


default search action
Future Generation Computer Systems, Volume 125
Volume 125, December 2021
- Ying Li, Binbin Fan

, Weiping Zhang, Zhiqiang Jiang:
TireNet: A high recall rate method for practical application of tire defect type classification. 1-9 - Jose Carlos Romero

, Angeles G. Navarro
, Antonio Vilches
, Andrés Rodríguez
, Francisco Corbera
, Rafael Asenjo
:
Efficient heterogeneous matrix profile on a CPU + High Performance FPGA with integrated HBM. 10-23
- Sumin Li

, Xiuqin Pan:
A computational drug repositioning model based on hybrid similarity side information powered graph neural network. 24-31
- Peng Xu

, Ruijie Sun, Wei Wang
, Tianyang Chen
, Yubo Zheng
, Hai Jin:
SDD: A trusted display of FIDO2 transaction confirmation without trusted execution environment. 32-40
- Aaisha Makkar

, Neeraj Kumar
:
PROTECTOR: An optimized deep learning-based framework for image spam detection and prevention. 41-58
- Lingqiang Kong:

A study on the AI-based online triage model for hospitals in sustainable smart city. 59-70
- Diana Laura Aguilar

, Octavio Loyola-González
, Miguel Angel Medina-Pérez
, Leonardo Cañete-Sifuentes
, Kim-Kwang Raymond Choo
:
PBC4occ: A novel contrast pattern-based classifier for one-class classification. 71-90
- Haibo Liang, Haifeng Chen, Jialing Zou

, Jing Bai:
Technical research on realizing remote intelligent diagnosis of petroleum drilling loss circulation under smart city strategy. 91-99 - Xu Zhu:

Complex event detection for commodity distribution Internet of Things model incorporating radio frequency identification and Wireless Sensor Network. 100-111
- Yifei Zhang

, Senlin Luo, Limin Pan
, Hanqing Zhang:
Syscall-BSEM: Behavioral semantics enhancement method of system call sequence for high accurate and robust host intrusion detection. 112-126 - Jiachen Yang, Shuai Xiao

, Aiyun Li, Guipeng Lan, Huihui Wang
:
Detecting fake images by identifying potential texture difference. 127-135 - Zhi-bin Huang

, Guang-Tao Fu, Tian-Hao Fa, Dan-Yang Dong, Peng Bai, Xiao Chen:
High performance ant colony system based on GPU warp specialization with a static-dynamic balanced candidate set strategy. 136-150 - Su Hu, Hua Yin:

Research on the optimum synchronous network search data extraction based on swarm intelligence algorithm. 151-155 - Matheus P. Novaes

, Luiz Fernando Carvalho
, Jaime Lloret
, Mario Lemes Proença Jr.
:
Adversarial Deep Learning approach detection and defense against DDoS attacks in SDN environments. 156-167 - Shubham Gupta

, Balu L. Parne
, Narendra S. Chaudhari:
ISAG: IoT-enabled and Secrecy Aware Group-based handover scheme for e-health services in M2M communication network. 168-187 - Bai Ning, Liu Na:

Deep Spatial/temporal-level feature engineering for Tennis-based action recognition. 188-193
- Shaoqiang Wang, Zhenzhen Wu, Gewen He, Shudong Wang, Hongwei Sun, Fangfang Fan:

Semi-supervised classification-aware cross-modal deep adversarial data augmentation. 194-205
- Zhongjin Li, Victor Chang

, Haiyang Hu, Maozhong Fu, Jidong Ge, Francesco Piccialli
:
Optimizing makespan and resource utilization for multi-DNN training in GPU cluster. 206-220 - Rekha Goyat, Gulshan Kumar, Mamoun Alazab, Rahul Saha, Reji Thomas

, Mritunjay Kumar Rai:
A secure localization scheme based on trust assessment for WSNs using blockchain technology. 221-231 - José Paredes, Gerardo I. Simari

