eISSN:
 2577-8838

All Issues

Volume 3, 2020

Volume 2, 2019

Volume 1, 2018

Call for papers     Special issue on Theme Issue on kernel-based methods (click to view details)
Call for papers     Special Issue on Analysis in Data Science: Methods and Applications (click to view details)

Mathematical Foundations of Computing (MFC), indexed in ESCI, provides an interdisciplinary forum to promote interaction among mathematicians, computer scientists and statisticians as well as engineers to exchange new ideas and techniques for attacking the pressing challenges in data analysis. The journal aims to provide a place for more understanding and transparency of data analytics in different areas of AI. We welcome high-quality papers in all areas of AI related to the computational and algorithmic aspects of data analysis, with emphasis on innovative theoretical development, methods, and algorithms including, but not restricted to, machine learning, deep learning, and learning theory.


Select all articles

Export/Reference:

Preface of the special issue on analysis in data science: Methods and applications
Xin Guo and Lei Shi
2020, 3(4) : i-ii doi: 10.3934/mfc.2020026 +[Abstract](55) +[HTML](24) +[PDF](105.78KB)
Sketch-based image retrieval via CAT loss with elastic net regularization
Jia Cai, Guanglong Xu and Zhensheng Hu
2020, 3(4) : 219-227 doi: 10.3934/mfc.2020013 +[Abstract](496) +[HTML](287) +[PDF](341.5KB)
Inpainting via sparse recovery with directional constraints
Xuemei Chen and Julia Dobrosotskaya
2020, 3(4) : 229-247 doi: 10.3934/mfc.2020025 +[Abstract](29) +[HTML](18) +[PDF](534.02KB)
Network centralities, demographic disparities, and voluntary participation
Qiang Fu, Yanlong Zhang, Yushu Zhu and Ting Li
2020, 3(4) : 249-262 doi: 10.3934/mfc.2020011 +[Abstract](504) +[HTML](273) +[PDF](987.28KB)
Modeling interactive components by coordinate kernel polynomial models
Xin Guo, Lexin Li and Qiang Wu
2020, 3(4) : 263-277 doi: 10.3934/mfc.2020010 +[Abstract](524) +[HTML](277) +[PDF](379.41KB)
Support vector machine classifiers by non-Euclidean margins
Ying Lin and Qi Ye
2020, 3(4) : 279-300 doi: 10.3934/mfc.2020018 +[Abstract](480) +[HTML](254) +[PDF](2059.22KB)
AIMS: Average information matrix splitting
Shengxin Zhu, Tongxiang Gu and Xingping Liu
2020, 3(4) : 301-308 doi: 10.3934/mfc.2020012 +[Abstract](486) +[HTML](257) +[PDF](283.9KB)
A survey on security and privacy issues of blockchain technology
Archana Prashanth Joshi, Meng Han and Yan Wang
2018, 1(2) : 121-147 doi: 10.3934/mfc.2018007 +[Abstract](23344) +[HTML](12794) +[PDF](3282.55KB) Cited By(32)
How convolutional neural networks see the world --- A survey of convolutional neural network visualization methods
Zhuwei Qin, Fuxun Yu, Chenchen Liu and Xiang Chen
2018, 1(2) : 149-180 doi: 10.3934/mfc.2018008 +[Abstract](8439) +[HTML](5292) +[PDF](5025.25KB) Cited By(23)
Hybrid binary dragonfly enhanced particle swarm optimization algorithm for solving feature selection problems
Mohamed A. Tawhid and Kevin B. Dsouza
2018, 1(2) : 181-200 doi: 10.3934/mfc.2018009 +[Abstract](6088) +[HTML](2679) +[PDF](609.18KB) Cited By(13)
Discrete heat transfer search for solving travelling salesman problem
Poonam Savsani and Mohamed A. Tawhid
2018, 1(3) : 265-280 doi: 10.3934/mfc.2018012 +[Abstract](4364) +[HTML](2532) +[PDF](865.09KB) Cited By(5)
A classification algorithm with Linear Discriminant Analysis and Axiomatic Fuzzy Sets
Wenjuan Jia, Yingjie Deng, Chenyang Xin, Xiaodong Liu and Witold Pedrycz
2019, 2(1) : 73-81 doi: 10.3934/mfc.2019006 +[Abstract](2554) +[HTML](978) +[PDF](681.93KB) Cited By(4)
CP_ABSC: An attribute-based signcryption scheme to secure multicast communications in smart grids
