Found: 8
Select item for more details and to access through your institution.
Cognitive Covert Traffic Synthesis Method Based on Generative Adversarial Network.
- Published in:
- Wireless Communications & Mobile Computing, 2021, p. 1, doi. 10.1155/2021/9982351
- By:
- Publication type:
- Article
A Clustering Offloading Decision Method for Edge Computing Tasks Based on Deep Reinforcement Learning.
- Published in:
- New Generation Computing, 2023, v. 41, n. 1, p. 85, doi. 10.1007/s00354-022-00199-7
- By:
- Publication type:
- Article
Anonymous traffic classification based on three-dimensional Markov images and deep learning.
- Published in:
- Bulletin of the Polish Academy of Sciences: Technical Sciences, 2023, v. 71, n. 4, p. 1, doi. 10.24425/bpasts.2023.145676
- By:
- Publication type:
- Article
Android Malware Detection Technology Based on Lightweight Convolutional Neural Networks.
- Published in:
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/8893764
- By:
- Publication type:
- Article
Publishing Triangle Counting Histogram in Social Networks Based on Differential Privacy.
- Published in:
- Security & Communication Networks, 2021, p. 1, doi. 10.1155/2021/7206179
- By:
- Publication type:
- Article
Effect of SCN1Aand SCN2A gene polymorphisms on the efficacy of valproic acid treatment in Chinese children with epilepsy.
- Published in:
- PLoS ONE, 2024, v. 19, n. 6, p. 1, doi. 10.1371/journal.pone.0304869
- By:
- Publication type:
- Article
An Improved Quantum-Inspired Genetic Algorithm for Image Multilevel Thresholding Segmentation.
- Published in:
- Mathematical Problems in Engineering, 2014, p. 1, doi. 10.1155/2014/295402
- By:
- Publication type:
- Article
Markov‐GAN: Markov image enhancement method for malicious encrypted traffic classification.
- Published in:
- IET Information Security (Wiley-Blackwell), 2022, v. 16, n. 6, p. 442, doi. 10.1049/ise2.12071
- By:
- Publication type:
- Article