样式: 排序: IF: - GO 导出 标记为已读
-
Dynamic differential entropy and brain connectivity features based EEG emotion recognition Int. J. Intell. Syst. (IF 5.0) Pub Date : 2022-12-02 Fa Zheng, Bin Hu, Xiangwei Zheng, Cun Ji, Ji Bian, Xiaomei Yu
Emotion recognition has become a research focus in the brain–computer interface and cognitive neuroscience. Electroencephalogram (EEG) is employed for its advantages as accurate, objective, and noninvasive nature. However, many existing research only focus on extracting the time and frequency domain features of the EEG signals while failing to utilize the dynamic temporal changes and the positional
-
An efficient improved African vultures optimization algorithm with dimension learning hunting for traveling salesman and large-scale optimization applications Int. J. Intell. Syst. (IF 5.0) Pub Date : 2022-11-30 Narinder Singh, Essam H. Houssein, Seyedali Mirjalili, Yankai Cao, Ganeshsree Selvachandran
Exploring the finest shortest-path traveling salesman optimization application is a typical NP-hard problem. Similarly the solution of the large-scale optimization applications is also a big challenging issue in front of scientists. First, African Vultures Optimization Algorithm (AVOA) was developed to resolve continuous applications where it performed fine. In the last few months, many enhanced strategies
-
Secure storage scheme of trajectory data for digital tracking mechanism Int. J. Intell. Syst. (IF 5.0) Pub Date : 2022-11-27 Junhua Wu, Tiantian Wang, Guangshun Li, Kan Yu, Chuanwen Luo
The application of digital tracking mechanism introduces a series of leakage problems of users' personal sensitive information related to the trajectory. Therefore, we propose a secure storage scheme for trajectory data. Firstly, four-dimensional spatiotemporal clustering of the trajectory data is performed to reduce the spatiotemporal complexity of data storage. Secondly, the privacy level of the
-
Explainable machine learning in cybersecurity: A survey Int. J. Intell. Syst. (IF 5.0) Pub Date : 2022-11-03 Feixue Yan, Sheng Wen, Surya Nepal, Cecile Paris, Yang Xiang
Machine learning (ML) techniques are increasingly important in cybersecurity, as they can quickly analyse and identify different types of threats from millions of events. In spite of the increasing number of possible applications of ML, successful adoption of ML models in cybersecurity still highly relies on the explainability of those models that are used for making predictions. Explanations that
-
Robust watermarking based on blur-guided JND model for macrophotography images Int. J. Intell. Syst. (IF 5.0) Pub Date : 2022-10-29 Wenbo Wan, Wenqian Shan, Wenxiu Liu, Hao Wang, Zihan Diao, Jiande Sun
Macrophotography Images (MPIs) have recently emerged as an active topic due to the development of mobile phone camera technology. A large number of MPIs have been rapidly increasing in many rich visual services, such as smartphones or high-definition monitors. MPIs are often composed of sharp macroimage and blur background, which exhibit different perceptual properties that often lead to different
-
An efficient blockchain-based privacy-preserving scheme with attribute and homomorphic encryption Int. J. Intell. Syst. (IF 5.0) Pub Date : 2022-10-29 Guangxia Xu, Jiajun Zhang, Uchani Gutierrez Omar Cliff, Chuang Ma
As a distributed ledger technology, blockchain has excellent openness and transparency, which can provide data security management services for distributed intelligent systems and establish effective security guarantee mechanisms. However, precisely due to the open nature of blockchain, malicious users can trace the real transaction transfer path with high probability and even obtain the real identity
-
A novel multicriteria decision-making approach based on Pythagorean fuzzy sets and graph theory Int. J. Intell. Syst. (IF 5.0) Pub Date : 2022-10-27 Zhenhua Meng, Rongheng Lin, Budan Wu
Given the problem that the relations among alternatives or criteria cannot be handled well in multicriteria decision making, this paper applies the concept of Pythagorean fuzzy sets to the graph and develops a decision-making approach based on Pythagorean fuzzy graphs (PFGs). First, the weights obtained from the Laplacian energy of PFGs are taken as the subjective weights of criteria. Then, a new Pythagorean
-
CNN- and GAN-based classification of malicious code families: A code visualization approach Int. J. Intell. Syst. (IF 5.0) Pub Date : 2022-10-25 Ziyue Wang, Weizheng Wang, Yaoqi Yang, Zhaoyang Han, Dequan Xu, Chunhua Su
