Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             32 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 ACCEL: an efficient and privacy-preserving federated logistic regression scheme over vertically partitioned data Zhao, Jiaqi

65 7 artikel
2 A layered grouping random access scheme based on dynamic preamble selection for massive machine type communications Cheng, Gaofeng

65 7 artikel
3 An empirical study of security issues in SSO server-side implementations Wang, Hui

65 7 artikel
4 Automatic target recognition combining angular diversity and time diversity for multistatic passive radar Cao, Xiaomao

65 7 artikel
5 Certified defense against patch attacks via mask-guided randomized smoothing Zhang, Kui

65 7 artikel
6 Common quantitative characteristics of music melodies — pursuing the constrained entropy maximization casually in composition Nan, Nan

65 7 artikel
7 Communication and performance evaluation of 3-ary n-cubes onto network-on-chips Fan, Weibei

65 7 artikel
8 Complex network approach for the evaluation of asphalt pavement design and construction: a longitudinal study Liu, Hanjie

65 7 artikel
9 Defensive deception framework against reconnaissance attacks in the cloud with deep reinforcement learning Li, Huanruo

65 7 artikel
10 3DPF-FBN: video inpainting by jointly 3D-patch filling and neural network refinement Huang, Yan

65 7 artikel
11 Explicit construction of minimum bandwidth rack-aware regenerating codes Zhou, Liyang

65 7 artikel
12 Extending generalized unsupervised manifold alignment Yin, Xiaoyi

65 7 artikel
13 Fault estimation based on high order iterative learning scheme for systems subject to nonlinear uncertainties Feng, Li

65 7 artikel
14 Heterogeneous memory enhanced graph reasoning network for cross-modal retrieval Ji, Zhong

65 7 artikel
15 Intelligent networking in adversarial environment: challenges and opportunities Zhao, Yi

65 7 artikel
16 Locating multiple roots of nonlinear equation systems via multi-strategy optimization algorithm with sequence quadratic program Liang, Jing

65 7 artikel
17 Malware incident response (IR) informed by cyber threat intelligence (CTI) He, Ying

65 7 artikel
18 MPC-based strategy for longitudinal and lateral stabilization of a vehicle under extreme conditions Li, Zihan

65 7 artikel
19 Multicriteria optimization problems of finite horizon stochastic cooperative linear-quadratic difference games Peng, Chenchen

65 7 artikel
20 Non-IID federated learning via random exchange of local feature maps for textile IIoT secure computing Peng, Bo

65 7 artikel
21 One-bit quantization is good for programmable coding metasurfaces Shuang, Ya

65 7 artikel
22 Pan-location mapping and localization for the in-situ science exploration of Zhurong Mars rover Zeng, Xingguo

65 7 artikel
23 Perspectives from the second Global Forum on Development of Computer Science Yao, Andrew Chi-Chih

65 7 artikel
24 Polarized spatial and directional modulation toward secure wireless transmission Chen, Jiangong

65 7 artikel
25 Post quantum secure fair data trading with deterability based on machine learning Liu, Jinhui

65 7 artikel
26 Reliable resource allocation with RF fingerprinting authentication in secure IoT networks Wu, Weiwei

65 7 artikel
27 Robust fixed-time output-feedback control for linear systems without chattering: an exact uncertainty compensation method Shi, Shang

65 7 artikel
28 SAND: semi-automated adaptive network defense via programmable rule generation and deployment Chen, Haoyu

65 7 artikel
29 The impact of information dissemination on vaccination in multiplex networks Li, Xiao-Jie

65 7 artikel
30 Time-scheduled observer design for switched linear systems with unknown inputs Shi, Shuang

65 7 artikel
31 Towards characterizing bug fixes through dependency-level changes in Apache Java open source projects Cui, Di

65 7 artikel
32 VulnerGAN: a backdoor attack through vulnerability amplification against machine learning-based network intrusion detection systems Liu, Guangrui

65 7 artikel
                             32 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland