{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,29]],"date-time":"2024-06-29T00:14:42Z","timestamp":1719620082511},"reference-count":73,"publisher":"Springer Science and Business Media LLC","issue":"S1","license":[{"start":{"date-parts":[[2024,5,13]],"date-time":"2024-05-13T00:00:00Z","timestamp":1715558400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,5,13]],"date-time":"2024-05-13T00:00:00Z","timestamp":1715558400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SIViP"],"published-print":{"date-parts":[[2024,8]]},"DOI":"10.1007\/s11760-024-03203-3","type":"journal-article","created":{"date-parts":[[2024,5,13]],"date-time":"2024-05-13T18:01:55Z","timestamp":1715623315000},"page":"919-933","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Detecting the penetration of malicious behavior in big data using hybrid algorithms"],"prefix":"10.1007","volume":"18","author":[{"given":"Yue","family":"Wang","sequence":"first","affiliation":[]},{"given":"Yan","family":"Shi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,5,13]]},"reference":[{"issue":"8","key":"3203_CR1","doi-asserted-by":"publisher","first-page":"1979","DOI":"10.1109\/TPAMI.2018.2858821","volume":"41","author":"T Miyato","year":"2018","unstructured":"Miyato, T., Maeda, S.I., Ishii, S., Koyama, M.: Virtual adversarial training: a regularization method for supervised and semi-supervised learning. IEEE Trans. Pattern Anal. Mach. Intell. 41(8), 1979\u20131993 (2018)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"3203_CR2","unstructured":"Dara, R.A., Khan, T., Azim, J., Cicchello, O., Cort, G.: A semi-supervised approach to customer relationship management. In\u00a0Artificial Intelligence and Soft Computing, pp. 58\u201364, (2016)"},{"issue":"2","key":"3203_CR3","first-page":"112","volume":"5","author":"A Dutt","year":"2015","unstructured":"Dutt, A., Aghabozrgi, S., Ismail, M.A.B., Mahroeian, H.: Clustering algorithms applied in educational data mining. Int. J. Inf. Electron. Eng. 5(2), 112 (2015)","journal-title":"Int. J. Inf. Electron. Eng."},{"key":"3203_CR4","doi-asserted-by":"publisher","first-page":"728","DOI":"10.1016\/j.neucom.2020.06.142","volume":"452","author":"C Guo","year":"2021","unstructured":"Guo, C., Tang, H., Niu, B., Lee, C.B.P.: A survey of bacterial foraging optimization. Neurocomputing 452, 728\u2013746 (2021)","journal-title":"Neurocomputing"},{"key":"3203_CR5","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2019.105884","volume":"86","author":"H Chen","year":"2020","unstructured":"Chen, H., Zhang, Q., Luo, J., Xu, Y., Zhang, X.: An enhanced bacterial foraging optimization and its application for training kernel extreme learning machine. Appl. Soft Comput. 86, 105884 (2020)","journal-title":"Appl. Soft Comput."},{"key":"3203_CR6","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1016\/B978-0-12-815739-8.00006-7","volume-title":"Machine learning","author":"DA Pisner","year":"2020","unstructured":"Pisner, D.A., Schnyer, D.M.: Support vector machine. In: Machine learning, pp. 101\u2013121. Elsevier (2020). https:\/\/doi.org\/10.1016\/B978-0-12-815739-8.00006-7"},{"key":"3203_CR7","volume-title":"Learning with support vector machines","author":"C Campbell","year":"2022","unstructured":"Campbell, C., Ying, Y.: Learning with support vector machines. Springer Nature, UK (2022)"},{"key":"3203_CR8","unstructured":"Afzali, N., Azmi, R., Pishgoo, B.: A new clonal selection algorithm based on radius regularization of anomaly detectors. Accepted in the 16th CSI international symposium on Artificial intelligence and signal processing. AISP; (2012)"},{"issue":"2","key":"3203_CR9","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1080\/09720529.2020.1721870","volume":"23","author":"PK Rahul","year":"2020","unstructured":"Rahul, P.K., Sarangi, S., Monika: Analysis of machine learning models for malware detection. J. Discrete Math. Sci. Cryptography 23(2), 