Malicious code attacks have severely hindered the current development of the Internet technologies. Once the devices are infected with virus, the damages to companies and users are unpredictable. Although researchers have developed malware detection methods, the analysis result still cannot achieve the desired accuracy due to complicated malicious code families and fast-growing variants. In this paper
-
Machine learning algorithms for smart and intelligent healthcare system in Society 5.0 Int. J. Intell. Syst. (IF 5.0) Pub Date : 2022-10-17 Ikhlas Fuad Zamzami, Kuldeep Pathoee, Brij B. Gupta, Anupama Mishra, Deepesh Rawat, Wadee Alhalabi
The pandemic has shown us that it is quite important to keep track record our health digitally. And at the same time, it also showed us the great potential of Instruments like wearable observing gadgets, video conferences, and even talk bots driven by artificial intelligence (AI) can provide good care from remotely. Real time data collected from different health care devices of cases across globe played
-
An adaptive multiobjective evolutionary algorithm for dynamic multiobjective flexible scheduling problem Int. J. Intell. Syst. (IF 5.0) Pub Date : 2022-10-14 Weiwei Yu, Li Zhang, Ning Ge
There are various uncertain disturbances in the actual manufacturing environment, which makes dynamic multiobjective flexible scheduling problem of flexible job shop (MDFJSP) become the research focus in the field of optimal scheduling. In this paper, MDFJSP in the environment of temporary order insertion uncertainty is studied, and a multiobjective dynamic scheduling scheme based on rescheduling index
-
Front Cover: International Journal of Intelligent Systems, Volume 37 Issue 11 November 2022 Int. J. Intell. Syst. (IF 5.0) Pub Date : 2022-09-26 Xianjia Meng, Yong Yang, Ximeng Liu, Nan Jiang
-
Stance detection for online public opinion awareness: An overview Int. J. Intell. Syst. (IF 5.0) Pub Date : 2022-09-25 Rong Cao, Xiangyang Luo, Yaoyi Xi, Yaqiong Qiao
Stance detection, which focuses on users' deep attitudes, is an important way to understand the online public opinion. This paper presents an overview of stance detection. First, we present a general framework for stance detection, and the main steps of the framework are introduced in detail. The state-of-the-art stance detection methods are categorized into three classes: feature-based methods, deep
-
Multiscale voting mechanism for rice leaf disease recognition under natural field conditions Int. J. Intell. Syst. (IF 5.0) Pub Date : 2022-09-22 Yu Tang, Jinfei Zhao, Huasheng Huang, Jiajun Zhuang, Zhiping Tan, Chaojun Hou, Weizhao Chen, Jinchang Ren
Rice leaf disease (RLD) is one of the major factors that cause the decline in production, and the automatic recognition of such diseases under natural field conditions is of great significance for timely targeted rice management. Although many machine learning approaches have been proposed for RLD recognition, scale variation is still a challenging problem that affects prediction accuracy, especially
-
Interpolation graph convolutional network for 3D point cloud analysis Int. J. Intell. Syst. (IF 5.0) Pub Date : 2022-09-22 Yao Liu, Lina Yao, Binghao Li, Claude Sammut, Xiaojun Chang
The feature analysis of point clouds, a popular representation of three-dimensional (3D) objects, is rising as a hot research topic nowadays. Point cloud data bear a sparse and unordered nature, making many commonly used feature extraction methods, for example, Convolutional Neural Networks (CNNs) inapplicable, while previous models suitable for the task are usually complex. We aim to reduce model
-
Two-dimensional virtual try-on algorithm and application research for personalized dressing Int. J. Intell. Syst. (IF 5.0) Pub Date : 2022-09-22 Feng Chen, Zhiheng Chen, Yuxiao Du, Zhuocheng Wu, Yuxing Li, Qi Hu
To reduce the cost of virtual try-on, a method of image deformation by body part size is proposed for the traditional two-dimensional virtual try-on method, which is challenging to represent the personalized characteristics of the body size of the fitting subject. On the basis of the input information of the user's body size, the method can generate a fitting effect that shows the user's characteristics
-
Semantic-enhanced multimodal fusion network for fake news detection Int. J. Intell. Syst. (IF 5.0) Pub Date : 2022-09-22 Shuo Li, Tao Yao, Saifei Li, Lianshan Yan
