An overview on restricted Boltzmann machines

N Zhang, S Ding, J Zhang, Y Xue - Neurocomputing, 2018 - Elsevier
Abstract The Restricted Boltzmann Machine (RBM) has aroused wide interest in machine
learning fields during the past decade. This review aims to report the recent developments in …

Heterogeneous ad hoc networks: Architectures, advances and challenges

T Qiu, N Chen, K Li, D Qiao, Z Fu - Ad Hoc Networks, 2017 - Elsevier
Abstract The Heterogeneous Ad Hoc Networks (HANETs) are important components of the
Internet of things, which become an inevitable trend in the future researches and …

Privacy-preserving outsourced classification in cloud computing

P Li, J Li, Z Huang, CZ Gao, WB Chen, K Chen - Cluster Computing, 2018 - Springer
Classifier has been widely applied in machine learning, such as pattern recognition, medical
diagnosis, credit scoring, banking and weather prediction. Because of the limited local …

An improved ant colony algorithm for robot path planning

J Liu, J Yang, H Liu, X Tian, M Gao - Soft computing, 2017 - Springer
To solve the problems of convergence speed in the ant colony algorithm, an improved ant
colony optimization algorithm is proposed for path planning of mobile robots in the …

Firefly algorithm with neighborhood attraction

H Wang, W Wang, X Zhou, H Sun, J Zhao, X Yu… - Information Sciences, 2017 - Elsevier
Firefly algorithm (FA) is a new optimization technique based on swarm intelligence. It
simulates the social behavior of fireflies. The search pattern of FA is determined by the …

A novel collaborative optimization algorithm in solving complex optimization problems

W Deng, H Zhao, L Zou, G Li, X Yang, D Wu - Soft Computing, 2017 - Springer
To overcome the deficiencies of weak local search ability in genetic algorithms (GA) and
slow global convergence speed in ant colony optimization (ACO) algorithm in solving …

Distributed aggregate privacy-preserving authentication in VANETs

L Zhang, Q Wu, J Domingo-Ferrer… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Existing secure and privacy-preserving vehicular communication protocols in vehicular ad
hoc networks face the challenges of being fast and not depending on ideal tamper-proof …

Text classification method based on self-training and LDA topic models

M Pavlinek, V Podgorelec - Expert Systems with Applications, 2017 - Elsevier
Supervised text classification methods are efficient when they can learn with reasonably
sized labeled sets. On the other hand, when only a small set of labeled documents is …

Multi-layer cloud architectural model and ontology-based security service framework for IoT-based smart homes

M Tao, J Zuo, Z Liu, A Castiglione, F Palmieri - Future Generation …, 2018 - Elsevier
Abstract The Smart Home concept, associated with the pervasiveness of network coverage
and embedded computing technologies is assuming an ever-growing significance for …

Intrusion detection of industrial internet-of-things based on reconstructed graph neural networks

Y Zhang, C Yang, K Huang, Y Li - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Industrial Internet-of-Things (IIoT) are highly vulnerable to cyber-attacks due to their open
deployment in unattended environments. Intrusion detection is an efficient solution to …