395\u2013407 (2020). https:\/\/doi.org\/10.1080\/09720529.2020.1721870","journal-title":"J. Discrete Math. Sci. Cryptography"},{"key":"3203_CR10","doi-asserted-by":"crossref","unstructured":"Asrigo, K., Litty, L., Lie, D.: Using VMM-based sensors to monitor honeypots. In: 2nd International Conference on Virtual Execution Environments. VEE, pp. 13e23, (2006)","DOI":"10.1145\/1134760.1134765"},{"key":"3203_CR11","doi-asserted-by":"publisher","first-page":"8699","DOI":"10.1007\/s12652-020-02630-7","volume":"12","author":"I Bello","year":"2021","unstructured":"Bello, I., Chiroma, H., Abdullahi, U.A., Gital, A.Y.U., Jauro, F., Khan, A., Abdulhamid, S.I.M.: Detecting ransomware attacks using intelligent algorithms: recent development and next direction from deep learning and big data perspectives. J. Amb. Intell. Human. Comput. 12, 8699\u20138717 (2021)","journal-title":"J. Amb. Intell. Human. Comput."},{"key":"3203_CR12","doi-asserted-by":"publisher","first-page":"3749","DOI":"10.1007\/s13369-020-05181-3","volume":"46","author":"P Kumar","year":"2021","unstructured":"Kumar, P., Gupta, G.P., Tripathi, R.: Toward the design of an intelligent cyber attack detection system using the hybrid feature-reduced approach for iot networks. Arab. J. Sci. Eng. 46, 3749\u20133778 (2021)","journal-title":"Arab. J. Sci. Eng."},{"key":"3203_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/03772063.2023.2278696","volume":"22","author":"G Wang","year":"2023","unstructured":"Wang, G., Wu, J., Trik, M.: A novel approach to reduce video traffic based on understanding user demand and D2D communication in 5G networks. IETE J. Res. 22, 1\u201317 (2023)","journal-title":"IETE J. Res."},{"issue":"9","key":"3203_CR14","volume":"35","author":"Z Wang","year":"2023","unstructured":"Wang, Z., Jin, Z., Yang, Z., Zhao, W., Trik, M.: Increasing efficiency for routing in the Internet of Things using binary grey wolf optimization and fuzzy logic. J. King Saud Univer.-Comput. Inf. Sci. 35(9), 101732 (2023)","journal-title":"J. King Saud Univer.-Comput. Inf. Sci."},{"key":"3203_CR15","first-page":"1","volume":"28","author":"J Sun","year":"2022","unstructured":"Sun, J., Zhang, Y., Trik, M.: PBPHS: a profile-based predictive handover strategy for 5G networks. Cybern. Syst. 28, 1\u201322 (2022)","journal-title":"Cybern. Syst."},{"key":"3203_CR16","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1016\/j.vlsi.2022.11.004","volume":"89","author":"M Trik","year":"2023","unstructured":"Trik, M., Akhavan, H., Bidgoli, A.M., Molk, A.M.N.G., Vashani, H., Mozaffari, S.P.: A new adaptive selection strategy for reducing latency in networks on chip. Integration 89, 9\u201324 (2023)","journal-title":"Integration"},{"key":"3203_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2022\/3112170","volume":"2022","author":"M Trik","year":"2022","unstructured":"Trik, M., Molk, A.M.N.G., Ghasemi, F., Pouryeganeh, P.: A hybrid selection strategy based on traffic analysis for improving performance in networks on chip. J. Sens. 2022, 1\u201319 (2022). https:\/\/doi.org\/10.1155\/2022\/3112170","journal-title":"J. Sens."},{"key":"3203_CR18","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2024.3357593","author":"A Yan","year":"2024","unstructured":"Yan, A., Li, Z., Gao, Z., Zhang, J., Huang, Z., NiWen, T.X.: MURLAV: a multiple-node-upset recovery latch and algorithm-based verification method. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. (2024). https:\/\/doi.org\/10.1109\/TCAD.2024.3357593","journal-title":"IEEE Trans. Comput. Aided Des. Integr. Circuits Syst."},{"issue":"1","key":"3203_CR19","first-page":"35","volume":"10","author":"N Aljojo","year":"2022","unstructured":"Aljojo, N.: Network transmission flags data affinity-based classification by K-nearest neighbor. Aro-The Sci. J. Koya Univ. 10(1), 35\u201343 (2022)","journal-title":"Aro-The Sci. J. Koya Univ."