, Maria Vanina Martinez, Marcelo A. Falappa
:
Detecting malicious behavior in social platforms via hybrid knowledge- and data-driven systems. 232-246
- Chengyi Qu

, Prasad Calyam, Jeromy Yu, Aditya Vandanapu, Osunkoya Opeoluwa, Ke Gao
, Songjie Wang, Raymond L. Chastain
, Kannappan Palaniappan:
DroneCOCoNet: Learning-based edge computation offloading and control networking for drone video analytics. 247-262
- Patricia López Martínez

, Ricardo Dintén
, José María Drake, Marta E. Zorrilla
:
A big data-centric architecture metamodel for Industry 4.0. 263-284 - Haiyang Yu

, Zhen Yang, Muhammad Waqas
, Shanshan Tu, Zhu Han, Zahid Halim, Richard O. Sinnott, Udaya Parampalli:
Efficient dynamic multi-replica auditing for the cloud with geographic location. 285-298 - Matteo Francia

, Enrico Gallinucci, Matteo Golfarelli
, Anna Giulia Leoni, Stefano Rizzi
, Nicola Santolini:
Making data platforms smarter with MOSES. 299-313 - Abdul Basit Darem

, Jemal H. Abawajy, Aaisha Makkar
, Asma Alhashmi
, Sultan Munadi Alanazi:
Visualization and deep-learning-based malware variant detection using OpCode-level features. 314-323 - Zhenyan Ji, Mengdan Wu

, Hong Yang, José Enrique Armendáriz-Iñigo
:
Temporal sensitive heterogeneous graph neural network for news recommendation. 324-333 - Sudhakar

, Sushil Kumar
:
MCFT-CNN: Malware classification with fine-tune convolution neural networks using traditional and transfer learning in Internet of Things. 334-351
- Yi Zheng, Youqiang Wang

, Jixin Liu:
Analysis and experimental research on stability characteristics of squatting posture of wearable lower limb exoskeleton robot. 352-363
- Xiaoming Li

, Guangquan Xu
, Changzheng Liu
, Wei Yu, Zhao Liu
, Zhenhuan Wu
, Xiaoping Yang:
Higher-Order Multiple-Feature-based Community Evolution Model with Potential Applications in Criminal Network Investigation. 364-375
- Guan Wang, Jiali Yin, M. Shamim Hossain

, Ghulam Muhammad
:
Incentive mechanism for collaborative distributed learning in Artificial Intelligence of Things. 376-384
- Yachao Yuan

, Yali Yuan
, Thar Baker
, Lutz Maria Kolbe, Dieter Hogrefe:
FedRD: Privacy-preserving adaptive Federated learning framework for intelligent hazardous Road Damage detection and warning. 385-398
- Elyazid Akachar

, Brahim Ouhbi, Bouchra Frikh
:
ACSIMCD: A 2-phase framework for detecting meaningful communities in dynamic social networks. 399-420
- Gyeong Ho Lee

, Jaeseob Han
, Jun Kyun Choi:
MPdist-based missing data imputation for supporting big data analyses in IoT-based applications. 421-432 - Devrim Unal

, Abdulla K. Al-Ali, Ferhat Özgür Çatak
, Mohammad Hammoudeh
:
A secure and efficient Internet of Things cloud encryption scheme with forensics investigation compatibility based on identity-based encryption. 433-445
- Marco Viviani

, Cristina Crocamo
, Matteo Mazzola
, Francesco Bartoli
, Giuseppe Carrà
, Gabriella Pasi
:
Assessing vulnerability to psychological distress during the COVID-19 pandemic through the analysis of microblogging content. 446-459
- Weizhong Qiang, Renwan Liu, Hai Jin:

Defending CNN against privacy leakage in edge computing via binary neural networks. 460-470
- Yueshen Xu

, Yinchen Wu, Honghao Gao, Shengli Song, Yuyu Yin
, Xichu Xiao
:
Collaborative APIs recommendation for Artificial Intelligence of Things with information fusion. 471-479
- Xin Li, Lei Zhang:

Unbalanced data processing using deep sparse learning technique. 480-484 - Hongxiao Gan, Jinglan Zhang

, Michael Towsey, Anthony Truskinger, Debra Stark
, Berndt van Rensburg, Yuefeng Li, Paul Roe
:
A novel frog chorusing recognition method with acoustic indices and machine learning. 485-495 - Helan Liang, Bincheng Ding, Yanhua Du

, Fanzhang Li:
Parallel optimization of QoS-aware big service processes with discovery of skyline services. 496-514 - Yuanyuan Shen

, Manman Peng, Shiling Wang, Qiang Wu:
Towards parallelism detection of sequential programs with graph neural network. 515-525 - Jiajia Ren, Hongxin Li, Mengmeng Zhang, Cong Wu:

Massive-scale graph mining for e-commerce cold chain analysis and optimization. 526-531
- Bardh Prenkaj

, Damiano Distante
, Stefano Faralli
, Paola Velardi
:
Hidden space deep sequential risk prediction on student trajectories. 532-543
- Serin V. Simpson

, G. Nagarajan:
A fuzzy based Co-Operative Blackmailing Attack detection scheme for Edge Computing nodes in MANET-IOT environment. 544-563 - Kai Yang, Xiaodong Lin, Limin Sun:

CShield: Enabling code privacy for Cyber-Physical systems. 564-574 - Michal Wrzeszcz

, Lukasz Dutka, Renata G. Slota
, Jacek Kitowski
:
New approach to global data access in computational infrastructures. 575-589
- José A. Ruipérez-Valiente

, Daniel Alberto Jaramillo-Morillo
, Srecko Joksimovic
, Vitomir Kovanovic
, Pedro J. Muñoz-Merino
, Dragan Gasevic:
Data-driven detection and characterization of communities of accounts collaborating in MOOCs. 590-603
- Hongzhi Zhou, Gan Yu:

Research on pedestrian detection technology based on the SVM classifier trained by HOG and LTP features. 604-615
- Bin Wang, Fagui Liu, Weiwei Lin:

Energy-efficient VM scheduling based on deep reinforcement learning. 616-628 - Niloofar Bayat, Kunal Mahajan, Sam Denton, Vishal Misra, Dan Rubenstein:

Down for failure: Active power status monitoring. 629-640
- Bárbara Silveira, Henrique S. Silva

, Fabricio Murai
, Ana Paula Couto da Silva
:
Predicting user emotional tone in mental disorder online communities. 641-651
- Faisal Janjua, Asif Masood, Haider Abbas

, Imran Rashid, Malik Muhammad Zaki Murtaza Khan
:
Textual analysis of traitor-based dataset through semi supervised machine learning. 652-660
- Jakub Kuzilek

, Zdenek Zdráhal, Viktor Fuglik:
Student success prediction using student exam behaviour. 661-671
- Peng Zhang:

E-commerce products recognition based on a deep learning architecture: Theory and implementation. 672-676
- Tao Zhang, Yan Zhao, Wenjing Jia

, Mu-Yen Chen
:
Collaborative algorithms that combine AI with IoT towards monitoring and control system. 677-686
- Deepak Singh, Anurag Shukla, Mohit Sajwan

:
Deep transfer learning framework for the identification of malicious activities to combat cyberattack. 687-697 - George E. Violettas

, George Simoglou
, Sophia G. Petridou
, Lefteris Mamatas
:
A Softwarized Intrusion Detection System for the RPL-based Internet of Things networks. 698-714
- Arno Breitfuss, Karen Errou, Anelia Kurteva

, Anna Fensel
:
Representing emotions with knowledge graphs for movie recommendations. 715-725
- Abd Ullah Khan

, Ghulam Abbas
, Ziaul Haq Abbas
, Wali Ullah Khan
, Muhammad Waqas
:
Spectrum utilization efficiency in CRNs with hybrid spectrum access and channel reservation: A comprehensive analysis under prioritized traffic. 726-742 - Júnior Löff

