Found: 30
Select item for more details and to access through your institution.
Analyzing IoT Attack Feature Association with Threat Actors.
- Published in:
- Wireless Communications & Mobile Computing, 2022, p. 1, doi. 10.1155/2022/7143054
- By:
- Publication type:
- Article
Incentives against Max-Min Fairness in a Centralized Resource System.
- Published in:
- Wireless Communications & Mobile Computing, 2021, p. 1, doi. 10.1155/2021/5570104
- By:
- Publication type:
- Article
Exploring Security Vulnerabilities of Deep Learning Models by Adversarial Attacks.
- Published in:
- Wireless Communications & Mobile Computing, 2021, p. 1, doi. 10.1155/2021/9969867
- By:
- Publication type:
- Article
Vehicle to Everything (V2X) and Edge Computing: A Secure Lifecycle for UAV-Assisted Vehicle Network and Offloading with Blockchain.
- Published in:
- Drones (2504-446X), 2022, v. 6, n. 12, p. 377, doi. 10.3390/drones6120377
- By:
- Publication type:
- Article
GAAT: Group Adaptive Adversarial Training to Improve the Trade-Off Between Robustness and Accuracy.
- Published in:
- International Journal of Pattern Recognition & Artificial Intelligence, 2022, v. 36, n. 13, p. 1, doi. 10.1142/S0218001422510156
- By:
- Publication type:
- Article
An image encryption scheme based on precision limited chaotic system.
- Published in:
- Multimedia Tools & Applications, 2020, v. 79, n. 27/28, p. 19387, doi. 10.1007/s11042-020-08826-5
- By:
- Publication type:
- Article
Adversarial Attack and Defense Strategies of Speaker Recognition Systems: A Survey.
- Published in:
- Electronics (2079-9292), 2022, v. 11, n. 14, p. N.PAG, doi. 10.3390/electronics11142183
- By:
- Publication type:
- Article
Editorial: Intelligence and Safety for Humanoid Robots: Design, Control, and Applications.
- Published in:
- 2021
- By:
- Publication type:
- Editorial
Applying artificial bee colony algorithm to the multidepot vehicle routing problem.
- Published in:
- Software: Practice & Experience, 2022, v. 52, n. 3, p. 756, doi. 10.1002/spe.2838
- By:
- Publication type:
- Article
AARF: Autonomous Attack Response Framework for Honeypots to Enhance Interaction Based on Multi-Agent Dynamic Game.
- Published in:
- Mathematics (2227-7390), 2024, v. 12, n. 10, p. 1508, doi. 10.3390/math12101508
- By:
- Publication type:
- Article
IPAttributor: Cyber Attacker Attribution with Threat Intelligence-Enriched Intrusion Data.
- Published in:
- Mathematics (2227-7390), 2024, v. 12, n. 9, p. 1364, doi. 10.3390/math12091364
- By:
- Publication type:
- Article
Latin Matchings and Ordered Designs OD (n −1, n , 2 n −1) †.
- Published in:
- Mathematics (2227-7390), 2022, v. 10, n. 24, p. 4703, doi. 10.3390/math10244703
- By:
- Publication type:
- Article
An interpretability security framework for intelligent decision support systems based on saliency map.
- Published in:
- International Journal of Information Security, 2023, v. 22, n. 5, p. 1249, doi. 10.1007/s10207-023-00689-9
- By:
- Publication type:
- Article
Learning to Discriminate Adversarial Examples by Sensitivity Inconsistency in IoHT Systems.
- Published in:
- Journal of Healthcare Engineering, 2023, p. 1, doi. 10.1155/2023/1177635
- By:
- Publication type:
- Article
Rust-Style Patch: A Physical and Naturalistic Camouflage Attacks on Object Detector for Remote Sensing Images.
- Published in:
- Remote Sensing, 2023, v. 15, n. 4, p. 885, doi. 10.3390/rs15040885
- By:
- Publication type:
- Article
A Lightweight Privacy-Preserving System for the Security of Remote Sensing Images on IoT.
- Published in:
- Remote Sensing, 2022, v. 14, n. 24, p. 6371, doi. 10.3390/rs14246371
- By:
- Publication type:
- Article
A Low-Latency and Energy-Efficient Neighbor Discovery Algorithm for Wireless Sensor Networks †.
- Published in:
- Sensors (14248220), 2020, v. 20, n. 3, p. 657, doi. 10.3390/s20030657
- By:
- Publication type:
- Article
A Fine-Grained Video Encryption Service Based on the Cloud-Fog-Local Architecture for Public and Private Videos.
- Published in:
- Sensors (14248220), 2019, v. 19, n. 24, p. 5366, doi. 10.3390/s19245366
- By:
- Publication type:
- Article
A Practical Neighbor Discovery Framework for Wireless Sensor Networks.
- Published in:
- Sensors (14248220), 2019, v. 19, n. 8, p. 1887, doi. 10.3390/s19081887
- By:
- Publication type:
- Article
The Rise of "Internet of Things": Review and Open Research Issues Related to Detection and Prevention of IoT-Based Security Attacks.
- Published in:
- Wireless Communications & Mobile Computing, 2022, p. 1, doi. 10.1155/2022/8669348
- By:
- Publication type:
- Article
Region inpainting algorithm of mouth-muffles for facial recognition.
- Published in:
- Telecommunications Science, 2021, v. 37, n. 8, p. 66, doi. 10.11959/j.issn.1000-0801.2021193
- By:
- Publication type:
- Article
Integration of a novel 3D chaotic map with ELSS and novel cross-border pixel exchange strategy for secure image communication.
- Published in:
- Complex & Intelligent Systems, 2024, v. 10, n. 6, p. 8433, doi. 10.1007/s40747-024-01568-z
- By:
- Publication type:
- Article
Enhancing the Privacy of Network Services through Trusted Computing.
- Published in:
- Applied Sciences (2076-3417), 2022, v. 12, n. 18, p. 9191, doi. 10.3390/app12189191
- By:
- Publication type:
- Article
Deep Residual Learning for Image Recognition: A Survey.
- Published in:
- Applied Sciences (2076-3417), 2022, v. 12, n. 18, p. 8972, doi. 10.3390/app12188972
- By:
- Publication type:
- Article
A High-Quality Authenticatable Visual Secret Sharing Scheme Using SGX.
- Published in:
- Wireless Communications & Mobile Computing, 2021, p. 1, doi. 10.1155/2021/6660709
- By:
- Publication type:
- Article
A Privacy Protection Framework for Medical Image Security without Key Dependency Based on Visual Cryptography and Trusted Computing.
- Published in:
- Computational Intelligence & Neuroscience, 2023, p. 1, doi. 10.1155/2023/6758406
- By:
- Publication type:
- Article
Rethinking multi‐spatial information for transferable adversarial attacks on speaker recognition systems.
- Published in:
- CAAI Transactions on Intelligence Technology, 2024, v. 9, n. 3, p. 620, doi. 10.1049/cit2.12295
- By:
- Publication type:
- Article
Adversarial Attacks on License Plate Recognition Systems.
- Published in:
- Computers, Materials & Continua, 2020, v. 65, n. 2, p. 1437, doi. 10.32604/cmc.2020.011834
- By:
- Publication type:
- Article
Adversarial Attacks on Content-Based Filtering Journal Recommender Systems.
- Published in:
- Computers, Materials & Continua, 2020, v. 64, n. 3, p. 1755, doi. 10.32604/cmc.2020.010739
- By:
- Publication type:
- Article
NormalAttack: Curvature-Aware Shape Deformation along Normals for Imperceptible Point Cloud Attack.
- Published in:
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/1186633
- By:
- Publication type:
- Article