},{"issue":"1","key":"3203_CR20","first-page":"278","volume":"28","author":"NH Mahmood","year":"2024","unstructured":"Mahmood, N.H., Kadir, D.H., Alzawbaee, O.M.M.: Building a statistical model to forecast traffic accidents for death and injuries by using Bivariate time series analysis. Zanco J. Human Sci. 28(1), 278\u2013289 (2024)","journal-title":"Zanco J. Human Sci."},{"issue":"1","key":"3203_CR21","first-page":"18","volume":"10","author":"WJ Jameel","year":"2022","unstructured":"Jameel, W.J., Kadhem, S.M., Abbas, A.R.: Detecting deepfakes with deep learning and gabor filters. ARO-Sci. J. Koya Univ. 10(1), 18\u201322 (2022)","journal-title":"ARO-Sci. J. Koya Univ."},{"issue":"1","key":"3203_CR22","first-page":"85","volume":"10","author":"PJM Ali","year":"2022","unstructured":"Ali, P.J.M.: Investigating the Impact of min-max data normalization on the regression performance of K-nearest neighbor with different similarity measurements. ARO- Sci. J. Koya Univ. 10(1), 85\u201391 (2022)","journal-title":"ARO- Sci. J. Koya Univ."},{"key":"3203_CR23","doi-asserted-by":"publisher","DOI":"10.1063\/5.0165575","author":"H Hongping","year":"2023","unstructured":"Hongping, H., Luo, P., Kadir, D.H., Hassanvand, A.: Assessing the impact of aneurysm morphology on the risk of internal carotid artery aneurysm rupture: a statistical and computational analysis of endovascular coiling. Phys. Fluids (2023). https:\/\/doi.org\/10.1063\/5.0165575","journal-title":"Phys. Fluids"},{"key":"3203_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.energy.2023.127515","volume":"276","author":"T Hai","year":"2023","unstructured":"Hai, T., Kadir, D.H., Ghanbari, A.: Modeling the emission characteristics of the hydrogen-enriched natural gas engines by multi-output least-squares support vector regression: comprehensive statistical and operating analyses. Energy 276, 127515 (2023)","journal-title":"Energy"},{"issue":"1","key":"3203_CR25","first-page":"123","volume":"10","author":"NA Hussein","year":"2022","unstructured":"Hussein, N.A.: Synchro software-based alternatives for improving traffic operations at signalized intersections. Aro-the Sci. J. Koya Univ. 10(1), 123\u2013131 (2022)","journal-title":"Aro-the Sci. J. Koya Univ."},{"issue":"2","key":"3203_CR26","first-page":"11","volume":"10","author":"N Jalal","year":"2022","unstructured":"Jalal, N., Ghafoor, K.Z.: Machine learning algorithms for detecting and analyzing social bots using a novel dataset. Aro-The Sci. J. Koya Univ. 10(2), 11\u201321 (2022)","journal-title":"Aro-The Sci. J. Koya Univ."},{"issue":"2","key":"3203_CR27","first-page":"22","volume":"10","author":"AH Taher","year":"2022","unstructured":"Taher, A.H.: Train support vector machine using fuzzy c-means without a prior knowledge for hyperspectral image content classification. Aro-The Sci. J. Koya Univ. 10(2), 22\u201328 (2022)","journal-title":"Aro-The Sci. J. Koya Univ."},{"issue":"2","key":"3203_CR28","doi-asserted-by":"publisher","first-page":"17","DOI":"10.24086\/cuesj.v7n2y2023.pp17-25","volume":"7","author":"DH Kadir","year":"2023","unstructured":"Kadir, D.H., Rahi, A.R.K.: Applying the Bayesian technique in designing a single sampling plan. Cihan Univ-Erbil Sci. J. 7(2), 17\u201325 (2023)","journal-title":"Cihan Univ-Erbil Sci. J."},{"issue":"1","key":"3203_CR29","first-page":"126","volume":"11","author":"TS Othman","year":"2023","unstructured":"Othman, T.S., Abdullah, S.M.: An intelligent intrusion detection system for internet of things attack detection and identification using machine learning. Aro-The Sci. J. Koya Univ. 11(1), 126\u2013137 (2023)","journal-title":"Aro-The Sci. J. Koya Univ."},{"issue":"7","key":"3203_CR30","doi-asserted-by":"publisher","first-page":"5760","DOI":"10.1109\/JIOT.2019.2937110","volume":"7","author":"G Sun","year":"2020","unstructured":"Sun, G., Xu, Z., Yu, H., Chen, X., ChangVasilakos, V.A.V.: Low-latency and resource-efficient service function chaining orchestration in network function virtualization. IEEE Internet Things J. 7(7), 5760\u20135772 (2020). https:\/\/doi.org\/10.1109\/JIOT.2019.2937110","journal-title":"IEEE Internet Things J."