, Dalvan Griebler
, Gabriele Mencagli
, Gabriell Alves de Araujo, Massimo Torquati
, Marco Danelutto
, Luiz Gustavo Fernandes
:
The NAS Parallel Benchmarks for evaluating C++ parallel programming frameworks on shared-memory architectures. 743-757
- Haomiao Yang, Shaopeng Liang, Yi Zhang, Xiong Li

:
Cloud-based privacy- and integrity-protecting density peaks clustering. 758-769
- Qingsong Ai, Wei Meng

, Faycal Bensaali
, Xiaojun Zhai, Lu Liu, Nasser Alaraje:
Editorial for FGCS special issue: Intelligent IoT systems for healthcare and rehabilitation. 770-773
- Andrea F. Abate

, Lucia Cascone
, Michele Nappi, Fabio Narducci
, Ignazio Passero
:
Attention monitoring for synchronous distance learning. 774-784
- Cong Wu, Hongxin Li, Jiajia Ren:

Research on hierarchical clustering method based on partially-ordered Hasse graph. 785-791 - Jordi Garcia

, Francesc Aguiló
, Adrià Asensio
, Ester Simó
, Marisa Zaragozá, Xavi Masip-Bruin
:
Data-flow driven optimal tasks distribution for global heterogeneous systems. 792-805 - Yishu Liu, Qi Zhang, Weixiong Chen:

Massive-scale complicated human action recognition: Theory and applications. 806-811 - Shuigen Yang:

A novel study on deep learning framework to predict and analyze the financial time series information. 812-819 - Khan Muhammad

, Mustaqeem
, Amin Ullah
, Ali Shariq Imran
, Muhammad Sajjad, Mustafa Servet Kiran, Giovanna Sannino
, Victor Hugo C. de Albuquerque:
Human action recognition using attention based LSTM network with dilated CNN features. 820-830 - Fengtao Nan

, Yahui Tang, Po Yang, Zhenli He
, Yun Yang:
A novel sub-Kmeans based on co-training approach by transforming single-view into multi-view. 831-843 - Michel J. F. Rosa

, Célia Ghedini Ralha
, Maristela Holanda
, Aletéia P. F. Araújo
:
Computational resource and cost prediction service for scientific workflows in federated clouds. 844-858
- Sumarga Kumar Sah Tyagi

, Shiva Raj Pokhrel
, Mahyar Nemati
, Deepak Kumar Jain, Gang Li
, Jinho Choi
:
Redesigning compound TCP with cognitive edge intelligence for WiFi-based IoT. 859-868
- Marco Antonio Sotelo Monge, Jorge Maestre Vidal:

Conceptualization and cases of study on cyber operations against the sustainability of the tactical edge. 869-890 - Sergio Pérez

, Patricia Arroba
, José Manuel Moya
:
Energy-conscious optimization of Edge Computing through Deep Reinforcement Learning and two-phase immersion cooling. 891-907 - Yi Jin

, Jiawei Cai, Jiawei Xu
, Yuxiang Huan
, Yulong Yan, Bin Huang, Yongliang Guo, Lirong Zheng
, Zhuo Zou:
Self-aware distributed deep learning framework for heterogeneous IoT edge devices. 908-920
- Tayyab Ali Khan, Karan Singh, Mohd Hilmi Hasan

, Khaleel Ahmad
, G. Thippa Reddy
, Senthilkumar Mohan
, Ali Ahmadian
:
ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs. 921-943
- Shajunyi Zhao, Dongyuan Ge, Jingfeng Zhao, Wenjiang Xiang:

Fingerprint pre-processing and feature engineering to enhance agricultural products categorization. 944-948 - Yongqiang Wang, Mei Sun, Long Liu:

Basketball shooting angle calculation and analysis by deeply-learned vision model. 949-953

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