The increasing popularity of social media facilitates the propagation of fake news, posing a major threat to the government and journalism, and thereby making how to detect fake news from social media an urgent requirement. In general, multimodal-based methods can achieve better performance because of the complementation among different modalities. However, the majority of them simply concatenate features
-
Verifiable dynamic search over encrypted data in cloud-assisted intelligent systems Int. J. Intell. Syst. (IF 5.0) Pub Date : 2022-09-21 Yunling Wang, Pei Wei, Meixia Miao, Xuefeng Zhang
The cloud-assisted intelligent systems have attracted extensive attention due to their powerful data analysis and computation capabilities. However, how to handle encrypted data remains a challenging problem in intelligent systems. A promising solution is searchable symmetric encryption (SSE), which enables a client to privately outsource their data to the cloud while preserving keyword search functionality
-
Research on filtering and measurement algorithms based on human point cloud data Int. J. Intell. Syst. (IF 5.0) Pub Date : 2022-09-21 Yuxiao Du, Yuxing Li, Zhuocheng Wu, Feng Chen, Zhiheng Chen, Yinglin Li
To obtain the data of noncontact measurement of the human body, the depth camera is used to collect the human body, and the obtained initial data are transformed into the required point cloud data for processing through coordinate transformation, and then the collected three-dimensional point cloud data are preprocessed. The preprocessing includes point cloud downsampling, point cloud filtering, plane
-
Textual adversarial attacks by exchanging text-self words Int. J. Intell. Syst. (IF 5.0) Pub Date : 2022-09-21 Huijun Liu, Jie Yu, Jun Ma, Shasha Li, Bin Ji, Zibo Yi, Miaomiao Li, Long Peng, Xiaodong Liu
Adversarial attacks expose the vulnerability of deep neural networks. Compared to image adversarial attacks, textual adversarial attacks are more challenging due to the discrete nature of texts. Recent synonym-based methods achieve the current state-of-the-art results. However, these methods introduce new words against the original text, leading to that humans easily perceive the difference between
-
MiniYOLO: A lightweight object detection algorithm that realizes the trade-off between model size and detection accuracy Int. J. Intell. Syst. (IF 5.0) Pub Date : 2022-09-20 Yi Liu, Changsheng Zhang, Wenjing Wu, Bin Zhang, Fucai Zhou
The object detection task is to locate and classify objects in an image. The current state-of-the-art high-accuracy object detection algorithms rely on complex networks and high computational cost. These algorithms have high requirements on the memory resource and computing capability of the deployed device, and are difficult to apply to mobile and embedded devices. Through the depthwise separable
-
Adaptive synchronous strategy for distributed machine learning Int. J. Intell. Syst. (IF 5.0) Pub Date : 2022-09-20 Miaoquan Tan, Wai-Xi Liu, Junming Luo, Haosen Chen, Zhen-Zheng Guo
In distributed machine learning training, bulk synchronous parallel (BSP) and asynchronous parallel (ASP) are two main synchronization methods to help achieve gradient aggregation. However, BSP needs longer training time due to “stragglers” problem, while ASP sacrifices the accuracy due to “gradient staleness” problem. In this article, we propose a distributed training paradigm on parameter server
-
Ex2: Monte Carlo Tree Search-based test inputs prioritization for fuzzing deep neural networks Int. J. Intell. Syst. (IF 5.0) Pub Date : 2022-09-20 Aoshuang Ye, Lina Wang, Lei Zhao, Jianpeng Ke
Fuzzing is considered to be an essential approach to guarantee the reliability of deep neural networks (DNNs) based systems. The DNN fuzzing leverages various inputs prioritization methods to guide the testing process. The current research mainly focus on constructing testing metrics that symbolize the logical representation of the DNN to guide the generation of test cases, which neglects the potential
-
Privacy protection in social applications: A ciphertext policy attribute-based encryption with keyword search Int. J. Intell. Syst. (IF 5.0) Pub Date : 2022-09-20 Junbin Shi, Qiming Yu, Yong Yu, Lianhai Wang, Wenzheng Zhang
In a highly evolved big data era, intelligent data analysis can improve social operation efficiency and save resources. However, it also brings masses of conflicts, such as malicious mining and abuse of personal privacy information. This paper introduces a privacy protection scheme for social applications. In this scheme, attribute based searchable encryption is used to defend the security of confidential
-
Contrastive hashing with vision transformer for image retrieval Int. J. Intell. Syst. (IF 5.0) Pub Date : 2022-09-19 Xiuxiu Ren, Xiangwei Zheng, Huiyu Zhou, Weilong Liu, Xiao Dong
Hashing techniques have attracted considerable attention owing to their advantages of efficient computation and economical storage. However, it is still a challenging problem to generate more compact binary codes for promising performance. In this paper, we propose a novel contrastive vision transformer hashing method, which seamlessly integrates contrastive learning and vision transformers (ViTs)
-
A simple noniterative method to accurately calculate the centroid of an interval type-2 fuzzy set Int. J. Intell. Syst. (IF 5.0) Pub Date : 2022-09-16 Hosein Arman
An interval type-2 fuzzy set (IT2FS) contains the infinite number of embedded membership functions (MFs) defined as type-1 fuzzy sets. The center of gravity (COG) of an IT2FS is obtained by integrating the centroids of all these MFs. However, obtaining the COG of an IT2FS in a continuous domain is impossible because the number of embedded MFs is infinite and, in a discrete domain, comes with exponential
-
Towards blind detection of steganography in low-bit-rate speech streams Int. J. Intell. Syst. (IF 5.0) Pub Date : 2022-09-16 Congcong Sun, Hui Tian, Wojciech Mazurczyk, Chin-Chen Chang, Yiqiao Cai, Yonghong Chen
To prevent the abuse of low-rate speech-based steganography from threatening cyberspace security, the corresponding steganalysis approaches have been developed and received significant attention from research community. However, most existing steganalysis methods assume that steganography methods are known in advance, which in practice is impractical. That is why, in this paper, we present three blind
-
Localization of epileptogenic foci by automatic detection of high-frequency oscillations based on waveform feature templates Int. J. Intell. Syst. (IF 5.0) Pub Date : 2022-09-16 Xiaoying Wang, Li Xianghuan, Zhuang-Gui Chen, Yu Ling, Pingping Zhang, Zhenye Lu, Yating Li, Jia Zhu, Yuxiao Du, Qintai Yang
Epilepsy is one of the most common neurological disorders, and there exists a subset of patients with refractory epilepsy that require surgical removal of the epileptogenic foci (EF) area. Studies have shown that high-frequency oscillations (HFOs) in epileptic electroencephalogram signals can be used as an essential biomarker for locating EF. This paper proposes a new method for rapid localization
-
Clustering of differentials in CRAFT with correlation matrices Int. J. Intell. Syst. (IF 5.0) Pub Date : 2022-09-16 Huimin Liu, Wenying Zhang, Jinjiao Zhang, Xiaomeng Sun
CRAFT is an substitution-permutation network tweakable block cipher proposed at fast software encryption 2019 by Beierle et al., which is designed to optimize the efficient protection against differential fault analysis (DFA) attacks. In this paper, the full round differential characteristics for CRAFT block cipher are given. A new method on counting the number of differentials by using correlation
-
Prescribed performance dynamic surface fuzzy control for strict-feedback nonlinear system with actuator fault Int. J. Intell. Syst. (IF 5.0) Pub Date : 2022-09-16 Zidong Sun, Li Liang, Wei Gao
In this paper, an adaptive fuzzy control scheme for strict-feedback nonlinear system with finite-time prescribed performance and actuator fault is studied. First, we consider a prescribed performance function that enables the tracking error to converge within a preset interval in a finite time. Subsequently, the fuzzy logic system and dynamic surface control technology are embedded in the backstepping
-
An integrated container terminal scheduling problem with different-berth sizes via multiobjective hydrologic cycle optimization Int. J. Intell. Syst. (IF 5.0) Pub Date : 2022-09-16 Huifen Zhong, Zhaotong Lian, Bowen Xue, Ben Niu, Rong Qu, Tianwei Zhou
Integrated berth and quay crane allocation problem (BQCAP) are two essential seaside operational problems in container terminal scheduling. Most existing works consider only one objective on operation and partition of quay into berths of the same lengths. In this study, BQCAP is modeled in a multiobjective setting that aims to minimize total equipment used and overall operational time and the quay
-
Diversifying agent's behaviors in interactive decision models Int. J. Intell. Syst. (IF 5.0) Pub Date : 2022-09-15 Yinghui Pan, Hanyi Zhang, Yifeng Zeng, Biyang Ma, Jing Tang, Zhong Ming
