Editorial Board
The transformation of the k-Shortest Steiner trees search problem into binary dynamic problem for effective evolutionary methods application
Group evolution patterns in running races
Distributed dynamic average consensus for nonlinear multi-agent systems in the presence of external disturbances over a directed graph
Personalized recommendation based on hierarchical interest overlapping community
Mining weighted frequent sequences in uncertain databases
A center-driven image set partition algorithm for efficient structure from motion
Revocable attribute-based encryption with decryption key exposure resistance and ciphertext delegation
Enabling Smart Data: Noise filtering in Big Data classification
SSIR: Secure similarity image retrieval in IoT
Heuristic target class selection for advancing performance of coverage-based rule learning
User activity measurement in rating-based online-to-offline (O2O) service recommendation
Data source selection for information integration in big data era
Forecasting with auxiliary information in forecasts using multivariate singular spectrum analysis
Learning peer recommendation using attention-driven CNN with interaction tripartite graph
Support driven wavelet frame-based image deblurring
Keyword guessing attacks on a public key encryption with keyword search scheme without random oracle and its improvement
Drawing on the iPad to input fuzzy sets with an application to linguistic data science
New results on dissipativity analysis of singular systems with time-varying delay
Handling uncertainty in citizen science data: Towards an improved amateur-based large-scale classification
Universal designated verifier signature scheme with non-delegatability in the standard model
Facial semantic descriptors based on information granules
Triangular bounded consistency of fuzzy preference relations
Verifiable outsourced computation over encrypted data
Predicting disease-genes based on network information loss and protein complexes in heterogeneous network
Robust deadlock control of automated manufacturing systems with multiple unreliable resources
Raspberry Pi assisted facial expression recognition framework for smart security in law-enforcement services
A novel CNN based security guaranteed image watermarking generation scenario for smart city applications
Using generative adversarial networks for improving classification effectiveness in credit card fraud detection
Modeling and clustering attacker activities in IoT through machine learning techniques
A hand-based biometric system in visible light for mobile environments
Protecting internet infrastructure against link flooding attacks: A techno-economic perspective
Game theoretic security of quantum bit commitment
Secure weighted possibilistic c-means algorithm on cloud for clustering big data
Novel dynamic multiple classification system for network traffic
Fuzzy integrated Bayesian Dempster–Shafer theory to defend cross-layer heterogeneity attacks in communication network of Smart Grid
Privacy-preserving smart IoT-based healthcare big data storage and self-adaptive access control system
Smart collaborative distribution for privacy enhancement in moving target defense
Data fusion technique in SPIDER Peer-to-Peer networks in smart cities for security enhancements
Efficient fingerprint matching on smart cards for high security and privacy in smart systems
Efficient attribute-based encryption with attribute revocation for assured data deletion
HybridORAM: Practical oblivious cloud storage with constant bandwidth
New publicly verifiable computation for batch matrix multiplication