},{"issue":"2","key":"3203_CR31","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1109\/TSC.2015.2477825","volume":"11","author":"G Sun","year":"2018","unstructured":"Sun, G., Liao, D., Zhao, D., Xu, Z., Yu, H.: Live migration for multiple correlated virtual machines in cloud-based data centers. IEEE Trans. Serv. Comput. 11(2), 279\u2013291 (2018). https:\/\/doi.org\/10.1109\/TSC.2015.2477825","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"1","key":"3203_CR32","first-page":"1122","volume":"8","author":"DM Saleh","year":"2023","unstructured":"Saleh, D.M., Kadir, D.H., Jamil, D.I.: A comparison between some penalized methods for estimating parameters: simulation study. QALAAI Zanist J. 8(1), 1122\u20131134 (2023)","journal-title":"QALAAI Zanist J."},{"issue":"1","key":"3203_CR33","first-page":"38","volume":"11","author":"SM Omer","year":"2023","unstructured":"Omer, S.M., Ghafoor, K.Z., Askar, S.K.: Plant disease diagnosing based on deep learning techniques. Aro-The Sci. J. Koya Univ. 11(1), 38\u201347 (2023)","journal-title":"Aro-The Sci. J. Koya Univ."},{"issue":"6","key":"3203_CR34","doi-asserted-by":"publisher","first-page":"4101","DOI":"10.1109\/TNSE.2022.3195862","volume":"9","author":"M Dai","year":"2022","unstructured":"Dai, M., Luo, L., Ren, J., Yu, H., Sun, G.: PSACCF: prioritized online slice admission control considering fairness in 5G\/B5G networks. IEEE Trans. Netw. Sci. Eng. 9(6), 4101\u20134114 (2022). https:\/\/doi.org\/10.1109\/TNSE.2022.3195862","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"issue":"3","key":"3203_CR35","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3507921","volume":"18","author":"X Zou","year":"2022","unstructured":"Zou, X., Yuan, J., Shilane, P., Xia, W., ZhangWang, H.X.: From hyper-dimensional structures to linear structures: maintaining deduplicated data\u2019s locality. ACM Trans. Storage 18(3), 1\u201328 (2022). https:\/\/doi.org\/10.1145\/3507921","journal-title":"ACM Trans. Storage"},{"issue":"2","key":"3203_CR36","first-page":"99","volume":"11","author":"HM Radha","year":"2023","unstructured":"Radha, H.M., Hassan, A.K.A., Al-Timemy, A.H.: Enhancing upper limb prosthetic control in amputees using non-invasive EEG and EMG signals with machine learning techniques. Aro- Sci J. Koya Univ. 11(2), 99\u2013108 (2023)","journal-title":"Aro- Sci J. Koya Univ."},{"issue":"3","key":"3203_CR37","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3584663","volume":"19","author":"W Xia","year":"2023","unstructured":"Xia, W., Pu, L., Zou, X., Shilane, P., LiZhangWang, S.H.X.: The design of fast and lightweight resemblance detection for efficient post-deduplication delta compression. ACM Trans. Storage 19(3), 1\u201330 (2023). https:\/\/doi.org\/10.1145\/3584663","journal-title":"ACM Trans. Storage"},{"issue":"1","key":"3203_CR38","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3517013","volume":"19","author":"D Liu","year":"2022","unstructured":"Liu, D., Cao, Z., Jiang, H., Zhou, S., Xiao, Z., Zeng, F.: Concurrent low-power listening: a new design paradigm for duty-cycling communication. ACM Trans. Sens. Netw. 19(1), 1\u201324 (2022). https:\/\/doi.org\/10.1145\/3517013","journal-title":"ACM Trans. Sens. Netw."},{"key":"3203_CR39","doi-asserted-by":"publisher","DOI":"10.1016\/j.rineng.2024.101780","volume":"21","author":"E Khezri","year":"2024","unstructured":"Khezri, E., Yahya, R.O., Hassanzadeh, H., Mohaidat, M., Ahmadi, S., Trik, M.: DLJSF: data-locality aware job scheduling IoT tasks in fog-cloud computing environments. Results Eng. 21, 101780 (2024)","journal-title":"Results Eng."},{"issue":"5","key":"3203_CR40","doi-asserted-by":"publisher","first-page":"2228","DOI":"10.1109\/TNET.2021.3084251","volume":"29","author":"H Jiang","year":"2021","unstructured":"Jiang, H., Wang, M., Zhao, P., Xiao, Z., Dustdar, S.: A utility-aware general framework with quantifiable privacy preservation for destination prediction in LBSs. IEEE\/ACM Trans. Netw. 29(5), 2228\u20132241 (2021). https:\/\/doi.org\/10.1109\/TNET.2021.3084251","journal-title":"IEEE\/ACM Trans. Netw."},{"issue":"2","key":"3203_CR41","first-page":"109","volume":"11","author":"SY Omar","year":"2023","unstructured":"Omar, S.Y., Mamand, D.M., Omer, R.A., Rashid, R.F., Salih, M.I.: Investigating the role of metoclopramide and hyoscine-N-Butyl bromide in colon motility. Aro-The Sci. J. Koya Univ. 11(2), 109\u2013115 (2023)","journal-title":"Aro-The Sci. J. Koya Univ."},{"key":"3203_CR42","doi-asserted-by":"publisher","DOI":"10.1016\/j.surfin.2020.100908","volume":"23","author":"SM Sajadi","year":"2021","unstructured":"Sajadi, S.M., Kadir, D.H., Balaky, S.M., Perot, E.M.: An Eco-friendly nanocatalyst for removal of some poisonous environmental pollutions and statistically evaluation of its performance. Surfaces and Interfaces 23, 100908 (2021)","journal-title":"Surfaces and Interfaces"},{"issue":"7","key":"3203_CR43","doi-asserted-by":"publisher","first-page":"3491","DOI":"10.1002\/fsn3.2288","volume":"9","author":"DH Kadir","year":"2021","unstructured":"Kadir, D.H.: Statistical evaluation of main extraction parameters in twenty plant extracts for obtaining their optimum total phenolic content and its relation to antioxidant and antibacterial activities. Food Sci. Nutr. 9(7), 3491\u20133499 (2021)","journal-title":"Food Sci. Nutr."},{"issue":"2","key":"3203_CR44","first-page":"251","volume":"6","author":"H Blbas","year":"2019","unstructured":"Blbas, H., Kadir, D.H.: An application of factor analysis to identify the most effective reasons that university students hate to read books. Int. J. Innov. Creat. Change 6(2), 251\u2013265 (2019)","journal-title":"Int. J. Innov. Creat. Change"},{"issue":"4","key":"3203_CR45","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0282031","volume":"18","author":"E Khezri","year":"2023","unstructured":"Khezri, E., Zeinali, E., Sargolzaey, H.: SGHRP: secure greedy highway routing protocol with authentication and increased privacy in vehicular ad hoc networks. PLoS ONE 18(4), e0282031 (2023)","journal-title":"PLoS ONE"},{"issue":"2","key":"3203_CR46","doi-asserted-by":"publisher","first-page":"56","DOI":"10.24086\/cuesj.v5n2y2021.pp56-63","volume":"5","author":"AW Omer","year":"2021","unstructured":"Omer, A.W., Blbas, H.T.A., Kadir, D.H.: A comparison between Brown\u2019s and Holt\u2019s double exponential smoothing for forecasting applied generation electrical energies in kurdistan region. Cihan University-Erbil Sci. J. 5(2), 56\u201363 (2021). https:\/\/doi.org\/10.24086\/cuesj.v5n2y2021.pp56-63","journal-title":"Cihan University-Erbil Sci. J."},{"key":"3203_CR47","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-023-03541-z","author":"X Ding","year":"2023","unstructured":"Ding, X., Yao, R., Khezri, E.: An efficient algorithm for optimal route node sensing in smart tourism Urban traffic based on priority constraints. Wireless Netw. (2023). https:\/\/doi.org\/10.1007\/s11276-023-03541-z","journal-title":"Wireless Netw."},{"issue":"2","key":"3203_CR48","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1109\/TMC.2019.2947468","volume":"20","author":"J Yu","year":"2021","unstructured":"Yu, J., Lu, L., Chen, Y., Zhu, Y., Kong, L.: An indirect eavesdropping attack of keystrokes on touch screen through acoustic sensing. IEEE Trans. Mob. Comput. 20(2), 337\u2013351 (2021). https:\/\/doi.org\/10.1109\/TMC.2019.2947468","journal-title":"IEEE Trans. Mob. Comput."},{"key":"3203_CR49","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2022.0047","author":"Z Wu","year":"2023","unstructured":"Wu, Z., Liu, G., Wu, J., Tan, Y.: Are neighbors alike? A semisupervised probabilistic collaborative learning model for online review spammers detection. Inf. Syst. Res. (2023). https:\/\/doi.org\/10.1287\/isre.2022.0047","journal-title":"Inf. Syst. Res."