Modeling other agents' behaviors plays an important role in decision models for interactions among multiple agents. To optimize its own decisions, a subject agent needs to model what other agents act simultaneously in an uncertain environment. However, modeling insufficiency occurs when the agents are competitive and the subject agent cannot get full knowledge about other agents. Even when the agents
-
Identifying patients with Crohn's disease at high risk of primary nonresponse to infliximab using a radiomic-clinical model Int. J. Intell. Syst. (IF 5.0) Pub Date : 2022-09-14 Xuehua Li, Yingkui Zhong, Chenglang Yuan, Jinjiang Lin, Xiaodi Shen, Minyi Guo, Baolan Lu, Jixin Meng, Yangdi Wang, Naiwen Zhang, Zixin Luo, Guimeng Hu, Ren Mao, Minhu Chen, Canhui Sun, Ziping Li, Qing-hua Cao, Baili Chen, Zhihui Chen, Bingsheng Huang, Shi-Ting Feng
Approximately 13%–40% of patients with Crohn's disease (CD) show a primary loss of response to infliximab (IFX) therapy. Therefore, differentiating potential responders from primary nonresponders is clinically important. In this double-center study, we developed and validated a computed tomography enterography (CTE)-based radiomic signature (RS) for identification of CD patients at high risk of primary
-
PVT: Point-voxel transformer for point cloud learning Int. J. Intell. Syst. (IF 5.0) Pub Date : 2022-09-14 Cheng Zhang, Haocheng Wan, Xinyi Shen, Zizhao Wu
The recently developed pure transformer architectures have attained promising accuracy on point cloud learning benchmarks compared to convolutional neural networks. However, existing point cloud Transformers are computationally expensive because they waste a significant amount of time on structuring irregular data. To solve this shortcoming, we present the Sparse Window Attention module to gather coarse-grained
-
IoT botnet detection with feature reconstruction and interval optimization Int. J. Intell. Syst. (IF 5.0) Pub Date : 2022-09-14 Hongyu Yang, Zelin Wang, Liang Zhang, Xiang Cheng
The existing botnet detection methods have the problems of uneven sampling, poor feature selection, and weak generalization ability, resulting in low detection and classification results and poor adaptability to the internet of things (IoT) environment with limited computing and storage resources. This paper proposes an IoT botnet detection method using feature reconstruction and interval optimization
-
Complex interval number-based uncertainty modeling method with its application in decision fusion Int. J. Intell. Syst. (IF 5.0) Pub Date : 2022-09-11 Lingtao Zheng, Fuyuan Xiao
Complex evidence theory, a generalization of Dempster–Shafer evidence theory, is an effective uncertainty reasoning for decision fusion in complex-valued domain. In particular, the generation of complex basic belief assignment (CBBA) is a key issue for uncertainty modeling in complex evidence theory. In this paper, we first construct complex interval number (CIN) model. In this context, we propose
-
SDNMF: Semisupervised discriminative nonnegative matrix factorization for feature learning Int. J. Intell. Syst. (IF 5.0) Pub Date : 2022-09-10 Yugen Yi, Shumin Lai, Wenle Wang, Shicheng Li, Renbo Zhang, Yong Luo, Wei Zhou, Jianzhong Wang
As one of the most effective feature learning methods, Nonnegative Matrix Factorization (NMF) has been widely used in many scientific fields, such as computer vision, data mining, and bioinformatics. However, NMF is an unsupervised method that cannot fully utilize the label information of data. Thus, its performance is limited in some recognition and classification problems. To remedy this shortcoming
-
Research on intelligent slice planning method for free-form surfaces of shaped workpieces Int. J. Intell. Syst. (IF 5.0) Pub Date : 2022-09-09 Yuxiao Du, Yihang Chen, Shuting Cai, Kongyang Chen, Xianghuan Li
A surface slicing planning method based on the K-means clustering algorithm and improved fruit fly optimization algorithm (FOA) is proposed to address the efficiency problem in the surface processing of special shaped workpieces. The NURBS surface reconstruction is performed on the complex surface of the selected workpiece, and the K-means clustering algorithm with the curvature-distance factor is
-
One-stage self-distillation guided knowledge transfer for long-tailed visual recognition Int. J. Intell. Syst. (IF 5.0) Pub Date : 2022-09-09 Yuelong Xia, Shu Zhang, Jun Wang, Wei Zou, Juxiang Zhou, Bin Wen
Deep learning has achieved remarkable progress for visual recognition on balanced data sets but still performs poorly on real-world long-tailed data distribution. The existing methods mainly decouple the problem into the two-stage decoupling training, that is, representation learning and classifier training, or multistage training based on knowledge distillation, thus resulting in huge training steps
