Journal list menu
Export Citations
Download PDFs
ISSUE INFORMATION
EDITORIAL
SPECIAL ISSUE PAPERS
no
Personalized content recommendation scheme based on trust in online social networks
- First Published: 19 November 2019
no
Extraction of abstracted sensory data to reduce the execution time of context-aware services in wearable computing environments
- First Published: 23 April 2019
no
Opcode sequence analysis of Android malware by a convolutional neural network
- First Published: 09 May 2019
no
DHGAN: Generative adversarial network with dark channel prior for single-image dehazing
- First Published: 26 April 2019
no
Detection of malicious code using the direct hashing and pruning and support vector machine
- First Published: 16 August 2019
no
An efficient KP design framework of attribute-based searchable encryption for user level revocation in cloud
- First Published: 16 April 2019
no
Design of a blind quantization-based audio watermarking scheme using singular value decomposition
- First Published: 05 April 2019
no
Drowsy driving detection using neural network with backpropagation algorithm implemented by FPGA
- First Published: 31 July 2019
no
Neural attention model with keyword memory for abstractive document summarization
- First Published: 16 August 2019
no
Incremental feature selection for efficient classification of dynamic graph bags
- First Published: 12 September 2019
no
Energy-aware task scheduling with time constraint for heterogeneous cloud datacenters
- First Published: 04 July 2019
no
Deep neural network model construction with interactive code reuse and automatic code transformation
- First Published: 13 August 2019
EDITORIAL
Free Access
free
Advanced approaches for information processing in multimedia, decision-making, and security systems
- First Published: 13 January 2020
SPECIAL ISSUE PAPERS
no
Minority oversampling based on the attraction-repulsion Weber problem
- First Published: 17 November 2019
no
Vulnerability analysis on the image-based authentication: Through the WM_INPUT message
- First Published: 03 December 2019
no
A secure and efficient WSN by employing symmetric key matrix and rectangular frame scheme
- First Published: 29 November 2019
no
New protocols of cognitive data management and sharing in cloud computing
- First Published: 28 October 2019
no
New public auditing protocol based on homomorphic tags for secure cloud storage
- First Published: 19 December 2019
no
Securing PIN-based authentication in smartwatches with just two gestures
- First Published: 16 November 2019