nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
ACCEL: an efficient and privacy-preserving federated logistic regression scheme over vertically partitioned data
|
Zhao, Jiaqi |
|
|
65 |
7 |
|
artikel |
2 |
A layered grouping random access scheme based on dynamic preamble selection for massive machine type communications
|
Cheng, Gaofeng |
|
|
65 |
7 |
|
artikel |
3 |
An empirical study of security issues in SSO server-side implementations
|
Wang, Hui |
|
|
65 |
7 |
|
artikel |
4 |
Automatic target recognition combining angular diversity and time diversity for multistatic passive radar
|
Cao, Xiaomao |
|
|
65 |
7 |
|
artikel |
5 |
Certified defense against patch attacks via mask-guided randomized smoothing
|
Zhang, Kui |
|
|
65 |
7 |
|
artikel |
6 |
Common quantitative characteristics of music melodies — pursuing the constrained entropy maximization casually in composition
|
Nan, Nan |
|
|
65 |
7 |
|
artikel |
7 |
Communication and performance evaluation of 3-ary n-cubes onto network-on-chips
|
Fan, Weibei |
|
|
65 |
7 |
|
artikel |
8 |
Complex network approach for the evaluation of asphalt pavement design and construction: a longitudinal study
|
Liu, Hanjie |
|
|
65 |
7 |
|
artikel |
9 |
Defensive deception framework against reconnaissance attacks in the cloud with deep reinforcement learning
|
Li, Huanruo |
|
|
65 |
7 |
|
artikel |
10 |
3DPF-FBN: video inpainting by jointly 3D-patch filling and neural network refinement
|
Huang, Yan |
|
|
65 |
7 |
|
artikel |
11 |
Explicit construction of minimum bandwidth rack-aware regenerating codes
|
Zhou, Liyang |
|
|
65 |
7 |
|
artikel |
12 |
Extending generalized unsupervised manifold alignment
|
Yin, Xiaoyi |
|
|
65 |
7 |
|
artikel |
13 |
Fault estimation based on high order iterative learning scheme for systems subject to nonlinear uncertainties
|
Feng, Li |
|
|
65 |
7 |
|
artikel |
14 |
Heterogeneous memory enhanced graph reasoning network for cross-modal retrieval
|
Ji, Zhong |
|
|
65 |
7 |
|
artikel |
15 |
Intelligent networking in adversarial environment: challenges and opportunities
|
Zhao, Yi |
|
|
65 |
7 |
|
artikel |
16 |
Locating multiple roots of nonlinear equation systems via multi-strategy optimization algorithm with sequence quadratic program
|
Liang, Jing |
|
|
65 |
7 |
|
artikel |
17 |
Malware incident response (IR) informed by cyber threat intelligence (CTI)
|
He, Ying |
|
|
65 |
7 |
|
artikel |
18 |
MPC-based strategy for longitudinal and lateral stabilization of a vehicle under extreme conditions
|
Li, Zihan |
|
|
65 |
7 |
|
artikel |
19 |
Multicriteria optimization problems of finite horizon stochastic cooperative linear-quadratic difference games
|
Peng, Chenchen |
|
|
65 |
7 |
|
artikel |
20 |
Non-IID federated learning via random exchange of local feature maps for textile IIoT secure computing
|
Peng, Bo |
|
|
65 |
7 |
|
artikel |
21 |
One-bit quantization is good for programmable coding metasurfaces
|
Shuang, Ya |
|
|
65 |
7 |
|
artikel |
22 |
Pan-location mapping and localization for the in-situ science exploration of Zhurong Mars rover
|
Zeng, Xingguo |
|
|
65 |
7 |
|
artikel |
23 |
Perspectives from the second Global Forum on Development of Computer Science
|
Yao, Andrew Chi-Chih |
|
|
65 |
7 |
|
artikel |
24 |
Polarized spatial and directional modulation toward secure wireless transmission
|
Chen, Jiangong |
|
|
65 |
7 |
|
artikel |
25 |
Post quantum secure fair data trading with deterability based on machine learning
|
Liu, Jinhui |
|
|
65 |
7 |
|
artikel |
26 |
Reliable resource allocation with RF fingerprinting authentication in secure IoT networks
|
Wu, Weiwei |
|
|
65 |
7 |
|
artikel |
27 |
Robust fixed-time output-feedback control for linear systems without chattering: an exact uncertainty compensation method
|
Shi, Shang |
|
|
65 |
7 |
|
artikel |
28 |
SAND: semi-automated adaptive network defense via programmable rule generation and deployment
|
Chen, Haoyu |
|
|
65 |
7 |
|
artikel |
29 |
The impact of information dissemination on vaccination in multiplex networks
|
Li, Xiao-Jie |
|
|
65 |
7 |
|
artikel |
30 |
Time-scheduled observer design for switched linear systems with unknown inputs
|
Shi, Shuang |
|
|
65 |
7 |
|
artikel |
31 |
Towards characterizing bug fixes through dependency-level changes in Apache Java open source projects
|
Cui, Di |
|
|
65 |
7 |
|
artikel |
32 |
VulnerGAN: a backdoor attack through vulnerability amplification against machine learning-based network intrusion detection systems
|
Liu, Guangrui |
|
|
65 |
7 |
|
artikel |