![](https://dblp.org/img/logo.ua.320x120.png)
![](https://dblp.org/img/dropdown.dark.16x16.png)
![](https://dblp.org/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.org/img/search.dark.16x16.png)
![search dblp](https://dblp.org/img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
Exact matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 454 matches
- 2024
- David Biagioni, Xiangyu Zhang
, Christiane Adcock, Michael N. Sinner
, Peter A. Graf, Jennifer King:
Comparative analysis of grid-interactive building control algorithms: From model-based to learning-based approaches. Eng. Appl. Artif. Intell. 133: 108498 (2024) - Fu Chen
, Ying Cui, Alina Lutsyk-King, Yizhu Gao
, Xiaoxiao Liu, Maria Cutumisu
, Jacqueline P. Leighton:
Validating a novel digital performance-based assessment of data literacy: Psychometric and eye-tracking analyses. Educ. Inf. Technol. 29(8): 9417-9444 (2024) - Awais Ahmed
, Xiaoyang Zeng
, Rui Xi
, Mengshu Hou
, Syed Attique Shah
:
MED-Prompt: A novel prompt engineering framework for medicine prediction on free-text clinical notes. J. King Saud Univ. Comput. Inf. Sci. 36(2): 101933 (2024) - Sohaib Asif, Xiaolong Zheng, Yusen Zhu:
An optimized fusion of deep learning models for kidney stone detection from CT images. J. King Saud Univ. Comput. Inf. Sci. 36(7): 102130 (2024) - Lin Cui, Yuanbang Zhang
, Yingkai Cui, Boyan Wang, Xiaodong Sun:
A high speed inference architecture for multimodal emotion recognition based on sparse cross modal encoder. J. King Saud Univ. Comput. Inf. Sci. 36(6): 102092 (2024) - Chen Dong
, Xiaodong Guo
, Sihuang Lian, Yinan Yao, Zhenyi Chen
, Yang Yang, Zhanghui Liu
:
Harnessing the advances of MEDA to optimize multi-PUF for enhancing IP security of biochips. J. King Saud Univ. Comput. Inf. Sci. 36(3): 101996 (2024) - Zhengxin Fu, Xiaopeng Li, Liguo Fang, Yi Feng, Bin Yu:
Security issues in visual cryptography scheme with known random number sequence. J. King Saud Univ. Comput. Inf. Sci. 36(3): 101983 (2024) - Jiahong Jiang
, Nan Xia, Xinmiao Yu:
A feature matching and compensation method based on importance weighting for occluded human pose estimation. J. King Saud Univ. Comput. Inf. Sci. 36(5): 102061 (2024) - Juanli Kuang
, Xiawei Cao, Songxiao Li
, Lang Li
:
DRcipher: A pseudo-random dynamic round lightweight block cipher. J. King Saud Univ. Comput. Inf. Sci. 36(1): 101928 (2024) - Tao Li
, Bing-yang Li, Xian-wei Xin, Yuanyuan Ma, Qiang Yang:
A novel tree structure-based multi-prototype clustering algorithm. J. King Saud Univ. Comput. Inf. Sci. 36(3): 102002 (2024) - Mingyuan Li, Lei Meng, Zhonglin Ye, Yuzhi Xiao, Shujuan Cao
, Haixing Zhao
:
Line graph contrastive learning for node classification. J. King Saud Univ. Comput. Inf. Sci. 36(4): 102011 (2024) - Shuang Liu, Yu Lian, Zhong Zhang
, Baihua Xiao
, Tariq S. Durrani
:
Cross-scale Vision Transformer for crowd localization. J. King Saud Univ. Comput. Inf. Sci. 36(2): 101972 (2024) - Xiaoyang Liu
, Wei Xiao, Chao Liu, Wei Wang, Chaorong Li:
Meta graph network recommendation based on multi-behavior encoding. J. King Saud Univ. Comput. Inf. Sci. 36(5): 102050 (2024) - Xiaoyang Liu, Mengyao Zhang, Yanfei Liu, Chao Liu, Chaorong Li, Wei Wang, Xiaoqin Zhang, Asgarali Bouyer:
Semi-supervised community detection method based on generative adversarial networks. J. King Saud Univ. Comput. Inf. Sci. 36(3): 102008 (2024) - Bowen Meng, Xiaochen Yuan
, Qiyuan Zhang
, Chan-Tong Lam
, Guoheng Huang:
Encryption-then-embedding-based hybrid data hiding scheme for medical images. J. King Saud Univ. Comput. Inf. Sci. 36(1): 101932 (2024) - Ahsan Nazir
