| Visual interpretability for deep learning: a survey |
73 |
| From Eliza to XiaoIce: challenges and opportunities with social chatbots |
39 |
| Terahertz time-domain spectroscopy and micro-cavity components for probing samples: a review |
25 |
| Recent advances in efficient computation of deep convolutional neural networks |
18 |
| Differential coupling contributes to synchronization via a capacitor connection between chaotic circuits |
15 |
| Efficient construction of a substitution box based on a Mordell elliptic curve over a finite field |
9 |
| TODIM and TOPSIS with Z-numbers |
8 |
| Cyber security meets artificial intelligence: a survey |
8 |
| Correction of array failure using grey wolf optimizer hybridized with an interior point algorithm |
8 |
| Distribution system state estimation: an overview of recent developments |
8 |
| An embedded lightweight GUI component library and ergonomics optimization method for industry process monitoring |
7 |
| Past review, current progress, and challenges ahead on the cocktail party problem |
7 |
| Classification of EEG-based single-trial motor imagery tasks using a B-CSP method for BCI |
7 |
| Recognition of walking environments and gait period by surface electromyography |
7 |
| Dynamics of a neuron exposed to integer- and fractional-order discontinuous external magnetic flux |
6 |
| SIoTFog: Byzantine-resilient IoT fog networking |
6 |
| Displacement measuring grating interferometer: a review |
6 |
| Differential evolution based computation intelligence solver for elliptic partial differential equations |
6 |
| A network security entity recognition method based on feature template and CNN-BiLSTM-CRF |
5 |
| Embracing non-orthogonalmultiple access in future wireless networks |
5 |
| Scientific workflow execution system based on mimic defense in the cloud environment |
5 |
| Discovering optimal features using static analysis and a genetic search based method for Android malware detection |
5 |
| Bifurcation-based fractional-order (PID mu)-D-lambda controller design approach for nonlinear chaotic systems |
5 |
| Artificial muscles for wearable assistance and rehabilitation |
5 |
| A new auxiliary information based cumulative sum median control chart for location monitoring |
4 |
| Generative adversarial network based novelty detection usingminimized reconstruction error |
4 |
| On visual knowledge |
4 |
| Synergistic fibroblast optimization: a novel nature-inspired computing algorithm |
4 |
| Complete coverage path planning for an Arnold system based mobile robot to perform specific types of missions |
4 |
| Synchronization of two different chaotic systems using Legendre polynomials with applications in secure communications |
4 |
| Review of optical tweezers in vacuum |
4 |
| Graphene-based silicon modulators |
4 |
| Enhanced uplink non-orthogonal multiple access for 5G and beyond systems |
4 |
| Steering motion control of a snake robot via a biomimetic approach |
4 |
| De-scattering and edge-enhancement algorithms for underwater image restoration |
3 |
| Advances in deep ultraviolet laser based high-resolution photoemission spectroscopy |
3 |
| A-STC: auction-based spanning tree coverage algorithm formotion planning of cooperative robots |
3 |
| On robustness of an AMB suspended energy storage flywheel platform under characteristic model based all-coefficient adaptive control laws |
3 |
| Underwater acoustic communication and the general performance evaluation criteria |
3 |
| Future Internet: trends and challenges |
3 |
| MULKASE: a novel approach for key-aggregate searchable encryption formulti-owner data |
3 |
| Moving from exascale to zettascale computing: challenges and techniques |
3 |
| Periodically varied initial offset boosting behaviors in a memristive system with cosine memductance |
3 |
| Development of a novel autonomous lower extremity exoskeleton robot for walking assistance |
3 |
| Bio-inspired heuristics hybrid with interior-point method for active noise control systems without identification of secondary path |
3 |
| A knowledge push technology based on applicable probability matching and multidimensional context driving |
3 |
| Chaotic digital cryptosystem using serial peripheral interface protocol and its dsPIC implementation |
3 |
| Fraud detection within bankcard enrollment on mobile device based payment using machine learning |
3 |
| Systematic exploration of signal-based indicators for failure diagnosis in the context of cyber-physical systems |
3 |
| Aleakage-resilient certificateless public key encryption scheme with CCA2 security |
3 |