-
Matching method based on similarity of working trajectories Int. J. Intell. Syst. (IF 5.0) Pub Date : 2022-09-09 Yuxiao Du, Yueqiang Zhong, Feng Chen, Qihua Huang, Qi Hu
To identify whether the actual work trajectory of workers in the factory meets the predetermined work trajectory requirements, we proposed an efficient and accurate work trajectory similarity matching method. We comprehensively considered the similarity between the actual work track and the predetermined track from the two characteristics of track angle and track distance. Among them, the similarity
-
An efficient hardware supported and parallelization architecture for intelligent systems to overcome speculative overheads Int. J. Intell. Syst. (IF 5.0) Pub Date : 2022-09-08 Sudhakar Kumar, Sunil K. Singh, Naveen Aggarwal, Brij B. Gupta, Wadee Alhalabi, Shahab S. Band
In the last few decades, technology advancements have paved the way for the creation of intelligent and autonomous systems that utilize complex calculations which are both time-consuming and central processing unit intensive. As a consequence, parallel processing systems are gaining popularity to enhance overall computer performance. Programmers should be able to efficiently utilize available hardware
-
Towards explainable model extraction attacks Int. J. Intell. Syst. (IF 5.0) Pub Date : 2022-09-08 Anli Yan, Ruitao Hou, Xiaozhang Liu, Hongyang Yan, Teng Huang, Xianmin Wang
One key factor able to boost the applications of artificial intelligence (AI) in security-sensitive domains is to leverage them responsibly, which is engaged in providing explanations for AI. To date, a plethora of explainable artificial intelligence (XAI) has been proposed to help users interpret model decisions. However, given its data-driven nature, the explanation itself is potentially susceptible
-
Outsourcing multiauthority access control revocation and computations over medical data to mobile cloud Int. J. Intell. Syst. (IF 5.0) Pub Date : 2022-09-07 Arthur S. Voundi Koe, Qi Chen, Juan Tang, Shan Ai, Hongyang Yan, Shiwen Zhang, Duncan S. Wong
With recent advances in cloud computing, mobile devices are increasingly being used to record patient physiological parameters, and transfer them to a cloud-based hospital information system, for access control mediation over a variety of stakeholders. In such a cloud-based architecture, the patient must specify an access policy for a group of authorized parties towards its outsourced data. Multiauthority
-
A content and URL analysis-based efficient approach to detect smishing SMS in intelligent systems Int. J. Intell. Syst. (IF 5.0) Pub Date : 2022-09-06 Ankit K. Jain, Brij B. Gupta, Kamaljeet Kaur, Piyush Bhutani, Wadee Alhalabi, Ammar Almomani
Smishing is a combined form of short message service (SMS) and phishing in which a malicious text message or SMS is sent to mobile users. This form of attack has come to be a severe cyber-security difficulty and has triggered incredible monetary losses to the victims. Many antismishing solutions for mobile devices have been proposed till date but still, there is a lack of a full-fledged solution. Therefore
-
An intelligent fuzzy robustness ZNN model with fixed-time convergence for time-variant Stein matrix equation Int. J. Intell. Syst. (IF 5.0) Pub Date : 2022-09-05 Jianhua Dai, Liu Luo, Lin Xiao, Lei Jia, Xiaopeng Li
On account of the rapid progress of zeroing neural network (ZNN) and the extensive use of fuzzy logic system (FLS), this article proposes an intelligent fuzzy robustness ZNN (IFR-ZNN) model and applies it to solving the time-variant Stein matrix equation (TVSME) problem. Be different from ZNN models before, the IFR-ZNN model uses a fuzzy parameter as the design parameter and adopts a first proposed
-
Towards robust and stealthy communication for wireless intelligent terminals Int. J. Intell. Syst. (IF 5.0) Pub Date : 2022-09-05 Chen Liang, Kefan Qiu, Zheng Zhang, Jie Yang, Yuanzhang Li, Jingjing Hu
Fifth-generation (5G) wireless systems provide an opportunity for improving the existing Voice over Internet Protocol communication service's user experience. To mitigate the security risk of 5G data leakage, building covert channel is an alternative approach of providing confidential data transmission. Due to the high transmission rate of 5G, the interpacket intervals become small and derandomized
-
Foreground–background decoupling matting Int. J. Intell. Syst. (IF 5.0) Pub Date : 2022-09-05 Jiawei Wu, Guolin Zheng, Kun Zeng, Haoyi Fan, Zuoyong Li