, Jingsha He
, Nafei Zhu
, Ahsan Wajahat
, Faheem Ullah, Sirajuddin Qureshi
, Xiangjun Ma, Muhammad Salman Pathan
:
Collaborative threat intelligence: Enhancing IoT security through blockchain and machine learning integration. J. King Saud Univ. Comput. Inf. Sci. 36(2): 101939 (2024) - Xiaoyu Qi, Gang Mei
:
Network Resilience: Definitions, approaches, and applications. J. King Saud Univ. Comput. Inf. Sci. 36(1): 101882 (2024) - Xiaoshuang Sang, Yang Zou, Feng Li, Ranran He:
Diverse representation-guided graph learning for multi-view metric clustering. J. King Saud Univ. Comput. Inf. Sci. 36(7): 102129 (2024) - Jing Shang, Zhiwen Xiao
, Tao Tao, Jibin Wang, Zhihui Wu:
A heuristic method for discovering multi-class classification rules from multi-source data in cloud-edge system. J. King Saud Univ. Comput. Inf. Sci. 36(2): 101962 (2024) - Gongchao Su
, Mingjun Dai, Bin Chen, Xiaohui Lin:
Deep reinforcement learning aided secure UAV communications in the presence of moving eavesdroppers. J. King Saud Univ. Comput. Inf. Sci. 36(5): 102047 (2024) - Alaa Thobhani, Beiji Zou, Xiaoyan Kui, Amal A. Al-Shargabi, Zaid Derea, Amr Abdussalam, Mohammed A. Asham:
A novel image captioning model with visual-semantic similarities and visual representations re-weighting. J. King Saud Univ. Comput. Inf. Sci. 36(7): 102127 (2024) - Yuan Tian, Tanping Zhou, Xuan Zhou, Weidong Zhong, Xiaoyuan Yang:
Attribute-based linear homomorphic signature scheme based on key policy for mobile crowdsensing. J. King Saud Univ. Comput. Inf. Sci. 36(6): 102114 (2024) - Muhammad Hanif Tunio
, Jian Ping Li, Xiaoyang Zeng
, Faijan Akhtar
, Syed Attique Shah
, Awais Ahmed
, Yu Yang
, Md Belal Bin Heyat
:
Meta-knowledge guided Bayesian optimization framework for robust crop yield estimation. J. King Saud Univ. Comput. Inf. Sci. 36(1): 101895 (2024) - Yao Wang, Yujia Huo
, Changxiao Yang, Xingchen Huang, Dawen Xia, Fujian Feng:
Knowledge ontology enhanced model for explainable knowledge tracing. J. King Saud Univ. Comput. Inf. Sci. 36(5): 102065 (2024) - Xiaofeng Wang, Marini Othman
, Deshinta Arrova Dewi, Yonghong Wang
:
WSLC: Weighted semi-local centrality to identify influential nodes in complex networks. J. King Saud Univ. Comput. Inf. Sci. 36(1): 101906 (2024) - Xiaohua Wu, Jinqian Jiang
, Xiaoyu Li, Jun Cheng, Tao Meng:
Hierarchical classified storage and incentive consensus scheme for building IoT under blockchain. J. King Saud Univ. Comput. Inf. Sci. 36(5): 102075 (2024) - Jing Xiao, Tao Luo, Chaoqun Li, Jie Zhou, Zhigang Li:
CE-PBFT: A high availability consensus algorithm for large-scale consortium blockchain. J. King Saud Univ. Comput. Inf. Sci. 36(2): 101957 (2024) - Yatao Yang
, Hui Dong, Liangyu Chen, Zhaofu Li, Chao Xia:
LWARX: Lightweight ARX white-box cipher for satellite communications. J. King Saud Univ. Comput. Inf. Sci. 36(5): 102032 (2024) - Juan Yin, Xiaoyang Liu
, Zhewen Yang:
A deep multiple-instance text binary classification for topic relevant content extraction on social media. J. King Saud Univ. Comput. Inf. Sci. 36(1): 101883 (2024) - Xiaopeng Yu, Dianhua Tang, Zhen Zhao
, Wei Zhao
:
Parallel private information retrieval protocol with index anonymity for untrusted databases. J. King Saud Univ. Comput. Inf. Sci. 36(2): 101903 (2024)
skipping 424 more matches
loading more results
failed to load more results, please try again later
![](https://dblp.org/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-08-13 10:57 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint