A New Website Fingerprinting Method for Tor Hidden Service
Neuroevolutionary Convolutional Neural Network Design for Low Resolution Face Re...
Multimodal Autism Spectrum Disorder Method Using GCN With Dual Transformers
Enhancing Cybersecurity of a Hydroelectric Power Plant Through Digital Twin Mode...
Securing Software Defined Networks A Comprehensive Analysis of Approaches, Appli...
Fully Automated Software Product Line Evolution With Diverse Artifacts
Network Based Video Recommendation Using Viewing Patterns and Modularity Analysi...
Android Malware Detection Method Combining Multi Frequency Features and Convolut...
A Bearing Fault Diagnosis Method Based on Hierarchical Belief Rule Base With Pow...
Fast Decision Making of Point Cloud Video Geometry CU Partition Based on Occupie...
XAI for Point Cloud Data Using Perturbations Based on Meaningful Segmentation
Enhanced UAV Detection and Classification With Birds Using NLFM Pulse Doppler Radar
Modeling and Predicting Uncertainty in Tidal Turbine Power Output A Data Driven ...
A Review on Security Challenges in V2X Communications Technology for VANETs
The Art of Retention Advancing Sustainable Management Through Age Diverse Turnov...
r, k, ? Anonymization Privacy Preserving Data Publishing Algorithm Based on Mult...