},{"issue":"1","key":"3203_CR50","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13677-023-00552-1","volume":"12","author":"L Xiao","year":"2023","unstructured":"Xiao, L., Cao, Y., Gai, Y., Khezri, E., Liu, J., Yang, M.: Recognizing sports activities from video frames using deformable convolution and adaptive multiscale features. J. Cloud Comput. 12(1), 1\u201320 (2023)","journal-title":"J. Cloud Comput."},{"issue":"1","key":"3203_CR51","volume":"2024","author":"M Khosravi","year":"2024","unstructured":"Khosravi, M., Trik, M., Ansari, A.: Diagnosis and classification of disturbances in the power distribution network by phasor measurement unit based on fuzzy intelligent system. J. Eng. 2024(1), e12322 (2024)","journal-title":"J. Eng."},{"issue":"6","key":"3203_CR52","doi-asserted-by":"publisher","first-page":"4907","DOI":"10.1109\/TCYB.2020.3024551","volume":"52","author":"K Li","year":"2022","unstructured":"Li, K., Ji, L., Yang, S., Li, H., Liao, X.: Couple-group consensus of cooperative-competitive heterogeneous multiagent systems: a fully distributed event-triggered and pinning control method. IEEE Trans. Cybern. 52(6), 4907\u20134915 (2022). https:\/\/doi.org\/10.1109\/TCYB.2020.3024551","journal-title":"IEEE Trans. Cybern."},{"key":"3203_CR53","doi-asserted-by":"publisher","first-page":"107194","DOI":"10.1016\/j.infsof.2023.107194","volume":"158","author":"W Zheng","year":"2023","unstructured":"Zheng, W., Deng, P., Gui, K., Wu, X.: An abstract syntax tree based static fuzzing mutation for vulnerability evolution analysis. Inf. Softw. Technol. 158, 107194 (2023). https:\/\/doi.org\/10.1016\/j.infsof.2023.107194","journal-title":"Inf. Softw. Technol."},{"issue":"3","key":"3203_CR54","doi-asserted-by":"publisher","first-page":"426","DOI":"10.14736\/kyb-2022-3-0426","volume":"58","author":"J Ma","year":"2022","unstructured":"Ma, J., Hu, J.: Safe consensus control of cooperative-competitive multi-agent systems via differential privacy. Kybernetika 58(3), 426\u2013439 (2022). https:\/\/doi.org\/10.14736\/kyb-2022-3-0426","journal-title":"Kybernetika"},{"issue":"1","key":"3203_CR55","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/s10470-023-02243-y","volume":"119","author":"Y Li","year":"2024","unstructured":"Li, Y., Wang, H., Trik, M.: Design and simulation of a new current mirror circuit with low power consumption and high performance and output impedance. Analog Integrated Circuits Signal Process 119(1), 29\u201341 (2024). https:\/\/doi.org\/10.1007\/s10470-023-02243-y","journal-title":"Analog Integrated Circuits Signal Process"},{"key":"3203_CR56","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1016\/j.ins.2022.11.035","volume":"619","author":"Q Wang","year":"2023","unstructured":"Wang, Q., Hu, J., Wu, Y., Zhao, Y.: Output synchronization of wide-area heterogeneous multi-agent systems over intermittent clustered networks. Inf. Sci. 619, 263\u2013275 (2023). https:\/\/doi.org\/10.1016\/j.ins.2022.11.035","journal-title":"Inf. Sci."},{"issue":"1","key":"3203_CR57","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1057\/s41599-023-01719-6","volume":"10","author":"J Li","year":"2023","unstructured":"Li, J., Huang, C., Yang, Y., Liu, J., LinPan, X.J.: How nursing students\u2019 risk perception affected their professional commitment during the COVID-19 pandemic: the mediating effects of negative emotions and moderating effects of psychological capital. Human. Social Sci. Commun. 10(1), 195 (2023). https:\/\/doi.org\/10.1057\/s41599-023-01719-6","journal-title":"Human. Social Sci. Commun."