


default search action
IEEE Transactions on Emerging Topics in Computational Intelligence, Volume 4
Volume 4, February 2020
- Qilian Liang

, Gary G. Yen
, Tariq S. Durrani, Wei Wang
, Xin Wang:
Guest Editorial: Special Issue on Computational Intelligence for Communications and Sensing. 1-4 - Xin Liu

, Min Jia:
Intelligent Spectrum Resource Allocation Based on Joint Optimization in Heterogeneous Cognitive Radio. 5-12 - Zhuo Sun

, Song Kong, Wenbo Wang
:
Sparse Learning of Higher-Order Statistics for Communications and Sensing. 13-22 - Shuang Liu

, Xiaolong Hao
:
Pedestrian Retrieval Using Generated Samples and Multistream Layer in Sensor Networks. 23-31 - Wei Wang

, Min Zhang:
Tensor Deep Learning Model for Heterogeneous Data Fusion in Internet of Things. 32-41 - Xiu Zhang

, Xin Zhang
, Zhou Wu:
Utility- and Fairness-Based Spectrum Allocation of Cellular Networks by an Adaptive Particle Swarm Optimization Algorithm. 42-50 - Zhong Zhang

, Meiyan Huang:
Person Re-Identification Based on Heterogeneous Part-Based Deep Network in Camera Networks. 51-60 - Mu Zhou

, Yixin Lin
, Nan Zhao
, Qing Jiang, Xiaolong Yang, Zengshan Tian:
Indoor WLAN Intelligent Target Intrusion Sensing Using Ray-Aided Generative Adversarial Network. 61-73 - Jie Ren

, Jing Liang
, Yuanyuan Zhao:
Soil PH Measurement Based on Compressive Sensing and Deep Image Prior. 74-82 - Yanan Liu, Xianbin Wang

, Gary Boudreau, Akram Bin Sediq, Hatem Abou-zeid:
Deep Learning Based Hotspot Prediction and Beam Management for Adaptive Virtual Small Cell in 5G Networks. 83-94
Volume 4, Number 2, April 2020
- Feng Xia

, Jiaying Liu
, Hansong Nie
, Yonghao Fu, Liangtian Wan
, Xiangjie Kong
:
Random Walks: A Review of Algorithms and Applications. 95-107 - Maoguo Gong

, Cheng Chen, Yu Xie
, Shanfeng Wang
:
Community Preserving Network Embedding Based on Memetic Algorithm. 108-118 - Xiao-Kang Liu

, He Jiang
, Yan-Wu Wang
, Haibo He
:
A Distributed Iterative Learning Framework for DC Microgrids: Current Sharing and Voltage Regulation. 119-129 - Animesh Chaturvedi

, Aruna Tiwari
:
System Network Complexity: Network Evolution Subgraphs of System State Series. 130-139 - Simone Scardapane

, Steven Van Vaerenbergh
, Amir Hussain
, Aurelio Uncini:
Complex-Valued Neural Networks With Nonparametric Activation Functions. 140-150 - Haonan Guo

, Shenghong Li
, Kaiyue Qi
, Ying Guo
, Zhengwu Xu:
Learning Automata Based Competition Scheme to Train Deep Neural Networks. 151-158 - Tharun Kumar Reddy

, Vipul Arora
, Laxmidhar Behera
:
HJB-Equation-Based Optimal Learning Scheme for Neural Networks With Applications in Brain-Computer Interface. 159-170 - Stephen D. Liang

:
Optimization for Deep Convolutional Neural Networks: How Slim Can It Go? 171-179 - Venkatanareshbabu Kuppili

, Mainak Biswas
, Damodar Reddy Edla
, K. J. Ravi Prasad, Jasjit S. Suri
:
A Mechanics-Based Similarity Measure for Text Classification in Machine Learning Paradigm. 180-200
Volume 4, Number 3, June 2020
- Celimuge Wu

, Yaochu Jin
, Jie Li
, Kok-Lim Alvin Yau
, Junaid Qadir
:
Guest Editorial Special Issue on Big Data and Computational Intelligence for Agile Wireless IoT. 202-205 - Caijuan Chen, Kaoru Ota

, Mianxiong Dong
, Chen Yu
, Hai Jin
:
WITM: Intelligent Traffic Monitoring Using Fine-Grained Wireless Signal. 206-215 - Yu Gu

, Yantong Wang, Tao Liu, Yusheng Ji
, Zhi Liu
, Peng Li, Xiaoyan Wang
, Xin An
, Fuji Ren
:
EmoSense: Computational Intelligence Driven Emotion Sensing via Wireless Channel Data. 216-226 - Zhenyu Zhou

, Haijun Liao, Bo Gu
, Shahid Mumtaz
, Jonathan Rodriguez:
Resource Sharing and Task Offloading in IoT Fog Computing: A Contract-Learning Approach. 227-240 - Qichao Xu

, Zhou Su
, Kuan Zhang
, Peng Li
:
Intelligent Cache Pollution Attacks Detection for Edge Computing Enabled Mobile Social Networks. 241-252 - Kian Hamedani

, Lingjia Liu
, Shiyan Hu
, Jonathan D. Ashdown
, Jinsong Wu
, Yang Yi
:
Detecting Dynamic Attacks in Smart Grids Using Reservoir Computing: A Spiking Delayed Feedback Reservoir Based Approach. 253-264 - Yan Huang

, Xin Guan
, Hongyang Chen
, Yi Liang, Shanshan Yuan, Tomoaki Ohtsuki
:
Risk Assessment of Private Information Inference for Motion Sensor Embedded IoT Devices. 265-275 - FeiYi Xie

, Hong Wen
, Jinsong Wu
, Wenjing Hou, Huanhuan Song
, Tengyue Zhang, Runfa Liao, Yixin Jiang:
Data Augmentation for Radio Frequency Fingerprinting via Pseudo-Random Integration. 276-286 - Yangyang Li

, Guangyuan Liu
, Gao Lu
, Licheng Jiao
, Naresh Marturi
, Ronghua Shang
:
Hyper-Parameter Optimization Using MARS Surrogate for Machine-Learning Algorithms. 287-297 - Chao Jiang

, Zhen Ni
, Yi Guo
, Haibo He
:
Pedestrian Flow Optimization to Reduce the Risk of Crowd Disasters Through Human-Robot Interaction. 298-311 - Wenbo Du

, Wen Ying, Peng Yang
, Xianbin Cao
, Gang Yan
, Ke Tang
, Dapeng Oliver Wu
:
Network-Based Heterogeneous Particle Swarm Optimization and Its Application in UAV Communication Coverage. 312-323 - Pei-Qiu Huang

, Yong Wang
, Kezhi Wang
, Kun Yang
:
Differential Evolution With a Variable Population Size for Deployment Optimization in a UAV-Assisted IoT Data Collection System. 324-335 - Seyed Mohammad Nekooei

, Gang Chen
:
Cooperative Coevolution Design of Multilevel Fuzzy Logic Controllers for Media Access Control in Wireless Body Area Networks. 336-350 - Vesna Sesum-Cavic

, Eva Kühn, Lukas Fleischhacker
:
Efficient Search and Lookup in Unstructured P2P Overlay Networks Inspired by Swarm Intelligence. 351-368 - Yongliang Chen

, Jinghui Zhong
, Liang Feng
, Jun Zhang
:
An Adaptive Archive-Based Evolutionary Framework for Many-Task Optimization. 369-384 - Junwen Ding

, Liji Shen, Zhipeng Lü, Liping Xu, Una Benlic:
A Hybrid Memetic Algorithm for the Parallel Machine Scheduling Problem With Job Deteriorating Effects. 385-397 - Jiahai Wang

, Binzhong Cen, Shangce Gao
, Zizhen Zhang, Yuren Zhou:
Cooperative Evolutionary Framework With Focused Search for Many-Objective Optimization. 398-412
Volume 4, Number 4, August 2020
- Zixing Zhang

, Dimitris N. Metaxas, Hung-yi Lee
, Björn W. Schuller
:
Guest Editorial Special Issue on Adversarial Learning in Computational Intelligence. 414-416 - Chenggang Mi

, Lei Xie
, Yanning Zhang
:
Improving Adversarial Neural Machine Translation for Morphologically Rich Language. 417-426 - Giovanni Apruzzese

, Mauro Andreolini, Michele Colajanni
, Mirco Marchetti
:
Hardening Random Forest Cyber Detectors Against Adversarial Attacks. 427-439 - Yu-Ying Yeh

, Yen-Cheng Liu, Wei-Chen Chiu
, Yu-Chiang Frank Wang
:
Static2Dynamic: Video Inference From a Deep Glimpse. 440-449 - Koosha Sadeghi

, Ayan Banerjee
, Sandeep K. S. Gupta
:
A System-Driven Taxonomy of Attacks and Defenses in Adversarial Machine Learning. 450-467 - Wen-Chin Huang

, Hao Luo
, Hsin-Te Hwang, Chen-Chou Lo
, Yu-Huai Peng, Yu Tsao
, Hsin-Min Wang
:
Unsupervised Representation Disentanglement Using Cross Domain Features and Adversarial Learning in Variational Autoencoder Based Voice Conversion. 468-479 - Yufeng Xiao

, Huan Zhao
, Tingting Li:
Learning Class-Aligned and Generalized Domain-Invariant Representations for Speech Emotion Recognition. 480-489 - Akshay Chaturvedi

, Utpal Garain
:
Attacking VQA Systems via Adversarial Background Noise. 490-499 - Zhaoqing Pan

, Weijie Yu, Bosi Wang, Haoran Xie
, Victor S. Sheng
, Jianjun Lei
, Sam Kwong
:
Loss Functions of Generative Adversarial Networks (GANs): Opportunities and Challenges. 500-522 - Nathan K. Long

