An overview on restricted Boltzmann machines
Abstract The Restricted Boltzmann Machine (RBM) has aroused wide interest in machine
learning fields during the past decade. This review aims to report the recent developments in …
learning fields during the past decade. This review aims to report the recent developments in …
Heterogeneous ad hoc networks: Architectures, advances and challenges
Abstract The Heterogeneous Ad Hoc Networks (HANETs) are important components of the
Internet of things, which become an inevitable trend in the future researches and …
Internet of things, which become an inevitable trend in the future researches and …
Privacy-preserving outsourced classification in cloud computing
Classifier has been widely applied in machine learning, such as pattern recognition, medical
diagnosis, credit scoring, banking and weather prediction. Because of the limited local …
diagnosis, credit scoring, banking and weather prediction. Because of the limited local …
An improved ant colony algorithm for robot path planning
J Liu, J Yang, H Liu, X Tian, M Gao - Soft computing, 2017 - Springer
To solve the problems of convergence speed in the ant colony algorithm, an improved ant
colony optimization algorithm is proposed for path planning of mobile robots in the …
colony optimization algorithm is proposed for path planning of mobile robots in the …
Firefly algorithm with neighborhood attraction
Firefly algorithm (FA) is a new optimization technique based on swarm intelligence. It
simulates the social behavior of fireflies. The search pattern of FA is determined by the …
simulates the social behavior of fireflies. The search pattern of FA is determined by the …
A novel collaborative optimization algorithm in solving complex optimization problems
W Deng, H Zhao, L Zou, G Li, X Yang, D Wu - Soft Computing, 2017 - Springer
To overcome the deficiencies of weak local search ability in genetic algorithms (GA) and
slow global convergence speed in ant colony optimization (ACO) algorithm in solving …
slow global convergence speed in ant colony optimization (ACO) algorithm in solving …
Distributed aggregate privacy-preserving authentication in VANETs
L Zhang, Q Wu, J Domingo-Ferrer… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Existing secure and privacy-preserving vehicular communication protocols in vehicular ad
hoc networks face the challenges of being fast and not depending on ideal tamper-proof …
hoc networks face the challenges of being fast and not depending on ideal tamper-proof …
Text classification method based on self-training and LDA topic models
M Pavlinek, V Podgorelec - Expert Systems with Applications, 2017 - Elsevier
Supervised text classification methods are efficient when they can learn with reasonably
sized labeled sets. On the other hand, when only a small set of labeled documents is …
sized labeled sets. On the other hand, when only a small set of labeled documents is …
Multi-layer cloud architectural model and ontology-based security service framework for IoT-based smart homes
Abstract The Smart Home concept, associated with the pervasiveness of network coverage
and embedded computing technologies is assuming an ever-growing significance for …
and embedded computing technologies is assuming an ever-growing significance for …
Intrusion detection of industrial internet-of-things based on reconstructed graph neural networks
Industrial Internet-of-Things (IIoT) are highly vulnerable to cyber-attacks due to their open
deployment in unattended environments. Intrusion detection is an efficient solution to …
deployment in unattended environments. Intrusion detection is an efficient solution to …