},{"issue":"1","key":"3203_CR58","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1186\/s12960-019-0440-y","volume":"17","author":"R Cai","year":"2019","unstructured":"Cai, R., Tang, J., Deng, C., Lv, G., Xu, X., SylviaPan, S.J.: Violence against health care workers in China, 2013\u20132016: evidence from the national judgment documents. Hum. Resour. Health 17(1), 103 (2019). https:\/\/doi.org\/10.1186\/s12960-019-0440-y","journal-title":"Hum. Resour. Health"},{"key":"3203_CR59","doi-asserted-by":"publisher","DOI":"10.1007\/s11265-023-01908-1","author":"X Zhang","year":"2024","unstructured":"Zhang, X., Deng, H., Xiong, Z., Liu, Y., Rao, Y., Lyu, Y., Li, Y.: Secure routing strategy based on attribute-based trust access control in social-aware networks. J. Signal Process. Syst. (2024). https:\/\/doi.org\/10.1007\/s11265-023-01908-1","journal-title":"J. Signal Process. Syst."},{"issue":"5","key":"3203_CR60","doi-asserted-by":"publisher","first-page":"8973","DOI":"10.1109\/JIOT.2023.3321673","volume":"11","author":"T Lyu","year":"2024","unstructured":"Lyu, T., Xu, H., Zhang, L., Han, Z.: Source selection and resource allocation in wireless-powered relay networks: an adaptive dynamic programming-based approach. IEEE Internet Things J. 11(5), 8973\u20138988 (2024). https:\/\/doi.org\/10.1109\/JIOT.2023.3321673","journal-title":"IEEE Internet Things J."},{"key":"3203_CR61","doi-asserted-by":"publisher","first-page":"98596","DOI":"10.1109\/ACCESS.2023.3313602","volume":"11","author":"D Wang","year":"2023","unstructured":"Wang, D., Zhang, W., Wu, W., Guo, X.: Soft-label for multi-domain fake news detection. IEEE Access 11, 98596\u201398606 (2023). https:\/\/doi.org\/10.1109\/ACCESS.2023.3313602","journal-title":"IEEE Access"},{"issue":"16","key":"3203_CR62","doi-asserted-by":"publisher","first-page":"12505","DOI":"10.1109\/JIOT.2020.3019398","volume":"8","author":"Y Ding","year":"2021","unstructured":"Ding, Y., Zhang, W., Zhou, X., Liao, Q., LuoNi, Q.L.M.: FraudTrip: taxi fraudulent trip detection from corresponding trajectories. IEEE Internet Things J. 8(16), 12505\u201312517 (2021). https:\/\/doi.org\/10.1109\/JIOT.2020.3019398","journal-title":"IEEE Internet Things J."},{"issue":"11","key":"3203_CR63","doi-asserted-by":"publisher","first-page":"5154","DOI":"10.1109\/TKDE.2021.3054993","volume":"34","author":"Q Liao","year":"2022","unstructured":"Liao, Q., Chai, H., Han, H., Zhang, X., Wang, X., XiaDing, W.Y.: An integrated multi-task model for fake news detection. IEEE Trans. Knowl. Data Eng. 34(11), 5154\u20135165 (2022). https:\/\/doi.org\/10.1109\/TKDE.2021.3054993","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"11","key":"3203_CR64","doi-asserted-by":"publisher","first-page":"5126","DOI":"10.1109\/TKDE.2021.3054782","volume":"34","author":"Y Xu","year":"2022","unstructured":"Xu, Y., Wang, E., Yang, Y., Chang, Y.: A unified collaborative representation learning for neural-network based recommender systems. IEEE Trans. Knowl. Data Eng. 34(11), 5126\u20135139 (2022). https:\/\/doi.org\/10.1109\/TKDE.2021.3054782","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"2023","key":"3203_CR65","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2023.109635","volume":"224","author":"H Zhang","year":"2023","unstructured":"Zhang, H., Mi, Y., Liu, X., Zhang, Y., Wang, J., Tan, J.: A differential game approach for real-time security defense decision in scale-free networks. Comput. Netw. 224(2023), 109635 (2023)","journal-title":"Comput. Netw."},{"issue":"1","key":"3203_CR66","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1093\/imamci\/dnae002","volume":"41","author":"W Wenjing","year":"2024","unstructured":"Wenjing, W., Zhang, L., Yuhang, W., Zhao, H.: Adaptive saturated two-bit-triggered bipartite consensus control for networked MASs with periodic disturbances: a low-computation method. IMA J. Math. Control. Inf. 41(1), 116\u2013148 (2024). https:\/\/doi.org\/10.1093\/imamci\/dnae002","journal-title":"IMA J. Math. Control. Inf."