


default search action
Information Sciences, Volume 633
Volume 633, July 2023
- Yangming Hu, Chao Liu, Zhiming Yuan
:
Distributed L2 - L∞ containment control with nonconvex constraints for multi-agent systems. 1-9 - Lipeng Pan
, Xiaozhuan Gao:
Evidential Markov decision-making model based on belief entropy to predict interference effects. 10-26 - Xiao Hu, Yiqing Chen, Long Ren
, Zeshui Xu
:
Investor preference analysis: An online optimization approach with missing information. 27-40 - Minhao Zou
, Zhongxue Gan, Ruizhi Cao, Chun Guan, Siyang Leng
:
Similarity-navigated graph neural networks for node classification. 41-69 - Guoqing Zhang, Weisi Lin, Arun Kumar Chandran, Xuan Jing:
Complementary networks for person re-identification. 70-84 - Junkai Wang
, Lianlei Lin
, Sheng Gao, Zongwei Zhang:
Deep generation network for multivariate spatio-temporal data based on separated attention. 85-103 - Qiuhua Wang, Rui Zhang, Chuangchuang Li
, Chengyu Li, Yeru Wang, Yizhi Ren, Kim-Kwang Raymond Choo:
S-DeepTrust: A deep trust prediction method based on sentiment polarity perception. 104-121 - Lara Mauri
, Bruno Apolloni, Ernesto Damiani
:
Robust ML model ensembles via risk-driven anti-clustering of training data. 122-140 - Nataliya Chukhrova
, Arne Johannssen
:
Employing fuzzy hypothesis testing to improve modified p charts for monitoring the process fraction nonconforming. 141-157 - Chen Wang
, Jianhui Wang
, Yongping Du, Chunliang Zhang, Zhi Liu, C. L. Philip Chen:
Fixed-time event-triggered fuzzy adaptive control for uncertain nonlinear systems with full-state constraints. 158-169 - Jordan J. Bird
, Abdallah Naser
, Ahmad Lotfi
:
Writer-independent signature verification; Evaluation of robotic and generative adversarial attacks. 170-181 - Guanli Yue, Ansheng Deng, Yanpeng Qu
, Hui Cui, Xueying Wang
:
Stratified multi-density spectral clustering using Gaussian mixture model. 182-203 - Ran Li
, Hongchang Chen, Shuxin Liu, Xing Li, Yingle Li, Biao Wang:
Incomplete mixed data-driven outlier detection based on local-global neighborhood information. 204-225 - Zhize Sun, Lijie Wang, Yang Liu
, Liang Cao
:
RESO-based distributed bipartite tracking control for stochastic MASs with actuator nonlinearity. 226-244 - Shuaiying Yuan, Ziyang He
, Jianhui Zhao, Zhiyong Yuan, Adi Alhudhaif
, Fayadh Alenezi
:
Hypergraph and cross-attention-based unsupervised domain adaptation framework for cross-domain myocardial infarction localization. 245-263 - Sen Qiu, Tianqi Fan
, Junhan Jiang, Zhelong Wang, Yongzhen Wang, Junnan Xu, Tao Sun, Nan Jiang:
A novel two-level interactive action recognition model based on inertial data fusion. 264-279 - Pengwei Zhou
, Zuhua Xu
, Xiaoping Zhu, Jun Zhao, Chunyue Song, Zhijiang Shao:
Safe reinforcement learning method integrating process knowledge for real-time scheduling of gas supply network. 280-304 - Yuqiang Luo
, Zidong Wang
, Hongli Dong, Jingfeng Mao, Fuad E. Alsaadi
:
A novel sequential switching quadratic particle swarm optimization scheme with applications to fast tuning of PID controllers. 305-320 - En Zhang, Zihao Nie, Qiang Yang
, Yiqiao Wang, Dong Liu, Sang-Woon Jeon
, Jun Zhang:
Heterogeneous cognitive learning particle swarm optimization for large-scale optimization problems. 321-342 - Hua Zhang, Kaixuan Li, Teng Huang, Xin Zhang, Wenmin Li, Zhengping Jin, Fei Gao, Minghui Gao:
Publishing locally private high-dimensional synthetic data efficiently. 343-356 - Fanlong Zhang, Yi Che, Tiancai Liang, Wenchao Jiang
:
Clone consistent-defect prediction based on deep learning method. 357-369 - Peifeng Liang, Gang Liu, Zenggang Xiong
, Honghui Fan, Hongjin Zhu, Xuemin Zhang:
A facial geometry based detection model for face manipulation using CNN-LSTM architecture. 370-383 - Ting Yu
, Mengchi Liu
, Zujie Ren, Ji Zhang:
A fast approximate method for k-edge connected component detection in graphs with high accuracy. 384-409 - Hui Bai, Xixun Yu
, Zheng Yan, Jialei Zhang
, Laurence T. Yang:
VeriORouting: Verification on intelligent routing outsourced to the cloud. 410-430 - Rui Yin, Xuejun Pan, Liyong Zhang, Jianhua Yang, Wei Lu
:
A rule-based deep fuzzy system with nonlinear fuzzy feature transform for data classification. 431-452 - Hong Xie
, Haoran Gu, Zhi Qi:
Efficient algorithms for multi-armed bandits with additional feedbacks: Modeling and algorithms. 453-468 - Jana Herzog
, Janez Brest
, Borko Boskovic:
Analysis based on statistical distributions: A practical approach for stochastic solvers using discrete and continuous problems. 469-490 - Jinlai Zhang, Lyujie Chen, Binbin Liu, Bo Ouyang, Qizhi Xie, Jihong Zhu
, Weiming Li, Yanmei Meng:
3D adversarial attacks beyond point cloud. 491-503 - Yajing Ma, Zhanjie Li:
Neural network-based secure event-triggered control of uncertain industrial cyber-physical systems against deception attacks. 504-516 - Chang-Bing Zheng, Zhong-Hua Pang
, Jing-Xu Wang, Shengnan Gao, Jian Sun
, Guo-Ping Liu
:
Time-varying formation prescribed performance control with collision avoidance for multi-agent systems subject to mismatched disturbances. 517-530 - Yongliang Wu
, Shuliang Zhao, Shimao Dou
, Jinghui Li
:
ParsingPhrase: Parsing-based automated quality phrase mining. 531-548 - Zhou-Jing Wang
:
Saaty's consistency trapezoidal fuzzy extension and optimized fuzzy utility vector acquisition. 549-572 - Guobing Qian
, Xin Yu, Jiaojiao Mei
, Junzhu Liu, Shiyuan Wang:
A class of adaptive filtering algorithms based on improper complex correntropy. 573-596 - Yamei Ju, Guoliang Wei, Wangyan Li:
Distributed fault estimation over sensor networks: A bit rate allocation scheme. 597-612 - Zhengkang Zuo, Zhicheng Zeng, Wei Su
, Qing Huang, Yuhan Ke, Zengxin Liu, Changjing Wang, Wei Liang
:
Specification transformation method for functional program generation based on partition-recursion refinement rule. 613-632

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.