","text":"Lingling Liu"},{"@pid":"37/811","text":"Aimin Wang"},{"@pid":"31/3668-1","text":"Geng Sun 0001"},{"@pid":"153/2952-2","text":"Jiahui Li 0002"}]},"title":"Maximizing data gathering and energy efficiency in UAV-assisted IoT: A multi-objective optimization approach.","venue":"Comput. Networks","volume":"235","pages":"109986","year":"2023","type":"Journal Articles","access":"closed","key":"journals/cn/LiuWSL23","doi":"10.1016/J.COMNET.2023.109986","ee":"https://doi.org/10.1016/j.comnet.2023.109986","url":"https://dblp.org/rec/journals/cn/LiuWSL23"}, "url":"URL#115542" }, { "@score":"4", "@id":"115551", "info":{"authors":{"author":[{"@pid":"10/5980","text":"Yuan Lu"},{"@pid":"294/1836","text":"Guoyuan Yuan"},{"@pid":"39/6825","text":"Yang Bai"},{"@pid":"06/1511","text":"Dezun Dong"},{"@pid":"25/9081","text":"Renjie Zhou"}]},"title":"EagerCC: An ultra-low latency congestion control mechanism in datacenter networks.","venue":"Comput. Networks","volume":"236","pages":"110009","year":"2023","type":"Journal Articles","access":"closed","key":"journals/cn/LuYBDZ23","doi":"10.1016/J.COMNET.2023.110009","ee":"https://doi.org/10.1016/j.comnet.2023.110009","url":"https://dblp.org/rec/journals/cn/LuYBDZ23"}, "url":"URL#115551" }, { "@score":"3", "@id":"115565", "info":{"authors":{"author":[{"@pid":"325/2268","text":"Navid Malekghaini"},{"@pid":"161/4624","text":"Elham Akbari"},{"@pid":"52/3563","text":"Mohammad A. Salahuddin 0001"},{"@pid":"82/281","text":"Noura Limam"},{"@pid":"b/RaoufBoutaba","text":"Raouf Boutaba"},{"@pid":"19/3021","text":"Bertrand Mathieu"},{"@pid":"137/0171","text":"Stephanie Moteau"},{"@pid":"142/4809","text":"Stéphane Tuffin"}]},"title":"Deep learning for encrypted traffic classification in the face of data drift: An empirical study.","venue":"Comput. Networks","volume":"225","pages":"109648","year":"2023","type":"Journal Articles","access":"closed","key":"journals/cn/MalekghainiASLBMMT23","doi":"10.1016/J.COMNET.2023.109648","ee":"https://doi.org/10.1016/j.comnet.2023.109648","url":"https://dblp.org/rec/journals/cn/MalekghainiASLBMMT23"}, "url":"URL#115565" }, { "@score":"3", "@id":"115640", "info":{"authors":{"author":[{"@pid":"349/7976","text":"Mehmet Emin Sahin"},{"@pid":"20/2310","text":"Mehmet Demirci"}]},"title":"ConPoolUBF: Connection pooling and updatable Bloom filter based SYN flood defense in programmable data planes.","venue":"Comput. Networks","volume":"231","pages":"109802","year":"2023","type":"Journal Articles","access":"closed","key":"journals/cn/SahinD23","doi":"10.1016/J.COMNET.2023.109802","ee":"https://doi.org/10.1016/j.comnet.2023.109802","url":"https://dblp.org/rec/journals/cn/SahinD23"}, "url":"URL#115640" }, { "@score":"3", "@id":"115641", "info":{"authors":{"author":[{"@pid":"74/506","text":"Shahab Salehi"},{"@pid":"57/10661","text":"Hamed Farbeh"},{"@pid":"332/2446","text":"Alireza Rokhsari"}]},"title":"An adaptive data coding scheme for energy consumption reduction in SDN-based Internet of Things.","venue":"Comput. Networks","volume":"221","pages":"109528","year":"2023","type":"Journal Articles","access":"closed","key":"journals/cn/SalehiFR23","doi":"10.1016/J.COMNET.2022.109528","ee":"https://doi.org/10.1016/j.comnet.2022.109528","url":"https://dblp.org/rec/journals/cn/SalehiFR23"}, "url":"URL#115641" }, { "@score":"3", "@id":"115667", "info":{"authors":{"author":[{"@pid":"99/4923","text":"Sheng Sun"},{"@pid":"251/6608","text":"Zengqi Zhang"},{"@pid":"337/2871","text":"Quyang Pan"},{"@pid":"99/76-1","text":"Min Liu 0001"},{"@pid":"20/6301","text":"Zhongcheng Li"}]},"title":"Vehicle-cluster-based opportunistic relays for data collection in intelligent transportation systems.","venue":"Comput. Networks","volume":"220","pages":"109509","year":"2023","type":"Journal Articles","access":"closed","key":"journals/cn/SunZPLL23","doi":"10.1016/J.COMNET.2022.109509","ee":"https://doi.org/10.1016/j.comnet.2022.109509","url":"https://dblp.org/rec/journals/cn/SunZPLL23"}, "url":"URL#115667" }, { "@score":"3", "@id":"115688", "info":{"authors":{"author":[{"@pid":"277/8308","text":"Adrián Campazas Vega"},{"@pid":"281/5984","text":"Ignacio Samuel Crespo-Martínez"},{"@pid":"152/8812","text":"Ángel Manuel Guerrero Higueras"},{"@pid":"215/3855","text":"Claudia Álvarez-Aparicio"},{"@pid":"74/5194","text":"Vicente Matellán"},{"@pid":"65/6268","text":"Camino Fernández Llamas"}]},"title":"Analyzing the influence of the sampling rate in the detection of malicious traffic on flow data.","venue":"Comput. Networks","volume":"235","pages":"109951","year":"2023","type":"Journal Articles","access":"open","key":"journals/cn/VegaCHAML23","doi":"10.1016/J.COMNET.2023.109951","ee":"https://doi.org/10.1016/j.comnet.2023.109951","url":"https://dblp.org/rec/journals/cn/VegaCHAML23"}, "url":"URL#115688" }, { "@score":"3", "@id":"115703", "info":{"authors":{"author":[{"@pid":"67/3317-3","text":"Miaomiao Wang 0003"},{"@pid":"03/4227","text":"Lanlan Rui"},{"@pid":"189/8212","text":"Siya Xu"},{"@pid":"25/2165","text":"Zhipeng Gao"},{"@pid":"122/0727","text":"Huiyong Liu"},{"@pid":"150/6843","text":"Shaoyong Guo"}]},"title":"A multi-keyword searchable encryption sensitive data trusted sharing scheme in multi-user scenario.","venue":"Comput. Networks","volume":"237","pages":"110045","year":"2023","type":"Journal Articles","access":"closed","key":"journals/cn/WangRXGLG23","doi":"10.1016/J.COMNET.2023.110045","ee":"https://doi.org/10.1016/j.comnet.2023.110045","url":"https://dblp.org/rec/journals/cn/WangRXGLG23"}, "url":"URL#115703" }, { "@score":"4", "@id":"115705", "info":{"authors":{"author":[{"@pid":"31/7721","text":"Kaiyu Wang"},{"@pid":"35/10549","text":"Zhiying Tu"},{"@pid":"23/3418","text":"Zhenzhou Ji"},{"@pid":"306/5807","text":"Shufan He"}]},"title":"Multi-stage data synchronization for public blockchain in complex network environment.","venue":"Comput. Networks","volume":"235","pages":"109952","year":"2023","type":"Journal Articles","access":"closed","key":"journals/cn/WangTJH23","doi":"10.1016/J.COMNET.2023.109952","ee":"https://doi.org/10.1016/j.comnet.2023.109952","url":"https://dblp.org/rec/journals/cn/WangTJH23"}, "url":"URL#115705" }, { "@score":"3", "@id":"115720", "info":{"authors":{"author":[{"@pid":"197/6506-2","text":"Qiyu Wu 0002"},{"@pid":"30/5925","text":"Fucai Zhou"},{"@pid":"73/1149-4","text":"Jian Xu 0004"},{"@pid":"63/7702","text":"Da Feng"}]},"title":"Lightweight and Verifiable Secure Aggregation for Multi-dimensional Data in Edge-enhanced IoT.","venue":"Comput. Networks","volume":"237","pages":"110079","year":"2023","type":"Journal Articles","access":"closed","key":"journals/cn/WuZXF23","doi":"10.1016/J.COMNET.2023.110079","ee":"https://doi.org/10.1016/j.comnet.2023.110079","url":"https://dblp.org/rec/journals/cn/WuZXF23"}, "url":"URL#115720" }, { "@score":"4", "@id":"115724", "info":{"authors":{"author":[{"@pid":"44/9881","text":"Runqun Xiong"},{"@pid":"10/10448","text":"Chuan Liang"},{"@pid":"27/103","text":"Huajun Zhang"},{"@pid":"172/1282","text":"Xiangyu Xu"},{"@pid":"l/JunzhouLuo","text":"Junzhou Luo"}]},"title":"FlyingLoRa: Towards energy efficient data collection in UAV-assisted LoRa networks.","venue":"Comput. Networks","volume":"220","pages":"109511","year":"2023","type":"Journal Articles","access":"closed","key":"journals/cn/XiongLZXL23","doi":"10.1016/J.COMNET.2022.109511","ee":"https://doi.org/10.1016/j.comnet.2022.109511","url":"https://dblp.org/rec/journals/cn/XiongLZXL23"}, "url":"URL#115724" }, { "@score":"3", "@id":"115738", "info":{"authors":{"author":[{"@pid":"49/1457","text":"Cheng Yang"},{"@pid":"99/8966","text":"Yangming Zhao"},{"@pid":"201/1240","text":"Gongming Zhao"},{"@pid":"22/1748","text":"Hongli Xu"}]},"title":"DFS: Joint data formatting and sparsification for efficient communication in Distributed Machine Learning.","venue":"Comput. Networks","volume":"229","pages":"109777","year":"2023","type":"Journal Articles","access":"closed","key":"journals/cn/YangZZX23","doi":"10.1016/J.COMNET.2023.109777","ee":"https://doi.org/10.1016/j.comnet.2023.109777","url":"https://dblp.org/rec/journals/cn/YangZZX23"}, "url":"URL#115738" }, { "@score":"3", "@id":"115745", "info":{"authors":{"author":[{"@pid":"264/4023","text":"Jiayi Yu"},{"@pid":"28/3062","text":"Anfeng Liu"},{"@pid":"x/NaixueXiong","text":"Neal N. Xiong"},{"@pid":"02/4385-1","text":"Shaobo Zhang 0001"},{"@pid":"25/3246-1","text":"Tian Wang 0001"},{"@pid":"62/6234","text":"Mianxiong Dong"}]},"title":"Employing Social Participants for Timely Data Collection Using Pub/sub Solutions in Dynamic IoT Systems.","venue":"Comput. Networks","volume":"220","pages":"109501","year":"2023","type":"Journal Articles","access":"closed","key":"journals/cn/YuLXZWD23","doi":"10.1016/J.COMNET.2022.109501","ee":"https://doi.org/10.1016/j.comnet.2022.109501","url":"https://dblp.org/rec/journals/cn/YuLXZWD23"}, "url":"URL#115745" }, { "@score":"3", "@id":"115764", "info":{"authors":{"author":[{"@pid":"50/6611","text":"Quanwei Zhang"},{"@pid":"51/452","text":"Qingjun Xiao"},{"@pid":"280/1031","text":"Yuexiao Cai"}]},"title":"A generic sketch for estimating super-spreaders and per-flow cardinality distribution in high-speed data streams.","venue":"Comput. Networks","volume":"237","pages":"110059","year":"2023","type":"Journal Articles","access":"closed","key":"journals/cn/ZhangXC23","doi":"10.1016/J.COMNET.2023.110059","ee":"https://doi.org/10.1016/j.comnet.2023.110059","url":"https://dblp.org/rec/journals/cn/ZhangXC23"}, "url":"URL#115764" }, { "@score":"4", "@id":"115780", "info":{"authors":{"author":[{"@pid":"45/10585","text":"Konglin Zhu"},{"@pid":"76/1349","text":"Wentao Chen"},{"@pid":"47/91-2","text":"Lei Jiao 0002"},{"@pid":"118/4638","text":"Jiaxing Wang"},{"@pid":"162/4673","text":"Yuyang Peng"},{"@pid":"37/1629-13","text":"Lin Zhang 0013"}]},"title":"Online training data acquisition for federated learning in cloud-edge networks.","venue":"Comput. Networks","volume":"223","pages":"109556","year":"2023","type":"Journal Articles","access":"closed","key":"journals/cn/ZhuCJWPZ23","doi":"10.1016/J.COMNET.2023.109556","ee":"https://doi.org/10.1016/j.comnet.2023.109556","url":"https://dblp.org/rec/journals/cn/ZhuCJWPZ23"}, "url":"URL#115780" }, { "@score":"3", "@id":"115784", "info":{"authors":{"author":[{"@pid":"278/3637","text":"Zhengbin Zhu"},{"@pid":"55/6749","text":"Hong Yu"},{"@pid":"36/10480","text":"Qinrang Liu"},{"@pid":"26/8197","text":"Dongpei Liu"},{"@pid":"171/7042","text":"Bo Mei"}]},"title":"FFRLI: Fast fault recovery scheme based on link importance for data plane in SDN.","venue":"Comput. Networks","volume":"237","pages":"110062","year":"2023","type":"Journal Articles","access":"closed","key":"journals/cn/ZhuYLLM23","doi":"10.1016/J.COMNET.2023.110062","ee":"https://doi.org/10.1016/j.comnet.2023.110062","url":"https://dblp.org/rec/journals/cn/ZhuYLLM23"}, "url":"URL#115784" }, { "@score":"3", "@id":"116658", "info":{"authors":{"author":[{"@pid":"294/0574","text":"Franz A. Van-Horenbeke"},{"@pid":"49/4866","text":"Angelika Peer"}]},"title":"NILRNN: A Neocortex-Inspired Locally Recurrent Neural Network for Unsupervised Feature Learning in Sequential Data.","venue":"Cogn. Comput.","volume":"15","number":"5","pages":"1549-1565","year":"2023","type":"Journal Articles","access":"open","key":"journals/cogcom/VanHorenbekeP23","doi":"10.1007/S12559-023-10122-X","ee":"https://doi.org/10.1007/s12559-023-10122-x","url":"https://dblp.org/rec/journals/cogcom/VanHorenbekeP23"}, "url":"URL#116658" }, { "@score":"3", "@id":"116891", "info":{"title":"Retraction notice to "Parallel distributed computing based wireless sensor network anomaly data detection in IoT framework" [Cogn. Syst. Res. 52 (2018) 342-350].","venue":"Cogn. Syst. Res.","volume":"82","pages":"101135","year":"2023","type":"Journal Articles","access":"closed","key":"journals/cogsr/LiSWZ23","doi":"10.1016/J.COGSYS.2023.06.013","ee":"https://doi.org/10.1016/j.cogsys.2023.06.013","url":"https://dblp.org/rec/journals/cogsr/LiSWZ23"}, "url":"URL#116891" }, { "@score":"3", "@id":"117251", "info":{"authors":{"author":[{"@pid":"98/418","text":"Novella Bartolini"},{"@pid":"252/1425","text":"Andrea Coletta"},{"@pid":"338/0062","text":"Flavio Giorgi"},{"@pid":"79/5259","text":"Gaia Maselli"},{"@pid":"303/7091","text":"Matteo Prata"},{"@pid":"249/3632","text":"Domenicomichele Silvestri"}]},"title":"Stop & Offload: Periodic data offloading in UAV networks.","venue":"Comput. Commun.","volume":"212","pages":"239-250","year":"2023","type":"Journal Articles","access":"closed","key":"journals/comcom/BartoliniCGMPS23","doi":"10.1016/J.COMCOM.2023.10.003","ee":"https://doi.org/10.1016/j.comcom.2023.10.003","url":"https://dblp.org/rec/journals/comcom/BartoliniCGMPS23"}, "url":"URL#117251" }, { "@score":"4", "@id":"117288", "info":{"authors":{"author":[{"@pid":"358/8659","text":"Wenlan Diao"},{"@pid":"91/2709","text":"Jianping An"},{"@pid":"29/3826","text":"Tong Li"},{"@pid":"76/445-2","text":"Chao Zhu 0002"},{"@pid":"50/671-79","text":"Yu Zhang 0079"},{"@pid":"30/8606","text":"Xiaotian Wang"},{"@pid":"358/8704","text":"Zhoujie Liu"}]},"title":"Low delay fragment forwarding in LEO satellite networks based on named data networking.","venue":"Comput. Commun.","volume":"211","pages":"216-228","year":"2023","type":"Journal Articles","access":"closed","key":"journals/comcom/DiaoALZZWL23","doi":"10.1016/J.COMCOM.2023.08.022","ee":"https://doi.org/10.1016/j.comcom.2023.08.022","url":"https://dblp.org/rec/journals/comcom/DiaoALZZWL23"}, "url":"URL#117288" }, { "@score":"4", "@id":"117311", "info":{"authors":{"author":[{"@pid":"337/6113","text":"Aoxiang Feng"},{"@pid":"06/1511","text":"Dezun Dong"},{"@pid":"181/0728","text":"Fei Lei"},{"@pid":"76/622","text":"Junchao Ma"},{"@pid":"295/8923","text":"Enda Yu"},{"@pid":"08/4252","text":"Ruiqi Wang"}]},"title":"In-network aggregation for data center networks: A survey.","venue":"Comput. Commun.","volume":"198","pages":"63-76","year":"2023","type":"Journal Articles","access":"closed","key":"journals/comcom/FengDLMYW23","doi":"10.1016/J.COMCOM.2022.11.004","ee":"https://doi.org/10.1016/j.comcom.2022.11.004","url":"https://dblp.org/rec/journals/comcom/FengDLMYW23"}, "url":"URL#117311" }, { "@score":"3", "@id":"117381", "info":{"authors":{"author":[{"@pid":"50/3402-25","text":"Bo Li 0025"},{"@pid":"216/6883","text":"Ruizhi Wu"}]},"title":"Joint perception data caching and computation offloading in MEC-enabled vehicular networks.","venue":"Comput. Commun.","volume":"199","pages":"139-152","year":"2023","type":"Journal Articles","access":"closed","key":"journals/comcom/LiW23","doi":"10.1016/J.COMCOM.2022.12.021","ee":"https://doi.org/10.1016/j.comcom.2022.12.021","url":"https://dblp.org/rec/journals/comcom/LiW23"}, "url":"URL#117381" }, { "@score":"3", "@id":"117403", "info":{"authors":{"author":[{"@pid":"79/3426","text":"Yifei Lu"},{"@pid":"282/5481","text":"Zhengzhi Xu"},{"@pid":"77/9370","text":"Xu Ma"}]},"title":"FAMG: A flow-aware and mixed granularity method for load-balancing in data center networks.","venue":"Comput. Commun.","volume":"209","pages":"415-428","year":"2023","type":"Journal Articles","access":"closed","key":"journals/comcom/LuXM23","doi":"10.1016/J.COMCOM.2023.07.018","ee":"https://doi.org/10.1016/j.comcom.2023.07.018","url":"https://dblp.org/rec/journals/comcom/LuXM23"}, "url":"URL#117403" }, { "@score":"3", "@id":"117472", "info":{"authors":{"author":{"@pid":"00/6342","text":"Jian Song"}},"title":"Data conversion control of virtual network devices in cloud computing: A deep reinforcement learning approach.","venue":"Comput. Commun.","volume":"211","pages":"254-262","year":"2023","type":"Journal Articles","access":"closed","key":"journals/comcom/Song23","doi":"10.1016/J.COMCOM.2023.09.011","ee":"https://doi.org/10.1016/j.comcom.2023.09.011","url":"https://dblp.org/rec/journals/comcom/Song23"}, "url":"URL#117472" }, { "@score":"3", "@id":"117481", "info":{"authors":{"author":[{"@pid":"180/5696","text":"Zhongzheng Tang"},{"@pid":"39/934","text":"Nuo Yu"},{"@pid":"j/XiaohuaJia","text":"Xiaohua Jia"},{"@pid":"254/7799","text":"Xiaodong Hu"}]},"title":"Data Placement and Transmission Scheduling for coded multicast in mobile edge networks.","venue":"Comput. Commun.","volume":"207","pages":"140-149","year":"2023","type":"Journal Articles","access":"closed","key":"journals/comcom/TangYJH23","doi":"10.1016/J.COMCOM.2023.05.016","ee":"https://doi.org/10.1016/j.comcom.2023.05.016","url":"https://dblp.org/rec/journals/comcom/TangYJH23"}, "url":"URL#117481" }, { "@score":"3", "@id":"117947", "info":{"authors":{"author":[{"@pid":"293/0303","text":"Aruane M. Pineda"},{"@pid":"25/11141","text":"Francisco Aparecido Rodrigues"},{"@pid":"304/4944","text":"Caroline L. Alves"},{"@pid":"312/5190","text":"Michael Möckel"},{"@pid":"290/3973","text":"Thaise G. L. de O. Toutain"},{"@pid":"290/4131","text":"Joel Augusto Moura Porto"}]},"title":"Analysis of quantile graphs in EGC data from elderly and young individuals using machine learning and deep learning.","venue":"J. Complex Networks","volume":"11","number":"5","year":"2023","type":"Journal Articles","access":"closed","key":"journals/compnet/PinedaRAMTP23","doi":"10.1093/COMNET/CNAD030","ee":"https://doi.org/10.1093/comnet/cnad030","url":"https://dblp.org/rec/journals/compnet/PinedaRAMTP23"}, "url":"URL#117947" }, { "@score":"3", "@id":"117957", "info":{"title":"Correction to: Analysis of quantile graphs in EGC data from elderly and young individuals using machine learning and deep learning.","venue":"J. Complex Networks","volume":"11","number":"5","year":"2023","type":"Journal Articles","access":"closed","key":"journals/compnet/X23b","doi":"10.1093/COMNET/CNAD041","ee":"https://doi.org/10.1093/comnet/cnad041","url":"https://dblp.org/rec/journals/compnet/X23b"}, "url":"URL#117957" }, { "@score":"3", "@id":"118047", "info":{"authors":{"author":[{"@pid":"281/5984","text":"Ignacio Samuel Crespo-Martínez"},{"@pid":"277/8308","text":"Adrián Campazas Vega"},{"@pid":"152/8812","text":"Ángel Manuel Guerrero Higueras"},{"@pid":"220/8302","text":"Virginia Riego-Del Castillo"},{"@pid":"215/3855","text":"Claudia Álvarez-Aparicio"},{"@pid":"65/6268","text":"Camino Fernández Llamas"}]},"title":"SQL injection attack detection in network flow data.","venue":"Comput. Secur.","volume":"127","pages":"103093","year":"2023","type":"Journal Articles","access":"open","key":"journals/compsec/CrespoMartinezVHCAL23","doi":"10.1016/J.COSE.2023.103093","ee":"https://doi.org/10.1016/j.cose.2023.103093","url":"https://dblp.org/rec/journals/compsec/CrespoMartinezVHCAL23"}, "url":"URL#118047" }, { "@score":"3", "@id":"118104", "info":{"authors":{"author":[{"@pid":"34/2896","text":"Yinghua Han"},{"@pid":"332/0145","text":"Hantong Feng"},{"@pid":"266/4046","text":"Keke Li"},{"@pid":"00/2166","text":"Qiang Zhao"}]},"title":"False data injection attacks detection with modified temporal multi-graph convolutional network in smart grids.","venue":"Comput. Secur.","volume":"124","pages":"103016","year":"2023","type":"Journal Articles","access":"closed","key":"journals/compsec/HanFLZ23","doi":"10.1016/J.COSE.2022.103016","ee":"https://doi.org/10.1016/j.cose.2022.103016","url":"https://dblp.org/rec/journals/compsec/HanFLZ23"}, "url":"URL#118104" }, { "@score":"5", "@id":"118142", "info":{"authors":{"author":[{"@pid":"85/1809","text":"Jinwoo Kim"},{"@pid":"177/3037","text":"Yeonkeun Kim"},{"@pid":"75/3570","text":"Vinod Yegneswaran"},{"@pid":"48/3729","text":"Phillip A. Porras"},{"@pid":"84/3319","text":"Seungwon Shin"},{"@pid":"164/1709","text":"Taejune Park"}]},"title":"Extended data plane architecture for in-network security services in software-defined networks.","venue":"Comput. Secur.","volume":"124","pages":"102976","year":"2023","type":"Journal Articles","access":"closed","key":"journals/compsec/KimKYPSP23","doi":"10.1016/J.COSE.2022.102976","ee":"https://doi.org/10.1016/j.cose.2022.102976","url":"https://dblp.org/rec/journals/compsec/KimKYPSP23"}, "url":"URL#118142" }, { "@score":"3", "@id":"118244", "info":{"authors":{"author":[{"@pid":"144/7153","text":"Bishwajeet K. Pandey"},{"@pid":"246/9150","text":"M. R. M. VeeraManickam"},{"@pid":"263/6436","text":"Shabeer Ahmad"},{"@pid":"290/2384","text":"Ciro Rodriguez Rodriguez"},{"@pid":"290/2602","text":"Doris Esenarro Vargas"}]},"title":"ExpSSOA-Deep maxout: Exponential Shuffled shepherd optimization based Deep maxout network for intrusion detection using big data in cloud computing framework.","venue":"Comput. Secur.","volume":"124","pages":"102975","year":"2023","type":"Journal Articles","access":"closed","key":"journals/compsec/PandeyVARV23","doi":"10.1016/J.COSE.2022.102975","ee":"https://doi.org/10.1016/j.cose.2022.102975","url":"https://dblp.org/rec/journals/compsec/PandeyVARV23"}, "url":"URL#118244" }, { "@score":"3", "@id":"119165", "info":{"authors":{"author":[{"@pid":"345/1393","text":"Miklós Vincze"},{"@pid":"99/562","text":"Béla Molnár"},{"@pid":"00/2891","text":"Miklos Kozlovszky"}]},"title":"Real-Time Network Video Data Streaming in Digital Medicine.","venue":"Comput.","volume":"12","number":"11","pages":"234","year":"2023","type":"Journal Articles","access":"open","key":"journals/computers/VinczeMK23","doi":"10.3390/COMPUTERS12110234","ee":"https://doi.org/10.3390/computers12110234","url":"https://dblp.org/rec/journals/computers/VinczeMK23"}, "url":"URL#119165" }, { "@score":"3", "@id":"119291", "info":{"authors":{"author":[{"@pid":"331/7833","text":"Chandra Bhushan Kumar Yadav"},{"@pid":"95/8260","text":"Dinesh Dash"}]},"title":"An energy efficient periodic data gathering and charging schedule using MVs in wireless rechargeable sensor networks.","venue":"Computing","volume":"105","number":"11","pages":"2563-2593","year":"2023","type":"Journal Articles","access":"closed","key":"journals/computing/YadavD23","doi":"10.1007/S00607-023-01195-5","ee":"https://doi.org/10.1007/s00607-023-01195-5","url":"https://dblp.org/rec/journals/computing/YadavD23"}, "url":"URL#119291" }, { "@score":"3", "@id":"119435", "info":{"authors":{"author":[{"@pid":"14/7219","text":"Somayeh Kianpisheh"},{"@pid":"09/3053","text":"Tarik Taleb"}]},"title":"A Survey on In-Network Computing: Programmable Data Plane and Technology Specific Applications.","venue":"IEEE Commun. Surv. Tutorials","volume":"25","number":"1","pages":"701-761","year":"2023","type":"Journal Articles","access":"open","key":"journals/comsur/KianpishehT23","doi":"10.1109/COMST.2022.3213237","ee":"https://doi.org/10.1109/COMST.2022.3213237","url":"https://dblp.org/rec/journals/comsur/KianpishehT23"}, "url":"URL#119435" }, { "@score":"3", "@id":"119457", "info":{"authors":{"author":[{"@pid":"214/1922","text":"Haneya Naeem Qureshi"},{"@pid":"233/5254","text":"Usama Masood"},{"@pid":"261/7620","text":"Marvin Manalastas"},{"@pid":"125/3710","text":"Syed Muhammad Asad Zaidi"},{"@pid":"60/11266","text":"Hasan Farooq"},{"@pid":"167/2148","text":"Julien Forgeat"},{"@pid":"199/1702","text":"Maxime Bouton"},{"@pid":"239/2694","text":"Shruti Bothe"},{"@pid":"84/2592","text":"Per Karlsson"},{"@pid":"220/7292","text":"Ali Rizwan"},{"@pid":"167/1888","text":"Ali Imran 0001"}]},"title":"Toward Addressing Training Data Scarcity Challenge in Emerging Radio Access Networks: A Survey and Framework.","venue":"IEEE Commun. Surv. Tutorials","volume":"25","number":"3","pages":"1954-1990","year":"2023","type":"Journal Articles","access":"open","key":"journals/comsur/QureshiMMZFFBBKRI23","doi":"10.1109/COMST.2023.3271419","ee":"https://doi.org/10.1109/COMST.2023.3271419","url":"https://dblp.org/rec/journals/comsur/QureshiMMZFFBBKRI23"}, "url":"URL#119457" }, { "@score":"3", "@id":"119601", "info":{"authors":{"author":[{"@pid":"167/2289","text":"Brice Ekane"},{"@pid":"77/2224","text":"Alain Tchana"},{"@pid":"46/902","text":"Daniel Hagimont"},{"@pid":"167/2259","text":"Boris Teabe"},{"@pid":"58/3793","text":"Noel De Palma"}]},"title":"Networking in next generation disaggregated datacenters.","venue":"Concurr. Comput. Pract. Exp.","volume":"35","number":"21","year":"2023","type":"Journal Articles","access":"open","key":"journals/concurrency/EkaneTHTP23","doi":"10.1002/CPE.7702","ee":"https://doi.org/10.1002/cpe.7702","url":"https://dblp.org/rec/journals/concurrency/EkaneTHTP23"}, "url":"URL#119601" }, { "@score":"3", "@id":"119656", "info":{"authors":{"author":[{"@pid":"197/5919","text":"Zhenzhen He"},{"@pid":"01/6743","text":"Jiong Yu"},{"@pid":"336/7926","text":"Tiquan Gu"},{"@pid":"11/751","text":"Zhe Li"},{"@pid":"306/2607","text":"Xusheng Du"},{"@pid":"62/5860","text":"Ping Li"}]},"title":"Query cost estimation in graph databases via emphasizing query dependencies by using a neural reasoning network.","venue":"Concurr. Comput. Pract. Exp.","volume":"35","number":"23","year":"2023","type":"Journal Articles","access":"closed","key":"journals/concurrency/HeYGLDL23","doi":"10.1002/CPE.7817","ee":"https://doi.org/10.1002/cpe.7817","url":"https://dblp.org/rec/journals/concurrency/HeYGLDL23"}, "url":"URL#119656" }, { "@score":"3", "@id":"119715", "info":{"authors":{"author":[{"@pid":"344/4634","text":"Madhu Kirola"},{"@pid":"343/9532","text":"Minakshi Memoria"},{"@pid":"116/2840","text":"Ankur Dumka"}]},"title":"Optimized U-Net convolutional neural network based breast cancer prediction for accuracy increment in big data.","venue":"Concurr. Comput. Pract. Exp.","volume":"35","number":"9","year":"2023","type":"Journal Articles","access":"closed","key":"journals/concurrency/KirolaMD23","doi":"10.1002/CPE.7652","ee":"https://doi.org/10.1002/cpe.7652","url":"https://dblp.org/rec/journals/concurrency/KirolaMD23"}, "url":"URL#119715" }, { "@score":"4", "@id":"119799", "info":{"authors":{"author":[{"@pid":"268/3849","text":"Tejas M. Modi"},{"@pid":"94/11497","text":"Pravati Swain"}]},"title":"Enhanced routing using recurrent neural networks in software defined-data center network.","venue":"Concurr. Comput. Pract. Exp.","volume":"35","number":"5","year":"2023","type":"Journal Articles","access":"closed","key":"journals/concurrency/ModiS23","doi":"10.1002/CPE.7557","ee":"https://doi.org/10.1002/cpe.7557","url":"https://dblp.org/rec/journals/concurrency/ModiS23"}, "url":"URL#119799" }, { "@score":"3", "@id":"120748", "info":{"authors":{"author":[{"@pid":"320/6601","text":"Weishuo Liu"},{"@pid":"13/8378","text":"Ziming Song"},{"@pid":"29/3425-2","text":"Jian Fang 0002"}]},"title":"NNPred: Deploying neural networks in computational fluid dynamics codes to facilitate data-driven modeling studies.","venue":"Comput. Phys. Commun.","volume":"290","pages":"108775","year":"2023","type":"Journal Articles","access":"open","key":"journals/cphysics/LiuSF23","doi":"10.1016/J.CPC.2023.108775","ee":"https://doi.org/10.1016/j.cpc.2023.108775","url":"https://dblp.org/rec/journals/cphysics/LiuSF23"}, "url":"URL#120748" }, { "@score":"3", "@id":"121575", "info":{"authors":{"author":[{"@pid":"282/0800","text":"Amanda Lenzi"},{"@pid":"204/5583","text":"Julie Bessac"},{"@pid":"121/2411","text":"Johann Rudi"},{"@pid":"13/6519","text":"Michael L. Stein"}]},"title":"Neural networks for parameter estimation in intractable models.","venue":"Comput. Stat. Data Anal.","volume":"185","pages":"107762","year":"2023","type":"Journal Articles","access":"closed","key":"journals/csda/LenziBRS23","doi":"10.1016/J.CSDA.2023.107762","ee":"https://doi.org/10.1016/j.csda.2023.107762","url":"https://dblp.org/rec/journals/csda/LenziBRS23"}, "url":"URL#121575" }, { "@score":"3", "@id":"121953", "info":{"authors":{"author":[{"@pid":"174/3990","text":"Michael Adjeisah"},{"@pid":"25/2001","text":"Xinzhong Zhu"},{"@pid":"22/3200","text":"Huiying Xu"},{"@pid":"273/6928","text":"Tewodros Alemu Ayall"}]},"title":"Towards data augmentation in graph neural network: An overview and evaluation.","venue":"Comput. Sci. Rev.","volume":"47","pages":"100527","year":"2023","type":"Journal Articles","access":"closed","key":"journals/csr/AdjeisahZXA23","doi":"10.1016/J.COSREV.2022.100527","ee":"https://doi.org/10.1016/j.cosrev.2022.100527","url":"https://dblp.org/rec/journals/csr/AdjeisahZXA23"}, "url":"URL#121953" }, { "@score":"3", "@id":"122400", "info":{"authors":{"author":[{"@pid":"89/8467-2","text":"Musheer Ahmad 0002"},{"@pid":"312/0927","text":"Reem Ibrahim Alkanhel"},{"@pid":"135/7520","text":"Naglaa F. Soliman"},{"@pid":"173/1625","text":"Abeer D. Algarni"},{"@pid":"64/4299","text":"Fathi E. Abd El-Samie"},{"@pid":"78/10698","text":"Walid El-Shafai"}]},"title":"Securing Healthcare Data in IoMT Network Using Enhanced Chaos Based Substitution and Diffusion.","venue":"Comput. Syst. Sci. Eng.","volume":"47","number":"2","pages":"2361-2380","year":"2023","type":"Journal Articles","access":"closed","key":"journals/csse/AhmadASAEE23","doi":"10.32604/CSSE.2023.038439","ee":"https://doi.org/10.32604/csse.2023.038439","url":"https://dblp.org/rec/journals/csse/AhmadASAEE23"}, "url":"URL#122400" }, { "@score":"3", "@id":"123041", "info":{"authors":{"author":[{"@pid":"340/3180","text":"R. Sujatha 0003"},{"@pid":"168/3065","text":"T. Abirami"}]},"title":"Improving Recommendation for Effective Personalization in Context-Aware Data Using Novel Neural Network.","venue":"Comput. Syst. Sci. Eng.","volume":"46","number":"2","pages":"1775-1787","year":"2023","type":"Journal Articles","access":"closed","key":"journals/csse/SujathaA23","doi":"10.32604/CSSE.2023.031552","ee":"https://doi.org/10.32604/csse.2023.031552","url":"https://dblp.org/rec/journals/csse/SujathaA23"}, "url":"URL#123041" }, { "@score":"3", "@id":"123086", "info":{"authors":{"author":[{"@pid":"326/1083","text":"I. Vallirathi"},{"@pid":"82/9796","text":"S. Ebenezer Juliet"}]},"title":"Joint Energy Predication and Gathering Data in Wireless Rechargeable Sensor Network.","venue":"Comput. Syst. Sci. Eng.","volume":"44","number":"3","pages":"2349-2360","year":"2023","type":"Journal Articles","access":"closed","key":"journals/csse/VallirathiJ23","doi":"10.32604/CSSE.2023.024864","ee":"https://doi.org/10.32604/csse.2023.024864","url":"https://dblp.org/rec/journals/csse/VallirathiJ23"}, "url":"URL#123086" }, { "@score":"3", "@id":"123646", "info":{"authors":{"author":[{"@pid":"249/7571","text":"Ahmed Benmoussa"},{"@pid":"154/4059","text":"Chaker Abdelaziz Kerrache"},{"@pid":"133/4898","text":"Nasreddine Lagraa"},{"@pid":"164/7931","text":"Spyridon Mastorakis"},{"@pid":"20/1889","text":"Abderrahmane Lakas"},{"@pid":"182/8545","text":"Abdou El Karim Tahari"}]},"title":"Interest Flooding Attacks in Named Data Networking: Survey of Existing Solutions, Open Issues, Requirements, and Future Directions.","venue":"ACM Comput. Surv.","volume":"55","number":"7","pages":"139:1-139:37","year":"2023","type":"Journal Articles","access":"closed","key":"journals/csur/BenmoussaKLMLT23","doi":"10.1145/3539730","ee":"https://doi.org/10.1145/3539730","url":"https://dblp.org/rec/journals/csur/BenmoussaKLMLT23"}, "url":"URL#123646" }, { "@score":"3", "@id":"124446", "info":{"authors":{"author":[{"@pid":"25/9776","text":"Vishal Sawant"},{"@pid":"w/RafaelWisniewski","text":"Rafal Wisniewski"}]},"title":"Evaluating Criticality of Nodes in Consensus Network Under False Data Injection Attack.","venue":"IEEE Control. Syst. Lett.","volume":"7","pages":"1435-1440","year":"2023","type":"Journal Articles","access":"closed","key":"journals/csysl/SawantW23","doi":"10.1109/LCSYS.2023.3257265","ee":"https://doi.org/10.1109/LCSYS.2023.3257265","url":"https://dblp.org/rec/journals/csysl/SawantW23"}, "url":"URL#124446" }, { "@score":"3", "@id":"124954", "info":{"authors":{"author":[{"@pid":"323/3869","text":"Jean De La Croix Ntivuguruzwa"},{"@pid":"02/8408","text":"Tohari Ahmad"}]},"title":"A convolutional neural network to detect possible hidden data in spatial domain images.","venue":"Cybersecur.","volume":"6","number":"1","pages":"23","year":"2023","type":"Journal Articles","access":"open","key":"journals/cybersec/NtivuguruzwaA23","doi":"10.1186/S42400-023-00156-X","ee":"https://doi.org/10.1186/s42400-023-00156-x","url":"https://dblp.org/rec/journals/cybersec/NtivuguruzwaA23"}, "url":"URL#124954" }, { "@score":"3", "@id":"125538", "info":{"authors":{"author":[{"@pid":"213/9319","text":"Youming Ge"},{"@pid":"130/7170","text":"Zitong Chen"},{"@pid":"30/2791","text":"Yubao Liu"}]},"title":"An Efficient Keywords Search in Temporal Social Networks.","venue":"Data Sci. Eng.","volume":"8","number":"4","pages":"368-384","year":"2023","type":"Journal Articles","access":"open","key":"journals/dase/GeCL23","doi":"10.1007/S41019-023-00218-7","ee":"https://doi.org/10.1007/s41019-023-00218-7","url":"https://dblp.org/rec/journals/dase/GeCL23"}, "url":"URL#125538" }, { "@score":"4", "@id":"125731", "info":{"authors":{"author":[{"@pid":"239/5865","text":"Aleksandar Tosic"},{"@pid":"307/5502","text":"Niki Hrovatin"},{"@pid":"03/8218","text":"Jernej Vicic"}]},"title":"Dataset of Linkability Networks of Ethereum Accounts Involved in NFT Trading of Top 15 NFT Collections.","venue":"Data","volume":"8","number":"7","pages":"116","year":"2023","type":"Journal Articles","access":"open","key":"journals/data/TosicHV23","doi":"10.3390/DATA8070116","ee":"https://doi.org/10.3390/data8070116","url":"https://dblp.org/rec/journals/data/TosicHV23"}, "url":"URL#125731" }, { "@score":"3", "@id":"125755", "info":{"authors":{"author":[{"@pid":"01/4398","text":"Xiang Cai"},{"@pid":"18/3872","text":"Bang Wang"}]},"title":"A graph convolutional fusion model for community detection in multiplex networks.","venue":"Data Min. Knowl. Discov.","volume":"37","number":"4","pages":"1518-1547","year":"2023","type":"Journal Articles","access":"closed","key":"journals/datamine/CaiW23","doi":"10.1007/S10618-023-00932-W","ee":"https://doi.org/10.1007/s10618-023-00932-w","url":"https://dblp.org/rec/journals/datamine/CaiW23"}, "url":"URL#125755" }, { "@score":"3", "@id":"125843", "info":{"authors":{"author":[{"@pid":"334/4924","text":"Junzhou Li"},{"@pid":"217/9580","text":"Qianhui Sun"},{"@pid":"04/5439","text":"Feixian Sun"}]},"title":"Enhancing Privacy-Preserving Intrusion Detection in Blockchain-Based Networks with Deep Learning.","venue":"Data Sci. J.","volume":"22","year":"2023","type":"Journal Articles","access":"open","key":"journals/datascience/LiSS23","doi":"10.5334/DSJ-2023-031","ee":"https://doi.org/10.5334/dsj-2023-031","url":"https://dblp.org/rec/journals/datascience/LiSS23"}, "url":"URL#125843" }, { "@score":"4", "@id":"125953", "info":{"authors":{"author":[{"@pid":"272/0973","text":"Leonardo Bertolin Furstenau"},{"@pid":"347/6346","text":"Pedro Leivas"},{"@pid":"272/0982","text":"Michele Kremer Sott"},{"@pid":"30/9648","text":"Michael S. Dohan"},{"@pid":"225/7021","text":"José Ricardo López-Robles"},{"@pid":"177/7956","text":"Manuel J. Cobo"},{"@pid":"191/6392","text":"Nicola Luigi Bragazzi"},{"@pid":"c/KimKwangRaymondChoo","text":"Kim-Kwang Raymond Choo"}]},"title":"Big data in healthcare: Conceptual network structure, key challenges and opportunities.","venue":"Digit. Commun. Networks","volume":"9","number":"4","pages":"856-868","year":"2023","type":"Journal Articles","access":"open","key":"journals/dcan/FurstenauLSDLCBC23","doi":"10.1016/J.DCAN.2023.03.005","ee":"https://doi.org/10.1016/j.dcan.2023.03.005","url":"https://dblp.org/rec/journals/dcan/FurstenauLSDLCBC23"}, "url":"URL#125953" }, { "@score":"5", "@id":"126024", "info":{"authors":{"author":[{"@pid":"36/4193-1","text":"Xiaonan Wang 0001"},{"@pid":"318/8559","text":"Xilan Chen"},{"@pid":"99/4694-1","text":"Xingwei Wang 0001"}]},"title":"Secure vehicular data communication in Named Data Networking.","venue":"Digit. Commun. Networks","volume":"9","number":"1","pages":"203-210","year":"2023","type":"Journal Articles","access":"open","key":"journals/dcan/WangCW23","doi":"10.1016/J.DCAN.2022.05.022","ee":"https://doi.org/10.1016/j.dcan.2022.05.022","url":"https://dblp.org/rec/journals/dcan/WangCW23"}, "url":"URL#126024" }, { "@score":"3", "@id":"126029", "info":{"authors":{"author":[{"@pid":"34/8013","text":"Haohao Wang"},{"@pid":"156/7403","text":"Mengmeng Sun"},{"@pid":"33/6845","text":"Lianming Zhang"},{"@pid":"96/10302","text":"Pingping Dong"},{"@pid":"24/8038","text":"Yehua Wei"},{"@pid":"02/2917","text":"Jing Mei"}]},"title":"Scheduling optimization for upstream dataflows in edge computing.","venue":"Digit. Commun. Networks","volume":"9","number":"6","pages":"1448-1457","year":"2023","type":"Journal Articles","access":"open","key":"journals/dcan/WangSZDWM23","doi":"10.1016/J.DCAN.2022.08.003","ee":"https://doi.org/10.1016/j.dcan.2022.08.003","url":"https://dblp.org/rec/journals/dcan/WangSZDWM23"}, "url":"URL#126029" }, { "@score":"4", "@id":"126041", "info":{"authors":{"author":[{"@pid":"117/2762","text":"Yueshen Xu"},{"@pid":"w/ZhiyingWang","text":"Zhiying Wang"},{"@pid":"85/9062","text":"Honghao Gao"},{"@pid":"95/11343","text":"Zhiping Jiang"},{"@pid":"15/4530","text":"Yuyu Yin"},{"@pid":"96/4282-47","text":"Rui Li 0047"}]},"title":"Towards machine-learning-driven effective mashup recommendations from big data in mobile networks and the Internet-of-Things.","venue":"Digit. Commun. Networks","volume":"9","number":"1","pages":"138-145","year":"2023","type":"Journal Articles","access":"open","key":"journals/dcan/XuWGJYL23","doi":"10.1016/J.DCAN.2022.12.009","ee":"https://doi.org/10.1016/j.dcan.2022.12.009","url":"https://dblp.org/rec/journals/dcan/XuWGJYL23"}, "url":"URL#126041" }, { "@score":"3", "@id":"127292", "info":{"authors":{"author":[{"@pid":"304/6396","text":"Augusteen Bamila Virgin Louis"},{"@pid":"236/2659","text":"G. Arul Dalton"}]},"title":"Hybrid optimization using lion and dragonfly for enhanced resource allocation in fifth-generation networks.","venue":"Data Knowl. Eng.","volume":"145","pages":"102151","year":"2023","type":"Journal Articles","access":"closed","key":"journals/dke/LouisD23","doi":"10.1016/J.DATAK.2023.102151","ee":"https://doi.org/10.1016/j.datak.2023.102151","url":"https://dblp.org/rec/journals/dke/LouisD23"}, "url":"URL#127292" }, { "@score":"3", "@id":"127331", "info":{"authors":{"author":[{"@pid":"363/4665","text":"Dewan F. Wahid"},{"@pid":"33/1454","text":"Elkafi Hassini"}]},"title":"User-generated short-text classification using cograph editing-based network clustering with an application in invoice categorization.","venue":"Data Knowl. Eng.","volume":"148","pages":"102238","year":"2023","type":"Journal Articles","access":"closed","key":"journals/dke/WahidH23","doi":"10.1016/J.DATAK.2023.102238","ee":"https://doi.org/10.1016/j.datak.2023.102238","url":"https://dblp.org/rec/journals/dke/WahidH23"}, "url":"URL#127331" }, { "@score":"3", "@id":"128402", "info":{"authors":{"author":[{"@pid":"24/10391","text":"Zhixin Zhao"},{"@pid":"50/3402","text":"Bo Li"},{"@pid":"207/6576","text":"Yulong Cao"},{"@pid":"69/5623","text":"Fangyue Chen"}]},"title":"A prior knowledge-driven reference signal extraction network towards measured data in DRM-based passive radar.","venue":"Digit. Signal Process.","volume":"139","pages":"104080","year":"2023","type":"Journal Articles","access":"closed","key":"journals/dsp/ZhaoLCC23","doi":"10.1016/J.DSP.2023.104080","ee":"https://doi.org/10.1016/j.dsp.2023.104080","url":"https://dblp.org/rec/journals/dsp/ZhaoLCC23"}, "url":"URL#128402" }, { "@score":"3", "@id":"129040", "info":{"authors":{"author":[{"@pid":"240/4897","text":"Xiangfei Feng"},{"@pid":"278/3915","text":"Wenjia Cai"},{"@pid":"208/5214","text":"Rongqin Zheng"},{"@pid":"74/8502","text":"Lina Tang"},{"@pid":"94/1856","text":"Jianhua Zhou"},{"@pid":"39/721","text":"Hui Wang"},{"@pid":"337/6011","text":"Jintang Liao"},{"@pid":"326/7023","text":"Baoming Luo"},{"@pid":"80/3159","text":"Wen Cheng"},{"@pid":"337/5744","text":"An Wei"},{"@pid":"169/7930","text":"Weian Zhao"},{"@pid":"175/6052","text":"Xiang Jing"},{"@pid":"71/844","text":"Ping Liang"},{"@pid":"74/3437","text":"Jie Yu"},{"@pid":"35/2378","text":"Qinghua Huang"}]},"title":"Diagnosis of hepatocellular carcinoma using deep network with multi-view enhanced patterns mined in contrast-enhanced ultrasound data.","venue":"Eng. Appl. Artif. Intell.","volume":"118","pages":"105635","year":"2023","type":"Journal Articles","access":"closed","key":"journals/eaai/FengCZTZWLLCWZJ23","doi":"10.1016/J.ENGAPPAI.2022.105635","ee":"https://doi.org/10.1016/j.engappai.2022.105635","url":"https://dblp.org/rec/journals/eaai/FengCZTZWLLCWZJ23"}, "url":"URL#129040" }, { "@score":"3", "@id":"129306", "info":{"authors":{"author":[{"@pid":"143/8873","text":"Shilin Li"},{"@pid":"71/4292","text":"Gang Wang"},{"@pid":"286/0364","text":"Yuelan Di"},{"@pid":"36/1341","text":"Liping Wang"},{"@pid":"286/0220","text":"Haidou Wang"},{"@pid":"342/5353","text":"Qingjun Zhou"}]},"title":"A physics-informed neural network framework to predict 3D temperature field without labeled data in process of laser metal deposition.","venue":"Eng. Appl. Artif. Intell.","volume":"120","pages":"105908","year":"2023","type":"Journal Articles","access":"closed","key":"journals/eaai/LiWDWWZ23","doi":"10.1016/J.ENGAPPAI.2023.105908","ee":"https://doi.org/10.1016/j.engappai.2023.105908","url":"https://dblp.org/rec/journals/eaai/LiWDWWZ23"}, "url":"URL#129306" }, { "@score":"3", "@id":"129683", "info":{"authors":{"author":[{"@pid":"264/8270","text":"Hoese Michel Tornyeviadzi"},{"@pid":"208/8160","text":"Razak Seidu"}]},"title":"Leakage detection in water distribution networks via 1D CNN deep autoencoder for multivariate SCADA data.","venue":"Eng. Appl. Artif. Intell.","volume":"122","pages":"106062","year":"2023","type":"Journal Articles","access":"open","key":"journals/eaai/TornyeviadziS23","doi":"10.1016/J.ENGAPPAI.2023.106062","ee":"https://doi.org/10.1016/j.engappai.2023.106062","url":"https://dblp.org/rec/journals/eaai/TornyeviadziS23"}, "url":"URL#129683" }, { "@score":"3", "@id":"129967", "info":{"authors":{"author":[{"@pid":"48/3927","text":"Kun Zhou"},{"@pid":"24/2718","text":"Sung-Kwun Oh"},{"@pid":"p/WitoldPedrycz","text":"Witold Pedrycz"},{"@pid":"54/5748","text":"Jianlong Qiu"}]},"title":"Data preprocessing strategy in constructing convolutional neural network classifier based on constrained particle swarm optimization with fuzzy penalty function.","venue":"Eng. Appl. Artif. Intell.","volume":"117","number":"Part","pages":"105580","year":"2023","type":"Journal Articles","access":"closed","key":"journals/eaai/ZhouOPQ23","doi":"10.1016/J.ENGAPPAI.2022.105580","ee":"https://doi.org/10.1016/j.engappai.2022.105580","url":"https://dblp.org/rec/journals/eaai/ZhouOPQ23"}, "url":"URL#129967" }, { "@score":"3", "@id":"130852", "info":{"authors":{"author":[{"@pid":"363/6936","text":"Gemma Gerber"},{"@pid":"363/5773","text":"Ben Brooker"},{"@pid":"293/5506","text":"Ursula M. Scharler"}]},"title":"Automated workflow for incorporation and evaluation of data uncertainty in ecological networks with autoLIMR.","venue":"Ecol. Informatics","volume":"78","pages":"102375","year":"2023","type":"Journal Articles","access":"open","key":"journals/ecoi/GerberBS23","doi":"10.1016/J.ECOINF.2023.102375","ee":"https://doi.org/10.1016/j.ecoinf.2023.102375","url":"https://dblp.org/rec/journals/ecoi/GerberBS23"}, "url":"URL#130852" }, { "@score":"3", "@id":"130899", "info":{"authors":{"author":[{"@pid":"06/10770","text":"Mohammad Jahanbakht"},{"@pid":"76/2964","text":"Mostafa Rahimi Azghadi"},{"@pid":"333/5981","text":"Nathan J. Waltham"}]},"title":"Semi-supervised and weakly-supervised deep neural networks and dataset for fish detection in turbid underwater videos.","venue":"Ecol. Informatics","volume":"78","pages":"102303","year":"2023","type":"Journal Articles","access":"open","key":"journals/ecoi/JahanbakhtAW23","doi":"10.1016/J.ECOINF.2023.102303","ee":"https://doi.org/10.1016/j.ecoinf.2023.102303","url":"https://dblp.org/rec/journals/ecoi/JahanbakhtAW23"}, "url":"URL#130899" }, { "@score":"4", "@id":"131570", "info":{"authors":{"author":[{"@pid":"211/0641","text":"Lukas Schwalt"},{"@pid":"316/8020","text":"Mathias Maurer"},{"@pid":"118/7008","text":"Stephan Pack"}]},"title":"Analysis of transient measurements in transmission systems - correlation with network protocol data and lightning location system data.","venue":"Elektrotech. Informationstechnik","volume":"140","number":"1","pages":"193-197","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ei/SchwaltMP23","doi":"10.1007/S00502-022-01097-Y","ee":"https://doi.org/10.1007/s00502-022-01097-y","url":"https://dblp.org/rec/journals/ei/SchwaltMP23"}, "url":"URL#131570" }, { "@score":"5", "@id":"132311", "info":{"title":"Retraction Note: Data cleansing method of talent management data in wireless sensor network based on data mining technology.","venue":"EURASIP J. Wirel. Commun. Netw.","volume":"2023","number":"1","pages":"15","year":"2023","type":"Journal Articles","access":"open","key":"journals/ejwcn/Bai23","doi":"10.1186/S13638-023-02228-5","ee":"https://doi.org/10.1186/s13638-023-02228-5","url":"https://dblp.org/rec/journals/ejwcn/Bai23"}, "url":"URL#132311" }, { "@score":"3", "@id":"132387", "info":{"authors":{"author":[{"@pid":"82/1331","text":"Xun Wang"},{"@pid":"82/6198-1","text":"Hongbin Chen 0001"},{"@pid":"119/9457-1","text":"Shichao Li 0001"}]},"title":"A reinforcement learning-based sleep scheduling algorithm for compressive data gathering in wireless sensor networks.","venue":"EURASIP J. Wirel. Commun. Netw.","volume":"2023","number":"1","pages":"28","year":"2023","type":"Journal Articles","access":"open","key":"journals/ejwcn/WangCL23","doi":"10.1186/S13638-023-02237-4","ee":"https://doi.org/10.1186/s13638-023-02237-4","url":"https://dblp.org/rec/journals/ejwcn/WangCL23"}, "url":"URL#132387" }, { "@score":"3", "@id":"133609", "info":{"authors":{"author":[{"@pid":"310/3478","text":"Kwabena Frimpong Marfo"},{"@pid":"39/8622","text":"Malgorzata Przybyla-Kasperek"}]},"title":"Study on the Use of Artificially Generated Objects in the Process of Training MLP Neural Networks Based on Dispersed Data.","venue":"Entropy","volume":"25","number":"5","pages":"703","year":"2023","type":"Journal Articles","access":"open","key":"journals/entropy/MarfoP23","doi":"10.3390/E25050703","ee":"https://doi.org/10.3390/e25050703","url":"https://dblp.org/rec/journals/entropy/MarfoP23"}, "url":"URL#133609" }, { "@score":"3", "@id":"133995", "info":{"authors":{"author":[{"@pid":"350/2582","text":"Youbo Sun"},{"@pid":"62/6776","text":"Tao Zhao"},{"@pid":"30/2704","text":"Nian Liu"}]},"title":"Self-Organizing Interval Type-2 Fuzzy Neural Network Compensation Control Based on Real-Time Data Information Entropy and Its Application in n-DOF Manipulator.","venue":"Entropy","volume":"25","number":"5","pages":"789","year":"2023","type":"Journal Articles","access":"open","key":"journals/entropy/SunZL23","doi":"10.3390/E25050789","ee":"https://doi.org/10.3390/e25050789","url":"https://dblp.org/rec/journals/entropy/SunZL23"}, "url":"URL#133995" }, { "@score":"3", "@id":"134481", "info":{"authors":{"author":[{"@pid":"237/7506","text":"David Blodgett"},{"@pid":"04/6762","text":"J. Michael Johnson"},{"@pid":"350/1125","text":"Andy Bock"}]},"title":"Generating a reference flow network with improved connectivity to support durable data integration and reproducibility in the coterminous US.","venue":"Environ. Model. Softw.","volume":"165","pages":"105726","year":"2023","type":"Journal Articles","access":"open","key":"journals/envsoft/BlodgettJB23","doi":"10.1016/J.ENVSOFT.2023.105726","ee":"https://doi.org/10.1016/j.envsoft.2023.105726","url":"https://dblp.org/rec/journals/envsoft/BlodgettJB23"}, "url":"URL#134481" }, { "@score":"3", "@id":"135001", "info":{"authors":{"author":[{"@pid":"304/8569","text":"Utku Karaca"},{"@pid":"29/1843","text":"S. Ilker Birbil"},{"@pid":"40/9364","text":"Nursen Aydin"},{"@pid":"304/8736","text":"Gizem Mullaoglu"}]},"title":"Masking primal and dual models for data privacy in network revenue management.","venue":"Eur. J. Oper. Res.","volume":"308","number":"2","pages":"818-831","year":"2023","type":"Journal Articles","access":"open","key":"journals/eor/KaracaBAM23","doi":"10.1016/J.EJOR.2022.11.025","ee":"https://doi.org/10.1016/j.ejor.2022.11.025","url":"https://dblp.org/rec/journals/eor/KaracaBAM23"}, "url":"URL#135001" }, { "@score":"4", "@id":"135394", "info":{"authors":{"author":[{"@pid":"292/3596","text":"Sandeep Chowdhary"},{"@pid":"343/0132","text":"Elsa Andres"},{"@pid":"342/9898","text":"Adriana Manna"},{"@pid":"343/1184","text":"Luka Blagojevic"},{"@pid":"342/9776","text":"Leonardo Di Gaetano"},{"@pid":"90/9760","text":"Gerardo Iñiguez"}]},"title":"Temporal patterns of reciprocity in communication networks.","venue":"EPJ Data Sci.","volume":"12","number":"1","pages":"7","year":"2023","type":"Journal Articles","access":"open","key":"journals/epjds/ChowdharyAMBGI23","doi":"10.1140/EPJDS/S13688-023-00382-W","ee":"https://doi.org/10.1140/epjds/s13688-023-00382-w","url":"https://dblp.org/rec/journals/epjds/ChowdharyAMBGI23"}, "url":"URL#135394" }, { "@score":"3", "@id":"135407", "info":{"authors":{"author":[{"@pid":"349/8372","text":"Yessica Herrera-Guzmán"},{"@pid":"168/8332","text":"Eun Lee"},{"@pid":"32/9558","text":"Heetae Kim"}]},"title":"Structural gender imbalances in ballet collaboration networks.","venue":"EPJ Data Sci.","volume":"12","number":"1","pages":"53","year":"2023","type":"Journal Articles","access":"open","key":"journals/epjds/HerreraGuzmanLK23","doi":"10.1140/EPJDS/S13688-023-00428-Z","ee":"https://doi.org/10.1140/epjds/s13688-023-00428-z","url":"https://dblp.org/rec/journals/epjds/HerreraGuzmanLK23"}, "url":"URL#135407" }, { "@score":"3", "@id":"135409", "info":{"authors":{"author":[{"@pid":"288/6175","text":"Ana María Jaramillo"},{"@pid":"86/5703","text":"Hywel T. P. Williams"},{"@pid":"48/9668","text":"Nicola Perra"},{"@pid":"10/6227","text":"Ronaldo Menezes"}]},"title":"The structure of segregation in co-authorship networks and its impact on scientific production.","venue":"EPJ Data Sci.","volume":"12","number":"1","pages":"47","year":"2023","type":"Journal Articles","access":"open","key":"journals/epjds/JaramilloWPM23","doi":"10.1140/EPJDS/S13688-023-00411-8","ee":"https://doi.org/10.1140/epjds/s13688-023-00411-8","url":"https://dblp.org/rec/journals/epjds/JaramilloWPM23"}, "url":"URL#135409" }, { "@score":"3", "@id":"135433", "info":{"authors":{"author":[{"@pid":"135/6107","text":"Louis M. Shekhtman"},{"@pid":"147/4920","text":"Alon Sela"},{"@pid":"04/5624","text":"Shlomo Havlin"}]},"title":"Percolation framework reveals limits of privacy in conspiracy, dark web, and blockchain networks.","venue":"EPJ Data Sci.","volume":"12","number":"1","pages":"16","year":"2023","type":"Journal Articles","access":"open","key":"journals/epjds/ShekhtmanSH23","doi":"10.1140/EPJDS/S13688-023-00392-8","ee":"https://doi.org/10.1140/epjds/s13688-023-00392-8","url":"https://dblp.org/rec/journals/epjds/ShekhtmanSH23"}, "url":"URL#135433" }, { "@score":"3", "@id":"135446", "info":{"authors":{"author":{"@pid":"72/7832","text":"Xinwei Xu"}},"title":"Studying social networks in the age of computational social science.","venue":"EPJ Data Sci.","volume":"12","number":"1","pages":"61","year":"2023","type":"Journal Articles","access":"open","key":"journals/epjds/Xu23","doi":"10.1140/EPJDS/S13688-023-00436-Z","ee":"https://doi.org/10.1140/epjds/s13688-023-00436-z","url":"https://dblp.org/rec/journals/epjds/Xu23"}, "url":"URL#135446" }, { "@score":"3", "@id":"135635", "info":{"authors":{"author":[{"@pid":"25/840","text":"Abdul Sami"},{"@pid":"249/4328","text":"Ali Asif"},{"@pid":"78/5250","text":"Muhammad Imran"},{"@pid":"338/2314","text":"Farah Aziz"},{"@pid":"260/1532","text":"Muhammad Yasir Noor"}]},"title":"Artificial neural network and dataset optimization for implementation of linear system models in resource-constrained embedded systems.","venue":"Expert Syst. J. Knowl. Eng.","volume":"40","number":"1","year":"2023","type":"Journal Articles","access":"closed","key":"journals/es/SamiAIAN23","doi":"10.1111/EXSY.13142","ee":"https://doi.org/10.1111/exsy.13142","url":"https://dblp.org/rec/journals/es/SamiAIAN23"}, "url":"URL#135635" }, { "@score":"3", "@id":"136016", "info":{"authors":{"author":[{"@pid":"348/1452","text":"Azar Niknam"},{"@pid":"254/3737","text":"Hasan Khademi Zare"},{"@pid":"348/1660","text":"Hassan Hosseininasab"},{"@pid":"22/8812","text":"Ali Mostafaeipour"}]},"title":"A hybrid approach combining the multi-dimensional time series k-means algorithm and long short-term memory networks to predict the monthly water demand according to the uncertainty in the dataset.","venue":"Earth Sci. Informatics","volume":"16","number":"2","pages":"1519-1536","year":"2023","type":"Journal Articles","access":"closed","key":"journals/esi/NiknamZHM23","doi":"10.1007/S12145-023-00976-Y","ee":"https://doi.org/10.1007/s12145-023-00976-y","url":"https://dblp.org/rec/journals/esi/NiknamZHM23"}, "url":"URL#136016" }, { "@score":"3", "@id":"137520", "info":{"authors":{"author":[{"@pid":"296/7491","text":"Trang T. D. Nguyen"},{"@pid":"53/11481","text":"Loan T. T. Nguyen"},{"@pid":"257/3577","text":"Quang-Thinh Bui"},{"@pid":"43/4547","text":"Unil Yun"},{"@pid":"73/6009","text":"Bay Vo"}]},"title":"An efficient topological-based clustering method on spatial data in network space.","venue":"Expert Syst. Appl.","volume":"215","pages":"119395","year":"2023","type":"Journal Articles","access":"closed","key":"journals/eswa/NguyenNBYV23","doi":"10.1016/J.ESWA.2022.119395","ee":"https://doi.org/10.1016/j.eswa.2022.119395","url":"https://dblp.org/rec/journals/eswa/NguyenNBYV23"}, "url":"URL#137520" }, { "@score":"3", "@id":"137749", "info":{"authors":{"author":[{"@pid":"175/9288","text":"Mohsen Saffar"},{"@pid":"97/10059","text":"Ahmad Kalhor"}]},"title":"Evaluation of Dataflow through layers of convolutional neural networks in classification problems.","venue":"Expert Syst. Appl.","volume":"224","pages":"119944","year":"2023","type":"Journal Articles","access":"closed","key":"journals/eswa/SaffarK23","doi":"10.1016/J.ESWA.2023.119944","ee":"https://doi.org/10.1016/j.eswa.2023.119944","url":"https://dblp.org/rec/journals/eswa/SaffarK23"}, "url":"URL#137749" }, { "@score":"4", "@id":"138498", "info":{"authors":{"author":[{"@pid":"319/7257","text":"Tianxun Zhou"},{"@pid":"217/2219","text":"Keng-Hwee Chiam"}]},"title":"Synthetic data generation method for data-free knowledge distillation in regression neural networks.","venue":"Expert Syst. Appl.","volume":"227","pages":"120327","year":"2023","type":"Journal Articles","access":"closed","key":"journals/eswa/ZhouC23","doi":"10.1016/J.ESWA.2023.120327","ee":"https://doi.org/10.1016/j.eswa.2023.120327","url":"https://dblp.org/rec/journals/eswa/ZhouC23"}, "url":"URL#138498" }, { "@score":"4", "@id":"138740", "info":{"authors":{"author":[{"@pid":"275/9660","text":"Khushboo Jain"},{"@pid":"44/6841","text":"Anoop Kumar"},{"@pid":"126/2525","text":"Akansha Singh"}]},"title":"Data transmission reduction techniques for improving network lifetime in wireless sensor networks: An up-to-date survey from 2017 to 2022.","venue":"Trans. Emerg. Telecommun. Technol.","volume":"34","number":"1","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ett/JainKS23","doi":"10.1002/ETT.4674","ee":"https://doi.org/10.1002/ett.4674","url":"https://dblp.org/rec/journals/ett/JainKS23"}, "url":"URL#138740" }, { "@score":"3", "@id":"138796", "info":{"authors":{"author":[{"@pid":"157/0508","text":"Michaelraj Kingston Roberts"},{"@pid":"339/0019","text":"Jayapratha Thangavel"}]},"title":"An improved optimal energy aware data availability approach for secure clustering and routing in wireless sensor networks.","venue":"Trans. Emerg. Telecommun. Technol.","volume":"34","number":"3","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ett/RobertsT23","doi":"10.1002/ETT.4711","ee":"https://doi.org/10.1002/ett.4711","url":"https://dblp.org/rec/journals/ett/RobertsT23"}, "url":"URL#138796" }, { "@score":"3", "@id":"138809", "info":{"authors":{"author":{"@pid":"09/4271","text":"Waseem Sheikh"}},"title":"Jitter-sensitive data communication in emerging wireless networks.","venue":"Trans. Emerg. Telecommun. Technol.","volume":"34","number":"5","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ett/Sheikh23","doi":"10.1002/ETT.4746","ee":"https://doi.org/10.1002/ett.4746","url":"https://dblp.org/rec/journals/ett/Sheikh23"}, "url":"URL#138809" }, { "@score":"3", "@id":"138885", "info":{"authors":{"author":[{"@pid":"268/3534","text":"Vrajesh Kumar Chawra"},{"@pid":"18/11103","text":"Govind P. Gupta"}]},"title":"Optimized coverage-aware trajectory planning for AUVs for efficient data collection in underwater acoustic sensor networks.","venue":"Evol. Intell.","volume":"16","number":"2","pages":"401-416","year":"2023","type":"Journal Articles","access":"closed","key":"journals/evi/ChawraG23","doi":"10.1007/S12065-021-00667-X","ee":"https://doi.org/10.1007/s12065-021-00667-x","url":"https://dblp.org/rec/journals/evi/ChawraG23"}, "url":"URL#138885" }, { "@score":"3", "@id":"139352", "info":{"authors":{"author":[{"@pid":"209/0052","text":"Geet Lahoti"},{"@pid":"137/6807","text":"Chitta Ranjan"},{"@pid":"225/5215","text":"Jialei Chen"},{"@pid":"77/6310","text":"Hao Yan"},{"@pid":"36/1391","text":"Chuck Zhang"}]},"title":"Convolutional Neural Network-Assisted Adaptive Sampling for Sparse Feature Detection in Image and Video Data.","venue":"IEEE Intell. Syst.","volume":"38","number":"1","pages":"45-57","year":"2023","type":"Journal Articles","access":"closed","key":"journals/expert/LahotiRCYZ23","doi":"10.1109/MIS.2022.3215779","ee":"https://doi.org/10.1109/MIS.2022.3215779","url":"https://dblp.org/rec/journals/expert/LahotiRCYZ23"}, "url":"URL#139352" }, { "@score":"3", "@id":"139559", "info":{"authors":{"author":[{"@pid":"370/6115","text":"Maizan Syamimi Meor Yahaya"},{"@pid":"09/1735","text":"Jason Teo"}]},"title":"Data augmentation using generative adversarial networks for images and biomarkers in medicine and neuroscience.","venue":"Frontiers Appl. Math. Stat.","volume":"9","year":"2023","type":"Journal Articles","access":"open","key":"journals/fams/YahayaT23","doi":"10.3389/FAMS.2023.1162760","ee":"https://doi.org/10.3389/fams.2023.1162760","url":"https://dblp.org/rec/journals/fams/YahayaT23"}, "url":"URL#139559" }, { "@score":"3", "@id":"139934", "info":{"authors":{"author":[{"@pid":"305/5981","text":"Torvald F. Ask"},{"@pid":"27/4024","text":"Kaur Kullman"},{"@pid":"132/3119","text":"Stefan Sütterlin"},{"@pid":"173/1495","text":"Benjamin J. Knox"},{"@pid":"245/4260","text":"Don Engel"},{"@pid":"182/4261","text":"Ricardo Gregorio Lugo"}]},"title":"A 3D mixed reality visualization of network topology and activity results in better dyadic cyber team communication and cyber situational awareness.","venue":"Frontiers Big Data","volume":"6","year":"2023","type":"Journal Articles","access":"open","key":"journals/fdata/AskKSKEL23","doi":"10.3389/FDATA.2023.1042783","ee":"https://doi.org/10.3389/fdata.2023.1042783","url":"https://dblp.org/rec/journals/fdata/AskKSKEL23"}, "url":"URL#139934" }, { "@score":"3", "@id":"140312", "info":{"authors":{"author":[{"@pid":"35/9809","text":"Fatemeh Abdi"},{"@pid":"58/4186","text":"Mahmood Ahmadi"},{"@pid":"216/4843","text":"Montajab Ghanem"}]},"title":"AM-IF: Adaptive Multi-Path Interest Forwarding in named data networking.","venue":"Future Gener. Comput. Syst.","volume":"148","pages":"564-583","year":"2023","type":"Journal