},{"key":"3203_CR67","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2023.126529","volume":"533","author":"H Zhao","year":"2023","unstructured":"Zhao, H., Wang, H., Ning, Xu., Zhao, X., Sharaf, S.: Fuzzy approximation-based optimal consensus control for nonlinear multiagent systems via adaptive dynamic programming. Neurocomputing 533, 126529 (2023)","journal-title":"Neurocomputing"},{"key":"3203_CR68","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2023.3317902","author":"H Zhao","year":"2024","unstructured":"Zhao, H., Zong, G., Wang, H., Zhao, X., Ning, X.: Zero-sum game-based hierarchical sliding-mode fault-tolerant tracking control for interconnected nonlinear systems via adaptive critic design. IEEE Trans. Autom. Sci. Eng. (2024). https:\/\/doi.org\/10.1109\/TASE.2023.3317902","journal-title":"IEEE Trans. Autom. Sci. Eng."},{"issue":"5","key":"3203_CR69","doi-asserted-by":"publisher","first-page":"473","DOI":"10.2174\/1574893617666220404145517","volume":"17","author":"H Zhang","year":"2022","unstructured":"Zhang, H., Zou, Q., Ying, Ju., Song, C., Chen, D.: Distance-based support vector machine to predict DNA N6-methyladine Modification. Curr. Bioinform. 17(5), 473\u2013482 (2022)","journal-title":"Curr. Bioinform."},{"issue":"D1","key":"3203_CR70","doi-asserted-by":"publisher","first-page":"D1123","DOI":"10.1093\/nar\/gkab957","volume":"50","author":"C Cao","year":"2022","unstructured":"Cao, C., Wang, J., Kwok, D., Cui, F., Zhang, Z., Zhao, D., Li, M.J., Zou, Q.: webTWAS: a resource for disease candidate susceptibility genes identified by transcriptome-wide association study. Nucleic Acids Res. 50(D1), D1123\u2013D1130 (2022). https:\/\/doi.org\/10.1093\/nar\/gkab957","journal-title":"Nucleic Acids Res."},{"issue":"1","key":"3203_CR71","first-page":"206","volume":"30","author":"CH Liu","year":"2019","unstructured":"Liu, C.H., Chen, W.H.: The study of using big data analysis to detecting APT attack. J. Comput. 30(1), 206\u2013222 (2019)","journal-title":"J. Comput."},{"key":"3203_CR72","doi-asserted-by":"crossref","unstructured":"Xu, G., Su, W., He, Z.: An efficient implementation of network malicious traffic screening based on big data analytics. In\u00a02021 2nd International Conference on Smart Electronics and Communication (ICOSEC), pp. 1274\u20131277, IEEE, (2021)","DOI":"10.1109\/ICOSEC51865.2021.9591700"},{"key":"3203_CR73","first-page":"1","volume":"2","author":"F Louati","year":"2024","unstructured":"Louati, F., Ktata, F.B., Amous, I.: Big-IDS: a decentralized multi agent reinforcement learning approach for distributed intrusion detection in big data networks. Cluster Comput. 2, 1\u201319 (2024)","journal-title":"Cluster Comput."}],"container-title":["Signal, Image and Video Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-024-03203-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11760-024-03203-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-024-03203-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,28]],"date-time":"2024-06-28T13:06:51Z","timestamp":1719580011000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11760-024-03203-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,13]]},"references-count":73,"journal-issue":{"issue":"S1","published-print":{"date-parts":[[2024,8]]}},"alternative-id":["3203"],"URL":"https:\/\/doi.org\/10.1007\/s11760-024-03203-3","relation":{},"ISSN":["1863-1703","1863-1711"],"issn-type":[{"value":"1863-1703","type":"print"},{"value":"1863-1711","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,5,13]]},"assertion":[{"value":"18 February 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 March 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 April 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 May 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interests"}},{"value":"The research paper has received ethical approval from the institutional review board, ensuring the protection of participants\u2019 rights and compliance with the relevant ethical guidelines.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}