, Karl Sammut
, Daniel Sgarioto, Matthew Garratt
, Hussein A. Abbass
:
A Comprehensive Review of Shepherding as a Bio-Inspired Swarm-Robotics Guidance Approach. 523-537 - Alexandre Sawczuk da Silva

, Hui Ma
, Yi Mei
, Mengjie Zhang
:
A Survey of Evolutionary Computation for Web Service Composition: A Technical Perspective. 538-554 - Batchu Rajasekhar

, Wayes Tushar
, Clement Lork
, Yuren Zhou
, Chau Yuen
, Naran M. Pindoriya
, Kristin L. Wood
:
A Survey of Computational Intelligence Techniques for Air-Conditioners Energy Management. 555-570 - Lidia Ghosh

, Amit Konar
, Pratyusha Rakshit
, Atulya K. Nagar
:
Mimicking Short-Term Memory in Shape-Reconstruction Task Using an EEG-Induced Type-2 Fuzzy Deep Brain Learning Network. 571-588
Volume 4, Number 5, October 2020
- Yuan Yuan, Xuyun Zhang

, Jie Tang
:
Guest Editorial Special Issue on Privacy and Security in Computational Intelligence. 590-592 - Zhili Zhou

, Q. M. Jonathan Wu
, Shaohua Wan
, Wendi Sun, Xingming Sun:
Integrating SIFT and CNN Feature Matching for Partial-Duplicate Image Detection. 593-604 - Xiaolong Xu

, Shucun Fu, Weimin Li
, Fei Dai
, Honghao Gao
, Victor Chang
:
Multi-Objective Data Placement for Workflow Management in Cloud Infrastructure Using NSGA-II. 605-615 - Ruili Wang

, Wanting Ji
:
Computational Intelligence for Information Security: A Survey. 616-629 - Amir Namavar Jahromi, Sattar Hashemi, Ali Dehghantanha

, Reza M. Parizi
, Kim-Kwang Raymond Choo
:
An Enhanced Stacked LSTM Method With No Random Initialization for Malware Threat Hunting in Safety and Time-Critical Systems. 630-640 - Shih-Chao Cha

, Hao Wang
, Zhiyuan Tan
, Yuh-Jzer Joung, Yen-Chung Tseng, Kuo-Hui Yeh
:
On Privacy Aware Carriers for Value-Possessed e-Invoices Considering Intelligence Mining. 641-652 - Gaolei Li

, Mianxiong Dong
, Laurence T. Yang
, Kaoru Ota
, Jun Wu
, Jianhua Li:
Preserving Edge Knowledge Sharing Among IoT Services: A Blockchain-Based Approach. 653-665 - Shanshan Zhao

, Shancang Li
, Lianyong Qi
, Li Da Xu:
Computational Intelligence Enabled Cybersecurity for the Internet of Things. 666-674 - Guanfeng Liu

, Yurong Wang
, Bolong Zheng, Zhixu Li
, Kai Zheng
:
Strong Social Graph Based Trust-Oriented Graph Pattern Matching With Multiple Constraints. 675-685 - Romi Banerjee

, Sankar K. Pal
:
Z*-Numbers, Data Structures, and Thinking in Machine-Mind Architecture. 686-695 - Tao Song, Pan Zheng, M. L. Dennis Wong

, Min Jiang
, Xiangxiang Zeng
:
On the Computational Power of Asynchronous Axon Membrane Systems. 696-704 - Lien-Wu Chen

, Yung-En Li, Jun-Xian Liu, Hsi-Min Chen, Ming-Fong Tsai:
Intelligent Item Searching With Gesture-Based Interfaces Through Mobile Cloud Computing. 705-716 - Ning Shan, Daniel Stanley Tan

, Melkamu S. Denekew
, Yung-Yao Chen
, Wen-Huang Cheng
, Kai-Lung Hua
:
Photobomb Defusal Expert: Automatically Remove Distracting People From Photos. 717-727 - Manu Goyal

, Neil D. Reeves
, Adrian K. Davison
, Satyan Rajbhandari, Jennifer Spragg, Moi Hoon Yap
:
DFUNet: Convolutional Neural Networks for Diabetic Foot Ulcer Classification. 728-739
Volume 4, Number 6, December 2020
- Muhammad Asim

, Yong Wang
, Kezhi Wang
, Pei-Qiu Huang
:
A Review on Computational Intelligence Techniques in Cloud and Edge Computing. 742-763 - Zhihao Liu, Zhigang Zeng

, Cheng Lian
:
Multidomain Features Fusion for Zero-Shot Learning. 764-773 - Nikolaos Passalis

, Anastasios Tefas
, Juho Kanniainen
, Moncef Gabbouj
, Alexandros Iosifidis
:
Temporal Bag-of-Features Learning for Predicting Mid Price Movements Using High Frequency Limit Order Book Data. 774-785 - Masoumeh Heidari Kapourchali

, Bonny Banerjee
:
State Estimation via Communication for Monitoring. 786-793 - Indranil Pan

, Dirk Bester:
Marginal Likelihood Based Model Comparison in Fuzzy Bayesian Learning. 794-799

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