Articles","access":"closed","key":"journals/fgcs/AbdiAG23","doi":"10.1016/J.FUTURE.2023.06.021","ee":"https://doi.org/10.1016/j.future.2023.06.021","url":"https://dblp.org/rec/journals/fgcs/AbdiAG23"}, "url":"URL#140312" }, { "@score":"3", "@id":"140433", "info":{"authors":{"author":[{"@pid":"215/7487","text":"Shahid Md. Asif Iqbal"},{"@pid":"64/6459","text":"Asaduzzaman"}]},"title":"Cache-MAB: A reinforcement learning-based hybrid caching scheme in named data networks.","venue":"Future Gener. Comput. Syst.","volume":"147","pages":"163-178","year":"2023","type":"Journal Articles","access":"closed","key":"journals/fgcs/IqbalA23","doi":"10.1016/J.FUTURE.2023.04.032","ee":"https://doi.org/10.1016/j.future.2023.04.032","url":"https://dblp.org/rec/journals/fgcs/IqbalA23"}, "url":"URL#140433" }, { "@score":"3", "@id":"140899", "info":{"authors":{"author":[{"@pid":"364/2554","text":"Vaia I. Kontopoulou"},{"@pid":"20/5325","text":"Athanasios D. Panagopoulos"},{"@pid":"204/8428","text":"Ioannis Kakkos"},{"@pid":"99/5675","text":"George K. Matsopoulos"}]},"title":"A Review of ARIMA vs. Machine Learning Approaches for Time Series Forecasting in Data Driven Networks.","venue":"Future Internet","volume":"15","number":"8","pages":"255","year":"2023","type":"Journal Articles","access":"open","key":"journals/fi/KontopoulouPKM23","doi":"10.3390/FI15080255","ee":"https://doi.org/10.3390/fi15080255","url":"https://dblp.org/rec/journals/fi/KontopoulouPKM23"}, "url":"URL#140899" }, { "@score":"3", "@id":"141030", "info":{"authors":{"author":[{"@pid":"273/9311","text":"Abdu Salam"},{"@pid":"62/10882","text":"Qaisar Javaid"},{"@pid":"159/3963","text":"Masood Ahmad"},{"@pid":"206/3692","text":"Ishtiaq Wahid"},{"@pid":"156/9492","text":"Muhammad Yeasir Arafat"}]},"title":"Cluster-Based Data Aggregation in Flying Sensor Networks Enabled Internet of Things.","venue":"Future Internet","volume":"15","number":"8","pages":"279","year":"2023","type":"Journal Articles","access":"open","key":"journals/fi/SalamJAWA23","doi":"10.3390/FI15080279","ee":"https://doi.org/10.3390/fi15080279","url":"https://dblp.org/rec/journals/fi/SalamJAWA23"}, "url":"URL#141030" }, { "@score":"3", "@id":"141944", "info":{"authors":{"author":[{"@pid":"365/0080","text":"Anass B. El-Yaagoubi"},{"@pid":"70/6524","text":"Moo K. Chung"},{"@pid":"40/5239","text":"Hernando Ombao"}]},"title":"Statistical inference for dependence networks in topological data analysis.","venue":"Frontiers Artif. Intell.","volume":"6","year":"2023","type":"Journal Articles","access":"open","key":"journals/frai/ElYaagoubiCO23","doi":"10.3389/FRAI.2023.1293504","ee":"https://doi.org/10.3389/frai.2023.1293504","url":"https://dblp.org/rec/journals/frai/ElYaagoubiCO23"}, "url":"URL#141944" }, { "@score":"3", "@id":"142869", "info":{"authors":{"author":[{"@pid":"136/8391","text":"Leyla Naghipour"},{"@pid":"136/8356","text":"Mohammad Taghi Aalami"},{"@pid":"56/8062","text":"Vahid Nourani"}]},"title":"Collective dynamics analysis based on the multiplex network method to unravel the backbone of fluctuations in groundwater level data.","venue":"Comput. Geosci.","volume":"172","pages":"105310","year":"2023","type":"Journal Articles","access":"closed","key":"journals/gandc/NaghipourAN23","doi":"10.1016/J.CAGEO.2023.105310","ee":"https://doi.org/10.1016/j.cageo.2023.105310","url":"https://dblp.org/rec/journals/gandc/NaghipourAN23"}, "url":"URL#142869" }, { "@score":"3", "@id":"143349", "info":{"authors":{"author":[{"@pid":"98/1106","text":"Jingyi He"},{"@pid":"135/9215","text":"Ye Wei"},{"@pid":"02/8501","text":"Bailang Yu"}]},"title":"Geographically weighted regression based on a network weight matrix: a case study using urbanization driving force data in China.","venue":"Int. J. Geogr. Inf. Sci.","volume":"37","number":"6","pages":"1209-1235","year":"2023","type":"Journal Articles","access":"closed","key":"journals/gis/HeWY23","doi":"10.1080/13658816.2023.2192122","ee":"https://doi.org/10.1080/13658816.2023.2192122","url":"https://dblp.org/rec/journals/gis/HeWY23"}, "url":"URL#143349" }, { "@score":"3", "@id":"144234", "info":{"authors":{"author":[{"@pid":"336/8757","text":"Lisa-Maria Norz"},{"@pid":"252/2961","text":"Verena Dornauer"},{"@pid":"29/7334","text":"Werner O. Hackl"},{"@pid":"74/6360","text":"Elske Ammenwerth"}]},"title":"Measuring social presence in online-based learning: An exploratory path analysis using log data and social network analysis.","venue":"Internet High. Educ.","volume":"56","pages":"100894","year":"2023","type":"Journal Articles","access":"closed","key":"journals/iahe/NorzDHA23","doi":"10.1016/J.IHEDUC.2022.100894","ee":"https://doi.org/10.1016/j.iheduc.2022.100894","url":"https://dblp.org/rec/journals/iahe/NorzDHA23"}, "url":"URL#144234" }, { "@score":"3", "@id":"145476", "info":{"authors":{"author":[{"@pid":"32/1334","text":"Mengshi Li"},{"@pid":"169/6247","text":"Feihu Huang"},{"@pid":"29/4181-2","text":"Jian Peng 0002"}]},"title":"Finding reinforced structural hole spanners in social networks via node embedding.","venue":"Intell. Data Anal.","volume":"27","number":"1","pages":"297-318","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ida/LiHP23","doi":"10.3233/IDA-226836","ee":"https://doi.org/10.3233/IDA-226836","url":"https://dblp.org/rec/journals/ida/LiHP23"}, "url":"URL#145476" }, { "@score":"3", "@id":"145487", "info":{"authors":{"author":[{"@pid":"266/8257","text":"Binyan Lyu"},{"@pid":"70/1320","text":"Yajun Du"},{"@pid":"349/9419","text":"Jiajian Jiang"},{"@pid":"23/10048","text":"Jinrong Hu"},{"@pid":"66/3387","text":"Hui Li"}]},"title":"Positive public opinion guidance model based on dual learning in social network.","venue":"Intell. Data Anal.","volume":"27","number":"3","pages":"833-853","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ida/LyuDJHL23","doi":"10.3233/IDA-226602","ee":"https://doi.org/10.3233/IDA-226602","url":"https://dblp.org/rec/journals/ida/LyuDJHL23"}, "url":"URL#145487" }, { "@score":"4", "@id":"145502", "info":{"authors":{"author":[{"@pid":"268/8090","text":"Chengcheng Sun"},{"@pid":"42/7560","text":"Zhixiao Wang"},{"@pid":"222/9790","text":"Xiaobin Rui"},{"@pid":"y/PhilipSYu","text":"Philip S. Yu"},{"@pid":"121/0780-1","text":"Lichao Sun 0001"}]},"title":"An in-depth study on key nodes in social networks.","venue":"Intell. Data Anal.","volume":"27","number":"6","pages":"1811-1838","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ida/SunWRYS23","doi":"10.3233/IDA-227018","ee":"https://doi.org/10.3233/IDA-227018","url":"https://dblp.org/rec/journals/ida/SunWRYS23"}, "url":"URL#145502" }, { "@score":"3", "@id":"146380", "info":{"authors":{"author":[{"@pid":"292/5865","text":"Sho Obata"},{"@pid":"50/5160","text":"Koichi Kobayashi"},{"@pid":"76/7141","text":"Yuh Yamashita"}]},"title":"Detection of False Data Injection Attacks in Distributed State Estimation of Power Networks.","venue":"IEICE Trans. Fundam. Electron. Commun. Comput. Sci.","volume":"106","number":"5","pages":"729-735","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ieiceta/ObataKY23","doi":"10.1587/TRANSFUN.2022MAP0010","ee":"https://doi.org/10.1587/transfun.2022map0010","url":"https://dblp.org/rec/journals/ieiceta/ObataKY23"}, "url":"URL#146380" }, { "@score":"3", "@id":"146558", "info":{"authors":{"author":[{"@pid":"308/4778","text":"Taiki Suehiro"},{"@pid":"156/4992","text":"Tsuyoshi Kobayashi"},{"@pid":"94/3641","text":"Osamu Takyu"},{"@pid":"31/7011","text":"Yasushi Fuwa"}]},"title":"Data Gathering Scheme for Event Detection and Recognition in Low Power Wide Area Networks.","venue":"IEICE Trans. Commun.","volume":"106","number":"8","pages":"669-685","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ieicetb/SuehiroKTF23","doi":"10.1587/TRANSCOM.2022EBP3153","ee":"https://doi.org/10.1587/transcom.2022ebp3153","url":"https://dblp.org/rec/journals/ieicetb/SuehiroKTF23"}, "url":"URL#146558" }, { "@score":"3", "@id":"147094", "info":{"authors":{"author":[{"@pid":"17/9113","text":"Juan Huang"},{"@pid":"290/2733","text":"Fangfang Gou"},{"@pid":"25/5536-2","text":"Jia Wu 0002"}]},"title":"An effective data communication community establishment scheme in opportunistic networks.","venue":"IET Commun.","volume":"17","number":"12","pages":"1354-1367","year":"2023","type":"Journal Articles","access":"open","key":"journals/iet-com/HuangGW23","doi":"10.1049/CMU2.12628","ee":"https://doi.org/10.1049/cmu2.12628","url":"https://dblp.org/rec/journals/iet-com/HuangGW23"}, "url":"URL#147094" }, { "@score":"3", "@id":"147115", "info":{"authors":{"author":[{"@pid":"244/8662","text":"Dongji Li"},{"@pid":"94/5218","text":"Shaoyi Xu"},{"@pid":"87/660","text":"Yan Li"}]},"title":"Massive heterogeneous data collecting in UAV-assisted wireless IoT networks.","venue":"IET Commun.","volume":"17","number":"14","pages":"1706-1720","year":"2023","type":"Journal Articles","access":"open","key":"journals/iet-com/LiXL23","doi":"10.1049/CMU2.12646","ee":"https://doi.org/10.1049/cmu2.12646","url":"https://dblp.org/rec/journals/iet-com/LiXL23"}, "url":"URL#147115" }, { "@score":"3", "@id":"147183", "info":{"authors":{"author":[{"@pid":"56/5521","text":"Chuanjun Wang"},{"@pid":"37/1682","text":"Wei Xiang"},{"@pid":"24/6824","text":"Ke Hu"},{"@pid":"89/6764","text":"Bin Li"}]},"title":"A dynamic data prepossessing method for parameter identification in power distribution network.","venue":"IET Commun.","volume":"17","number":"8","pages":"1012-1019","year":"2023","type":"Journal Articles","access":"open","key":"journals/iet-com/WangXHL23","doi":"10.1049/CMU2.12600","ee":"https://doi.org/10.1049/cmu2.12600","url":"https://dblp.org/rec/journals/iet-com/WangXHL23"}, "url":"URL#147183" }, { "@score":"3", "@id":"147479", "info":{"authors":{"author":[{"@pid":"301/0795","text":"Amir Khosravian"},{"@pid":"152/6504","text":"Abdollah Amirkhani"},{"@pid":"217/1083","text":"Masoud Masih-Tehrani"},{"@pid":"346/5976","text":"Alireza Yazdanijoo"}]},"title":"Multi-domain autonomous driving dataset: Towards enhancing the generalization of the convolutional neural networks in new environments.","venue":"IET Image Process.","volume":"17","number":"4","pages":"1253-1266","year":"2023","type":"Journal Articles","access":"open","key":"journals/iet-ipr/KhosravianAMY23","doi":"10.1049/IPR2.12710","ee":"https://doi.org/10.1049/ipr2.12710","url":"https://dblp.org/rec/journals/iet-ipr/KhosravianAMY23"}, "url":"URL#147479" }, { "@score":"3", "@id":"147717", "info":{"authors":{"author":[{"@pid":"362/3858","text":"Zhang Wenhua"},{"@pid":"170/8167","text":"Mohammad Kamrul Hasan"},{"@pid":"156/9432","text":"Ahmad Fadzil Ismail"},{"@pid":"221/5874","text":"Yanke Zhang"},{"@pid":"63/4382","text":"Md. Abdur Razzaque"},{"@pid":"170/8171","text":"Shayla Islam"},{"@pid":"256/9628","text":"Budati Anil Kumar"}]},"title":"Data security in smart devices: Advancement, constraints and future recommendations.","venue":"IET Networks","volume":"12","number":"6","pages":"269-281","year":"2023","type":"Journal Articles","access":"open","key":"journals/iet-net/WenhuaHIZRIK23","doi":"10.1049/NTW2.12091","ee":"https://doi.org/10.1049/ntw2.12091","url":"https://dblp.org/rec/journals/iet-net/WenhuaHIZRIK23"}, "url":"URL#147717" }, { "@score":"3", "@id":"147782", "info":{"authors":{"author":[{"@pid":"49/6002","text":"Jian Chen"},{"@pid":"51/5332","text":"Ming Yan"},{"@pid":"346/2967","text":"Muhammad Rabea Hanzla Qureshi"},{"@pid":"266/4007","text":"Keke Geng"}]},"title":"Estimating the visibility in foggy weather based on meteorological and video data: A Recurrent Neural Network approach.","venue":"IET Signal Process.","volume":"17","number":"1","year":"2023","type":"Journal Articles","access":"open","key":"journals/iet-spr/ChenYQG23","doi":"10.1049/SIL2.12164","ee":"https://doi.org/10.1049/sil2.12164","url":"https://dblp.org/rec/journals/iet-spr/ChenYQG23"}, "url":"URL#147782" }, { "@score":"3", "@id":"147855", "info":{"authors":{"author":[{"@pid":"364/5170","text":"Anita R. Patil"},{"@pid":"206/9710","text":"Gautam M. Borkar"}]},"title":"Node authentication and encrypted data transmission in mobile ad hoc network using the swarm intelligence-based secure ad-hoc on-demand distance vector algorithm.","venue":"IET Wirel. Sens. Syst.","volume":"13","number":"6","pages":"201-215","year":"2023","type":"Journal Articles","access":"closed","key":"journals/iet-wss/PatilB23","doi":"10.1049/WSS2.12068","ee":"https://doi.org/10.1049/wss2.12068","url":"https://dblp.org/rec/journals/iet-wss/PatilB23"}, "url":"URL#147855" }, { "@score":"3", "@id":"148010", "info":{"authors":{"author":[{"@pid":"08/318","text":"Hongli Deng"},{"@pid":"67/1120","text":"Tao Yang"}]},"title":"A new encryption and decryption algorithm for privacy data in wireless sensor network based on dynamic key.","venue":"Int. J. Auton. Adapt. Commun. Syst.","volume":"16","number":"4","pages":"376-390","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijaacs/DengY23a","doi":"10.1504/IJAACS.2023.132517","ee":"https://doi.org/10.1504/IJAACS.2023.132517","url":"https://dblp.org/rec/journals/ijaacs/DengY23a"}, "url":"URL#148010" }, { "@score":"3", "@id":"148018", "info":{"authors":{"author":{"@pid":"30/4774","text":"Yawen Li"}},"title":"Research on e-business requirement information resource extraction method in network big data.","venue":"Int. J. Auton. Adapt. Commun. Syst.","volume":"16","number":"2","pages":"188-202","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijaacs/Li23","doi":"10.1504/IJAACS.2023.131072","ee":"https://doi.org/10.1504/IJAACS.2023.131072","url":"https://dblp.org/rec/journals/ijaacs/Li23"}, "url":"URL#148018" }, { "@score":"3", "@id":"148036", "info":{"authors":{"author":{"@pid":"302/6152","text":"Yuguang Ye"}},"title":"Detection of false data attacks in sensor networks based on the APIT location algorithm.","venue":"Int. J. Auton. Adapt. Commun. Syst.","volume":"16","number":"6","pages":"584-596","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijaacs/Ye23","doi":"10.1504/IJAACS.2023.134846","ee":"https://doi.org/10.1504/IJAACS.2023.134846","url":"https://dblp.org/rec/journals/ijaacs/Ye23"}, "url":"URL#148036" }, { "@score":"3", "@id":"148213", "info":{"authors":{"author":{"@pid":"90/10121","text":"Shailendra Shukla"}},"title":"Target node selection for data offloading in partially connected vehicular ad hoc networks.","venue":"Int. J. Ad Hoc Ubiquitous Comput.","volume":"42","number":"2","pages":"113-123","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijahuc/Shukla23","doi":"10.1504/IJAHUC.2023.10053534","ee":"https://doi.org/10.1504/IJAHUC.2023.10053534","url":"https://dblp.org/rec/journals/ijahuc/Shukla23"}, "url":"URL#148213" }, { "@score":"3", "@id":"148221", "info":{"authors":{"author":[{"@pid":"355/1242","text":"Khadija Touya"},{"@pid":"231/6742","text":"Hamid Garmani"},{"@pid":"09/11438","text":"Mohamed Baslam"},{"@pid":"218/2184","text":"Rachid El Ayachi"},{"@pid":"232/8695","text":"Mostafa Jourhmane"}]},"title":"Analysis of sponsoring and caching data: the case of competing ISPs in information-centric networks.","venue":"Int. J. Ad Hoc Ubiquitous Comput.","volume":"43","number":"4","pages":"224-237","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijahuc/TouyaGBAJ23","doi":"10.1504/IJAHUC.2023.133002","ee":"https://doi.org/10.1504/IJAHUC.2023.133002","url":"https://dblp.org/rec/journals/ijahuc/TouyaGBAJ23"}, "url":"URL#148221" }, { "@score":"3", "@id":"148271", "info":{"authors":{"author":[{"@pid":"135/7773","text":"S. Pavithra"},{"@pid":"261/6719","text":"P. M. Anu"}]},"title":"An efficient data aggregation with optimal recharging in wireless rechargeable sensor networks.","venue":"Int. J. Adv. Intell. Paradigms","volume":"26","number":"1","pages":"96-104","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijaip/PavithraA23","doi":"10.1504/IJAIP.2023.133259","ee":"https://doi.org/10.1504/IJAIP.2023.133259","url":"https://dblp.org/rec/journals/ijaip/PavithraA23"}, "url":"URL#148271" }, { "@score":"3", "@id":"148274", "info":{"authors":{"author":[{"@pid":"03/7687","text":"P. Raja"},{"@pid":"40/11140","text":"T. Deepa"},{"@pid":"152/7206","text":"V. Bharathi"}]},"title":"Prediction-based spatial correlation clustering algorithm for efficient data reduction in wireless sensor network.","venue":"Int. J. Adv. Intell. Paradigms","volume":"26","number":"3/4","pages":"245-257","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijaip/RajaDB23","doi":"10.1504/IJAIP.2023.135862","ee":"https://doi.org/10.1504/IJAIP.2023.135862","url":"https://dblp.org/rec/journals/ijaip/RajaDB23"}, "url":"URL#148274" }, { "@score":"3", "@id":"148978", "info":{"authors":{"author":[{"@pid":"291/7932","text":"Jagannadha Rao D. B."},{"@pid":"220/7222","text":"Vijayakumar Polepally"},{"@pid":"312/9164","text":"S. Nagendra Prabhu"},{"@pid":"312/8918","text":"Parsi Kalpana"}]},"title":"Deep recurrent neural network-based Hadoop framework for COVID prediction with applications to big data in cloud computing.","venue":"Int. J. Bio Inspired Comput.","volume":"21","number":"1","pages":"36-47","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijbic/BPPK23","doi":"10.1504/IJBIC.2023.10055199","ee":"https://doi.org/10.1504/IJBIC.2023.10055199","url":"https://dblp.org/rec/journals/ijbic/BPPK23"}, "url":"URL#148978" }, { "@score":"4", "@id":"149037", "info":{"authors":{"author":[{"@pid":"254/8680","text":"Bintu Kadhiwala"},{"@pid":"209/5832","text":"Sankita J. Patel"}]},"title":"On prevention of attribute disclosure and identity disclosure against insider attack in collaborative social network data publishing.","venue":"Int. J. Bus. Intell. Data Min.","volume":"23","number":"1","pages":"14-49","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijbidm/KadhiwalaP23","doi":"10.1504/IJBIDM.2023.131793","ee":"https://doi.org/10.1504/IJBIDM.2023.131793","url":"https://dblp.org/rec/journals/ijbidm/KadhiwalaP23"}, "url":"URL#149037" }, { "@score":"3", "@id":"149051", "info":{"authors":{"author":[{"@pid":"355/5291","text":"Noosheen Shareefi"},{"@pid":"16/11507","text":"Mehdi Bateni"}]},"title":"Identifying influential nodes in large scale social networks using global and local structural information.","venue":"Int. J. Bus. Intell. Data Min.","volume":"23","number":"2","pages":"150-165","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijbidm/ShareefiB23","doi":"10.1504/IJBIDM.2023.132595","ee":"https://doi.org/10.1504/IJBIDM.2023.132595","url":"https://dblp.org/rec/journals/ijbidm/ShareefiB23"}, "url":"URL#149051" }, { "@score":"4", "@id":"149510", "info":{"authors":{"author":[{"@pid":"212/9929","text":"R. Lavanya"},{"@pid":"203/6616","text":"N. Shanmugapriya"}]},"title":"An Intelligent Data Fusion Technique for Improving the Data Transmission Rate in Wireless Sensor Networks.","venue":"Int. J. Comput. Intell. Appl.","volume":"22","number":"1","pages":"2341004:1-2341004:16","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijcia/LavanyaS23","doi":"10.1142/S1469026823410043","ee":"https://doi.org/10.1142/S1469026823410043","url":"https://dblp.org/rec/journals/ijcia/LavanyaS23"}, "url":"URL#149510" }, { "@score":"3", "@id":"149673", "info":{"authors":{"author":[{"@pid":"343/4365","text":"Vimala Dayalan"},{"@pid":"343/4424","text":"Manikandan Kuppusamy"}]},"title":"PIRAP: Intelligent Hybrid Approach for Secure Data Transmission in Wireless Sensor Networks.","venue":"Int. J. Cooperative Inf. Syst.","volume":"32","number":"1&2","pages":"2350002:1-2350002:21","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijcis/DayalanK23","doi":"10.1142/S0218843023500028","ee":"https://doi.org/10.1142/S0218843023500028","url":"https://dblp.org/rec/journals/ijcis/DayalanK23"}, "url":"URL#149673" }, { "@score":"4", "@id":"150013", "info":{"authors":{"author":[{"@pid":"320/2417","text":"Ahmad Abrar"},{"@pid":"79/2437","text":"Ahmad Suki Che Mohamed Arif"},{"@pid":"35/10133","text":"Khuzairi Mohd Zaini"}]},"title":"Internet of things producer mobility management in named data networks: a survey, outlook, and open issues.","venue":"Int. J. Commun. Networks Distributed Syst.","volume":"29","number":"5","pages":"493-512","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijcnds/AbrarAZ23","doi":"10.1504/IJCNDS.2023.133166","ee":"https://doi.org/10.1504/IJCNDS.2023.133166","url":"https://dblp.org/rec/journals/ijcnds/AbrarAZ23"}, "url":"URL#150013" }, { "@score":"3", "@id":"150019", "info":{"authors":{"author":[{"@pid":"333/2441","text":"Dipak Dabhi"},{"@pid":"309/3030","text":"Devendra V. Thakor"}]},"title":"Utilisation aware virtual machine selection policy for workload consolidation in cloud data centres.","venue":"Int. J. Commun. Networks Distributed Syst.","volume":"29","number":"2","pages":"125-148","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijcnds/DabhiT23","doi":"10.1504/IJCNDS.2023.10046013","ee":"https://doi.org/10.1504/IJCNDS.2023.10046013","url":"https://dblp.org/rec/journals/ijcnds/DabhiT23"}, "url":"URL#150019" }, { "@score":"3", "@id":"150038", "info":{"authors":{"author":[{"@pid":"362/6382","text":"Manu G. Thomas"},{"@pid":"136/1492","text":"S. Senthil"}]},"title":"Metaheuristic enabled hot event detection and product recommendation in social media data streams.","venue":"Int. J. Commun. Networks Distributed Syst.","volume":"29","number":"6","pages":"573-597","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijcnds/ThomasS23","doi":"10.1504/IJCNDS.2023.133909","ee":"https://doi.org/10.1504/IJCNDS.2023.133909","url":"https://dblp.org/rec/journals/ijcnds/ThomasS23"}, "url":"URL#150038" }, { "@score":"3", "@id":"150124", "info":{"authors":{"author":[{"@pid":"80/1317","text":"A. Kavitha"},{"@pid":"176/5230","text":"Koppala Guravaiah"},{"@pid":"119/4997","text":"R. Leela Velusamy"},{"@pid":"269/2676","text":"S. Suseela"},{"@pid":"293/9560","text":"Dhilip Kumar V."}]},"title":"DR-NAP: Data reduction strategy using neural adaptation phenomenon in wireless sensor networks.","venue":"Int. J. Commun. Syst.","volume":"36","number":"8","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijcomsys/KavithaGVSV23","doi":"10.1002/DAC.5467","ee":"https://doi.org/10.1002/dac.5467","url":"https://dblp.org/rec/journals/ijcomsys/KavithaGVSV23"}, "url":"URL#150124" }, { "@score":"3", "@id":"150183", "info":{"authors":{"author":[{"@pid":"216/2377","text":"Vishnuvarthan Rajagopal"},{"@pid":"223/9769","text":"Bhanumathi Velusamy"},{"@pid":"54/3026","text":"Rathinasamy Sakthivel"}]},"title":"Double Q-learning-based adaptive trajectory selection for energy-efficient data collection in wireless sensor networks.","venue":"Int. J. Commun. Syst.","volume":"36","number":"7","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijcomsys/RajagopalVS23","doi":"10.1002/DAC.5452","ee":"https://doi.org/10.1002/dac.5452","url":"https://dblp.org/rec/journals/ijcomsys/RajagopalVS23"}, "url":"URL#150183" }, { "@score":"3", "@id":"150214", "info":{"authors":{"author":{"@pid":"130/9387","text":"M. Vijayakumar"}},"title":"Network statistics-based routing and path orient data encryption scheme for efficient healthcare monitoring with IoT in WSN.","venue":"Int. J. Commun. Syst.","volume":"36","number":"1","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijcomsys/Vijayakumar23","doi":"10.1002/DAC.5361","ee":"https://doi.org/10.1002/dac.5361","url":"https://dblp.org/rec/journals/ijcomsys/Vijayakumar23"}, "url":"URL#150214" }, { "@score":"3", "@id":"150586", "info":{"authors":{"author":[{"@pid":"12/5838","text":"Tao Wang"},{"@pid":"241/1053","text":"Shuang Fu"},{"@pid":"215/6634","text":"Zhiyi Wu"}]},"title":"Examining the role of likes in follower network evolution based on a dynamic panel data model.","venue":"Int. J. Comput. Sci. Eng.","volume":"26","number":"6","pages":"641-649","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijcse/WangFW23","doi":"10.1504/IJCSE.2023.135296","ee":"https://doi.org/10.1504/ijcse.2023.135296","url":"https://dblp.org/rec/journals/ijcse/WangFW23"}, "url":"URL#150586" }, { "@score":"3", "@id":"151328", "info":{"authors":{"author":[{"@pid":"179/2493","text":"Mitali Desai"},{"@pid":"81/7701","text":"Rupa G. Mehta"},{"@pid":"74/7702","text":"Dipti P. Rana"}]},"title":"ScholarRec: a scholars' recommender system that combines scholastic influence and social collaborations in academic social networks.","venue":"Int. J. Data Sci. Anal.","volume":"16","number":"2","pages":"203-216","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijdsa/DesaiMR23","doi":"10.1007/S41060-022-00345-W","ee":"https://doi.org/10.1007/s41060-022-00345-w","url":"https://dblp.org/rec/journals/ijdsa/DesaiMR23"}, "url":"URL#151328" }, { "@score":"3", "@id":"151357", "info":{"authors":{"author":[{"@pid":"322/8952","text":"Hsuan-Cheng Sun"},{"@pid":"210/8185","text":"Tse-Yu Lin"},{"@pid":"207/7828","text":"Yen-Lung Tsai"}]},"title":"Performance prediction in major league baseball by long short-term memory networks.","venue":"Int. J. Data Sci. Anal.","volume":"15","number":"1","pages":"93-104","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijdsa/SunLT23","doi":"10.1007/S41060-022-00313-4","ee":"https://doi.org/10.1007/s41060-022-00313-4","url":"https://dblp.org/rec/journals/ijdsa/SunLT23"}, "url":"URL#151357" }, { "@score":"3", "@id":"151425", "info":{"authors":{"author":[{"@pid":"30/7709","text":"Fouzi Harrag"},{"@pid":"210/7018","text":"Ali Alshehri"}]},"title":"Applying Data Mining in Surveillance: Detecting Suspicious Activity on Social Networks.","venue":"Int. J. Distributed Syst. Technol.","volume":"14","number":"1","pages":"1-24","year":"2023","type":"Journal Articles","access":"open","key":"journals/ijdst/HarragA23","doi":"10.4018/IJDST.317930","ee":"https://doi.org/10.4018/ijdst.317930","url":"https://dblp.org/rec/journals/ijdst/HarragA23"}, "url":"URL#151425" }, { "@score":"3", "@id":"152148", "info":{"authors":{"author":[{"@pid":"177/7738","text":"S. Arul Jothi"},{"@pid":"98/4361","text":"R. Venkatesan"},{"@pid":"144/0715","text":"V. Santhi"}]},"title":"Rule-Based Outlier Detection with a Modified Variational AutoEncoder for Enhancing Data Accuracy in Wireless Sensor Networks.","venue":"Int. J. Fuzzy Syst.","volume":"25","number":"6","pages":"2187-2202","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijfs/JothiVS23","doi":"10.1007/S40815-023-01496-Z","ee":"https://doi.org/10.1007/s40815-023-01496-z","url":"https://dblp.org/rec/journals/ijfs/JothiVS23"}, "url":"URL#152148" }, { "@score":"4", "@id":"153387", "info":{"authors":{"author":[{"@pid":"360/0745","text":"Fatima Saeedi Aval Noughabia"},{"@pid":"158/3769","text":"Najmeh Malekmohammadi"},{"@pid":"51/4368","text":"Farhad Hosseinzadeh Lotfi"},{"@pid":"74/3928","text":"Shabnam Razavyan"}]},"title":"Efficiency decomposition in three-stage network with fuzzy desirable and undesirable output and fuzzy input in data envelopment analysis.","venue":"Int. J. Intell. Comput. Cybern.","volume":"16","number":"4","pages":"665-696","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijicc/NoughabiaMLR23","doi":"10.1108/IJICC-12-2022-0306","ee":"https://doi.org/10.1108/IJICC-12-2022-0306","url":"https://dblp.org/rec/journals/ijicc/NoughabiaMLR23"}, "url":"URL#153387" }, { "@score":"4", "@id":"153458", "info":{"authors":{"author":[{"@pid":"278/8885","text":"Samson Ebenezar Uthirapathy"},{"@pid":"365/9876","text":"Domnic Sandanam"}]},"title":"Sentiment analysis in social network data using multilayer perceptron neural network with hill-climbing meta-heuristic optimisation.","venue":"Int. J. Inf. Comput. Secur.","volume":"22","number":"3/4","pages":"277-297","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijics/UthirapathyS23","doi":"10.1504/IJICS.2023.135892","ee":"https://doi.org/10.1504/IJICS.2023.135892","url":"https://dblp.org/rec/journals/ijics/UthirapathyS23"}, "url":"URL#153458" }, { "@score":"3", "@id":"154394", "info":{"authors":{"author":[{"@pid":"48/4252","text":"Yingchun Chen"},{"@pid":"12/10207","text":"Jinguo Li"},{"@pid":"92/7648","text":"Naiwang Guo"}]},"title":"Efficient and interpretable SRU combined with TabNet for network intrusion detection in the big data environment.","venue":"Int. J. Inf. Sec.","volume":"22","number":"3","pages":"679-689","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijisec/ChenLG23","doi":"10.1007/S10207-022-00656-W","ee":"https://doi.org/10.1007/s10207-022-00656-w","url":"https://dblp.org/rec/journals/ijisec/ChenLG23"}, "url":"URL#154394" }, { "@score":"3", "@id":"154482", "info":{"authors":{"author":[{"@pid":"340/5883","text":"Suman Thapaliya"},{"@pid":"167/1627","text":"Pawan Kumar Sharma"}]},"title":"Optimized Deep Neuro Fuzzy Network for Cyber Forensic Investigation in Big Data-Based IoT Infrastructures.","venue":"Int. J. Inf. Secur. Priv.","volume":"17","number":"1","pages":"1-22","year":"2023","type":"Journal Articles","access":"open","key":"journals/ijisp/ThapaliyaS23","doi":"10.4018/IJISP.315819","ee":"https://doi.org/10.4018/ijisp.315819","url":"https://dblp.org/rec/journals/ijisp/ThapaliyaS23"}, "url":"URL#154482" }, { "@score":"3", "@id":"154660", "info":{"authors":{"author":{"@pid":"33/3988","text":"Xiaoqiang Liu"}},"title":"POI Recommendation Model Using Multi-Head Attention in Location-Based Social Network Big Data.","venue":"Int. J. Inf. Technol. Syst. Approach","volume":"16","number":"2","pages":"1-16","year":"2023","type":"Journal Articles","access":"open","key":"journals/ijitsa/Liu23","doi":"10.4018/IJITSA.318142","ee":"https://doi.org/10.4018/ijitsa.318142","url":"https://dblp.org/rec/journals/ijitsa/Liu23"}, "url":"URL#154660" }, { "@score":"3", "@id":"154662", "info":{"authors":{"author":{"@pid":"37/1943","text":"Jinjun Liu"}},"title":"Sentiment Classification of Social Network Text Based on AT-BiLSTM Model in a Big Data Environment.","venue":"Int. J. Inf. Technol. Syst. Approach","volume":"16","number":"2","pages":"1-15","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijitsa/Liu23b","doi":"10.4018/IJITSA.324808","ee":"https://doi.org/10.4018/ijitsa.324808","url":"https://dblp.org/rec/journals/ijitsa/Liu23b"}, "url":"URL#154662" }, { "@score":"4", "@id":"154675", "info":{"authors":{"author":[{"@pid":"166/2241","text":"Long Su"},{"@pid":"78/2022","text":"Kai Wang"},{"@pid":"216/1379","text":"Qiaochu Liang"},{"@pid":"94/4087","text":"Lifeng Zhang"}]},"title":"Health Assessment Method of Equipment in Distribution Court Based on Big Data Analysis in the Framework of Distribution Network of Things.","venue":"Int. J. Inf. Technol. Syst. Approach","volume":"16","number":"3","pages":"1-17","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijitsa/SuWLZ23","doi":"10.4018/IJITSA.326755","ee":"https://doi.org/10.4018/ijitsa.326755","url":"https://dblp.org/rec/journals/ijitsa/SuWLZ23"}, "url":"URL#154675" }, { "@score":"3", "@id":"155734", "info":{"authors":{"author":[{"@pid":"226/7212","text":"Kenji Nozaki"},{"@pid":"57/382","text":"Teruhisa Hochin"}]},"title":"Evaluation of Identification Method of Corresponding Numerical Attributes in Heterogeneous Databases Based on Instances.","venue":"Int. J. Networked Distributed Comput.","volume":"11","number":"1","pages":"1-8","year":"2023","type":"Journal Articles","access":"open","key":"journals/ijndc/NozakiH23","doi":"10.1007/S44227-022-00001-6","ee":"https://doi.org/10.1007/s44227-022-00001-6","url":"https://dblp.org/rec/journals/ijndc/NozakiH23"}, "url":"URL#155734" }, { "@score":"4", "@id":"155743", "info":{"authors":{"author":[{"@pid":"255/1619","text":"Tanima Bhowmik"},{"@pid":"48/8740","text":"Indrajit Banerjee"}]},"title":"EEPPDA - Edge-enabled efficient privacy-preserving data aggregation in smart healthcare Internet of Things network.","venue":"Int. J. Netw. Manag.","volume":"33","number":"1","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijnm/BhowmikB23","doi":"10.1002/NEM.2216","ee":"https://doi.org/10.1002/nem.2216","url":"https://dblp.org/rec/journals/ijnm/BhowmikB23"}, "url":"URL#155743" }, { "@score":"3", "@id":"155779", "info":{"authors":{"author":[{"@pid":"290/1812","text":"Nicolás Gallego-Molina"},{"@pid":"31/1885","text":"Andrés Ortiz 0001"},{"@pid":"56/11155","text":"Francisco Jesús Martínez-Murcia"},{"@pid":"219/9869","text":"Ignacio Rodríguez-Rodríguez"},{"@pid":"268/9884","text":"Juan Luis Luque"}]},"title":"Assessing Functional Brain Network Dynamics in Dyslexia from fNIRS Data.","venue":"Int. J. Neural Syst.","volume":"33","number":"4","pages":"2350017:1-2350017:18","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijns/GallegoMolinaOMRL23","doi":"10.1142/S012906572350017X","ee":"https://doi.org/10.1142/S012906572350017X","url":"https://dblp.org/rec/journals/ijns/GallegoMolinaOMRL23"}, "url":"URL#155779" }, { "@score":"3", "@id":"155901", "info":{"authors":{"author":[{"@pid":"38/6167","text":"Abdallah Al-Zoubi"},{"@pid":"337/8947","text":"Tariq Saadeddin"},{"@pid":"173/1516","text":"Mamoun Dmour"}]},"title":"An Ethereum Private Network for Data Management in Blockchain of Things Ecosystem.","venue":"Int. J. Online Biomed. Eng.","volume":"19","number":"1","pages":"38-58","year":"2023","type":"Journal Articles","access":"open","key":"journals/ijoe/AlZoubiSD23","doi":"10.3991/IJOE.V19I01.35261","ee":"https://doi.org/10.3991/ijoe.v19i01.35261","url":"https://dblp.org/rec/journals/ijoe/AlZoubiSD23"}, "url":"URL#155901" }, { "@score":"3", "@id":"156295", "info":{"authors":{"author":[{"@pid":"219/2538","text":"Mianjie Li"},{"@pid":"73/5444","text":"Zhihong Tian"},{"@pid":"22/5535","text":"Xiaojiang Du"},{"@pid":"97/7626","text":"Xiaochen Yuan"},{"@pid":"177/0901","text":"Chun Shan"},{"@pid":"15/1123","text":"Mohsen Guizani"}]},"title":"Power normalized cepstral robust features of deep neural networks in a cloud computing data privacy protection scheme.","venue":"Neurocomputing","volume":"518","pages":"165-173","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijon/LiTDYSG23","doi":"10.1016/J.NEUCOM.2022.11.001","ee":"https://doi.org/10.1016/j.neucom.2022.11.001","url":"https://dblp.org/rec/journals/ijon/LiTDYSG23"}, "url":"URL#156295" }, { "@score":"3", "@id":"156999", "info":{"authors":{"author":[{"@pid":"368/7895","text":"Deblina Bhowmick"},{"@pid":"286/3977","text":"Dipu Sarkar"},{"@pid":"368/7820","text":"Etesola Imchen"}]},"title":"Data-Driven Approach for SVC Location Finding using FVSI in Distribution Network Configuration Environment.","venue":"Int. J. Perform. Eng.","volume":"19","number":"12","pages":"797-806","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijpe/BhowmickSI23","doi":"10.23940/IJPE.23.12.P4.797806","ee":"https://doi.org/10.23940/ijpe.23.12.p4.797806","url":"https://dblp.org/rec/journals/ijpe/BhowmickSI23"}, "url":"URL#156999" }, { "@score":"3", "@id":"157265", "info":{"authors":{"author":[{"@pid":"343/3021","text":"Hyojoong Kim"},{"@pid":"88/836","text":"Heeyoung Kim"}]},"title":"Deep embedding kernel mixture networks for conditional anomaly detection in high-dimensional data.","venue":"Int. J. Prod. Res.","volume":"61","number":"4","pages":"1101-1113","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijpr/KimK23","doi":"10.1080/00207543.2022.2027040","ee":"https://doi.org/10.1080/00207543.2022.2027040","url":"https://dblp.org/rec/journals/ijpr/KimK23"}, "url":"URL#157265" }, { "@score":"3", "@id":"157689", "info":{"authors":{"author":[{"@pid":"04/1203","text":"Zhicheng Wen"},{"@pid":"158/1974","text":"Longxin Zhang"},{"@pid":"344/9373","text":"Qinlan Wu"},{"@pid":"345/0215","text":"Wengui Deng"}]},"title":"A Network Security Situation Awareness Method Based on GRU in Big Data Environment.","venue":"Int. J. Pattern Recognit. Artif. Intell.","volume":"37","number":"1","pages":"2251018:1-2251018:18","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijprai/WenZWD23","doi":"10.1142/S0218001422510181","ee":"https://doi.org/10.1142/S0218001422510181","url":"https://dblp.org/rec/journals/ijprai/WenZWD23"}, "url":"URL#157689" }, { "@score":"3", "@id":"158160", "info":{"authors":{"author":[{"@pid":"17/9712","text":"Xu Ding"},{"@pid":"63/6318","text":"Xiang Zheng"},{"@pid":"333/6198","text":"Bixun Zhang"},{"@pid":"04/383","text":"Pengfei Xu"},{"@pid":"29/563-11","text":"Lei Shi 0011"}]},"title":"Data sharing based on conflict graph and clustering in VANET.","venue":"Int. J. Sens. Networks","volume":"43","number":"2","pages":"63-77","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijsnet/DingZZXS23","doi":"10.1504/IJSNET.2023.134302","ee":"https://doi.org/10.1504/IJSNET.2023.134302","url":"https://dblp.org/rec/journals/ijsnet/DingZZXS23"}, "url":"URL#158160" }, { "@score":"3", "@id":"158171", "info":{"authors":{"author":[{"@pid":"215/9706","text":"Qiaoli Kong"},{"@pid":"327/0723","text":"Qi Bai"},{"@pid":"318/1990","text":"Tianfa Wang"},{"@pid":"37/9428","text":"Changsong Li"},{"@pid":"58/8788","text":"Yanfei Chen"},{"@pid":"167/1200","text":"Jingwei Han"}]},"title":"Analysis of GNSS data quality based on Anubis and RTKLIB and single-point positioning accuracy in different environments for Android smartphones.","venue":"Int. J. Sens. Networks","volume":"41","number":"2","pages":"78-96","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijsnet/KongBWLCH23","doi":"10.1504/IJSNET.2022.10051523","ee":"https://doi.org/10.1504/IJSNET.2022.10051523","url":"https://dblp.org/rec/journals/ijsnet/KongBWLCH23"}, "url":"URL#158171" }, { "@score":"3", "@id":"158543", "info":{"authors":{"author":[{"@pid":"327/2523","text":"Yiqiang Lai"},{"@pid":"276/0106","text":"Xianfeng Zeng"}]},"title":"A POI Recommendation Model for Intelligent Systems Using AT-LSTM in Location-Based Social Network Big Data.","venue":"Int. J. Semantic Web Inf. Syst.","volume":"19","number":"1","pages":"1-15","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijswis/LaiZ23","doi":"10.4018/IJSWIS.330246","ee":"https://doi.org/10.4018/ijswis.330246","url":"https://dblp.org/rec/journals/ijswis/LaiZ23"}, "url":"URL#158543" }, { "@score":"3", "@id":"158885", "info":{"authors":{"author":[{"@pid":"81/787","text":"S. Subasree"},{"@pid":"89/323","text":"N. K. Sakthivel"},{"@pid":"121/2123","text":"M. Shobana"},{"@pid":"240/6662","text":"Amit Kumar Tyagi"}]},"title":"Deep Learning based Improved Generative Adversarial Network for Addressing Class Imbalance Classification Problem in Breast Cancer Dataset.","venue":"Int. J. Uncertain. Fuzziness Knowl. Based Syst.","volume":"31","number":"3","pages":"387-412","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijufks/SubasreeSST23","doi":"10.1142/S0218488523500204","ee":"https://doi.org/10.1142/S0218488523500204","url":"https://dblp.org/rec/journals/ijufks/SubasreeSST23"}, "url":"URL#158885" }, { "@score":"5", "@id":"158973", "info":{"authors":{"author":{"@pid":"201/2288","text":"Safiyyeh Ahmadzadeh"}},"title":"Study of Energy-Efficient Biomedical Data Compression Methods in the Wireless Body Area Networks (WBANs) and Remote Healthcare Networks.","venue":"Int. J. Wirel. Inf. Networks","volume":"30","number":"3","pages":"252-269","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijwin/Ahmadzadeh23","doi":"10.1007/S10776-023-00599-6","ee":"https://doi.org/10.1007/s10776-023-00599-6","url":"https://dblp.org/rec/journals/ijwin/Ahmadzadeh23"}, "url":"URL#158973" }, { "@score":"3", "@id":"158986", "info":{"authors":{"author":[{"@pid":"300/7418","text":"Senthil Kumar Swami Durai"},{"@pid":"268/1605","text":"Balaganesh Duraisamy"},{"@pid":"213/2697","text":"J. T. Thirukrishna"}]},"title":"Certain Investigation on Healthcare Monitoring for Enhancing Data Transmission in WSN.","venue":"Int. J. Wirel. Inf. Networks","volume":"30","number":"1","pages":"103-110","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijwin/DuraiDT23","doi":"10.1007/S10776-021-00530-X","ee":"https://doi.org/10.1007/s10776-021-00530-x","url":"https://dblp.org/rec/journals/ijwin/DuraiDT23"}, "url":"URL#158986" }, { "@score":"4", "@id":"158998", "info":{"authors":{"author":[{"@pid":"340/5883","text":"Suman Thapaliya"},{"@pid":"167/1627","text":"Pawan Kumar Sharma"}]},"title":"Cyber Forensic Investigation in IoT Using Deep Learning Based Feature Fusion in Big Data.","venue":"Int. J. Wirel. Inf. Networks","volume":"30","number":"1","pages":"16-29","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijwin/ThapaliyaS23","doi":"10.1007/S10776-022-00586-3","ee":"https://doi.org/10.1007/s10776-022-00586-3","url":"https://dblp.org/rec/journals/ijwin/ThapaliyaS23"}, "url":"URL#158998" }, { "@score":"4", "@id":"160823", "info":{"authors":{"author":[{"@pid":"54/9383","text":"G. Sudha"},{"@pid":"258/1861","text":"C. Tharini"}]},"title":"Hybrid Compression Algorithm for Energy Efficient Image Transmission in Wireless Sensor Networks Using SVD-RLE in Voluminous Data Applications.","venue":"Informatica","volume":"47","number":"4","year":"2023","type":"Journal Articles","access":"open","key":"journals/informaticaSI/SudhaT23","doi":"10.31449/INF.V47I4.5041","ee":"https://doi.org/10.31449/inf.v47i4.5041","url":"https://dblp.org/rec/journals/informaticaSI/SudhaT23"}, "url":"URL#160823" }, { "@score":"3", "@id":"162674", "info":{"authors":{"author":[{"@pid":"356/4467","text":"Ihab Nassra"},{"@pid":"38/6476","text":"Juan Vicente Capella"}]},"title":"Data compression techniques in IoT-enabled wireless body sensor networks: A systematic literature review and research trends for QoS improvement.","venue":"Internet Things","volume":"23","pages":"100806","year":"2023","type":"Journal Articles","access":"open","key":"journals/iot/NassraC23","doi":"10.1016/J.IOT.2023.100806","ee":"https://doi.org/10.1016/j.iot.2023.100806","url":"https://dblp.org/rec/journals/iot/NassraC23"}, "url":"URL#162674" }, { "@score":"3", "@id":"163249", "info":{"authors":{"author":[{"@pid":"182/7376","text":"Haonan Hu"},{"@pid":"55/5645","text":"Ying Dong"},{"@pid":"11/6484","text":"Yan Jiang"},{"@pid":"07/1671","text":"Qianbin Chen"},{"@pid":"84/6889-3","text":"Jie Zhang 0003"}]},"title":"On the Age of Information and Energy Efficiency in Cellular IoT Networks With Data Compression.","venue":"IEEE Internet Things J.","volume":"10","number":"6, March 15","pages":"5226-5239","year":"2023","type":"Journal Articles","access":"closed","key":"journals/iotj/HuDJCZ23","doi":"10.1109/JIOT.2022.3222343","ee":"https://doi.org/10.1109/JIOT.2022.3222343","url":"https://dblp.org/rec/journals/iotj/HuDJCZ23"}, "url":"URL#163249" }, { "@score":"3", "@id":"163371", "info":{"authors":{"author":[{"@pid":"70/120","text":"Jinwoong Kim"},{"@pid":"25/6052","text":"Minsu Kim"},{"@pid":"k/MinSooKim2","text":"Min-Soo Kim 0002"},{"@pid":"37/1760","text":"Jemin Lee"}]},"title":"Ensuring Data Freshness in Wireless Monitoring Networks: Age-of-Information-Sensitive Coverage and Energy Efficiency Perspectives.","venue":"IEEE Internet Things J.","volume":"10","number":"14","pages":"12811-12825","year":"2023","type":"Journal Articles","access":"closed","key":"journals/iotj/KimKKL23","doi":"10.1109/JIOT.2023.3257263","ee":"https://doi.org/10.1109/JIOT.2023.3257263","url":"https://dblp.org/rec/journals/iotj/KimKKL23"}, "url":"URL#163371" }, { "@score":"3", "@id":"163439", "info":{"authors":{"author":[{"@pid":"61/500","text":"Yue Li"},{"@pid":"64/10103","text":"Yingjian Liu"},{"@pid":"234/7774","text":"Haoyu Yin"},{"@pid":"58/566","text":"Zhongwen Guo"},{"@pid":"w/YuWang3","text":"Yu Wang 0003"}]},"title":"Trident: Defensing Synergetic Denial-of-Service Attacks in Underwater Named Data Networking.","venue":"IEEE Internet Things J.","volume":"10","number":"23","pages":"20633-20648","year":"2023","type":"Journal Articles","access":"closed","key":"journals/iotj/LiLYGW23","doi":"10.1109/JIOT.2023.3297334","ee":"https://doi.org/10.1109/JIOT.2023.3297334","url":"https://dblp.org/rec/journals/iotj/LiLYGW23"}, "url":"URL#163439" }, { "@score":"3", "@id":"163457", "info":{"authors":{"author":[{"@pid":"69/2834","text":"Zhiming Li"},{"@pid":"180/2699","text":"Peng Tong"},{"@pid":"16/3621-2","text":"Juan Liu 0002"},{"@pid":"02/7910-1","text":"Xijun Wang 0001"},{"@pid":"19/1890","text":"Lingfu Xie"},{"@pid":"09/5360","text":"Huaiyu Dai"}]},"title":"Learning-Based Data Gathering for Information Freshness in UAV-Assisted IoT Networks.","venue":"IEEE Internet Things J.","volume":"10","number":"3","pages":"2557-2573","year":"2023","type":"Journal Articles","access":"closed","key":"journals/iotj/LiTLWXD23","doi":"10.1109/JIOT.2022.3215521","ee":"https://doi.org/10.1109/JIOT.2022.3215521","url":"https://dblp.org/rec/journals/iotj/LiTLWXD23"}, "url":"URL#163457" }, { "@score":"3", "@id":"163581", "info":{"authors":{"author":[{"@pid":"75/8016","text":"Xiaoyuan Luo"},{"@pid":"343/6377","text":"Junnan He"},{"@pid":"68/1277","text":"Xinyu Wang"},{"@pid":"26/10039","text":"Yuyan Zhang"},{"@pid":"25/3029","text":"Xinping Guan"}]},"title":"Resilient Defense of False Data Injection Attacks in Smart Grids via Virtual Hidden Networks.","venue":"IEEE Internet Things J.","volume":"10","number":"7","pages":"6474-6490","year":"2023","type":"Journal Articles","access":"closed","key":"journals/iotj/LuoHWZG23","doi":"10.1109/JIOT.2022.3227059","ee":"https://doi.org/10.1109/JIOT.2022.3227059","url":"https://dblp.org/rec/journals/iotj/LuoHWZG23"}, "url":"URL#163581" }, { "@score":"3", "@id":"163745", "info":{"authors":{"author":[{"@pid":"308/1327","text":"Made Adi Paramartha Putra"},{"@pid":"266/4422","text":"Ade Pitra Hermawan"},{"@pid":"251/5081","text":"Cosmas Ifeanyi Nwakanma"},{"@pid":"k/DongSeongKim2","text":"Dong-Seong Kim 0002"},{"@pid":"68/5422","text":"Jae-Min Lee"}]},"title":"FDPR: A Novel Fog Data Prediction and Recovery Using Efficient DL in IoT Networks.","venue":"IEEE Internet Things J.","volume":"10","number":"19","pages":"16895-16906","year":"2023","type":"Journal Articles","access":"closed","key":"journals/iotj/PutraHNKL23","doi":"10.1109/JIOT.2023.3271026","ee":"https://doi.org/10.1109/JIOT.2023.3271026","url":"https://dblp.org/rec/journals/iotj/PutraHNKL23"}, "url":"URL#163745" }, { "@score":"3", "@id":"164123", "info":{"authors":{"author":[{"@pid":"218/6343","text":"Huanzhuo Wu"},{"@pid":"271/5788","text":"Yunbin Shen"},{"@pid":"36/11343","text":"Xun Xiao"},{"@pid":"10/1557-2","text":"Giang T. Nguyen 0002"},{"@pid":"36/640","text":"Artur Hecker"},{"@pid":"f/FHPFitzek","text":"Frank H. P. Fitzek"}]},"title":"Accelerating Industrial IoT Acoustic Data Separation With In-Network Computing.","venue":"IEEE Internet Things J.","volume":"10","number":"5","pages":"3901-3916","year":"2023","type":"Journal Articles","access":"closed","key":"journals/iotj/WuSXNHF23","doi":"10.1109/JIOT.2022.3176974","ee":"https://doi.org/10.1109/JIOT.2022.3176974","url":"https://dblp.org/rec/journals/iotj/WuSXNHF23"}, "url":"URL#164123" }, { "@score":"3", "@id":"164258", "info":{"authors":{"author":[{"@pid":"237/5302","text":"Mengjie Yi"},{"@pid":"02/7910-1","text":"Xijun Wang 0001"},{"@pid":"16/3621-2","text":"Juan Liu 0002"},{"@pid":"04/3348-84","text":"Yan Zhang 0084"},{"@pid":"63/7178","text":"Ronghui Hou"}]},"title":"Multitask Transfer Deep Reinforcement Learning for Timely Data Collection in Rechargeable-UAV-Aided IoT Networks.","venue":"IEEE Internet Things J.","volume":"10","number":"23","pages":"20545-20559","year":"2023","type":"Journal Articles","access":"closed","key":"journals/iotj/YiWLZH23","doi":"10.1109/JIOT.2023.3300927","ee":"https://doi.org/10.1109/JIOT.2023.3300927","url":"https://dblp.org/rec/journals/iotj/YiWLZH23"}, "url":"URL#164258" }, { "@score":"4", "@id":"164345", "info":{"authors":{"author":[{"@pid":"15/4777-19","text":"Tao Zhang 0019"},{"@pid":"02/6252","text":"Ran Huang"},{"@pid":"337/8024","text":"Yuanzhen Hu"},{"@pid":"122/1364","text":"Yangfan Li"},{"@pid":"203/0809","text":"Shaojun Zou"},{"@pid":"298/9386","text":"Qianqiang Zhang"},{"@pid":"76/1820","text":"Xin Liu"},{"@pid":"184/3479","text":"Chang Ruan"}]},"title":"Load Balancing With Deadline-Driven Parallel Data Transmission in Data Center Networks.","venue":"IEEE Internet Things J.","volume":"10","number":"2","pages":"1171-1191","year":"2023","type":"Journal Articles","access":"closed","key":"journals/iotj/ZhangHHLZZLR23","doi":"10.1109/JIOT.2022.3204908","ee":"https://doi.org/10.1109/JIOT.2022.3204908","url":"https://dblp.org/rec/journals/iotj/ZhangHHLZZLR23"}, "url":"URL#164345" }, { "@score":"3", "@id":"164404", "info":{"authors":{"author":[{"@pid":"117/2916","text":"Zhanpeng Zhang"},{"@pid":"54/1474-2","text":"Chen Xu 0002"},{"@pid":"305/9695","text":"Zewu Li"},{"@pid":"56/2807","text":"Xiongwen Zhao"},{"@pid":"180/4550","text":"Runze Wu"}]},"title":"Deep Reinforcement Learning for Aerial Data Collection in Hybrid-Powered NOMA-IoT Networks.","venue":"IEEE Internet Things J.","volume":"10","number":"2","pages":"1761-1774","year":"2023","type":"Journal Articles","access":"closed","key":"journals/iotj/ZhangXLZW23","doi":"10.1109/JIOT.2022.3209980","ee":"https://doi.org/10.1109/JIOT.2022.3209980","url":"https://dblp.org/rec/journals/iotj/ZhangXLZW23"}, "url":"URL#164404" }, { "@score":"3", "@id":"164462", "info":{"authors":{"author":[{"@pid":"193/9225","text":"Yuanjian Zhou"},{"@pid":"49/1185","text":"Zhenfu Cao"},{"@pid":"06/1495","text":"Xiaolei Dong"},{"@pid":"99/3847-18","text":"Jun Zhou 0018"}]},"title":"BLDSS: A Blockchain-Based Lightweight Searchable Data Sharing Scheme in Vehicular Social Networks.","venue":"IEEE Internet Things J.","volume":"10","number":"9, May 1","pages":"7974-7992","year":"2023","type":"Journal Articles","access":"closed","key":"journals/iotj/ZhouCDZ23","doi":"10.1109/JIOT.2022.3230833","ee":"https://doi.org/10.1109/JIOT.2022.3230833","url":"https://dblp.org/rec/journals/iotj/ZhouCDZ23"}, "url":"URL#164462" }, { "@score":"3", "@id":"164494", "info":{"authors":{"author":[{"@pid":"257/3734","text":"Qingcheng Zhu"},{"@pid":"127/9233","text":"Xiaosong Yu"},{"@pid":"64/7816","text":"Yongli Zhao"},{"@pid":"49/7739","text":"Avishek Nag"},{"@pid":"84/6889-6","text":"Jie Zhang 0006"}]},"title":"Resource Allocation in Quantum-Key-Distribution- Secured Datacenter Networks With Cloud-Edge Collaboration.","venue":"IEEE Internet Things J.","volume":"10","number":"12","pages":"10916-10932","year":"2023","type":"Journal Articles","access":"closed","key":"journals/iotj/ZhuYZNZ23","doi":"10.1109/JIOT.2023.3242725","ee":"https://doi.org/10.1109/JIOT.2023.3242725","url":"https://dblp.org/rec/journals/iotj/ZhuYZNZ23"}, "url":"URL#164494" }, { "@score":"3", "@id":"164909", "info":{"authors":{"author":[{"@pid":"84/11514","text":"Suppawong Tuarob"},{"@pid":"351/8263","text":"Manisa Satravisut"},{"@pid":"292/3070","text":"Pochara Sangtunchai"},{"@pid":"351/7444","text":"Sakunrat Nunthavanich"},{"@pid":"151/3092","text":"Thanapon Noraset"}]},"title":"FALCoN: Detecting and classifying abusive language in social networks using context features and unlabeled data.","venue":"Inf. Process. Manag.","volume":"60","number":"4","pages":"103381","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ipm/TuarobSSNN23","doi":"10.1016/J.IPM.2023.103381","ee":"https://doi.org/10.1016/j.ipm.2023.103381","url":"https://dblp.org/rec/journals/ipm/TuarobSSNN23"}, "url":"URL#164909" }, { "@score":"4", "@id":"168152", "info":{"authors":{"author":[{"@pid":"90/1084","text":"Maxim Bakaev"},{"@pid":"132/0295","text":"Sebastian Heil"},{"@pid":"180/3089","text":"Vladimir Khvorostov"},{"@pid":"11/4107","text":"Martin Gaedke"}]},"title":"How Many Data Does Machine Learning in Human-Computer Interaction Need?: Re-Estimating the Dataset Size for Convolutional Neural Network-Based Models of Visual Perception.","venue":"IT Prof.","volume":"25","number":"2","pages":"23-29","year":"2023","type":"Journal Articles","access":"closed","key":"journals/itpro/BakaevHKG23","doi":"10.1109/MITP.2023.3262923","ee":"https://doi.org/10.1109/MITP.2023.3262923","url":"https://dblp.org/rec/journals/itpro/BakaevHKG23"}, "url":"URL#168152" }, { "@score":"3", "@id":"168973", "info":{"authors":{"author":[{"@pid":"239/2493","text":"Rahul Kumar Verma 0001"},{"@pid":"253/5763","text":"Shubhra Jain"}]},"title":"Energy and delay efficient data acquisition in wireless sensor networks by selecting optimal visiting points for mobile sink.","venue":"J. Ambient Intell. Humaniz. Comput.","volume":"14","number":"9","pages":"11671-11684","year":"2023","type":"Journal Articles","access":"closed","key":"journals/jaihc/0001J23","doi":"10.1007/S12652-022-03729-9","ee":"https://doi.org/10.1007/s12652-022-03729-9","url":"https://dblp.org/rec/journals/jaihc/0001J23"}, "url":"URL#168973" }, { "@score":"3", "@id":"169193", "info":{"authors":{"author":[{"@pid":"42/7439","text":"David Cortés-Polo"},{"@pid":"252/7881","text":"Luis-Ignacio Jimenez"},{"@pid":"178/1606","text":"Mercedes Eugenia Paoletti"},{"@pid":"180/3605","text":"Jesús Calle-Cancho"},{"@pid":"41/1939","text":"Juan A. Rico-Gallego"}]},"title":"Orthogonal projection for anomaly detection in networking datasets.","venue":"J. Ambient Intell. Humaniz. Comput.","volume":"14","number":"6","pages":"7957-7966","year":"2023","type":"Journal Articles","access":"open","key":"journals/jaihc/Cortes-PoloJPCR23","doi":"10.1007/S12652-023-04605-W","ee":"https://doi.org/10.1007/s12652-023-04605-w","url":"https://dblp.org/rec/journals/jaihc/Cortes-PoloJPCR23"}, "url":"URL#169193" }, { "@score":"3", "@id":"169207", "info":{"authors":{"author":[{"@pid":"299/2516","text":"Tran Cong Dao"},{"@pid":"163/5009","text":"Nguyen Thi Tam"},{"@pid":"353/4205","text":"Nguyen Quang Quy"},{"@pid":"91/1561","text":"Huynh Thi Thanh Binh"}]},"title":"An energy-efficient scheme for maximizing data aggregation tree lifetime in wireless sensor network.","venue":"J. Ambient Intell. Humaniz. Comput.","volume":"14","number":"9","pages":"12329-12344","year":"2023","type":"Journal Articles","access":"closed","key":"journals/jaihc/DaoTQB23","doi":"10.1007/S12652-023-04621-W","ee":"https://doi.org/10.1007/s12652-023-04621-w","url":"https://dblp.org/rec/journals/jaihc/DaoTQB23"}, "url":"URL#169207" }, { "@score":"3", "@id":"169335", "info":{"authors":{"author":[{"@pid":"83/6555","text":"Rishabh Gupta"},{"@pid":"212/9524","text":"Ishu Gupta"},{"@pid":"172/8855","text":"Deepika Saxena"},{"@pid":"94/3731-1","text":"Ashutosh Kumar Singh 0001"}]},"title":"A differential approach and deep neural network based data privacy-preserving model in cloud environment.","venue":"J. Ambient Intell. Humaniz. Comput.","volume":"14","number":"5","pages":"4659-4674","year":"2023","type":"Journal Articles","access":"closed","key":"journals/jaihc/GuptaGS023","doi":"10.1007/S12652-022-04367-X","ee":"https://doi.org/10.1007/s12652-022-04367-x","url":"https://dblp.org/rec/journals/jaihc/GuptaGS023"}, "url":"URL#169335" }, { "@score":"3", "@id":"169370", "info":{"authors":{"author":[{"@pid":"341/6245","text":"Sridevi Hosmani"},{"@pid":"338/4214","text":"Basavaraj Mathapati"}]},"title":"R2SCDT: robust and reliable secure clustering and data transmission in vehicular ad hoc network using weight evaluation.","venue":"J. Ambient Intell. Humaniz. Comput.","volume":"14","number":"3","pages":"2029-2046","year":"2023","type":"Journal Articles","access":"closed","key":"journals/jaihc/HosmaniM23","doi":"10.1007/S12652-021-03414-3","ee":"https://doi.org/10.1007/s12652-021-03414-3","url":"https://dblp.org/rec/journals/jaihc/HosmaniM23"}, "url":"URL#169370" }, { "@score":"3", "@id":"169465", "info":{"authors":{"author":[{"@pid":"245/5632","text":"Banafsj Khalifa"},{"@pid":"a/ZaherAlAghbari","text":"Zaher Al Aghbari"},{"@pid":"72/5176","text":"Ahmed M. Khedr"}]},"title":"CAPP: coverage aware topology adaptive path planning algorithm for data collection in wireless sensor networks.","venue":"J. Ambient Intell. Humaniz. Comput.","volume":"14","number":"4","pages":"4537-4549","year":"2023","type":"Journal Articles","access":"closed","key":"journals/jaihc/KhalifaAK23","doi":"10.1007/S12652-023-04574-0","ee":"https://doi.org/10.1007/s12652-023-04574-0","url":"https://dblp.org/rec/journals/jaihc/KhalifaAK23"}, "url":"URL#169465" }, { "@score":"3", "@id":"169768", "info":{"authors":{"author":[{"@pid":"304/7543","text":"V. Noel Jeygar Robert"},{"@pid":"183/5805","text":"K. Vidya"}]},"title":"Genetic algorithm optimized fuzzy decision system for efficient data transmission with deafness avoidance in multihop cognitive radio networks.","venue":"J. Ambient Intell. Humaniz. Comput.","volume":"14","number":"2","pages":"959-972","year":"2023","type":"Journal Articles","access":"closed","key":"journals/jaihc/RobertV23","doi":"10.1007/S12652-021-03349-9","ee":"https://doi.org/10.1007/s12652-021-03349-9","url":"https://dblp.org/rec/journals/jaihc/RobertV23"}, "url":"URL#169768" }, { "@score":"3", "@id":"170676", "info":{"authors":{"author":[{"@pid":"349/9053","text":"Peter Leese"},{"@pid":"323/8237","text":"Adit Anand"},{"@pid":"288/9560","text":"Andrew T. Girvin"},{"@pid":"288/9153","text":"Amin Manna"},{"@pid":"349/8996","text":"Saaya Patel"},{"@pid":"323/7627","text":"Yun Jae Yoo"},{"@pid":"322/5250","text":"Rachel Wong"},{"@pid":"38/2964","text":"Melissa A. Haendel"},{"@pid":"13/5552","text":"Christopher G. Chute"},{"@pid":"200/2204","text":"Tellen D. Bennett"},{"@pid":"60/6716","text":"Janos G. Hajagos"},{"@pid":"188/0573","text":"Emily R. Pfaff"},{"@pid":"14/109","text":"Richard A. Moffitt"}]},"title":"Clinical encounter heterogeneity and methods for resolving in networked EHR data: a study from N3C and RECOVER programs.","venue":"J. Am. Medical Informatics Assoc.","volume":"30","number":"6","pages":"1125-1136","year":"2023","type":"Journal Articles","access":"closed","key":"journals/jamia/LeeseAGMPYWHCBH23","doi":"10.1093/JAMIA/OCAD057","ee":"https://doi.org/10.1093/jamia/ocad057","url":"https://dblp.org/rec/journals/jamia/LeeseAGMPYWHCBH23"}, "url":"URL#170676" }, { "@score":"3", "@id":"171222", "info":{"authors":{"author":[{"@pid":"289/1752","text":"Marcel Aach"},{"@pid":"349/1445","text":"Eray Inanc"},{"@pid":"179/8360","text":"Rakesh Sarma"},{"@pid":"80/6331","text":"Morris Riedel"},{"@pid":"137/5547","text":"Andreas Lintermann"}]},"title":"Large scale performance analysis of distributed deep learning frameworks for convolutional neural networks.","venue":"J. Big Data","volume":"10","number":"1","pages":"96","year":"2023","type":"Journal Articles","access":"open","key":"journals/jbd/AachISRL23","doi":"10.1186/S40537-023-00765-W","ee":"https://doi.org/10.1186/s40537-023-00765-w","url":"https://dblp.org/rec/journals/jbd/AachISRL23"}, "url":"URL#171222" }, { "@score":"3", "@id":"171265", "info":{"authors":{"author":[{"@pid":"323/9793","text":"Deepak Choudhary"},{"@pid":"130/6184","text":"Roop Pahuja"}]},"title":"Awareness routing algorithm in vehicular ad-hoc networks (VANETs).","venue":"J. Big Data","volume":"10","number":"1","pages":"122","year":"2023","type":"Journal Articles","access":"open","key":"journals/jbd/ChoudharyP23","doi":"10.1186/S40537-023-00742-3","ee":"https://doi.org/10.1186/s40537-023-00742-3","url":"https://dblp.org/rec/journals/jbd/ChoudharyP23"}, "url":"URL#171265" }, { "@score":"3", "@id":"171267", "info":{"authors":{"author":[{"@pid":"325/6986","text":"Ashkan Dehghan"},{"@pid":"325/7014","text":"Kinga Siuta"},{"@pid":"325/7059","text":"Agata Skorupka"},{"@pid":"218/5474","text":"Akshat Dubey"},{"@pid":"325/6584","text":"Andrei Betlen"},{"@pid":"25/721","text":"David Miller"},{"@pid":"32/1213","text":"Wei Xu"},{"@pid":"10/7115","text":"Bogumil Kaminski"},{"@pid":"p/PawelPralat","text":"Pawel Pralat"}]},"title":"Detecting bots in social-networks using node and structural embeddings.","venue":"J. Big Data","volume":"10","number":"1","pages":"119","year":"2023","type":"Journal