nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
An effective digital audio watermarking using a deep convolutional neural network with a search location optimization algorithm for improvement in Robustness and Imperceptibility
|
Patil, Abhijit J. |
|
|
3 |
4 |
p. |
artikel |
2 |
An efficient identity-based signature protocol over lattices for the smart grid
|
Zhu, Longzhu |
|
|
3 |
4 |
p. |
artikel |
3 |
An insider user authentication method based on improved temporal convolutional network
|
Tao, Xiaoling |
|
|
3 |
4 |
p. |
artikel |
4 |
A novel GPU based Geo-Location Inference Attack on WebGL framework
|
Mai, Weixian |
|
|
3 |
4 |
p. |
artikel |
5 |
Blockchain data secure sharing protocol based on threshold Paillier algorithm
|
Jia, Likai |
|
|
3 |
4 |
p. |
artikel |
6 |
Capsule networks embedded with prior known support information for image reconstruction
|
Wang, Meng |
|
|
3 |
4 |
p. |
artikel |
7 |
JFinder: A novel architecture for java vulnerability identification based quad self-attention and pre-training mechanism
|
Wang, Jin |
|
|
3 |
4 |
p. |
artikel |
8 |
Knowledge-based recommendation with contrastive learning
|
He, Yang |
|
|
3 |
4 |
p. |
artikel |
9 |
Machine learning job failure analysis and prediction model for the cloud environment
|
Bommala, Harikrishna |
|
|
3 |
4 |
p. |
artikel |
10 |
Provably secure authentication protocol for traffic exchanges in unmanned aerial vehicles
|
Nyangaresi, Vincent Omollo |
|
|
3 |
4 |
p. |
artikel |