Found: 26
Select item for more details and to access through your institution.
Contiguous Loss for Motion-Based, Non-Aligned Image Deblurring.
- Published in:
- Symmetry (20738994), 2021, v. 13, n. 4, p. 630, doi. 10.3390/sym13040630
- By:
- Publication type:
- Article
A Training-Based Identification Approach to VIN Adversarial Examples in Path Planning.
- Published in:
- Journal of Circuits, Systems & Computers, 2021, v. 30, n. 13, p. 1, doi. 10.1142/S0218126621502297
- By:
- Publication type:
- Article
Development and Comprehensive Evaluation of Ecological Agriculture Industry Chain System Based on Genetic Algorithm.
- Published in:
- Advances in Multimedia, 2022, p. 1, doi. 10.1155/2022/3768943
- By:
- Publication type:
- Article
An Audit Risk Model Based on Improved BP Neural Network Data Mining Algorithm.
- Published in:
- Advances in Multimedia, 2022, p. 1, doi. 10.1155/2022/9977292
- By:
- Publication type:
- Article
Exploring probabilistic follow relationship to prevent collusive peer-to-peer piracy.
- Published in:
- Knowledge & Information Systems, 2016, v. 48, n. 1, p. 111, doi. 10.1007/s10115-015-0864-1
- By:
- Publication type:
- Article
A differentially private algorithm for location data release.
- Published in:
- Knowledge & Information Systems, 2016, v. 47, n. 3, p. 647, doi. 10.1007/s10115-015-0856-1
- By:
- Publication type:
- Article
Request routing through collaborative in-network caching for bandwidth optimization: a methodology.
- Published in:
- Transactions on Emerging Telecommunications Technologies, 2017, v. 28, n. 1, p. n/a, doi. 10.1002/ett.2947
- By:
- Publication type:
- Article
Energy Efficient Sleep Schedule with Service Coverage Guarantee in Wireless Sensor Networks.
- Published in:
- Journal of Network & Systems Management, 2016, v. 24, n. 4, p. 834, doi. 10.1007/s10922-015-9361-9
- By:
- Publication type:
- Article
Recover Fault Services via Complex Service-to-Node Mappings in Wireless Sensor Networks.
- Published in:
- Journal of Network & Systems Management, 2015, v. 23, n. 3, p. 474, doi. 10.1007/s10922-014-9302-z
- By:
- Publication type:
- Article
Context-Aware Service Ranking in Wireless Sensor Networks.
- Published in:
- Journal of Network & Systems Management, 2014, v. 22, n. 1, p. 50, doi. 10.1007/s10922-012-9259-8
- By:
- Publication type:
- Article
A Policy-Based Web Service Redundancy Detection in Wireless Sensor Networks.
- Published in:
- Journal of Network & Systems Management, 2013, v. 21, n. 3, p. 384, doi. 10.1007/s10922-012-9237-1
- By:
- Publication type:
- Article
Semisupervised SVM Based on Cuckoo Search Algorithm and Its Application.
- Published in:
- Mathematical Problems in Engineering, 2018, p. 1, doi. 10.1155/2018/8243764
- By:
- Publication type:
- Article
Adversarial attack and defense in reinforcement learning-from AI security view.
- Published in:
- Cybersecurity (2523-3246), 2019, v. 2, n. 1, p. N.PAG, doi. 10.1186/s42400-019-0027-x
- By:
- Publication type:
- Article
Adversarial retraining attack of asynchronous advantage actor‐critic based pathfinding.
- Published in:
- International Journal of Intelligent Systems, 2021, v. 36, n. 5, p. 2323, doi. 10.1002/int.22380
- By:
- Publication type:
- Article
An Empirical Study on GAN-Based Traffic Congestion Attack Analysis: A Visualized Method.
- Published in:
- Wireless Communications & Mobile Computing, 2020, p. 1, doi. 10.1155/2020/8823300
- By:
- Publication type:
- Article
An Empirical Study on GAN-Based Traffic Congestion Attack Analysis: A Visualized Method.
- Published in:
- Wireless Communications & Mobile Computing, 2020, p. 1, doi. 10.1155/2020/8823300
- By:
- Publication type:
- Article
New advances in securing cyberspace and curbing crowdturfing.
- Published in:
- 2017
- By:
- Publication type:
- Editorial
Securing cyberspace.
- Published in:
- 2016
- By:
- Publication type:
- Editorial
Security Analysis on Blockchain-Powered Mobile APPs Connected with In-Vehicle Networks by Context-Based Reverse Engineering.
- Published in:
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/7144516
- By:
- Publication type:
- Article
Survey on Astroturfing Detection and Analysis from an Information Technology Perspective.
- Published in:
- Security & Communication Networks, 2021, p. 1, doi. 10.1155/2021/3294610
- By:
- Publication type:
- Article
Efficient Multiple Kernel Learning Algorithms Using Low-Rank Representation.
- Published in:
- Computational Intelligence & Neuroscience, 2017, p. 1, doi. 10.1155/2017/3678487
- By:
- Publication type:
- Article
A Novel Graph Constructor for Semisupervised Discriminant Analysis: Combined Low-Rank and k-Nearest Neighbor Graph.
- Published in:
- Computational Intelligence & Neuroscience, 2017, p. 1, doi. 10.1155/2017/9290230
- By:
- Publication type:
- Article
Congestion Attack Detection in Intelligent Traffic Signal System: Combining Empirical and Analytical Methods.
- Published in:
- Security & Communication Networks, 2021, p. 1, doi. 10.1155/2021/1632825
- By:
- Publication type:
- Article
Towards Revealing Parallel Adversarial Attack on Politician Socialnet of Graph Structure.
- Published in:
- Security & Communication Networks, 2021, p. 1, doi. 10.1155/2021/6631247
- By:
- Publication type:
- Article
Exposing Spoofing Attack on Flocking-Based Unmanned Aerial Vehicle Cluster: A Threat to Swarm Intelligence.
- Published in:
- Security & Communication Networks, 2020, p. 1, doi. 10.1155/2020/8889122
- By:
- Publication type:
- Article
Exposing Spoofing Attack on Flocking-Based Unmanned Aerial Vehicle Cluster: A Threat to Swarm Intelligence.
- Published in:
- Security & Communication Networks, 2020, p. 1, doi. 10.1155/2020/8889122
- By:
- Publication type:
- Article