Articles","access":"open","key":"journals/jbd/DehghanSSDBMXKP23","doi":"10.1186/S40537-023-00796-3","ee":"https://doi.org/10.1186/s40537-023-00796-3","url":"https://dblp.org/rec/journals/jbd/DehghanSSDBMXKP23"}, "url":"URL#171267" }, { "@score":"3", "@id":"171297", "info":{"authors":{"author":[{"@pid":"24/1820","text":"Gang Hu"},{"@pid":"287/5200","text":"Guanglei Sheng"},{"@pid":"351/4929","text":"Wang Xiaofeng"},{"@pid":"177/6452","text":"Jinlin Jiang"}]},"title":"CCNNet: a novel lightweight convolutional neural network and its application in traditional Chinese medicine recognition.","venue":"J. Big Data","volume":"10","number":"1","pages":"114","year":"2023","type":"Journal Articles","access":"open","key":"journals/jbd/HuSXJ23","doi":"10.1186/S40537-023-00795-4","ee":"https://doi.org/10.1186/s40537-023-00795-4","url":"https://dblp.org/rec/journals/jbd/HuSXJ23"}, "url":"URL#171297" }, { "@score":"3", "@id":"171364", "info":{"authors":{"author":[{"@pid":"234/5864","text":"Salim Salmi"},{"@pid":"178/0945","text":"Lahcen Oughdir"}]},"title":"Performance evaluation of deep learning techniques for DoS attacks detection in wireless sensor network.","venue":"J. Big Data","volume":"10","number":"1","pages":"17","year":"2023","type":"Journal Articles","access":"open","key":"journals/jbd/SalmiO23","doi":"10.1186/S40537-023-00692-W","ee":"https://doi.org/10.1186/s40537-023-00692-w","url":"https://dblp.org/rec/journals/jbd/SalmiO23"}, "url":"URL#171364" }, { "@score":"5", "@id":"173130", "info":{"authors":{"author":[{"@pid":"154/3510","text":"Ayman Gaber"},{"@pid":"147/3681","text":"Nashwa Abdelbaki"},{"@pid":"340/7235","text":"Tamer Arafa"}]},"title":"Community Detection Applications in Mobile Networks: Towards Data-Driven Design for Next Generation Cellular Networks.","venue":"J. Commun. Inf. Networks","volume":"8","number":"1","pages":"155-163","year":"2023","type":"Journal Articles","access":"closed","key":"journals/jcin/GaberAA23","doi":"10.23919/JCIN.2023.10173731","ee":"https://doi.org/10.23919/jcin.2023.10173731","url":"https://dblp.org/rec/journals/jcin/GaberAA23"}, "url":"URL#173130" }, { "@score":"3", "@id":"174037", "info":{"authors":{"author":[{"@pid":"37/1915","text":"Yunfeng Duan"},{"@pid":"149/8490","text":"Chenxu Li"},{"@pid":"337/6542","text":"Guotao Bai"},{"@pid":"24/858","text":"Guo Chen"},{"@pid":"137/4178","text":"Fanqin Zhou"},{"@pid":"156/0087","text":"Jiaxing Chen"},{"@pid":"76/8637","text":"Zehua Gao"},{"@pid":"77/2866","text":"Chun Zhang"}]},"title":"MFGAD-INT: in-band network telemetry data-driven anomaly detection using multi-feature fusion graph deep learning.","venue":"J. Cloud Comput.","volume":"12","number":"1","pages":"126","year":"2023","type":"Journal Articles","access":"open","key":"journals/jcloudc/DuanLBCZCGZ23","doi":"10.1186/S13677-023-00492-W","ee":"https://doi.org/10.1186/s13677-023-00492-w","url":"https://dblp.org/rec/journals/jcloudc/DuanLBCZCGZ23"}, "url":"URL#174037" }, { "@score":"3", "@id":"174041", "info":{"authors":{"author":[{"@pid":"91/9453","text":"Weimin Gao"},{"@pid":"13/4208-1","text":"Jiawei Huang 0001"},{"@pid":"78/2545","text":"Zhaoyi Li"},{"@pid":"203/0809","text":"Shaojun Zou"},{"@pid":"75/2669-1","text":"Jianxin Wang 0001"}]},"title":"PDLB: Path Diversity-aware Load Balancing with adaptive granularity in data center networks.","venue":"J. Cloud Comput.","volume":"12","number":"1","pages":"173","year":"2023","type":"Journal Articles","access":"open","key":"journals/jcloudc/GaoHLZW23","doi":"10.1186/S13677-023-00548-X","ee":"https://doi.org/10.1186/s13677-023-00548-x","url":"https://dblp.org/rec/journals/jcloudc/GaoHLZW23"}, "url":"URL#174041" }, { "@score":"3", "@id":"174247", "info":{"authors":{"author":[{"@pid":"348/2212","text":"Trupti Shripad Tagare"},{"@pid":"348/2360","text":"Rajashree Narendra"}]},"title":"Confidentiality Enhancement Using Spread Spectrum Modulation Technique for Aggregated Data in Wireless Sensor Networks.","venue":"J. Commun.","volume":"18","number":"5","pages":"294-300","year":"2023","type":"Journal Articles","access":"closed","key":"journals/jcm/TagareN23","doi":"10.12720/JCM.18.5.294-300","ee":"https://doi.org/10.12720/jcm.18.5.294-300","url":"https://dblp.org/rec/journals/jcm/TagareN23"}, "url":"URL#174247" }, { "@score":"3", "@id":"174431", "info":{"authors":{"author":[{"@pid":"87/3340","text":"Wei Qi"},{"@pid":"234/0959","text":"Yiting Xu"},{"@pid":"326/4484","text":"Zongqian Gao"},{"@pid":"203/7743","text":"Zhiou Xu"},{"@pid":"27/8540","text":"Zhenzhen Huang"},{"@pid":"71/591","text":"Shuo Xiao"}]},"title":"Mobile chargers scheduling algorithm for maximum data flow in wireless sensor networks.","venue":"J. Comput. Methods Sci. Eng.","volume":"23","number":"3","pages":"1573-1587","year":"2023","type":"Journal Articles","access":"closed","key":"journals/jcmse/QiXGXHX23","doi":"10.3233/JCM-226667","ee":"https://doi.org/10.3233/JCM-226667","url":"https://dblp.org/rec/journals/jcmse/QiXGXHX23"}, "url":"URL#174431" }, { "@score":"3", "@id":"174537", "info":{"authors":{"author":[{"@pid":"57/7723","text":"Hongwu Zhang"},{"@pid":"69/6765","text":"Kai Kang"},{"@pid":"45/661","text":"Wei Bai"}]},"title":"Hierarchical network security situation awareness data fusion method in cloud computing environment.","venue":"J. Comput. Methods Sci. Eng.","volume":"23","number":"1","pages":"237-251","year":"2023","type":"Journal Articles","access":"closed","key":"journals/jcmse/ZhangKB23","doi":"10.3233/JCM-226542","ee":"https://doi.org/10.3233/JCM-226542","url":"https://dblp.org/rec/journals/jcmse/ZhangKB23"}, "url":"URL#174537" }, { "@score":"4", "@id":"174577", "info":{"authors":{"author":[{"@pid":"269/6934","text":"Zequn Jia"},{"@pid":"61/3234","text":"Qiang Liu"},{"@pid":"39/2405","text":"Ying He"},{"@pid":"123/7953","text":"Qianqian Wu"},{"@pid":"70/4241","text":"Ren Ping Liu"},{"@pid":"23/1882","text":"Yantao Sun"}]},"title":"Efficient end-to-end failure probing matrix construction in data center networks.","venue":"J. Commun. Networks","volume":"25","number":"4","pages":"532-543","year":"2023","type":"Journal Articles","access":"closed","key":"journals/jcn/JiaLHWLS23","doi":"10.23919/JCN.2023.000029","ee":"https://doi.org/10.23919/jcn.2023.000029","url":"https://dblp.org/rec/journals/jcn/JiaLHWLS23"}, "url":"URL#174577" }, { "@score":"3", "@id":"174617", "info":{"authors":{"author":[{"@pid":"142/2636","text":"G. S. Nagaraja"},{"@pid":"350/6786","text":"K. Vanishree"},{"@pid":"33/1910","text":"Farooque Azam"}]},"title":"Novel Framework for Secure Data Aggregation in Precision Agriculture with Extensive Energy Efficiency.","venue":"J. Comput. Networks Commun.","volume":"2023","pages":"5926294:1-5926294:11","year":"2023","type":"Journal Articles","access":"open","key":"journals/jcnc/NagarajaVA23","doi":"10.1155/2023/5926294","ee":"https://doi.org/10.1155/2023/5926294","url":"https://dblp.org/rec/journals/jcnc/NagarajaVA23"}, "url":"URL#174617" }, { "@score":"3", "@id":"174756", "info":{"authors":{"author":[{"@pid":"53/11044","text":"Wenyu Shi"},{"@pid":"17/2212","text":"Qiang Tang"}]},"title":"Cost-optimized data placement strategy for social network with security awareness in edge-cloud computing environment.","venue":"J. Comb. Optim.","volume":"45","number":"1","pages":"22","year":"2023","type":"Journal Articles","access":"closed","key":"journals/jco/ShiT23","doi":"10.1007/S10878-022-00934-2","ee":"https://doi.org/10.1007/s10878-022-00934-2","url":"https://dblp.org/rec/journals/jco/ShiT23"}, "url":"URL#174756" }, { "@score":"3", "@id":"175289", "info":{"authors":{"author":[{"@pid":"311/4436","text":"Lauren Partin"},{"@pid":"136/6728","text":"Gianluca Geraci"},{"@pid":"185/2672","text":"Ahmad A. Rushdi"},{"@pid":"149/2306","text":"Michael S. Eldred"},{"@pid":"142/9563","text":"Daniele E. Schiavazzi"}]},"title":"Multifidelity data fusion in convolutional encoder/decoder networks.","venue":"J. Comput. Phys.","volume":"472","pages":"111666","year":"2023","type":"Journal Articles","access":"closed","key":"journals/jcphy/PartinGRES23","doi":"10.1016/J.JCP.2022.111666","ee":"https://doi.org/10.1016/j.jcp.2022.111666","url":"https://dblp.org/rec/journals/jcphy/PartinGRES23"}, "url":"URL#175289" }, { "@score":"3", "@id":"175535", "info":{"authors":{"author":[{"@pid":"264/2104","text":"Matt Gorbett"},{"@pid":"363/2550","text":"Caspian Siebert"},{"@pid":"58/2807","text":"Hossein Shirazi"},{"@pid":"r/IndrakshiRay","text":"Indrakshi Ray"}]},"title":"The intrinsic dimensionality of network datasets and its applications.","venue":"J. Comput. Secur.","volume":"31","number":"6","pages":"679-704","year":"2023","type":"Journal Articles","access":"closed","key":"journals/jcs/GorbettSSR23","doi":"10.3233/JCS-220131","ee":"https://doi.org/10.3233/JCS-220131","url":"https://dblp.org/rec/journals/jcs/GorbettSSR23"}, "url":"URL#175535" }, { "@score":"3", "@id":"175947", "info":{"authors":{"author":[{"@pid":"24/6914","text":"Hong Zhang"},{"@pid":"87/3555","text":"Pei Li"}]},"title":"Research on Location Privacy Protection Technology in Wireless Sensor Networks Based on Big Data.","venue":"J. Cyber Secur. Mobil.","volume":"12","number":"6","pages":"845-868","year":"2023","type":"Journal Articles","access":"open","key":"journals/jcsm/ZhangL23a","doi":"10.13052/JCSM2245-1439.1262","ee":"https://doi.org/10.13052/jcsm2245-1439.1262","url":"https://dblp.org/rec/journals/jcsm/ZhangL23a"}, "url":"URL#175947" }, { "@score":"4", "@id":"176349", "info":{"authors":{"author":[{"@pid":"359/0304","text":"Filippo Bargagna"},{"@pid":"341/7847","text":"Lisa Anita De Santi"},{"@pid":"42/11221","text":"Nicola Martini"},{"@pid":"341/7278","text":"Dario Genovesi"},{"@pid":"359/0790","text":"Brunella Favilli"},{"@pid":"359/0742","text":"Giuseppe Vergaro"},{"@pid":"59/5751","text":"Michele Emdin"},{"@pid":"225/0739","text":"Assuero Giorgetti"},{"@pid":"13/2089","text":"Vincenzo Positano"},{"@pid":"83/3742","text":"Maria Filomena Santarelli"}]},"title":"Bayesian Convolutional Neural Networks in Medical Imaging Classification: A Promising Solution for Deep Learning Limits in Data Scarcity Scenarios.","venue":"J. Digit. Imaging","volume":"36","number":"6","pages":"2567-2577","year":"2023","type":"Journal Articles","access":"open","key":"journals/jdi/BargagnaSMGFVEGPS23","doi":"10.1007/S10278-023-00897-8","ee":"https://doi.org/10.1007/s10278-023-00897-8","url":"https://dblp.org/rec/journals/jdi/BargagnaSMGFVEGPS23"}, "url":"URL#176349" }, { "@score":"3", "@id":"176368", "info":{"authors":{"author":[{"@pid":"139/7105","text":"Yuyang Chen"},{"@pid":"119/6660","text":"Yiliang Wan"},{"@pid":"84/1769-7","text":"Feng Pan 0007"}]},"title":"Enhancing Multi-disease Diagnosis of Chest X-rays with Advanced Deep-learning Networks in Real-world Data.","venue":"J. Digit. Imaging","volume":"36","number":"4","pages":"1332-1347","year":"2023","type":"Journal Articles","access":"closed","key":"journals/jdi/ChenWP23","doi":"10.1007/S10278-023-00801-4","ee":"https://doi.org/10.1007/s10278-023-00801-4","url":"https://dblp.org/rec/journals/jdi/ChenWP23"}, "url":"URL#176368" }, { "@score":"3", "@id":"176548", "info":{"authors":{"author":[{"@pid":"55/3276","text":"Khaled Matrouk"},{"@pid":"09/5957","text":"V. Srikanth"},{"@pid":"01/6902","text":"Sumit Kumar"},{"@pid":"359/7157","text":"Mohit Kumar Bhadla"},{"@pid":"359/7475","text":"Mirza Sabirov"},{"@pid":"359/7288","text":"Mohamed J. Saadh"}]},"title":"Deep Learning-based Dynamic User Alignment in Social Networks.","venue":"ACM J. Data Inf. Qual.","volume":"15","number":"3","pages":"33:1-33:26","year":"2023","type":"Journal Articles","access":"closed","key":"journals/jdiq/MatroukSKBSS23","doi":"10.1145/3603711","ee":"https://doi.org/10.1145/3603711","url":"https://dblp.org/rec/journals/jdiq/MatroukSKBSS23"}, "url":"URL#176548" }, { "@score":"3", "@id":"176589", "info":{"authors":{"author":[{"@pid":"319/2314","text":"Mingyue Sun"},{"@pid":"231/3548","text":"Mingliang Yue"},{"@pid":"17/10726","text":"Tingcan Ma"}]},"title":"Differences between journal and conference in computer science: a bibliometric view based on Bayesian network.","venue":"J. Data Inf. Sci.","volume":"8","number":"3","pages":"47-60","year":"2023","type":"Journal Articles","access":"open","key":"journals/jdis/SunYM23","doi":"10.2478/JDIS-2023-0017","ee":"https://doi.org/10.2478/jdis-2023-0017","url":"https://dblp.org/rec/journals/jdis/SunYM23"}, "url":"URL#176589" }, { "@score":"4", "@id":"176640", "info":{"authors":{"author":[{"@pid":"255/2988","text":"Daniel Thilo Schroeder"},{"@pid":"269/3185","text":"Mirjam de Bruijn"},{"@pid":"345/8627","text":"Luca Bruls"},{"@pid":"345/8419","text":"Mulatu Alemayehu Moges"},{"@pid":"345/8515","text":"Samba Dialimpa Badji"},{"@pid":"345/8383","text":"Noémie Fritz"},{"@pid":"345/8672","text":"Modibo Galy Cisse"},{"@pid":"14/7938","text":"Johannes Langguth"},{"@pid":"345/8296","text":"Bruce Mutsvairo"},{"@pid":"345/8558","text":"Kristin Skare Orgeret"}]},"title":"Social media in the Global South: A Network Dataset of the Malian Twittersphere.","venue":"J. Data Min. Digit. Humanit.","volume":"2023","year":"2023","type":"Journal Articles","access":"open","key":"journals/jdmdh/SchroederBBMBFCLMO23","doi":"10.46298/JDMDH.11246","ee":"https://doi.org/10.46298/jdmdh.11246","url":"https://dblp.org/rec/journals/jdmdh/SchroederBBMBFCLMO23"}, "url":"URL#176640" }, { "@score":"3", "@id":"176741", "info":{"authors":{"author":[{"@pid":"70/2221","text":"Hui Guo"},{"@pid":"51/1964","text":"Zheng Guo"},{"@pid":"06/255","text":"Zhihong Liu"}]},"title":"Personalized Recommendation Model Based on Improved GRU Network in Big Data Environment.","venue":"J. Electr. Comput. Eng.","volume":"2023","pages":"3162220:1-3162220:9","year":"2023","type":"Journal Articles","access":"open","key":"journals/jece/GuoGL23","doi":"10.1155/2023/3162220","ee":"https://doi.org/10.1155/2023/3162220","url":"https://dblp.org/rec/journals/jece/GuoGL23"}, "url":"URL#176741" }, { "@score":"3", "@id":"176761", "info":{"authors":{"author":[{"@pid":"360/3314","text":"B. Ragavi"},{"@pid":"360/3175","text":"V. Baranidharan"},{"@pid":"244/6367","text":"K. Ramash Kumar"}]},"title":"A Novel Hybridized Cluster-Based Geographical Opportunistic Routing Protocol for Effective Data Routing in Underwater Wireless Sensor Networks.","venue":"J. Electr. Comput. Eng.","volume":"2023","pages":"5567483:1-5567483:17","year":"2023","type":"Journal Articles","access":"open","key":"journals/jece/RagaviBK23","doi":"10.1155/2023/5567483","ee":"https://doi.org/10.1155/2023/5567483","url":"https://dblp.org/rec/journals/jece/RagaviBK23"}, "url":"URL#176761" }, { "@score":"3", "@id":"176792", "info":{"title":"Retracted: Intrusion Detection-Data Security Protection Scheme Based on Particle Swarm-BP Network Algorithm in Cloud Computing Environment.","venue":"J. Electr. Comput. Eng.","volume":"2023","pages":"9853289:1-9853289:1","year":"2023","type":"Journal Articles","access":"open","key":"journals/jece/X23ak","doi":"10.1155/2023/9853289","ee":"https://doi.org/10.1155/2023/9853289","url":"https://dblp.org/rec/journals/jece/X23ak"}, "url":"URL#176792" }, { "@score":"3", "@id":"176822", "info":{"title":"Retracted: Application of Fast P2P Traffic Recognition Technology Based on Decision Tree in the Detection of Network Traffic Data.","venue":"J. Electr. Comput. Eng.","volume":"2023","pages":"9759365:1-9759365:1","year":"2023","type":"Journal Articles","access":"open","key":"journals/jece/X23t","doi":"10.1155/2023/9759365","ee":"https://doi.org/10.1155/2023/9759365","url":"https://dblp.org/rec/journals/jece/X23t"}, "url":"URL#176822" }, { "@score":"4", "@id":"178492", "info":{"authors":{"author":[{"@pid":"20/6534","text":"Lei Ma"},{"@pid":"14/6655","text":"Yanning Zhang"},{"@pid":"33/4151","text":"Vicente García-Díaz"}]},"title":"Design and implementation of a fast integration method for multi-source data in high-speed network.","venue":"J. High Speed Networks","volume":"29","number":"3","pages":"251-263","year":"2023","type":"Journal Articles","access":"closed","key":"journals/jhsn/MaZG23","doi":"10.3233/JHS-222047","ee":"https://doi.org/10.3233/JHS-222047","url":"https://dblp.org/rec/journals/jhsn/MaZG23"}, "url":"URL#178492" }, { "@score":"3", "@id":"178712", "info":{"authors":{"author":[{"@pid":"168/3231","text":"A. Baskar"},{"@pid":"81/7588","text":"A. Rajaram"}]},"title":"Deep optimization algorithm for emergency-aware data transmission in Mobile-Ad Hoc Networks.","venue":"J. Intell. Fuzzy Syst.","volume":"45","number":"6","pages":"10779-10797","year":"2023","type":"Journal Articles","access":"closed","key":"journals/jifs/BaskarR23","doi":"10.3233/JIFS-233425","ee":"https://doi.org/10.3233/jifs-233425","url":"https://dblp.org/rec/journals/jifs/BaskarR23"}, "url":"URL#178712" }, { "@score":"3", "@id":"178743", "info":{"authors":{"author":[{"@pid":"338/2868","text":"J. Carmalatta"},{"@pid":"241/0854","text":"S. Diwakaran"},{"@pid":"181/6306","text":"P. Uma Maheswari"},{"@pid":"286/4711","text":"S. Raja 0003"},{"@pid":"185/6168","text":"Y. Harold Robinson"},{"@pid":"50/8262","text":"Eanoch Golden Julie"},{"@pid":"231/1678","text":"Raghvendra Kumar 0001"},{"@pid":"20/9406","text":"Le Hoang Son"},{"@pid":"123/3386","text":"Chung Le"},{"@pid":"65/11079","text":"Nguyen Thanh Tung"},{"@pid":"34/5806","text":"Hoang Viet Long"}]},"title":"A neuro-fuzzy approach for multipoint data prediction in passive clustered wireless sensor networks.","venue":"J. Intell. Fuzzy Syst.","volume":"44","number":"1","pages":"1213-1228","year":"2023","type":"Journal Articles","access":"closed","key":"journals/jifs/CarmalattaDMRRJ23","doi":"10.3233/JIFS-212214","ee":"https://doi.org/10.3233/JIFS-212214","url":"https://dblp.org/rec/journals/jifs/CarmalattaDMRRJ23"}, "url":"URL#178743" }, { "@score":"3", "@id":"179183", "info":{"authors":{"author":[{"@pid":"56/8329","text":"G. Lavanya"},{"@pid":"342/9377","text":"B. L. Velammal"},{"@pid":"320/4774","text":"K. Kulothungan"}]},"title":"SCDAP -secured cluster based data aggregation protocol for energy efficient communication in wireless sensor networks.","venue":"J. Intell. Fuzzy Syst.","volume":"44","number":"3","pages":"4747-4757","year":"2023","type":"Journal Articles","access":"closed","key":"journals/jifs/LavanyaVK23","doi":"10.3233/JIFS-223256","ee":"https://doi.org/10.3233/JIFS-223256","url":"https://dblp.org/rec/journals/jifs/LavanyaVK23"}, "url":"URL#179183" }, { "@score":"3", "@id":"179512", "info":{"authors":{"author":[{"@pid":"271/6479","text":"Dennison Rajesh"},{"@pid":"338/2380","text":"G. S. Rajanna"}]},"title":"Energy aware data harvesting strategy based on optimal node selection for extended network lifecycle in smart dust.","venue":"J. Intell. Fuzzy Syst.","volume":"44","number":"1","pages":"939-949","year":"2023","type":"Journal Articles","access":"closed","key":"journals/jifs/RajeshR23","doi":"10.3233/JIFS-221719","ee":"https://doi.org/10.3233/JIFS-221719","url":"https://dblp.org/rec/journals/jifs/RajeshR23"}, "url":"URL#179512" }, { "@score":"3", "@id":"179645", "info":{"authors":{"author":[{"@pid":"225/1733","text":"Santosh Soni"},{"@pid":"24/4546","text":"Pankaj Chandra"},{"@pid":"370/7230","text":"Devendra Kumar Singh"},{"@pid":"259/2436","text":"Prakash Chandra Sharma"},{"@pid":"34/3798","text":"Dinesh Kumar Saini"}]},"title":"A new mobile data collection and mobile charging (MDCMC) algorithm based on reinforcement learning in rechargeable wireless sensor network.","venue":"J. Intell. Fuzzy Syst.","volume":"45","number":"4","pages":"7083-7093","year":"2023","type":"Journal Articles","access":"closed","key":"journals/jifs/SoniCSSS23","doi":"10.3233/JIFS-224473","ee":"https://doi.org/10.3233/jifs-224473","url":"https://dblp.org/rec/journals/jifs/SoniCSSS23"}, "url":"URL#179645" }, { "@score":"3", "@id":"179759", "info":{"authors":{"author":[{"@pid":"285/2241","text":"D. Vinodha"},{"@pid":"87/7255","text":"E. A. Mary Anita"}]},"title":"Integrity assured multi-functional multi-application secure data aggregation in wireless sensor networks (IAMFMA-SDA).","venue":"J. Intell. Fuzzy Syst.","volume":"45","number":"1","pages":"1453-1472","year":"2023","type":"Journal Articles","access":"closed","key":"journals/jifs/VinodhaA23","doi":"10.3233/JIFS-223511","ee":"https://doi.org/10.3233/JIFS-223511","url":"https://dblp.org/rec/journals/jifs/VinodhaA23"}, "url":"URL#179759" }, { "@score":"4", "@id":"179871", "info":{"title":"Erratum to: A new approach for data augmentation in a deep neural network to implement a monitoring system for detecting prostate cancer in MRI images.","venue":"J. Intell. Fuzzy Syst.","volume":"44","number":"3","pages":"5519","year":"2023","type":"Journal Articles","access":"closed","key":"journals/jifs/X23","doi":"10.3233/JIFS-219325","ee":"https://doi.org/10.3233/JIFS-219325","url":"https://dblp.org/rec/journals/jifs/X23"}, "url":"URL#179871" }, { "@score":"3", "@id":"180532", "info":{"authors":{"author":[{"@pid":"353/2960","text":"Jixiang Tang"},{"@pid":"78/6138","text":"Huan Zhou"},{"@pid":"353/3143","text":"Tiankui Wang"},{"@pid":"353/3064","text":"Zhenxun Jin"},{"@pid":"353/3229","text":"Youli Wang"},{"@pid":"25/8040","text":"Xuanyin Wang"}]},"title":"Cascaded foreign object detection in manufacturing processes using convolutional neural networks and synthetic data generation methodology.","venue":"J. Intell. Manuf.","volume":"34","number":"7","pages":"2925-2941","year":"2023","type":"Journal Articles","access":"closed","key":"journals/jim/TangZWJWW23","doi":"10.1007/S10845-022-01976-3","ee":"https://doi.org/10.1007/s10845-022-01976-3","url":"https://dblp.org/rec/journals/jim/TangZWJWW23"}, "url":"URL#180532" }, { "@score":"3", "@id":"181012", "info":{"authors":{"author":{"@pid":"83/5522","text":"Hong Wang"}},"title":"A Network Intrusion Security Detection Method Using BiLSTM-CNN in Big Data Environment.","venue":"J. Inf. Process. Syst.","volume":"19","number":"5","pages":"688-701","year":"2023","type":"Journal Articles","access":"open","key":"journals/jips/Wang23","doi":"10.3745/JIPS.01.0097","ee":"https://doi.org/10.3745/JIPS.01.0097","url":"https://dblp.org/rec/journals/jips/Wang23"}, "url":"URL#181012" }, { "@score":"3", "@id":"181202", "info":{"authors":{"author":[{"@pid":"269/5442","text":"Xingmao Shao"},{"@pid":"95/6042","text":"Lun Xie"},{"@pid":"318/8488","text":"Chiqin Li"},{"@pid":"58/5311","text":"Zhiliang Wang"}]},"title":"A Study on Networked Industrial Robots in Smart Manufacturing: Vulnerabilities, Data Integrity Attacks and Countermeasures.","venue":"J. Intell. Robotic Syst.","volume":"109","number":"3","pages":"60","year":"2023","type":"Journal Articles","access":"closed","key":"journals/jirs/ShaoXLW23","doi":"10.1007/S10846-023-01984-2","ee":"https://doi.org/10.1007/s10846-023-01984-2","url":"https://dblp.org/rec/journals/jirs/ShaoXLW23"}, "url":"URL#181202" }, { "@score":"3", "@id":"181376", "info":{"authors":{"author":[{"@pid":"239/6872","text":"Javan Ataide De Oliveira Junior"},{"@pid":"191/8140","text":"Edson Tavares de Camargo"},{"@pid":"07/559","text":"Márcio Seiji Oyamada"}]},"title":"Data Compression in LoRa Networks: A Compromise between Performance and Energy Consumption.","venue":"J. Internet Serv. Appl.","volume":"14","number":"1","pages":"95-106","year":"2023","type":"Journal Articles","access":"open","key":"journals/jisa/JuniorCO23","doi":"10.5753/JISA.2023.3000","ee":"https://doi.org/10.5753/jisa.2023.3000","url":"https://dblp.org/rec/journals/jisa/JuniorCO23"}, "url":"URL#181376" }, { "@score":"4", "@id":"181480", "info":{"authors":{"author":{"@pid":"362/2351","text":"Varshavardhini S"}},"title":"An Efficient Feature Subset Selection with Fuzzy Wavelet Neural Network for Data Mining in Big Data Environment.","venue":"J. Internet Serv. Inf. Secur.","volume":"13","number":"2","pages":"233-248","year":"2023","type":"Journal Articles","access":"closed","key":"journals/jisis/S23","doi":"10.58346/JISIS.2023.I2.015","ee":"https://doi.org/10.58346/jisis.2023.i2.015","url":"https://dblp.org/rec/journals/jisis/S23"}, "url":"URL#181480" }, { "@score":"3", "@id":"181986", "info":{"authors":{"author":[{"@pid":"219/4731","text":"Ridha Muldina Negara"},{"@pid":"227/1741","text":"Nana Rachmana Syambas"},{"@pid":"60/4723","text":"Eueung Mulyana"}]},"title":"C3CPS: CRITIC-CoCoSo-based caching placement strategy using multi-criteria decision method for efficient content distribution in Named Data Networking.","venue":"J. King Saud Univ. Comput. Inf. Sci.","volume":"35","number":"9","pages":"101714","year":"2023","type":"Journal Articles","access":"closed","key":"journals/jksucis/NegaraSM23","doi":"10.1016/J.JKSUCI.2023.101714","ee":"https://doi.org/10.1016/j.jksuci.2023.101714","url":"https://dblp.org/rec/journals/jksucis/NegaraSM23"}, "url":"URL#181986" }, { "@score":"3", "@id":"182138", "info":{"authors":{"author":[{"@pid":"181/2852","text":"Wei Zhao"},{"@pid":"236/4121","text":"Meini Wang"},{"@pid":"356/4589","text":"Rebaz Othman Yahya"}]},"title":"Data traffic reduction for D2D communications in 5G networks using a multilink approach.","venue":"J. King Saud Univ. Comput. Inf. Sci.","volume":"35","number":"9","pages":"101759","year":"2023","type":"Journal Articles","access":"closed","key":"journals/jksucis/ZhaoWY23","doi":"10.1016/J.JKSUCI.2023.101759","ee":"https://doi.org/10.1016/j.jksuci.2023.101759","url":"https://dblp.org/rec/journals/jksucis/ZhaoWY23"}, "url":"URL#182138" }, { "@score":"3", "@id":"182208", "info":{"authors":{"author":[{"@pid":"304/9803","text":"Nadjet Azzaoui"},{"@pid":"33/667","text":"Ahmed Korichi"},{"@pid":"133/4736","text":"Bouziane Brik"},{"@pid":"213/0647","text":"Hanane Amirat"}]},"title":"A survey on data dissemination in internet of vehicles networks.","venue":"J. Locat. Based Serv.","volume":"17","number":"3","pages":"207-250","year":"2023","type":"Journal Articles","access":"closed","key":"journals/jlbs/AzzaouiKBA23","doi":"10.1080/17489725.2022.2151658","ee":"https://doi.org/10.1080/17489725.2022.2151658","url":"https://dblp.org/rec/journals/jlbs/AzzaouiKBA23"}, "url":"URL#182208" }, { "@score":"3", "@id":"182659", "info":{"authors":{"author":[{"@pid":"342/9362","text":"Oleksandr Striuk"},{"@pid":"89/10476","text":"Yuriy P. Kondratenko"}]},"title":"Implementation of Generative Adversarial Networks in Mobile Applications for Image Data Enhancement.","venue":"J. Mobile Multimedia","volume":"19","number":"3","pages":"823-838","year":"2023","type":"Journal Articles","access":"closed","key":"journals/jmm/StriukK23","doi":"10.13052/JMM1550-4646.1938","ee":"https://doi.org/10.13052/jmm1550-4646.1938","url":"https://dblp.org/rec/journals/jmm/StriukK23"}, "url":"URL#182659" }, { "@score":"3", "@id":"182894", "info":{"authors":{"author":[{"@pid":"92/1375-1","text":"Jin Wang 0001"},{"@pid":"353/3739","text":"Shuying Rao"},{"@pid":"91/112","text":"Ying Liu"},{"@pid":"197/7243","text":"Pradip Kumar Sharma"},{"@pid":"116/0938","text":"Jinbin Hu"}]},"title":"Load balancing for heterogeneous traffic in datacenter networks.","venue":"J. Netw. Comput. Appl.","volume":"217","pages":"103692","year":"2023","type":"Journal Articles","access":"closed","key":"journals/jnca/0001RLSH23","doi":"10.1016/J.JNCA.2023.103692","ee":"https://doi.org/10.1016/j.jnca.2023.103692","url":"https://dblp.org/rec/journals/jnca/0001RLSH23"}, "url":"URL#182894" }, { "@score":"3", "@id":"182901", "info":{"authors":{"author":[{"@pid":"186/8834","text":"Lamia Alkwai"},{"@pid":"90/1753","text":"Abdelfettah Belghith"},{"@pid":"50/152","text":"Achraf Gazdar"},{"@pid":"146/6941","text":"Saad Al-Ahmadi 0002"}]},"title":"Awareness of user mobility in Named Data Networking for IoT traffic under the push communication mode.","venue":"J. Netw. Comput. Appl.","volume":"213","pages":"103598","year":"2023","type":"Journal Articles","access":"closed","key":"journals/jnca/AlkwaiBGA23","doi":"10.1016/J.JNCA.2023.103598","ee":"https://doi.org/10.1016/j.jnca.2023.103598","url":"https://dblp.org/rec/journals/jnca/AlkwaiBGA23"}, "url":"URL#182901" }, { "@score":"3", "@id":"182946", "info":{"authors":{"author":[{"@pid":"360/4198","text":"Mebanjop Kharjana"},{"@pid":"252/9136","text":"Fabiola Hazel Pohrmen"},{"@pid":"234/6618","text":"Subhas Chandra Sahana"},{"@pid":"63/4931-2","text":"Goutam Saha 0002"}]},"title":"Blockchain-based key management system in Named Data Networking: A survey.","venue":"J. Netw. Comput. Appl.","volume":"220","pages":"103732","year":"2023","type":"Journal Articles","access":"closed","key":"journals/jnca/KharjanaPSS23","doi":"10.1016/J.JNCA.2023.103732","ee":"https://doi.org/10.1016/j.jnca.2023.103732","url":"https://dblp.org/rec/journals/jnca/KharjanaPSS23"}, "url":"URL#182946" }, { "@score":"3", "@id":"182960", "info":{"authors":{"author":[{"@pid":"243/1031","text":"Hidaya Liazid"},{"@pid":"50/8093","text":"Mohamed Lehsaini"},{"@pid":"243/1029","text":"Abdelkrim Liazid"}]},"title":"Data transmission reduction using prediction and aggregation techniques in IoT-based wireless sensor networks.","venue":"J. Netw. Comput. Appl.","volume":"211","pages":"103556","year":"2023","type":"Journal Articles","access":"closed","key":"journals/jnca/LiazidLL23","doi":"10.1016/J.JNCA.2022.103556","ee":"https://doi.org/10.1016/j.jnca.2022.103556","url":"https://dblp.org/rec/journals/jnca/LiazidLL23"}, "url":"URL#182960" }, { "@score":"3", "@id":"182964", "info":{"authors":{"author":[{"@pid":"49/10388","text":"Huihui Ma"},{"@pid":"65/95","text":"Du Xu"}]},"title":"An INT-based TCP window modulator for congestion control in data center networks.","venue":"J. Netw. Comput. Appl.","volume":"217","pages":"103688","year":"2023","type":"Journal Articles","access":"closed","key":"journals/jnca/MaX23","doi":"10.1016/J.JNCA.2023.103688","ee":"https://doi.org/10.1016/j.jnca.2023.103688","url":"https://dblp.org/rec/journals/jnca/MaX23"}, "url":"URL#182964" }, { "@score":"3", "@id":"182971", "info":{"authors":{"author":[{"@pid":"334/2674","text":"Mahbubun Nahar"},{"@pid":"177/2133","text":"A. H. M. Kamal"},{"@pid":"34/8695","text":"Gahangir Hossain"}]},"title":"Protecting health data in the cloud through steganography: A table-driven, blind method using neural networks and bit-shuffling algorithm.","venue":"J. Netw. Comput. Appl.","volume":"217","pages":"103689","year":"2023","type":"Journal Articles","access":"closed","key":"journals/jnca/NaharKH23","doi":"10.1016/J.JNCA.2023.103689","ee":"https://doi.org/10.1016/j.jnca.2023.103689","url":"https://dblp.org/rec/journals/jnca/NaharKH23"}, "url":"URL#182971" }, { "@score":"3", "@id":"182983", "info":{"authors":{"author":[{"@pid":"98/2482","text":"Hua Qin"},{"@pid":"35/966","text":"Weimin Chen"},{"@pid":"40/640","text":"Ni Li"},{"@pid":"12/5838","text":"Tao Wang"},{"@pid":"175/3324","text":"Hao Chen"},{"@pid":"83/6700","text":"Gelan Yang"},{"@pid":"58/2119","text":"Yang Peng"}]},"title":"CPS: Cross-interface network Partitioning and Scheduling towards QoS-aware data flow delivery in multimedia IoT.","venue":"J. Netw. Comput. Appl.","volume":"217","pages":"103698","year":"2023","type":"Journal Articles","access":"closed","key":"journals/jnca/QinCLWCYP23","doi":"10.1016/J.JNCA.2023.103698","ee":"https://doi.org/10.1016/j.jnca.2023.103698","url":"https://dblp.org/rec/journals/jnca/QinCLWCYP23"}, "url":"URL#182983" }, { "@score":"3", "@id":"183167", "info":{"authors":{"author":[{"@pid":"13/2692-4","text":"Bing Li 0004"},{"@pid":"74/1079","text":"Maode Ma"}]},"title":"An Advanced Hierarchical Identity-Based Security Mechanism by Blockchain in Named Data Networking.","venue":"J. Netw. Syst. Manag.","volume":"31","number":"1","pages":"13","year":"2023","type":"Journal Articles","access":"open","key":"journals/jnsm/0004M23","doi":"10.1007/S10922-022-09689-X","ee":"https://doi.org/10.1007/s10922-022-09689-x","url":"https://dblp.org/rec/journals/jnsm/0004M23"}, "url":"URL#183167" }, { "@score":"3", "@id":"183180", "info":{"authors":{"author":[{"@pid":"64/1813","text":"Jen-Jee Chen"},{"@pid":"64/4171","text":"Ryo Yamamoto"},{"@pid":"11/5437","text":"Kyungbaek Kim"},{"@pid":"52/2437","text":"Jiun-Long Huang"},{"@pid":"04/3775","text":"Kazuhiko Kinoshita"},{"@pid":"14/6450","text":"Woojin Seok"},{"@pid":"99/3776","text":"Li-Hsing Yen"}]},"title":"Networking Data and Intelligent Management in the Post-COVID19 Era: A Report on APNOMS 2021.","venue":"J. Netw. Syst. Manag.","volume":"31","number":"2","pages":"31","year":"2023","type":"Journal Articles","access":"closed","key":"journals/jnsm/ChenYKHKSY23","doi":"10.1007/S10922-023-09724-5","ee":"https://doi.org/10.1007/s10922-023-09724-5","url":"https://dblp.org/rec/journals/jnsm/ChenYKHKSY23"}, "url":"URL#183180" }, { "@score":"3", "@id":"183194", "info":{"authors":{"author":[{"@pid":"224/6851","text":"Vinicius Fulber Garcia"},{"@pid":"140/8276","text":"Marcelo Caggiani Luizelli"},{"@pid":"64/6563","text":"Carlos Raniery Paula dos Santos"},{"@pid":"s/EJSpinosa","text":"Eduardo Jaques Spinosa"},{"@pid":"02/3940","text":"Elias P. Duarte"}]},"title":"Customizable Mapping of Virtualized Network Services in Multi-datacenter Environments Based on Genetic Metaheuristics.","venue":"J. Netw. Syst. Manag.","volume":"31","number":"4","pages":"71","year":"2023","type":"Journal Articles","access":"closed","key":"journals/jnsm/GarciaLSSD23","doi":"10.1007/S10922-023-09760-1","ee":"https://doi.org/10.1007/s10922-023-09760-1","url":"https://dblp.org/rec/journals/jnsm/GarciaLSSD23"}, "url":"URL#183194" }, { "@score":"3", "@id":"183210", "info":{"authors":{"author":[{"@pid":"61/7017","text":"Mahdi Jemmali"},{"@pid":"71/8433","text":"Abir Ben Hmida"},{"@pid":"203/5721","text":"Akram Y. Sarhan"}]},"title":"A Novel Two-Routers Model Based on Category Constraints Secure Data-Dissemination-Aware Scheduling in Next-Generation Communication Networks.","venue":"J. Netw. Syst. Manag.","volume":"31","number":"3","pages":"59","year":"2023","type":"Journal Articles","access":"closed","key":"journals/jnsm/JemmaliHS23","doi":"10.1007/S10922-023-09747-Y","ee":"https://doi.org/10.1007/s10922-023-09747-y","url":"https://dblp.org/rec/journals/jnsm/JemmaliHS23"}, "url":"URL#183210" }, { "@score":"3", "@id":"183530", "info":{"authors":{"author":[{"@pid":"10/239-4","text":"Jiawei Zhang 0004"},{"@pid":"29/6497","text":"Zhuo Chen"},{"@pid":"247/5223","text":"Bojun Zhang"},{"@pid":"239/8920","text":"Ruikun Wang"},{"@pid":"318/3375","text":"Huangxu Ma"},{"@pid":"82/383","text":"Yuefeng Ji"}]},"title":"ADMIRE: collaborative data-driven and model-driven intelligent routing engine for traffic grooming in multi-layer X-Haul networks.","venue":"JOCN","volume":"15","number":"2","pages":"A63-A73","year":"2023","type":"Journal Articles","access":"closed","key":"journals/jocnet/0004CZWMJ22","doi":"10.1364/JOCN.470690","ee":"https://doi.org/10.1364/jocn.470690","url":"https://dblp.org/rec/journals/jocnet/0004CZWMJ22"}, "url":"URL#183530" }, { "@score":"3", "@id":"183561", "info":{"authors":{"author":[{"@pid":"06/2917","text":"Yan He"},{"@pid":"348/2470","text":"Zhiqun Zhai"},{"@pid":"10/10585","text":"Liang Dou"},{"@pid":"59/251","text":"Lingling Wang"},{"@pid":"245/2745","text":"Yaxi Yan"},{"@pid":"60/7397","text":"Chongjin Xie"},{"@pid":"57/6192-1","text":"Chao Lu 0001"},{"@pid":"50/4813","text":"Alan Pak Tao Lau"}]},"title":"Improved QoT estimations through refined signal power measurements and data-driven parameter optimizations in a disaggregated and partially loaded live production network.","venue":"JOCN","volume":"15","number":"9","pages":"638-648","year":"2023","type":"Journal Articles","access":"closed","key":"journals/jocnet/HeZDWYX0L23","doi":"10.1364/JOCN.496720","ee":"https://doi.org/10.1364/jocn.496720","url":"https://dblp.org/rec/journals/jocnet/HeZDWYX0L23"}, "url":"URL#183561" }, { "@score":"4", "@id":"183577", "info":{"authors":{"author":[{"@pid":"308/5993","text":"Lareb Zar Khan"},{"@pid":"250/2594","text":"João Pedro 0001"},{"@pid":"14/7379","text":"Nelson Costa"},{"@pid":"255/8335","text":"Lorenzo De Marinis"},{"@pid":"147/2373","text":"Antonio Napoli"},{"@pid":"71/8970","text":"Nicola Sambo"}]},"title":"Data augmentation to improve performance of neural networks for failure management in optical networks.","venue":"JOCN","volume":"15","number":"1","pages":"57-67","year":"2023","type":"Journal Articles","access":"closed","key":"journals/jocnet/Khan0CMNS22","doi":"10.1364/JOCN.472605","ee":"https://doi.org/10.1364/jocn.472605","url":"https://dblp.org/rec/journals/jocnet/Khan0CMNS22"}, "url":"URL#183577" }, { "@score":"4", "@id":"183619", "info":{"authors":{"author":[{"@pid":"260/6774","text":"Zacharaya Shabka"},{"@pid":"86/4806","text":"Georgios Zervas"}]},"title":"Network-aware compute and memory allocation in optically composable data centers with deep reinforcement learning and graph neural networks.","venue":"JOCN","volume":"15","number":"2","pages":"133-143","year":"2023","type":"Journal Articles","access":"closed","key":"journals/jocnet/ShabkaZ22","doi":"10.1364/JOCN.478944","ee":"https://doi.org/10.1364/jocn.478944","url":"https://dblp.org/rec/journals/jocnet/ShabkaZ22"}, "url":"URL#183619" }, { "@score":"4", "@id":"183647", "info":{"authors":{"author":[{"@pid":"348/8198","text":"Chuidian Zeng"},{"@pid":"10/239-4","text":"Jiawei Zhang 0004"},{"@pid":"239/8920","text":"Ruikun Wang"},{"@pid":"247/5223","text":"Bojun Zhang"},{"@pid":"82/383","text":"Yuefeng Ji"}]},"title":"Multiple attention mechanisms-driven component fault location in optical networks with network-wide monitoring data.","venue":"J. Opt. Commun. Netw.","volume":"15","number":"7","pages":"C9-C19","year":"2023","type":"Journal Articles","access":"closed","key":"journals/jocnet/ZengZWZJ23","doi":"10.1364/JOCN.481084","ee":"https://doi.org/10.1364/jocn.481084","url":"https://dblp.org/rec/journals/jocnet/ZengZWZJ23"}, "url":"URL#183647" }, { "@score":"5", "@id":"184091", "info":{"authors":{"author":[{"@pid":"350/2985","text":"Shreedhar Yadawad"},{"@pid":"65/4653","text":"S. M. Joshi"}]},"title":"Energy-Efficient Data Aggregation and Cluster-Based Routing in Wireless Sensor Networks Using Tasmanian Fully Recurrent Deep Learning Network with Pelican Variable Marine Predators Algorithm.","venue":"J. Interconnect. Networks","volume":"23","number":"4","pages":"2350005:1-2350005:21","year":"2023","type":"Journal Articles","access":"closed","key":"journals/join/YadawadJ23","doi":"10.1142/S0219265923500056","ee":"https://doi.org/10.1142/S0219265923500056","url":"https://dblp.org/rec/journals/join/YadawadJ23"}, "url":"URL#184091" }, { "@score":"3", "@id":"184302", "info":{"authors":{"author":[{"@pid":"133/0200","text":"Dariush Khezrimotlagh"},{"@pid":"18/4173","text":"Joe Zhu"}]},"title":"The role of unobserved units in two-stage network data envelopment analysis.","venue":"J. Oper. Res. Soc.","volume":"74","number":"5","pages":"1275-1285","year":"2023","type":"Journal Articles","access":"closed","key":"journals/jors/KhezrimotlaghZ23","doi":"10.1080/01605682.2022.2077663","ee":"https://doi.org/10.1080/01605682.2022.2077663","url":"https://dblp.org/rec/journals/jors/KhezrimotlaghZ23"}, "url":"URL#184302" }, { "@score":"4", "@id":"185241", "info":{"authors":{"author":[{"@pid":"89/5503-9","text":"Yi Ding 0009"},{"@pid":"96/2042","text":"Weiwei Fang"},{"@pid":"186/2606","text":"Mengran Liu"},{"@pid":"93/6765","text":"Meng Wang"},{"@pid":"281/3329","text":"Yusong Cheng"},{"@pid":"x/NaixueXiong","text":"Naixue Xiong"}]},"title":"JMDC: A joint model and data compression system for deep neural networks collaborative computing in edge-cloud networks.","venue":"J. Parallel Distributed Comput.","volume":"173","pages":"83-93","year":"2023","type":"Journal Articles","access":"closed","key":"journals/jpdc/DingFLWCX23","doi":"10.1016/J.JPDC.2022.11.008","ee":"https://doi.org/10.1016/j.jpdc.2022.11.008","url":"https://dblp.org/rec/journals/jpdc/DingFLWCX23"}, "url":"URL#185241" }, { "@score":"3", "@id":"185242", "info":{"authors":{"author":[{"@pid":"50/5076","text":"Hui Dong"},{"@pid":"233/8560","text":"Mengjie Lv"},{"@pid":"73/4432","text":"Huaqun Wang"},{"@pid":"202/3794","text":"Weibei Fan"}]},"title":"Fault-tolerant unicast using conditional local safe model in the data center network BCube.","venue":"J. Parallel Distributed Comput.","volume":"181","pages":"104732","year":"2023","type":"Journal Articles","access":"closed","key":"journals/jpdc/DongLWF23","doi":"10.1016/J.JPDC.2023.104732","ee":"https://doi.org/10.1016/j.jpdc.2023.104732","url":"https://dblp.org/rec/journals/jpdc/DongLWF23"}, "url":"URL#185242" }, { "@score":"3", "@id":"185808", "info":{"authors":{"author":[{"@pid":"249/1789","text":"Matthias Villads Hinsch Als"},{"@pid":"249/1791","text":"Mathias Bejlegaard Madsen"},{"@pid":"20/7407","text":"Rune Møller Jensen"}]},"title":"A data-driven bi-objective matheuristic for energy-optimising timetables in a passenger railway network.","venue":"J. Rail Transp. Plan. Manag.","volume":"26","pages":"100374","year":"2023","type":"Journal Articles","access":"open","key":"journals/jrtpm/AlsMJ23","doi":"10.1016/J.JRTPM.2023.100374","ee":"https://doi.org/10.1016/j.jrtpm.2023.100374","url":"https://dblp.org/rec/journals/jrtpm/AlsMJ23"}, "url":"URL#185808" }, { "@score":"4", "@id":"186374", "info":{"authors":{"author":{"@pid":"98/14","text":"Rola Naja"}},"title":"Safe Data-Driven Lane Change Decision Using Machine Learning in Vehicular Networks.","venue":"J. Sens. Actuator Networks","volume":"12","number":"4","pages":"59","year":"2023","type":"Journal Articles","access":"open","key":"journals/jsan/Naja23","doi":"10.3390/JSAN12040059","ee":"https://doi.org/10.3390/jsan12040059","url":"https://dblp.org/rec/journals/jsan/Naja23"}, "url":"URL#186374" }, { "@score":"3", "@id":"187647", "info":{"authors":{"author":[{"@pid":"29/9167","text":"Ye Hu"},{"@pid":"07/1021-1","text":"Xiaodong Wang 0001"},{"@pid":"41/6237","text":"Walid Saad"}]},"title":"Distributed and Distribution-Robust Meta Reinforcement Learning (D${2}$-RMRL) for Data Pre-Storage and Routing in Cube Satellite Networks.","venue":"IEEE J. Sel. Top. Signal Process.","volume":"17","number":"1","pages":"128-141","year":"2023","type":"Journal Articles","access":"closed","key":"journals/jstsp/HuWS23","doi":"10.1109/JSTSP.2022.3232944","ee":"https://doi.org/10.1109/JSTSP.2022.3232944","url":"https://dblp.org/rec/journals/jstsp/HuWS23"}, "url":"URL#187647" }, { "@score":"3", "@id":"187692", "info":{"authors":{"author":[{"@pid":"46/8455","text":"Dezhi Wang"},{"@pid":"35/7092-21","text":"Wei Wang 0021"},{"@pid":"245/7823","text":"Yuhan Kang"},{"@pid":"83/514","text":"Zhu Han 0001"}]},"title":"Distributed Data Offloading in Ultra-Dense LEO Satellite Networks: A Stackelberg Mean-Field Game Approach.","venue":"IEEE J. Sel. Top. Signal Process.","volume":"17","number":"1","pages":"112-127","year":"2023","type":"Journal Articles","access":"closed","key":"journals/jstsp/WangWKH23","doi":"10.1109/JSTSP.2022.3226400","ee":"https://doi.org/10.1109/JSTSP.2022.3226400","url":"https://dblp.org/rec/journals/jstsp/WangWKH23"}, "url":"URL#187692" }, { "@score":"3", "@id":"187974", "info":{"authors":{"author":[{"@pid":"363/9330","text":"Vilho Halonen"},{"@pid":"136/8021","text":"Ilkka Pölönen"}]},"title":"Quantification of Errors Generated by Uncertain Data in a Linear Boundary Value Problem Using Neural Networks.","venue":"SIAM/ASA J. Uncertain. Quantification","volume":"11","number":"4","pages":"1258-1277","year":"2023","type":"Journal Articles","access":"closed","key":"journals/juq/HalonenP23","doi":"10.1137/22M1538855","ee":"https://doi.org/10.1137/22m1538855","url":"https://dblp.org/rec/journals/juq/HalonenP23"}, "url":"URL#187974" }, { "@score":"3", "@id":"188232", "info":{"authors":{"author":[{"@pid":"243/8641","text":"Ehsan Othman"},{"@pid":"22/3839","text":"Philipp Werner"},{"@pid":"125/1451","text":"Frerk Saxen"},{"@pid":"51/6942","text":"Ayoub Al-Hamadi"},{"@pid":"79/8320","text":"Sascha Gruss"},{"@pid":"00/8155-3","text":"Steffen Walter 0003"}]},"title":"Classification networks for continuous automatic pain intensity monitoring in video using facial expression on the X-ITE Pain Database.","venue":"J. Vis. Commun. Image Represent.","volume":"91","pages":"103743","year":"2023","type":"Journal Articles","access":"open","key":"journals/jvcir/OthmanWSAGW23","doi":"10.1016/J.JVCIR.2022.103743","ee":"https://doi.org/10.1016/j.jvcir.2022.103743","url":"https://dblp.org/rec/journals/jvcir/OthmanWSAGW23"}, "url":"URL#188232" }, { "@score":"3", "@id":"188244", "info":{"authors":{"author":[{"@pid":"354/4584","text":"Murukessan Perumal"},{"@pid":"77/3531","text":"M. Srinivas"}]},"title":"DenSplitnet: Classifier-invariant neural network method to detect COVID-19 in chest CT data.","venue":"J. Vis. Commun. Image Represent.","volume":"97","pages":"103949","year":"2023","type":"Journal Articles","access":"closed","key":"journals/jvcir/PerumalS23","doi":"10.1016/J.JVCIR.2023.103949","ee":"https://doi.org/10.1016/j.jvcir.2023.103949","url":"https://dblp.org/rec/journals/jvcir/PerumalS23"}, "url":"URL#188244" }, { "@score":"3", "@id":"188793", "info":{"authors":{"author":[{"@pid":"196/4871","text":"Andrea Tonon"},{"@pid":"62/5172","text":"Fabio Vandin"}]},"title":"caSPiTa: mining statistically significant paths in time series data from an unknown network.","venue":"Knowl. Inf. Syst.","volume":"65","number":"6","pages":"2347-2374","year":"2023","type":"Journal Articles","access":"open","key":"journals/kais/TononV23","doi":"10.1007/S10115-022-01800-7","ee":"https://doi.org/10.1007/s10115-022-01800-7","url":"https://dblp.org/rec/journals/kais/TononV23"}, "url":"URL#188793" }, { "@score":"3", "@id":"189370", "info":{"authors":{"author":[{"@pid":"289/0144","text":"Michal Seják"},{"@pid":"246/6122","text":"Jakub Sido"},{"@pid":"349/2729","text":"David Zahour"}]},"title":"ElectroCardioGuard: Preventing patient misidentification in electrocardiogram databases through neural networks.","venue":"Knowl. Based Syst.","volume":"280","pages":"111014","year":"2023","type":"Journal Articles","access":"closed","key":"journals/kbs/SejakSZ23","doi":"10.1016/J.KNOSYS.2023.111014","ee":"https://doi.org/10.1016/j.knosys.2023.111014","url":"https://dblp.org/rec/journals/kbs/SejakSZ23"}, "url":"URL#189370" }, { "@score":"3", "@id":"189382", "info":{"authors":{"author":[{"@pid":"57/10765","text":"Fang Shen"},{"@pid":"136/1115","text":"Jialong Wang"},{"@pid":"183/9955","text":"Ziwei Zhang"},{"@pid":"10/5630","text":"Xin Wang"},{"@pid":"61/500","text":"Yue Li"},{"@pid":"363/6979","text":"Zhaowei Geng"},{"@pid":"77/6939","text":"Bing Pan"},{"@pid":"363/6972","text":"Zengyi Lu"},{"@pid":"03/2627","text":"Wendy Zhao"},{"@pid":"97/6308-1","text":"Wenwu Zhu 0001"}]},"title":"Long-term multivariate time series forecasting in data centers based on multi-factor separation evolutionary spatial-temporal graph neural networks.","venue":"Knowl. Based Syst.","volume":"280","pages":"110997","year":"2023","type":"Journal Articles","access":"closed","key":"journals/kbs/ShenWZWLGPLZZ23","doi":"10.1016/J.KNOSYS.2023.110997","ee":"https://doi.org/10.1016/j.knosys.2023.110997","url":"https://dblp.org/rec/journals/kbs/ShenWZWLGPLZZ23"}, "url":"URL#189382" }, { "@score":"3", "@id":"190925", "info":{"authors":{"author":[{"@pid":"252/7697","text":"Lyu Zhe"},{"@pid":"121/7810","text":"Changjun Yu"},{"@pid":"66/4610","text":"Rong Wang"},{"@pid":"34/4149","text":"Aijun Liu"}]},"title":"A Data-Driven Deep Neural Network for Modeling of Ionospheric Clutter in HFSWR.","venue":"IEEE Geosci. Remote. Sens. Lett.","volume":"20","pages":"1-5","year":"2023","type":"Journal Articles","access":"closed","key":"journals/lgrs/ZheYWL23","doi":"10.1109/LGRS.2023.3274203","ee":"https://doi.org/10.1109/LGRS.2023.3274203","url":"https://dblp.org/rec/journals/lgrs/ZheYWL23"}, "url":"URL#190925" }, { "@score":"4", "@id":"192766", "info":{"authors":{"author":[{"@pid":"356/9646","text":"Ali Al-Allawee"},{"@pid":"l/PascalLorenz","text":"Pascal Lorenz"},{"@pid":"84/5490","text":"Abdelhafid Abouaissa"},{"@pid":"82/7802","text":"Mosleh M. Abualhaj"}]},"title":"A Performance Evaluation of In-Memory Databases Operations in Session Initiation Protocol.","venue":"Network","volume":"3","number":"1","pages":"1-14","year":"2023","type":"Journal Articles","access":"open","key":"journals/mdpinetwork/Al-AllaweeLAA23","doi":"10.3390/NETWORK3010001","ee":"https://doi.org/10.3390/network3010001","url":"https://dblp.org/rec/journals/mdpinetwork/Al-AllaweeLAA23"}, "url":"URL#192766" }, { "@score":"4", "@id":"192783", "info":{"authors":{"author":[{"@pid":"204/5124","text":"Pedro Juan Roig"},{"@pid":"09/4506","text":"Salvador Alcaraz"},{"@pid":"29/6879","text":"Katja Gilly"},{"@pid":"306/3499","text":"Cristina Bernad"},{"@pid":"81/2443","text":"Carlos Juiz"}]},"title":"Arithmetic Study about Efficiency in Network Topologies for Data Centers.","venue":"Network","volume":"3","number":"3","pages":"298-325","year":"2023","type":"Journal Articles","access":"open","key":"journals/mdpinetwork/RoigAGBJ23b","doi":"10.3390/NETWORK3030015","ee":"https://doi.org/10.3390/network3030015","url":"https://dblp.org/rec/journals/mdpinetwork/RoigAGBJ23b"}, "url":"URL#192783" }, { "@score":"3", "@id":"193033", "info":{"authors":{"author":[{"@pid":"198/8492","text":"Richard Osuala"},{"@pid":"206/6794","text":"Kaisar Kushibar"},{"@pid":"298/0893","text":"Lidia Garrucho"},{"@pid":"293/8795","text":"Akis Linardos"},{"@pid":"298/1407","text":"Zuzanna Szafranowska"},{"@pid":"05/3152-1","text":"Stefan Klein 0001"},{"@pid":"86/2890","text":"Ben Glocker"},{"@pid":"91/8170","text":"Oliver Díaz"},{"@pid":"73/4088","text":"Karim Lekadir"}]},"title":"Data synthesis and adversarial networks: A review and meta-analysis in cancer imaging.","venue":"Medical Image Anal.","volume":"84","pages":"102704","year":"2023","type":"Journal Articles","access":"open","key":"journals/mia/OsualaKGLSKGDL23","doi":"10.1016/J.MEDIA.2022.102704","ee":"https://doi.org/10.1016/j.media.2022.102704","url":"https://dblp.org/rec/journals/mia/OsualaKGLSKGDL23"}, "url":"URL#193033" }, { "@score":"3", "@id":"193035", "info":{"authors":{"author":[{"@pid":"285/3355","text":"Hyojoon Park"},{"@pid":"89/6764","text":"Bin Li"},{"@pid":"24/545","text":"Yuming Liu"},{"@pid":"360/5556","text":"Michael S. Nelson"},{"@pid":"360/5776","text":"Helen M. Wilson"},{"@pid":"99/5705","text":"Eftychios Sifakis"},{"@pid":"16/7392","text":"Kevin W. Eliceiri"}]},"title":"Collagen fiber centerline tracking in fibrotic tissue via deep neural networks with variational autoencoder-based synthetic training data generation.","venue":"Medical Image Anal.","volume":"90","pages":"102961","year":"2023","type":"Journal Articles","access":"closed","key":"journals/mia/ParkLLNWSE23","doi":"10.1016/J.MEDIA.2023.102961","ee":"https://doi.org/10.1016/j.media.2023.102961","url":"https://dblp.org/rec/journals/mia/ParkLLNWSE23"}, "url":"URL#193035" }, { "@score":"4", "@id":"194155", "info":{"authors":{"author":[{"@pid":"142/7076","text":"Hanen Ameur"},{"@pid":"139/5663","text":"Hasna Njah"},{"@pid":"18/818","text":"Salma Jamoussi"}]},"title":"Merits of Bayesian networks in overcoming small data challenges: a meta-model for handling missing data.","venue":"Int. J. Mach. Learn. Cybern.","volume":"14","number":"1","pages":"229-251","year":"2023","type":"Journal Articles","access":"closed","key":"journals/mlc/AmeurNJ23","doi":"10.1007/S13042-022-01577-9","ee":"https://doi.org/10.1007/s13042-022-01577-9","url":"https://dblp.org/rec/journals/mlc/AmeurNJ23"}, "url":"URL#194155" }, { "@score":"3", "@id":"194202", "info":{"authors":{"author":[{"@pid":"343/4674","text":"Hayelom Gebrye"},{"@pid":"84/2694","text":"Yong Wang"},{"@pid":"39/3025","text":"Fagen Li"}]},"title":"Traffic data extraction and labeling for machine learning based attack detection in IoT networks.","venue":"Int. J. Mach. Learn. Cybern.","volume":"14","number":"7","pages":"2317-2332","year":"2023","type":"Journal Articles","access":"closed","key":"journals/mlc/GebryeWL23","doi":"10.1007/S13042-022-01765-7","ee":"https://doi.org/10.1007/s13042-022-01765-7","url":"https://dblp.org/rec/journals/mlc/GebryeWL23"}, "url":"URL#194202" }, { "@score":"3", "@id":"194477", "info":{"authors":{"author":[{"@pid":"346/8619","text":"Alexandre Boulle"},{"@pid":"346/7841","text":"A Debelle"}]},"title":"Convolutional neural network analysis of x-ray diffraction data: strain profile retrieval in ion beam modified materials.","venue":"Mach. Learn. Sci. Technol.","volume":"4","number":"1","pages":"15002","year":"2023","type":"Journal Articles","access":"open","key":"journals/mlst/BoulleD23","doi":"10.1088/2632-2153/ACAB4C","ee":"https://doi.org/10.1088/2632-2153/acab4c","url":"https://dblp.org/rec/journals/mlst/BoulleD23"}, "url":"URL#194477" }, { "@score":"3", "@id":"194588", "info":{"authors":{"author":[{"@pid":"299/1916","text":"Natália V. N. Rodrigues"},{"@pid":"299/1985","text":"L. Raul Abramo"},{"@pid":"62/2188","text":"Nina S. T. Hirata"}]},"title":"The information of attribute uncertainties: what convolutional neural networks can learn about errors in input data.","venue":"Mach. Learn. Sci. Technol.","volume":"4","number":"4","pages":"45019","year":"2023","type":"Journal Articles","access":"open","key":"journals/mlst/RodriguesAH23","doi":"10.1088/2632-2153/AD0285","ee":"https://doi.org/10.1088/2632-2153/ad0285","url":"https://dblp.org/rec/journals/mlst/RodriguesAH23"}, "url":"URL#194588" }, { "@score":"3", "@id":"194620", "info":{"authors":{"author":[{"@pid":"340/3720","text":"Joshua A. Vita"},{"@pid":"244/2606","text":"Daniel Schwalbe-Koda"}]},"title":"Data efficiency and extrapolation trends in neural network interatomic potentials.","venue":"Mach. Learn. Sci. Technol.","volume":"4","number":"3","pages":"35031","year":"2023","type":"Journal Articles","access":"open","key":"journals/mlst/VitaS23","doi":"10.1088/2632-2153/ACF115","ee":"https://doi.org/10.1088/2632-2153/acf115","url":"https://dblp.org/rec/journals/mlst/VitaS23"}, "url":"URL#194620" }, { "@score":"3", "@id":"195146", "info":{"authors":{"author":[{"@pid":"70/7542","text":"Jifeng Chen"},{"@pid":"48/450","text":"Yang Yang"}]},"title":"A Context-aware Approach to Task Scheduling for Time Series Data Prediction in Mobile Edge Computing.","venue":"Mob. Networks Appl.","volume":"28","number":"1","pages":"421-431","year":"2023","type":"Journal Articles","access":"closed","key":"journals/monet/ChenY23","doi":"10.1007/S11036-023-02131-9","ee":"https://doi.org/10.1007/s11036-023-02131-9","url":"https://dblp.org/rec/journals/monet/ChenY23"}, "url":"URL#195146" }, { "@score":"3", "@id":"195160", "info":{"authors":{"author":[{"@pid":"135/9618-3","text":"Xiaolin Jiang 0003"},{"@pid":"175/1942","text":"Susu Qu"},{"@pid":"246/6290","text":"Zhengyu Tang"}]},"title":"Study on the Elimination of MIMO Signal Interference in Data Chain System.","venue":"Mob. Networks Appl.","volume":"28","number":"2","pages":"571-578","year":"2023","type":"Journal Articles","access":"closed","key":"journals/monet/JiangQT23","doi":"10.1007/S11036-020-01604-5","ee":"https://doi.org/10.1007/s11036-020-01604-5","url":"https://dblp.org/rec/journals/monet/JiangQT23"}, "url":"URL#195160" }, { "@score":"3", "@id":"195163", "info":{"authors":{"author":[{"@pid":"165/2075","text":"Samina Kausar"},{"@pid":"181/8613","text":"Huahu Xu"},{"@pid":"183/5343","text":"Ata Ullah"},{"@pid":"90/7062","text":"Wenhao Zhu"},{"@pid":"230/3089","text":"Muhammad Yasir Shabir"}]},"title":"Fog-Assisted Secure Data Exchange for Examination and Testing in E-learning System.","venue":"Mob. Networks Appl.","volume":"28","number":"2","pages":"673-689","year":"2023","type":"Journal Articles","access":"closed","key":"journals/monet/KausarXUZS23","doi":"10.1007/S11036-019-01429-X","ee":"https://doi.org/10.1007/s11036-019-01429-x","url":"https://dblp.org/rec/journals/monet/KausarXUZS23"}, "url":"URL#195163" }, { "@score":"3", "@id":"195833", "info":{"authors":{"author":[{"@pid":"20/5138","text":"R. Amutha"},{"@pid":"300/3537","text":"Sivasankari G. G"},{"@pid":"77/84","text":"K. R. Venugopal 0001"}]},"title":"Node clustering and data aggregation in wireless sensor network using sailfish optimization.","venue":"Multim. Tools Appl.","volume":"82","number":"28","pages":"44107-44122","year":"2023","type":"Journal Articles","access":"closed","key":"journals/mta/AmuthaGV23","doi":"10.1007/S11042-023-15225-Z","ee":"https://doi.org/10.1007/s11042-023-15225-z","url":"https://dblp.org/rec/journals/mta/AmuthaGV23"}, "url":"URL#195833" }, { "@score":"3", "@id":"196323", "info":{"title":"Retraction Note: An effective stadium monitoring control algorithm based on big data in emerging mobile networks.","venue":"Multim. Tools Appl.","volume":"82","number":"6","pages":"9561","year":"2023","type":"Journal Articles","access":"closed","key":"journals/mta/HanXY23","doi":"10.1007/S11042-022-13869-X","ee":"https://doi.org/10.1007/s11042-022-13869-x","url":"https://dblp.org/rec/journals/mta/HanXY23"}, "url":"URL#196323" }, { "@score":"4", "@id":"197458", "info":{"authors":{"author":[{"@pid":"243/2412","text":"Juan Pablo Tessore"},{"@pid":"243/2370","text":"Leonardo Martín Esnaola"},{"@pid":"211/4565","text":"Hugo Ramón"},{"@pid":"04/5830","text":"Laura Lanzarini"},{"@pid":"89/6417","text":"Sandra Baldassarri"}]},"title":"Contextual information usage for the enhancement of basic emotion classification in a weakly labelled social network dataset in Spanish.","venue":"Multim. Tools Appl.","volume":"82","number":"7","pages":"9871-9890","year":"2023","type":"Journal Articles","access":"closed","key":"journals/mta/TessoreERLB23","doi":"10.1007/S11042-022-13750-X","ee":"https://doi.org/10.1007/s11042-022-13750-x","url":"https://dblp.org/rec/journals/mta/TessoreERLB23"}, "url":"URL#197458" }, { "@score":"3", "@id":"198517", "info":{"authors":{"author":[{"@pid":"66/9420","text":"Damian Szklarczyk"},{"@pid":"291/1721","text":"Rebecca Kirsch"},{"@pid":"336/8498","text":"Mikaela Koutrouli"},{"@pid":"291/2001","text":"Katerina C. Nastou"},{"@pid":"180/9634","text":"Farrokh Mehryary"},{"@pid":"354/2925","text":"Radja Hachilif"},{"@pid":"180/7933","text":"Annika L. Gable"},{"@pid":"28/3454","text":"Tao Fang"},{"@pid":"130/1082","text":"Nadezhda T. Doncheva"},{"@pid":"19/2877","text":"Sampo Pyysalo"},{"@pid":"b/PeerBork","text":"Peer Bork"},{"@pid":"06/6699","text":"Lars Juhl Jensen"},{"@pid":"16/2463","text":"Christian von Mering"}]},"title":"The STRING database in 2023: protein-protein association networks and functional enrichment analyses for any sequenced genome of interest.","venue":"Nucleic Acids Res.","volume":"51","number":"D1","pages":"638-646","year":"2023","type":"Journal Articles","access":"open","key":"journals/nar/SzklarczykKKNMHGFDPBJM23","doi":"10.1093/NAR/GKAC1000","ee":"https://doi.org/10.1093/nar/gkac1000","url":"https://dblp.org/rec/journals/nar/SzklarczykKKNMHGFDPBJM23"}, "url":"URL#198517" }, { "@score":"3", "@id":"199075", "info":{"authors":{"author":[{"@pid":"347/5156","text":"Aidan Cousins"},{"@pid":"347/5152","text":"Lucas Nakano"},{"@pid":"347/5019","text":"Emma Schofield"},{"@pid":"347/5169","text":"Rasa Kabaila"}]},"title":"A neural network approach to optimising treatments for depression using data from specialist and community psychiatric services in Australia, New Zealand and Japan.","venue":"Neural Comput. Appl.","volume":"35","number":"16","pages":"11497-11516","year":"2023","type":"Journal Articles","access":"closed","key":"journals/nca/CousinsNSK23","doi":"10.1007/S00521-021-06710-3","ee":"https://doi.org/10.1007/s00521-021-06710-3","url":"https://dblp.org/rec/journals/nca/CousinsNSK23"}, "url":"URL#199075" }, { "@score":"4", "@id":"199345", "info":{"authors":{"author":[{"@pid":"339/3796","text":"Bruno