Image matting aims to extract specific objects, deployed in many applications. Generally, the automatic matting methods need an extra before overcome the intricate details and the diverse appearances. Recently, the matting community has paid more attentions to the investigation of trimap-free matting direction to address the dependency of priors. Most trimap-free approaches divide the matting task
-
Discrete similarity measures on Pythagorean fuzzy sets and its applications to medical diagnosis and clustering problems Int. J. Intell. Syst. (IF 5.0) Pub Date : 2022-09-05 Brindaban Gohain, Rituparna Chutia, Palash Dutta
Pythagorean fuzzy sets are an extension of intuitionistic fuzzy sets and are more efficient from an application perspective. Though the Pythagorean fuzzy sets are more informative, not much work on similarity measures is available in the literature. Furthermore, existing similarity measures are not efficient. Also, the containment property in Pythagorean fuzzy units is not correctly defined or ineffective
-
What happens next? Combining enhanced multilevel script learning and dual fusion strategies for script event prediction Int. J. Intell. Syst. (IF 5.0) Pub Date : 2022-09-03 Pengpeng Zhou, Bin Wu, Caiyong Wang, Hao Peng, Juwei Yue, Song Xiao
Script event prediction (SEP), aiming at predicting next event from context event sequences (i.e., scripts), has played an important role in many real-world applications such as government decision-making. While most of the existing research only depend on the top-level event prediction, they ignore the influence of other bottom levels or other relationship modeling manners. In this paper, we focus
-
Single image deraining using multi-stage and multi-scale joint channel coordinate attention fusion network Int. J. Intell. Syst. (IF 5.0) Pub Date : 2022-09-03 Yitong Yang, Yongjun Zhang, Zhongwei Cui, Zhi Li, Yujie Xu, Haoliang Zhao, Yangtin Ou, Heliang Yang, Xihe Wang
Rain streaks can seriously degrade the visual quality of an image and are detrimental to subsequent algorithms such as object detection and semantic segmentation. Therefore, removing rain streaks is a very important task. The deraining task has two main limitations: the first is to encode information about rain streaks in different densities and directions, the second is to keep the background details
-
General parameter control framework for evolutionary computation Int. J. Intell. Syst. (IF 5.0) Pub Date : 2022-09-02 Qianying Liu, Haiyun Qiu, Ben Niu, Hong Wang
This study proposes a general multiple parameter control framework by leveraging the ability of a reinforcement learning system to learn empirical knowledge for evolutionary computation. We design a feedback evaluation mechanism to define the rewards offered to agents, using which they can learn to choose appropriate parameters in formulated action sets. Moreover, a learning strategy is proposed to
-
A comprehensive survey on DDoS attacks on various intelligent systems and it's defense techniques Int. J. Intell. Syst. (IF 5.0) Pub Date : 2022-09-02 Akshat Gaurav, Brij B. Gupta, Wadee Alhalabi, Anna Visvizi, Yousef Asiri
The purpose of this study is to provide an overview of distributed denial of service (DDoS) attack detection in intelligent systems. In recent times, due to the endemic COVID-19, the use of intelligent systems has increased. However, these systems are easily affected by DDoS attacks. A DDoS attack is a reliable tool for cyber-attackers because there is no efficient method which can detect or filter
-
Diagnosis of Parkinson's disease based on feature fusion on T2 MRI images Int. J. Intell. Syst. (IF 5.0) Pub Date : 2022-09-02 Xinchun Cui, Yubang Xu, Yue Lou, Qinghua Sheng, Miao Cai, Liying Zhuang, Gang Sheng, Jiahu Yang, Jinxing Liu, Yue Feng, Xiaoli Liu
Deep-learning methods (especially convolutional neural networks) using magnetic resonance imaging (MRI) data have been successfully applied to computer-aided diagnosis of Parkinson's Disease (PD). Early detection and prior care may help patients improve their quality of life, although this neurodegenerative disease has no known cure. In this study, we propose a FResnet18 model to classify MRI images
-
A hybrid adaptive approach for instance transfer learning with dynamic and imbalanced data Int. J. Intell. Syst. (IF 5.0) Pub Date : 2022-09-02 Xiangzhou Zhang, Kang Liu, Borong Yuan, Hongnian Wang, Shaoyong Chen, Yunfei Xue, Weiqi Chen, Mei Liu, Yong Hu