Chunqiang Hu, Jiguo Yu, Xiuzhen Cheng, Zhi Tian, Kemal Akkaya and and Limin Sun
2018, 1(1) : 77-100 doi: 10.3934/mfc.2018005 +[Abstract](6075) +[HTML](2318) +[PDF](1438.97KB) Cited By(2)
Application of learning algorithms in smart home IoT system security
Jian Mao, Qixiao Lin and Jingdong Bian
2018, 1(1) : 63-76 doi: 10.3934/mfc.2018004 +[Abstract](11250) +[HTML](7049) +[PDF](1032.13KB) Cited By(2)
Influence analysis: A survey of the state-of-the-art
Meng Han and Yingshu Li
2018, 1(3) : 201-253 doi: 10.3934/mfc.2018010 +[Abstract](8266) +[HTML](3930) +[PDF](2792.87KB) Cited By(2)
"Reducing the number of dimensions of the possible solution space" as a method for finding the exact solution of a system with a large number of unknowns
Aleksa Srdanov, Radiša Stefanović, Aleksandra Janković and Dragan Milovanović
2019, 2(2) : 83-93 doi: 10.3934/mfc.2019007 +[Abstract](1583) +[HTML](633) +[PDF](311.88KB) Cited By(2)
SEMANTIC-RTAB-MAP (SRM): A semantic SLAM system with CNNs on depth images
Mingyuan Mao, Hewei Zhang, Simeng Li and Baochang Zhang
2019, 2(1) : 29-41 doi: 10.3934/mfc.2019003 +[Abstract](3835) +[HTML](1881) +[PDF](1868.4KB) Cited By(1)
A survey on security and privacy issues of blockchain technology
Archana Prashanth Joshi, Meng Han and Yan Wang
2018, 1(2) : 121-147 doi: 10.3934/mfc.2018007 +[Abstract](23344) +[HTML](12794) +[PDF](3282.55KB) PDF Downloads(3633)
Application of learning algorithms in smart home IoT system security
Jian Mao, Qixiao Lin and Jingdong Bian
2018, 1(1) : 63-76 doi: 10.3934/mfc.2018004 +[Abstract](11250) +[HTML](7049) +[PDF](1032.13KB) PDF Downloads(1197)
Influence analysis: A survey of the state-of-the-art
Meng Han and Yingshu Li
2018, 1(3) : 201-253 doi: 10.3934/mfc.2018010 +[Abstract](8266) +[HTML](3930) +[PDF](2792.87KB) PDF Downloads(818)
How convolutional neural networks see the world --- A survey of convolutional neural network visualization methods
Zhuwei Qin, Fuxun Yu, Chenchen Liu and Xiang Chen
2018, 1(2) : 149-180 doi: 10.3934/mfc.2018008 +[Abstract](8439) +[HTML](5292) +[PDF](5025.25KB) PDF Downloads(775)
SEMANTIC-RTAB-MAP (SRM): A semantic SLAM system with CNNs on depth images
Mingyuan Mao, Hewei Zhang, Simeng Li and Baochang Zhang
2019, 2(1) : 29-41 doi: 10.3934/mfc.2019003 +[Abstract](3835) +[HTML](1881) +[PDF](1868.4KB) PDF Downloads(555)
A Sim2real method based on DDQN for training a self-driving scale car
Qi Zhang, Tao Du and Changzheng Tian
2019, 2(4) : 315-331 doi: 10.3934/mfc.2019020 +[Abstract](1584) +[HTML](504) +[PDF](5616.33KB) PDF Downloads(285)
CP_ABSC: An attribute-based signcryption scheme to secure multicast communications in smart grids
Chunqiang Hu, Jiguo Yu, Xiuzhen Cheng, Zhi Tian, Kemal Akkaya and and Limin Sun
2018, 1(1) : 77-100 doi: 10.3934/mfc.2018005 +[Abstract](6075) +[HTML](2318) +[PDF](1438.97KB) PDF Downloads(260)
Cryptographic algorithms for privacy-preserving online applications
Ruinian Li, Yinhao Xiao, Cheng Zhang, Tianyi Song and Chunqiang Hu
2018, 1(4) : 311-330 doi: 10.3934/mfc.2018015 +[Abstract](4207) +[HTML](1659) +[PDF](994.72KB) PDF Downloads(229)
A survey: Reward distribution mechanisms and withholding attacks in Bitcoin pool mining
Saide Zhu, Wei Li, Hong Li, Chunqiang Hu and Zhipeng Cai
2018, 1(4) : 393-414 doi: 10.3934/mfc.2018020 +[Abstract](7750) +[HTML](3545) +[PDF](902.32KB) PDF Downloads(228)
An effective hybrid firefly algorithm with the cuckoo search for engineering optimization problems
Mohamed A. Tawhid and Ahmed F. Ali
2018, 1(4) : 349-368 doi: 10.3934/mfc.2018017 +[Abstract](4367) +[HTML](1426) +[PDF](649.23KB) PDF Downloads(214)

Referees

Librarians

Email Alert

[Back to Top]