Imai"},{"@pid":"328/3995","text":"Qazi Nasir"},{"@pid":"203/8363","text":"Abdulhalim Shah Maulud"},{"@pid":"39/5057","text":"Muhammad Nawaz"},{"@pid":"339/4739","text":"Rizwan Nasir"},{"@pid":"203/9058","text":"Humbul Suleman"}]},"title":"Neural network-based correlation and statistical identification of data outliers in H2S-alkanolamine-H2O and CO2-alkanolamine-H2O datasets.","venue":"Neural Comput. Appl.","volume":"35","number":"4","pages":"3395-3412","year":"2023","type":"Journal Articles","access":"closed","key":"journals/nca/ImaiNMNNS23","doi":"10.1007/S00521-022-07904-Z","ee":"https://doi.org/10.1007/s00521-022-07904-z","url":"https://dblp.org/rec/journals/nca/ImaiNMNNS23"}, "url":"URL#199345" }, { "@score":"3", "@id":"199996", "info":{"authors":{"author":[{"@pid":"356/1944","text":"Bitao Tian"},{"@pid":"40/3387","text":"Yingxu Lai"},{"@pid":"04/11314","text":"Samuel S. M. Sun"},{"@pid":"36/4627-1","text":"Yipeng Wang 0001"},{"@pid":"72/2590-28","text":"Jing Liu 0028"}]},"title":"MSGAN: multi-stage generative adversarial network-based data recovery in cyber-attacks.","venue":"Neural Comput. Appl.","volume":"35","number":"28","pages":"20675-20695","year":"2023","type":"Journal Articles","access":"closed","key":"journals/nca/TianLSWL23","doi":"10.1007/S00521-023-08791-8","ee":"https://doi.org/10.1007/s00521-023-08791-8","url":"https://dblp.org/rec/journals/nca/TianLSWL23"}, "url":"URL#199996" }, { "@score":"3", "@id":"200000", "info":{"authors":{"author":[{"@pid":"234/1107","text":"Dumindu Tissera"},{"@pid":"245/9046","text":"Rukshan Darshana Wijesinghe"},{"@pid":"268/6054","text":"Kasun Vithanage"},{"@pid":"224/7609","text":"Alex Xavier"},{"@pid":"243/4500","text":"Subha Fernando"},{"@pid":"84/2975","text":"Ranga Rodrigo"}]},"title":"End-to-end data-dependent routing in multi-path neural networks.","venue":"Neural Comput. Appl.","volume":"35","number":"17","pages":"12655-12674","year":"2023","type":"Journal Articles","access":"closed","key":"journals/nca/TisseraWVXFR23","doi":"10.1007/S00521-023-08381-8","ee":"https://doi.org/10.1007/s00521-023-08381-8","url":"https://dblp.org/rec/journals/nca/TisseraWVXFR23"}, "url":"URL#200000" }, { "@score":"3", "@id":"200276", "info":{"authors":{"author":[{"@pid":"83/6530","text":"Yuqing Zhang"},{"@pid":"78/1350","text":"Runtong Zhang"},{"@pid":"308/1831","text":"Butian Zhao"}]},"title":"A systematic review of generative adversarial imputation network in missing data imputation.","venue":"Neural Comput. Appl.","volume":"35","number":"27","pages":"19685-19705","year":"2023","type":"Journal Articles","access":"closed","key":"journals/nca/ZhangZZ23","doi":"10.1007/S00521-023-08840-2","ee":"https://doi.org/10.1007/s00521-023-08840-2","url":"https://dblp.org/rec/journals/nca/ZhangZZ23"}, "url":"URL#200276" }, { "@score":"3", "@id":"200568", "info":{"authors":{"author":{"@pid":"14/9609","text":"Faisal Nadeem Khan"}},"title":"Data Perspectives in AI-Assisted Fiber-Optic Communication Networks.","venue":"IEEE Netw.","volume":"37","number":"5","pages":"206-214","year":"2023","type":"Journal Articles","access":"closed","key":"journals/network/Khan23","doi":"10.1109/MNET.130.2200413","ee":"https://doi.org/10.1109/MNET.130.2200413","url":"https://dblp.org/rec/journals/network/Khan23"}, "url":"URL#200568" }, { "@score":"3", "@id":"200604", "info":{"authors":{"author":[{"@pid":"356/4642","text":"Fekri Saleh"},{"@pid":"178/8475","text":"Saleem Karmoshi"},{"@pid":"145/9979","text":"Shuangwu Chen"},{"@pid":"22/4613","text":"Feng Yang"},{"@pid":"181/2854","text":"Jian Yang"}]},"title":"vTopology: Virtual MAC Address Aided Network Slicing in Multi-Tenant Data Centers.","venue":"IEEE Netw.","volume":"37","number":"2","pages":"214-221","year":"2023","type":"Journal Articles","access":"closed","key":"journals/network/SalehKCYY23","doi":"10.1109/MNET.106.2100617","ee":"https://doi.org/10.1109/MNET.106.2100617","url":"https://dblp.org/rec/journals/network/SalehKCYY23"}, "url":"URL#200604" }, { "@score":"3", "@id":"200650", "info":{"authors":{"author":[{"@pid":"275/7868","text":"Hyeim Yang"},{"@pid":"185/2442","text":"Seokwon Jang"},{"@pid":"185/2436","text":"Sol Han"},{"@pid":"51/16","text":"Sangheon Pack"}]},"title":"Auto-NFT: Automated Network Function Translator in Virtualized Programmable Data Plane.","venue":"IEEE Netw.","volume":"37","number":"2","pages":"160-165","year":"2023","type":"Journal Articles","access":"closed","key":"journals/network/YangJHP23","doi":"10.1109/MNET.003.2100195","ee":"https://doi.org/10.1109/MNET.003.2100195","url":"https://dblp.org/rec/journals/network/YangJHP23"}, "url":"URL#200650" }, { "@score":"3", "@id":"201461", "info":{"authors":{"author":[{"@pid":"357/4666","text":"Asha Latha Thandu"},{"@pid":"357/4873","text":"Vijaya Saradhi Thommandru"},{"@pid":"310/7181","text":"Pradeepini Gera"}]},"title":"Data Science in Healthcare Monitoring Under Covid-19 Detection by Extended Hybrid Leader-Based Compressed Neural Network.","venue":"New Gener. Comput.","volume":"41","number":"3","pages":"669-696","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ngc/ThanduTG23","doi":"10.1007/S00354-023-00225-2","ee":"https://doi.org/10.1007/s00354-023-00225-2","url":"https://dblp.org/rec/journals/ngc/ThanduTG23"}, "url":"URL#201461" }, { "@score":"3", "@id":"202151", "info":{"authors":{"author":[{"@pid":"324/2134","text":"Sheng Kuang"},{"@pid":"181/6874","text":"Henry C. Woodruff"},{"@pid":"337/1587","text":"Renee Granzier"},{"@pid":"337/2688","text":"Thiemo J. A. van Nijnatten"},{"@pid":"139/7468","text":"Marc B. I. Lobbes"},{"@pid":"337/1534","text":"Marjolein L. Smidt"},{"@pid":"24/306","text":"Philippe Lambin"},{"@pid":"96/9472","text":"Siamak Mehrkanoon"}]},"title":"MSCDA: Multi-level semantic-guided contrast improves unsupervised domain adaptation for breast MRI segmentation in small datasets.","venue":"Neural Networks","volume":"165","pages":"119-134","year":"2023","type":"Journal Articles","access":"open","key":"journals/nn/KuangWGNLSLM23","doi":"10.1016/J.NEUNET.2023.05.014","ee":"https://doi.org/10.1016/j.neunet.2023.05.014","url":"https://dblp.org/rec/journals/nn/KuangWGNLSLM23"}, "url":"URL#202151" }, { "@score":"3", "@id":"202208", "info":{"authors":{"author":[{"@pid":"66/7980","text":"Jiamin Liu"},{"@pid":"70/8506","text":"Wangli Xu"},{"@pid":"33/4822","text":"Yue Wang"},{"@pid":"33/6319","text":"Heng Lian"}]},"title":"Value iteration for streaming data on a continuous space with gradient method in an RKHS.","venue":"Neural Networks","volume":"166","pages":"437-445","year":"2023","type":"Journal Articles","access":"closed","key":"journals/nn/LiuXWL23","doi":"10.1016/J.NEUNET.2023.07.036","ee":"https://doi.org/10.1016/j.neunet.2023.07.036","url":"https://dblp.org/rec/journals/nn/LiuXWL23"}, "url":"URL#202208" }, { "@score":"3", "@id":"202233", "info":{"authors":{"author":[{"@pid":"237/9769","text":"Pratik Mazumder"},{"@pid":"290/4824","text":"Mohammed Asad Karim"},{"@pid":"182/2957","text":"Indu Joshi"},{"@pid":"160/8743","text":"Pravendra Singh"}]},"title":"Leveraging joint incremental learning objective with data ensemble for class incremental learning.","venue":"Neural Networks","volume":"161","pages":"202-212","year":"2023","type":"Journal Articles","access":"closed","key":"journals/nn/MazumderKJS23","doi":"10.1016/J.NEUNET.2023.01.017","ee":"https://doi.org/10.1016/j.neunet.2023.01.017","url":"https://dblp.org/rec/journals/nn/MazumderKJS23"}, "url":"URL#202233" }, { "@score":"4", "@id":"202309", "info":{"authors":{"author":{"@pid":"185/0389","text":"Will Serrano"}},"title":"The Deep Learning Generative Adversarial Random Neural Network in data marketplaces: The digital creative.","venue":"Neural Networks","volume":"165","pages":"420-434","year":"2023","type":"Journal Articles","access":"open","key":"journals/nn/Serrano23","doi":"10.1016/J.NEUNET.2023.05.028","ee":"https://doi.org/10.1016/j.neunet.2023.05.028","url":"https://dblp.org/rec/journals/nn/Serrano23"}, "url":"URL#202309" }, { "@score":"4", "@id":"202365", "info":{"authors":{"author":[{"@pid":"284/5085","text":"Christian Tsvetkov"},{"@pid":"95/11518","text":"Gaurav Malhotra"},{"@pid":"160/3237","text":"Benjamin D. Evans"},{"@pid":"55/8702","text":"Jeffrey S. Bowers"}]},"title":"The role of capacity constraints in Convolutional Neural Networks for learning random versus natural data.","venue":"Neural Networks","volume":"161","pages":"515-524","year":"2023","type":"Journal Articles","access":"open","key":"journals/nn/TsvetkovMEB23","doi":"10.1016/J.NEUNET.2023.01.011","ee":"https://doi.org/10.1016/j.neunet.2023.01.011","url":"https://dblp.org/rec/journals/nn/TsvetkovMEB23"}, "url":"URL#202365" }, { "@score":"3", "@id":"202402", "info":{"authors":{"author":[{"@pid":"181/2842","text":"Yang Wang"},{"@pid":"57/8348","text":"Wanlin Zhou"},{"@pid":"342/5085","text":"Jiakai Zhou"}]},"title":"2DHeadPose: A simple and effective annotation method for the head pose in RGB images and its dataset.","venue":"Neural Networks","volume":"160","pages":"50-62","year":"2023","type":"Journal Articles","access":"closed","key":"journals/nn/WangZZ23","doi":"10.1016/J.NEUNET.2022.12.021","ee":"https://doi.org/10.1016/j.neunet.2022.12.021","url":"https://dblp.org/rec/journals/nn/WangZZ23"}, "url":"URL#202402" }, { "@score":"4", "@id":"202524", "info":{"authors":{"author":[{"@pid":"42/5705","text":"Xi Zhou"},{"@pid":"37/1682-1","text":"Wei Xiang 0001"},{"@pid":"34/808-8","text":"Tao Huang 0008"}]},"title":"A novel neural network for improved in-hospital mortality prediction with irregular and incomplete multivariate data.","venue":"Neural Networks","volume":"167","pages":"741-750","year":"2023","type":"Journal Articles","access":"closed","key":"journals/nn/ZhouXH23","doi":"10.1016/J.NEUNET.2023.07.033","ee":"https://doi.org/10.1016/j.neunet.2023.07.033","url":"https://dblp.org/rec/journals/nn/ZhouXH23"}, "url":"URL#202524" }, { "@score":"3", "@id":"202781", "info":{"authors":{"author":[{"@pid":"183/4540","text":"Ahmed Alsayat"},{"@pid":"82/7028","text":"Hossein Ahmadi"}]},"title":"A Hybrid Method Using Ensembles of Neural Network and Text Mining for Learner Satisfaction Analysis from Big Datasets in Online Learning Platform.","venue":"Neural Process. Lett.","volume":"55","number":"3","pages":"3267-3303","year":"2023","type":"Journal Articles","access":"closed","key":"journals/npl/AlsayatA23","doi":"10.1007/S11063-022-11009-Y","ee":"https://doi.org/10.1007/s11063-022-11009-y","url":"https://dblp.org/rec/journals/npl/AlsayatA23"}, "url":"URL#202781" }, { "@score":"3", "@id":"203101", "info":{"authors":{"author":[{"@pid":"194/4309","text":"Aqsa Saeed Qureshi"},{"@pid":"27/267","text":"Teemu Roos"}]},"title":"Transfer Learning with Ensembles of Deep Neural Networks for Skin Cancer Detection in Imbalanced Data Sets.","venue":"Neural Process. Lett.","volume":"55","number":"4","pages":"4461-4479","year":"2023","type":"Journal Articles","access":"open","key":"journals/npl/QureshiR23","doi":"10.1007/S11063-022-11049-4","ee":"https://doi.org/10.1007/s11063-022-11049-4","url":"https://dblp.org/rec/journals/npl/QureshiR23"}, "url":"URL#203101" }, { "@score":"3", "@id":"203145", "info":{"authors":{"author":[{"@pid":"298/2058","text":"Liyao Song"},{"@pid":"86/5728","text":"Quan Wang"},{"@pid":"168/6034","text":"Haiwei Li"},{"@pid":"30/7197","text":"Jiancun Fan"},{"@pid":"223/6122","text":"Bingliang Hu"}]},"title":"Longitudinal Structural MRI Data Prediction in Nondemented and Demented Older Adults via Generative Adversarial Convolutional Network.","venue":"Neural Process. Lett.","volume":"55","number":"2","pages":"989-999","year":"2023","type":"Journal Articles","access":"closed","key":"journals/npl/SongWLFH23","doi":"10.1007/S11063-022-10922-6","ee":"https://doi.org/10.1007/s11063-022-10922-6","url":"https://dblp.org/rec/journals/npl/SongWLFH23"}, "url":"URL#203145" }, { "@score":"3", "@id":"203599", "info":{"authors":{"author":[{"@pid":"236/8519","text":"Saud Khan"},{"@pid":"77/6860","text":"Salman Durrani"},{"@pid":"121/0500","text":"Muhammad Basit Shahab"},{"@pid":"148/3679-1","text":"Sarah J. Johnson"},{"@pid":"55/3548","text":"Seyit Camtepe"}]},"title":"Joint User and Data Detection in Grant-Free NOMA With Attention-Based BiLSTM Network.","venue":"IEEE Open J. Commun. Soc.","volume":"4","pages":"1499-1515","year":"2023","type":"Journal Articles","access":"open","key":"journals/ojcs/KhanDSJC23","doi":"10.1109/OJCOMS.2023.3292820","ee":"https://doi.org/10.1109/OJCOMS.2023.3292820","url":"https://dblp.org/rec/journals/ojcs/KhanDSJC23"}, "url":"URL#203599" }, { "@score":"3", "@id":"203639", "info":{"authors":{"author":[{"@pid":"291/1790","text":"Chandrasen Pandey"},{"@pid":"296/0589","text":"Vaibhav Tiwari"},{"@pid":"53/7797","text":"Rajkumar Singh Rathore"},{"@pid":"28/7999","text":"Rutvij H. Jhaveri"},{"@pid":"30/10604","text":"Diptendu Sinha Roy"},{"@pid":"255/8235","text":"Shitharth Selvarajan"}]},"title":"Resource-Efficient Synthetic Data Generation for Performance Evaluation in Mobile Edge Computing Over 5G Networks.","venue":"IEEE Open J. Commun. Soc.","volume":"4","pages":"1866-1878","year":"2023","type":"Journal Articles","access":"open","key":"journals/ojcs/PandeyTRJRS23","doi":"10.1109/OJCOMS.2023.3306039","ee":"https://doi.org/10.1109/OJCOMS.2023.3306039","url":"https://dblp.org/rec/journals/ojcs/PandeyTRJRS23"}, "url":"URL#203639" }, { "@score":"3", "@id":"204325", "info":{"authors":{"author":[{"@pid":"264/3203","text":"Negar Rezaei"},{"@pid":"29/5978","text":"Somayyeh Koohi"}]},"title":"Flat Ball: Dynamic topology for energy management of optical interconnection networks in data centers.","venue":"Opt. Switch. Netw.","volume":"48","pages":"100730","year":"2023","type":"Journal Articles","access":"closed","key":"journals/osn/RezaeiK23","doi":"10.1016/J.OSN.2023.100730","ee":"https://doi.org/10.1016/j.osn.2023.100730","url":"https://dblp.org/rec/journals/osn/RezaeiK23"}, "url":"URL#204325" }, { "@score":"3", "@id":"205020", "info":{"authors":{"author":[{"@pid":"199/3315","text":"Samira Akili"},{"@pid":"324/5748","text":"Steven Purtzel"},{"@pid":"61/267","text":"Matthias Weidlich 0001"}]},"title":"INEv: In-Network Evaluation for Event Stream Processing.","venue":"Proc. ACM Manag. Data","volume":"1","number":"1","pages":"101:1-101:26","year":"2023","type":"Journal Articles","access":"closed","key":"journals/pacmmod/AkiliP023","doi":"10.1145/3588955","ee":"https://doi.org/10.1145/3588955","url":"https://dblp.org/rec/journals/pacmmod/AkiliP023"}, "url":"URL#205020" }, { "@score":"3", "@id":"205092", "info":{"authors":{"author":[{"@pid":"213/9136","text":"Shixun Huang"},{"@pid":"20/3716","text":"Zhifeng Bao"}]},"title":"Shortest Paths Discovery in Uncertain Networks via Transfer Learning.","venue":"Proc. ACM Manag. Data","volume":"1","number":"2","pages":"141:1-141:25","year":"2023","type":"Journal Articles","access":"closed","key":"journals/pacmmod/HuangB23","doi":"10.1145/3589286","ee":"https://doi.org/10.1145/3589286","url":"https://dblp.org/rec/journals/pacmmod/HuangB23"}, "url":"URL#205092" }, { "@score":"3", "@id":"205101", "info":{"authors":{"author":[{"@pid":"75/4947-1","text":"He Huang 0001"},{"@pid":"305/9318","text":"Jiakun Yu"},{"@pid":"51/3199-6","text":"Yang Du 0006"},{"@pid":"49/1245-8","text":"Jia Liu 0008"},{"@pid":"124/6911","text":"Haipeng Dai"},{"@pid":"117/3395","text":"Yu-E Sun"}]},"title":"Memory-Efficient and Flexible Detection of Heavy Hitters in High-Speed Networks.","venue":"Proc. ACM Manag. Data","volume":"1","number":"3","pages":"214:1-214:24","year":"2023","type":"Journal Articles","access":"closed","key":"journals/pacmmod/HuangYDLDS23","doi":"10.1145/3617334","ee":"https://doi.org/10.1145/3617334","url":"https://dblp.org/rec/journals/pacmmod/HuangYDLDS23"}, "url":"URL#205101" }, { "@score":"3", "@id":"205292", "info":{"authors":{"author":[{"@pid":"324/5350","text":"Marco Rossanese"},{"@pid":"41/8398","text":"Andres Garcia-Saavedra"},{"@pid":"31/10646","text":"Andra Lutu"},{"@pid":"42/2579","text":"Xavier Costa-Pérez"}]},"title":"Data-driven Analysis of the Cost-Performance Trade-off of Reconfigurable Intelligent Surfaces in a Production Network.","venue":"PACMNET","volume":"1","number":"CoNEXT3","pages":"12:1-12:20","year":"2023","type":"Journal Articles","access":"closed","key":"journals/pacmnet/RossaneseGLC23","doi":"10.1145/3629134","ee":"https://doi.org/10.1145/3629134","url":"https://dblp.org/rec/journals/pacmnet/RossaneseGLC23"}, "url":"URL#205292" }, { "@score":"3", "@id":"207164", "info":{"authors":{"author":[{"@pid":"326/4865","text":"Joshua Julian Damanik"},{"@pid":"255/2999","text":"Ming Chong Lim"},{"@pid":"303/5303","text":"Hyeon-Mun Jeong"},{"@pid":"253/0251","text":"Ho-Yeon Kim"},{"@pid":"34/4283","text":"Han-Lim Choi"}]},"title":"Consensus-based clustering and data aggregation in decentralized network of multi-agent systems.","venue":"PeerJ Comput. Sci.","volume":"9","pages":"e1445","year":"2023","type":"Journal Articles","access":"open","key":"journals/peerj-cs/DamanikLJKC23","doi":"10.7717/PEERJ-CS.1445","ee":"https://doi.org/10.7717/peerj-cs.1445","url":"https://dblp.org/rec/journals/peerj-cs/DamanikLJKC23"}, "url":"URL#207164" }, { "@score":"3", "@id":"207192", "info":{"authors":{"author":[{"@pid":"132/7578","text":"Jingyi Fang"},{"@pid":"04/11365","text":"Xiang Gong"}]},"title":"Application of visual communication in digital animation advertising design using convolutional neural networks and big data.","venue":"PeerJ Comput. Sci.","volume":"9","pages":"e1383","year":"2023","type":"Journal Articles","access":"open","key":"journals/peerj-cs/FangG23","doi":"10.7717/PEERJ-CS.1383","ee":"https://doi.org/10.7717/peerj-cs.1383","url":"https://dblp.org/rec/journals/peerj-cs/FangG23"}, "url":"URL#207192" }, { "@score":"3", "@id":"207198", "info":{"authors":{"author":[{"@pid":"352/5676","text":"Flávio Henry Ferreira"},{"@pid":"240/7037","text":"Fabrício José Brito Barros"},{"@pid":"273/1841","text":"Miércio Cardoso De Alcântara Neto"},{"@pid":"221/0330","text":"Evelin Helena Silva Cardoso"},{"@pid":"20/6897","text":"Carlos Renato Lisboa Francês"},{"@pid":"18/5558","text":"Jasmine Priscyla Leite De Araújo"}]},"title":"Hybrid computational and real data-based positioning of small cells in 5G networks.","venue":"PeerJ Comput. Sci.","volume":"9","pages":"e1412","year":"2023","type":"Journal Articles","access":"open","key":"journals/peerj-cs/FerreiraBNCFA23","doi":"10.7717/PEERJ-CS.1412","ee":"https://doi.org/10.7717/peerj-cs.1412","url":"https://dblp.org/rec/journals/peerj-cs/FerreiraBNCFA23"}, "url":"URL#207198" }, { "@score":"3", "@id":"207600", "info":{"authors":{"author":[{"@pid":"342/0156","text":"Chaitali Dey Bhowmik"},{"@pid":"35/7720","text":"Tirthankar Gayen"}]},"title":"Traffic aware dynamic load distribution in the Data Plane of SDN using Genetic Algorithm: A case study on NSF network.","venue":"Pervasive Mob. Comput.","volume":"88","pages":"101723","year":"2023","type":"Journal Articles","access":"closed","key":"journals/percom/BhowmikG23","doi":"10.1016/J.PMCJ.2022.101723","ee":"https://doi.org/10.1016/j.pmcj.2022.101723","url":"https://dblp.org/rec/journals/percom/BhowmikG23"}, "url":"URL#207600" }, { "@score":"3", "@id":"207748", "info":{"authors":{"author":[{"@pid":"17/8348","text":"Xiaohong Cao"},{"@pid":"120/9592","text":"Lin Gan"},{"@pid":"28/1738","text":"Hong Pan"},{"@pid":"357/3750","text":"Xiaojuan Dang"}]},"title":"Computation bits maximization in data compression-assisted MEC networks.","venue":"Phys. Commun.","volume":"60","pages":"102119","year":"2023","type":"Journal Articles","access":"closed","key":"journals/phycomm/CaoGPD23","doi":"10.1016/J.PHYCOM.2023.102119","ee":"https://doi.org/10.1016/j.phycom.2023.102119","url":"https://dblp.org/rec/journals/phycomm/CaoGPD23"}, "url":"URL#207748" }, { "@score":"3", "@id":"207749", "info":{"authors":{"author":[{"@pid":"164/7427","text":"Korhan Cengiz"},{"@pid":"354/0663","text":"Rani Kumari"},{"@pid":"191/4430","text":"Dinesh Kumar Sah"},{"@pid":"30/10603","text":"Nikola Ivkovic"},{"@pid":"44/10194","text":"Bashir Salah"}]},"title":"SOHCL-RDT: A self-organized hybrid cross-layer design for reliable data transmission in wireless network.","venue":"Phys. Commun.","volume":"60","pages":"102132","year":"2023","type":"Journal Articles","access":"closed","key":"journals/phycomm/CengizkSIS23","doi":"10.1016/J.PHYCOM.2023.102132","ee":"https://doi.org/10.1016/j.phycom.2023.102132","url":"https://dblp.org/rec/journals/phycomm/CengizkSIS23"}, "url":"URL#207749" }, { "@score":"4", "@id":"207858", "info":{"authors":{"author":[{"@pid":"309/5416","text":"Meena Pundir"},{"@pid":"220/3667","text":"Jasminder Kaur Sandhu"},{"@pid":"26/2002","text":"Deepali Gupta"},{"@pid":"192/9289","text":"Thippa Reddy Gadekallu"},{"@pid":"292/1552","text":"Abhinav Juneja"},{"@pid":"193/9915","text":"Yonis Gulzar"},{"@pid":"245/4705","text":"Ali Nauman"}]},"title":"Data Rate Aware Reliable Transmission Mechanism in Wireless Sensor Networks using Bayesian Regularized Neural Network approach.","venue":"Phys. Commun.","volume":"59","pages":"102115","year":"2023","type":"Journal Articles","access":"closed","key":"journals/phycomm/PundirSGGJGN23","doi":"10.1016/J.PHYCOM.2023.102115","ee":"https://doi.org/10.1016/j.phycom.2023.102115","url":"https://dblp.org/rec/journals/phycomm/PundirSGGJGN23"}, "url":"URL#207858" }, { "@score":"3", "@id":"208280", "info":{"authors":{"author":[{"@pid":"357/9203","text":"Michael W. Irvin"},{"@pid":"51/5675","text":"Arvind Ramanathan"},{"@pid":"192/3584","text":"Carlos F. Lopez"}]},"title":"Model certainty in cellular network-driven processes with missing data.","venue":"PLoS Comput. Biol.","volume":"19","number":"4","year":"2023","type":"Journal Articles","access":"open","key":"journals/ploscb/IrvinRL23","doi":"10.1371/JOURNAL.PCBI.1011004","ee":"https://doi.org/10.1371/journal.pcbi.1011004","url":"https://dblp.org/rec/journals/ploscb/IrvinRL23"}, "url":"URL#208280" }, { "@score":"3", "@id":"208918", "info":{"authors":{"author":[{"@pid":"224/2167","text":"Vamsi Addanki"},{"@pid":"04/5911","text":"Chen Avin"},{"@pid":"58/3289-1","text":"Stefan Schmid 0001"}]},"title":"Mars: Near-Optimal Throughput with Shallow Buffers in Reconfigurable Datacenter Networks.","venue":"Proc. ACM Meas. Anal. Comput. Syst.","volume":"7","number":"1","pages":"2:1-2:43","year":"2023","type":"Journal Articles","access":"closed","key":"journals/pomacs/AddankiAS23","doi":"10.1145/3579312","ee":"https://doi.org/10.1145/3579312","url":"https://dblp.org/rec/journals/pomacs/AddankiAS23"}, "url":"URL#208918" }, { "@score":"4", "@id":"209115", "info":{"authors":{"author":[{"@pid":"254/3160","text":"Linjiang Xie"},{"@pid":"210/5704","text":"Feilu Hang"},{"@pid":"71/6601","text":"Wei Guo"},{"@pid":"54/4232","text":"Zhenhong Zhang"},{"@pid":"330/4317","text":"Hanruo Li"}]},"title":"Data-centric Networking with Parallel and Distributed Architecture Performs Performance Analysis to Protect Critical Infrastructure in the Future Power System Network Based on IoT.","venue":"Parallel Process. Lett.","volume":"33","number":"3","pages":"2340005:1-2340005:21","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ppl/XieHGZL23","doi":"10.1142/S0129626423400054","ee":"https://doi.org/10.1142/S0129626423400054","url":"https://dblp.org/rec/journals/ppl/XieHGZL23"}, "url":"URL#209115" }, { "@score":"3", "@id":"209168", "info":{"authors":{"author":[{"@pid":"290/2733","text":"Fangfang Gou"},{"@pid":"25/5536-2","text":"Jia Wu 0002"}]},"title":"Novel data transmission technology based on complex IoT system in opportunistic social networks.","venue":"Peer Peer Netw. Appl.","volume":"16","number":"2","pages":"571-588","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ppna/GouW23","doi":"10.1007/S12083-022-01430-4","ee":"https://doi.org/10.1007/s12083-022-01430-4","url":"https://dblp.org/rec/journals/ppna/GouW23"}, "url":"URL#209168" }, { "@score":"3", "@id":"209169", "info":{"authors":{"author":[{"@pid":"48/2063","text":"Frédéric Guidec"},{"@pid":"15/4345","text":"Yves Mahéo"},{"@pid":"262/3616","text":"Camille Noûs"}]},"title":"Supporting conflict-free replicated data types in opportunistic networks.","venue":"Peer Peer Netw. Appl.","volume":"16","number":"1","pages":"395-419","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ppna/GuidecMN23","doi":"10.1007/S12083-022-01404-6","ee":"https://doi.org/10.1007/s12083-022-01404-6","url":"https://dblp.org/rec/journals/ppna/GuidecMN23"}, "url":"URL#209169" }, { "@score":"3", "@id":"209238", "info":{"authors":{"author":[{"@pid":"87/6830","text":"Rajeev Ranjan"},{"@pid":"66/831-1","text":"Prabhat Kumar 0001"}]},"title":"Mobility-Enabled Sustainable Data Collection in Wireless Sensor Networks.","venue":"Peer Peer Netw. Appl.","volume":"16","number":"2","pages":"1199-1210","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ppna/RanjanK23","doi":"10.1007/S12083-023-01465-1","ee":"https://doi.org/10.1007/s12083-023-01465-1","url":"https://dblp.org/rec/journals/ppna/RanjanK23"}, "url":"URL#209238" }, { "@score":"3", "@id":"209276", "info":{"title":"Retraction Note: Improved multi objective data transmission using conventional route selection algorithm in mobile ad hoc network.","venue":"Peer Peer Netw. Appl.","volume":"16","number":"3","pages":"1576","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ppna/WilsonS23","doi":"10.1007/S12083-022-01393-6","ee":"https://doi.org/10.1007/s12083-022-01393-6","url":"https://dblp.org/rec/journals/ppna/WilsonS23"}, "url":"URL#209276" }, { "@score":"3", "@id":"210105", "info":{"authors":{"author":[{"@pid":"299/5749","text":"Iván García Aguilar"},{"@pid":"227/8489","text":"Jorge García-González"},{"@pid":"32/1483","text":"Rafael Marcos Luque Baena"},{"@pid":"55/5795","text":"Ezequiel López-Rubio"}]},"title":"Automated labeling of training data for improved object detection in traffic videos by fine-tuned deep convolutional neural networks.","venue":"Pattern Recognit. Lett.","volume":"167","pages":"45-52","year":"2023","type":"Journal Articles","access":"open","key":"journals/prl/AguilarGBL23","doi":"10.1016/J.PATREC.2023.01.015","ee":"https://doi.org/10.1016/j.patrec.2023.01.015","url":"https://dblp.org/rec/journals/prl/AguilarGBL23"}, "url":"URL#210105" }, { "@score":"3", "@id":"210391", "info":{"authors":{"author":[{"@pid":"296/6282","text":"Riju Bhattacharya"},{"@pid":"43/10220","text":"Naresh Kumar Nagwani"},{"@pid":"20/8468","text":"Sarsij Tripathi"}]},"title":"A hybrid approach for predicting missing follower-followee links in social networks using topological features with ensemble learning.","venue":"Data Technol. Appl.","volume":"57","number":"1","pages":"131-153","year":"2023","type":"Journal Articles","access":"closed","key":"journals/program/BhattacharyaNT23","doi":"10.1108/DTA-02-2022-0072","ee":"https://doi.org/10.1108/DTA-02-2022-0072","url":"https://dblp.org/rec/journals/program/BhattacharyaNT23"}, "url":"URL#210391" }, { "@score":"3", "@id":"210587", "info":{"authors":{"author":[{"@pid":"171/1301","text":"Ali Kadhum Idrees"},{"@pid":"345/2511","text":"Rafal Alhussaini"},{"@pid":"161/0411","text":"Mahdi Abed Salman"}]},"title":"Energy-efficient two-layer data transmission reduction protocol in periodic sensor networks of IoTs.","venue":"Pers. Ubiquitous Comput.","volume":"27","number":"2","pages":"139-158","year":"2023","type":"Journal Articles","access":"closed","key":"journals/puc/IdreesAS23","doi":"10.1007/S00779-020-01384-5","ee":"https://doi.org/10.1007/s00779-020-01384-5","url":"https://dblp.org/rec/journals/puc/IdreesAS23"}, "url":"URL#210587" }, { "@score":"3", "@id":"210649", "info":{"authors":{"author":[{"@pid":"248/4293","text":"Yushi Shi"},{"@pid":"60/7678","text":"Xiaoqi Zhang"},{"@pid":"265/4826","text":"Qiaohong Hu"},{"@pid":"92/1023","text":"Hongju Cheng"}]},"title":"Data recovery algorithm based on generative adversarial networks in crowd sensing Internet of Things.","venue":"Pers. Ubiquitous Comput.","volume":"27","number":"3","pages":"537-550","year":"2023","type":"Journal Articles","access":"closed","key":"journals/puc/ShiZHC23","doi":"10.1007/S00779-020-01428-W","ee":"https://doi.org/10.1007/s00779-020-01428-w","url":"https://dblp.org/rec/journals/puc/ShiZHC23"}, "url":"URL#210649" }, { "@score":"3", "@id":"210689", "info":{"authors":{"author":[{"@pid":"160/9547","text":"Deng Zhao"},{"@pid":"07/10127","text":"Zhangbing Zhou"},{"@pid":"73/8637","text":"Shangguang Wang"},{"@pid":"58/2670-11","text":"Bo Liu 0011"},{"@pid":"87/982","text":"Walid Gaaloul"}]},"title":"Reinforcement learning-enabled efficient data gathering in underground wireless sensor networks.","venue":"Pers. Ubiquitous Comput.","volume":"27","number":"3","pages":"581-598","year":"2023","type":"Journal Articles","access":"closed","key":"journals/puc/ZhaoZWLG23","doi":"10.1007/S00779-020-01443-X","ee":"https://doi.org/10.1007/s00779-020-01443-x","url":"https://dblp.org/rec/journals/puc/ZhaoZWLG23"}, "url":"URL#210689" }, { "@score":"3", "@id":"212250", "info":{"authors":{"author":[{"@pid":"90/9826","text":"Aditya Gopalan"},{"@pid":"65/4227","text":"Alexander L. Stolyar"}]},"title":"Data flow dissemination in a network.","venue":"Queueing Syst. Theory Appl.","volume":"105","number":"3","pages":"317-354","year":"2023","type":"Journal Articles","access":"closed","key":"journals/questa/GopalanS23","doi":"10.1007/S11134-023-09896-6","ee":"https://doi.org/10.1007/s11134-023-09896-6","url":"https://dblp.org/rec/journals/questa/GopalanS23"}, "url":"URL#212250" }, { "@score":"4", "@id":"212465", "info":{"authors":{"author":[{"@pid":"28/6297","text":"Nan Zhang"},{"@pid":"221/4035","text":"Amir Kalhor"},{"@pid":"176/9050","text":"Roza Azizi"},{"@pid":"99/565","text":"Reza Kazemi Matin"}]},"title":"Improved efficiency assessment in network DEA through interval data analysis: An empirical study in agriculture.","venue":"RAIRO Oper. Res.","volume":"57","number":"6","pages":"3007-3031","year":"2023","type":"Journal Articles","access":"closed","key":"journals/rairo/ZhangKAM23","doi":"10.1051/RO/2023154","ee":"https://doi.org/10.1051/ro/2023154","url":"https://dblp.org/rec/journals/rairo/ZhangKAM23"}, "url":"URL#212465" }, { "@score":"3", "@id":"215292", "info":{"authors":{"author":[{"@pid":"342/1110","text":"Manuchekhr Gulakhmadov"},{"@pid":"16/3283","text":"Xi Chen"},{"@pid":"280/8976","text":"Aminjon Gulakhmadov"},{"@pid":"329/6928","text":"Muhammad Umer Nadeem"},{"@pid":"342/1001","text":"Nekruz Gulahmadov"},{"@pid":"84/2345-1","text":"Tie Liu 0001"}]},"title":"Performance Analysis of Precipitation Datasets at Multiple Spatio-Temporal Scales over Dense Gauge Network in Mountainous Domain of Tajikistan, Central Asia.","venue":"Remote. Sens.","volume":"15","number":"5","pages":"1420","year":"2023","type":"Journal Articles","access":"open","key":"journals/remotesensing/GulakhmadovCGNGL23","doi":"10.3390/RS15051420","ee":"https://doi.org/10.3390/rs15051420","url":"https://dblp.org/rec/journals/remotesensing/GulakhmadovCGNGL23"}, "url":"URL#215292" }, { "@score":"3", "@id":"215659", "info":{"authors":{"author":[{"@pid":"339/2824","text":"Thomas Hutsler"},{"@pid":"170/9953","text":"Narcisa G. Pricope"},{"@pid":"29/5999","text":"Peng Gao"},{"@pid":"339/2610","text":"Monica T. Rother"}]},"title":"Detecting Woody Plants in Southern Arizona Using Data from the National Ecological Observatory Network (NEON).","venue":"Remote. Sens.","volume":"15","number":"1","pages":"98","year":"2023","type":"Journal Articles","access":"open","key":"journals/remotesensing/HutslerPGR23","doi":"10.3390/RS15010098","ee":"https://doi.org/10.3390/rs15010098","url":"https://dblp.org/rec/journals/remotesensing/HutslerPGR23"}, "url":"URL#215659" }, { "@score":"3", "@id":"216544", "info":{"authors":{"author":[{"@pid":"153/8531","text":"Bingqing Liu"},{"@pid":"365/3056","text":"Tom Sevick"},{"@pid":"227/1050","text":"Hoonshin Jung"},{"@pid":"365/3114","text":"Erin Kiskaddon"},{"@pid":"365/3182","text":"Tim Carruthers"}]},"title":"Quantifying the Potential Contribution of Submerged Aquatic Vegetation to Coastal Carbon Capture in a Delta System from Field and Landsat 8/9-Operational Land Imager (OLI) Data with Deep Convolutional Neural Network.","venue":"Remote. Sens.","volume":"15","number":"15","pages":"3765","year":"2023","type":"Journal Articles","access":"open","key":"journals/remotesensing/LiuSJKC23","doi":"10.3390/RS15153765","ee":"https://doi.org/10.3390/rs15153765","url":"https://dblp.org/rec/journals/remotesensing/LiuSJKC23"}, "url":"URL#216544" }, { "@score":"3", "@id":"216613", "info":{"authors":{"author":[{"@pid":"87/2948","text":"Yuan Liu"},{"@pid":"47/5183","text":"Shengjie Zhao"},{"@pid":"186/9796","text":"Fengxia Han"},{"@pid":"234/9795","text":"Mengqiu Chai"},{"@pid":"38/6049-6","text":"Hao Jiang 0006"},{"@pid":"48/859-1","text":"Hongming Zhang 0001"}]},"title":"Data Collection for Target Localization in Ocean Monitoring Radar-Communication Networks.","venue":"Remote. Sens.","volume":"15","number":"21","pages":"5126","year":"2023","type":"Journal Articles","access":"open","key":"journals/remotesensing/LiuZHCJZ23","doi":"10.3390/RS15215126","ee":"https://doi.org/10.3390/rs15215126","url":"https://dblp.org/rec/journals/remotesensing/LiuZHCJZ23"}, "url":"URL#216613" }, { "@score":"3", "@id":"216657", "info":{"authors":{"author":[{"@pid":"40/5250","text":"Jun Long"},{"@pid":"93/3987","text":"Ying Wan"},{"@pid":"49/2335","text":"Lin Guo"},{"@pid":"59/3016","text":"Limin Liu"},{"@pid":"55/5564","text":"Rui Ding"}]},"title":"Joint Optimization of Data Transmission and Energy Harvesting in Relay Satellite Networks.","venue":"Remote. Sens.","volume":"15","number":"10","pages":"2629","year":"2023","type":"Journal Articles","access":"open","key":"journals/remotesensing/LongWGLD23","doi":"10.3390/RS15102629","ee":"https://doi.org/10.3390/rs15102629","url":"https://dblp.org/rec/journals/remotesensing/LongWGLD23"}, "url":"URL#216657" }, { "@score":"3", "@id":"216692", "info":{"authors":{"author":[{"@pid":"315/8263","text":"Lijie Lu"},{"@pid":"98/1429","text":"Lihui Wang"},{"@pid":"190/0141","text":"Qichi Yang"},{"@pid":"163/6398","text":"Pengcheng Zhao"},{"@pid":"89/2648","text":"Yun Du"},{"@pid":"95/5789","text":"Fei Xiao"},{"@pid":"20/7846","text":"Feng Ling"}]},"title":"Extracting a Connected River Network from DEM by Incorporating Surface River Occurrence Data and Sentinel-2 Imagery in the Danjiangkou Reservoir Area.","venue":"Remote. Sens.","volume":"15","number":"4","pages":"1014","year":"2023","type":"Journal Articles","access":"open","key":"journals/remotesensing/LuWYZDXL23","doi":"10.3390/RS15041014","ee":"https://doi.org/10.3390/rs15041014","url":"https://dblp.org/rec/journals/remotesensing/LuWYZDXL23"}, "url":"URL#216692" }, { "@score":"3", "@id":"216971", "info":{"authors":{"author":[{"@pid":"197/2347","text":"Hannes Mollenhauer"},{"@pid":"52/9764","text":"Erik Borg"},{"@pid":"197/2673","text":"Bringfried Pflug"},{"@pid":"67/9764","text":"Bernd Fichtelmann"},{"@pid":"211/2646","text":"Thorsten Dahms"},{"@pid":"179/2562","text":"Sebastian Lorenz"},{"@pid":"365/8440","text":"Olaf Mollenhauer"},{"@pid":"192/8486","text":"Angela Lausch"},{"@pid":"193/6348","text":"Jan Bumberger"},{"@pid":"138/9551","text":"Peter Dietrich"}]},"title":"Ground Truth Validation of Sentinel-2 Data Using Mobile Wireless Ad Hoc Sensor Networks (MWSN) in Vegetation Stands.","venue":"Remote. Sens.","volume":"15","number":"19","pages":"4663","year":"2023","type":"Journal Articles","access":"open","key":"journals/remotesensing/MollenhauerBPFDLMLBD23","doi":"10.3390/RS15194663","ee":"https://doi.org/10.3390/rs15194663","url":"https://dblp.org/rec/journals/remotesensing/MollenhauerBPFDLMLBD23"}, "url":"URL#216971" }, { "@score":"4", "@id":"217348", "info":{"authors":{"author":[{"@pid":"349/6859","text":"Enchuan Qiao"},{"@pid":"79/1552-3","text":"Chao Ma 0003"},{"@pid":"55/2270-14","text":"Hao Zhang 0014"},{"@pid":"251/0470","text":"Zhenzhen Cui"},{"@pid":"41/7627","text":"Chenglong Zhang"}]},"title":"Evaluation of Temporal Stability in Radiometric Calibration Network Sites Using Multi-Source Satellite Data and Continuous In Situ Measurements.","venue":"Remote. Sens.","volume":"15","number":"10","pages":"2639","year":"2023","type":"Journal Articles","access":"open","key":"journals/remotesensing/Qiao00CZ23","doi":"10.3390/RS15102639","ee":"https://doi.org/10.3390/rs15102639","url":"https://dblp.org/rec/journals/remotesensing/Qiao00CZ23"}, "url":"URL#217348" }, { "@score":"3", "@id":"217797", "info":{"authors":{"author":[{"@pid":"232/0398","text":"Dodi Sudiana"},{"@pid":"288/2758","text":"Anugrah Indah Lestari"},{"@pid":"253/5923","text":"Indra Riyanto"},{"@pid":"167/3071","text":"Mia Rizkinia"},{"@pid":"276/2608","text":"Rahmat Arief"},{"@pid":"00/3701","text":"Anton Satria Prabuwono"},{"@pid":"71/1818","text":"Josaphat Tetuko Sri Sumantyo"}]},"title":"A Hybrid Convolutional Neural Network and Random Forest for Burned Area Identification with Optical and Synthetic Aperture Radar (SAR) Data.","venue":"Remote. Sens.","volume":"15","number":"3","pages":"728","year":"2023","type":"Journal Articles","access":"open","key":"journals/remotesensing/SudianaLRRAPS23","doi":"10.3390/RS15030728","ee":"https://doi.org/10.3390/rs15030728","url":"https://dblp.org/rec/journals/remotesensing/SudianaLRRAPS23"}, "url":"URL#217797" }, { "@score":"3", "@id":"218026", "info":{"authors":{"author":[{"@pid":"366/0039","text":"Nguyen Gia Trong"},{"@pid":"366/0358","text":"Pham Ngoc Quang"},{"@pid":"275/1942","text":"Nguyen Van Cuong"},{"@pid":"125/3558","text":"Hong Anh Le"},{"@pid":"366/0346","text":"Hoang Long Nguyen 0009"},{"@pid":"116/7714","text":"Dieu Tien Bui"}]},"title":"Spatial Prediction of Fluvial Flood in High-Frequency Tropical Cyclone Area Using TensorFlow 1D-Convolution Neural Networks and Geospatial Data.","venue":"Remote. Sens.","volume":"15","number":"22","pages":"5429","year":"2023","type":"Journal Articles","access":"open","key":"journals/remotesensing/TrongQCLNB23","doi":"10.3390/RS15225429","ee":"https://doi.org/10.3390/rs15225429","url":"https://dblp.org/rec/journals/remotesensing/TrongQCLNB23"}, "url":"URL#218026" }, { "@score":"3", "@id":"218210", "info":{"authors":{"author":[{"@pid":"78/6727","text":"Zhen Wang"},{"@pid":"276/0154","text":"Pu Li"},{"@pid":"342/0514","text":"Yuancheng Cui"},{"@pid":"342/0903","text":"Shuowen Lei"},{"@pid":"58/8538","text":"Zhizhong Kang"}]},"title":"Automatic Detection of Individual Trees in Forests Based on Airborne LiDAR Data with a Tree Region-Based Convolutional Neural Network (RCNN).","venue":"Remote. Sens.","volume":"15","number":"4","pages":"1024","year":"2023","type":"Journal Articles","access":"open","key":"journals/remotesensing/WangLCLK23","doi":"10.3390/RS15041024","ee":"https://doi.org/10.3390/rs15041024","url":"https://dblp.org/rec/journals/remotesensing/WangLCLK23"}, "url":"URL#218210" }, { "@score":"3", "@id":"218221", "info":{"authors":{"author":[{"@pid":"119/5951","text":"Shuyu Wang"},{"@pid":"09/11146","text":"Wengen Li"},{"@pid":"269/3906","text":"Siyun Hou"},{"@pid":"89/2685","text":"Jihong Guan"},{"@pid":"248/9841","text":"Jiamin Yao"}]},"title":"STA-GAN: A Spatio-Temporal Attention Generative Adversarial Network for Missing Value Imputation in Satellite Data.","venue":"Remote. Sens.","volume":"15","number":"1","pages":"88","year":"2023","type":"Journal Articles","access":"open","key":"journals/remotesensing/WangLHGY23","doi":"10.3390/RS15010088","ee":"https://doi.org/10.3390/rs15010088","url":"https://dblp.org/rec/journals/remotesensing/WangLHGY23"}, "url":"URL#218221" }, { "@score":"3", "@id":"219715", "info":{"authors":{"author":[{"@pid":"72/5749","text":"Lei Zhou"},{"@pid":"60/5360","text":"Jun Song"},{"@pid":"25/7482","text":"Yonggang Chi"},{"@pid":"196/8428","text":"Quanzhou Yu"}]},"title":"Differential Spatiotemporal Patterns of CO2 Emissions in Eastern China's Urban Agglomerations from NPP/VIIRS Nighttime Light Data Based on a Neural Network Algorithm.","venue":"Remote. Sens.","volume":"15","number":"2","pages":"404","year":"2023","type":"Journal Articles","access":"open","key":"journals/remotesensing/ZhouSCY23","doi":"10.3390/RS15020404","ee":"https://doi.org/10.3390/rs15020404","url":"https://dblp.org/rec/journals/remotesensing/ZhouSCY23"}, "url":"URL#219715" }, { "@score":"3", "@id":"219953", "info":{"authors":{"author":[{"@pid":"142/3740","text":"Majid Forghani-elahabad"},{"@pid":"121/4593","text":"Emilio Francesquini"}]},"title":"Usage of task and data parallelism for finding the lower boundary vectors in a stochastic-flow network.","venue":"Reliab. Eng. Syst. Saf.","volume":"238","pages":"109417","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ress/ForghanielahabadF23","doi":"10.1016/J.RESS.2023.109417","ee":"https://doi.org/10.1016/j.ress.2023.109417","url":"https://dblp.org/rec/journals/ress/ForghanielahabadF23"}, "url":"URL#219953" }, { "@score":"3", "@id":"221369", "info":{"authors":{"author":[{"@pid":"132/3166","text":"Petr A. Koldanov"},{"@pid":"132/3131","text":"Alexander P. Koldanov"},{"@pid":"364/6214","text":"D. P. Semenov"}]},"title":"Confidence bounds for threshold similarity graph in random variable network.","venue":"Stat. Anal. Data Min.","volume":"16","number":"6","pages":"583-595","year":"2023","type":"Journal Articles","access":"closed","key":"journals/sadm/KoldanovKS23","doi":"10.1002/SAM.11642","ee":"https://doi.org/10.1002/sam.11642","url":"https://dblp.org/rec/journals/sadm/KoldanovKS23"}, "url":"URL#221369" }, { "@score":"3", "@id":"221381", "info":{"authors":{"author":[{"@pid":"364/4741","text":"Insung Um"},{"@pid":"291/5467","text":"Geonseok Lee"},{"@pid":"98/1810","text":"Kichun Lee 0001"}]},"title":"Adaptive boosting for ordinal target variables using neural networks.","venue":"Stat. Anal. Data Min.","volume":"16","number":"3","pages":"257-271","year":"2023","type":"Journal Articles","access":"closed","key":"journals/sadm/UmLL23","doi":"10.1002/SAM.11613","ee":"https://doi.org/10.1002/sam.11613","url":"https://dblp.org/rec/journals/sadm/UmLL23"}, "url":"URL#221381" }, { "@score":"4", "@id":"221821", "info":{"authors":{"author":[{"@pid":"92/9080","text":"Jingda Ding"},{"@pid":"81/6559","text":"Dehui Du"}]},"title":"A study of the correlation between publication delays and measurement indicators of journal articles in the social network environment - based on online data in PLOS.","venue":"Scientometrics","volume":"128","number":"3","pages":"1711-1743","year":"2023","type":"Journal Articles","access":"closed","key":"journals/scientometrics/DingD23","doi":"10.1007/S11192-023-04640-6","ee":"https://doi.org/10.1007/s11192-023-04640-6","url":"https://dblp.org/rec/journals/scientometrics/DingD23"}, "url":"URL#221821" }, { "@score":"3", "@id":"222468", "info":{"authors":{"author":[{"@pid":"61/10193","text":"Rajni Mohana"},{"@pid":"157/3056","text":"Anand Nayyar"},{"@pid":"02/3108","text":"Pradeep Kumar"},{"@pid":"211/6908","text":"Aman Sharma"}]},"title":"Introduction to the Special Issue on Sentiment Analysis and Affective computing in Multimedia Data on Social Network.","venue":"Scalable Comput. Pract. Exp.","volume":"24","number":"4","pages":"783-786","year":"2023","type":"Journal Articles","access":"closed","key":"journals/scpe/MohanaNKS23","doi":"10.12694/SCPE.V24I4.2863","ee":"https://doi.org/10.12694/scpe.v24i4.2863","url":"https://dblp.org/rec/journals/scpe/MohanaNKS23"}, "url":"URL#222468" }, { "@score":"3", "@id":"222510", "info":{"authors":{"author":[{"@pid":"85/3714","text":"Ya Zhang"},{"@pid":"117/8571","text":"Wenbin Dong"}]},"title":"Clinical Indicator Analysis for Predicting Pathogenic Pneumonia Infection in Newborns with Distributed Sensor Networks Data Analytics.","venue":"Scalable Comput. Pract. Exp.","volume":"24","number":"4","pages":"1127-1136","year":"2023","type":"Journal Articles","access":"closed","key":"journals/scpe/ZhangD23","doi":"10.12694/SCPE.V24I4.2433","ee":"https://doi.org/10.12694/scpe.v24i4.2433","url":"https://dblp.org/rec/journals/scpe/ZhangD23"}, "url":"URL#222510" }, { "@score":"3", "@id":"223731", "info":{"authors":{"author":[{"@pid":"217/4363","text":"Thadeu Brito"},{"@pid":"262/9731","text":"Beatriz Flamia Azevedo"},{"@pid":"25/5780","text":"João Mendes"},{"@pid":"295/4948","text":"Matheus Zorawski Silva"},{"@pid":"15/11533","text":"Florbela P. Fernandes"},{"@pid":"46/9765","text":"Ana I. Pereira"},{"@pid":"21/5209","text":"José Rufino"},{"@pid":"254/0340","text":"José Lima 0001"},{"@pid":"54/4477","text":"Paulo Costa 0001"}]},"title":"Data Acquisition Filtering Focused on Optimizing Transmission in a LoRaWAN Network Applied to the WSN Forest Monitoring System.","venue":"Sensors","volume":"23","number":"3","pages":"1282","year":"2023","type":"Journal Articles","access":"open","key":"journals/sensors/BritoAMSFPRLC23","doi":"10.3390/S23031282","ee":"https://doi.org/10.3390/s23031282","url":"https://dblp.org/rec/journals/sensors/BritoAMSFPRLC23"}, "url":"URL#223731" }, { "@score":"3", "@id":"223982", "info":{"authors":{"author":[{"@pid":"340/9712","text":"Wanjun Chang"},{"@pid":"19/2813","text":"Dong Sun"},{"@pid":"257/9382","text":"Qidong Du"}]},"title":"Intelligent Sensors for POI Recommendation Model Using Deep Learning in Location-Based Social Network Big Data.","venue":"Sensors","volume":"23","number":"2","pages":"850","year":"2023","type":"Journal Articles","access":"open","key":"journals/sensors/ChangSD23","doi":"10.3390/S23020850","ee":"https://doi.org/10.3390/s23020850","url":"https://dblp.org/rec/journals/sensors/ChangSD23"}, "url":"URL#223982" }, { "@score":"3", "@id":"224235", "info":{"authors":{"author":[{"@pid":"84/7161","text":"Seung-Hwan Choi"},{"@pid":"176/1438","text":"Jun-Kyu Park"},{"@pid":"115/6996","text":"Dawn An"},{"@pid":"10/4053","text":"Chang-Hyun Kim"},{"@pid":"360/2383","text":"Gunseok Park"},{"@pid":"56/6828","text":"Inho Lee"},{"@pid":"19/2053","text":"Suwoong Lee"}]},"title":"Fault Diagnosis Method for Human Coexistence Robots Based on Convolutional Neural Networks Using Time-Series Data Generation and Image Encoding.","venue":"Sensors","volume":"23","number":"24","pages":"9753","year":"2023","type":"Journal Articles","access":"open","key":"journals/sensors/ChoiPAKPLL23","doi":"10.3390/S23249753","ee":"https://doi.org/10.3390/s23249753","url":"https://dblp.org/rec/journals/sensors/ChoiPAKPLL23"}, "url":"URL#224235" }, { "@score":"3", "@id":"224237", "info":{"authors":{"author":[{"@pid":"343/0545","text":"Jeong Eun Choi"},{"@pid":"343/1165","text":"Da Hoon Seol"},{"@pid":"41/5817","text":"Chan Young Kim"},{"@pid":"62/3896","text":"Sang Jeen Hong"}]},"title":"Generative Adversarial Network-Based Fault Detection in Semiconductor Equipment with Class-Imbalanced Data.","venue":"Sensors","volume":"23","number":"4","pages":"1889","year":"2023","type":"Journal Articles","access":"open","key":"journals/sensors/ChoiSKH23","doi":"10.3390/S23041889","ee":"https://doi.org/10.3390/s23041889","url":"https://dblp.org/rec/journals/sensors/ChoiSKH23"}, "url":"URL#224237" }, { "@score":"3", "@id":"224776", "info":{"authors":{"author":[{"@pid":"350/9899","text":"Samuel Kofi Erskine"},{"@pid":"98/5440","text":"Hongmei Chi"},{"@pid":"89/8168","text":"Abdelrahman Elleithy"}]},"title":"SDAA: Secure Data Aggregation and Authentication Using Multiple Sinks in Cluster-Based Underwater Vehicular Wireless Sensor Network.","venue":"Sensors","volume":"23","number":"11","pages":"5270","year":"2023","type":"Journal Articles","access":"open","key":"journals/sensors/ErskineCE23","doi":"10.3390/S23115270","ee":"https://doi.org/10.3390/s23115270","url":"https://dblp.org/rec/journals/sensors/ErskineCE23"}, "url":"URL#224776" }, { "@score":"3", "@id":"225508", "info":{"authors":{"author":[{"@pid":"66/11477","text":"Divya Gupta"},{"@pid":"321/1938","text":"Shivani Wadhwa"},{"@pid":"171/5993","text":"Shalli Rani"},{"@pid":"87/966","text":"Zahid Khan"},{"@pid":"05/8059","text":"Wadii Boulila"}]},"title":"EEDC: An Energy Efficient Data Communication Scheme Based on New Routing Approach in Wireless Sensor Networks for Future IoT Applications.","venue":"Sensors","volume":"23","number":"21","pages":"8839","year":"2023","type":"Journal Articles","access":"open","key":"journals/sensors/GuptaWRKB23","doi":"10.3390/S23218839","ee":"https://doi.org/10.3390/s23218839","url":"https://dblp.org/rec/journals/sensors/GuptaWRKB23"}, "url":"URL#225508" }, { "@score":"3", "@id":"226052", "info":{"authors":{"author":[{"@pid":"78/5250-24","text":"Muhammad Imran 0024"},{"@pid":"273/3158","text":"Muhammad Salah Ud Din"},{"@pid":"236/4130","text":"Muhammad Atif Ur Rehman"},{"@pid":"79/2310","text":"Byung-Seo Kim"}]},"title":"MIA-NDN: Microservice-Centric Interest Aggregation in Named Data Networking.","venue":"Sensors","volume":"23","number":"3","pages":"1411","year":"2023","type":"Journal Articles","access":"open","key":"journals/sensors/ImranDRK23","doi":"10.3390/S23031411","ee":"https://doi.org/10.3390/s23031411","url":"https://dblp.org/rec/journals/sensors/ImranDRK23"}, "url":"URL#226052" }, { "@score":"4", "@id":"226094", "info":{"authors":{"author":[{"@pid":"308/7945","text":"Umar Islam"},{"@pid":"200/2362","text":"Hathal Salamah Alwageed"},{"@pid":"251/5892","text":"Malik Muhammad Umer Farooq"},{"@pid":"147/4832","text":"Inayat Khan"},{"@pid":"313/3454","text":"Fuad A. Awwad"},{"@pid":"174/1591","text":"Ijaz Ali"},{"@pid":"200/1118","text":"Mohamed Reda Abonazel"}]},"title":"Investigating the Effectiveness of Novel Support Vector Neural Network for Anomaly Detection in Digital Forensics Data.","venue":"Sensors","volume":"23","number":"12","pages":"5626","year":"2023","type":"Journal Articles","access":"open","key":"journals/sensors/IslamAFKAAA23","doi":"10.3390/S23125626","ee":"https://doi.org/10.3390/s23125626","url":"https://dblp.org/rec/journals/sensors/IslamAFKAAA23"}, "url":"URL#226094" }, { "@score":"3", "@id":"226893", "info":{"authors":{"author":[{"@pid":"88/4978","text":"Mukesh Kumar"},{"@pid":"25/11477","text":"Monika Sethi"},{"@pid":"171/5993","text":"Shalli Rani"},{"@pid":"267/8372","text":"Dipak Kumar Sah"},{"@pid":"20/5270","text":"Salman A. AlQahtani"},{"@pid":"150/8548","text":"Mabrook S. Al-Rakhami"}]},"title":"Secure Data Aggregation Based on End-to-End Homomorphic Encryption in IoT-Based Wireless Sensor Networks.","venue":"Sensors","volume":"23","number":"13","pages":"6181","year":"2023","type":"Journal Articles","access":"open","key":"journals/sensors/KumarSRSAA23","doi":"10.3390/S23136181","ee":"https://doi.org/10.3390/s23136181","url":"https://dblp.org/rec/journals/sensors/KumarSRSAA23"}, "url":"URL#226893" }, { "@score":"3", "@id":"227450", "info":{"authors":{"author":[{"@pid":"341/0171","text":"Yuan-Zeng Lin"},{"@pid":"07/8705","text":"Chi-Wai Chow"},{"@pid":"366/4510","text":"Tien-Wei Yu"},{"@pid":"318/3860","text":"Yin-He Jian"},{"@pid":"252/9891","text":"Tun-Yao Hung"},{"@pid":"33/1730","text":"Jian-Wen Chen"},{"@pid":"50/4886","text":"Chien-Hung Yeh"}]},"title":"Flexible Data Rate Allocation Using Non-Orthogonal Multiple Access (NOMA) in a Mode Division Multiplexing (MDM) Optical Power Splitter for System-on-Chip Networks.","venue":"Sensors","volume":"23","number":"16","pages":"7259","year":"2023","type":"Journal Articles","access":"open","key":"journals/sensors/LinCYJHCY23","doi":"10.3390/S23167259","ee":"https://doi.org/10.3390/s23167259","url":"https://dblp.org/rec/journals/sensors/LinCYJHCY23"}, "url":"URL#227450" }, { "@score":"3", "@id":"227502", "info":{"authors":{"author":[{"@pid":"345/3690","text":"Pim Lindeman"},{"@pid":"282/1315","text":"Annemarijn S. M. Steijlen"},{"@pid":"249/4706","text":"Jeroen Bastemeijer"},{"@pid":"51/4651","text":"Andre Bossche"}]},"title":"Adaptive Impedance Matching Network for Contactless Power and Data Transfer in E-Textiles.","venue":"Sensors","volume":"23","number":"6","pages":"2943","year":"2023","type":"Journal Articles","access":"open","key":"journals/sensors/LindemanSBB23","doi":"10.3390/S23062943","ee":"https://doi.org/10.3390/s23062943","url":"https://dblp.org/rec/journals/sensors/LindemanSBB23"}, "url":"URL#227502" }, { "@score":"3", "@id":"227582", "info":{"authors":{"author":[{"@pid":"19/6052","text":"Jain-Shing Liu"},{"@pid":"75/2315","text":"Chun-Hung Richard Lin"},{"@pid":"06/1966","text":"Yu-Chen Hu"},{"@pid":"284/1267","text":"Praveen Kumar Donta"}]},"title":"Joint Data Transmission and Energy Harvesting for MISO Downlink Transmission Coordination in Wireless IoT Networks.","venue":"Sensors","volume":"23","number":"8","pages":"3900","year":"2023","type":"Journal Articles","access":"open","key":"journals/sensors/LiuLHD23","doi":"10.3390/S23083900","ee":"https://doi.org/10.3390/s23083900","url":"https://dblp.org/rec/journals/sensors/LiuLHD23"}, "url":"URL#227582" }, { "@score":"3", "@id":"227922", "info":{"authors":{"author":[{"@pid":"83/6336","text":"Hirokazu Madokoro"},{"@pid":"87/1946","text":"Kodai Sato"},{"@pid":"269/7639","text":"Stephanie Nix"},{"@pid":"298/6317","text":"Shun Chiyonobu"},{"@pid":"92/1824","text":"Takeshi Nagayoshi"},{"@pid":"49/6704","text":"Kazuhito Sato"}]},"title":"OutcropHyBNet: Hybrid Backbone Networks with Data Augmentation for Accurate Stratum Semantic Segmentation of Monocular Outcrop Images in Carbon Capture and Storage Applications.","venue":"Sensors","volume":"23","number":"21","pages":"8809","year":"2023","type":"Journal Articles","access":"open","key":"journals/sensors/MadokoroSNCNS23","doi":"10.3390/S23218809","ee":"https://doi.org/10.3390/s23218809","url":"https://dblp.org/rec/journals/sensors/MadokoroSNCNS23"}, "url":"URL#227922" }, { "@score":"3", "@id":"228265", "info":{"authors":{"author":[{"@pid":"369/2263","text":"Ana Minic"},{"@pid":"336/2352","text":"Luka Jovanovic"},{"@pid":"150/0673","text":"Nebojsa Bacanin"},{"@pid":"53/5539","text":"Catalin Stoean"},{"@pid":"64/4095","text":"Miodrag Zivkovic"},{"@pid":"369/1900","text":"Petar Spalevic"},{"@pid":"31/7425","text":"Aleksandar Petrovic"},{"@pid":"352/5858","text":"Milos Dobrojevic"},{"@pid":"19/4338","text":"Ruxandra Stoean"}]},"title":"Applying Recurrent Neural Networks for Anomaly Detection in Electrocardiogram Sensor Data.","venue":"Sensors","volume":"23","number":"24","pages":"9878","year":"2023","type":"Journal Articles","access":"open","key":"journals/sensors/MinicJBSZSPDS23","doi":"10.3390/S23249878","ee":"https://doi.org/10.3390/s23249878","url":"https://dblp.org/rec/journals/sensors/MinicJBSZSPDS23"}, "url":"URL#228265" }, { "@score":"3", "@id":"228421", "info":{"authors":{"author":[{"@pid":"306/9670","text":"Oumaima Moutik"},{"@pid":"340/9418","text":"Hiba Sekkat"},{"@pid":"176/6634","text":"Smail Tigani"},{"@pid":"09/955","text":"Abdellah Chehri"},{"@pid":"41/1061","text":"Rachid Saadane"},{"@pid":"183/2070","text":"Taha Ait Tchakoucht"},{"@pid":"39/2085","text":"Anand Paul"}]},"title":"Convolutional Neural Networks or Vision Transformers: Who Will Win the Race for Action Recognitions in Visual Data?","venue":"Sensors","volume":"23","number":"2","pages":"734","year":"2023","type":"Journal Articles","access":"open","key":"journals/sensors/MoutikSTCSTP23","doi":"10.3390/S23020734","ee":"https://doi.org/10.3390/s23020734","url":"https://dblp.org/rec/journals/sensors/MoutikSTCSTP23"}, "url":"URL#228421" }, { "@score":"4", "@id":"228827", "info":{"authors":{"author":[{"@pid":"246/9697","text":"Abigail Elizabeth Pallares-Calvo"},{"@pid":"80/8306","text":"Blanca Esther Carvajal-Gámez"},{"@pid":"127/9759","text":"Oscar Octavio Gutiérrez Frías"},{"@pid":"96/9839","text":"Dante Mújica-Vargas"}]},"title":"Analysis of Data Reception in the Communication Layer Applied to an Architecture of Mobile Sensor Networks in Marine Environments.","venue":"Sensors","volume":"23","number":"12","pages":"5480","year":"2023","type":"Journal Articles","access":"open","key":"journals/sensors/Pallares-CalvoC23","doi":"10.3390/S23125480","ee":"https://doi.org/10.3390/s23125480","url":"https://dblp.org/rec/journals/sensors/Pallares-CalvoC23"}, "url":"URL#228827" }, { "@score":"3", "@id":"229130", "info":{"authors":{"author":{"@pid":"32/1303","text":"Bartlomiej Placzek"}},"title":"A Multi-Agent Prediction Method for Data Sampling and Transmission Reduction in Internet of Things Sensor Networks.","venue":"Sensors","volume":"23","number":"20","pages":"8478","year":"2023","type":"Journal Articles","access":"open","key":"journals/sensors/Placzek23","doi":"10.3390/S23208478","ee":"https://doi.org/10.3390/s23208478","url":"https://dblp.org/rec/journals/sensors/Placzek23"}, "url":"URL#229130" }, { "@score":"4", "@id":"229230", "info":{"authors":{"author":{"@pid":"130/6276","text":"Alaa A. Qaffas"}},"title":"Optimized Back Propagation Neural Network Using Quasi-Oppositional Learning-Based African Vulture Optimization Algorithm for Data Fusion in Wireless Sensor Networks.","venue":"Sensors","volume":"23","number":"14","pages":"6261","year":"2023","type":"Journal Articles","access":"open","key":"journals/sensors/Qaffas23","doi":"10.3390/S23146261","ee":"https://doi.org/10.3390/s23146261","url":"https://dblp.org/rec/journals/sensors/Qaffas23"}, "url":"URL#229230" }, { "@score":"4", "@id":"229364", "info":{"authors":{"author":[{"@pid":"338/6384","text":"Yamarthi Narasimha Rao"},{"@pid":"338/5462","text":"Kunda Suresh Babu"}]},"title":"An Imbalanced Generative Adversarial Network-Based Approach for Network Intrusion Detection in an Imbalanced Dataset.","venue":"Sensors","volume":"23","number":"1","pages":"550","year":"2023","type":"Journal Articles","access":"open","key":"journals/sensors/RaoB23","doi":"10.3390/S23010550","ee":"https://doi.org/10.3390/s23010550","url":"https://dblp.org/rec/journals/sensors/RaoB23"}, "url":"URL#229364" }, { "@score":"3", "@id":"229575", "info":{"authors":{"author":[{"@pid":"321/2102","text":"Sandris Rucevskis"},{"@pid":"54/6470","text":"Tomasz Rogala"},{"@pid":"143/4894","text":"Andrzej Katunin"}]},"title":"Monitoring of Damage in Composite Structures Using an Optimized Sensor Network: A Data-Driven Experimental Approach.","venue":"Sensors","volume":"23","number":"4","pages":"2290","year":"2023","type":"Journal Articles","access":"open","key":"journals/sensors/RucevskisRK23","doi":"10.3390/S23042290","ee":"https://doi.org/10.3390/s23042290","url":"https://dblp.org/rec/journals/sensors/RucevskisRK23"}, "url":"URL#229575" }, { "@score":"3", "@id":"229604", "info":{"authors":{"author":[{"@pid":"328/0638","text":"Mohammed Ayad Saad"},{"@pid":"259/4635","text":"Rosmina Jaafar"},{"@pid":"190/0941","text":"Kalaivani Chellappan"}]},"title":"Variable-Length Multiobjective Social Class Optimization for Trust-Aware Data Gathering in Wireless Sensor Networks.","venue":"Sensors","volume":"23","number":"12","pages":"5526","year":"2023","type":"Journal Articles","access":"open","key":"journals/sensors/SaadJC23","doi":"10.3390/S23125526","ee":"https://doi.org/10.3390/s23125526","url":"https://dblp.org/rec/journals/sensors/SaadJC23"}, "url":"URL#229604" }, { "@score":"3", "@id":"230788", "info":{"authors":{"author":[{"@pid":"295/1332","text":"Ivan Vajs"},{"@pid":"43/10958","text":"Dejan Drajic"},{"@pid":"117/7172","text":"Zoran Cica"}]},"title":"Data-Driven Machine Learning Calibration Propagation in A Hybrid Sensor Network for Air Quality Monitoring.","venue":"Sensors","volume":"23","number":"5","pages":"2815","year":"2023","type":"Journal