Machine learning has demonstrated success in clinical risk prediction modeling with complex electronic health record (EHR) data. However, the evolving nature of clinical practices can dynamically change the underlying data distribution over time, leading to model performance drift. Adopting an outdated model is potentially risky and may result in unintentional losses. In this paper, we propose a novel
-
Federated learning with stochastic quantization Int. J. Intell. Syst. (IF 5.0) Pub Date : 2022-09-02 Yawen Li, Wenling Li, Zhe Xue
This paper studies the distributed federated learning problem when the exchanged information between the server and the workers is quantized. A novel quantized federated averaging algorithm is developed by applying stochastic quantization scheme to the local and global model parameters. Specifically, the server broadcasts the quantized global model parameter to the workers; the workers update local
-
Self-supervised domain adaptation for cross-domain fault diagnosis Int. J. Intell. Syst. (IF 5.0) Pub Date : 2022-09-02 Weikai Lu, Haoyi Fan, Kun Zeng, Zuoyong Li, Jian Chen
Unsupervised domain adaptation-based fault diagnosis methods have been extensively studied due to their powerful knowledge transferability under different working conditions. Despite their encouraging performance, most of them cannot sufficiently account for the temporal dimension of the vibration signal, resulting in incomplete feature information used in the domain alignment procedure. To alleviate
-
Ensemble feature selection for multi-label text classification: An intelligent order statistics approach Int. J. Intell. Syst. (IF 5.0) Pub Date : 2022-09-02 Mohsen Miri, Mohammad Bagher Dowlatshahi, Amin Hashemi, Marjan Kuchaki Rafsanjani, Brij B. Gupta, W. Alhalabi
Because of the overgrowth of data, especially in text format, the value and importance of multi-label text classification have increased. Aside from this, preprocessing and particularly intelligent feature selection (FS) are the most important step in classification. Each FS finds the best features based on its approach, but we try to use a multi-strategy approach to find more useful features. Evaluating
-
Verifiable data streaming protocol supporting update history queries Int. J. Intell. Syst. (IF 5.0) Pub Date : 2022-09-02 Meixia Miao, Jiawei Li, Yunling Wang, Jianghong Wei, Xinghua Li
With the widespread development of intelligent systems, a considerable number of mobile devices are connected together, and continuously generate huge amounts of data. Although cloud storage provides perfect solution for effectively storing these massive data, how to ensure the integrity of the outsourced data becomes challenging. For this reason, the primitive of verifiable data streaming (VDS) protocol
-
Privacy-enhancing machine learning framework with private aggregation of teacher ensembles Int. J. Intell. Syst. (IF 5.0) Pub Date : 2022-09-02 Shengnan Zhao, Qi Zhao, Chuan Zhao, Han Jiang, Qiuliang Xu
Private aggregation of teacher ensembles (PATE), a general machine learning framework based on knowledge distillation, can provide a privacy guarantee for training data sets. However, this framework poses a number of security risks. First, PATE mainly focuses on the privacy of teachers' training data and fails to protect the privacy of their students' data. Second, PATE relies heavily on a trusted
-
Performance of exponential similarity measures in supply of commodities in containment zones during COVID-19 pandemic under Pythagorean fuzzy sets Int. J. Intell. Syst. (IF 5.0) Pub Date : 2022-09-02 Hari Darshan Arora, Anjali Naithani
Following the breakout of the novel coronavirus disease 2019 (COVID-19), the government of India was forced to prohibit all forms of human movement. It became important to establish and maintain a supply of commodities in hotspots and containment zones in different parts of the country. This study critically proposes new exponential similarity measures to understand the requirement and distribution
-
CCUBI: A cross-chain based premium competition scheme with privacy preservation for usage-based insurance Int. J. Intell. Syst. (IF 5.0) Pub Date : 2022-09-02 Longyang Yi, Yangyang Sun, Bin Wang, Li Duan, Hongliang Ma, Bin Wang, Zhen Han, Wei Wang
Usage-based insurance (UBI) provides reasonable vehicle insurance premiums based on vehicle usage and driving behavior. In general, there are three major issues in realizing intelligent UBI systems. First, UBI evaluation mechanisms are not auditable to drivers. Insurers may thus deliberately adjust the UBI premiums. Second, the process of collecting driving data by insurers may lead to serious privacy