Digital Library
Vol. 15, No. 6, June 30, 2021
[Regular Papers]
Artificial Intelligence & Big Data
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Behavioral Analytics
- Big Data Mining
- Clustering Analysis
- CNN
- energy consumption
- Energy Prediction
- LSTM
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Apriori Algorithm
- Big-data analytics
- Degree of visibility
- Inductive reasoning
- Keyword emergence map
- Well-being
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
IoT & Application
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Information Systems
Farah Younas,
Jumana Nadir,
Muhammad Usman,
Muhammad Attique Khan,
Sajid Ali Khan,
Seifedine Kadry,
Yunyoung Nam
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Artificial intelligence
- word similarity; semantic nets; natural language processing; corpus; synonymy
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Product Adoption Maximization
- Social networking Service
- Influential users
- Users’ behaviors
- Social Influence Modeling
Multimedia & Computer Vision
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Generative Adversarial Network
- Cross Channel Self-Attention
- Image Translation
- Style Transfer
- Facial Attribute Editing
Networking
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Security & Privacy
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Industrial IoT
- TMN64
- TMN128
- Related-key Recovery Attack
- Controlled Substitution-Permutation Network (CSPN)
- Data-dependent Operations (DDOs)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Deep Learning
- False Data Injection Attack
- Internet of Things
- Machine Learning
- Multi-label classification
- Power System
- Smart Grid
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Wireless Communication
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Physical-layer security
- artificial noise
- imperfect CSI
- transmit power minimization
- secrecy rate maximization
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Ultra-dense D2D
- Frequency Selective Channel
- Channel Allocation
- interference constraint
- Partial CSI Exchange
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Archives