Articles","access":"open","key":"journals/sensors/VajsDC23","doi":"10.3390/S23052815","ee":"https://doi.org/10.3390/s23052815","url":"https://dblp.org/rec/journals/sensors/VajsDC23"}, "url":"URL#230788" }, { "@score":"3", "@id":"231304", "info":{"authors":{"author":[{"@pid":"257/9446","text":"Patikiri Arachchige Don Shehan Nilmantha Wijesekara"},{"@pid":"217/9889","text":"Kushan Sudheera Kalupahana Liyanage"},{"@pid":"204/7595","text":"Gammana Guruge Nadeesha Sandamali"},{"@pid":"43/4035","text":"Peter Han Joo Chong"}]},"title":"An Optimization Framework for Data Collection in Software Defined Vehicular Networks.","venue":"Sensors","volume":"23","number":"3","pages":"1600","year":"2023","type":"Journal Articles","access":"open","key":"journals/sensors/WijesekaraLSC23","doi":"10.3390/S23031600","ee":"https://doi.org/10.3390/s23031600","url":"https://dblp.org/rec/journals/sensors/WijesekaraLSC23"}, "url":"URL#231304" }, { "@score":"3", "@id":"234265", "info":{"authors":{"author":[{"@pid":"99/8649","text":"Vaibhav Singh"},{"@pid":"183/1409","text":"Tusher Chakraborty"},{"@pid":"224/2097","text":"Suraj Jog"},{"@pid":"365/4222","text":"Om Chabra"},{"@pid":"149/9280","text":"Deepak Vasisht"},{"@pid":"99/2097","text":"Ranveer Chandra"}]},"title":"Exploiting Satellite Doppler for Reliable and Faster Data Download in IoT Satellite Networks.","venue":"GetMobile Mob. Comput. Commun.","volume":"27","number":"4","pages":"11-14","year":"2023","type":"Journal Articles","access":"closed","key":"journals/sigmobile/SinghCJCVC23","doi":"10.1145/3640087.3640091","ee":"https://doi.org/10.1145/3640087.3640091","url":"https://dblp.org/rec/journals/sigmobile/SinghCJCVC23"}, "url":"URL#234265" }, { "@score":"3", "@id":"234829", "info":{"authors":{"author":[{"@pid":"241/9840","text":"Zaiwei Chen"},{"@pid":"50/1000","text":"John-Paul Clarke"},{"@pid":"40/11045","text":"Siva Theja Maguluri"}]},"title":"Target Network and Truncation Overcome the Deadly Triad in \\(\\boldsymbol{Q}\\)-Learning.","venue":"SIAM J. Math. Data Sci.","volume":"5","number":"4","pages":"1078-1101","year":"2023","type":"Journal Articles","access":"closed","key":"journals/simods/ChenCM23","doi":"10.1137/22M1499261","ee":"https://doi.org/10.1137/22m1499261","url":"https://dblp.org/rec/journals/simods/ChenCM23"}, "url":"URL#234829" }, { "@score":"3", "@id":"235020", "info":{"authors":{"author":[{"@pid":"162/5783","text":"Mykola Beshley"},{"@pid":"79/1814","text":"Natalia Kryvinska"},{"@pid":"262/9018","text":"Halyna Beshley"}]},"title":"Quality of service management method in а heterogeneous wireless network using Big Data technology аnd mobile QoE application.","venue":"Simul. Model. Pract. Theory","volume":"127","pages":"102771","year":"2023","type":"Journal Articles","access":"closed","key":"journals/simpra/BeshleyKB23","doi":"10.1016/J.SIMPAT.2023.102771","ee":"https://doi.org/10.1016/j.simpat.2023.102771","url":"https://dblp.org/rec/journals/simpra/BeshleyKB23"}, "url":"URL#235020" }, { "@score":"3", "@id":"235213", "info":{"authors":{"author":{"@pid":"361/1387","text":"Minmin Guo"}},"title":"STEAM Education Concept in English Teaching Practice Process Based on Big Data Evolutionary Network Influence Analysis.","venue":"EAI Endorsed Trans. Scalable Inf. Syst.","volume":"10","number":"6","year":"2023","type":"Journal Articles","access":"open","key":"journals/sis/Guo23","doi":"10.4108/EETSIS.3828","ee":"https://doi.org/10.4108/eetsis.3828","url":"https://dblp.org/rec/journals/sis/Guo23"}, "url":"URL#235213" }, { "@score":"3", "@id":"235272", "info":{"authors":{"author":[{"@pid":"295/2427","text":"Kadir Aktas"},{"@pid":"346/0675","text":"Vuk Ignjatovic"},{"@pid":"197/4330","text":"Dragan Ilic"},{"@pid":"198/9447","text":"Marina Marjanovic"},{"@pid":"73/2033","text":"Gholamreza Anbarjafari"}]},"title":"Deep convolutional neural networks for detection of abnormalities in chest X-rays trained on the very large dataset.","venue":"Signal Image Video Process.","volume":"17","number":"4","pages":"1035-1041","year":"2023","type":"Journal Articles","access":"closed","key":"journals/sivp/AktasIIMA23","doi":"10.1007/S11760-022-02309-W","ee":"https://doi.org/10.1007/s11760-022-02309-w","url":"https://dblp.org/rec/journals/sivp/AktasIIMA23"}, "url":"URL#235272" }, { "@score":"3", "@id":"235770", "info":{"authors":{"author":[{"@pid":"264/6114","text":"Ahmed Al-Hilo"},{"@pid":"252/1192","text":"Moataz Samir 0001"},{"@pid":"206/9845","text":"Mohamed Kadry Elhattab"},{"@pid":"a/ChadiAssi","text":"Chadi Assi"},{"@pid":"54/906","text":"Sanaa Sharafeddine"}]},"title":"RIS-Assisted UAV for Timely Data Collection in IoT Networks.","venue":"IEEE Syst. J.","volume":"17","number":"1","pages":"431-442","year":"2023","type":"Journal Articles","access":"closed","key":"journals/sj/AlHiloSEAS23","doi":"10.1109/JSYST.2022.3215279","ee":"https://doi.org/10.1109/JSYST.2022.3215279","url":"https://dblp.org/rec/journals/sj/AlHiloSEAS23"}, "url":"URL#235770" }, { "@score":"3", "@id":"235822", "info":{"authors":{"author":[{"@pid":"247/2238","text":"Yaqian Chen"},{"@pid":"143/0847","text":"Wanguo Jiao"},{"@pid":"22/10758","text":"Wenrui Yu"}]},"title":"The Combined Strategy of Energy Replenishment and Data Collection in Heterogenous Wireless Rechargeable Sensor Networks.","venue":"IEEE Syst. J.","volume":"17","number":"3","pages":"4267-4278","year":"2023","type":"Journal Articles","access":"closed","key":"journals/sj/ChenJY23","doi":"10.1109/JSYST.2022.3227111","ee":"https://doi.org/10.1109/JSYST.2022.3227111","url":"https://dblp.org/rec/journals/sj/ChenJY23"}, "url":"URL#235822" }, { "@score":"3", "@id":"236149", "info":{"authors":{"author":[{"@pid":"42/5060","text":"Andrey V. Savkin"},{"@pid":"18/4087-6","text":"Chao Huang 0006"},{"@pid":"31/2597-1","text":"Wei Ni 0001"}]},"title":"Collision-Free 3-D Navigation of a UAV Team for Optimal Data Collection in Internet-of-Things Networks With Reconfigurable Intelligent Surfaces.","venue":"IEEE Syst. J.","volume":"17","number":"3","pages":"4070-4077","year":"2023","type":"Journal Articles","access":"closed","key":"journals/sj/SavkinHN23","doi":"10.1109/JSYST.2023.3269095","ee":"https://doi.org/10.1109/JSYST.2023.3269095","url":"https://dblp.org/rec/journals/sj/SavkinHN23"}, "url":"URL#236149" }, { "@score":"3", "@id":"236347", "info":{"authors":{"author":[{"@pid":"165/9900","text":"Yawen Zheng"},{"@pid":"77/2095","text":"Kwan-Wu Chin"}]},"title":"On Data Collection in SIC-Capable Space-Air-Ground Integrated IoT Networks.","venue":"IEEE Syst. J.","volume":"17","number":"1","pages":"1431-1442","year":"2023","type":"Journal Articles","access":"closed","key":"journals/sj/ZhengC23","doi":"10.1109/JSYST.2022.3165061","ee":"https://doi.org/10.1109/JSYST.2022.3165061","url":"https://dblp.org/rec/journals/sj/ZhengC23"}, "url":"URL#236347" }, { "@score":"3", "@id":"237098", "info":{"authors":{"author":{"@pid":"270/7475","text":"G. S. Karthick"}},"title":"Energy-Aware Reliable Medium Access Control Protocol for Energy-Efficient and Reliable Data Communication in Wireless Sensor Networks.","venue":"SN Comput. Sci.","volume":"4","number":"5","pages":"449","year":"2023","type":"Journal Articles","access":"closed","key":"journals/sncs/Karthick23","doi":"10.1007/S42979-023-01869-Z","ee":"https://doi.org/10.1007/s42979-023-01869-z","url":"https://dblp.org/rec/journals/sncs/Karthick23"}, "url":"URL#237098" }, { "@score":"3", "@id":"237193", "info":{"authors":{"author":[{"@pid":"302/2808","text":"H. M. Mahantesh"},{"@pid":"183/5667","text":"M. Nageswara Guptha"},{"@pid":"285/7525","text":"M. S. Hema"}]},"title":"Energy-QoS-Aware Data Communication and Optimal Path Selection in Software-Defined Networks Using EOMBA and IBSO.","venue":"SN Comput. Sci.","volume":"4","number":"6","pages":"813","year":"2023","type":"Journal Articles","access":"closed","key":"journals/sncs/MahanteshGH23","doi":"10.1007/S42979-023-02253-7","ee":"https://doi.org/10.1007/s42979-023-02253-7","url":"https://dblp.org/rec/journals/sncs/MahanteshGH23"}, "url":"URL#237193" }, { "@score":"4", "@id":"237208", "info":{"authors":{"author":[{"@pid":"356/6510","text":"Ramesh Mandali"},{"@pid":"356/6706","text":"B. Tirapathi Reddy"}]},"title":"An Efficient Unique Tokenized Authentication Technique Based Data Offloading Approach Using Key Exchange to Maintain Data Integrity in Heterogeneous Networks.","venue":"SN Comput. Sci.","volume":"4","number":"5","pages":"693","year":"2023","type":"Journal Articles","access":"closed","key":"journals/sncs/MandaliR23","doi":"10.1007/S42979-023-02047-X","ee":"https://doi.org/10.1007/s42979-023-02047-x","url":"https://dblp.org/rec/journals/sncs/MandaliR23"}, "url":"URL#237208" }, { "@score":"3", "@id":"237334", "info":{"authors":{"author":[{"@pid":"361/1798","text":"Anand Raje"},{"@pid":"75/6749","text":"Anupam Agrawal"},{"@pid":"361/1678","text":"T. Santhosh"},{"@pid":"38/10244","text":"Indrajit De"},{"@pid":"361/1836","text":"Sushanta Sinha"},{"@pid":"361/1535","text":"Joherul Haq"},{"@pid":"361/1291","text":"Subodh Sachan"},{"@pid":"361/1414","text":"Manjit Nayak"}]},"title":"An Edge Computing Architecture for Internet Measurement Network to Measure and Analyze Protocol Data.","venue":"SN Comput. Sci.","volume":"4","number":"6","pages":"822","year":"2023","type":"Journal Articles","access":"closed","key":"journals/sncs/RajeASDSHSN23","doi":"10.1007/S42979-023-02267-1","ee":"https://doi.org/10.1007/s42979-023-02267-1","url":"https://dblp.org/rec/journals/sncs/RajeASDSHSN23"}, "url":"URL#237334" }, { "@score":"3", "@id":"237556", "info":{"authors":{"author":[{"@pid":"340/8814","text":"K. P. Vidyashree"},{"@pid":"288/3866","text":"A. B. Rajendra"}]},"title":"An Improvised Sentiment Analysis Model on Twitter Data Using Stochastic Gradient Descent (SGD) Optimization Algorithm in Stochastic Gate Neural Network (SGNN).","venue":"SN Comput. Sci.","volume":"4","number":"2","pages":"190","year":"2023","type":"Journal Articles","access":"closed","key":"journals/sncs/VidyashreeR23","doi":"10.1007/S42979-022-01607-X","ee":"https://doi.org/10.1007/s42979-022-01607-x","url":"https://dblp.org/rec/journals/sncs/VidyashreeR23"}, "url":"URL#237556" }, { "@score":"3", "@id":"238162", "info":{"title":"Retraction Note: An improving data delivery method using EEDD algorithm for energy conservation in green cloud network.","venue":"Soft Comput.","volume":"27","number":"6","pages":"3557","year":"2023","type":"Journal Articles","access":"closed","key":"journals/soco/KaruppasamyB23","doi":"10.1007/S00500-023-07867-W","ee":"https://doi.org/10.1007/s00500-023-07867-w","url":"https://dblp.org/rec/journals/soco/KaruppasamyB23"}, "url":"URL#238162" }, { "@score":"3", "@id":"238291", "info":{"authors":{"author":{"@pid":"74/7037","text":"Liu Liu"}},"title":"Design of NoSQL database in oral English teaching based on 5G network and AI recognition.","venue":"Soft Comput.","volume":"27","number":"14","pages":"10337-10345","year":"2023","type":"Journal Articles","access":"closed","key":"journals/soco/Liu23d","doi":"10.1007/S00500-023-08306-6","ee":"https://doi.org/10.1007/s00500-023-08306-6","url":"https://dblp.org/rec/journals/soco/Liu23d"}, "url":"URL#238291" }, { "@score":"3", "@id":"238584", "info":{"authors":{"author":[{"@pid":"350/7411","text":"Keiwan Soltani"},{"@pid":"92/7402","text":"Leili Farzinvash"},{"@pid":"43/3612","text":"Mohammad Ali Balafar"}]},"title":"Trust-aware and energy-efficient data gathering in wireless sensor networks using PSO.","venue":"Soft Comput.","volume":"27","number":"16","pages":"11731-11754","year":"2023","type":"Journal Articles","access":"closed","key":"journals/soco/SoltaniFB23","doi":"10.1007/S00500-023-07856-Z","ee":"https://doi.org/10.1007/s00500-023-07856-z","url":"https://dblp.org/rec/journals/soco/SoltaniFB23"}, "url":"URL#238584" }, { "@score":"3", "@id":"238707", "info":{"authors":{"author":[{"@pid":"346/4744","text":"Suyun Wen"},{"@pid":"347/5936","text":"Zheng Suying"}]},"title":"Application of big data classification effects based on neural network in video English course and relevant optimization suggestions.","venue":"Soft Comput.","volume":"27","number":"11","pages":"7615-7625","year":"2023","type":"Journal Articles","access":"closed","key":"journals/soco/WenS23","doi":"10.1007/S00500-023-08123-X","ee":"https://doi.org/10.1007/s00500-023-08123-x","url":"https://dblp.org/rec/journals/soco/WenS23"}, "url":"URL#238707" }, { "@score":"3", "@id":"238852", "info":{"authors":{"author":[{"@pid":"78/2949","text":"Ke Zhou"},{"@pid":"358/8075","text":"En Meng"},{"@pid":"219/8482","text":"Qingren Jin"},{"@pid":"358/7902","text":"Bofeng Luo"},{"@pid":"00/9809","text":"Bing Tian"}]},"title":"Evaluation of data governance effectiveness in power grid enterprises using deep neural network.","venue":"Soft Comput.","volume":"27","number":"23","pages":"18333-18351","year":"2023","type":"Journal Articles","access":"closed","key":"journals/soco/ZhouMJLT23","doi":"10.1007/S00500-023-09210-9","ee":"https://doi.org/10.1007/s00500-023-09210-9","url":"https://dblp.org/rec/journals/soco/ZhouMJLT23"}, "url":"URL#238852" }, { "@score":"3", "@id":"240608", "info":{"authors":{"author":[{"@pid":"192/5237","text":"Ting Pan"},{"@pid":"40/10428","text":"Renguang Zuo"},{"@pid":"203/1965","text":"Ziye Wang"}]},"title":"Geological Mapping via Convolutional Neural Network Based on Remote Sensing and Geochemical Survey Data in Vegetation Coverage Areas.","venue":"IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens.","volume":"16","pages":"3485-3494","year":"2023","type":"Journal Articles","access":"open","key":"journals/staeors/PanZW23","doi":"10.1109/JSTARS.2023.3260584","ee":"https://doi.org/10.1109/JSTARS.2023.3260584","url":"https://dblp.org/rec/journals/staeors/PanZW23"}, "url":"URL#240608" }, { "@score":"3", "@id":"241810", "info":{"authors":{"author":[{"@pid":"315/9154","text":"Tuan-Hong Chua"},{"@pid":"29/8474","text":"Iftekhar Salam"}]},"title":"Evaluation of Machine Learning Algorithms in Network-Based Intrusion Detection Using Progressive Dataset.","venue":"Symmetry","volume":"15","number":"6","pages":"1251","year":"2023","type":"Journal Articles","access":"open","key":"journals/symmetry/ChuaS23","doi":"10.3390/SYM15061251","ee":"https://doi.org/10.3390/sym15061251","url":"https://dblp.org/rec/journals/symmetry/ChuaS23"}, "url":"URL#241810" }, { "@score":"3", "@id":"242216", "info":{"authors":{"author":[{"@pid":"173/9510","text":"Honghai Ji"},{"@pid":"47/4497","text":"Jie Mei"},{"@pid":"58/6810-34","text":"Li Wang 0034"},{"@pid":"150/4165","text":"Shida Liu"},{"@pid":"60/9427","text":"Ye Ren"}]},"title":"Data-Driven Kalman Consensus Filtering for Connected Vehicle Speed Estimation in a Multi-Sensor Network.","venue":"Symmetry","volume":"15","number":"9","pages":"1699","year":"2023","type":"Journal Articles","access":"open","key":"journals/symmetry/JiMWLR23","doi":"10.3390/SYM15091699","ee":"https://doi.org/10.3390/sym15091699","url":"https://dblp.org/rec/journals/symmetry/JiMWLR23"}, "url":"URL#242216" }, { "@score":"3", "@id":"242914", "info":{"authors":{"author":[{"@pid":"202/8557","text":"Breno Santana Santos"},{"@pid":"193/9971","text":"Ivanovitch Silva"},{"@pid":"46/10364","text":"Daniel G. Costa"}]},"title":"Symmetry in Scientific Collaboration Networks: A Study Using Temporal Graph Data Science and Scientometrics.","venue":"Symmetry","volume":"15","number":"3","pages":"601","year":"2023","type":"Journal Articles","access":"open","key":"journals/symmetry/SantosSC23","doi":"10.3390/SYM15030601","ee":"https://doi.org/10.3390/sym15030601","url":"https://dblp.org/rec/journals/symmetry/SantosSC23"}, "url":"URL#242914" }, { "@score":"3", "@id":"245578", "info":{"authors":{"author":[{"@pid":"129/9848","text":"Ruonan Wang"},{"@pid":"78/8276-2","text":"Zhaocheng Wang 0002"},{"@pid":"53/1729","text":"Kewen Xia"},{"@pid":"54/10341","text":"Huanxin Zou"},{"@pid":"116/1011","text":"Jun Li"}]},"title":"Target Recognition in Single-Channel SAR Images Based on the Complex-Valued Convolutional Neural Network With Data Augmentation.","venue":"IEEE Trans. Aerosp. Electron. Syst.","volume":"59","number":"2","pages":"796-804","year":"2023","type":"Journal Articles","access":"closed","key":"journals/taes/WangWXZL23","doi":"10.1109/TAES.2022.3190804","ee":"https://doi.org/10.1109/TAES.2022.3190804","url":"https://dblp.org/rec/journals/taes/WangWXZL23"}, "url":"URL#245578" }, { "@score":"3", "@id":"246124", "info":{"authors":{"author":[{"@pid":"245/2913","text":"Erico Tjoa"},{"@pid":"95/7006","text":"Cuntai Guan"}]},"title":"Quantifying Explainability of Saliency Methods in Deep Neural Networks With a Synthetic Dataset.","venue":"IEEE Trans. Artif. Intell.","volume":"4","number":"4","pages":"858-870","year":"2023","type":"Journal Articles","access":"open","key":"journals/tai/TjoaG23","doi":"10.1109/TAI.2022.3228834","ee":"https://doi.org/10.1109/TAI.2022.3228834","url":"https://dblp.org/rec/journals/tai/TjoaG23"}, "url":"URL#246124" }, { "@score":"3", "@id":"246226", "info":{"authors":{"author":[{"@pid":"71/7427","text":"Chinmay Chakraborty"},{"@pid":"34/7561","text":"Shaohua Wan 0001"},{"@pid":"173/5208","text":"Mohammad Reza Khosravi"}]},"title":"Editorial: Ontology-based Knowledge Presentation and Computational Linguistics for Semantic Big Social Data Analytics in Asian Social Networks.","venue":"ACM Trans. Asian Low Resour. Lang. Inf. Process.","volume":"22","number":"5","pages":"136:1-136:3","year":"2023","type":"Journal Articles","access":"closed","key":"journals/talip/ChakrabortyWK23","doi":"10.1145/3594719","ee":"https://doi.org/10.1145/3594719","url":"https://dblp.org/rec/journals/talip/ChakrabortyWK23"}, "url":"URL#246226" }, { "@score":"3", "@id":"247652", "info":{"authors":{"author":[{"@pid":"203/9499","text":"Yu-Xuan Qiu"},{"@pid":"92/8453-1","text":"Dong Wen 0001"},{"@pid":"37/548","text":"Rong-Hua Li"},{"@pid":"51/5585","text":"Lu Qin 0001"},{"@pid":"39/8236","text":"Michael Yu"},{"@pid":"l/LinXuemin","text":"Xuemin Lin 0001"}]},"title":"Computing Significant Cliques in Large Labeled Networks.","venue":"IEEE Trans. Big Data","volume":"9","number":"3","pages":"904-917","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tbd/QiuWLQYL23","doi":"10.1109/TBDATA.2022.3223644","ee":"https://doi.org/10.1109/TBDATA.2022.3223644","url":"https://dblp.org/rec/journals/tbd/QiuWLQYL23"}, "url":"URL#247652" }, { "@score":"3", "@id":"248083", "info":{"authors":{"author":[{"@pid":"202/3794","text":"Weibei Fan"},{"@pid":"91/8079-1","text":"Fu Xiao 0001"},{"@pid":"09/8662","text":"Hui Cai"},{"@pid":"65/7188","text":"Xiaobai Chen"},{"@pid":"90/3575-1","text":"Shui Yu 0001"}]},"title":"Disjoint Paths Construction and Fault-Tolerant Routing in BCube of Data Center Networks.","venue":"IEEE Trans. Computers","volume":"72","number":"9","pages":"2467-2481","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tc/FanXCCY23","doi":"10.1109/TC.2023.3251849","ee":"https://doi.org/10.1109/TC.2023.3251849","url":"https://dblp.org/rec/journals/tc/FanXCCY23"}, "url":"URL#248083" }, { "@score":"3", "@id":"248159", "info":{"authors":{"author":[{"@pid":"293/8322","text":"Wanling Lin"},{"@pid":"58/6900","text":"Xiao-Yan Li"},{"@pid":"08/4586","text":"Jou-Ming Chang"},{"@pid":"j/XiaohuaJia","text":"Xiaohua Jia"}]},"title":"Constructing Multiple CISTs on BCube-Based Data Center Networks in the Occurrence of Switch Failures.","venue":"IEEE Trans. Computers","volume":"72","number":"7","pages":"1971-1984","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tc/LinLCJ23","doi":"10.1109/TC.2022.3230288","ee":"https://doi.org/10.1109/TC.2022.3230288","url":"https://dblp.org/rec/journals/tc/LinLCJ23"}, "url":"URL#248159" }, { "@score":"3", "@id":"248229", "info":{"authors":{"author":[{"@pid":"231/3897","text":"Chrysostomos Symvoulidis"},{"@pid":"180/2481","text":"Athanasios Kiourtis"},{"@pid":"286/5643","text":"George Marinos"},{"@pid":"320/9529","text":"Jean-Didier Totow Tom-Ata"},{"@pid":"295/5341","text":"George Manias"},{"@pid":"180/2533","text":"Argyro Mavrogiorgou"},{"@pid":"85/4341","text":"Dimosthenis Kyriazis"}]},"title":"A User Mobility-Based Data Placement Strategy in a Hybrid Cloud/Edge Environment Using a Causal-Aware Deep Learning Network.","venue":"IEEE Trans. Computers","volume":"72","number":"12","pages":"3603-3616","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tc/SymvoulidisKMTMMK23","doi":"10.1109/TC.2023.3311921","ee":"https://doi.org/10.1109/TC.2023.3311921","url":"https://dblp.org/rec/journals/tc/SymvoulidisKMTMMK23"}, "url":"URL#248229" }, { "@score":"3", "@id":"248642", "info":{"authors":{"author":[{"@pid":"227/5257","text":"Yuntao Wei"},{"@pid":"37/5333","text":"Xueyan Wang"},{"@pid":"165/9581","text":"Shangtong Zhang"},{"@pid":"99/9547-1","text":"Jianlei Yang 0001"},{"@pid":"154/3032","text":"Xiaotao Jia"},{"@pid":"89/9136","text":"Zhaohao Wang"},{"@pid":"04/3130","text":"Gang Qu 0001"},{"@pid":"48/5196","text":"Weisheng Zhao"}]},"title":"IMGA: Efficient In-Memory Graph Convolution Network Aggregation With Data Flow Optimizations.","venue":"IEEE Trans. Comput. Aided Des. Integr. Circuits Syst.","volume":"42","number":"12","pages":"4695-4705","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tcad/WeiWZYJWQZ23","doi":"10.1109/TCAD.2023.3288509","ee":"https://doi.org/10.1109/TCAD.2023.3288509","url":"https://dblp.org/rec/journals/tcad/WeiWZYJWQZ23"}, "url":"URL#248642" }, { "@score":"3", "@id":"248715", "info":{"authors":{"author":[{"@pid":"160/1659","text":"Zimeng Zhou"},{"@pid":"132/8094","text":"Chenchen Fu"},{"@pid":"x/ChunJasonXue","text":"Chun Jason Xue"},{"@pid":"80/806-2","text":"Song Han 0002"},{"@pid":"10/4661-173","text":"Wei Zhang 0173"},{"@pid":"97/3791-1","text":"Lei Ju 0001"}]},"title":"Optimizing Worst Case Data Freshness in RF-Powered Networked Embedded Systems.","venue":"IEEE Trans. Comput. Aided Des. Integr. Circuits Syst.","volume":"42","number":"9","pages":"2877-2888","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tcad/ZhouFXHZJ23","doi":"10.1109/TCAD.2023.3235799","ee":"https://doi.org/10.1109/TCAD.2023.3235799","url":"https://dblp.org/rec/journals/tcad/ZhouFXHZJ23"}, "url":"URL#248715" }, { "@score":"3", "@id":"250263", "info":{"authors":{"author":[{"@pid":"206/9953","text":"Qie Liu"},{"@pid":"167/0531","text":"Junhao Li"},{"@pid":"32/8808","text":"Mingyu Dong"},{"@pid":"99/76-13","text":"Min Liu 0013"},{"@pid":"72/6108","text":"Yi Chai"}]},"title":"Identification of Gene Regulatory Networks Using Variational Bayesian Inference in the Presence of Missing Data.","venue":"IEEE ACM Trans. Comput. Biol. Bioinform.","volume":"20","number":"1","pages":"399-409","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tcbb/LiuLDLC23","doi":"10.1109/TCBB.2022.3144418","ee":"https://doi.org/10.1109/TCBB.2022.3144418","url":"https://dblp.org/rec/journals/tcbb/LiuLDLC23"}, "url":"URL#250263" }, { "@score":"3", "@id":"250298", "info":{"authors":{"author":[{"@pid":"310/6337","text":"Zhichen Ni"},{"@pid":"35/7221","text":"Honglong Chen"},{"@pid":"11/751","text":"Zhe Li"},{"@pid":"35/6677","text":"Xiaomeng Wang"},{"@pid":"18/10185","text":"Na Yan"},{"@pid":"23/1112-1","text":"Weifeng Liu 0001"},{"@pid":"62/3147","text":"Feng Xia 0001"}]},"title":"MSCET: A Multi-Scenario Offloading Schedule for Biomedical Data Processing and Analysis in Cloud-Edge-Terminal Collaborative Vehicular Networks.","venue":"IEEE ACM Trans. Comput. Biol. Bioinform.","volume":"20","number":"4","pages":"2376-2386","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tcbb/NiCLWYLX23","doi":"10.1109/TCBB.2021.3131177","ee":"https://doi.org/10.1109/TCBB.2021.3131177","url":"https://dblp.org/rec/journals/tcbb/NiCLWYLX23"}, "url":"URL#250298" }, { "@score":"3", "@id":"250485", "info":{"authors":{"author":[{"@pid":"342/1744","text":"Wei-Kang Chung"},{"@pid":"87/6284","text":"Yun Li"},{"@pid":"15/4131","text":"Chih-Heng Ke"},{"@pid":"63/3158","text":"Sun-Yuan Hsieh"},{"@pid":"z/AlbertYZomaya","text":"Albert Y. Zomaya"},{"@pid":"b/RajkumarBuyya","text":"Rajkumar Buyya"}]},"title":"Dynamic Parallel Flow Algorithms With Centralized Scheduling for Load Balancing in Cloud Data Center Networks.","venue":"IEEE Trans. Cloud Comput.","volume":"11","number":"1","pages":"1050-1064","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tcc/ChungLKHZB23","doi":"10.1109/TCC.2021.3129768","ee":"https://doi.org/10.1109/TCC.2021.3129768","url":"https://dblp.org/rec/journals/tcc/ChungLKHZB23"}, "url":"URL#250485" }, { "@score":"3", "@id":"250511", "info":{"authors":{"author":[{"@pid":"138/4338","text":"Chengxi Gao"},{"@pid":"280/7294","text":"Shuhui Chu"},{"@pid":"01/5265-1","text":"Hong Xu 0001"},{"@pid":"130/0196","text":"Minxian Xu"},{"@pid":"68/7938","text":"Kejiang Ye"},{"@pid":"x/ChengZhongXu","text":"Chengzhong Xu 0001"}]},"title":"Flash: Joint Flow Scheduling and Congestion Control in Data Center Networks.","venue":"IEEE Trans. Cloud Comput.","volume":"11","number":"1","pages":"1038-1049","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tcc/GaoCXXYX23","doi":"10.1109/TCC.2021.3129511","ee":"https://doi.org/10.1109/TCC.2021.3129511","url":"https://dblp.org/rec/journals/tcc/GaoCXXYX23"}, "url":"URL#250511" }, { "@score":"3", "@id":"250519", "info":{"authors":{"author":[{"@pid":"145/8541","text":"Zehua Guo 0001"},{"@pid":"67/2647","text":"Jiayu Wang"},{"@pid":"91/3699-2","text":"Sen Liu 0002"},{"@pid":"196/2918","text":"Jineng Ren"},{"@pid":"61/3906-10","text":"Yang Xu 0010"},{"@pid":"99/6747","text":"Chao Yao"}]},"title":"Congestion-Aware Critical Gradient Scheduling for Distributed Machine Learning in Data Center Networks.","venue":"IEEE Trans. Cloud Comput.","volume":"11","number":"3","pages":"2296-2311","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tcc/GuoWLRXY23","doi":"10.1109/TCC.2022.3197350","ee":"https://doi.org/10.1109/TCC.2022.3197350","url":"https://dblp.org/rec/journals/tcc/GuoWLRXY23"}, "url":"URL#250519" }, { "@score":"4", "@id":"250696", "info":{"authors":{"author":[{"@pid":"236/2140","text":"Shengnan Yue"},{"@pid":"09/1280","text":"Xiao Lin"},{"@pid":"15/2772","text":"Weiqiang Sun"},{"@pid":"25/1659","text":"Weisheng Hu"}]},"title":"Modeling Sparse Store-and-Forward Bulk Data Transfers in Inter-Datacenter Networks With Multiple Congested Links.","venue":"IEEE Trans. Cloud Comput.","volume":"11","number":"3","pages":"2725-2738","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tcc/YueLSH23","doi":"10.1109/TCC.2022.3225977","ee":"https://doi.org/10.1109/TCC.2022.3225977","url":"https://dblp.org/rec/journals/tcc/YueLSH23"}, "url":"URL#250696" }, { "@score":"3", "@id":"250800", "info":{"authors":{"author":[{"@pid":"58/3449","text":"Xiaoyu Song"},{"@pid":"77/2095","text":"Kwan-Wu Chin"}]},"title":"Maximizing Packets Collection in Wireless Powered IoT Networks With Charge-or-Data Time Slots.","venue":"IEEE Trans. Cogn. Commun. Netw.","volume":"9","number":"4","pages":"1067-1079","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tccn/SongC23","doi":"10.1109/TCCN.2023.3269508","ee":"https://doi.org/10.1109/TCCN.2023.3269508","url":"https://dblp.org/rec/journals/tccn/SongC23"}, "url":"URL#250800" }, { "@score":"3", "@id":"251399", "info":{"authors":{"author":[{"@pid":"243/7986","text":"Guanhua Chai"},{"@pid":"42/5464","text":"Weihua Wu"},{"@pid":"23/43","text":"Qinghai Yang"},{"@pid":"16/6654","text":"F. Richard Yu"}]},"title":"Data-Driven Resource Allocation and Group Formation for Platoon in V2X Networks With CSI Uncertainty.","venue":"IEEE Trans. Commun.","volume":"71","number":"12","pages":"7117-7132","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tcom/ChaiWYY23","doi":"10.1109/TCOMM.2023.3311455","ee":"https://doi.org/10.1109/TCOMM.2023.3311455","url":"https://dblp.org/rec/journals/tcom/ChaiWYY23"}, "url":"URL#251399" }, { "@score":"3", "@id":"252241", "info":{"authors":{"author":[{"@pid":"336/7660","text":"Putty Srividya"},{"@pid":"336/7539","text":"Lavadya Nirmala Devi"},{"@pid":"335/7687","text":"A. Nageswar Rao"}]},"title":"A trusted effective approach for forecasting the failure of data link and intrusion in wireless sensor networks.","venue":"Theor. Comput. Sci.","volume":"941","pages":"1-13","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tcs/SrividyaDR23","doi":"10.1016/J.TCS.2022.08.004","ee":"https://doi.org/10.1016/j.tcs.2022.08.004","url":"https://dblp.org/rec/journals/tcs/SrividyaDR23"}, "url":"URL#252241" }, { "@score":"3", "@id":"253590", "info":{"authors":{"author":[{"@pid":"173/9510","text":"Honghai Ji"},{"@pid":"308/9546","text":"Yuzhou Wei"},{"@pid":"11/2636-2","text":"Lingling Fan 0002"},{"@pid":"150/4165","text":"Shida Liu"},{"@pid":"36/1628","text":"Zhongsheng Hou"},{"@pid":"58/6810-34","text":"Li Wang 0034"}]},"title":"Data-Driven Distributed Information-Weighted Consensus Filtering in Discrete-Time Sensor Networks With Switching Topologies.","venue":"IEEE Trans. Cybern.","volume":"53","number":"12","pages":"7548-7559","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tcyb/JiWFLHW23","doi":"10.1109/TCYB.2022.3166649","ee":"https://doi.org/10.1109/TCYB.2022.3166649","url":"https://dblp.org/rec/journals/tcyb/JiWFLHW23"}, "url":"URL#253590" }, { "@score":"3", "@id":"254989", "info":{"authors":{"author":[{"@pid":"218/5902","text":"Raaid Alubady"},{"@pid":"361/0924","text":"Mays Salman"},{"@pid":"03/6748","text":"Ahmed S. Mohamed"}]},"title":"A review of modern caching strategies in named data network: overview, classification, and research directions.","venue":"Telecommun. Syst.","volume":"84","number":"4","pages":"581-626","year":"2023","type":"Journal Articles","access":"closed","key":"journals/telsys/AlubadySM23","doi":"10.1007/S11235-023-01015-3","ee":"https://doi.org/10.1007/s11235-023-01015-3","url":"https://dblp.org/rec/journals/telsys/AlubadySM23"}, "url":"URL#254989" }, { "@score":"3", "@id":"255449", "info":{"authors":{"author":[{"@pid":"184/3479","text":"Chang Ruan"},{"@pid":"75/2669-1","text":"Jianxin Wang 0001"},{"@pid":"05/8330","text":"Wanchun Jiang"},{"@pid":"15/4777-19","text":"Tao Zhang 0019"}]},"title":"Scheduling Coflows by Online Identification in Data Center Network.","venue":"IEEE Trans. Emerg. Top. Comput.","volume":"11","number":"4","pages":"1057-1069","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tetc/RuanWJZ23","doi":"10.1109/TETC.2023.3315512","ee":"https://doi.org/10.1109/TETC.2023.3315512","url":"https://dblp.org/rec/journals/tetc/RuanWJZ23"}, "url":"URL#255449" }, { "@score":"3", "@id":"255556", "info":{"authors":{"author":[{"@pid":"272/3830","text":"Abdulrahman Takiddin"},{"@pid":"62/11297","text":"Rachad Atat"},{"@pid":"08/10810-1","text":"Muhammad Ismail 0001"},{"@pid":"261/4896","text":"Osman Boyaci"},{"@pid":"127/9876","text":"Katherine R. Davis 0001"},{"@pid":"22/4717","text":"Erchin Serpedin"}]},"title":"Generalized Graph Neural Network-Based Detection of False Data Injection Attacks in Smart Grids.","venue":"IEEE Trans. Emerg. Top. Comput. Intell.","volume":"7","number":"3","pages":"618-630","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tetci/TakiddinAIBDS23","doi":"10.1109/TETCI.2022.3232821","ee":"https://doi.org/10.1109/TETCI.2022.3232821","url":"https://dblp.org/rec/journals/tetci/TakiddinAIBDS23"}, "url":"URL#255556" }, { "@score":"3", "@id":"255729", "info":{"authors":{"author":[{"@pid":"k/NikolaKKasabov","text":"Nikola K. Kasabov"},{"@pid":"363/1261","text":"Yongyao Tan"},{"@pid":"168/4512","text":"Maryam Gholami Doborjeh"},{"@pid":"146/8165","text":"Enmei Tu"},{"@pid":"12/1198-2","text":"Jie Yang 0002"},{"@pid":"66/10932","text":"Wilson Wen Bin Goh"},{"@pid":"164/0542","text":"Jimmy Lee"}]},"title":"Transfer Learning of Fuzzy Spatio-Temporal Rules in a Brain-Inspired Spiking Neural Network Architecture: A Case Study on Spatio-Temporal Brain Data.","venue":"IEEE Trans. Fuzzy Syst.","volume":"31","number":"12","pages":"4542-4552","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tfs/KasabovTDTYGL23","doi":"10.1109/TFUZZ.2023.3292802","ee":"https://doi.org/10.1109/TFUZZ.2023.3292802","url":"https://dblp.org/rec/journals/tfs/KasabovTDTYGL23"}, "url":"URL#255729" }, { "@score":"3", "@id":"256230", "info":{"authors":{"author":[{"@pid":"188/9565","text":"Seula Park"},{"@pid":"181/2732-4","text":"Tao Cheng 0004"}]},"title":"Framework for constructing multimodal transport networks and routing using a graph database: A case study in London.","venue":"Trans. GIS","volume":"27","number":"5","pages":"1391-1417","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tgis/ParkC23","doi":"10.1111/TGIS.13071","ee":"https://doi.org/10.1111/tgis.13071","url":"https://dblp.org/rec/journals/tgis/ParkC23"}, "url":"URL#256230" }, { "@score":"3", "@id":"256314", "info":{"authors":{"author":[{"@pid":"212/1451","text":"Stephanie B. Baker"},{"@pid":"60/2875","text":"Zhi Huang"},{"@pid":"156/2770","text":"Bronson Philippa"}]},"title":"Lightweight Neural Network for Spatiotemporal Filling of Data Gaps in Sea Surface Temperature Images.","venue":"IEEE Trans. Geosci. Remote. Sens.","volume":"61","pages":"1-10","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tgrs/BakerHP23","doi":"10.1109/TGRS.2023.3273575","ee":"https://doi.org/10.1109/TGRS.2023.3273575","url":"https://dblp.org/rec/journals/tgrs/BakerHP23"}, "url":"URL#256314" }, { "@score":"3", "@id":"256829", "info":{"authors":{"author":[{"@pid":"357/0022","text":"Xudong Jiang"},{"@pid":"07/7776","text":"Junxing Cao"},{"@pid":"362/5935","text":"Chupeng You"},{"@pid":"189/7678","text":"Xing-Jian Wang"},{"@pid":"272/4487","text":"Zhengcong Du"}]},"title":"Deep Neural Networks for Direct Hydrocarbon Detection in Prestack Seismic Data Based on AVO Analysis.","venue":"IEEE Trans. Geosci. Remote. Sens.","volume":"61","pages":"1-9","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tgrs/JiangCYWD23","doi":"10.1109/TGRS.2023.3333910","ee":"https://doi.org/10.1109/TGRS.2023.3333910","url":"https://dblp.org/rec/journals/tgrs/JiangCYWD23"}, "url":"URL#256829" }, { "@score":"3", "@id":"257868", "info":{"authors":{"author":[{"@pid":"160/0761-2","text":"Zhengwei Xu 0002"},{"@pid":"06/2293","text":"Rui Wang"},{"@pid":"41/9897","text":"Michael S. Zhdanov"},{"@pid":"124/5686","text":"Xuben Wang"},{"@pid":"116/1011","text":"Jun Li"},{"@pid":"74/2272","text":"Bing Zhang"},{"@pid":"347/6700","text":"Shengxian Liang"},{"@pid":"181/2842","text":"Yang Wang"}]},"title":"Inversion of the Gravity Gradiometry Data by ResUnet Network: An Application in Nordkapp Basin, Barents Sea.","venue":"IEEE Trans. Geosci. Remote. Sens.","volume":"61","pages":"1-10","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tgrs/XuWZWLZLW23","doi":"10.1109/TGRS.2023.3271606","ee":"https://doi.org/10.1109/TGRS.2023.3271606","url":"https://dblp.org/rec/journals/tgrs/XuWZWLZLW23"}, "url":"URL#257868" }, { "@score":"3", "@id":"259956", "info":{"authors":{"author":[{"@pid":"44/5770-3","text":"Na Wang 0003"},{"@pid":"314/2824","text":"Shancheng Zhang"},{"@pid":"181/2621","text":"Zheng Zhang"},{"@pid":"338/1870","text":"Jiawen Qiao"},{"@pid":"217/7590","text":"Junsong Fu"},{"@pid":"43/3771-1","text":"Jianwei Liu 0001"},{"@pid":"b/BKBhargava","text":"Bharat K. Bhargava"}]},"title":"Lightweight and Secure Data Transmission Scheme Against Malicious Nodes in Heterogeneous Wireless Sensor Networks.","venue":"IEEE Trans. Inf. Forensics Secur.","volume":"18","pages":"4652-4667","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tifs/WangZZQFLB23","doi":"10.1109/TIFS.2023.3297904","ee":"https://doi.org/10.1109/TIFS.2023.3297904","url":"https://dblp.org/rec/journals/tifs/WangZZQFLB23"}, "url":"URL#259956" }, { "@score":"3", "@id":"260183", "info":{"authors":{"author":[{"@pid":"50/10586","text":"Yanjiao Chen"},{"@pid":"44/5614","text":"Xiaotian Zhu"},{"@pid":"268/5832","text":"Xueluan Gong"},{"@pid":"333/3641","text":"Xinjing Yi"},{"@pid":"29/9471","text":"Shuyang Li"}]},"title":"Data Poisoning Attacks in Internet-of-Vehicle Networks: Taxonomy, State-of-The-Art, and Future Directions.","venue":"IEEE Trans. Ind. Informatics","volume":"19","number":"1","pages":"20-28","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tii/ChenZGYL23","doi":"10.1109/TII.2022.3198481","ee":"https://doi.org/10.1109/TII.2022.3198481","url":"https://dblp.org/rec/journals/tii/ChenZGYL23"}, "url":"URL#260183" }, { "@score":"3", "@id":"260383", "info":{"authors":{"author":[{"@pid":"204/8791","text":"Sunder Ali Khowaja"},{"@pid":"236/6939","text":"Parus Khuwaja"},{"@pid":"254/5735","text":"Kapal Dev"},{"@pid":"122/0027","text":"Ikhyun Lee"},{"@pid":"236/1121","text":"Wali Ullah Khan"},{"@pid":"21/10857","text":"Weizheng Wang"},{"@pid":"204/1614","text":"Nawab Muhammad Faseeh Qureshi"},{"@pid":"51/3959","text":"Maurizio Magarini"}]},"title":"A Secure Data Sharing Scheme in Community Segmented Vehicular Social Networks for 6G.","venue":"IEEE Trans. Ind. Informatics","volume":"19","number":"1","pages":"890-899","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tii/KhowajaKDLKWQM23","doi":"10.1109/TII.2022.3188963","ee":"https://doi.org/10.1109/TII.2022.3188963","url":"https://dblp.org/rec/journals/tii/KhowajaKDLKWQM23"}, "url":"URL#260383" }, { "@score":"3", "@id":"260461", "info":{"authors":{"author":[{"@pid":"322/6745","text":"Diju Liu"},{"@pid":"88/128-3","text":"Yalin Wang 0003"},{"@pid":"294/8020","text":"Chenliang Liu"},{"@pid":"65/295","text":"Xiaofeng Yuan"},{"@pid":"88/554","text":"Chunhua Yang 0001"},{"@pid":"71/2277-1","text":"Weihua Gui 0001"}]},"title":"Data Mode Related Interpretable Transformer Network for Predictive Modeling and Key Sample Analysis in Industrial Processes.","venue":"IEEE Trans. Ind. Informatics","volume":"19","number":"9","pages":"9325-9336","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tii/Liu0LY0023","doi":"10.1109/TII.2022.3227731","ee":"https://doi.org/10.1109/TII.2022.3227731","url":"https://dblp.org/rec/journals/tii/Liu0LY0023"}, "url":"URL#260461" }, { "@score":"3", "@id":"260472", "info":{"authors":{"author":[{"@pid":"164/3787","text":"Chensheng Liu"},{"@pid":"77/8863","text":"Wangli He"},{"@pid":"92/7210","text":"Ruilong Deng"},{"@pid":"19/5832","text":"Yu-Chu Tian"},{"@pid":"82/3485","text":"Wenli Du"}]},"title":"False-Data-Injection-Enabled Network Parameter Modifications in Power Systems: Attack and Detection.","venue":"IEEE Trans. Ind. Informatics","volume":"19","number":"1","pages":"177-188","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tii/LiuHDTD23","doi":"10.1109/TII.2022.3172688","ee":"https://doi.org/10.1109/TII.2022.3172688","url":"https://dblp.org/rec/journals/tii/LiuHDTD23"}, "url":"URL#260472" }, { "@score":"3", "@id":"260528", "info":{"authors":{"author":[{"@pid":"293/8408","text":"Zhengjing Ma"},{"@pid":"53/915","text":"Gang Mei"},{"@pid":"45/10235","text":"Francesco Piccialli"}]},"title":"An Attention-Based Cycle-Consistent Generative Adversarial Network for IoT Data Generation and Its Application in Smart Energy Systems.","venue":"IEEE Trans. Ind. Informatics","volume":"19","number":"4","pages":"6170-6181","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tii/MaMP23","doi":"10.1109/TII.2022.3204282","ee":"https://doi.org/10.1109/TII.2022.3204282","url":"https://dblp.org/rec/journals/tii/MaMP23"}, "url":"URL#260528" }, { "@score":"3", "@id":"260553", "info":{"authors":{"author":[{"@pid":"147/2871","text":"Khanh-Van Nguyen"},{"@pid":"242/7336","text":"Chi-Hieu Nguyen"},{"@pid":"47/1424","text":"Tien Van Do 0001"},{"@pid":"78/11326","text":"Csaba Rotter"}]},"title":"Efficient Multi-UAV Assisted Data Gathering Schemes for Maximizing the Operation Time of Wireless Sensor Networks in Precision Farming.","venue":"IEEE Trans. Ind. Informatics","volume":"19","number":"12","pages":"11664-11674","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tii/NguyenNDR23","doi":"10.1109/TII.2023.3248616","ee":"https://doi.org/10.1109/TII.2023.3248616","url":"https://dblp.org/rec/journals/tii/NguyenNDR23"}, "url":"URL#260553" }, { "@score":"3", "@id":"260866", "info":{"authors":{"author":[{"@pid":"312/7154","text":"Yuantao Yao"},{"@pid":"197/6207","text":"Minghan Yang"},{"@pid":"177/9419","text":"Jianye Wang"},{"@pid":"36/844-1","text":"Min Xie 0001"}]},"title":"Multivariate Time-Series Prediction in Industrial Processes via a Deep Hybrid Network Under Data Uncertainty.","venue":"IEEE Trans. Ind. Informatics","volume":"19","number":"2","pages":"1977-1987","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tii/YaoYWX23","doi":"10.1109/TII.2022.3198670","ee":"https://doi.org/10.1109/TII.2022.3198670","url":"https://dblp.org/rec/journals/tii/YaoYWX23"}, "url":"URL#260866" }, { "@score":"3", "@id":"260878", "info":{"authors":{"author":[{"@pid":"74/2568","text":"Hang Yu"},{"@pid":"77/2095","text":"Kwan-Wu Chin"}]},"title":"Learning Algorithms for Data Collection in RF-Charging IIoT Networks.","venue":"IEEE Trans. Ind. Informatics","volume":"19","number":"1","pages":"88-97","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tii/YuC23","doi":"10.1109/TII.2022.3178381","ee":"https://doi.org/10.1109/TII.2022.3178381","url":"https://dblp.org/rec/journals/tii/YuC23"}, "url":"URL#260878" }, { "@score":"3", "@id":"261681", "info":{"authors":{"author":[{"@pid":"155/4237","text":"Chuandong Jiang"},{"@pid":"259/7275","text":"Ruixin Miao"},{"@pid":"278/3911","text":"Bang Li"},{"@pid":"145/0478","text":"Baofeng Tian"},{"@pid":"209/9454","text":"Xinlei Shang"},{"@pid":"155/4273","text":"Qing-Ming Duan"},{"@pid":"36/10009","text":"Tingting Lin"}]},"title":"Multitype Noise Suppression in Magnetic Resonance Sounding Data Based on a Time-Frequency Fully Convolutional Neural Network.","venue":"IEEE Trans. Instrum. Meas.","volume":"72","pages":"1-11","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tim/JiangMLTSDL23","doi":"10.1109/TIM.2023.3250299","ee":"https://doi.org/10.1109/TIM.2023.3250299","url":"https://dblp.org/rec/journals/tim/JiangMLTSDL23"}, "url":"URL#261681" }, { "@score":"3", "@id":"262291", "info":{"authors":{"author":[{"@pid":"60/10775","text":"Zhijun Ren"},{"@pid":"174/1263","text":"Jinchen Ji"},{"@pid":"90/2052","text":"Yongsheng Zhu"},{"@pid":"h/JunHong2","text":"Jun Hong 0002"},{"@pid":"28/27","text":"Ke Feng"}]},"title":"Generative Adversarial Network With Dual Multiscale Feature Fusion for Data Augmentation in Fault Diagnosis.","venue":"IEEE Trans. Instrum. Meas.","volume":"72","pages":"1-17","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tim/RenJZHF23","doi":"10.1109/TIM.2023.3310069","ee":"https://doi.org/10.1109/TIM.2023.3310069","url":"https://dblp.org/rec/journals/tim/RenJZHF23"}, "url":"URL#262291" }, { "@score":"3", "@id":"262755", "info":{"authors":{"author":[{"@pid":"332/4953","text":"Liqiao Xia"},{"@pid":"337/7729","text":"Yongshi Liang"},{"@pid":"166/9800","text":"Pai Zheng"},{"@pid":"25/692-1","text":"Xiao Huang 0001"}]},"title":"Residual-Hypergraph Convolution Network: A Model-Based and Data-Driven Integrated Approach for Fault Diagnosis in Complex Equipment.","venue":"IEEE Trans. Instrum. Meas.","volume":"72","pages":"1-11","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tim/XiaLZH23","doi":"10.1109/TIM.2022.3227609","ee":"https://doi.org/10.1109/TIM.2022.3227609","url":"https://dblp.org/rec/journals/tim/XiaLZH23"}, "url":"URL#262755" }, { "@score":"3", "@id":"263766", "info":{"authors":{"author":[{"@pid":"294/8346","text":"Hengyu Man"},{"@pid":"76/1458","text":"Xiaopeng Fan"},{"@pid":"12/6908","text":"Ruiqin Xiong"},{"@pid":"16/3958","text":"Debin Zhao"}]},"title":"Tree-Structured Data Clustering-Driven Neural Network for Intra Prediction in Video Coding.","venue":"IEEE Trans. Image Process.","volume":"32","pages":"3493-3506","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tip/ManFXZ23","doi":"10.1109/TIP.2023.3286256","ee":"https://doi.org/10.1109/TIP.2023.3286256","url":"https://dblp.org/rec/journals/tip/ManFXZ23"}, "url":"URL#263766" }, { "@score":"3", "@id":"265435", "info":{"authors":{"author":[{"@pid":"43/4386","text":"Qi Fan"},{"@pid":"72/2718-1","text":"Yang Xin 0001"},{"@pid":"51/5008","text":"Bin Jia"},{"@pid":"06/6785-91","text":"Yang Zhang 0091"},{"@pid":"326/1208","text":"Pinxiang Wang"}]},"title":"COBATS: A Novel Consortium Blockchain-Based Trust Model for Data Sharing in Vehicular Networks.","venue":"IEEE Trans. Intell. Transp. Syst.","volume":"24","number":"11","pages":"12255-12271","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tits/FanXJZW23","doi":"10.1109/TITS.2023.3286432","ee":"https://doi.org/10.1109/TITS.2023.3286432","url":"https://dblp.org/rec/journals/tits/FanXJZW23"}, "url":"URL#265435" }, { "@score":"3", "@id":"265631", "info":{"authors":{"author":[{"@pid":"202/6538","text":"Mingye Ju"},{"@pid":"251/5104","text":"Chunming He"},{"@pid":"268/5715","text":"Juping Liu"},{"@pid":"16/10594","text":"Bin Kang"},{"@pid":"91/1388","text":"Jian Su"},{"@pid":"57/33","text":"Dengyin Zhang"}]},"title":"IVF-Net: An Infrared and Visible Data Fusion Deep Network for Traffic Object Enhancement in Intelligent Transportation Systems.","venue":"IEEE Trans. Intell. Transp. Syst.","volume":"24","number":"1","pages":"1220-1234","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tits/JuHLKSZ23","doi":"10.1109/TITS.2022.3210693","ee":"https://doi.org/10.1109/TITS.2022.3210693","url":"https://dblp.org/rec/journals/tits/JuHLKSZ23"}, "url":"URL#265631" }, { "@score":"3", "@id":"265901", "info":{"authors":{"author":[{"@pid":"225/6124","text":"Douglas L. L. Moura"},{"@pid":"263/0908","text":"Geymerson S. Ramos"},{"@pid":"13/5158","text":"André L. L. de Aquino"},{"@pid":"l/AntonioAlfredoFerreiraLoureiro","text":"Antonio A. F. Loureiro"}]},"title":"A Centrality Approach to Select Offloading Data Aggregation Points in Vehicular Sensor Networks.","venue":"IEEE Trans. Intell. Transp. Syst.","volume":"24","number":"11","pages":"11639-11653","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tits/MouraRAL23","doi":"10.1109/TITS.2023.3297886","ee":"https://doi.org/10.1109/TITS.2023.3297886","url":"https://dblp.org/rec/journals/tits/MouraRAL23"}, "url":"URL#265901" }, { "@score":"3", "@id":"266182", "info":{"authors":{"author":[{"@pid":"24/4105-6","text":"Wei Wei 0006"},{"@pid":"48/5700-1","text":"Jun Shen 0001"},{"@pid":"204/9835","text":"Akbar Telikani"},{"@pid":"18/10134","text":"Mahdi Fahmideh"},{"@pid":"28/2073-12","text":"Wei Gao 0012"}]},"title":"Feasibility Analysis of Data Transmission in Partially Damaged IoT Networks of Vehicles.","venue":"IEEE Trans. Intell. Transp. Syst.","volume":"24","number":"4","pages":"4577-4588","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tits/WeiSTFG23","doi":"10.1109/TITS.2022.3190668","ee":"https://doi.org/10.1109/TITS.2022.3190668","url":"https://dblp.org/rec/journals/tits/WeiSTFG23"}, "url":"URL#266182" }, { "@score":"3", "@id":"266640", "info":{"authors":{"author":[{"@pid":"261/2648-1","text":"Run Liu 0001"},{"@pid":"339/9963","text":"Zhenzhe Qu"},{"@pid":"95/3909","text":"Guosheng Huang"},{"@pid":"62/6234","text":"Mianxiong Dong"},{"@pid":"25/3246-1","text":"Tian Wang 0001"},{"@pid":"02/4385-1","text":"Shaobo Zhang 0001"},{"@pid":"28/3062","text":"Anfeng Liu"}]},"title":"DRL-UTPS: DRL-Based Trajectory Planning for Unmanned Aerial Vehicles for Data Collection in Dynamic IoT Network.","venue":"IEEE Trans. Intell. Veh.","volume":"8","number":"2","pages":"1204-1218","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tiv/LiuQHDWZL23","doi":"10.1109/TIV.2022.3213703","ee":"https://doi.org/10.1109/TIV.2022.3213703","url":"https://dblp.org/rec/journals/tiv/LiuQHDWZL23"}, "url":"URL#266640" }, { "@score":"3", "@id":"266844", "info":{"authors":{"author":[{"@pid":"348/0767","text":"Ahmed Abdelkhalek 0003"},{"@pid":"169/4849","text":"Maggie Mashaly"}]},"title":"Addressing the class imbalance problem in network intrusion detection systems using data resampling and deep learning.","venue":"J. Supercomput.","volume":"79","number":"10","pages":"10611-10644","year":"2023","type":"Journal Articles","access":"open","key":"journals/tjs/AbdelkhalekM23","doi":"10.1007/S11227-023-05073-X","ee":"https://doi.org/10.1007/s11227-023-05073-x","url":"https://dblp.org/rec/journals/tjs/AbdelkhalekM23"}, "url":"URL#266844" }, { "@score":"3", "@id":"266923", "info":{"authors":{"author":[{"@pid":"168/1156","text":"Rati Bhan"},{"@pid":"184/2100","text":"Rajendra Pamula"},{"@pid":"17/11140","text":"Parvez Faruki"},{"@pid":"141/0663","text":"Jyoti Gajrani"}]},"title":"Blockchain-enabled secure and efficient data sharing scheme for trust management in healthcare smartphone network.","venue":"J. Supercomput.","volume":"79","number":"14","pages":"16233-16274","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/BhanPFG23","doi":"10.1007/S11227-023-05272-6","ee":"https://doi.org/10.1007/s11227-023-05272-6","url":"https://dblp.org/rec/journals/tjs/BhanPFG23"}, "url":"URL#266923" }, { "@score":"3", "@id":"267036", "info":{"authors":{"author":[{"@pid":"348/0791","text":"Antonio M. Fernández-Gómez"},{"@pid":"59/10351","text":"David Gutiérrez-Avilés"},{"@pid":"87/240","text":"Alicia Troncoso"},{"@pid":"31/2102","text":"Francisco Martínez-Álvarez"}]},"title":"A new Apache Spark-based framework for big data streaming forecasting in IoT networks.","venue":"J. Supercomput.","volume":"79","number":"10","pages":"11078-11100","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/FernandezGomezGTM23","doi":"10.1007/S11227-023-05100-X","ee":"https://doi.org/10.1007/s11227-023-05100-x","url":"https://dblp.org/rec/journals/tjs/FernandezGomezGTM23"}, "url":"URL#267036" }, { "@score":"3", "@id":"267112", "info":{"authors":{"author":[{"@pid":"171/1301","text":"Ali Kadhum Idrees"},{"@pid":"344/8517","text":"Marwa Saieed Khlief"}]},"title":"Efficient compression technique for reducing transmitted EEG data without loss in IoMT networks based on fog computing.","venue":"J. Supercomput.","volume":"79","number":"8","pages":"9047-9072","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/IdreesK23","doi":"10.1007/S11227-022-05027-9","ee":"https://doi.org/10.1007/s11227-022-05027-9","url":"https://dblp.org/rec/journals/tjs/IdreesK23"}, "url":"URL#267112" }, { "@score":"3", "@id":"267294", "info":{"authors":{"author":[{"@pid":"210/0307","text":"Samad Najjar-Ghabel"},{"@pid":"92/7402","text":"Leili Farzinvash"},{"@pid":"15/9134","text":"Seyed Naser Razavi"}]},"title":"Data harvesting in wireless sensor networks using mobile sinks under real-world circumstances.","venue":"J. Supercomput.","volume":"79","number":"5","pages":"5486-5515","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/NajjarGhabelFR23","doi":"10.1007/S11227-022-04888-4","ee":"https://doi.org/10.1007/s11227-022-04888-4","url":"https://dblp.org/rec/journals/tjs/NajjarGhabelFR23"}, "url":"URL#267294" }, { "@score":"3", "@id":"267322", "info":{"authors":{"author":[{"@pid":"253/2214","text":"Patitapaban Palo"},{"@pid":"44/5813","text":"Aurobinda Routray"},{"@pid":"255/3984","text":"Rahul Mahadik"},{"@pid":"304/0188","text":"Sanjai Kumar Singh"}]},"title":"Fault detection in seismic data using graph convolutional network.","venue":"J. Supercomput.","volume":"79","number":"11","pages":"12737-12765","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/PaloRMS23","doi":"10.1007/S11227-023-05173-8","ee":"https://doi.org/10.1007/s11227-023-05173-8","url":"https://dblp.org/rec/journals/tjs/PaloRMS23"}, "url":"URL#267322" }, { "@score":"3", "@id":"267457", "info":{"authors":{"author":[{"@pid":"162/0574","text":"Mohammad Soltani"},{"@pid":"133/7279","text":"Behrang Barekatain"},{"@pid":"354/7987","text":"Faramarz Hendesi"},{"@pid":"124/9452","text":"Zahra Beheshti"}]},"title":"FSCN: a novel forwarding method based on Shannon entropy and COPRAS decision process in named data networking.","venue":"J. Supercomput.","volume":"79","number":"14","pages":"15324-15357","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/SoltaniBHB23","doi":"10.1007/S11227-023-05265-5","ee":"https://doi.org/10.1007/s11227-023-05265-5","url":"https://dblp.org/rec/journals/tjs/SoltaniBHB23"}, "url":"URL#267457" }, { "@score":"5", "@id":"267525", "info":{"authors":{"author":[{"@pid":"08/5760","text":"Xi Wang"},{"@pid":"354/8919","text":"Xinzhi Hu"},{"@pid":"202/3794","text":"Weibei Fan"},{"@pid":"85/5653","text":"Ruchuan Wang"}]},"title":"Efficient data persistence and data division for distributed computing in cloud data center networks.","venue":"J. Supercomput.","volume":"79","number":"14","pages":"16300-16327","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/WangHFW23","doi":"10.1007/S11227-023-05276-2","ee":"https://doi.org/10.1007/s11227-023-05276-2","url":"https://dblp.org/rec/journals/tjs/WangHFW23"}, "url":"URL#267525" }, { "@score":"3", "@id":"267602", "info":{"title":"Retraction Note: Research on data aggregation and transmission planning with Internet of Things technology in WSN multi-channel aware network.","venue":"J. Supercomput.","volume":"79","number":"12","pages":"13908","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/YueJYW23","doi":"10.1007/S11227-023-05353-6","ee":"https://doi.org/10.1007/s11227-023-05353-6","url":"https://dblp.org/rec/journals/tjs/YueJYW23"}, "url":"URL#267602" }, { "@score":"3", "@id":"267663", "info":{"authors":{"author":[{"@pid":"171/2226","text":"Roshni Chakraborty"},{"@pid":"263/5606","text":"Ritwika Das"},{"@pid":"59/4869","text":"Joydeep Chandra"}]},"title":"SigGAN: Adversarial Model for Learning Signed Relationships in Networks.","venue":"ACM Trans. Knowl. Discov. Data","volume":"17","number":"1","pages":"8:1-8:20","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tkdd/ChakrabortyDC23","doi":"10.1145/3532610","ee":"https://doi.org/10.1145/3532610","url":"https://dblp.org/rec/journals/tkdd/ChakrabortyDC23"}, "url":"URL#267663" }, { "@score":"3", "@id":"267686", "info":{"authors":{"author":[{"@pid":"224/5713","text":"Zeinab S. Jalali"},{"@pid":"347/1540","text":"Qilan Chen"},{"@pid":"347/1644","text":"Shwetha M. Srikanta"},{"@pid":"47/954","text":"Weixiang Wang"},{"@pid":"66/1606-1","text":"Myunghwan Kim 0002"},{"@pid":"49/4836","text":"Hema Raghavan"},{"@pid":"80/8173","text":"Sucheta Soundarajan"}]},"title":"Fairness of Information Flow in Social Networks.","venue":"ACM Trans. Knowl. Discov. Data","volume":"17","number":"6","pages":"79:1-79:26","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tkdd/JalaliCSWKRS23","doi":"10.1145/3578268","ee":"https://doi.org/10.1145/3578268","url":"https://dblp.org/rec/journals/tkdd/JalaliCSWKRS23"}, "url":"URL#267686" }, { "@score":"3", "@id":"267694", "info":{"authors":{"author":[{"@pid":"42/4142","text":"Xin Jiang"},{"@pid":"212/1520","text":"Zhengxin Yu"},{"@pid":"304/3940","text":"Chao Hai"},{"@pid":"78/6365-1","text":"Hongbo Liu 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"45/5296","text":"Tomás Ward"}]},"title":"DNformer: Temporal Link Prediction with Transfer Learning in Dynamic Networks.","venue":"ACM Trans. Knowl. Discov. Data","volume":"17","number":"3","pages":"43:1-43:21","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tkdd/JiangYHLWW23","doi":"10.1145/3551892","ee":"https://doi.org/10.1145/3551892","url":"https://dblp.org/rec/journals/tkdd/JiangYHLWW23"}, "url":"URL#267694" }, { "@score":"3", "@id":"267708", "info":{"authors":{"author":[{"@pid":"69/5902-3","text":"Qian Li 0003"},{"@pid":"264/6399","text":"Xiangmeng Wang"},{"@pid":"02/10606","text":"Zhichao Wang"},{"@pid":"59/2340","text":"Guandong Xu"}]},"title":"Be Causal: De-Biasing Social Network Confounding in Recommendation.","venue":"ACM Trans. Knowl. Discov. Data","volume":"17","number":"1","pages":"14:1-14:23","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tkdd/LiWWX23","doi":"10.1145/3533725","ee":"https://doi.org/10.1145/3533725","url":"https://dblp.org/rec/journals/tkdd/LiWWX23"}, "url":"URL#267708" }, { "@score":"3", "@id":"267724", "info":{"authors":{"author":[{"@pid":"129/4583","text":"Kazuki Nakajima"},{"@pid":"53/4994","text":"Kazuyuki Shudo"}]},"title":"Random Walk Sampling in Social Networks Involving Private Nodes.","venue":"ACM Trans. Knowl. Discov. Data","volume":"17","number":"4","pages":"51:1-51:28","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tkdd/NakajimaS23","doi":"10.1145/3561388","ee":"https://doi.org/10.1145/3561388","url":"https://dblp.org/rec/journals/tkdd/NakajimaS23"}, "url":"URL#267724" }, { "@score":"3", "@id":"267726", "info":{"authors":{"author":[{"@pid":"272/3977","text":"Peikun Ni"},{"@pid":"50/1455","text":"Jianming Zhu"},{"@pid":"17/356","text":"Guoqing Wang"}]},"title":"Misinformation Blocking Problem in Virtual and Real Interconversion Social Networks.","venue":"ACM Trans. Knowl. Discov. Data","volume":"17","number":"6","pages":"87:1-87:25","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tkdd/NiZW23","doi":"10.1145/3578936","ee":"https://doi.org/10.1145/3578936","url":"https://dblp.org/rec/journals/tkdd/NiZW23"}, "url":"URL#267726" }, { "@score":"4", "@id":"267729", "info":{"authors":{"author":[{"@pid":"69/561","text":"Xi Qin"},{"@pid":"07/1405","text":"Cheng Zhong"},{"@pid":"l/HaiXiangLin","text":"Hai-Xiang Lin"}]},"title":"Community-Based Influence Maximization Using Network Embedding in Dynamic Heterogeneous Social Networks.","venue":"ACM Trans. Knowl. Discov. Data","volume":"17","number":"8","pages":"119:1-119:21","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tkdd/QinZL23","doi":"10.1145/3594544","ee":"https://doi.org/10.1145/3594544","url":"https://dblp.org/rec/journals/tkdd/QinZL23"}, "url":"URL#267729" }, { "@score":"3", "@id":"267730", "info":{"authors":{"author":[{"@pid":"79/542-2","text":"Maryam Ramezani 0002"},{"@pid":"358/5536","text":"Aryan Ahadinia"},{"@pid":"358/5351","text":"Amirmohammad Ziaei Bideh"},{"@pid":"01/4547","text":"Hamid R. Rabiee"}]},"title":"Joint Inference of Diffusion and Structure in Partially Observed Social Networks Using Coupled Matrix Factorization.","venue":"ACM Trans. Knowl. Discov. Data","volume":"17","number":"9","pages":"132:1-132:28","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tkdd/RamezaniABR23","doi":"10.1145/3599237","ee":"https://doi.org/10.1145/3599237","url":"https://dblp.org/rec/journals/tkdd/RamezaniABR23"}, "url":"URL#267730" }, { "@score":"3", "@id":"267754", "info":{"authors":{"author":[{"@pid":"93/6765","text":"Meng Wang"},{"@pid":"25/5732-5","text":"Boyu Li 0005"},{"@pid":"59/1028-1","text":"Kun He 0001"},{"@pid":"h/JohnEHopcroft","text":"John E. Hopcroft"}]},"title":"Uncovering the Local Hidden Community Structure in Social Networks.","venue":"ACM Trans. Knowl. Discov. Data","volume":"17","number":"5","pages":"67:1-67:25","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tkdd/WangLHH23","doi":"10.1145/3567597","ee":"https://doi.org/10.1145/3567597","url":"https://dblp.org/rec/journals/tkdd/WangLHH23"}, "url":"URL#267754" }, { "@score":"4", "@id":"267764", "info":{"authors":{"author":[{"@pid":"76/9585","text":"Xuemei Wei"},{"@pid":"78/5911","text":"Ye-Zheng Liu 0001"},{"@pid":"127/9907","text":"Jianshan Sun"},{"@pid":"26/4715","text":"Yuanchun Jiang"},{"@pid":"144/9066","text":"Qifeng Tang"},{"@pid":"74/4607","text":"Kun Yuan"}]},"title":"Dual Subgraph-Based Graph Neural Network for Friendship Prediction in Location-Based Social Networks.","venue":"ACM Trans. Knowl. Discov. Data","volume":"17","number":"3","pages":"42:1-42:28","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tkdd/WeiLSJTY23","doi":"10.1145/3554981","ee":"https://doi.org/10.1145/3554981","url":"https://dblp.org/rec/journals/tkdd/WeiLSJTY23"}, "url":"URL#267764" }, { "@score":"3", "@id":"267792", "info":{"authors":{"author":[{"@pid":"204/5234-1","text":"Junaid Ali 0001"},{"@pid":"48/10293","text":"Mahmoudreza Babaei"},{"@pid":"116/1678","text":"Abhijnan Chakraborty"},{"@pid":"52/10075","text":"Baharan Mirzasoleiman"},{"@pid":"g/PKrishnaGummadi","text":"Krishna P. Gummadi"},{"@pid":"58/657","text":"Adish Singla"}]},"title":"On the Fairness of Time-Critical Influence Maximization in Social Networks.