0020-0255

Information Sciences (ISCI) - Volume 527 论文列表

本期论文列表
Editorial Board

Skewed non-Gaussian GARCH models for cryptocurrencies volatility modelling

General interval-valued overlap functions and interval-valued overlap indices

Event-triggered control for stochastic networked control systems against Denial-of-Service attacks

Robust Manhattan non-negative matrix factorization for image recovery and representation

Efficient algorithms based on centrality measures for identification of top-K influential users in social networks

Privacy-Preserving distributed deep learning based on secret sharing

Fixed charge 4D-TP for a breakable item under hybrid random type-2 uncertain environments

An endorsement-based trust bootstrapping approach for newcomer cloud services

Pose-guided spatiotemporal alignment for video-based person Re-identification

Adaptive neural network control for time-varying state constrained nonlinear stochastic systems with input saturation

Privacy-enhanced remote data integrity checking with updatable timestamp

Improving artificial Bee colony algorithm using a new neighborhood selection mechanism

Cross-language question retrieval with multi-layer representation and layer-wise adversary

Quantum-inspired algorithm with fitness landscape approximation in reduced dimensional spaces for numerical function optimization

Hierarchical clustering supported by reciprocal nearest neighbors

Special Section on Privacy Computing: Principles and Applications

Privacy by Evidence: A Methodology to develop privacy-friendly software applications

Effective privacy preserving data publishing by vectorization

Cloud-based lightweight secure RFID mutual authentication protocol in IoT

Privacy-preserving computation in cyber-physical-social systems: A survey of the state-of-the-art and perspectives

An efficient approach for secure multi-party computation without authenticated channel

Incentive mechanism for cooperative authentication: An evolutionary game approach

A privacy-preserving RFID authentication protocol based on El-Gamal cryptosystem for secure TMIS

Building a dynamic searchable encrypted medical database for multi-client

A trajectory privacy-preserving scheme based on a dual-K mechanism for continuous location-based services

Efficient privacy preservation of big data for accurate data mining

Exploiting location-related behaviors without the GPS data on smartphones

APS: Attribute-aware privacy-preserving scheme in location-based services

Privacy-preserving task recommendation with win-win incentives for mobile crowdsourcing

A privacy-preserving cryptosystem for IoT E-healthcare

APCN: A scalable architecture for balancing accountability and privacy in large-scale content-based networks

PRTA: A Proxy Re-encryption based Trusted Authorization scheme for nodes on CloudIoT

Cloud-assisted privacy-conscious large-scale Markowitz portfolio

CAMPS: Efficient and privacy-preserving medical primary diagnosis over outsourced cloud

An insurance theory based optimal cyber-insurance contract against moral hazard

Blockchain-based system for secure outsourcing of bilinear pairings

Preserving adjustable path privacy for task acquisition in Mobile Crowdsensing Systems