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"35","number":"3","pages":"2875-2886","year":"2023","type":"Journal Articles","access":"open","key":"journals/tkde/AliBCMGS23","doi":"10.1109/TKDE.2021.3120561","ee":"https://doi.org/10.1109/TKDE.2021.3120561","url":"https://dblp.org/rec/journals/tkde/AliBCMGS23"}, "url":"URL#267792" }, { "@score":"3", "@id":"267795", "info":{"authors":{"author":[{"@pid":"358/0938","text":"Aikta Arya"},{"@pid":"157/8470","text":"Pradumn Kumar Pandey"},{"@pid":"163/1823","text":"Akrati Saxena"}]},"title":"Balanced and Unbalanced Triangle Count in Signed Networks.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"35","number":"12","pages":"12491-12496","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tkde/AryaPS23","doi":"10.1109/TKDE.2023.3272657","ee":"https://doi.org/10.1109/TKDE.2023.3272657","url":"https://dblp.org/rec/journals/tkde/AryaPS23"}, "url":"URL#267795" }, { "@score":"3", "@id":"267822", "info":{"authors":{"author":[{"@pid":"168/4683","text":"Taotao Cai"},{"@pid":"162/0896","text":"Shuiqiao Yang"},{"@pid":"l/JianxinLi","text":"Jianxin Li 0001"},{"@pid":"s/QuanZSheng","text":"Quan Z. Sheng"},{"@pid":"y/JianYang1","text":"Jian Yang 0001"},{"@pid":"10/5630-30","text":"Xin Wang 0030"},{"@pid":"147/9092","text":"Wei Emma Zhang"},{"@pid":"44/7500","text":"Longxiang Gao"}]},"title":"Incremental Graph Computation: Anchored Vertex Tracking in Dynamic Social Networks.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"35","number":"7","pages":"7030-7044","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tkde/CaiYLSYWZG23","doi":"10.1109/TKDE.2022.3199494","ee":"https://doi.org/10.1109/TKDE.2022.3199494","url":"https://dblp.org/rec/journals/tkde/CaiYLSYWZG23"}, "url":"URL#267822" }, { "@score":"3", "@id":"267860", "info":{"authors":{"author":[{"@pid":"165/2862","text":"Zi Chen"},{"@pid":"140/2348","text":"Long Yuan"},{"@pid":"l/LinXuemin","text":"Xuemin Lin 0001"},{"@pid":"51/5585","text":"Lu Qin 0001"},{"@pid":"98/5684-1","text":"Wenjie Zhang 0001"}]},"title":"Balanced Clique Computation in Signed Networks: Concepts and Algorithms.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"35","number":"11","pages":"11079-11092","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tkde/ChenYLQZ23","doi":"10.1109/TKDE.2022.3225562","ee":"https://doi.org/10.1109/TKDE.2022.3225562","url":"https://dblp.org/rec/journals/tkde/ChenYLQZ23"}, "url":"URL#267860" }, { "@score":"3", "@id":"267876", "info":{"authors":{"author":[{"@pid":"135/6864","text":"Dawei Cheng"},{"@pid":"54/8066","text":"Zhibin Niu"},{"@pid":"17/2703-49","text":"Jie Li 0049"},{"@pid":"31/5933","text":"Changjun Jiang"}]},"title":"Regulating Systemic Crises: Stemming the Contagion Risk in Networked-Loans Through Deep Graph Learning.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"35","number":"6","pages":"6278-6289","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tkde/ChengNLJ23","doi":"10.1109/TKDE.2022.3162339","ee":"https://doi.org/10.1109/TKDE.2022.3162339","url":"https://dblp.org/rec/journals/tkde/ChengNLJ23"}, "url":"URL#267876" }, { "@score":"3", "@id":"267938", "info":{"authors":{"author":[{"@pid":"231/5909","text":"Thorben Funke"},{"@pid":"71/9649","text":"Megha Khosla"},{"@pid":"295/9215","text":"Mandeep Rathee"},{"@pid":"02/7062","text":"Avishek Anand"}]},"title":"Zorro: Valid, Sparse, and Stable Explanations in Graph Neural Networks.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"35","number":"8","pages":"8687-8698","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tkde/FunkeKRA23","doi":"10.1109/TKDE.2022.3201170","ee":"https://doi.org/10.1109/TKDE.2022.3201170","url":"https://dblp.org/rec/journals/tkde/FunkeKRA23"}, "url":"URL#267938" }, { "@score":"3", "@id":"267998", "info":{"authors":{"author":[{"@pid":"97/6589-2","text":"Qiang He 0002"},{"@pid":"03/2511-2","text":"Hui Fang 0002"},{"@pid":"84/6889-2","text":"Jie Zhang 0002"},{"@pid":"99/4694-1","text":"Xingwei Wang 0001"}]},"title":"Dynamic Opinion Maximization in Social Networks.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"35","number":"1","pages":"350-361","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tkde/HeFZW23","doi":"10.1109/TKDE.2021.3077491","ee":"https://doi.org/10.1109/TKDE.2021.3077491","url":"https://dblp.org/rec/journals/tkde/HeFZW23"}, "url":"URL#267998" }, { "@score":"5", "@id":"268009", "info":{"authors":{"author":[{"@pid":"70/9915","text":"Bay-Yuan Hsu"},{"@pid":"43/5205","text":"Lo-Yao Yeh"},{"@pid":"248/8819","text":"Ming-Yi Chang"},{"@pid":"38/8845","text":"Chih-Ya Shen"}]},"title":"Willingness Maximization for Ego Network Data Extraction in Multiple Online Social Networks.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"35","number":"8","pages":"8672-8686","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tkde/HsuYCS23","doi":"10.1109/TKDE.2022.3207150","ee":"https://doi.org/10.1109/TKDE.2022.3207150","url":"https://dblp.org/rec/journals/tkde/HsuYCS23"}, "url":"URL#268009" }, { "@score":"4", "@id":"268017", "info":{"authors":{"author":[{"@pid":"251/0908","text":"Xiangyu Hu 0006"},{"@pid":"19/8310","text":"Tianqing Zhu"},{"@pid":"205/7902","text":"Xuemeng Zhai"},{"@pid":"346/2691","text":"Hengming Wang"},{"@pid":"92/2939","text":"Wanlei Zhou 0001"},{"@pid":"z/WeiZhao-1","text":"Wei Zhao 0001"}]},"title":"Privacy Data Diffusion Modeling and Preserving in Online Social Network.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"35","number":"6","pages":"6224-6237","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tkde/HuZZWZZ23","doi":"10.1109/TKDE.2022.3176948","ee":"https://doi.org/10.1109/TKDE.2022.3176948","url":"https://dblp.org/rec/journals/tkde/HuZZWZZ23"}, "url":"URL#268017" }, { "@score":"3", "@id":"268030", "info":{"authors":{"author":[{"@pid":"294/4749","text":"Buliao Huang"},{"@pid":"17/8404","text":"Yunhui Zhu"},{"@pid":"20/241","text":"Muhammad Usman"},{"@pid":"220/2196","text":"Xiren Zhou"},{"@pid":"72/5816","text":"Huanhuan Chen"}]},"title":"Graph Neural Networks for Missing Value Classification in a Task-Driven Metric Space.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"35","number":"8","pages":"8073-8084","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tkde/HuangZUZC23","doi":"10.1109/TKDE.2022.3198689","ee":"https://doi.org/10.1109/TKDE.2022.3198689","url":"https://dblp.org/rec/journals/tkde/HuangZUZC23"}, "url":"URL#268030" }, { "@score":"3", "@id":"268048", "info":{"authors":{"author":[{"@pid":"201/1241","text":"Honglu Jiang"},{"@pid":"p/JianPei","text":"Jian Pei"},{"@pid":"44/7265","text":"Dongxiao Yu"},{"@pid":"34/25","text":"Jiguo Yu"},{"@pid":"45/10403","text":"Bei Gong"},{"@pid":"c/XiuzhenCheng","text":"Xiuzhen Cheng 0001"}]},"title":"Applications of Differential Privacy in Social Network Analysis: A Survey.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"35","number":"1","pages":"108-127","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tkde/JiangPYYGC23","doi":"10.1109/TKDE.2021.3073062","ee":"https://doi.org/10.1109/TKDE.2021.3073062","url":"https://dblp.org/rec/journals/tkde/JiangPYYGC23"}, "url":"URL#268048" }, { "@score":"3", "@id":"268049", "info":{"authors":{"author":[{"@pid":"06/4489-13","text":"Nan Jiang 0013"},{"@pid":"272/9730","text":"Jie Wen"},{"@pid":"48/1097-2","text":"Jin Li 0002"},{"@pid":"134/3945","text":"Ximeng Liu"},{"@pid":"67/1861-1","text":"Di Jin 0001"}]},"title":"GATrust: A Multi-Aspect Graph Attention Network Model for Trust Assessment in OSNs.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"35","number":"6","pages":"5865-5878","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tkde/JiangWLLJ23","doi":"10.1109/TKDE.2022.3174044","ee":"https://doi.org/10.1109/TKDE.2022.3174044","url":"https://dblp.org/rec/journals/tkde/JiangWLLJ23"}, "url":"URL#268049" }, { "@score":"3", "@id":"268053", "info":{"authors":{"author":[{"@pid":"163/2737","text":"Pengfei Jiao"},{"@pid":"43/2861","text":"Tianpeng Li"},{"@pid":"195/5251","text":"Yingjie Xie"},{"@pid":"63/2722","text":"Yinghui Wang"},{"@pid":"21/5941-2","text":"Wenjun Wang 0002"},{"@pid":"48/8875","text":"Dongxiao He"},{"@pid":"00/4558","text":"Huaming Wu"}]},"title":"Generative Evolutionary Anomaly Detection in Dynamic Networks.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"35","number":"12","pages":"12234-12248","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tkde/JiaoLXWWHW23","doi":"10.1109/TKDE.2021.3129057","ee":"https://doi.org/10.1109/TKDE.2021.3129057","url":"https://dblp.org/rec/journals/tkde/JiaoLXWWHW23"}, "url":"URL#268053" }, { "@score":"3", "@id":"268060", "info":{"authors":{"author":[{"@pid":"298/1932","text":"Temirlan Kalimzhanov"},{"@pid":"298/2055","text":"Amir Haji Ali Khamseh'i"},{"@pid":"96/270","text":"Aresh Dadlani"},{"@pid":"94/10508","text":"Muthukrishnan Senthil Kumar"},{"@pid":"96/4551","text":"Ahmad Khonsari"}]},"title":"Co-Evolution of Viral Processes and Structural Stability in Signed Social Networks.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"35","number":"8","pages":"7809-7814","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tkde/KalimzhanovKDKK23","doi":"10.1109/TKDE.2022.3207123","ee":"https://doi.org/10.1109/TKDE.2022.3207123","url":"https://dblp.org/rec/journals/tkde/KalimzhanovKDKK23"}, "url":"URL#268060" }, { "@score":"3", "@id":"268079", "info":{"authors":{"author":[{"@pid":"l/ZhaoLi-7","text":"Zhao Li 0007"},{"@pid":"06/1899-4","text":"Xia Chen 0004"},{"@pid":"210/0935","text":"Junshuai Song"},{"@pid":"82/4977-3","text":"Jun Gao 0003"}]},"title":"Adaptive Label Propagation for Group Anomaly Detection in Large-Scale Networks.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"35","number":"12","pages":"12053-12067","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tkde/LiCSG23","doi":"10.1109/TKDE.2022.3176478","ee":"https://doi.org/10.1109/TKDE.2022.3176478","url":"https://dblp.org/rec/journals/tkde/LiCSG23"}, "url":"URL#268079" }, { "@score":"3", "@id":"268137", "info":{"authors":{"author":[{"@pid":"20/3090-2","text":"Qiyan Li 0002"},{"@pid":"14/10147","text":"Yuanyuan Zhu"},{"@pid":"276/5058","text":"Junhao Ye"},{"@pid":"y/JXuYu","text":"Jeffrey Xu Yu"}]},"title":"Skyline Group Queries in Large Road-Social Networks Revisited.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"35","number":"3","pages":"3115-3129","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tkde/LiZYY23","doi":"10.1109/TKDE.2021.3111868","ee":"https://doi.org/10.1109/TKDE.2021.3111868","url":"https://dblp.org/rec/journals/tkde/LiZYY23"}, "url":"URL#268137" }, { "@score":"3", "@id":"268154", "info":{"authors":{"author":[{"@pid":"271/4308","text":"Chuan-hao Lin"},{"@pid":"194/3972","text":"Linchuan Xu"},{"@pid":"88/5479","text":"Kenji Yamanishi"}]},"title":"Network Change Detection Based on Random Walk in Latent Space.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"35","number":"6","pages":"6136-6147","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tkde/LinXY23","doi":"10.1109/TKDE.2022.3167062","ee":"https://doi.org/10.1109/TKDE.2022.3167062","url":"https://dblp.org/rec/journals/tkde/LinXY23"}, "url":"URL#268154" }, { "@score":"4", "@id":"268173", "info":{"authors":{"author":[{"@pid":"61/3234-6","text":"Qiang Liu 0006"},{"@pid":"278/2956","text":"Yingtao Luo"},{"@pid":"06/3577","text":"Shu Wu"},{"@pid":"19/5112","text":"Zhen Zhang"},{"@pid":"321/9936","text":"Xiangnan Yue"},{"@pid":"38/889","text":"Hong Jin"},{"@pid":"56/4499-1","text":"Liang Wang 0001"}]},"title":"RMT-Net: Reject-Aware Multi-Task Network for Modeling Missing-Not-At-Random Data in Financial Credit Scoring.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"35","number":"7","pages":"7427-7439","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tkde/LiuLWZYJW23","doi":"10.1109/TKDE.2022.3179025","ee":"https://doi.org/10.1109/TKDE.2022.3179025","url":"https://dblp.org/rec/journals/tkde/LiuLWZYJW23"}, "url":"URL#268173" }, { "@score":"3", "@id":"268281", "info":{"authors":{"author":[{"@pid":"18/4751","text":"Ren Ren"},{"@pid":"58/2277","text":"Jinliang Shao"},{"@pid":"37/5107","text":"Adrian N. Bishop"},{"@pid":"73/2273","text":"Wei Xing Zheng 0001"}]},"title":"Modeling and Detecting Communities in Node Attributed Networks.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"35","number":"7","pages":"7206-7219","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tkde/RenSBZ23","doi":"10.1109/TKDE.2022.3197612","ee":"https://doi.org/10.1109/TKDE.2022.3197612","url":"https://dblp.org/rec/journals/tkde/RenSBZ23"}, "url":"URL#268281" }, { "@score":"3", "@id":"268285", "info":{"authors":{"author":[{"@pid":"273/9159","text":"Hamid Roghani"},{"@pid":"41/7213","text":"Asgarali Bouyer"}]},"title":"A Fast Local Balanced Label Diffusion Algorithm for Community Detection in Social Networks.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"35","number":"6","pages":"5472-5484","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tkde/RoghaniB23","doi":"10.1109/TKDE.2022.3162161","ee":"https://doi.org/10.1109/TKDE.2022.3162161","url":"https://dblp.org/rec/journals/tkde/RoghaniB23"}, "url":"URL#268285" }, { "@score":"3", "@id":"268333", "info":{"authors":{"author":[{"@pid":"212/1605","text":"Marzieh Hajizadeh Tahan"},{"@pid":"67/4883","text":"Mohammad Ghasemzadeh 0001"},{"@pid":"78/10851","text":"Shahrokh Asadi"}]},"title":"Development of Fully Convolutional Neural Networks Based on Discretization in Time Series Classification.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"35","number":"7","pages":"6827-6838","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tkde/TahanGA23","doi":"10.1109/TKDE.2022.3177724","ee":"https://doi.org/10.1109/TKDE.2022.3177724","url":"https://dblp.org/rec/journals/tkde/TahanGA23"}, "url":"URL#268333" }, { "@score":"3", "@id":"268339", "info":{"authors":{"author":[{"@pid":"279/3128","text":"Youming Tao 0001"},{"@pid":"62/6369-1","text":"Shuzhen Chen 0001"},{"@pid":"92/2954-2","text":"Feng Li 0002"},{"@pid":"44/7265","text":"Dongxiao Yu"},{"@pid":"34/25","text":"Jiguo Yu"},{"@pid":"75/1078-1","text":"Hao Sheng 0001"}]},"title":"A Distributed Privacy-Preserving Learning Dynamics in General Social Networks.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"35","number":"9","pages":"9547-9561","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tkde/TaoCLYYS23","doi":"10.1109/TKDE.2023.3241442","ee":"https://doi.org/10.1109/TKDE.2023.3241442","url":"https://dblp.org/rec/journals/tkde/TaoCLYYS23"}, "url":"URL#268339" }, { "@score":"3", "@id":"268340", "info":{"authors":{"author":[{"@pid":"172/2738","text":"Yuechen Tao"},{"@pid":"50/3402-1","text":"Bo Li 0001"},{"@pid":"l/BaochunLi","text":"Baochun Li"},{"@pid":"c/LeiChen0002","text":"Lei Chen 0002"}]},"title":"Characterizing Performance Limits in Payment Channel Networks.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"35","number":"3","pages":"2353-2365","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tkde/TaoLLC23","doi":"10.1109/TKDE.2021.3120842","ee":"https://doi.org/10.1109/TKDE.2021.3120842","url":"https://dblp.org/rec/journals/tkde/TaoLLC23"}, "url":"URL#268340" }, { "@score":"3", "@id":"268368", "info":{"authors":{"author":[{"@pid":"70/6155-5","text":"Huan Wang 0005"},{"@pid":"309/4502","text":"Ziwen Cui"},{"@pid":"11/9165","text":"Ruigang Liu"},{"@pid":"66/5168-1","text":"Lei Fang 0001"},{"@pid":"80/4686","text":"Ying Sha"}]},"title":"A Multi-Type Transferable Method for Missing Link Prediction in Heterogeneous Social Networks.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"35","number":"11","pages":"10981-10991","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tkde/WangCLFS23","doi":"10.1109/TKDE.2022.3233481","ee":"https://doi.org/10.1109/TKDE.2022.3233481","url":"https://dblp.org/rec/journals/tkde/WangCLFS23"}, "url":"URL#268368" }, { "@score":"3", "@id":"268369", "info":{"authors":{"author":[{"@pid":"70/6155-5","text":"Huan Wang 0005"},{"@pid":"309/4502","text":"Ziwen Cui"},{"@pid":"121/6146","text":"Shun Liu"},{"@pid":"130/0299","text":"Qiufen Ni"},{"@pid":"95/6295","text":"Zhiguo Gong"}]},"title":"Evaluating Edge Credibility in Evolving Noisy Social Networks.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"35","number":"11","pages":"11342-11353","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tkde/WangCLNG23","doi":"10.1109/TKDE.2022.3223403","ee":"https://doi.org/10.1109/TKDE.2022.3223403","url":"https://dblp.org/rec/journals/tkde/WangCLNG23"}, "url":"URL#268369" }, { "@score":"3", "@id":"268377", "info":{"authors":{"author":[{"@pid":"166/1957","text":"Xinrui Wang"},{"@pid":"32/1438-1","text":"Hong Gao 0001"},{"@pid":"14/5155-1","text":"Zhipeng Cai 0001"},{"@pid":"18/6870-1","text":"Jianzhong Li 0001"}]},"title":"Who Should Deserve Investment? Attractive Individual and Group Search in Dynamic Information Networks.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"35","number":"2","pages":"2158-2172","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tkde/WangGCL23","doi":"10.1109/TKDE.2021.3099102","ee":"https://doi.org/10.1109/TKDE.2021.3099102","url":"https://dblp.org/rec/journals/tkde/WangGCL23"}, "url":"URL#268377" }, { "@score":"3", "@id":"268472", "info":{"authors":{"author":[{"@pid":"219/2818","text":"Yuyang Xie"},{"@pid":"17/9267","text":"Yuxiao Dong"},{"@pid":"152/1733","text":"Jiezhong Qiu"},{"@pid":"03/6174","text":"Wenjian Yu"},{"@pid":"95/1533","text":"Xu Feng"},{"@pid":"t/JieTang","text":"Jie Tang 0001"}]},"title":"SketchNE: Embedding Billion-Scale Networks Accurately in One Hour.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"35","number":"10","pages":"10666-10680","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tkde/XieDQYFT23","doi":"10.1109/TKDE.2023.3250703","ee":"https://doi.org/10.1109/TKDE.2023.3250703","url":"https://dblp.org/rec/journals/tkde/XieDQYFT23"}, "url":"URL#268472" }, { "@score":"3", "@id":"268528", "info":{"authors":{"author":[{"@pid":"95/3681","text":"Xuan Yang"},{"@pid":"48/450-9","text":"Yang Yang 0009"},{"@pid":"145/5997","text":"Jintao Su"},{"@pid":"27/3389","text":"Yifei Sun"},{"@pid":"219/8606","text":"Shen Fan"},{"@pid":"12/7774","text":"Zhongyao Wang"},{"@pid":"29/4190","text":"Jun Zhang"},{"@pid":"150/0989","text":"Jingmin Chen"}]},"title":"Who's Next: Rising Star Prediction via Diffusion of User Interest in Social Networks.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"35","number":"5","pages":"5413-5425","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tkde/YangYSSFWZC23","doi":"10.1109/TKDE.2022.3151835","ee":"https://doi.org/10.1109/TKDE.2022.3151835","url":"https://dblp.org/rec/journals/tkde/YangYSSFWZC23"}, "url":"URL#268528" }, { "@score":"3", "@id":"268569", "info":{"authors":{"author":[{"@pid":"238/5984","text":"Haonan Zhang"},{"@pid":"44/7207","text":"Luoyi Fu"},{"@pid":"165/9711","text":"Jiaxin Ding"},{"@pid":"59/2249","text":"Feilong Tang"},{"@pid":"39/9577","text":"Yao Xiao"},{"@pid":"96/1149","text":"Xinbing Wang"},{"@pid":"51/1742","text":"Guihai Chen"},{"@pid":"85/1324","text":"Chenghu Zhou"}]},"title":"Maximizing the Spread of Effective Information in Social Networks.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"35","number":"4","pages":"4062-4076","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tkde/ZhangFDTXWCZ23","doi":"10.1109/TKDE.2021.3138783","ee":"https://doi.org/10.1109/TKDE.2021.3138783","url":"https://dblp.org/rec/journals/tkde/ZhangFDTXWCZ23"}, "url":"URL#268569" }, { "@score":"3", "@id":"268572", "info":{"authors":{"author":[{"@pid":"55/826","text":"Heng Zhang"},{"@pid":"303/9138","text":"Shaoyuan Huang"},{"@pid":"10/5630-30","text":"Xin Wang 0030"},{"@pid":"l/JianxinLi","text":"Jianxin Li 0001"},{"@pid":"58/6576-1","text":"Xiaofei Wang 0001"},{"@pid":"36/4847","text":"Victor C. M. Leung"}]},"title":"A Measurement-Driven Analysis and Prediction of Content Propagation in the Device-to-Device Social Networks.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"35","number":"8","pages":"7651-7664","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tkde/ZhangHWLWL23","doi":"10.1109/TKDE.2022.3219399","ee":"https://doi.org/10.1109/TKDE.2022.3219399","url":"https://dblp.org/rec/journals/tkde/ZhangHWLWL23"}, "url":"URL#268572" }, { "@score":"3", "@id":"268587", "info":{"authors":{"author":[{"@pid":"52/323-10","text":"Qi Zhang 0010"},{"@pid":"37/548","text":"Rong-Hua Li"},{"@pid":"185/7920","text":"Hongchao Qin"},{"@pid":"64/146","text":"Guoren Wang"},{"@pid":"68/1980","text":"Zhiwei Zhang"},{"@pid":"33/6315-1","text":"Ye Yuan 0001"}]},"title":"Stable Subgraph Isomorphism Search in Temporal Networks.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"35","number":"6","pages":"6405-6420","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tkde/ZhangLQWZY23","doi":"10.1109/TKDE.2022.3175800","ee":"https://doi.org/10.1109/TKDE.2022.3175800","url":"https://dblp.org/rec/journals/tkde/ZhangLQWZY23"}, "url":"URL#268587" }, { "@score":"3", "@id":"268590", "info":{"authors":{"author":[{"@pid":"185/1009-1","text":"Mengxuan Zhang 0001"},{"@pid":"13/7007-3","text":"Lei Li 0003"},{"@pid":"66/974","text":"Goce Trajcevski"},{"@pid":"18/2478","text":"Andreas Züfle"},{"@pid":"z/XiaofangZhou","text":"Xiaofang Zhou 0001"}]},"title":"Parallel Hub Labeling Maintenance With High Efficiency in Dynamic Small-World Networks.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"35","number":"11","pages":"11751-11768","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tkde/ZhangLTZZ23","doi":"10.1109/TKDE.2023.3236632","ee":"https://doi.org/10.1109/TKDE.2023.3236632","url":"https://dblp.org/rec/journals/tkde/ZhangLTZZ23"}, "url":"URL#268590" }, { "@score":"3", "@id":"268678", "info":{"authors":{"author":[{"@pid":"166/2544-2","text":"Yujia Zhou 0002"},{"@pid":"18/5740","text":"Zhicheng Dou"},{"@pid":"w/JRWen","text":"Ji-Rong Wen"}]},"title":"Enhancing Potential Re-Finding in Personalized Search With Hierarchical Memory Networks.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"35","number":"4","pages":"3846-3857","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tkde/ZhouDW23","doi":"10.1109/TKDE.2021.3126066","ee":"https://doi.org/10.1109/TKDE.2021.3126066","url":"https://dblp.org/rec/journals/tkde/ZhouDW23"}, "url":"URL#268678" }, { "@score":"3", "@id":"268700", "info":{"authors":{"author":[{"@pid":"132/0589","text":"Tianyu Zhu"},{"@pid":"152/1810","text":"Leilei Sun"},{"@pid":"87/4902","text":"Guoqing Chen"}]},"title":"Embedding Disentanglement in Graph Convolutional Networks for Recommendation.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"35","number":"1","pages":"431-442","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tkde/ZhuSC23","doi":"10.1109/TKDE.2021.3087791","ee":"https://doi.org/10.1109/TKDE.2021.3087791","url":"https://dblp.org/rec/journals/tkde/ZhuSC23"}, "url":"URL#268700" }, { "@score":"3", "@id":"268708", "info":{"authors":{"author":[{"@pid":"139/3159","text":"Meiqi Zhu"},{"@pid":"49/67-17","text":"Xiao Wang 0017"},{"@pid":"64/3041","text":"Chuan Shi"},{"@pid":"97/989","text":"Yibo Li"},{"@pid":"13/1151","text":"Junping Du"}]},"title":"Towards Adaptive Information Fusion in Graph Convolutional Networks.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"35","number":"12","pages":"13055-13069","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tkde/ZhuWSLD23","doi":"10.1109/TKDE.2023.3271772","ee":"https://doi.org/10.1109/TKDE.2023.3271772","url":"https://dblp.org/rec/journals/tkde/ZhuWSLD23"}, "url":"URL#268708" }, { "@score":"3", "@id":"269133", "info":{"authors":{"author":[{"@pid":"143/0258-3","text":"Yuchen Li 0003"},{"@pid":"31/1277","text":"Weifa Liang"},{"@pid":"00/9492","text":"Wenzheng Xu"},{"@pid":"05/8410","text":"Zichuan Xu"},{"@pid":"j/XiaohuaJia","text":"Xiaohua Jia"},{"@pid":"40/689","text":"Yinlong Xu"},{"@pid":"82/795","text":"Haibin Kan"}]},"title":"Data Collection Maximization in IoT-Sensor Networks via an Energy-Constrained UAV.","venue":"IEEE Trans. Mob. Comput.","volume":"22","number":"1","pages":"159-174","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tmc/LiLXXJXK23","doi":"10.1109/TMC.2021.3084972","ee":"https://doi.org/10.1109/TMC.2021.3084972","url":"https://dblp.org/rec/journals/tmc/LiLXXJXK23"}, "url":"URL#269133" }, { "@score":"3", "@id":"269230", "info":{"authors":{"author":[{"@pid":"133/4986","text":"Jonathan Prados-Garzon"},{"@pid":"09/3053","text":"Tarik Taleb"},{"@pid":"00/2807","text":"Miloud Bagaa"}]},"title":"Optimization of Flow Allocation in Asynchronous Deterministic 5G Transport Networks by Leveraging Data Analytics.","venue":"IEEE Trans. Mob. Comput.","volume":"22","number":"3","pages":"1672-1687","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tmc/PradosGarzonTB23","doi":"10.1109/TMC.2021.3099979","ee":"https://doi.org/10.1109/TMC.2021.3099979","url":"https://dblp.org/rec/journals/tmc/PradosGarzonTB23"}, "url":"URL#269230" }, { "@score":"3", "@id":"269296", "info":{"authors":{"author":[{"@pid":"w/YangWang6","text":"Yang Wang 0006"},{"@pid":"26/3998","text":"Hao Dai"},{"@pid":"262/5510","text":"Xinxin Han"},{"@pid":"90/4693","text":"Pengfei Wang"},{"@pid":"66/4615-1","text":"Yong Zhang 0001"},{"@pid":"x/ChengZhongXu","text":"Chengzhong Xu 0001"}]},"title":"Cost-Driven Data Caching in Edge-Based Content Delivery Networks.","venue":"IEEE Trans. Mob. Comput.","volume":"22","number":"3","pages":"1384-1400","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tmc/WangDHWZX23","doi":"10.1109/TMC.2021.3108150","ee":"https://doi.org/10.1109/TMC.2021.3108150","url":"https://dblp.org/rec/journals/tmc/WangDHWZX23"}, "url":"URL#269296" }, { "@score":"3", "@id":"269474", "info":{"authors":{"author":[{"@pid":"300/5778","text":"Shuaizheng Chen"},{"@pid":"207/4413","text":"Dongaolei An"},{"@pid":"134/9819","text":"Chaolu Feng"},{"@pid":"268/4133","text":"Zijian Bian"},{"@pid":"149/7556","text":"Lianming Wu"}]},"title":"Segmentation of Pericardial Adipose Tissue in CMR Images: A Benchmark Dataset MRPEAT and a Triple-Stage Network 3SUnet.","venue":"IEEE Trans. Medical Imaging","volume":"42","number":"8","pages":"2386-2399","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tmi/ChenAFBW23","doi":"10.1109/TMI.2023.3251368","ee":"https://doi.org/10.1109/TMI.2023.3251368","url":"https://dblp.org/rec/journals/tmi/ChenAFBW23"}, "url":"URL#269474" }, { "@score":"3", "@id":"270837", "info":{"authors":{"author":[{"@pid":"315/2296","text":"Martijn van den Ende"},{"@pid":"352/0651","text":"Itzhak Lior"},{"@pid":"123/5608","text":"Jean-Paul Ampuero"},{"@pid":"315/3080","text":"Anthony Sladen"},{"@pid":"94/7050","text":"André Ferrari"},{"@pid":"69/6086","text":"Cédric Richard"}]},"title":"A Self-Supervised Deep Learning Approach for Blind Denoising and Waveform Coherence Enhancement in Distributed Acoustic Sensing Data.","venue":"IEEE Trans. Neural Networks Learn. Syst.","volume":"34","number":"7","pages":"3371-3384","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tnn/EndeLASFR23","doi":"10.1109/TNNLS.2021.3132832","ee":"https://doi.org/10.1109/TNNLS.2021.3132832","url":"https://dblp.org/rec/journals/tnn/EndeLASFR23"}, "url":"URL#270837" }, { "@score":"3", "@id":"270946", "info":{"authors":{"author":[{"@pid":"64/8342","text":"Beakcheol Jang"},{"@pid":"210/3076","text":"Inhwan Kim"},{"@pid":"49/3726","text":"Jong Wook Kim"}]},"title":"Long-Term Influenza Outbreak Forecast Using Time-Precedence Correlation of Web Data.","venue":"IEEE Trans. Neural Networks Learn. Syst.","volume":"34","number":"5","pages":"2400-2412","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tnn/JangKK23","doi":"10.1109/TNNLS.2021.3106637","ee":"https://doi.org/10.1109/TNNLS.2021.3106637","url":"https://dblp.org/rec/journals/tnn/JangKK23"}, "url":"URL#270946" }, { "@score":"5", "@id":"271209", "info":{"authors":{"author":[{"@pid":"221/4515","text":"Xinyang Ren"},{"@pid":"46/3817","text":"Weiyang Lin"},{"@pid":"30/7089","text":"Xianqiang Yang 0001"},{"@pid":"164/4071","text":"Xinghu Yu"},{"@pid":"01/4829","text":"Huijun Gao"}]},"title":"Data Augmentation in Defect Detection of Sanitary Ceramics in Small and Non-i.i.d Datasets.","venue":"IEEE Trans. Neural Networks Learn. Syst.","volume":"34","number":"11","pages":"8669-8678","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tnn/RenLYYG23","doi":"10.1109/TNNLS.2022.3152245","ee":"https://doi.org/10.1109/TNNLS.2022.3152245","url":"https://dblp.org/rec/journals/tnn/RenLYYG23"}, "url":"URL#271209" }, { "@score":"3", "@id":"271220", "info":{"authors":{"author":[{"@pid":"220/3749","text":"Felix Sattler"},{"@pid":"268/1527","text":"Tim Korjakow"},{"@pid":"162/8102","text":"Roman Rischke"},{"@pid":"79/9736","text":"Wojciech Samek"}]},"title":"FedAUX: Leveraging Unlabeled Auxiliary Data in Federated Learning.","venue":"IEEE Trans. Neural Networks Learn. Syst.","volume":"34","number":"9","pages":"5531-5543","year":"2023","type":"Journal Articles","access":"open","key":"journals/tnn/SattlerKRS23","doi":"10.1109/TNNLS.2021.3129371","ee":"https://doi.org/10.1109/TNNLS.2021.3129371","url":"https://dblp.org/rec/journals/tnn/SattlerKRS23"}, "url":"URL#271220" }, { "@score":"3", "@id":"271295", "info":{"authors":{"author":[{"@pid":"24/2594","text":"Yunxia Wang"},{"@pid":"98/7299","text":"Fuyuan Cao"},{"@pid":"52/2586","text":"Kui Yu"},{"@pid":"80/6535","text":"Jiye Liang"}]},"title":"Local Causal Discovery in Multiple Manipulated Datasets.","venue":"IEEE Trans. Neural Networks Learn. Syst.","volume":"34","number":"10","pages":"7235-7247","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tnn/WangCYL23","doi":"10.1109/TNNLS.2021.3139389","ee":"https://doi.org/10.1109/TNNLS.2021.3139389","url":"https://dblp.org/rec/journals/tnn/WangCYL23"}, "url":"URL#271295" }, { "@score":"3", "@id":"271374", "info":{"authors":{"author":[{"@pid":"143/0523","text":"Xingyu Wu"},{"@pid":"172/2593","text":"Bingbing Jiang"},{"@pid":"02/6128-16","text":"Xiangyu Wang 0016"},{"@pid":"336/0737","text":"Taiyu Ban"},{"@pid":"72/5816","text":"Huanhuan Chen"}]},"title":"Feature Selection in the Data Stream Based on Incremental Markov Boundary Learning.","venue":"IEEE Trans. Neural Networks Learn. Syst.","volume":"34","number":"10","pages":"6740-6754","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tnn/WuJWBC23","doi":"10.1109/TNNLS.2023.3249767","ee":"https://doi.org/10.1109/TNNLS.2023.3249767","url":"https://dblp.org/rec/journals/tnn/WuJWBC23"}, "url":"URL#271374" }, { "@score":"3", "@id":"271589", "info":{"authors":{"author":[{"@pid":"23/5823-8","text":"Peng Zhou 0008"},{"@pid":"00/1035","text":"Ni Wang"},{"@pid":"41/3875","text":"Shu Zhao"},{"@pid":"32/4846","text":"Yanping Zhang"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Difficult Novel Class Detection in Semisupervised Streaming Data.","venue":"IEEE Trans. Neural Networks Learn. Syst.","volume":"34","number":"10","pages":"6872-6886","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tnn/ZhouWZZW23","doi":"10.1109/TNNLS.2022.3213682","ee":"https://doi.org/10.1109/TNNLS.2022.3213682","url":"https://dblp.org/rec/journals/tnn/ZhouWZZW23"}, "url":"URL#271589" }, { "@score":"4", "@id":"271753", "info":{"authors":{"author":[{"@pid":"154/8625","text":"Ebin M. Manuel"},{"@pid":"95/8522","text":"Vinod Pankajakshan"},{"@pid":"184/5762","text":"Manil T. Mohan"}]},"title":"Energy-Efficient Data Aggregation in Low-Power Wireless Networks With Sensors of Discrete Transmission Ranges: A Mathematical Framework for Network Design.","venue":"IEEE Trans. Netw. Sci. Eng.","volume":"10","number":"6","pages":"3858-3870","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tnse/ManuelPM23","doi":"10.1109/TNSE.2023.3274693","ee":"https://doi.org/10.1109/TNSE.2023.3274693","url":"https://dblp.org/rec/journals/tnse/ManuelPM23"}, "url":"URL#271753" }, { "@score":"3", "@id":"271779", "info":{"authors":{"author":[{"@pid":"226/9946","text":"Fuyi Qu"},{"@pid":"15/11341","text":"Ahmad W. Al-Dabbagh"},{"@pid":"219/2310","text":"Zhengen Zhao"},{"@pid":"09/3214-12","text":"Hao Liu 0012"},{"@pid":"140/0764","text":"Yuzhe Li"}]},"title":"Remote State Estimation in Networked Systems: Data Pre-Processing or Not?","venue":"IEEE Trans. Netw. Sci. Eng.","volume":"10","number":"6","pages":"3895-3907","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tnse/QuAZLL23","doi":"10.1109/TNSE.2023.3275971","ee":"https://doi.org/10.1109/TNSE.2023.3275971","url":"https://dblp.org/rec/journals/tnse/QuAZLL23"}, "url":"URL#271779" }, { "@score":"3", "@id":"271967", "info":{"authors":{"author":[{"@pid":"49/225-3","text":"Long Cheng 0003"},{"@pid":"94/3104-1","text":"Ying Wang 0001"},{"@pid":"28/7999","text":"Rutvij H. Jhaveri"},{"@pid":"190/7477","text":"Qingle Wang"},{"@pid":"40/1837","text":"Ying Mao"}]},"title":"Toward Network-Aware Query Execution Systems in Large Datacenters.","venue":"IEEE Trans. Netw. Serv. Manag.","volume":"20","number":"4","pages":"4494-4504","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tnsm/ChengWJWM23","doi":"10.1109/TNSM.2023.3273166","ee":"https://doi.org/10.1109/TNSM.2023.3273166","url":"https://dblp.org/rec/journals/tnsm/ChengWJWM23"}, "url":"URL#271967" }, { "@score":"4", "@id":"271976", "info":{"authors":{"author":[{"@pid":"141/0549","text":"Mandar Datar 0001"},{"@pid":"a/EitanAltman","text":"Eitan Altman"},{"@pid":"05/5357","text":"Hélène Le Cadre"}]},"title":"Strategic Resource Pricing and Allocation in a 5G Network Slicing Stackelberg Game.","venue":"IEEE Trans. Netw. Serv. Manag.","volume":"20","number":"1","pages":"502-520","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tnsm/DatarAC23","doi":"10.1109/TNSM.2022.3216588","ee":"https://doi.org/10.1109/TNSM.2022.3216588","url":"https://dblp.org/rec/journals/tnsm/DatarAC23"}, "url":"URL#271976" }, { "@score":"3", "@id":"271998", "info":{"authors":{"author":[{"@pid":"247/4833","text":"Sharva Garg"},{"@pid":"247/4814","text":"Tanmoy Bag"},{"@pid":"06/6333","text":"Andreas Mitschele-Thiel"}]},"title":"Data-Driven Self-Organization With Implicit Self-Coordination for Coverage and Capacity Optimization in Cellular Networks.","venue":"IEEE Trans. Netw. Serv. Manag.","volume":"20","number":"2","pages":"1153-1169","year":"2023","type":"Journal Articles","access":"open","key":"journals/tnsm/GargBM23","doi":"10.1109/TNSM.2023.3262401","ee":"https://doi.org/10.1109/TNSM.2023.3262401","url":"https://dblp.org/rec/journals/tnsm/GargBM23"}, "url":"URL#271998" }, { "@score":"3", "@id":"272000", "info":{"authors":{"author":[{"@pid":"251/6688","text":"Carolina Gijón"},{"@pid":"63/89","text":"Matías Toril"},{"@pid":"41/3316","text":"Salvador Luna-Ramírez"}]},"title":"Data-Driven Estimation of Throughput Performance in Sliced Radio Access Networks via Supervised Learning.","venue":"IEEE Trans. Netw. Serv. Manag.","volume":"20","number":"2","pages":"1008-1023","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tnsm/GijonTL23","doi":"10.1109/TNSM.2022.3208336","ee":"https://doi.org/10.1109/TNSM.2022.3208336","url":"https://dblp.org/rec/journals/tnsm/GijonTL23"}, "url":"URL#272000" }, { "@score":"3", "@id":"272021", "info":{"authors":{"author":[{"@pid":"116/0938","text":"Jinbin Hu"},{"@pid":"13/4208-1","text":"Jiawei Huang 0001"},{"@pid":"78/2545","text":"Zhaoyi Li"},{"@pid":"75/2669-1","text":"Jianxin Wang 0001"},{"@pid":"h/TianHe","text":"Tian He 0001"}]},"title":"A Receiver-Driven Transport Protocol With High Link Utilization Using Anti-ECN Marking in Data Center Networks.","venue":"IEEE Trans. Netw. Serv. Manag.","volume":"20","number":"2","pages":"1898-1912","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tnsm/HuHLWH23","doi":"10.1109/TNSM.2022.3218343","ee":"https://doi.org/10.1109/TNSM.2022.3218343","url":"https://dblp.org/rec/journals/tnsm/HuHLWH23"}, "url":"URL#272021" }, { "@score":"3", "@id":"272049", "info":{"authors":{"author":[{"@pid":"268/3644","text":"Giap Le"},{"@pid":"96/4946","text":"Sifat Ferdousi"},{"@pid":"154/0644","text":"Andrea Marotta"},{"@pid":"36/786","text":"Sugang Xu"},{"@pid":"25/799","text":"Yusuke Hirota"},{"@pid":"50/5916","text":"Yoshinari Awaji"},{"@pid":"116/0899","text":"S. Sedef Savas"},{"@pid":"11/6844","text":"Massimo Tornatore"},{"@pid":"86/3964","text":"Biswanath Mukherjee"}]},"title":"Reliable Provisioning With Degraded Service Using Multipath Routing From Multiple Data Centers in Optical Metro Networks.","venue":"IEEE Trans. Netw. Serv. Manag.","volume":"20","number":"3","pages":"3334-3347","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tnsm/LeFMXHASTM23","doi":"10.1109/TNSM.2023.3235354","ee":"https://doi.org/10.1109/TNSM.2023.3235354","url":"https://dblp.org/rec/journals/tnsm/LeFMXHASTM23"}, "url":"URL#272049" }, { "@score":"3", "@id":"272070", "info":{"authors":{"author":[{"@pid":"97/4626","text":"Yi Liu"},{"@pid":"193/3073","text":"Jiangping Han"},{"@pid":"94/5600","text":"Kaiping Xue"},{"@pid":"33/5448-31","text":"Jian Li 0031"},{"@pid":"01/1492","text":"Qibin Sun"},{"@pid":"55/666","text":"Jun Lu"}]},"title":"DECC: Achieving Low Latency in Data Center Networks With Deep Reinforcement Learning.","venue":"IEEE Trans. Netw. Serv. Manag.","volume":"20","number":"4","pages":"4313-4324","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tnsm/LiuHXLSL23","doi":"10.1109/TNSM.2023.3285110","ee":"https://doi.org/10.1109/TNSM.2023.3285110","url":"https://dblp.org/rec/journals/tnsm/LiuHXLSL23"}, "url":"URL#272070" }, { "@score":"3", "@id":"272118", "info":{"authors":{"author":[{"@pid":"208/6379","text":"Kokouvi Bénoît Nougnanke"},{"@pid":"17/4997","text":"Yann Labit"},{"@pid":"139/1756","text":"Marc Bruyere"},{"@pid":"217/4301","text":"Ulrich Aïvodji"},{"@pid":"120/1774","text":"Simone Ferlin"}]},"title":"ML-Based Performance Modeling in SDN-Enabled Data Center Networks.","venue":"IEEE Trans. Netw. Serv. Manag.","volume":"20","number":"1","pages":"815-829","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tnsm/NougnankeLBAF23","doi":"10.1109/TNSM.2022.3197789","ee":"https://doi.org/10.1109/TNSM.2022.3197789","url":"https://dblp.org/rec/journals/tnsm/NougnankeLBAF23"}, "url":"URL#272118" }, { "@score":"4", "@id":"272131", "info":{"authors":{"author":[{"@pid":"03/3803","text":"Chang-Seop Park"},{"@pid":"227/7876","text":"Wang-Seok Park"},{"@pid":"160/8623","text":"Samuel Woo"}]},"title":"Security Bootstrapping for Securing Data Plane and Control Plane in Named Data Networking.","venue":"IEEE Trans. Netw. Serv. Manag.","volume":"20","number":"3","pages":"3765-3781","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tnsm/ParkPW23","doi":"10.1109/TNSM.2022.3232359","ee":"https://doi.org/10.1109/TNSM.2022.3232359","url":"https://dblp.org/rec/journals/tnsm/ParkPW23"}, "url":"URL#272131" }, { "@score":"3", "@id":"272174", "info":{"authors":{"author":[{"@pid":"25/9554","text":"Neha Sharma"},{"@pid":"173/5193","text":"Udit Agarwal"},{"@pid":"363/9859","text":"Sunny Shaurya"},{"@pid":"292/1184","text":"Shashank Mishra"},{"@pid":"136/4590","text":"Om Jee Pandey"}]},"title":"Energy-Efficient and QoS-Aware Data Routing in Node Fault Prediction Based IoT Networks.","venue":"IEEE Trans. Netw. Serv. Manag.","volume":"20","number":"4","pages":"4585-4599","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tnsm/SharmaASMP23","doi":"10.1109/TNSM.2023.3268676","ee":"https://doi.org/10.1109/TNSM.2023.3268676","url":"https://dblp.org/rec/journals/tnsm/SharmaASMP23"}, "url":"URL#272174" }, { "@score":"3", "@id":"272237", "info":{"authors":{"author":[{"@pid":"87/3515","text":"Da Xiao"},{"@pid":"07/314-a","text":"J. Andrew Zhang"},{"@pid":"76/1820-2","text":"Xin Liu 0002"},{"@pid":"320/8496","text":"Yiwen Qu"},{"@pid":"31/2597-1","text":"Wei Ni 0001"},{"@pid":"70/4241","text":"Ren Ping Liu"}]},"title":"A Two-Stage GCN-Based Deep Reinforcement Learning Framework for SFC Embedding in Multi-Datacenter Networks.","venue":"IEEE Trans. Netw. Serv. Manag.","volume":"20","number":"4","pages":"4297-4312","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tnsm/XiaoZLQNL23","doi":"10.1109/TNSM.2023.3284293","ee":"https://doi.org/10.1109/TNSM.2023.3284293","url":"https://dblp.org/rec/journals/tnsm/XiaoZLQNL23"}, "url":"URL#272237" }, { "@score":"3", "@id":"273290", "info":{"authors":{"author":[{"@pid":"180/7151","text":"Wenkai Dai"},{"@pid":"125/2922","text":"Klaus-Tycho Foerster"},{"@pid":"267/9692","text":"David Fuchssteiner"},{"@pid":"58/3289-1","text":"Stefan Schmid 0001"}]},"title":"Load-optimization in Reconfigurable Data-center Networks: Algorithms and Complexity of Flow Routing.","venue":"ACM Trans. Model. Perform. Evaluation Comput. Syst.","volume":"8","number":"3","pages":"1-30","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tompecs/DaiFFS23","doi":"10.1145/3597200","ee":"https://doi.org/10.1145/3597200","url":"https://dblp.org/rec/journals/tompecs/DaiFFS23"}, "url":"URL#273290" }, { "@score":"3", "@id":"273443", "info":{"authors":{"author":[{"@pid":"151/6230","text":"Shouxi Luo"},{"@pid":"f/PingzhiFan","text":"Pingzhi Fan"},{"@pid":"17/3284","text":"Huanlai Xing"},{"@pid":"94/60","text":"Hongfang Yu"}]},"title":"Meeting Coflow Deadlines in Data Center Networks With Policy-Based Selective Completion.","venue":"IEEE/ACM Trans. Netw.","volume":"31","number":"1","pages":"178-191","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ton/LuoFXY23","doi":"10.1109/TNET.2022.3187821","ee":"https://doi.org/10.1109/TNET.2022.3187821","url":"https://dblp.org/rec/journals/ton/LuoFXY23"}, "url":"URL#273443" }, { "@score":"3", "@id":"273446", "info":{"authors":{"author":[{"@pid":"172/4536","text":"Akbar Majidi"},{"@pid":"95/6947-1","text":"Xiaofeng Gao 0001"},{"@pid":"245/6249","text":"Shunjia Zhu"},{"@pid":"245/6301","text":"Nazila Jahanbakhsh"},{"@pid":"162/1613","text":"Jiaqi Zheng 0001"},{"@pid":"51/1742","text":"Guihai Chen"}]},"title":"MiFi: Bounded Update to Optimize Network Performance in Software-Defined Data Centers.","venue":"IEEE/ACM Trans. Netw.","volume":"31","number":"1","pages":"322-335","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ton/MajidiGZJZC23","doi":"10.1109/TNET.2022.3192167","ee":"https://doi.org/10.1109/TNET.2022.3192167","url":"https://dblp.org/rec/journals/ton/MajidiGZJZC23"}, "url":"URL#273446" }, { "@score":"3", "@id":"273480", "info":{"authors":{"author":[{"@pid":"139/4309","text":"Dian Shen"},{"@pid":"l/JunzhouLuo","text":"Junzhou Luo"},{"@pid":"75/2871-1","text":"Fang Dong 0001"},{"@pid":"34/4714","text":"Xiaolin Guo"},{"@pid":"294/2091","text":"Ciyuan Chen"},{"@pid":"78/2022","text":"Kai Wang"},{"@pid":"l/JohnCSLui","text":"John C. S. Lui"}]},"title":"Enabling Distributed and Optimal RDMA Resource Sharing in Large-Scale Data Center Networks: Modeling, Analysis, and Implementation.","venue":"IEEE/ACM Trans. Netw.","volume":"31","number":"6","pages":"2745-2760","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ton/ShenLDGCWL23","doi":"10.1109/TNET.2023.3263562","ee":"https://doi.org/10.1109/TNET.2023.3263562","url":"https://dblp.org/rec/journals/ton/ShenLDGCWL23"}, "url":"URL#273480" }, { "@score":"3", "@id":"273546", "info":{"authors":{"author":[{"@pid":"04/527-2","text":"Jiao Zhang 0002"},{"@pid":"275/3904","text":"Xiaolong Zhong"},{"@pid":"309/5644","text":"Zirui Wan"},{"@pid":"15/4658","text":"Yu Tian"},{"@pid":"26/11343","text":"Tian Pan 0001"},{"@pid":"34/808-5","text":"Tao Huang 0005"}]},"title":"RCC: Enabling Receiver-Driven RDMA Congestion Control With Congestion Divide-and-Conquer in Datacenter Networks.","venue":"IEEE/ACM Trans. Netw.","volume":"31","number":"1","pages":"103-117","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ton/ZhangZWTPH23","doi":"10.1109/TNET.2022.3185105","ee":"https://doi.org/10.1109/TNET.2022.3185105","url":"https://dblp.org/rec/journals/ton/ZhangZWTPH23"}, "url":"URL#273546" }, { "@score":"3", "@id":"273926", "info":{"authors":{"author":[{"@pid":"63/2255","text":"Usman Ahmed"},{"@pid":"41/912","text":"Jerry Chun-Wei Lin"},{"@pid":"57/9993","text":"Gautam Srivastava 0001"}]},"title":"Deep Hierarchical Attention Active Learning for Mental Disorder Unlabeled Data in AIoMT.","venue":"ACM Trans. Sens. Networks","volume":"19","number":"3","pages":"49:1-49:18","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tosn/AhmedLS23","doi":"10.1145/3519304","ee":"https://doi.org/10.1145/3519304","url":"https://dblp.org/rec/journals/tosn/AhmedLS23"}, "url":"URL#273926" }, { "@score":"3", "@id":"273951", "info":{"authors":{"author":[{"@pid":"02/8779","text":"Kehua Guo"},{"@pid":"354/8711","text":"Feihong Zhu"},{"@pid":"55/8607","text":"Xiaokang Zhou"},{"@pid":"254/5404","text":"Ling-Yan Zhang"},{"@pid":"00/555","text":"Yifei Wang"},{"@pid":"56/6072","text":"Jian Kang"}]},"title":"LesionTalk: Core Data Extraction and Multi-class Lesion Detection in IoT-based Intelligent Healthcare.","venue":"ACM Trans. Sens. Networks","volume":"19","number":"3","pages":"50:1-50:20","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tosn/GuoZZZWK23","doi":"10.1145/3526194","ee":"https://doi.org/10.1145/3526194","url":"https://dblp.org/rec/journals/tosn/GuoZZZWK23"}, "url":"URL#273951" }, { "@score":"3", "@id":"273961", "info":{"authors":{"author":[{"@pid":"02/1430","text":"Shancang Li"},{"@pid":"02/7781-2","text":"Shanshan Zhao 0002"},{"@pid":"146/8257","text":"Prosanta Gope"},{"@pid":"70/2433","text":"Li Da Xu"}]},"title":"Data Privacy Enhancing in the IoT User/Device Behavior Analytics.","venue":"ACM Trans. Sens. Networks","volume":"19","number":"2","pages":"32:1-32:13","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tosn/LiZGX23","doi":"10.1145/3534648","ee":"https://doi.org/10.1145/3534648","url":"https://dblp.org/rec/journals/tosn/LiZGX23"}, "url":"URL#273961" }, { "@score":"3", "@id":"273972", "info":{"authors":{"author":[{"@pid":"228/0615","text":"Mojtaba Mohammadi"},{"@pid":"128/6287","text":"Abdollah Kavousi-Fard"},{"@pid":"226/5996","text":"Moslem Dehghani"},{"@pid":"134/5643","text":"Mazaher Karimi"},{"@pid":"35/3222","text":"Vincenzo Loia"},{"@pid":"258/9117","text":"Hassan Haes Alhelou"},{"@pid":"42/45","text":"Pierluigi Siano"}]},"title":"Reinforcing Data Integrity in Renewable Hybrid AC-DC Microgrids from Social-Economic Perspectives.","venue":"ACM Trans. Sens. Networks","volume":"19","number":"2","pages":"25:1-25:19","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tosn/MohammadiKDKLAS23","doi":"10.1145/3512891","ee":"https://doi.org/10.1145/3512891","url":"https://dblp.org/rec/journals/tosn/MohammadiKDKLAS23"}, "url":"URL#273972" }, { "@score":"4", "@id":"273988", "info":{"authors":{"author":[{"@pid":"54/1738-1","text":"Guang Wang 0001"},{"@pid":"265/7099","text":"Yuefei Chen"},{"@pid":"42/1503-8","text":"Shuai Wang 0008"},{"@pid":"21/3626-19","text":"Fan Zhang 0019"},{"@pid":"15/8612","text":"Desheng Zhang"}]},"title":"ForETaxi: Data-Driven Fleet-Oriented Charging Resource Allocation in Large-Scale Electric Taxi Networks.","venue":"ACM Trans. Sens. Networks","volume":"19","number":"3","pages":"63:1-63:25","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tosn/WangCWZZ23","doi":"10.1145/3570958","ee":"https://doi.org/10.1145/3570958","url":"https://dblp.org/rec/journals/tosn/WangCWZZ23"}, "url":"URL#273988" }, { "@score":"3", "@id":"274004", "info":{"authors":{"author":[{"@pid":"60/7912-1","text":"Xiaoyan Yin 0001"},{"@pid":"236/3141","text":"Xiaoqian Mi"},{"@pid":"72/10301","text":"Sijia Yu"},{"@pid":"50/10586","text":"Yanjiao Chen"},{"@pid":"l/BaochunLi","text":"Baochun Li"}]},"title":"Harmony or Involution: Game Inspiring Age-of-Information Optimization for Edge Data Gathering in Internet of Things.","venue":"ACM Trans. Sens. Networks","volume":"19","number":"2","pages":"46:1-46:23","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tosn/YinMYCL23","doi":"10.1145/3565022","ee":"https://doi.org/10.1145/3565022","url":"https://dblp.org/rec/journals/tosn/YinMYCL23"}, "url":"URL#274004" }, { "@score":"4", "@id":"274007", "info":{"authors":{"author":[{"@pid":"10/1103","text":"Yiming Zeng"},{"@pid":"203/0767","text":"Pengzhan Zhou"},{"@pid":"18/2771-6","text":"Cong Wang 0006"},{"@pid":"51/4433-1","text":"Ji Liu 0001"},{"@pid":"10/2031-1","text":"Yuanyuan Yang 0001"}]},"title":"Economical Behavior Modeling and Analyses for Data Collection in Edge Internet of Things Networks.","venue":"ACM Trans. Sens. Networks","volume":"19","number":"2","pages":"33:1-33:27","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tosn/ZengZWLY23","doi":"10.1145/3532092","ee":"https://doi.org/10.1145/3532092","url":"https://dblp.org/rec/journals/tosn/ZengZWLY23"}, "url":"URL#274007" }, { "@score":"3", "@id":"274090", "info":{"authors":{"author":[{"@pid":"202/3794","text":"Weibei Fan"},{"@pid":"91/8079-1","text":"Fu Xiao 0001"},{"@pid":"233/8560","text":"Mengjie Lv"},{"@pid":"75/2307","text":"Lei Han"},{"@pid":"56/7062","text":"Junchang Wang"},{"@pid":"69/1798","text":"Xin He"}]},"title":"Node Essentiality Assessment and Distributed Collaborative Virtual Network Embedding in Datacenters.","venue":"IEEE Trans. Parallel Distributed Syst.","volume":"34","number":"4","pages":"1265-1280","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tpds/FanXLHWH23","doi":"10.1109/TPDS.2023.3242952","ee":"https://doi.org/10.1109/TPDS.2023.3242952","url":"https://dblp.org/rec/journals/tpds/FanXLHWH23"}, "url":"URL#274090" }, { "@score":"3", "@id":"274156", "info":{"authors":{"author":[{"@pid":"09/3214","text":"Hao Liu"},{"@pid":"22/2010-1","text":"Wenxin Li 0001"},{"@pid":"339/7289","text":"Yiren Pang"},{"@pid":"361/5579","text":"Renjie Pei"},{"@pid":"148/1971","text":"Yitao Hu"},{"@pid":"87/2948","text":"Yuan Liu"},{"@pid":"361/5256","text":"Lide Suo"},{"@pid":"21/6280","text":"Keqiu Li"}]},"title":"Accelerating Data Delivery of Latency-Sensitive Applications in Container Overlay Network.","venue":"IEEE Trans. Parallel Distributed Syst.","volume":"34","number":"12","pages":"3046-3058","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tpds/LiuLPPHLSL23","doi":"10.1109/TPDS.2023.3300745","ee":"https://doi.org/10.1109/TPDS.2023.3300745","url":"https://dblp.org/rec/journals/tpds/LiuLPPHLSL23"}, "url":"URL#274156" }, { "@score":"3", "@id":"274383", "info":{"authors":{"author":[{"@pid":"240/4243","text":"Wanshan Li"},{"@pid":"94/4084-7","text":"Chen Zhang 0007"}]},"title":"A Hidden Markov Model for Condition Monitoring of Time Series Data in Complex Network Systems.","venue":"IEEE Trans. Reliab.","volume":"72","number":"4","pages":"1478-1492","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tr/LiZ23","doi":"10.1109/TR.2023.3234907","ee":"https://doi.org/10.1109/TR.2023.3234907","url":"https://dblp.org/rec/journals/tr/LiZ23"}, "url":"URL#274383" }, { "@score":"3", "@id":"275042", "info":{"authors":{"author":[{"@pid":"87/6284","text":"Yun Li"},{"@pid":"353/9847","text":"Shi-Jie Jian"},{"@pid":"63/3158","text":"Sun-Yuan Hsieh"},{"@pid":"342/1744","text":"Wei-Kang Chung"},{"@pid":"z/AlbertYZomaya","text":"Albert Y. Zomaya"}]},"title":"A Weighted Optimal Scheduling Scheme for Congestion Control in Cloud Data Center Networks.","venue":"IEEE Trans. Serv. Comput.","volume":"16","number":"4","pages":"2402-2410","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tsc/LiJHCZ23","doi":"10.1109/TSC.2023.3239524","ee":"https://doi.org/10.1109/TSC.2023.3239524","url":"https://dblp.org/rec/journals/tsc/LiJHCZ23"}, "url":"URL#275042" }, { "@score":"3", "@id":"275743", "info":{"authors":{"author":[{"@pid":"139/6577","text":"Sha Peng"},{"@pid":"89/6855","text":"Zhenyong Zhang"},{"@pid":"92/7210","text":"Ruilong Deng"},{"@pid":"76/185-1","text":"Peng Cheng 0001"}]},"title":"Localizing False Data Injection Attacks in Smart Grid: A Spectrum-Based Neural Network Approach.","venue":"IEEE Trans. Smart Grid","volume":"14","number":"6","pages":"4827-4838","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tsg/PengZDC23","doi":"10.1109/TSG.2023.3261970","ee":"https://doi.org/10.1109/TSG.2023.3261970","url":"https://dblp.org/rec/journals/tsg/PengZDC23"}, "url":"URL#275743" }, { "@score":"3", "@id":"275787", "info":{"authors":{"author":[{"@pid":"295/3994","text":"Xianzhuo Sun"},{"@pid":"20/1461-1","text":"Jing Qiu 0001"},{"@pid":"286/8936","text":"Yuechuan Tao"},{"@pid":"73/3830-1","text":"Junhua Zhao 0001"}]},"title":"Data-Driven Combined Central and Distributed Volt/Var Control in Active Distribution Networks.","venue":"IEEE Trans. Smart Grid","volume":"14","number":"3","pages":"1855-1867","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tsg/SunQTZ23","doi":"10.1109/TSG.2022.3213587","ee":"https://doi.org/10.1109/TSG.2022.3213587","url":"https://dblp.org/rec/journals/tsg/SunQTZ23"}, "url":"URL#275787" }, { "@score":"3", "@id":"275921", "info":{"authors":{"author":[{"@pid":"303/0789","text":"Chenghan Zhou"},{"@pid":"213/6349","text":"Guibin Zou"},{"@pid":"83/3714","text":"Shuo Zhang"},{"@pid":"350/4408","text":"Maoran Zheng"},{"@pid":"308/5737","text":"Junyang Tian"},{"@pid":"51/3026","text":"Tao Du"}]},"title":"Mathematical Morphology-Based Fault Data Self-Synchronization Method for Differential Protection in Distribution Networks.","venue":"IEEE Trans. Smart Grid","volume":"14","number":"4","pages":"2607-2620","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tsg/ZhouZZZTD23","doi":"10.1109/TSG.2022.3224210","ee":"https://doi.org/10.1109/TSG.2022.3224210","url":"https://dblp.org/rec/journals/tsg/ZhouZZZTD23"}, "url":"URL#275921" }, { "@score":"4", "@id":"276356", "info":{"authors":{"author":[{"@pid":"97/8229","text":"Fendy Santoso"},{"@pid":"62/3565","text":"Anthony Finn"}]},"title":"A Data-Driven Cyber-Physical System Using Deep-Learning Convolutional Neural Networks: Study on False-Data Injection Attacks in an Unmanned Ground Vehicle Under Fault-Tolerant Conditions.","venue":"IEEE Trans. Syst. Man Cybern. Syst.","volume":"53","number":"1","pages":"346-356","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tsmc/SantosoF23","doi":"10.1109/TSMC.2022.3170071","ee":"https://doi.org/10.1109/TSMC.2022.3170071","url":"https://dblp.org/rec/journals/tsmc/SantosoF23"}, "url":"URL#276356" }, { "@score":"3", "@id":"278085", "info":{"authors":{"author":[{"@pid":"184/9843","text":"Yilong Hui"},{"@pid":"28/11467","text":"Yuanhao Huang"},{"@pid":"83/2914","text":"Changle Li"},{"@pid":"73/8540","text":"Nan Cheng"},{"@pid":"269/7711","text":"Pincan Zhao"},{"@pid":"02/1003-1","text":"Rui Chen 0001"},{"@pid":"31/8333","text":"Tom H. Luan"}]},"title":"On-Demand Self-Media Data Trading in Heterogeneous Vehicular Networks.","venue":"IEEE Trans. Veh. Technol.","volume":"72","number":"9","pages":"11787-11799","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tvt/HuiHLCZCL23","doi":"10.1109/TVT.2023.3268112","ee":"https://doi.org/10.1109/TVT.2023.3268112","url":"https://dblp.org/rec/journals/tvt/HuiHLCZCL23"}, "url":"URL#278085" }, { "@score":"3", "@id":"278116", "info":{"authors":{"author":[{"@pid":"245/4668","text":"Haoge Jia"},{"@pid":"00/8334","text":"Chunxiao Jiang"},{"@pid":"63/4802","text":"Linling Kuang"},{"@pid":"59/3894","text":"Jianhua Lu"}]},"title":"Adaptive Random Access and Data Transmission Scheme With Mixed Traffic in NGSO Satellite Networks.","venue":"IEEE Trans. Veh. Technol.","volume":"72","number":"5","pages":"6765-6777","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tvt/JiaJKL23a","doi":"10.1109/TVT.2023.3236453","ee":"https://doi.org/10.1109/TVT.2023.3236453","url":"https://dblp.org/rec/journals/tvt/JiaJKL23a"}, "url":"URL#278116" }, { "@score":"3", "@id":"278144", "info":{"authors":{"author":[{"@pid":"343/8677","text":"Jieqiong Kang"},{"@pid":"94/9077","text":"Long Qu"},{"@pid":"16/3621-2","text":"Juan Liu 0002"},{"@pid":"36/9808","text":"Maurice J. Khabbaz"}]},"title":"A Novel Deadline-/Interference-Aware Cooperative Data Transmission Scheduling Scheme for Optimizing AoI in Wireless Networks.","venue":"IEEE Trans. Veh. Technol.","volume":"72","number":"5","pages":"6532-6546","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tvt/KangQLK23","doi":"10.1109/TVT.2022.3231538","ee":"https://doi.org/10.1109/TVT.2022.3231538","url":"https://dblp.org/rec/journals/tvt/KangQLK23"}, "url":"URL#278144" }, { "@score":"3", "@id":"278201", "info":{"authors":{"author":[{"@pid":"39/4985-2","text":"Jaewook Lee 0002"},{"@pid":"123/1953","text":"Haneul Ko"},{"@pid":"36/2623","text":"Sangwon Seo"},{"@pid":"51/16","text":"Sangheon Pack"}]},"title":"Data Distribution-Aware Online Client Selection Algorithm for Federated Learning in Heterogeneous Networks.","venue":"IEEE Trans. Veh. Technol.","volume":"72","number":"1","pages":"1127-1136","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tvt/LeeKSP23","doi":"10.1109/TVT.2022.3205307","ee":"https://doi.org/10.1109/TVT.2022.3205307","url":"https://dblp.org/rec/journals/tvt/LeeKSP23"}, "url":"URL#278201" }, { "@score":"3", "@id":"278227", "info":{"authors":{"author":[{"@pid":"137/0060","text":"Baozhu Li"},{"@pid":"50/2156","text":"Fen Hou"},{"@pid":"163/8605","text":"Gangqiang Yang"},{"@pid":"39/6153","text":"Hui Zhao"},{"@pid":"35/1712","text":"Shanzhi Chen"}]},"title":"Data Analysis-Oriented Stochastic Scheduling for Cost Efficient Resource Allocation in NFV Based MEC Network.","venue":"IEEE Trans. Veh. Technol.","volume":"72","number":"5","pages":"6695-6708","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tvt/LiHYZC23","doi":"10.1109/TVT.2023.3234285","ee":"https://doi.org/10.1109/TVT.2023.3234285","url":"https://dblp.org/rec/journals/tvt/LiHYZC23"}, "url":"URL#278227" }, { "@score":"3", "@id":"278260", "info":{"authors":{"author":[{"@pid":"244/8662","text":"Dongji Li"},{"@pid":"94/5218","text":"Shaoyi Xu"},{"@pid":"87/660-93","text":"Yan Li 0093"},{"@pid":"118/3675","text":"Yuanjie Wang"}]},"title":"Two-Phases Flying Process Based Cruise Time Minimization for Collecting Data in a UAV-Enabled Untraveled Wireless IoT Network.","venue":"IEEE Trans. Veh. Technol.","volume":"72","number":"8","pages":"10425-10439","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tvt/LiXLW23","doi":"10.1109/TVT.2023.3260826","ee":"https://doi.org/10.1109/TVT.2023.3260826","url":"https://dblp.org/rec/journals/tvt/LiXLW23"}, "url":"URL#278260" }, { "@score":"3", "@id":"278419", "info":{"authors":{"author":[{"@pid":"86/4227","text":"Hao Ma"},{"@pid":"25/11052","text":"Zhiqing Wei"},{"@pid":"152/9778","text":"Zening Li"},{"@pid":"149/0589","text":"Fan Ning"},{"@pid":"83/6331","text":"Xu Chen"},{"@pid":"48/195-1","text":"Zhiyong Feng 0001"}]},"title":"Performance of Cooperative Detection in Joint Communication-Sensing Vehicular Network: A Data Analytic and Stochastic Geometry Approach.","venue":"IEEE Trans. Veh. Technol.","volume":"72","number":"3","pages":"3848-3863","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tvt/MaWLNCF23","doi":"10.1109/TVT.2022.3217595","ee":"https://doi.org/10.1109/TVT.2022.3217595","url":"https://dblp.org/rec/journals/tvt/MaWLNCF23"}, "url":"URL#278419" }, { "@score":"3", "@id":"278742", "info":{"authors":{"author":[{"@pid":"90/4225","text":"Feng Wang"},{"@pid":"59/4773","text":"Dingde Jiang"},{"@pid":"52/253","text":"Zhihao Wang"},{"@pid":"33/6012","text":"Shahid Mumtaz"}]},"title":"Service Continuity Based Data Delivery Optimization in Satellite-Terrestrial Networks.","venue":"IEEE Trans. Veh. Technol.","volume":"72","number":"10","pages":"13604-13617","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tvt/WangJWM23","doi":"10.1109/TVT.2023.3277809","ee":"https://doi.org/10.1109/TVT.2023.3277809","url":"https://dblp.org/rec/journals/tvt/WangJWM23"}, "url":"URL#278742" }, { "@score":"3", "@id":"278747", "info":{"authors":{"author":[{"@pid":"62/2569","text":"Junxia Wang"},{"@pid":"51/376","text":"Jiangtao Luo"},{"@pid":"146/6817","text":"Yongyi Ran"},{"@pid":"155/8307","text":"Junchao Yang"},{"@pid":"73/4566-1","text":"Kai Liu 0001"},{"@pid":"01/267-1","text":"Song Guo 0001"}]},"title":"Towards Predictive Forwarding Strategy in Vehicular Named Data Networking.","venue":"IEEE Trans. Veh. Technol.","volume":"72","number":"3","pages":"3751-3763","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tvt/WangLRYLG23","doi":"10.1109/TVT.2022.3209539","ee":"https://doi.org/10.1109/TVT.2022.3209539","url":"https://dblp.org/rec/journals/tvt/WangLRYLG23"}, "url":"URL#278747" }, { "@score":"3", "@id":"278845", "info":{"authors":{"author":{"@pid":"94/7001-1","text":"Ding Xu 0001"}},"title":"Joint Optimal Data Collection Scheduling and Time Allocation in Full-Duplex WP-IoT Networks.","venue":"IEEE Trans. Veh. Technol.","volume":"72","number":"8","pages":"10994-10999","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tvt/Xu23","doi":"10.1109/TVT.2023.3259359","ee":"https://doi.org/10.1109/TVT.2023.3259359","url":"https://dblp.org/rec/journals/tvt/Xu23"}, "url":"URL#278845" }, { "@score":"3", "@id":"278978", "info":{"authors":{"author":[{"@pid":"71/208-18","text":"Shuai Zhang 0018"},{"@pid":"150/2407","text":"Weiqi Liu"},{"@pid":"a/NirwanAnsari","text":"Nirwan Ansari"}]},"title":"Completion Time Minimization for Data Collection in a UAV-enabled IoT Network: A Deep Reinforcement Learning Approach.","venue":"IEEE Trans. Veh. Technol.","volume":"72","number":"11","pages":"14734-14742","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tvt/ZhangLA23","doi":"10.1109/TVT.2023.3280848","ee":"https://doi.org/10.1109/TVT.2023.3280848","url":"https://dblp.org/rec/journals/tvt/ZhangLA23"}, "url":"URL#278978" }, { "@score":"3", "@id":"279178", "info":{"authors":{"author":[{"@pid":"49/4553-4","text":"Gong Chen 0004"},{"@pid":"280/0804","text":"Xiangping Bryce Zhai"},{"@pid":"48/10800","text":"Congduan Li"}]},"title":"Joint Optimization of Trajectory and User Association via Reinforcement Learning for UAV-Aided Data Collection in Wireless Networks.","venue":"IEEE Trans. Wirel. Commun.","volume":"22","number":"5","pages":"3128-3143","year":"2023","type":"Journal Articles","access":"closed","key":"journals/twc/ChenZL23","doi":"10.1109/TWC.2022.3216049","ee":"https://doi.org/10.1109/TWC.2022.3216049","url":"https://dblp.org/rec/journals/twc/ChenZL23"}, "url":"URL#279178" }, { "@score":"3", "@id":"279182", "info":{"authors":{"author":[{"@pid":"240/6202","text":"Mingyue Cheng"},{"@pid":"46/7206","text":"Quansheng Guan"},{"@pid":"118/6735","text":"Qianqian Wang"},{"@pid":"73/3157","text":"Fei Ji"},{"@pid":"65/1128","text":"Tony Q. S. Quek"}]},"title":"FER-Restricted AUV-Relaying Data Collection in Underwater Acoustic Sensor Networks.","venue":"IEEE Trans. Wirel. Commun.","volume":"22","number":"12","pages":"9131-9142","year":"2023","type":"Journal Articles","access":"closed","key":"journals/twc/ChengGWJQ23","doi":"10.1109/TWC.2023.3268720","ee":"https://doi.org/10.1109/TWC.2023.3268720","url":"https://dblp.org/rec/journals/twc/ChengGWJQ23"}, "url":"URL#279182" }, { "@score":"3", "@id":"279227", "info":{"authors":{"author":[{"@pid":"335/1794","text":"Xingxia Gao"},{"@pid":"321/8108","text":"Xiumin Zhu"},{"@pid":"09/10375","text":"Linbo Zhai"}]},"title":"AoI-Sensitive Data Collection in Multi-UAV-Assisted Wireless Sensor Networks.","venue":"IEEE Trans. Wirel. Commun.","volume":"22","number":"8","pages":"5185-5197","year":"2023","type":"Journal Articles","access":"closed","key":"journals/twc/GaoZZ23","doi":"10.1109/TWC.2022.3232366","ee":"https://doi.org/10.1109/TWC.2022.3232366","url":"https://dblp.org/rec/journals/twc/GaoZZ23"}, "url":"URL#279227" }, { "@score":"3", "@id":"279398", "info":{"authors":{"author":[{"@pid":"92/6266","text":"Jianghui Liu"},{"@pid":"57/779-1","text":"Hongtao Zhang 0001"}]},"title":"Height-Fixed UAV Enabled Energy-Efficient Data Collection in RIS-Aided Wireless Sensor Networks.","venue":"IEEE Trans. Wirel. Commun.","volume":"22","number":"11","pages":"7452-7463","year":"2023","type":"Journal Articles","access":"closed","key":"journals/twc/LiuZ23","doi":"10.1109/TWC.2023.3250988","ee":"https://doi.org/10.1109/TWC.2023.3250988","url":"https://dblp.org/rec/journals/twc/LiuZ23"}, "url":"URL#279398" }, { "@score":"3", "@id":"279741", "info":{"authors":{"author":[{"@pid":"276/3153","text":"Jinkai Zheng"},{"@pid":"31/8333","text":"Tom H. Luan"},{"@pid":"57/3892-5","text":"Yao Zhang 0005"},{"@pid":"96/4282-47","text":"Rui Li 0047"},{"@pid":"184/9843","text":"Yilong Hui"},{"@pid":"44/7500","text":"Longxiang Gao"},{"@pid":"62/6234","text":"Mianxiong Dong"}]},"title":"Data Synchronization in Vehicular Digital Twin Network: A Game Theoretic Approach.","venue":"IEEE Trans. Wirel. Commun.","volume":"22","number":"11","pages":"7635-7647","year":"2023","type":"Journal Articles","access":"closed","key":"journals/twc/ZhengLZLHGD23","doi":"10.1109/TWC.2023.3254158","ee":"https://doi.org/10.1109/TWC.2023.3254158","url":"https://dblp.org/rec/journals/twc/ZhengLZLHGD23"}, "url":"URL#279741" }, { "@score":"3", "@id":"279751", "info":{"authors":{"author":[{"@pid":"125/8978","text":"Botao Zhu"},{"@pid":"54/11255","text":"Ebrahim Bedeer"},{"@pid":"55/1768-1","text":"Ha H. Nguyen 0001"},{"@pid":"81/5580","text":"Robert Barton"},{"@pid":"71/1107-1","text":"Zhen Gao 0001"}]},"title":"UAV Trajectory Planning for AoI-Minimal Data Collection in UAV-Aided IoT Networks by Transformer.","venue":"IEEE Trans. Wirel. Commun.","volume":"22","number":"2","pages":"1343-1358","year":"2023","type":"Journal Articles","access":"closed","key":"journals/twc/ZhuBNBG23","doi":"10.1109/TWC.2022.3204438","ee":"https://doi.org/10.1109/TWC.2022.3204438","url":"https://dblp.org/rec/journals/twc/ZhuBNBG23"}, "url":"URL#279751" }, { "@score":"4", "@id":"280112", "info":{"authors":{"author":[{"@pid":"234/1464","text":"Teng Cheng"},{"@pid":"02/2264","text":"Lei Sun"},{"@pid":"148/1548","text":"Junning Zhang"},{"@pid":"360/9432","text":"Dengchao Hou"},{"@pid":"04/320","text":"Qin Shi"},{"@pid":"72/8786","text":"Jiong Chen"}]},"title":"Based on real and virtual datasets adaptive joint training in multi-modal networks with applications in monocular 3D target detection.","venue":"Vis. Comput.","volume":"39","number":"12","pages":"6367-6377","year":"2023","type":"Journal Articles","access":"closed","key":"journals/vc/ChengSZHSC23","doi":"10.1007/S00371-022-02734-5","ee":"https://doi.org/10.1007/s00371-022-02734-5","url":"https://dblp.org/rec/journals/vc/ChengSZHSC23"}, "url":"URL#280112" }, { "@score":"3", "@id":"280562", "info":{"authors":{"author":[{"@pid":"210/3998","text":"András Gazdag"},{"@pid":"236/6036","text":"Szilvia Lestyán"},{"@pid":"254/1918","text":"Mina Remeli"},{"@pid":"86/405","text":"Gergely Ács"},{"@pid":"00/1005","text":"Tamás Holczer"},{"@pid":"83/2180","text":"Gergely Biczók"}]},"title":"Privacy pitfalls of releasing in-vehicle network data.","venue":"Veh. Commun.","volume":"39","pages":"100565","year":"2023","type":"Journal Articles","access":"open","key":"journals/vcomm/GazdagLRAHB23","doi":"10.1016/J.VEHCOM.2022.100565","ee":"https://doi.org/10.1016/j.vehcom.2022.100565","url":"https://dblp.org/rec/journals/vcomm/GazdagLRAHB23"}, "url":"URL#280562" }, { "@score":"3", "@id":"280570", "info":{"authors":{"author":[{"@pid":"325/0093","text":"Abdelmonom Hajjej"},{"@pid":"02/10627","text":"Marwane Ayaida"},{"@pid":"44/8276","text":"Sameh Najeh"},{"@pid":"15/10630","text":"Nadhir Messai"},{"@pid":"325/0465","text":"Leïla Najjar"}]},"title":"Robust backbone network based on hybrid selection of relays for multi-hop data dissemination in VANETs.","venue":"Veh. Commun.","volume":"44","pages":"100659","year":"2023","type":"Journal Articles","access":"closed","key":"journals/vcomm/HajjejANMN23","doi":"10.1016/J.VEHCOM.2023.100659","ee":"https://doi.org/10.1016/j.vehcom.2023.100659","url":"https://dblp.org/rec/journals/vcomm/HajjejANMN23"}, "url":"URL#280570" }, { "@score":"3", "@id":"281691", "info":{"authors":{"author":[{"@pid":"244/8502","text":"Yunhui Qin"},{"@pid":"12/4711","text":"Zhongshan Zhang"},{"@pid":"49/3036","text":"Wei Huangfu"},{"@pid":"70/2140-1","text":"Haijun Zhang 0001"},{"@pid":"53/6133","text":"Keping Long"}]},"title":"Cooperative Resource Allocation Based on Soft Actor-Critic With Data Augmentation in Cellular Network.","venue":"IEEE Wirel. Commun. Lett.","volume":"12","number":"3","pages":"396-400","year":"2023","type":"Journal Articles","access":"closed","key":"journals/wcl/QinZHZL23","doi":"10.1109/LWC.2022.3227033","ee":"https://doi.org/10.1109/LWC.2022.3227033","url":"https://dblp.org/rec/journals/wcl/QinZHZL23"}, "url":"URL#281691" }, { "@score":"3", "@id":"282031", "info":{"authors":{"author":[{"@pid":"253/6768","text":"P. C. Senthil Mahesh"},{"@pid":"257/2407","text":"K. Muthumanickam"}]},"title":"Secure and novel authentication model for protecting data centers in fog environment.","venue":"Wirel. Networks","volume":"29","number":"4","pages":"1671-1683","year":"2023","type":"Journal Articles","access":"closed","key":"journals/winet/MaheshM23","doi":"10.1007/S11276-022-03220-5","ee":"https://doi.org/10.1007/s11276-022-03220-5","url":"https://dblp.org/rec/journals/winet/MaheshM23"}, "url":"URL#282031" }, { "@score":"3", "@id":"282044", "info":{"authors":{"author":[{"@pid":"344/8718","text":"Arezou Naghib"},{"@pid":"48/7665","text":"Nima Jafari Navimipour"},{"@pid":"66/10052-1","text":"Mehdi Hosseinzadeh 0001"},{"@pid":"199/7134","text":"Arash Sharifi"}]},"title":"A comprehensive and systematic literature review on the big data management techniques in the internet of things.","venue":"Wirel. Networks","volume":"29","number":"3","pages":"1085-1144","year":"2023","type":"Journal Articles","access":"closed","key":"journals/winet/NaghibNHS23","doi":"10.1007/S11276-022-03177-5","ee":"https://doi.org/10.1007/s11276-022-03177-5","url":"https://dblp.org/rec/journals/winet/NaghibNHS23"}, "url":"URL#282044" }, { "@score":"3", "@id":"282065", "info":{"authors":{"author":[{"@pid":"262/4240","text":"P. V. Pravija Raj"},{"@pid":"a/ZaherAlAghbari","text":"Zaher Al Aghbari"},{"@pid":"72/5176","text":"Ahmed M. Khedr"}]},"title":"ETP-CED: efficient trajectory planning method for coverage enhanced data collection in WSN.","venue":"Wirel. Networks","volume":"29","number":"5","pages":"2127-2142","year":"2023","type":"Journal Articles","access":"closed","key":"journals/winet/RajAK23","doi":"10.1007/S11276-023-03263-2","ee":"https://doi.org/10.1007/s11276-023-03263-2","url":"https://dblp.org/rec/journals/winet/RajAK23"}, "url":"URL#282065" }, { "@score":"3", "@id":"282075", "info":{"authors":{"author":[{"@pid":"301/9638","text":"Deepaa Selva"},{"@pid":"200/2690","text":"K. P. Sridhar"},{"@pid":"339/1156","text":"K. B. Mythili"}]},"title":"Scheduling model for task loading in cloud data centres.","venue":"Wirel. Networks","volume":"29","number":"2","pages":"475-487","year":"2023","type":"Journal Articles","access":"closed","key":"journals/winet/SelvaSM23","doi":"10.1007/S11276-022-03137-Z","ee":"https://doi.org/10.1007/s11276-022-03137-z","url":"https://dblp.org/rec/journals/winet/SelvaSM23"}, "url":"URL#282075" }, { "@score":"4", "@id":"282089", "info":{"authors":{"author":[{"@pid":"271/6250","text":"C. Sureshkumar"},{"@pid":"241/7410","text":"S. Sabena"}]},"title":"Design of an adaptive framework with compressive sensing for spatial data in wireless sensor networks.","venue":"Wirel. Networks","volume":"29","number":"5","pages":"2203-2216","year":"2023","type":"Journal Articles","access":"closed","key":"journals/winet/SureshkumarS23","doi":"10.1007/S11276-023-03291-Y","ee":"https://doi.org/10.1007/s11276-023-03291-y","url":"https://dblp.org/rec/journals/winet/SureshkumarS23"}, "url":"URL#282089" }, { "@score":"4", "@id":"282090", "info":{"authors":{"author":[{"@pid":"244/8663","text":"Tania Taami"},{"@pid":"135/2746","text":"Sadoon Azizi"},{"@pid":"188/6020","text":"Ramin Yarinezhad"}]},"title":"Unequal sized cells based on cross shapes for data collection in green Internet of Things (IoT) networks.","venue":"Wirel. Networks","volume":"29","number":"5","pages":"2143-2160","year":"2023","type":"Journal Articles","access":"closed","key":"journals/winet/TaamiAY23","doi":"10.1007/S11276-023-03281-0","ee":"https://doi.org/10.1007/s11276-023-03281-0","url":"https://dblp.org/rec/journals/winet/TaamiAY23"}, "url":"URL#282090" }, { "@score":"3", "@id":"282094", "info":{"authors":{"author":[{"@pid":"06/10133","text":"Tong Tang"},{"@pid":"313/2016","text":"Linfeng Cui"},{"@pid":"261/6778","text":"Zhiyang Yin"},{"@pid":"176/4828","text":"Shun Hu"},{"@pid":"31/4018","text":"Lei Fu"}]},"title":"Spatiotemporal characteristic aware task allocation strategy using sparse user data in mobile crowdsensing.","venue":"Wirel. Networks","volume":"29","number":"1","pages":"459-474","year":"2023","type":"Journal Articles","access":"closed","key":"journals/winet/TangCYHF23","doi":"10.1007/S11276-022-03138-Y","ee":"https://doi.org/10.1007/s11276-022-03138-y","url":"https://dblp.org/rec/journals/winet/TangCYHF23"}, "url":"URL#282094" }, { "@score":"4", "@id":"282431", "info":{"authors":{"author":[{"@pid":"160/3565","text":"Nimisha Ghosh"},{"@pid":"48/8740","text":"Indrajit Banerjee"}]},"title":"Energy-Efficient Compressive Sensing Based Data Gathering and Scheduling in Wireless Sensor Networks.","venue":"Wirel. Pers. Commun.","volume":"128","number":"4","pages":"2589-2618","year":"2023","type":"Journal Articles","access":"closed","key":"journals/wpc/GhoshB23","doi":"10.1007/S11277-022-10061-0","ee":"https://doi.org/10.1007/s11277-022-10061-0","url":"https://dblp.org/rec/journals/wpc/GhoshB23"}, "url":"URL#282431" }, { "@score":"4", "@id":"282498", "info":{"authors":{"author":[{"@pid":"275/9660","text":"Khushboo Jain"},{"@pid":"126/2525","text":"Akansha Singh"}]},"title":"Data-Prediction Model Based on Stepwise Data Regression Method in Wireless Sensor Network.","venue":"Wirel. Pers. Commun.","volume":"128","number":"3","pages":"2085-2111","year":"2023","type":"Journal Articles","access":"closed","key":"journals/wpc/JainS23","doi":"10.1007/S11277-022-10034-3","ee":"https://doi.org/10.1007/s11277-022-10034-3","url":"https://dblp.org/rec/journals/wpc/JainS23"}, "url":"URL#282498" }, { "@score":"5", "@id":"282587", "info":{"authors":{"author":[{"@pid":"55/11335","text":"D. Satheesh Kumar"},{"@pid":"321/6177","text":"S. Saravana Sundaram"},{"@pid":"22/6379","text":"S. Prakash"},{"@pid":"141/3024","text":"S. Selvaperumal"}]},"title":"Effective Aggregate Data Collection and Enhanced Network Lifetime Using Energy Efficient Aggregation Data Convening Routing in Wireless Sensor Network.","venue":"Wirel. Pers. Commun.","volume":"131","number":"1","pages":"89-103","year":"2023","type":"Journal Articles","access":"closed","key":"journals/wpc/KumarSPS23","doi":"10.1007/S11277-023-10419-Y","ee":"https://doi.org/10.1007/s11277-023-10419-y","url":"https://dblp.org/rec/journals/wpc/KumarSPS23"}, "url":"URL#282587" }, { "@score":"3", "@id":"282641", "info":{"authors":{"author":[{"@pid":"326/0382","text":"Aastha Maheshwari"},{"@pid":"238/4803","text":"Rajesh Kumar Yadav"},{"@pid":"02/353","text":"Prem Nath"}]},"title":"Congestion Aware Data Transmission in Mobile and Constrained IoT Network.","venue":"Wirel. Pers. Commun.","volume":"130","number":"3","pages":"2121-2136","year":"2023","type":"Journal Articles","access":"closed","key":"journals/wpc/MaheshwariYN23","doi":"10.1007/S11277-023-10374-8","ee":"https://doi.org/10.1007/s11277-023-10374-8","url":"https://dblp.org/rec/journals/wpc/MaheshwariYN23"}, "url":"URL#282641" }, { "@score":"3", "@id":"282677", "info":{"authors":{"author":[{"@pid":"252/4008","text":"Kefa G. Mkongwa"},{"@pid":"148/9972","text":"Chaozhu Zhang"},{"@pid":"121/8501","text":"Qingling Liu"}]},"title":"A Reliable Data Transmission Mechanism in Coexisting IEEE 802.15.4-Beacon Enabled Wireless Body Area Networks.","venue":"Wirel. Pers. Commun.","volume":"128","number":"2","pages":"1019-1040","year":"2023","type":"Journal Articles","access":"closed","key":"journals/wpc/MkongwaZL23","doi":"10.1007/S11277-022-09987-2","ee":"https://doi.org/10.1007/s11277-022-09987-2","url":"https://dblp.org/rec/journals/wpc/MkongwaZL23"}, "url":"URL#282677" }, { "@score":"3", "@id":"282776", "info":{"authors":{"author":[{"@pid":"275/9181","text":"Y. M. Raghavendra"},{"@pid":"118/4885","text":"U. B. Mahadevaswamy"}]},"title":"Hybrid Rendezvous Clustering Model for Efficient Data Collection in Multi Sink Based Wireless Sensor Networks.","venue":"Wirel. Pers. Commun.","volume":"129","number":"2","pages":"837-851","year":"2023","type":"Journal Articles","access":"closed","key":"journals/wpc/RaghavendraM23","doi":"10.1007/S11277-022-10158-6","ee":"https://doi.org/10.1007/s11277-022-10158-6","url":"https://dblp.org/rec/journals/wpc/RaghavendraM23"}, "url":"URL#282776" }, { "@score":"3", "@id":"282829", "info":{"authors":{"author":{"@pid":"66/5623","text":"Ahmed Salim"}},"title":"An Approach for Data Routing in Wireless Body Area Network.","venue":"Wirel. Pers. Commun.","volume":"130","number":"1","pages":"377-399","year":"2023","type":"Journal Articles","access":"closed","key":"journals/wpc/Salim23","doi":"10.1007/S11277-023-10290-X","ee":"https://doi.org/10.1007/s11277-023-10290-x","url":"https://dblp.org/rec/journals/wpc/Salim23"}, "url":"URL#282829" }, { "@score":"3", "@id":"282907", "info":{"authors":{"author":[{"@pid":"153/3269","text":"C. Sivasankar"},{"@pid":"304/7829","text":"T. Kumanan"}]},"title":"Reinforcement Learning Based Active Attack Detection and Blockchain Technique to Protect the Data from the Passive Attack in the Autonomous Mobile Network.","venue":"Wirel. Pers. Commun.","volume":"131","number":"4","pages":"2697-2714","year":"2023","type":"Journal Articles","access":"closed","key":"journals/wpc/SivasankarK23","doi":"10.1007/S11277-023-10576-0","ee":"https://doi.org/10.1007/s11277-023-10576-0","url":"https://dblp.org/rec/journals/wpc/SivasankarK23"}, "url":"URL#282907" }, { "@score":"3", "@id":"282921", "info":{"authors":{"author":[{"@pid":"344/3695","text":"Anushka Srivastava"},{"@pid":"201/5627","text":"Manoranjan Rai Bharti"}]},"title":"Hybrid Machine Learning Model for Anomaly Detection in Unlabelled Data of Wireless Sensor Networks.","venue":"Wirel. Pers. Commun.","volume":"129","number":"4","pages":"2693-2710","year":"2023","type":"Journal Articles","access":"closed","key":"journals/wpc/SrivastavaB23","doi":"10.1007/S11277-023-10253-2","ee":"https://doi.org/10.1007/s11277-023-10253-2","url":"https://dblp.org/rec/journals/wpc/SrivastavaB23"}, "url":"URL#282921" }, { "@score":"3", "@id":"283100", "info":{"authors":{"author":[{"@pid":"332/8343","text":"Yikuan Chen"},{"@pid":"30/5780","text":"Li Liang"},{"@pid":"28/2073-12","text":"Wei Gao 0012"}]},"title":"DFedSN: Decentralized federated learning based on heterogeneous data in social networks.","venue":"World Wide Web","volume":"26","number":"5","pages":"2545-2568","year":"2023","type":"Journal Articles","access":"closed","key":"journals/www/ChenLG23","doi":"10.1007/S11280-023-01152-4","ee":"https://doi.org/10.1007/s11280-023-01152-4","url":"https://dblp.org/rec/journals/www/ChenLG23"}, "url":"URL#283100" }, { "@score":"3", "@id":"283157", "info":{"authors":{"author":[{"@pid":"l/JianxinLi","text":"Jianxin Li 0001"},{"@pid":"l/ChengfeiLiu","text":"Chengfei Liu"},{"@pid":"43/6970","text":"Ziyu Guan"},{"@pid":"32/6122","text":"Yinghui Wu"}]},"title":"Special Issue on Decision Making in Heterogeneous Network Data Scenarios and Applications.","venue":"World Wide Web","volume":"26","number":"1","pages":"1-6","year":"2023","type":"Journal Articles","access":"closed","key":"journals/www/LiLGW23","doi":"10.1007/S11280-022-01048-9","ee":"https://doi.org/10.1007/s11280-022-01048-9","url":"https://dblp.org/rec/journals/www/LiLGW23"}, "url":"URL#283157" }, { "@score":"3", "@id":"283442", "info":{"authors":{"author":[{"@pid":"245/1002","text":"Yerra Prathyusha"},{"@pid":"07/5109","text":"Tsang-Ling Sheu"}]},"title":"A Data Collection Scheme for IoT Using NOMA Techniques in UAV-LEO 6G Networks.","venue":"6GNet","pages":"1-4","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/6gnet/PrathyushaS23","doi":"10.1109/6GNET58894.2023.10317736","ee":"https://doi.org/10.1109/6GNet58894.2023.10317736","url":"https://dblp.org/rec/conf/6gnet/PrathyushaS23"}, "url":"URL#283442" }, { "@score":"3", "@id":"283890", "info":{"authors":{"author":[{"@pid":"357/5967","text":"Amal Alzahrani"},{"@pid":"55/1040","text":"Maolin Tang"}]},"title":"A Microservice-based SaaS Deployment in a Data Center Considering Computational Server and Network Energy Consumption.","venue":"CLOUD","pages":"505-515","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/IEEEcloud/AlzahraniT23","doi":"10.1109/CLOUD60044.2023.00067","ee":"https://doi.org/10.1109/CLOUD60044.2023.00067","url":"https://dblp.org/rec/conf/IEEEcloud/AlzahraniT23"}, "url":"URL#283890" }, { "@score":"3", "@id":"283955", "info":{"authors":{"author":[{"@pid":"119/8573","text":"Yi Yue"},{"@pid":"186/3352","text":"Xiongyan Tang"},{"@pid":"275/5608","text":"Wencong Yang"},{"@pid":"46/8975","text":"Zhiyan Zhang"},{"@pid":"327/8373","text":"Xuebei Zhang"}]},"title":"Virtual Network Function Migration Considering Load Balance and SFC Delay in Cloud Datacenter.","venue":"CLOUD","pages":"1-6","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/IEEEcloud/YueTYZZ23","doi":"10.1109/CLOUD60044.2023.00050","ee":"https://doi.org/10.1109/CLOUD60044.2023.00050","url":"https://dblp.org/rec/conf/IEEEcloud/YueTYZZ23"}, "url":"URL#283955" }, { "@score":"3", "@id":"284183", "info":{"authors":{"author":[{"@pid":"262/4240","text":"P. V. Pravija Raj"},{"@pid":"369/0941","text":"Amel Al Ali"},{"@pid":"72/5176","text":"Ahmed M. Khedr"}]},"title":"CapDC: A new capuchin search based algorithm for efficient data collection in Wireless Sensor Networks.","venue":"SSD","pages":"345-350","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/IEEEssd/RajAK23","doi":"10.1109/SSD58187.2023.10411216","ee":"https://doi.org/10.1109/SSD58187.2023.10411216","url":"https://dblp.org/rec/conf/IEEEssd/RajAK23"}, "url":"URL#284183" }, { "@score":"3", "@id":"285643", "info":{"authors":{"author":[{"@pid":"352/9768","text":"Katie Rosman"},{"@pid":"91/3186","text":"Daniel B. Neill"}]},"title":"Detecting Anomalous Networks of Opioid Prescribers and Dispensers in Prescription Drug Data.","venue":"AAAI","pages":"14470-14477","year":"2023","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/RosmanN23","doi":"10.1609/AAAI.V37I12.26692","ee":"https://doi.org/10.1609/aaai.v37i12.26692","url":"https://dblp.org/rec/conf/aaai/RosmanN23"}, "url":"URL#285643" }, { "@score":"3", "@id":"285785", "info":{"authors":{"author":[{"@pid":"62/10514","text":"Hossein Taheri"},{"@pid":"127/6532","text":"Christos Thrampoulidis"}]},"title":"Fast Convergence in Learning Two-Layer Neural Networks with Separable Data.","venue":"AAAI","pages":"9944-9952","year":"2023","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/TaheriT23","doi":"10.1609/AAAI.V37I8.26186","ee":"https://doi.org/10.1609/aaai.v37i8.26186","url":"https://dblp.org/rec/conf/aaai/TaheriT23"}, "url":"URL#285785" }, { "@score":"3", "@id":"289509", "info":{"authors":{"author":[{"@pid":"294/8356","text":"Ali Hussain Khan"},{"@pid":"69/7964","text":"Naveed Ul Hassan"},{"@pid":"198/6818","text":"Chuadhry Mujeeb Ahmed"},{"@pid":"75/3860","text":"Zartash Afzal Uzmi"},{"@pid":"01/753","text":"Chau Yuen"}]},"title":"Blockchain-Enabled Data Sharing in Connected Autonomous Vehicles for Heterogeneous Networks.","venue":"ACNS Workshops","pages":"215-230","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/acns/KhanHAUY23","doi":"10.1007/978-3-031-41181-6_12","ee":"https://doi.org/10.1007/978-3-031-41181-6_12","url":"https://dblp.org/rec/conf/acns/KhanHAUY23"}, "url":"URL#289509" }, { "@score":"3", "@id":"289682", "info":{"authors":{"author":[{"@pid":"12/10220","text":"Manmeet Kaur"},{"@pid":"118/1265","text":"Farnaz Farid"}]},"title":"A Taxonomy of Secure Data Transmission Techniques: Preventing Sybil Attacks in Vehicular Ad Hoc Networks.","venue":"ACR","pages":"283-293","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/acr/KaurF23","doi":"10.1007/978-3-031-33743-7_24","ee":"https://doi.org/10.1007/978-3-031-33743-7_24","url":"https://dblp.org/rec/conf/acr/KaurF23"}, "url":"URL#289682" }, { "@score":"3", "@id":"289742", "info":{"authors":{"author":[{"@pid":"334/3930","text":"Seonhye Park"},{"@pid":"165/0106","text":"Alsharif Abuadbba"},{"@pid":"63/1591-12","text":"Shuo Wang 0012"},{"@pid":"167/5919","text":"Kristen Moore"},{"@pid":"139/1152","text":"Yansong Gao"},{"@pid":"64/5383","text":"Hyoungshick Kim"},{"@pid":"22/3939","text":"Surya Nepal"}]},"title":"DeepTaster: Adversarial Perturbation-Based Fingerprinting to Identify Proprietary Dataset Use in Deep Neural Networks.","venue":"ACSAC","pages":"535-549","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/acsac/ParkAWMGKN23","doi":"10.1145/3627106.3627204","ee":"https://doi.org/10.1145/3627106.3627204","url":"https://dblp.org/rec/conf/acsac/ParkAWMGKN23"}, "url":"URL#289742" }, { "@score":"3", "@id":"289857", "info":{"authors":{"author":[{"@pid":"346/1255","text":"Jacob Soper"},{"@pid":"29/3925-1","text":"Yue Xu 0001"},{"@pid":"237/1074","text":"Kien Nguyen 0001"},{"@pid":"42/3445","text":"Ernest Foo"},{"@pid":"31/9352","text":"Zahra Jadidi"}]},"title":"A two-pass approach for minimising error in synthetically generated network traffic data sets.","venue":"ACSW","pages":"18-27","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/acsw/SoperXNFJ23","doi":"10.1145/3579375.3579378","ee":"https://doi.org/10.1145/3579375.3579378","url":"https://dblp.org/rec/conf/acsw/SoperXNFJ23"}, "url":"URL#289857" }, { "@score":"3", "@id":"290405", "info":{"authors":{"author":[{"@pid":"360/5701","text":"Abby Blocker"},{"@pid":"360/5740","text":"Ajibola Oladokun"},{"@pid":"360/5811","text":"Mohammed Ishaaq Datay"},{"@pid":"22/8334","text":"Joyce B. Mwangama"},{"@pid":"00/8282","text":"Bessie Malila"}]},"title":"Evaluating the Capability of 3G, 4G, and 5G Networks in Delivering a Virtual Clinic Solution.","venue":"AFRICON","pages":"1-6","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/africon/BlockerODMM23","doi":"10.1109/AFRICON55910.2023.10293519","ee":"https://doi.org/10.1109/AFRICON55910.2023.10293519","url":"https://dblp.org/rec/conf/africon/BlockerODMM23"}, "url":"URL#290405" }, { "@score":"3", "@id":"290685", "info":{"authors":{"author":[{"@pid":"356/4346","text":"Mehmet Selahaddin Sentop"},{"@pid":"158/1453","text":"Meric Yucel"},{"@pid":"13/3742","text":"Burak Berk Üstündag"}]},"title":"Spatio-Temporal Missing Data Reconstruction by Using Deep Neural Networks in Agricultural Monitoring Systems.","venue":"Agro-Geoinformatics","pages":"1-6","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/agro-geoinformatics/SentopYU23","doi":"10.1109/AGRO-GEOINFORMATICS59224.2023.10233578","ee":"https://doi.org/10.1109/Agro-Geoinformatics59224.2023.10233578","url":"https://dblp.org/rec/conf/agro-geoinformatics/SentopYU23"}, "url":"URL#290685" }, { "@score":"3", "@id":"290776", "info":{"authors":{"author":[{"@pid":"353/6531","text":"Mahdi Mohammadizadeh"},{"@pid":"333/3421","text":"Arash Mozhdehi"},{"@pid":"119/5087","text":"Yani Ioannou"},{"@pid":"10/5630","text":"Xin Wang"}]},"title":"Meta-GCN: A Dynamically Weighted Loss Minimization Method for Dealing with the Data Imbalance in Graph Neural Networks.","venue":"Canadian AI","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/ai/MohammadizadehM23","doi":"10.21428/594757DB.0041F830","ee":"https://doi.org/10.21428/594757db.0041f830","url":"https://dblp.org/rec/conf/ai/MohammadizadehM23"}, "url":"URL#290776" }, { "@score":"3", "@id":"290811", "info":{"authors":{"author":[{"@pid":"163/8765","text":"Qinghe Gao"},{"@pid":"354/9242","text":"Hongyu Rang"},{"@pid":"41/5979","text":"Yue Wu"},{"@pid":"16/2303","text":"Tao Jing"},{"@pid":"81/6725","text":"Yan Huo"},{"@pid":"76/8875","text":"Xiaoxuan Wang"}]},"title":"Joint Energy-Limited UAV Trajectory and Node Wake-Up Scheduling Optimization for Data Collection in Maritime Wireless Sensor Networks.","venue":"AI2A","pages":"126-132","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/ai2a/GaoRWJHW23","doi":"10.1145/3611450.3611469","ee":"https://doi.org/10.1145/3611450.3611469","url":"https://dblp.org/rec/conf/ai2a/GaoRWJHW23"}, "url":"URL#290811" }, { "@score":"3", "@id":"291328", "info":{"authors":{"author":[{"@pid":"315/0560","text":"Linxuan Zhao"},{"@pid":"218/0275","text":"Yuanru Tan"},{"@pid":"67/5716","text":"Dragan Gasevic"},{"@pid":"10/5421","text":"David Williamson Shaffer"},{"@pid":"289/6026","text":"Lixiang Yan"},{"@pid":"315/0558","text":"Riordan Alfredo"},{"@pid":"88/2359","text":"Xinyu Li"},{"@pid":"32/9958","text":"Roberto Martínez-Maldonado"}]},"title":"Analysing Verbal Communication in Embodied Team Learning Using Multimodal Data and Ordered Network Analysis.","venue":"AIED","pages":"242-254","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/aied/ZhaoTGSYALM23","doi":"10.1007/978-3-031-36272-9_20","ee":"https://doi.org/10.1007/978-3-031-36272-9_20","url":"https://dblp.org/rec/conf/aied/ZhaoTGSYALM23"}, "url":"URL#291328" }, { "@score":"3", "@id":"291651", "info":{"authors":{"author":[{"@pid":"352/0268","text":"Bhaavya Rampal"},{"@pid":"117/3495","text":"Isha Gupta"},{"@pid":"352/0950","text":"Deepali Saini"},{"@pid":"57/9217","text":"Vivekanand Jha"}]},"title":"Rendezvous-Based Data Collection Approaches in Wireless Sensor Network Using Mobile Sink.","venue":"AIIoT","pages":"278-283","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/aiiot/RampalGSJ23","doi":"10.1109/AIIOT58121.2023.10174575","ee":"https://doi.org/10.1109/AIIoT58121.2023.10174575","url":"https://dblp.org/rec/conf/aiiot/RampalGSJ23"}, "url":"URL#291651" }, { "@score":"3", "@id":"291660", "info":{"authors":{"author":[{"@pid":"352/0400","text":"S. I. Senarathna"},{"@pid":"352/0921","text":"L. A. U. Prasanshi"},{"@pid":"352/0366","text":"S. D. W. Senanayake"},{"@pid":"352/1001","text":"Dhammike Wimalarathne"},{"@pid":"348/2346","text":"S. Kumarawadu"},{"@pid":"184/3080","text":"V. Logeeshan"},{"@pid":"228/1807","text":"Chathura Wanigasekara"}]},"title":"A Data-Driven Approach Based on Artificial Neural Networks for the Detection and Classification of Bearing Anomalies in Power Generation Plants.","venue":"AIIoT","pages":"415-420","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/aiiot/SenarathnaPSWKL23","doi":"10.1109/AIIOT58121.2023.10174441","ee":"https://doi.org/10.1109/AIIoT58121.2023.10174441","url":"https://dblp.org/rec/conf/aiiot/SenarathnaPSWKL23"}, "url":"URL#291660" }, { "@score":"3", "@id":"291740", "info":{"authors":{"author":[{"@pid":"219/7018","text":"Enrico Longato"},{"@pid":"253/8563","text":"Erica Tavazzi"},{"@pid":"00/1802","text":"Adriano Chiò"},{"@pid":"171/9262","text":"Gabriele Mora"},{"@pid":"86/2643","text":"Giovanni Sparacino"},{"@pid":"84/7110","text":"Barbara Di Camillo"}]},"title":"Dealing with Data Scarcity in Rare Diseases: Dynamic Bayesian Networks and Transfer Learning to Develop Prognostic Models of Amyotrophic Lateral Sclerosis.","venue":"AIME","pages":"140-150","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/aime/LongatoTCMSC23","doi":"10.1007/978-3-031-34344-5_18","ee":"https://doi.org/10.1007/978-3-031-34344-5_18","url":"https://dblp.org/rec/conf/aime/LongatoTCMSC23"}, "url":"URL#291740" }, { "@score":"3", "@id":"292415", "info":{"authors":{"author":[{"@pid":"40/2903","text":"Zhihao Li"},{"@pid":"66/6320","text":"Qi Chen"},{"@pid":"335/1295","text":"Weichuan Mo"},{"@pid":"29/4241","text":"Xiaolin Wang"},{"@pid":"48/2484","text":"Li Hu"},{"@pid":"15/4393","text":"Yongzhi Cao"}]},"title":"Converging Blockchain and Deep Learning in UAV Network Defense Strategy: Ensuring Data Security During Flight.","venue":"AIS&P","pages":"156-171","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/aisp/LiCMWHC23","doi":"10.1007/978-981-99-9785-5_12","ee":"https://doi.org/10.1007/978-981-99-9785-5_12","url":"https://dblp.org/rec/conf/aisp/LiCMWHC23"}, "url":"URL#292415" }, { "@score":"3", "@id":"293098", "info":{"authors":{"author":[{"@pid":"180/5697","text":"Mehmet Necip Kurt"},{"@pid":"07/1021-1","text":"Xiaodong Wang 0001"},{"@pid":"78/1737","text":"Pieter J. Mosterman"},{"@pid":"75/5077","text":"Yasin Yilmaz"}]},"title":"Data-Driven Sequential Change Detection in Privacy-Sensitive Networks.","venue":"Allerton","pages":"1","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/allerton/KurtWMY23","doi":"10.1109/ALLERTON58177.2023.10313371","ee":"https://doi.org/10.1109/Allerton58177.2023.10313371","url":"https://dblp.org/rec/conf/allerton/KurtWMY23"}, "url":"URL#293098" }, { "@score":"3", "@id":"293597", "info":{"authors":{"author":[{"@pid":"351/1903","text":"Chuanyi Ning"},{"@pid":"65/4149","text":"Zhiyu Xi"},{"@pid":"166/0497","text":"Xingpeng Zhang"}]},"title":"Design of Advanced False Data Injection Attack in Networked Control Systems.","venue":"ACC","pages":"1958-1965","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/amcc/NingXZ23","doi":"10.23919/ACC55779.2023.10155877","ee":"https://doi.org/10.23919/ACC55779.2023.10155877","url":"https://dblp.org/rec/conf/amcc/NingXZ23"}, "url":"URL#293597" }, { "@score":"4", "@id":"294636", "info":{"authors":{"author":[{"@pid":"371/2262","text":"Sigit Anggraito"},{"@pid":"371/2167","text":"Rahman Parentio"},{"@pid":"371/2052","text":"Ratih Ruffianti"},{"@pid":"371/1931","text":"Baskoro Nugroho"},{"@pid":"371/2219","text":"Fifien Ervianti"},{"@pid":"371/2081","text":"Dian Hendrayana"},{"@pid":"165/9708","text":"Arief Hamdani Gunawan"}]},"title":"Blockchain-Based Data Management System for Validation and Accuracy of Technical Data in Broadband Networks.","venue":"APCC","pages":"459-464","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/apcc/AnggraitoPRNEHG23","doi":"10.1109/APCC60132.2023.10460678","ee":"https://doi.org/10.1109/APCC60132.2023.10460678","url":"https://dblp.org/rec/conf/apcc/AnggraitoPRNEHG23"}, "url":"URL#294636" }, { "@score":"3", "@id":"294659", "info":{"authors":{"author":[{"@pid":"76/4975","text":"Abbas Jamalipour"},{"@pid":"50/3349","text":"Khoa N. Le"}]},"title":"Covert Data Communications in Cell-Free Internet-of-Things Networks.","venue":"APCC","pages":"xxiii","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/apcc/JamalipourL23","doi":"10.1109/APCC60132.2023.10460673","ee":"https://doi.org/10.1109/APCC60132.2023.10460673","url":"https://dblp.org/rec/conf/apcc/JamalipourL23"}, "url":"URL#294659" }, { "@score":"3", "@id":"294842", "info":{"authors":{"author":[{"@pid":"219/2228","text":"Kaixin Huang"},{"@pid":"30/3943","text":"Wentao Liu"},{"@pid":"296/1000","text":"Weihang Li"},{"@pid":"323/8928","text":"Lang Cheng"}]},"title":"TOD: Trend-Oriented Delay-Based Congestion Control in Lossless Datacenter Network.","venue":"APNet","pages":"102-108","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/apnet/HuangLLC23","doi":"10.1145/3600061.3600079","ee":"https://doi.org/10.1145/3600061.3600079","url":"https://dblp.org/rec/conf/apnet/HuangLLC23"}, "url":"URL#294842" }, { "@score":"3", "@id":"294878", "info":{"authors":{"author":[{"@pid":"09/1709","text":"Shuyuan Zhang"},{"@pid":"346/7813","text":"Shu Shan"},{"@pid":"90/10156","text":"Shizhen Zhao"}]},"title":"Reducing Reconfiguration Time in Hybrid Optical-Electrical Datacenter Networks.","venue":"APNet","pages":"41-46","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/apnet/ZhangSZ23","doi":"10.1145/3600061.3600071","ee":"https://doi.org/10.1145/3600061.3600071","url":"https://dblp.org/rec/conf/apnet/ZhangSZ23"}, "url":"URL#294878" }, { "@score":"3", "@id":"294911", "info":{"authors":{"author":[{"@pid":"66/3172","text":"Yi Jiang"},{"@pid":"50/8713","text":"Minghua Wang"},{"@pid":"119/6492","text":"Xingbin Wang"}]},"title":"A Efficient Adaptive Data Rate Algorithm in LoRaWAN Networks: K-ADR.","venue":"APNOMS","pages":"183-188","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/apnoms/JiangWW23","ee":"https://ieeexplore.ieee.org/document/10258176","url":"https://dblp.org/rec/conf/apnoms/JiangWW23"}, "url":"URL#294911" }, { "@score":"3", "@id":"294951", "info":{"authors":{"author":[{"@pid":"41/7732","text":"Yuhang Wu"},{"@pid":"40/3858-3","text":"Quan Chen 0003"},{"@pid":"58/1879","text":"Lianglun Cheng"}]},"title":"Accelerating Non-Preemptive Multicast Flows in Reconfigurable Data Center Networks.","venue":"APNOMS","pages":"401-404","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/apnoms/WuCC23","ee":"https://ieeexplore.ieee.org/document/10258143","url":"https://dblp.org/rec/conf/apnoms/WuCC23"}, "url":"URL#294951" }, { "@score":"3", "@id":"295214", "info":{"authors":{"author":[{"@pid":"362/1527","text":"Cong-Ty Dang"},{"@pid":"234/1027","text":"Vu-Hoang Tran"},{"@pid":"300/7165","text":"Ngoc-Hoang-Lam Le"},{"@pid":"34/1419","text":"Ching-Chun Huang"}]},"title":"From Synthetic To Real: Enhancing Deep Learning Models With Generative Adversarial Networks For Efficient Data Utilization In Automatic Retail Stores.","venue":"APSIPA ASC","pages":"1726-1731","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/apsipa/DangTLH23","doi":"10.1109/APSIPAASC58517.2023.10317140","ee":"https://doi.org/10.1109/APSIPAASC58517.2023.10317140","url":"https://dblp.org/rec/conf/apsipa/DangTLH23"}, "url":"URL#295214" }, { "@score":"3", "@id":"295639", "info":{"authors":{"author":{"@pid":"99/3258","text":"José L. Núñez-Yáñez"}},"title":"Accelerating Graph Neural Networks in Pytorch with HLS and Deep Dataflows.","venue":"ARC","pages":"131-145","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/arc/NunezYanez23","doi":"10.1007/978-3-031-42921-7_9","ee":"https://doi.org/10.1007/978-3-031-42921-7_9","url":"https://dblp.org/rec/conf/arc/NunezYanez23"}, "url":"URL#295639" }, { "@score":"3", "@id":"295863", "info":{"authors":{"author":[{"@pid":"262/5822","text":"Zhicong Yan"},{"@pid":"47/1217-1","text":"Shenghong Li 0001"},{"@pid":"92/10854-1","text":"Ruijie Zhao 0001"},{"@pid":"39/5423-17","text":"Yuan Tian 0017"},{"@pid":"59/2568","text":"Yuanyuan Zhao"}]},"title":"DHBE: Data-free Holistic Backdoor Erasing in Deep Neural Networks via Restricted Adversarial Distillation.","venue":"AsiaCCS","pages":"731-745","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/asiaccs/Yan00TZ23","doi":"10.1145/3579856.3582822","ee":"https://doi.org/10.1145/3579856.3582822","url":"https://dblp.org/rec/conf/asiaccs/Yan00TZ23"}, "url":"URL#295863" }, { "@score":"3", "@id":"298407", "info":{"authors":{"author":[{"@pid":"270/6627","text":"Phornsawan Roemsri"},{"@pid":"98/8756","text":"Tommy Dang"}]},"title":"Visualization of Attack Behavior Data in IoT Network Traffic.","venue":"BDSIC","pages":"1-8","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/bdsic/RoemsriD23","doi":"10.1145/3633624.3633625","ee":"https://doi.org/10.1145/3633624.3633625","url":"https://dblp.org/rec/conf/bdsic/RoemsriD23"}, "url":"URL#298407" }, { "@score":"3", "@id":"298408", "info":{"authors":{"author":[{"@pid":"366/9953","text":"Jieqi Ru"},{"@pid":"366/9811","text":"Linyu Liang"},{"@pid":"229/3267","text":"Lingya Kong"},{"@pid":"130/0179","text":"Yuhui Liu"}]},"title":"Application of BP neural network model based on genetic algorithm to population data analysis and prediction in a province of China.","venue":"BDSIC","pages":"50-55","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/bdsic/RuLKL23","doi":"10.1145/3633624.3633632","ee":"https://doi.org/10.1145/3633624.3633632","url":"https://dblp.org/rec/conf/bdsic/RuLKL23"}, "url":"URL#298408" }, { "@score":"3", "@id":"298791", "info":{"authors":{"author":[{"@pid":"320/2077","text":"Jiayi Dong"},{"@pid":"52/3194","text":"Fei Wang"}]},"title":"GROD: Joint Inference of Gene Regulatory Networks and Data Imputation in Single-Cell RNA Sequencing with Temporal Consideration.","venue":"BIBM","pages":"275-280","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/bibm/DongW23","doi":"10.1109/BIBM58861.2023.10385481","ee":"https://doi.org/10.1109/BIBM58861.2023.10385481","url":"https://dblp.org/rec/conf/bibm/DongW23"}, "url":"URL#298791" }, { "@score":"3", "@id":"298836", "info":{"authors":{"author":[{"@pid":"368/0705","text":"Leandro González-Montesino"},{"@pid":"214/2351","text":"Darian H. Grass-Boada"},{"@pid":"368/1211","text":"Rubén Armañnazas"}]},"title":"Network Community Detection in Connectomics Data using Graph Theory.","venue":"BIBM","pages":"3459-3465","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/bibm/GonzalezMontesinoGA23","doi":"10.1109/BIBM58861.2023.10385337","ee":"https://doi.org/10.1109/BIBM58861.2023.10385337","url":"https://dblp.org/rec/conf/bibm/GonzalezMontesinoGA23"}, "url":"URL#298836" }, { "@score":"3", "@id":"299064", "info":{"authors":{"author":[{"@pid":"368/1563","text":"Davide Mascolo"},{"@pid":"88/1445","text":"Lorenzo Farina"},{"@pid":"179/4534","text":"Manuela Petti"}]},"title":"Multi-layer network modelling of genomic and transcriptomic data to investigate the response to checkpoint inhibitors in NSCLC.","venue":"BIBM","pages":"2825-2830","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/bibm/MascoloFP23","doi":"10.1109/BIBM58861.2023.10385375","ee":"https://doi.org/10.1109/BIBM58861.2023.10385375","url":"https://dblp.org/rec/conf/bibm/MascoloFP23"}, "url":"URL#299064" }, { "@score":"3", "@id":"299794", "info":{"authors":{"author":[{"@pid":"08/5558","text":"Pawel Benecki"},{"@pid":"23/11227","text":"Daniel Kostrzewa"},{"@pid":"240/2128","text":"Piotr Grzesik"},{"@pid":"322/9263","text":"Bohdan Shubyn"},{"@pid":"198/6859","text":"Jia-Hao Syu"},{"@pid":"41/912","text":"Jerry Chun-Wei Lin"},{"@pid":"s/VaidySSunderam","text":"Vaidy S. Sunderam"},{"@pid":"99/3102","text":"Dariusz Mrozek"}]},"title":"Effective Prediction of Energy Consumption in Automated Guided Vehicles with Recurrent and Convolutional Neural Networks.","venue":"IEEE Big Data","pages":"5024-5030","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/bigdataconf/BeneckiKGSSLSM23","doi":"10.1109/BIGDATA59044.2023.10386359","ee":"https://doi.org/10.1109/BigData59044.2023.10386359","url":"https://dblp.org/rec/conf/bigdataconf/BeneckiKGSSLSM23"}, "url":"URL#299794" }, { "@score":"3", "@id":"299807", "info":{"authors":{"author":[{"@pid":"350/2328","text":"Anastasia Kassiani Blitsi"},{"@pid":"118/9547","text":"Georgios Stavropoulos"},{"@pid":"19/4622","text":"Konstantinos Votis"}]},"title":"Vision Paper: Uncovering Illegal Firearm Transactions in Cryptocurrency Networks.","venue":"IEEE Big Data","pages":"4031-4035","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/bigdataconf/BlitsiSV23","doi":"10.1109/BIGDATA59044.2023.10386732","ee":"https://doi.org/10.1109/BigData59044.2023.10386732","url":"https://dblp.org/rec/conf/bigdataconf/BlitsiSV23"}, "url":"URL#299807" }, { "@score":"3", "@id":"299830", "info":{"authors":{"author":[{"@pid":"205/5542","text":"Lorenzo Carnevale"},{"@pid":"253/9094","text":"Annamaria Ficara"},{"@pid":"308/9861","text":"Alessio Catalfamo"},{"@pid":"202/3093","text":"Antonino Galletta"},{"@pid":"09/4135","text":"Maria Fazio"},{"@pid":"70/450","text":"Massimo Villari"}]},"title":"Secure and Energy Efficient Filtered Over-the-Air Internet of Things Setup in a Wireless Mesh Network for Firmware Freshness.","venue":"IEEE Big Data","pages":"3904-3913","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/bigdataconf/CarnevaleFCGFV23","doi":"10.1109/BIGDATA59044.2023.10386600","ee":"https://doi.org/10.1109/BigData59044.2023.10386600","url":"https://dblp.org/rec/conf/bigdataconf/CarnevaleFCGFV23"}, "url":"URL#299830" }, { "@score":"5", "@id":"299990", "info":{"authors":{"author":[{"@pid":"134/3473","text":"Teruaki Hayashi"},{"@pid":"59/2660","text":"Yukihisa Fujita"},{"@pid":"288/3996","text":"Masahiro Kuwahara"}]},"title":"Exploring the Fundamental Units of Semantic Representation of Data Using Heterogeneous Variable Network in Data Ecosystems.","venue":"IEEE Big Data","pages":"5639-5646","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/bigdataconf/HayashiFK23","doi":"10.1109/BIGDATA59044.2023.10386835","ee":"https://doi.org/10.1109/BigData59044.2023.10386835","url":"https://dblp.org/rec/conf/bigdataconf/HayashiFK23"}, "url":"URL#299990" }, { "@score":"5", "@id":"300058", "info":{"authors":{"author":[{"@pid":"367/0471","text":"Ravi Kaler"},{"@pid":"37/640","text":"Durga Toshniwal"}]},"title":"Deep Reinforcement Learning based Data Placement optimization in Data Center Networks.","venue":"IEEE Big Data","pages":"2293-2302","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/bigdataconf/KalerT23","doi":"10.1109/BIGDATA59044.2023.10386549","ee":"https://doi.org/10.1109/BigData59044.2023.10386549","url":"https://dblp.org/rec/conf/bigdataconf/KalerT23"}, "url":"URL#300058" }, { "@score":"3", "@id":"300153", "info":{"authors":{"author":[{"@pid":"367/1620","text":"Jia Mei Grace Lim"},{"@pid":"270/0876","text":"Olakunle Olayinka"}]},"title":"Threat Hunting in Internet of Things Networks with Bio-Inspired Models.","venue":"IEEE Big Data","pages":"6221-6223","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/bigdataconf/LimO23","doi":"10.1109/BIGDATA59044.2023.10386698","ee":"https://doi.org/10.1109/BigData59044.2023.10386698","url":"https://dblp.org/rec/conf/bigdataconf/LimO23"}, "url":"URL#300153" }, { "@score":"4", "@id":"300283", "info":{"authors":{"author":[{"@pid":"156/3009","text":"Sae Hyong Park"},{"@pid":"29/3194","text":"Namseok Ko"}]},"title":"Pangolin: Incast Avoidance in Large Datacenter Networks.","venue":"IEEE Big Data","pages":"6251-6253","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/bigdataconf/ParkK23a","doi":"10.1109/BIGDATA59044.2023.10386178","ee":"https://doi.org/10.1109/BigData59044.2023.10386178","url":"https://dblp.org/rec/conf/bigdataconf/ParkK23a"}, "url":"URL#300283" }, { "@score":"3", "@id":"300316", "info":{"authors":{"author":[{"@pid":"243/2068","text":"Lianke Qin"},{"@pid":"77/2477","text":"Saayan Mitra"},{"@pid":"76/4051-2","text":"Zhao Song 0002"},{"@pid":"10/2031-5","text":"Yuanyuan Yang 0005"},{"@pid":"88/8205-2","text":"Tianyi Zhou 0002"}]},"title":"Fast Heavy Inner Product Identification Between Weights and Inputs in Neural Network Training.","venue":"IEEE Big Data","pages":"128-133","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/bigdataconf/QinMSYZ23","doi":"10.1109/BIGDATA59044.2023.10386943","ee":"https://doi.org/10.1109/BigData59044.2023.10386943","url":"https://dblp.org/rec/conf/bigdataconf/QinMSYZ23"}, "url":"URL#300316" }, { "@score":"3", "@id":"300443", "info":{"authors":{"author":[{"@pid":"290/9100","text":"Haozhe Tian"},{"@pid":"90/5236-1","text":"Haibo Hu 0001"},{"@pid":"194/0001-1","text":"Qingqing Ye 0001"}]},"title":"CGP: Centroid-guided Graph Poisoning for Link Inference Attacks in Graph Neural Networks.","venue":"IEEE Big Data","pages":"554-561","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/bigdataconf/TianHY23","doi":"10.1109/BIGDATA59044.2023.10386501","ee":"https://doi.org/10.1109/BigData59044.2023.10386501","url":"https://dblp.org/rec/conf/bigdataconf/TianHY23"}, "url":"URL#300443" }, { "@score":"4", "@id":"300474", "info":{"authors":{"author":[{"@pid":"235/0825","text":"Gerasimos Vonitsanos"},{"@pid":"118/9960","text":"Andreas Kanavos"},{"@pid":"35/1802","text":"Phivos Mylonas"}]},"title":"Decoding Gender on Social Networks: An In-depth Analysis of Language in Online Discussions Using Natural Language Processing and Machine Learning.","venue":"IEEE Big Data","pages":"4618-4625","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/bigdataconf/VonitsanosKM23","doi":"10.1109/BIGDATA59044.2023.10386655","ee":"https://doi.org/10.1109/BigData59044.2023.10386655","url":"https://dblp.org/rec/conf/bigdataconf/VonitsanosKM23"}, "url":"URL#300474" }, { "@score":"4", "@id":"300484", "info":{"authors":{"author":[{"@pid":"77/6747","text":"Tianqi Wang"},{"@pid":"09/3666","text":"Lei Chen"},{"@pid":"67/4834","text":"Jing Gao"}]},"title":"A Prior-Guided Meta-Weight Network for Long-tailed Noisy Data in Item Categorization.","venue":"IEEE Big Data","pages":"946-955","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/bigdataconf/WangCG23","doi":"10.1109/BIGDATA59044.2023.10386354","ee":"https://doi.org/10.1109/BigData59044.2023.10386354","url":"https://dblp.org/rec/conf/bigdataconf/WangCG23"}, "url":"URL#300484" }, { "@score":"4", "@id":"300526", "info":{"authors":{"author":[{"@pid":"117/5435","text":"Chin-Chia Michael Yeh"},{"@pid":"204/5464","text":"Huiyuan Chen"},{"@pid":"169/7114","text":"Yujie Fan"},{"@pid":"98/2150","text":"Xin Dai"},{"@pid":"10/2381-1","text":"Yan Zheng 0001"},{"@pid":"173/9215","text":"Vivian Lai"},{"@pid":"172/6642","text":"Junpeng Wang"},{"@pid":"149/5928","text":"Zhongfang Zhuang"},{"@pid":"56/4499-47","text":"Liang Wang 0047"},{"@pid":"10/4661-189","text":"Wei Zhang 0189"},{"@pid":"k/EamonnJKeogh","text":"Eamonn J. Keogh"}]},"title":"Ego-Network Transformer for Subsequence Classification in Time Series Data.","venue":"IEEE Big Data","pages":"1242-1247","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/bigdataconf/YehCFDZLWZWZK23","doi":"10.1109/BIGDATA59044.2023.10386283","ee":"https://doi.org/10.1109/BigData59044.2023.10386283","url":"https://dblp.org/rec/conf/bigdataconf/YehCFDZLWZWZK23"}, "url":"URL#300526" }, { "@score":"3", "@id":"300610", "info":{"authors":{"author":[{"@pid":"161/7112","text":"Donald Elmazi"},{"@pid":"k/DimitrisAKarras","text":"Dimitrios A. Karras"},{"@pid":"56/1474","text":"Abdulsalam Alkholidi"},{"@pid":"356/4729","text":"Klea Çapari"}]},"title":"Cybersecurity and Privacy Attacks Detection in IoT Networks with Improved Data Engineering and Machine Learning Methods.","venue":"BigDataService","pages":"223-228","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/bigdataservice/ElmaziKAC23","doi":"10.1109/BIGDATASERVICE58306.2023.00046","ee":"https://doi.org/10.1109/BigDataService58306.2023.00046","url":"https://dblp.org/rec/conf/bigdataservice/ElmaziKAC23"}, "url":"URL#300610" }, { "@score":"4", "@id":"300650", "info":{"authors":{"author":[{"@pid":"369/1115","text":"Saketh Kilaru"},{"@pid":"289/7126","text":"Anushka Shah"},{"@pid":"369/1413","text":"Swoichha Adhikari"}]},"title":"Enhancing Classification in UTD-MHAD Dataset: Utilizing Recurrent Neural Networks in Ensemble-Based Approach for Human Action Recognition.","venue":"BigMM","pages":"78-83","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/bigmm/KilaruSA23","doi":"10.1109/BIGMM59094.2023.00018","ee":"https://doi.org/10.1109/BigMM59094.2023.00018","url":"https://dblp.org/rec/conf/bigmm/KilaruSA23"}, "url":"URL#300650" }, { "@score":"3", "@id":"301248", "info":{"authors":{"author":[{"@pid":"277/5337","text":"Rama Krishna Thelagathoti"},{"@pid":"a/HHAli","text":"Hesham H. Ali"}]},"title":"A Correlation Network Model for Analyzing Mobility Data in Depression Related Studies.","venue":"HEALTHINF","pages":"416-423","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/biostec/ThelagathotiA23","doi":"10.5220/0011675400003414","ee":"https://doi.org/10.5220/0011675400003414","url":"https://dblp.org/rec/conf/biostec/ThelagathotiA23"}, "url":"URL#301248" }, { "@score":"3", "@id":"301429", "info":{"authors":{"author":[{"@pid":"337/8351","text":"Aurélien Chambon"},{"@pid":"r/AbderrezakRachedi","text":"Abderrezak Rachedi"},{"@pid":"216/2690","text":"Abderrahim Sahli"},{"@pid":"237/1918","text":"Ahmed Mebarki"}]},"title":"When Carbon Footprint Meets Data Transportation in IoT Networks.","venue":"BlackSeaCom","pages":"1-6","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/blackseecom/ChambonRSM23","doi":"10.1109/BLACKSEACOM58138.2023.10299732","ee":"https://doi.org/10.1109/BlackSeaCom58138.2023.10299732","url":"https://dblp.org/rec/conf/blackseecom/ChambonRSM23"}, "url":"URL#301429" }, { "@score":"3", "@id":"301465", "info":{"authors":{"author":[{"@pid":"360/7601","text":"Anas S. Mohammed"},{"@pid":"360/7081","text":"Omar Khalifa"},{"@pid":"360/7684","text":"Ali Alhejab"},{"@pid":"296/4639","text":"Abdelrahman S. Abdelrahman"},{"@pid":"360/7540","text":"Ahmed Al-Radhwan"},{"@pid":"18/10799","text":"Hesham ElSawy"},{"@pid":"150/6396","text":"Nour Kouzayha"},{"@pid":"217/2995","text":"Noha Al-Harthi"},{"@pid":"360/7054","text":"Jaafar Elmirghani"},{"@pid":"360/7013","text":"Mansoor Hanif"},{"@pid":"00/384","text":"Tareq Y. Al-Naffouri"}]},"title":"Demo Abstract: Energy-Efficient Aerial Data Aggregation in IoT Networks with WuR.","venue":"BlackSeaCom","pages":"147-149","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/blackseecom/MohammedKAAAEKAEHA23","doi":"10.1109/BLACKSEACOM58138.2023.10299765","ee":"https://doi.org/10.1109/BlackSeaCom58138.2023.10299765","url":"https://dblp.org/rec/conf/blackseecom/MohammedKAAAEKAEHA23"}, "url":"URL#301465" }, { "@score":"3", "@id":"301811", "info":{"authors":{"author":[{"@pid":"355/2851","text":"Yunzhou Dong"},{"@pid":"68/1277","text":"Xinyu Wang"},{"@pid":"254/0784","text":"Fangyou Fu"},{"@pid":"355/2776","text":"Zhengdong Lin"},{"@pid":"355/2792","text":"Chaona Yin"},{"@pid":"355/2315","text":"Yingkun Liao"},{"@pid":"43/5433","text":"Peng Lin"}]},"title":"Research on Fault Management System based on Artificial Intelligence in Data Network.","venue":"BMSB","pages":"1-5","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/bmsb/DongWFLYLL23","doi":"10.1109/BMSB58369.2023.10211345","ee":"https://doi.org/10.1109/BMSB58369.2023.10211345","url":"https://dblp.org/rec/conf/bmsb/DongWFLYLL23"}, "url":"URL#301811" }, { "@score":"3", "@id":"301938", "info":{"authors":{"author":[{"@pid":"355/2461","text":"Aditi Vyas"},{"@pid":"13/4939","text":"Junghwan Kim"},{"@pid":"87/2533","text":"Qiang Wu"}]},"title":"Localization Information based Secret Key Generation in Chain and Hybrid Topology based Wireless Mobile Network to secure Multimedia Data.","venue":"BMSB","pages":"1-5","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/bmsb/VyasKW23","doi":"10.1109/BMSB58369.2023.10211219","ee":"https://doi.org/10.1109/BMSB58369.2023.10211219","url":"https://dblp.org/rec/conf/bmsb/VyasKW23"}, "url":"URL#301938" }, { "@score":"3", "@id":"301954", "info":{"authors":{"author":[{"@pid":"38/1956","text":"Wenjie Wang"},{"@pid":"35/8397","text":"Tianyu Wang"},{"@pid":"73/8605","text":"Chaowei Wang"},{"@pid":"57/4280","text":"Weidong Wang"}]},"title":"Opportunistic Offloading with Data-driven Road Side Unit in Vehicular Delay-Tolerant Networks.","venue":"BMSB","pages":"1-4","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/bmsb/WangWWW23","doi":"10.1109/BMSB58369.2023.10211402","ee":"https://doi.org/10.1109/BMSB58369.2023.10211402","url":"https://dblp.org/rec/conf/bmsb/WangWWW23"}, "url":"URL#301954" }, { "@score":"3", "@id":"302516", "info":{"authors":{"author":[{"@pid":"323/4360","text":"Marcel Rodrigues de Barros"},{"@pid":"358/3068","text":"Thiago Lizier Rissi"},{"@pid":"358/2994","text":"Eduardo Faria Cabrera"},{"@pid":"44/6157","text":"Eduardo Aoun Tannuri"},{"@pid":"117/5619","text":"Edson Satoshi Gomi"},{"@pid":"286/4466","text":"Rodrigo A. Barreira"},{"@pid":"r/AnnaHelenaRealiCosta","text":"Anna Helena Reali Costa"}]},"title":"Embracing Data Irregularities in Multivariate Time Series with Recurrent and Graph Neural Networks.","venue":"BRACIS","pages":"3-17","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/bracis/BarrosRCTGBC23","doi":"10.1007/978-3-031-45368-7_1","ee":"https://doi.org/10.1007/978-3-031-45368-7_1","url":"https://dblp.org/rec/conf/bracis/BarrosRCTGBC23"}, "url":"URL#302516" }, { "@score":"4", "@id":"302887", "info":{"authors":{"author":[{"@pid":"219/4731","text":"Ridha Muldina Negara"},{"@pid":"227/1741","text":"Nana Rachmana Syambas"},{"@pid":"60/4723","text":"Eueung Mulyana"},{"@pid":"368/1821","text":"Rashid Muhammad Fajri"}]},"title":"Caching Strategy Utilizing Social Network Analysis Algorithm for Effective Cache Storage Allocation in Named Data Networking.","venue":"BWCCA","pages":"187-198","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/bwcca/NegaraSMF23","doi":"10.1007/978-3-031-46784-4_17","ee":"https://doi.org/10.1007/978-3-031-46784-4_17","url":"https://dblp.org/rec/conf/bwcca/NegaraSMF23"}, "url":"URL#302887" }, { "@score":"3", "@id":"302902", "info":{"authors":{"author":[{"@pid":"58/8877","text":"David W. White"},{"@pid":"67/176","text":"Isaac Woungang"},{"@pid":"115/6502","text":"Felix O. Akinladejo"},{"@pid":"52/6933","text":"Sanjay K. Dhurandher"}]},"title":"A Model to Estimate the Minimum Data Transmission Time in IoT Networks Using Multiple Fungible Paths.","venue":"BWCCA","pages":"199-208","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/bwcca/WhiteWAD23","doi":"10.1007/978-3-031-46784-4_18","ee":"https://doi.org/10.1007/978-3-031-46784-4_18","url":"https://dblp.org/rec/conf/bwcca/WhiteWAD23"}, "url":"URL#302902" }, { "@score":"3", "@id":"303956", "info":{"authors":{"author":[{"@pid":"192/7162","text":"Tomohiro Hasegawa"},{"@pid":"03/6751","text":"Ryotaro Kobayashi"}]},"title":"Poisoning Attacks against Network Intrusion Detection Systems Using Shapley Values to Identify Trends in Poisoning Data.","venue":"candar","pages":"127-133","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/candar/HasegawaK23","doi":"10.1109/CANDAR60563.2023.00024","ee":"https://doi.org/10.1109/CANDAR60563.2023.00024","url":"https://dblp.org/rec/conf/candar/HasegawaK23"}, "url":"URL#303956" }, { "@score":"3", "@id":"305263", "info":{"authors":{"author":[{"@pid":"99/5332","text":"Zhiqiang He"},{"@pid":"11/5123","text":"Yuxin Chen"},{"@pid":"74/1602","text":"Bei Hua"}]},"title":"RoUD: Scalable RDMA over UD in Lossy Data Center Networks.","venue":"CCGrid","pages":"36-46","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/ccgrid/HeCH23","doi":"10.1109/CCGRID57682.2023.00014","ee":"https://doi.org/10.1109/CCGrid57682.2023.00014","url":"https://dblp.org/rec/conf/ccgrid/HeCH23"}, "url":"URL#305263" }, { "@score":"3", "@id":"305603", "info":{"authors":{"author":[{"@pid":"176/3890","text":"Yusaku Hayamizu"},{"@pid":"67/2301","text":"Kazuhisa Matsuzono"},{"@pid":"33/11345","text":"Kenji Kanai"},{"@pid":"79/1525","text":"Hitoshi Asaeda"}]},"title":"Enabling Efficient Data Transport for ICN-based In-Network Computing.","venue":"CCNC","pages":"859-862","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/ccnc/HayamizuMKA23","doi":"10.1109/CCNC51644.2023.10059800","ee":"https://doi.org/10.1109/CCNC51644.2023.10059800","url":"https://dblp.org/rec/conf/ccnc/HayamizuMKA23"}, "url":"URL#305603" }, { "@score":"3", "@id":"305694", "info":{"authors":{"author":[{"@pid":"76/188","text":"Thanh Trung Nguyen"},{"@pid":"334/5686","text":"Minh Hai Vu"},{"@pid":"147/2816","text":"Phi Le Nguyen"},{"@pid":"35/6092","text":"Phan-Thuan Do"},{"@pid":"68/5068-2","text":"Kien Nguyen 0002"}]},"title":"A Q-learning-based Multipath Scheduler for Data Transmission Optimization in Heterogeneous Wireless Networks.","venue":"CCNC","pages":"573-578","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/ccnc/NguyenVNDN23","doi":"10.1109/CCNC51644.2023.10060683","ee":"https://doi.org/10.1109/CCNC51644.2023.10060683","url":"https://dblp.org/rec/conf/ccnc/NguyenVNDN23"}, "url":"URL#305694" }, { "@score":"3", "@id":"305796", "info":{"authors":{"author":[{"@pid":"342/7986","text":"Keita Yoshitomi"},{"@pid":"01/6778","text":"Yosuke Tanigawa"},{"@pid":"122/3531","text":"Daishi Kondo"},{"@pid":"30/3255","text":"Hideki Tode"}]},"title":"Strictly Prioritized Multihop Transmission of High-Priority Data Composed of Multiple Frames in Wireless Sensor Networks.","venue":"CCNC","pages":"893-894","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/ccnc/YoshitomiTKT23","doi":"10.1109/CCNC51644.2023.10060331","ee":"https://doi.org/10.1109/CCNC51644.2023.10060331","url":"https://dblp.org/rec/conf/ccnc/YoshitomiTKT23"}, "url":"URL#305796" }, { "@score":"3", "@id":"305914", "info":{"authors":{"author":[{"@pid":"299/5642","text":"Ecem Simsek"},{"@pid":"32/9034","text":"Min Kyung An"},{"@pid":"19/7748","text":"Fan Liang"}]},"title":"Data Collection Scheduling in Directional Wireless Sensor Networks.","venue":"ICCCS","pages":"387-391","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/ccoms/SimsekAL23","doi":"10.1109/ICCCS57501.2023.10150591","ee":"https://doi.org/10.1109/ICCCS57501.2023.10150591","url":"https://dblp.org/rec/conf/ccoms/SimsekAL23"}, "url":"URL#305914" }, { "@score":"3", "@id":"306083", "info":{"authors":{"author":[{"@pid":"274/8328","text":"Roman Beltiukov"},{"@pid":"144/1238-2","text":"Wenbo Guo 0002"},{"@pid":"122/9141","text":"Arpit Gupta"},{"@pid":"w/WalterWillinger","text":"Walter Willinger"}]},"title":"In Search of netUnicorn: A Data-Collection Platform to Develop Generalizable ML Models for Network Security Problems.","venue":"CCS","pages":"2217-2231","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/ccs/Beltiukov0GW23","doi":"10.1145/3576915.3623075","ee":"https://doi.org/10.1145/3576915.3623075","url":"https://dblp.org/rec/conf/ccs/Beltiukov0GW23"}, "url":"URL#306083" }, { "@score":"3", "@id":"306591", "info":{"authors":{"author":[{"@pid":"207/6249","text":"Nada El-Maradny"},{"@pid":"34/990","text":"Heba A. Shaban"},{"@pid":"59/10017","text":"Nour El-Din El-Madany"}]},"title":"Effect of Node Position and Human Activity on BER Performance and Data Throughput in Off-Body Medical Body Area Networks.","venue":"CCWC","pages":"674-677","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/ccwc/ElMaradnySE23","doi":"10.1109/CCWC57344.2023.10099116","ee":"https://doi.org/10.1109/CCWC57344.2023.10099116","url":"https://dblp.org/rec/conf/ccwc/ElMaradnySE23"}, "url":"URL#306591" }, { "@score":"3", "@id":"311739", "info":{"authors":{"author":[{"@pid":"277/6940","text":"Peter Doggart"},{"@pid":"08/5528","text":"Alan Kennedy"},{"@pid":"118/5261","text":"Daniel Guldenring"},{"@pid":"91/10314","text":"Raymond R. Bond"},{"@pid":"33/1659","text":"Dewar D. Finlay"}]},"title":"Identifying Noisy ECG Signals in Large Datasets Using a Temporal Convolutional Neural Network Trained to Estimate Pseudo-SNR.","venue":"CinC","pages":"1-4","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/cinc/DoggartKGBF23","doi":"10.22489/CINC.2023.103","ee":"https://doi.org/10.22489/CinC.2023.103","url":"https://dblp.org/rec/conf/cinc/DoggartKGBF23"}, "url":"URL#311739" }, { "@score":"3", "@id":"312242", "info":{"authors":{"author":[{"@pid":"281/5984","text":"Ignacio Samuel Crespo-Martínez"},{"@pid":"277/8308","text":"Adrián Campazas Vega"},{"@pid":"152/8812","text":"Ángel Manuel Guerrero Higueras"},{"@pid":"215/3855","text":"Claudia Álvarez-Aparicio"},{"@pid":"65/6268","text":"Camino Fernández Llamas"}]},"title":"Impact of the Keep-Alive Parameter on SQL Injection Attack Detection in Network Flow Data.","venue":"CISIS-ICEUTE","pages":"69-78","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/cisis-spain/Crespo-Martinez23","doi":"10.1007/978-3-031-42519-6_7","ee":"https://doi.org/10.1007/978-3-031-42519-6_7","url":"https://dblp.org/rec/conf/cisis-spain/Crespo-Martinez23"}, "url":"URL#312242" }, { "@score":"3", "@id":"312645", "info":{"authors":{"author":[{"@pid":"370/0440","text":"Pranav Pant"},{"@pid":"370/0268","text":"Rishikant Mallick"},{"@pid":"158/8830","text":"Santosh Kumar Sahu"},{"@pid":"341/5205","text":"Lalit Kumar Vashishtha"}]},"title":"From Pixels to Insights: Image Datasets for AI/ML in Software-Defined Networking.","venue":"OCIT","pages":"903-908","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/cit/PantMSV23","doi":"10.1109/OCIT59427.2023.10430538","ee":"https://doi.org/10.1109/OCIT59427.2023.10430538","url":"https://dblp.org/rec/conf/cit/PantMSV23"}, "url":"URL#312645" }, { "@score":"3", "@id":"313023", "info":{"authors":{"author":[{"@pid":"205/8203","text":"Hermenegildo Fabregat"},{"@pid":"122/4739","text":"Andrés Duque"},{"@pid":"24/6640","text":"Lourdes Araujo"},{"@pid":"128/1735","text":"Juan Martínez-Romo"}]},"title":"NLP-UNED-2 at eRisk 2023: Detecting Pathological Gambling in Social Media through Dataset Relabeling and Neural Networks.","venue":"CLEF","pages":"672-683","year":"2023","type":"Conference and Workshop Papers","access":"open","key":"conf/clef/FabregatDAM23a","ee":"https://ceur-ws.org/Vol-3497/paper-056.pdf","url":"https://dblp.org/rec/conf/clef/FabregatDAM23a"}, "url":"URL#313023" }, { "@score":"3", "@id":"313445", "info":{"authors":{"author":[{"@pid":"218/4894","text":"Igor Ivkic"},{"@pid":"344/6269","text":"Dominik Thiede"},{"@pid":"r/NicholasJPRace","text":"Nicholas J. P. Race"},{"@pid":"134/2967","text":"Matthew Broadbent"},{"@pid":"85/7837","text":"Antonios Gouglidis"}]},"title":"A Security Evaluation Framework for Software-Defined Network Architectures in Data Center Environments.","venue":"CLOSER","pages":"277-288","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/closer/IvkicTRBG23","doi":"10.5220/0011988300003488","ee":"https://doi.org/10.5220/0011988300003488","url":"https://dblp.org/rec/conf/closer/IvkicTRBG23"}, "url":"URL#313445" }, { "@score":"3", "@id":"313545", "info":{"authors":{"author":[{"@pid":"359/8603","text":"Sara El Ouahabi"},{"@pid":"243/2168","text":"Safâa El Ouahabi"},{"@pid":"116/7145","text":"El Wardani Dadi"}]},"title":"Multi-Domain Dataset for Moroccan Arabic Dialect Sentiment Analysis in Social Networks.","venue":"CloudTech","pages":"1-7","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/cloudtech/OuahabiOD23","doi":"10.1109/CLOUDTECH58737.2023.10366119","ee":"https://doi.org/10.1109/CloudTech58737.2023.10366119","url":"https://dblp.org/rec/conf/cloudtech/OuahabiOD23"}, "url":"URL#313545" }, { "@score":"3", "@id":"314040", "info":{"authors":{"author":[{"@pid":"58/2484","text":"Nan Wu"},{"@pid":"239/6287","text":"Guozhen Dong"},{"@pid":"57/6085","text":"Wenjuan Xing"},{"@pid":"369/2533","text":"Shizhong Nie"},{"@pid":"328/7943","text":"Yunpeng Xie"}]},"title":"A Multicast Scheduling Method Based on EVPN-VXLAN Extension in Data Center Networks.","venue":"CNML","pages":"332-336","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/cnml/WuDXNX23","doi":"10.1145/3640912.3640978","ee":"https://doi.org/10.1145/3640912.3640978","url":"https://dblp.org/rec/conf/cnml/WuDXNX23"}, "url":"URL#314040" }, { "@score":"3", "@id":"314140", "info":{"authors":{"author":[{"@pid":"280/1816","text":"Rafael Copstein"},{"@pid":"334/4193","text":"Brad Niblett"},{"@pid":"59/4657","text":"Andrew Johnston"},{"@pid":"299/5982","text":"Jeff Schwartzentruber"},{"@pid":"35/5521","text":"Malcolm I. Heywood"},{"@pid":"303/3845","text":"Nur Zincir-Heywood"}]},"title":"MIMC: Anomaly Detection in Network Data via Multiple Instances of Micro-Cluster Detection.","venue":"CNSM","pages":"1-7","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/cnsm/CopsteinNJSHZ23","doi":"10.23919/CNSM59352.2023.10327864","ee":"https://doi.org/10.23919/CNSM59352.2023.10327864","url":"https://dblp.org/rec/conf/cnsm/CopsteinNJSHZ23"}, "url":"URL#314140" }, { "@score":"3", "@id":"314192", "info":{"authors":{"author":[{"@pid":"325/8939","text":"Md. Shamim Towhid"},{"@pid":"362/4470","text":"Nasik Sami Khan"},{"@pid":"66/8102","text":"Nashid Shahriar"},{"@pid":"11/6844","text":"Massimo Tornatore"},{"@pid":"b/RaoufBoutaba","text":"Raouf Boutaba"},{"@pid":"22/6453","text":"Aladdin Saleh"}]},"title":"A Token-Prioritization Strategy for Handling Data Imbalance in Network-Change Ticket Classification.","venue":"CNSM","pages":"1-7","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/cnsm/TowhidKSTBS23","doi":"10.23919/CNSM59352.2023.10327831","ee":"https://doi.org/10.23919/CNSM59352.2023.10327831","url":"https://dblp.org/rec/conf/cnsm/TowhidKSTBS23"}, "url":"URL#314192" }, { "@score":"3", "@id":"314980", "info":{"authors":{"author":[{"@pid":"212/1027","text":"Ragini Gupta"},{"@pid":"309/0444","text":"Beitong Tian"},{"@pid":"45/3224","text":"Klara Nahrstedt"},{"@pid":"04/3360","text":"Claudiu Danilov 0001"}]},"title":"RESONATE: Advancing Sustainability in IoT Networks through Smart and Selective Data Streaming.","venue":"CIC","pages":"35-41","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/coinco/GuptaTN023","doi":"10.1109/CIC58953.2023.00015","ee":"https://doi.org/10.1109/CIC58953.2023.00015","url":"https://dblp.org/rec/conf/coinco/GuptaTN023"}, "url":"URL#314980" }, { "@score":"3", "@id":"315029", "info":{"authors":{"author":[{"@pid":"268/5236","text":"Umuralp Kaytaz"},{"@pid":"217/5679","text":"Saba Ahmadian"},{"@pid":"227/3281","text":"Fabian Hofmann"},{"@pid":"24/2404","text":"Fikret Sivrikaya"},{"@pid":"a/SahinAlbayrak","text":"Sahin Albayrak"}]},"title":"Online Monte Carlo Planning with QoS Subgoals for Data Caching in ITS MEC Networks.","venue":"COINS","pages":"1-6","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/coins/KaytazAHSA23","doi":"10.1109/COINS57856.2023.10189272","ee":"https://doi.org/10.1109/COINS57856.2023.10189272","url":"https://dblp.org/rec/conf/coins/KaytazAHSA23"}, "url":"URL#315029" }, { "@score":"3", "@id":"316245", "info":{"authors":{"author":[{"@pid":"148/4501","text":"Boyang Zhou"},{"@pid":"70/5023","text":"Zhen Zhu"},{"@pid":"340/8073","text":"Yinghui Nie"},{"@pid":"64/3062","text":"Xiang Chen"},{"@pid":"256/6976","text":"Bingjing Yan"},{"@pid":"y/QiangYang4","text":"Qiang Yang 0004"},{"@pid":"97/8329-1","text":"Chunming Wu 0001"}]},"title":"Fast Proactive Re-Route with Detours on Joint Paths in Named-Data Networks for Communications of Smart Electric Power Transmission Grids.","venue":"COMSNETS","pages":"640-648","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/comsnets/ZhouZNCYYW23","doi":"10.1109/COMSNETS56262.2023.10041321","ee":"https://doi.org/10.1109/COMSNETS56262.2023.10041321","url":"https://dblp.org/rec/conf/comsnets/ZhouZNCYYW23"}, "url":"URL#316245" }, { "@score":"4", "@id":"316466", "info":{"authors":{"author":[{"@pid":"299/4845","text":"Julien Mirval"},{"@pid":"73/6460","text":"Iulian Sandu Popa"},{"@pid":"b/LucBouganim","text":"Luc Bouganim"},{"@pid":"186/8528","text":"Paul Tran-Van"}]},"title":"Enabling Privacy-Preserving Data Aggregation in Networks of Personal Data Management Systems.","venue":"CoopIS","pages":"26-30","year":"2023","type":"Conference and Workshop Papers","access":"open","key":"conf/coopis/MirvalPBT23","ee":"https://ceur-ws.org/Vol-3552/paper-6.pdf","url":"https://dblp.org/rec/conf/coopis/MirvalPBT23"}, "url":"URL#316466" }, { "@score":"3", "@id":"316632", "info":{"authors":{"author":[{"@pid":"356/2325","text":"Dana Müller"},{"@pid":"356/2646","text":"Matthias Umkehrer"}]},"title":"International Data Access Network (IDAN) for Sensitive Microdata in Humanities & Social Sciences.","venue":"CoRDI","year":"2023","type":"Conference and Workshop Papers","access":"open","key":"conf/cordi/MullerU23","doi":"10.52825/CORDI.V1I.269","ee":"https://doi.org/10.52825/cordi.v1i.269","url":"https://dblp.org/rec/conf/cordi/MullerU23"}, "url":"URL#316632" }, { "@score":"3", "@id":"322393", "info":{"authors":{"author":[{"@pid":"299/5510","text":"Zhican Wang"},{"@pid":"71/4292","text":"Gang Wang"},{"@pid":"163/0012","text":"Honglan Jiang"},{"@pid":"88/9033","text":"Ningyi Xu"},{"@pid":"14/495","text":"Guanghui He"}]},"title":"COSA:Co-Operative Systolic Arrays for Multi-head Attention Mechanism in Neural Network using Hybrid Data Reuse and Fusion Methodologies.","venue":"DAC","pages":"1-6","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/dac/WangWJXH23","doi":"10.1109/DAC56929.2023.10247678","ee":"https://doi.org/10.1109/DAC56929.2023.10247678","url":"https://dblp.org/rec/conf/dac/WangWJXH23"}, "url":"URL#322393" }, { "@score":"3", "@id":"323053", "info":{"authors":{"author":[{"@pid":"352/9253","text":"Mariaelena Berlotti"},{"@pid":"352/9604","text":"Sarah Di Grande"},{"@pid":"53/4424","text":"Salvatore Cavalieri"},{"@pid":"352/8903","text":"Roberto Gueli"}]},"title":"Detection and Prediction of Leakages in Water Distribution Networks.","venue":"DATA","pages":"436-443","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/data/BerlottiGCG23","doi":"10.5220/0012122000003541","ee":"https://doi.org/10.5220/0012122000003541","url":"https://dblp.org/rec/conf/data/BerlottiGCG23"}, "url":"URL#323053" }, { "@score":"3", "@id":"323507", "info":{"authors":{"author":[{"@pid":"118/5957","text":"Ivone Amorim"},{"@pid":"125/2364","text":"Eva Maia"},{"@pid":"146/5163","text":"Pedro Barbosa"},{"@pid":"34/1872","text":"Isabel Praça"}]},"title":"Data Privacy with Homomorphic Encryption in Neural Networks Training and Inference.","venue":"DCAI","pages":"365-374","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/dcai/AmorimMBP23","doi":"10.1007/978-3-031-38318-2_36","ee":"https://doi.org/10.1007/978-3-031-38318-2_36","url":"https://dblp.org/rec/conf/dcai/AmorimMBP23"}, "url":"URL#323507" }, { "@score":"3", "@id":"323951", "info":{"authors":{"author":[{"@pid":"246/5622","text":"Antonio Galli"},{"@pid":"247/5298","text":"Michela Gravina"},{"@pid":"08/6606-2","text":"Stefano Marrone 0002"},{"@pid":"90/5377","text":"Carlo Sansone"}]},"title":"Generative Adversarial Networks for Domain Translation in Unpaired Breast DCE-MRI Datasets.","venue":"DeLTA","pages":"370-384","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/delta2/GalliG0S23","doi":"10.1007/978-3-031-39059-3_25","ee":"https://doi.org/10.1007/978-3-031-39059-3_25","url":"https://dblp.org/rec/conf/delta2/GalliG0S23"}, "url":"URL#323951" }, { "@score":"4", "@id":"324048", "info":{"authors":{"author":[{"@pid":"234/5348","text":"Mohamed Mahyoub"},{"@pid":"227/5875","text":"Friska Natalia"},{"@pid":"03/11115","text":"Sud Sudirman"},{"@pid":"69/3166","text":"Panos Liatsis"},{"@pid":"345/4751","text":"Abdulmajeed Hammadi Jasim Al-Jumaily"}]},"title":"Data Augmentation Using Generative Adversarial Networks to Reduce Data Imbalance with Application in Car Damage Detection.","venue":"DeSE","pages":"480-485","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/dese/MahyoubNSLA23","doi":"10.1109/DESE58274.2023.10100274","ee":"https://doi.org/10.1109/DeSE58274.2023.10100274","url":"https://dblp.org/rec/conf/dese/MahyoubNSLA23"}, "url":"URL#324048" }, { "@score":"4", "@id":"324769", "info":{"authors":{"author":[{"@pid":"346/8635","text":"Narges Azizifard"},{"@pid":"45/11031","text":"Maciej Janicki"},{"@pid":"69/10255","text":"Thea Lindquist"},{"@pid":"67/6606","text":"Eetu Mäkelä"},{"@pid":"153/5834","text":"Erik Radio"}]},"title":"Let Everything be of Use?: Data Issues in Exploring the Publications and Networks of the Members of the Fruitbearing Society in the VD17.","venue":"DH","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/dihu/AzizifardJLMR23","doi":"10.5281/ZENODO.8107950","ee":"https://doi.org/10.5281/zenodo.8107950","url":"https://dblp.org/rec/conf/dihu/AzizifardJLMR23"}, "url":"URL#324769" }, { "@score":"4", "@id":"324955", "info":{"authors":{"author":[{"@pid":"224/7897","text":"Houda Lamqaddam"},{"@pid":"353/1628","text":"Rudy Jos Beerens"},{"@pid":"227/0661","text":"Koenraad Brosens"},{"@pid":"52/10440","text":"Bruno Cardoso"},{"@pid":"312/4903","text":"Inez De Prekel"},{"@pid":"133/1287","text":"Frederik Truyen"},{"@pid":"353/2001","text":"Katlijne Van der Stighelen"},{"@pid":"52/6970","text":"Katrien Verbert"},{"@pid":"308/5917","text":"Margherita Fantoli"}]},"title":"From Tapestry to Data Visualisation: Networks of Collaboration in Project Cornelia.","venue":"DH","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/dihu/LamqaddamBBCPTSVF23","doi":"10.5281/ZENODO.8108113","ee":"https://doi.org/10.5281/zenodo.8108113","url":"https://dblp.org/rec/conf/dihu/LamqaddamBBCPTSVF23"}, "url":"URL#324955" }, { "@score":"3", "@id":"325900", "info":{"authors":{"author":[{"@pid":"166/6020","text":"Zhongbai Jiang"},{"@pid":"168/4681","text":"Yanwei Sun"},{"@pid":"45/2422","text":"Beibei Li"},{"@pid":"91/6680","text":"Bowen Sun"},{"@pid":"239/3387","text":"Shenduo Xiong"},{"@pid":"183/0934","text":"Yehao Li"},{"@pid":"33/5380","text":"Wenyue Du"}]},"title":"Threat-Aware Data Transmission in Software-Defined Networks.","venue":"DSC","pages":"443-449","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/dsc/JiangSLSXLD23","doi":"10.1109/DSC59305.2023.00070","ee":"https://doi.org/10.1109/DSC59305.2023.00070","url":"https://dblp.org/rec/conf/dsc/JiangSLSXLD23"}, "url":"URL#325900" }, { "@score":"3", "@id":"326454", "info":{"authors":{"author":[{"@pid":"306/6621","text":"Ehsan Saeedizade"},{"@pid":"74/2272","text":"Bing Zhang"},{"@pid":"85/9469","text":"Engin Arslan"}]},"title":"Demystifying the Performance of Data Transfers in High-Performance Research Networks.","venue":"e-Science","pages":"1-11","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/eScience/SaeedizadeZA23","doi":"10.1109/E-SCIENCE58273.2023.10254940","ee":"https://doi.org/10.1109/e-Science58273.2023.10254940","url":"https://dblp.org/rec/conf/eScience/SaeedizadeZA23"}, "url":"URL#326454" }, { "@score":"3", "@id":"330244", "info":{"authors":{"author":[{"@pid":"256/0955","text":"Haleh Falakshahi"},{"@pid":"223/6685","text":"Hooman Rokham"},{"@pid":"157/9133","text":"Robyn L. Miller"},{"@pid":"364/8743","text":"Jean Liu"},{"@pid":"48/3821","text":"Vince D. Calhoun"}]},"title":"Network Differential in Gaussian Graphical Models from Multimodal Neuroimaging Data.","venue":"EMBC","pages":"1-6","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/embc/FalakshahiRMLC23","doi":"10.1109/EMBC40787.2023.10340856","ee":"https://doi.org/10.1109/EMBC40787.2023.10340856","url":"https://dblp.org/rec/conf/embc/FalakshahiRMLC23"}, "url":"URL#330244" }, { "@score":"3", "@id":"330560", "info":{"authors":{"author":[{"@pid":"334/0232","text":"Fanshi Li"},{"@pid":"65/2749","text":"Zhihui Wang"},{"@pid":"64/5679","text":"Yifan Guo"},{"@pid":"45/4806","text":"Congcong Liu"},{"@pid":"57/8179","text":"Yanjie Zhu"},{"@pid":"117/0292","text":"Yihang Zhou"},{"@pid":"116/1011","text":"Jun Li"},{"@pid":"23/110","text":"Dong Liang"},{"@pid":"10/5209","text":"Haifeng Wang"}]},"title":"Developing a Dynamic Graph Network for Interpretable Analysis of Multi-Modal MRI Data in Parkinson's Disease Diagnosis.","venue":"EMBC","pages":"1-4","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/embc/LiWGLZZLLW23","doi":"10.1109/EMBC40787.2023.10340672","ee":"https://doi.org/10.1109/EMBC40787.2023.10340672","url":"https://dblp.org/rec/conf/embc/LiWGLZZLLW23"}, "url":"URL#330560" }, { "@score":"3", "@id":"330829", "info":{"authors":{"author":[{"@pid":"314/6957","text":"Jöran Rixen"},{"@pid":"364/9106","text":"Benedikt Eliasson"},{"@pid":"277/6951","text":"Simon Lyra"},{"@pid":"20/6764","text":"Steffen Leonhardt"}]},"title":"Shape analysis of training data for neural networks in Electrical Impedance Tomography.","venue":"EMBC","pages":"1-4","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/embc/RixenELL23","doi":"10.1109/EMBC40787.2023.10340254","ee":"https://doi.org/10.1109/EMBC40787.2023.10340254","url":"https://dblp.org/rec/conf/embc/RixenELL23"}, "url":"URL#330829" }, { "@score":"3", "@id":"330981", "info":{"authors":{"author":[{"@pid":"364/9200","text":"Hosna Tavakoli"},{"@pid":"126/3513","text":"Reza Rostami"},{"@pid":"22/9161","text":"Mohammad-Reza Nazem-Zadeh"}]},"title":"Assessments of variability in cortical and subcortical measurements and within-network connectivity of the brain using test-retest data.","venue":"EMBC","pages":"1-4","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/embc/TavakoliRN23","doi":"10.1109/EMBC40787.2023.10340571","ee":"https://doi.org/10.1109/EMBC40787.2023.10340571","url":"https://dblp.org/rec/conf/embc/TavakoliRN23"}, "url":"URL#330981" }, { "@score":"4", "@id":"333735", "info":{"authors":{"author":[{"@pid":"204/9220","text":"Tetiana Biloborodova"},{"@pid":"350/6680","text":"Bríd Brosnan"},{"@pid":"181/6269","text":"Inna Skarga-Bandurova"},{"@pid":"50/5648","text":"Daniel J. Strauss"}]},"title":"Generalization Ability in Medical Image Analysis with Small-Scale Imbalanced Datasets: Insights from Neural Network Learning.","venue":"EPIA","pages":"234-246","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/epia/BiloborodovaBSS23","doi":"10.1007/978-3-031-49011-8_19","ee":"https://doi.org/10.1007/978-3-031-49011-8_19","url":"https://dblp.org/rec/conf/epia/BiloborodovaBSS23"}, "url":"URL#333735" }, { "@score":"3", "@id":"333743", "info":{"authors":{"author":[{"@pid":"364/1593","text":"Roberta Coletti"},{"@pid":"197/9407","text":"Marta B. Lopes"}]},"title":"Multi-omics Data Integration and Network Inference for Biomarker Discovery in Glioma.","venue":"EPIA","pages":"247-259","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/epia/ColettiL23","doi":"10.1007/978-3-031-49011-8_20","ee":"https://doi.org/10.1007/978-3-031-49011-8_20","url":"https://dblp.org/rec/conf/epia/ColettiL23"}, "url":"URL#333743" }, { "@score":"4", "@id":"334642", "info":{"authors":{"author":[{"@pid":"358/7957","text":"Madapu Amarlingam"},{"@pid":"358/7878","text":"AVSK Harish"},{"@pid":"00/1826","text":"Santonu Sarkar"},{"@pid":"153/1271","text":"Jan Christoph Schlake"}]},"title":"Data Flow as Code: Managing Data Flow in an Industrial Hierarchical Edge Network.","venue":"ETFA","pages":"1-8","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/etfa/AmarlingamHSS23","doi":"10.1109/ETFA54631.2023.10275526","ee":"https://doi.org/10.1109/ETFA54631.2023.10275526","url":"https://dblp.org/rec/conf/etfa/AmarlingamHSS23"}, "url":"URL#334642" }, { "@score":"3", "@id":"334830", "info":{"authors":{"author":[{"@pid":"217/7854","text":"Maxime Samson"},{"@pid":"52/3087","text":"Thomas Vergnaud"},{"@pid":"321/4450","text":"Éric Dujardin"},{"@pid":"84/5631","text":"Laurent Ciarletta"},{"@pid":"29/6814","text":"Ye-Qiong Song"}]},"title":"Computing Data Streams in Real-Time Networks from Component-Based Software Engineering.","venue":"ETFA","pages":"1-8","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/etfa/SamsonVDCS23","doi":"10.1109/ETFA54631.2023.10275469","ee":"https://doi.org/10.1109/ETFA54631.2023.10275469","url":"https://dblp.org/rec/conf/etfa/SamsonVDCS23"}, "url":"URL#334830" }, { "@score":"3", "@id":"335462", "info":{"authors":{"author":[{"@pid":"318/3155","text":"J. du Toit"},{"@pid":"352/8743","text":"L. J. Labuschagne"}]},"title":"Inferring Hidden Structure in Mobile Network Performance Data with Noisy Net Promoter Scores using a Probabilistic Graphical Model.","venue":"EuCNC/6G Summit","pages":"436-441","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/eucnc/ToitL23","doi":"10.1109/EUCNC/6GSUMMIT58263.2023.10188368","ee":"https://doi.org/10.1109/EuCNC/6GSummit58263.2023.10188368","url":"https://dblp.org/rec/conf/eucnc/ToitL23"}, "url":"URL#335462" }, { "@score":"3", "@id":"335865", "info":{"authors":{"author":[{"@pid":"153/0648","text":"Siddhartha 0001"},{"@pid":"148/0152","text":"Justin Tan"},{"@pid":"98/11367","text":"Rajesh Bansal"},{"@pid":"362/5028","text":"Huang Chee Cheun"},{"@pid":"180/0143","text":"Yuta Tokusashi"},{"@pid":"362/4857","text":"Chong Yew Kwan"},{"@pid":"44/3393","text":"Haris Javaid"},{"@pid":"58/874","text":"Mario Baldi"}]},"title":"Demo: Enabling DNN Inference in the Network Data Plane.","venue":"EuroP4@CoNEXT","pages":"65-68","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/europ4/SiddharthaTBCTK23","doi":"10.1145/3630047.3630191","ee":"https://doi.org/10.1145/3630047.3630191","url":"https://dblp.org/rec/conf/europ4/SiddharthaTBCTK23"}, "url":"URL#335865" }, { "@score":"3", "@id":"335868", "info":{"authors":{"author":[{"@pid":"86/246","text":"Javier García Blas"},{"@pid":"324/9456","text":"Genaro Sanchez-Gallegos"},{"@pid":"355/0894","text":"Cosmin Petre"},{"@pid":"222/1325","text":"Alberto Riccardo Martinelli"},{"@pid":"75/5249","text":"Marco Aldinucci"},{"@pid":"c/JCarretero","text":"Jesús Carretero 0001"}]},"title":"Hercules: Scalable and Network Portable In-Memory Ad-Hoc File System for Data-Centric and High-Performance Applications.","venue":"Euro-Par","pages":"679-693","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/europar/BlasSPMAC23","doi":"10.1007/978-3-031-39698-4_46","ee":"https://doi.org/10.1007/978-3-031-39698-4_46","url":"https://dblp.org/rec/conf/europar/BlasSPMAC23"}, "url":"URL#335868" }, { "@score":"3", "@id":"336197", "info":{"authors":{"author":[{"@pid":"187/0217","text":"Hwijoon Lim"},{"@pid":"75/3644-2","text":"Jaehong Kim 0002"},{"@pid":"39/4969","text":"Inho Cho"},{"@pid":"40/503","text":"Keon Jang"},{"@pid":"45/661-1","text":"Wei Bai 0001"},{"@pid":"12/5388","text":"Dongsu Han"}]},"title":"FlexPass: A Case for Flexible Credit-based Transport for Datacenter Networks.","venue":"EuroSys","pages":"606-622","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/eurosys/Lim0CJ0H23","doi":"10.1145/3552326.3587453","ee":"https://doi.org/10.1145/3552326.3587453","url":"https://dblp.org/rec/conf/eurosys/Lim0CJ0H23"}, "url":"URL#336197" }, { "@score":"3", "@id":"336463", "info":{"authors":{"author":[{"@pid":"284/8988","text":"Rene Glitza"},{"@pid":"267/2545","text":"Luca Becker"},{"@pid":"199/9531","text":"Alexandru Nelus"},{"@pid":"18/4464","text":"Rainer Martin 0001"}]},"title":"Database of Simulated Room Impulse Responses for Acoustic Sensor Networks Deployed in Complex Multi-Source Acoustic Environments.","venue":"EUSIPCO","pages":"246-250","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/eusipco/GlitzaBN023","doi":"10.23919/EUSIPCO58844.2023.10290083","ee":"https://doi.org/10.23919/EUSIPCO58844.2023.10290083","url":"https://dblp.org/rec/conf/eusipco/GlitzaBN023"}, "url":"URL#336463" }, { "@score":"3", "@id":"339832", "info":{"authors":{"author":[{"@pid":"356/6818","text":"Joaquín Gaspar Medina-Arco"},{"@pid":"129/7544","text":"Roberto Magán-Carrión"},{"@pid":"31/10842","text":"Rafael A. Rodríguez-Gómez"}]},"title":"Exploring Hidden Anomalies in UGR'16 Network Dataset with Kitsune.","venue":"FQAS","pages":"194-205","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/fqas/MedinaArcoMR23","doi":"10.1007/978-3-031-42935-4_16","ee":"https://doi.org/10.1007/978-3-031-42935-4_16","url":"https://dblp.org/rec/conf/fqas/MedinaArcoMR23"}, "url":"URL#339832" }, { "@score":"3", "@id":"340367", "info":{"authors":{"author":[{"@pid":"339/7827","text":"Anu Kaushik"},{"@pid":"190/3816","text":"Bobbinpreet Kaur"},{"@pid":"159/6199","text":"Rasmeet S. Bali"},{"@pid":"57/9993","text":"Gautam Srivastava 0001"}]},"title":"An Intelligent Fuzzy Inference System for High Priority Vehicles in Vehicular Named Data Networks.","venue":"FUZZ","pages":"1-6","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/fuzzIEEE/KaushikKBS23","doi":"10.1109/FUZZ52849.2023.10309790","ee":"https://doi.org/10.1109/FUZZ52849.2023.10309790","url":"https://dblp.org/rec/conf/fuzzIEEE/KaushikKBS23"}, "url":"URL#340367" }, { "@score":"4", "@id":"340621", "info":{"authors":{"author":[{"@pid":"16/9279","text":"Junyan Chen"},{"@pid":"65/3507","text":"Hironori Washizaki"},{"@pid":"361/3322","text":"Rie Sera"},{"@pid":"95/4020","text":"Yoshiaki Fukazawa"}]},"title":"Constructing Data-Driven Personas for Effective Utilization in Social Network Service Activity Data.","venue":"GCCE","pages":"1146-1149","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcce/ChenWSF23","doi":"10.1109/GCCE59613.2023.10315492","ee":"https://doi.org/10.1109/GCCE59613.2023.10315492","url":"https://dblp.org/rec/conf/gcce/ChenWSF23"}, "url":"URL#340621" }, { "@score":"3", "@id":"340692", "info":{"authors":{"author":[{"@pid":"361/3086","text":"Shih-Xiu Huang"},{"@pid":"361/2838","text":"An Lung"},{"@pid":"359/0557","text":"Jia-You Chen"},{"@pid":"319/7446","text":"Wu-Min Sung"},{"@pid":"328/6702","text":"Yu-Cheng Chu"},{"@pid":"57/9797","text":"Jiun-Yu Tu"},{"@pid":"61/6175","text":"Chih-Lin Hu"}]},"title":"Multi-Hop Data Delivery in Hybrid Self-Organized Networks for Mountain Rescue.","venue":"GCCE","pages":"117-118","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcce/HuangLCSCTH23","doi":"10.1109/GCCE59613.2023.10315436","ee":"https://doi.org/10.1109/GCCE59613.2023.10315436","url":"https://dblp.org/rec/conf/gcce/HuangLCSCTH23"}, "url":"URL#340692" }, { "@score":"3", "@id":"342222", "info":{"authors":{"author":[{"@pid":"224/3875","text":"Baixiang Huang"},{"@pid":"169/9975","text":"Bryan Hooi"},{"@pid":"153/5265","text":"Kai Shu"}]},"title":"TAP: A Comprehensive Data Repository for Traffic Accident Prediction in Road Networks.","venue":"SIGSPATIAL/GIS","pages":"105:1-105:4","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/gis/HuangHS23","doi":"10.1145/3589132.3625655","ee":"https://doi.org/10.1145/3589132.3625655","url":"https://dblp.org/rec/conf/gis/HuangHS23"}, "url":"URL#342222" }, { "@score":"3", "@id":"342490", "info":{"authors":{"author":[{"@pid":"176/5747","text":"Kazuya Anazawa"},{"@pid":"03/283","text":"Takeru Inoue"},{"@pid":"129/1046","text":"Toru Mano"},{"@pid":"59/11441","text":"Wataru Ishida"},{"@pid":"35/3965","text":"Kazuaki Obana"},{"@pid":"180/7639","text":"Hideki Nishizawa"}]},"title":"Efficient Fiber-Inspection Method for Optical-Circuit Datacenter Networks.","venue":"GLOBECOM","pages":"1119-1124","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/AnazawaIMION23","doi":"10.1109/GLOBECOM54140.2023.10437204","ee":"https://doi.org/10.1109/GLOBECOM54140.2023.10437204","url":"https://dblp.org/rec/conf/globecom/AnazawaIMION23"}, "url":"URL#342490" }, { "@score":"3", "@id":"342512", "info":{"authors":{"author":[{"@pid":"158/4843","text":"Mahmoud Bahnasy"},{"@pid":"129/0904","text":"Seyed Hossein Mortazavi"},{"@pid":"32/9285","text":"Ali Munir"},{"@pid":"194/8564","text":"Hossein Shafieirad"},{"@pid":"36/3795","text":"Yashar Ganjali"}]},"title":"Host-Assisted Transport Layer in Data Centers Using Network-Aware Rate Adjustment.","venue":"GLOBECOM","pages":"4674-4679","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/BahnasyMMSG23","doi":"10.1109/GLOBECOM54140.2023.10437035","ee":"https://doi.org/10.1109/GLOBECOM54140.2023.10437035","url":"https://dblp.org/rec/conf/globecom/BahnasyMMSG23"}, "url":"URL#342512" }, { "@score":"3", "@id":"342588", "info":{"authors":{"author":[{"@pid":"338/7804","text":"Andreas Casparsen"},{"@pid":"78/4102","text":"Beatriz Soret"},{"@pid":"67/8332","text":"Jimmy Jessen Nielsen"},{"@pid":"50/3930","text":"Petar Popovski"}]},"title":"Near Real-Time Data-Driven Control of Virtual Reality Traffic in Open Radio Access Network.","venue":"GLOBECOM","pages":"3481-3486","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/CasparsenSNP23","doi":"10.1109/GLOBECOM54140.2023.10437947","ee":"https://doi.org/10.1109/GLOBECOM54140.2023.10437947","url":"https://dblp.org/rec/conf/globecom/CasparsenSNP23"}, "url":"URL#342588" }, { "@score":"3", "@id":"342833", "info":{"authors":{"author":[{"@pid":"86/881","text":"Jianlin Guo"},{"@pid":"165/5409","text":"Takenori Sumi"},{"@pid":"43/4407","text":"Yuki Kawashima"},{"@pid":"132/8074","text":"Kieran Parsons"},{"@pid":"48/2548","text":"Yukimasa Nagai"},{"@pid":"10/3164","text":"Philip V. Orlik"}]},"title":"Minimizing Route Overlap for Priority Data Delivery in Next Generation IoT Networks.","venue":"GLOBECOM","pages":"3664-3669","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/GuoSKPNO23","doi":"10.1109/GLOBECOM54140.2023.10437338","ee":"https://doi.org/10.1109/GLOBECOM54140.2023.10437338","url":"https://dblp.org/rec/conf/globecom/GuoSKPNO23"}, "url":"URL#342833" }, { "@score":"3", "@id":"342989", "info":{"authors":{"author":[{"@pid":"140/1027","text":"Guoyong Jiang"},{"@pid":"184/0126","text":"Wenting Wei"},{"@pid":"05/1958","text":"Kun Wang"},{"@pid":"370/2755","text":"Chengding Pang"},{"@pid":"29/4867","text":"Yong Liu"}]},"title":"DRL-TAL: Deep Reinforcement Learning-Based Traffic-Aware Load Balancing in Data Center Networks.","venue":"GLOBECOM","pages":"928-933","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/JiangWWPL23","doi":"10.1109/GLOBECOM54140.2023.10437481","ee":"https://doi.org/10.1109/GLOBECOM54140.2023.10437481","url":"https://dblp.org/rec/conf/globecom/JiangWWPL23"}, "url":"URL#342989" }, { "@score":"3", "@id":"343074", "info":{"authors":{"author":[{"@pid":"338/7003","text":"Malaram Kumhar"},{"@pid":"246/1672","text":"Jitendra Bhatia"},{"@pid":"324/6969","text":"Nilesh Kumar Jadav"},{"@pid":"364/8803","text":"Ali Asgar Padaria"},{"@pid":"250/4007","text":"Rajesh Gupta 0007"},{"@pid":"138/1054","text":"Sudeep Tanwar"},{"@pid":"25/3419","text":"Joel J. P. C. Rodrigues"}]},"title":"HEAL-SDN: Artificial Neural Network-based Secure Data Exchange Framework for SDN Controllers in Healthcare 4.0.","venue":"GLOBECOM","pages":"1832-1837","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/KumharBJPGTR23","doi":"10.1109/GCWKSHPS58843.2023.10465150","ee":"https://doi.org/10.1109/GCWkshps58843.2023.10465150","url":"https://dblp.org/rec/conf/globecom/KumharBJPGTR23"}, "url":"URL#343074" }, { "@score":"3", "@id":"343277", "info":{"authors":{"author":[{"@pid":"310/1295","text":"Abdelkader Mekrache"},{"@pid":"308/1992","text":"Karim Boutiba"},{"@pid":"37/6589","text":"Adlen Ksentini"}]},"title":"Combining Network Data Analytics Function and Machine Learning for Abnormal Traffic Detection in Beyond 5G.","venue":"GLOBECOM","pages":"1204-1209","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/MekracheBK23","doi":"10.1109/GLOBECOM54140.2023.10436766","ee":"https://doi.org/10.1109/GLOBECOM54140.2023.10436766","url":"https://dblp.org/rec/conf/globecom/MekracheBK23"}, "url":"URL#343277" }, { "@score":"3", "@id":"343437", "info":{"authors":{"author":[{"@pid":"157/4784","text":"Waseem Raza"},{"@pid":"80/10098","text":"Fahd Ahmed Khan"},{"@pid":"176/5841","text":"Muhammad Umar Bin Farooq"},{"@pid":"71/7908","text":"Sabit Ekin"},{"@pid":"167/1888","text":"Ali Imran 0001"}]},"title":"Positioning Error Impact Compensation through Data-Driven Optimization in User-Centric Networks.","venue":"GLOBECOM","pages":"3928-3933","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/RazaKFEI23","doi":"10.1109/GLOBECOM54140.2023.10437564","ee":"https://doi.org/10.1109/GLOBECOM54140.2023.10437564","url":"https://dblp.org/rec/conf/globecom/RazaKFEI23"}, "url":"URL#343437" }, { "@score":"3", "@id":"343546", "info":{"authors":{"author":[{"@pid":"118/2252","text":"Jagdeep Singh"},{"@pid":"52/6933","text":"Sanjay Kumar Dhurandher"},{"@pid":"67/176","text":"Isaac Woungang"}]},"title":"Deep Q-Network Dueling-Based Opportunistic Data Transmission in Blockchain-Enabled M2M Communication.","venue":"GLOBECOM","pages":"1283-1289","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/SinghDW23","doi":"10.1109/GLOBECOM54140.2023.10437700","ee":"https://doi.org/10.1109/GLOBECOM54140.2023.10437700","url":"https://dblp.org/rec/conf/globecom/SinghDW23"}, "url":"URL#343546" }, { "@score":"3", "@id":"343646", "info":{"authors":{"author":[{"@pid":"50/1999","text":"Alvin C. Valera"},{"@pid":"370/3113","text":"Niels Clayton"},{"@pid":"s/WKGSeah","text":"Winston K. G. Seah"},{"@pid":"76/5177","text":"Tao Zheng"}]},"title":"Optimal Transmission Scheduling in Data-Intensive Audio Sensor Networks.","venue":"GLOBECOM","pages":"7049-7054","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ValeraCSZ23","doi":"10.1109/GLOBECOM54140.2023.10437256","ee":"https://doi.org/10.1109/GLOBECOM54140.2023.10437256","url":"https://dblp.org/rec/conf/globecom/ValeraCSZ23"}, "url":"URL#343646" }, { "@score":"3", "@id":"344024", "info":{"authors":{"author":[{"@pid":"285/8991","text":"Xixuan Zhou"},{"@pid":"48/4497","text":"Xiaojian Tian"},{"@pid":"62/9980","text":"Zuqing Zhu"}]},"title":"Multi-Agent DRL for Distributed Routing and Data Scheduling in Interplanetary Networks.","venue":"GLOBECOM","pages":"4877-4882","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ZhouTZ23","doi":"10.1109/GLOBECOM54140.2023.10436989","ee":"https://doi.org/10.1109/GLOBECOM54140.2023.10436989","url":"https://dblp.org/rec/conf/globecom/ZhouTZ23"}, "url":"URL#344024" }, { "@score":"3", "@id":"344044", "info":{"authors":{"author":[{"@pid":"235/5385","text":"Xiaoxiao Zhuo"},{"@pid":"230/3226","text":"Tianhao Hu"},{"@pid":"92/382-3","text":"Wen Wu 0003"},{"@pid":"79/918","text":"Liang Tang"},{"@pid":"21/3128","text":"Fengzhong Qu"},{"@pid":"s/XueminShen","text":"Xuemin Shen"}]},"title":"Multi-Auv Collaborative Data Collection in Integrated Underwater Acoustic Communication and Detection Networks.","venue":"GLOBECOM","pages":"6771-6776","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ZhuoHWTQS23","doi":"10.1109/GLOBECOM54140.2023.10437322","ee":"https://doi.org/10.1109/GLOBECOM54140.2023.10437322","url":"https://dblp.org/rec/conf/globecom/ZhuoHWTQS23"}, "url":"URL#344044" }, { "@score":"3", "@id":"348471", "info":{"authors":{"author":[{"@pid":"272/0648","text":"Ziyue Deng"},{"@pid":"75/4666","text":"Alex Sim"},{"@pid":"30/4395","text":"Kesheng Wu"},{"@pid":"51/5078","text":"Chin Guok"},{"@pid":"235/7042","text":"Damian Hazen"},{"@pid":"37/2513","text":"Inder Monga"},{"@pid":"15/7786","text":"Fabio Andrijauskas"},{"@pid":"69/5000","text":"Frank Würthwein"},{"@pid":"129/5503","text":"Derek Weitzel"}]},"title":"Analyzing Transatlantic Network Traffic over Scientific Data Caches.","venue":"SNTA@HPDC","pages":"19-22","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/hpdc/DengSWGHMAWW23","doi":"10.1145/3589012.3594897","ee":"https://doi.org/10.1145/3589012.3594897","url":"https://dblp.org/rec/conf/hpdc/DengSWGHMAWW23"}, "url":"URL#348471" }, { "@score":"3", "@id":"348625", "info":{"authors":{"author":[{"@pid":"128/3072","text":"Muhammad Shahid Iqbal"},{"@pid":"70/538","text":"Chien Chen"}]},"title":"Instant Queue Occupancy Used For Automatic Traffic Scheduling In Data Center Networks.","venue":"HPSR","pages":"1-6","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/hpsr/IqbalC23","doi":"10.1109/HPSR57248.2023.10147973","ee":"https://doi.org/10.1109/HPSR57248.2023.10147973","url":"https://dblp.org/rec/conf/hpsr/IqbalC23"}, "url":"URL#348625" }, { "@score":"3", "@id":"348635", "info":{"authors":{"author":[{"@pid":"312/5608","text":"Danushka Senarathna"},{"@pid":"70/5489","text":"Spyros Tragoudas"},{"@pid":"284/7193","text":"Kiriti Nagesh Gowda"},{"@pid":"312/5609","text":"Mike Schmit"}]},"title":"Detection and Quantization of Data Drift in Image Classification Neural Networks.","venue":"HPSR","pages":"38-42","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/hpsr/SenarathnaTGS23","doi":"10.1109/HPSR57248.2023.10147972","ee":"https://doi.org/10.1109/HPSR57248.2023.10147972","url":"https://dblp.org/rec/conf/hpsr/SenarathnaTGS23"}, "url":"URL#348635" }, { "@score":"3", "@id":"350559", "info":{"authors":{"author":[{"@pid":"152/3788","text":"Aasheesh Shukla"},{"@pid":"148/8625","text":"Sumit Pundir"},{"@pid":"343/3224","text":"A Kakoli Rao"},{"@pid":"148/8555","text":"N. Shalini"},{"@pid":"212/0994","text":"Akhil"},{"@pid":"19/139","text":"Rohit Kumar"},{"@pid":"14/9100","text":"Ajay Rana"}]},"title":"Data Sharing Enabled Through Internet of Things (IoT) in Wireless Communication Networks.","venue":"IC3I","pages":"2590-2598","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/ic3i/ShuklaPRSAKR23","doi":"10.1109/IC3I59117.2023.10397845","ee":"https://doi.org/10.1109/IC3I59117.2023.10397845","url":"https://dblp.org/rec/conf/ic3i/ShuklaPRSAKR23"}, "url":"URL#350559" }, { "@score":"3", "@id":"350961", "info":{"authors":{"author":[{"@pid":"116/0938","text":"Jinbin Hu"},{"@pid":"356/8294","text":"Wangqing Luo"},{"@pid":"65/425","text":"Yi He"},{"@pid":"92/1375-1","text":"Jin Wang 0001"},{"@pid":"165/8955","text":"Dengyong Zhang"}]},"title":"Deep Reinforcement Learning Based Load Balancing for Heterogeneous Traffic in Datacenter Networks.","venue":"ICA3PP","pages":"270-289","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/ica3pp/HuLHWZ23","doi":"10.1007/978-981-97-0798-0_16","ee":"https://doi.org/10.1007/978-981-97-0798-0_16","url":"https://dblp.org/rec/conf/ica3pp/HuLHWZ23"}, "url":"URL#350961" }, { "@score":"3", "@id":"350963", "info":{"authors":{"author":[{"@pid":"116/0938","text":"Jinbin Hu"},{"@pid":"269/2594","text":"Youyang Wang"},{"@pid":"197/4350","text":"Zikai Zhou"},{"@pid":"353/3739","text":"Shuying Rao"},{"@pid":"369/8421","text":"Rundong Xin"},{"@pid":"02/736","text":"Jing Wang"},{"@pid":"89/10696","text":"Shiming He"}]},"title":"HAECN: Hierarchical Automatic ECN Tuning with Ultra-Low Overhead in Datacenter Networks.","venue":"ICA3PP","pages":"324-343","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/ica3pp/HuWZRXWH23","doi":"10.1007/978-981-97-0798-0_19","ee":"https://doi.org/10.1007/978-981-97-0798-0_19","url":"https://dblp.org/rec/conf/ica3pp/HuWZRXWH23"}, "url":"URL#350963" }, { "@score":"3", "@id":"350981", "info":{"authors":{"author":[{"@pid":"00/7668-1","text":"Xueqiang Li 0001"},{"@pid":"00/9593","text":"Ming Tao"},{"@pid":"179/0888","text":"Shuling Yang"}]},"title":"UAV-Assisted Data Collection and Transmission Using Petal Algorithm in Wireless Sensor Networks.","venue":"ICA3PP","pages":"114-125","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/ica3pp/LiTY23","doi":"10.1007/978-981-97-0862-8_8","ee":"https://doi.org/10.1007/978-981-97-0862-8_8","url":"https://dblp.org/rec/conf/ica3pp/LiTY23"}, "url":"URL#350981" }, { "@score":"3", "@id":"351044", "info":{"authors":{"author":[{"@pid":"41/7732","text":"Yuhang Wu"},{"@pid":"40/3858-3","text":"Quan Chen 0003"},{"@pid":"251/7601","text":"Jianglong Liu"},{"@pid":"246/3847","text":"Fulong Li"},{"@pid":"58/1879","text":"Lianglun Cheng"}]},"title":"Approximate Multicast Coflow Scheduling in Reconfigurable Data Center Networks.","venue":"ICA3PP","pages":"139-154","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/ica3pp/WuCLLC23","doi":"10.1007/978-981-97-0798-0_9","ee":"https://doi.org/10.1007/978-981-97-0798-0_9","url":"https://dblp.org/rec/conf/ica3pp/WuCLLC23"}, "url":"URL#351044" }, { "@score":"3", "@id":"351534", "info":{"authors":{"author":[{"@pid":"130/2758","text":"Muhammad Abdullah"},{"@pid":"245/3785","text":"Ayesha Kiran"},{"@pid":"330/6729","text":"Ubaid Azam"}]},"title":"Mobility and Content Retrieval in Vehicular Named Data Network: Challenges and Countermeasures.","venue":"ICACS","pages":"1-8","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacs/AbdullahKA23","doi":"10.1109/ICACS55311.2023.10089761","ee":"https://doi.org/10.1109/ICACS55311.2023.10089761","url":"https://dblp.org/rec/conf/icacs/AbdullahKA23"}, "url":"URL#351534" }, { "@score":"4", "@id":"355058", "info":{"authors":{"author":[{"@pid":"04/320-4","text":"Qin Shi 0004"},{"@pid":"10/6178-3","text":"Liang Liu 0003"},{"@pid":"159/1515","text":"Shuowen Zhang"}]},"title":"Joint Data Association, NLOS Mitigation, and Clutter Suppression for Networked Device-Free Sensing in 6G Cellular Network.","venue":"ICASSP","pages":"1-5","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/icassp/ShiLZ23","doi":"10.1109/ICASSP49357.2023.10096727","ee":"https://doi.org/10.1109/ICASSP49357.2023.10096727","url":"https://dblp.org/rec/conf/icassp/ShiLZ23"}, "url":"URL#355058" }, { "@score":"3", "@id":"355483", "info":{"authors":{"author":[{"@pid":"353/5536","text":"Ruben Wijnands"},{"@pid":"d/JustinDauwels","text":"Justin Dauwels"},{"@pid":"353/5680","text":"Ines Serra"},{"@pid":"217/8315","text":"Pieter Kruizinga"},{"@pid":"254/5166","text":"Aleksandra Badura"},{"@pid":"94/9736","text":"Borbála Hunyadi"}]},"title":"Modeling and Inference of Sparse Neural Dynamic Functional Connectivity Networks Underlying Functional Ultrasound Data.","venue":"ICASSP Workshops","pages":"1-5","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/icassp/WijnandsDSKBH23","doi":"10.1109/ICASSPW59220.2023.10193029","ee":"https://doi.org/10.1109/ICASSPW59220.2023.10193029","url":"https://dblp.org/rec/conf/icassp/WijnandsDSKBH23"}, "url":"URL#355483" }, { "@score":"3", "@id":"356983", "info":{"authors":{"author":[{"@pid":"240/6202","text":"Mingyue Cheng"},{"@pid":"118/6735","text":"Qianqian Wang"},{"@pid":"46/7206","text":"Quansheng Guan"},{"@pid":"19/4900","text":"Weiqi Chen"},{"@pid":"65/1128","text":"Tony Q. S. Quek"}]},"title":"Frame Error Rate Restricted AUV Relaying Data Collection in Underwater Acoustic Sensor Networks.","venue":"ICC","pages":"6175-6180","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ChengWGCQ23","doi":"10.1109/ICC45041.2023.10279433","ee":"https://doi.org/10.1109/ICC45041.2023.10279433","url":"https://dblp.org/rec/conf/icc/ChengWGCQ23"}, "url":"URL#356983" }, { "@score":"4", "@id":"357034", "info":{"authors":{"author":[{"@pid":"316/0662","text":"Daniel Mawunyo Doe"},{"@pid":"63/3159","text":"Dawei Chen"},{"@pid":"67/4400","text":"Kyungtae Han"},{"@pid":"203/0135","text":"Haoxin Wang"},{"@pid":"x/JXie-1","text":"Jiang (Linda) Xie"},{"@pid":"83/514","text":"Zhu Han 0001"}]},"title":"High Definition Map Data Optimization for Autonomous Driving in Vehicular Named Data Networks.","venue":"ICC","pages":"3970-3976","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/DoeCHWXH23","doi":"10.1109/ICC45041.2023.10279193","ee":"https://doi.org/10.1109/ICC45041.2023.10279193","url":"https://dblp.org/rec/conf/icc/DoeCHWXH23"}, "url":"URL#357034" }, { "@score":"3", "@id":"357109", "info":{"authors":{"author":[{"@pid":"25/2165","text":"Zhipeng Gao"},{"@pid":"83/8595","text":"Shan Sun"},{"@pid":"240/6361","text":"Zijia Mo"},{"@pid":"03/4227","text":"Lanlan Rui"},{"@pid":"48/450-6","text":"Yang Yang 0006"}]},"title":"Data-Efficient Adaptive Global Pruning for Convolutional Neural Networks in Edge Computing.","venue":"ICC","pages":"6633-6638","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/GaoSMRY23","doi":"10.1109/ICC45041.2023.10278581","ee":"https://doi.org/10.1109/ICC45041.2023.10278581","url":"https://dblp.org/rec/conf/icc/GaoSMRY23"}, "url":"URL#357109" }, { "@score":"3", "@id":"357261", "info":{"authors":{"author":[{"@pid":"238/9404","text":"Xinyue Jiang"},{"@pid":"28/374-1","text":"Hongyan Liu 0001"},{"@pid":"64/3062","text":"Xiang Chen"},{"@pid":"300/9133","text":"Qingjiang Xiao"},{"@pid":"328/7666","text":"Kaiwei Guo"},{"@pid":"68/3245","text":"Dong Zhang"},{"@pid":"81/6572","text":"Haifeng Zhou"},{"@pid":"97/8329-1","text":"Chunming Wu 0001"}]},"title":"Halia: Toward Full-Coverage Network Function Offloading in the Data Plane.","venue":"ICC","pages":"340-345","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/JiangLCXGZZW23","doi":"10.1109/ICC45041.2023.10279504","ee":"https://doi.org/10.1109/ICC45041.2023.10279504","url":"https://dblp.org/rec/conf/icc/JiangLCXGZZW23"}, "url":"URL#357261" }, { "@score":"3", "@id":"357300", "info":{"authors":{"author":[{"@pid":"158/1134","text":"Hossein Kazemi"},{"@pid":"158/1553","text":"Elham Sarbazi"},{"@pid":"52/4739","text":"Majid Safari"},{"@pid":"12/2168","text":"Harald Haas"}]},"title":"Terabit Optical Wireless Link Design for Inter-Rack Communication in 6G Data Center Networks.","venue":"ICC Workshops","pages":"1771-1776","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/KazemiSSH23","doi":"10.1109/ICCWORKSHOPS57953.2023.10283504","ee":"https://doi.org/10.1109/ICCWorkshops57953.2023.10283504","url":"https://dblp.org/rec/conf/icc/KazemiSSH23"}, "url":"URL#357300" }, { "@score":"3", "@id":"357404", "info":{"authors":{"author":[{"@pid":"15/8202","text":"Shaofeng Li"},{"@pid":"92/382-3","text":"Wen Wu 0003"},{"@pid":"43/1032-1","text":"Yan Meng 0001"},{"@pid":"09/7698","text":"Jiachun Li"},{"@pid":"22/5702","text":"Haojin Zhu"},{"@pid":"s/XueminShen","text":"Xuemin Sherman Shen"}]},"title":"Data Poisoning Attack Against Anomaly Detectors in Digital Twin-Based Networks.","venue":"ICC","pages":"13-18","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/LiWMLZS23","doi":"10.1109/ICC45041.2023.10279765","ee":"https://doi.org/10.1109/ICC45041.2023.10279765","url":"https://dblp.org/rec/conf/icc/LiWMLZS23"}, "url":"URL#357404" }, { "@score":"3", "@id":"357571", "info":{"authors":{"author":[{"@pid":"337/7737","text":"Mouhamed Naby Ndiaye"},{"@pid":"152/3495","text":"El Houcine Bergou"},{"@pid":"176/1214","text":"Hajar El Hammouti"}]},"title":"Muti-Agent Proximal Policy Optimization For Data Freshness in UAV-assisted Networks.","venue":"ICC Workshops","pages":"1920-1925","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/NdiayeBH23","doi":"10.1109/ICCWORKSHOPS57953.2023.10283785","ee":"https://doi.org/10.1109/ICCWorkshops57953.2023.10283785","url":"https://dblp.org/rec/conf/icc/NdiayeBH23"}, "url":"URL#357571" }, { "@score":"3", "@id":"358016", "info":{"authors":{"author":[{"@pid":"213/2704","text":"Meiyi Yang"},{"@pid":"71/1172","text":"Deyun Gao"},{"@pid":"60/6352","text":"Xiaochen Hu"},{"@pid":"61/2725","text":"Yajuan Qin"}]},"title":"Cost Efficient Intelligent Sensing Big Data Caching in ICN-IoT Networks.","venue":"ICC","pages":"4033-4038","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/YangGHQ23","doi":"10.1109/ICC45041.2023.10278641","ee":"https://doi.org/10.1109/ICC45041.2023.10278641","url":"https://dblp.org/rec/conf/icc/YangGHQ23"}, "url":"URL#358016" }, { "@score":"3", "@id":"358072", "info":{"authors":{"author":[{"@pid":"221/4691","text":"Dun Yuan"},{"@pid":"197/3158","text":"Yujin Nam"},{"@pid":"236/4415","text":"Amal Feriani"},{"@pid":"284/2741","text":"Abhisek Konar"},{"@pid":"52/328-44","text":"Di Wu 0044"},{"@pid":"82/7908","text":"Seowoo Jang"},{"@pid":"207/7109-4","text":"Xue Liu 0004"},{"@pid":"d/GregoryDudek","text":"Gregory Dudek"}]},"title":"Mixed-Variable PSO with Fairness on Multi-Objective Field Data Replication in Wireless Networks.","venue":"ICC","pages":"3720-3725","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/YuanNFKWJLD23","doi":"10.1109/ICC45041.2023.10279642","ee":"https://doi.org/10.1109/ICC45041.2023.10279642","url":"https://dblp.org/rec/conf/icc/YuanNFKWJLD23"}, "url":"URL#358072" }, { "@score":"3", "@id":"358372", "info":{"authors":{"author":[{"@pid":"310/8688","text":"James Nevin"},{"@pid":"g/PTGroth","text":"Paul Groth"},{"@pid":"97/1049","text":"Michael Lees"}]},"title":"Data Integration Landscapes: The Case for Non-optimal Solutions in Network Diffusion Models.","venue":"ICCS","pages":"494-508","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/iccS/NevinGL23","doi":"10.1007/978-3-031-35995-8_35","ee":"https://doi.org/10.1007/978-3-031-35995-8_35","url":"https://dblp.org/rec/conf/iccS/NevinGL23"}, "url":"URL#358372" }, { "@score":"3", "@id":"359561", "info":{"authors":{"author":[{"@pid":"219/8694","text":"Leyi Wang"},{"@pid":"137/0219","text":"Lingya Liu"},{"@pid":"45/3510","text":"Yanlin Lu"},{"@pid":"136/1220","text":"Chenyu Zhang"},{"@pid":"23/7137","text":"Yongqing Zheng"},{"@pid":"07/1951","text":"Jing Xu"}]},"title":"Hierarchical Federated Learning for Heterogeneous Features and Distributed Data in IoT Networks.","venue":"ICCC","pages":"1-6","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/iccchina/WangLLZZX23","doi":"10.1109/ICCC57788.2023.10233409","ee":"https://doi.org/10.1109/ICCC57788.2023.10233409","url":"https://dblp.org/rec/conf/iccchina/WangLLZZX23"}, "url":"URL#359561" }, { "@score":"4", "@id":"359878", "info":{"authors":{"author":[{"@pid":"11/5123","text":"Yuxin Chen"},{"@pid":"244/8337","text":"Jiayu Yang"},{"@pid":"286/8388","text":"Xuanbo Huang"},{"@pid":"193/3073","text":"Jiangping Han"},{"@pid":"133/8721","text":"Bobo Wang"},{"@pid":"33/5448-31","text":"Jian Li 0031"},{"@pid":"94/5600","text":"Kaiping Xue"}]},"title":"PLR: An In-Network Proactive Loss Recovery Scheme for Named Data Networking.","venue":"ICCCN","pages":"1-10","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/icccn/ChenYHHWLX23","doi":"10.1109/ICCCN58024.2023.10230118","ee":"https://doi.org/10.1109/ICCCN58024.2023.10230118","url":"https://dblp.org/rec/conf/icccn/ChenYHHWLX23"}, "url":"URL#359878" }, { "@score":"3", "@id":"359909", "info":{"authors":{"author":[{"@pid":"225/4556","text":"Jiangnan Li"},{"@pid":"86/11141","text":"Yingyuan Yang"},{"@pid":"22/1105","text":"Jinyuan Stella Sun"},{"@pid":"89/2974","text":"Kevin Tomsovic"},{"@pid":"00/6984-1","text":"Hairong Qi 0001"}]},"title":"Towards Adversarial-Resilient Deep Neural Networks for False Data Injection Attack Detection in Power Grids.","venue":"ICCCN","pages":"1-10","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/icccn/LiYSTQ23","doi":"10.1109/ICCCN58024.2023.10230180","ee":"https://doi.org/10.1109/ICCCN58024.2023.10230180","url":"https://dblp.org/rec/conf/icccn/LiYSTQ23"}, "url":"URL#359909" }, { "@score":"3", "@id":"359940", "info":{"authors":{"author":[{"@pid":"129/5726","text":"Tanmoy Sen"},{"@pid":"15/5579","text":"Haiying Shen"}]},"title":"A Data and Model Parallelism based Distributed Deep Learning System in a Network of Edge Devices.","venue":"ICCCN","pages":"1-10","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/icccn/SenS23","doi":"10.1109/ICCCN58024.2023.10230190","ee":"https://doi.org/10.1109/ICCCN58024.2023.10230190","url":"https://dblp.org/rec/conf/icccn/SenS23"}, "url":"URL#359940" }, { "@score":"3", "@id":"359947", "info":{"authors":{"author":[{"@pid":"95/5409","text":"Wentao Wang"},{"@pid":"193/3073","text":"Jiangping Han"},{"@pid":"148/1297","text":"Rui Zhuang"},{"@pid":"94/5600","text":"Kaiping Xue"},{"@pid":"01/1492","text":"Qibin Sun"},{"@pid":"55/666","text":"Jun Lu"}]},"title":"Early Marking for Controllable Maximum Queue Length in Data Center Networks.","venue":"ICCCN","pages":"1-10","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/icccn/WangHZXSL23","doi":"10.1109/ICCCN58024.2023.10230181","ee":"https://doi.org/10.1109/ICCCN58024.2023.10230181","url":"https://dblp.org/rec/conf/icccn/WangHZXSL23"}, "url":"URL#359947" }, { "@score":"3", "@id":"359972", "info":{"authors":{"author":[{"@pid":"362/0459","text":"Iman Kadhum Abbood"},{"@pid":"171/1301","text":"Ali Kadhum Idrees"}]},"title":"Energy Saving in Wireless Video Sensor Networks using Online Data Transmission Reduction Scheme.","venue":"ICCCNT","pages":"1-7","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/icccnt/AbboodI23","doi":"10.1109/ICCCNT56998.2023.10307911","ee":"https://doi.org/10.1109/ICCCNT56998.2023.10307911","url":"https://dblp.org/rec/conf/icccnt/AbboodI23"}, "url":"URL#359972" }, { "@score":"3", "@id":"360009", "info":{"authors":{"author":[{"@pid":"361/9492","text":"Riyam Faisal Alwash"},{"@pid":"171/1301","text":"Ali Kadhum Idrees"},{"@pid":"243/6618","text":"Salah Al-Obaidi"}]},"title":"A Methodological Review on EEG Data Reduction in Edge/Fog computing-based IoMT networks.","venue":"ICCCNT","pages":"1-7","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/icccnt/AlwashIA23","doi":"10.1109/ICCCNT56998.2023.10307551","ee":"https://doi.org/10.1109/ICCCNT56998.2023.10307551","url":"https://dblp.org/rec/conf/icccnt/AlwashIA23"}, "url":"URL#360009" }, { "@score":"3", "@id":"360010", "info":{"authors":{"author":[{"@pid":"361/9492","text":"Riyam Faisal Alwash"},{"@pid":"171/1301","text":"Ali Kadhum Idrees"},{"@pid":"243/6618","text":"Salah Al-Obaidi"}]},"title":"EEG Data reduction with Epileptic Seizure Detection based machine learning in IoMT Networks.","venue":"ICCCNT","pages":"1-7","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/icccnt/AlwashIA23a","doi":"10.1109/ICCCNT56998.2023.10307907","ee":"https://doi.org/10.1109/ICCCNT56998.2023.10307907","url":"https://dblp.org/rec/conf/icccnt/AlwashIA23a"}, "url":"URL#360010" }, { "@score":"3", "@id":"360491", "info":{"authors":{"author":[{"@pid":"361/8454","text":"Sandip A. Kahate"},{"@pid":"361/9812","text":"Atul D. Raut"}]},"title":"An Enhanced Data Confidentiality in Online Social Networks Using Quantum Key Management with a Blockchain Approach.","venue":"ICCCNT","pages":"1-6","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/icccnt/KahateR23","doi":"10.1109/ICCCNT56998.2023.10307914","ee":"https://doi.org/10.1109/ICCCNT56998.2023.10307914","url":"https://dblp.org/rec/conf/icccnt/KahateR23"}, "url":"URL#360491" }, { "@score":"3", "@id":"360939", "info":{"authors":{"author":[{"@pid":"58/10220","text":"Priyanka"},{"@pid":"66/5407","text":"Manjit Singh"}]},"title":"Exploring Big Data Analytics in Social Networking Sites.","venue":"ICCCNT","pages":"1-5","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/icccnt/PriyankaS23","doi":"10.1109/ICCCNT56998.2023.10307582","ee":"https://doi.org/10.1109/ICCCNT56998.2023.10307582","url":"https://dblp.org/rec/conf/icccnt/PriyankaS23"}, "url":"URL#360939" }, { "@score":"4", "@id":"361357", "info":{"authors":{"author":[{"@pid":"362/0274","text":"Madhuri Telidevara"},{"@pid":"361/9749","text":"D. Kothandaraman"}]},"title":"Improving Intrusion Detection in Internet of Things Networks with Feed-Forward Neural Networks Based on the UNSW-NB15 Dataset.","venue":"ICCCNT","pages":"1-6","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/icccnt/TelidevaraK23","doi":"10.1109/ICCCNT56998.2023.10307804","ee":"https://doi.org/10.1109/ICCCNT56998.2023.10307804","url":"https://dblp.org/rec/conf/icccnt/TelidevaraK23"}, "url":"URL#361357" }, { "@score":"3", "@id":"361487", "info":{"authors":{"author":[{"@pid":"286/9291","text":"Deepika Selvaraj"},{"@pid":"286/9322","text":"Arunachalam Venkatesan"},{"@pid":"87/4350","text":"David Novo"}]},"title":"Analysis of Optimum 3-Dimensional Array and Fast Data Movement for Efficient Memory Computation in Convolutional Neural Network Models.","venue":"ICCCSP","pages":"94-108","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/icccsp/SelvarajVN23","doi":"10.1007/978-3-031-39811-7_8","ee":"https://doi.org/10.1007/978-3-031-39811-7_8","url":"https://dblp.org/rec/conf/icccsp/SelvarajVN23"}, "url":"URL#361487" }, { "@score":"3", "@id":"362055", "info":{"authors":{"author":[{"@pid":"191/6463","text":"Mangang Xie"},{"@pid":"356/1653","text":"Baozhen An"},{"@pid":"297/1119","text":"Changhao Song"},{"@pid":"118/6735","text":"Qianqian Wang"},{"@pid":"28/1374","text":"Meng Zhou"},{"@pid":"35/9518","text":"Xiangdong Jia"}]},"title":"Updating Not Just Payload but Payload and Extra Data Simultaneously in Real-Time IoT Networks.","venue":"ICCE-Taiwan","pages":"385-386","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/icce-tw/XieASWZJ23","doi":"10.1109/ICCE-TAIWAN58799.2023.10226950","ee":"https://doi.org/10.1109/ICCE-Taiwan58799.2023.10226950","url":"https://dblp.org/rec/conf/icce-tw/XieASWZJ23"}, "url":"URL#362055" }, { "@score":"3", "@id":"362326", "info":{"authors":{"author":[{"@pid":"32/1538","text":"Atsuko Mutoh"},{"@pid":"340/6174","text":"Kazuma Morikida"},{"@pid":"84/638","text":"Koichi Moriyama"},{"@pid":"15/4101","text":"Nobuhiro Inuzuka"}]},"title":"Evaluation of Employees by Generating Meeting Networks Using Entry and Exit Data.","venue":"ICCE","pages":"1-4","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/iccel/MutohMMI23","doi":"10.1109/ICCE56470.2023.10043416","ee":"https://doi.org/10.1109/ICCE56470.2023.10043416","url":"https://dblp.org/rec/conf/iccel/MutohMMI23"}, "url":"URL#362326" } ] } } } )