A Reinforcement Learning-Based Configuring Approach In Next-Generation Wireless Networks Using Software-Defined Metasurface | 0 | 0.34 | 2021 |
A New Method Of Coding For Steganography Based On Lsb Matching Revisited | 0 | 0.34 | 2021 |
Resbcdu-Net: A Deep Learning Framework For Lung Ct Image Segmentation | 0 | 0.34 | 2021 |
Yaicd: Yet Another Imsi Catcher Detector In Gsm | 0 | 0.34 | 2021 |
XACBench: a XACML policy benchmark | 0 | 0.34 | 2020 |
Broadcast Complexity And Adaptive Adversaries In Verifiable Secret Sharing | 0 | 0.34 | 2020 |
Printed Persian Ocr System Using Deep Learning | 0 | 0.34 | 2020 |
Deep Recurrent-Convolutional NeuralNetwork for Classification of SimultaneousEEG-fNIRS Signals | 3 | 0.51 | 2020 |
Spatio-temporal deep learning for EEG-fNIRS brain computer interface | 0 | 0.34 | 2020 |
ASCRClu: an adaptive subspace combination and reduction algorithm for clustering of high-dimensional data | 0 | 0.34 | 2020 |
Routing-Aware and Malicious Node Detection in a Concealed Data Aggregation for WSNs. | 2 | 0.37 | 2019 |
Analyzing XACML policies using answer set programming | 1 | 0.38 | 2019 |
A Provenance-Aware Multi-dimensional Reputation System for Online Rating Systems. | 1 | 0.35 | 2018 |
Subspace Clustering for High-Dimensional Data Using Cluster Structure Similarity | 0 | 0.34 | 2018 |
Light Weight Write Mechanism for Cloud Data. | 0 | 0.34 | 2018 |
A Robust and Fast Reputation System for Online Rating Systems. | 0 | 0.34 | 2017 |
Anomaly-free policy composition in software-defined networks | 1 | 0.35 | 2016 |
Method for providing secure and private fine-grained access to outsourced data | 0 | 0.34 | 2015 |
An Iterative Algorithm For Reputation Aggregation In Multi-Dimensional And Multinomial Rating Systems | 0 | 0.34 | 2015 |
Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks | 46 | 1.30 | 2015 |
A Collaborative Reputation System Based on Credibility Propagation in WSNs | 4 | 0.44 | 2015 |
A trust assessment framework for streaming data in WSNs using iterative filtering | 2 | 0.39 | 2015 |
Provenance-aware security risk analysis for hosts and network flows | 6 | 0.58 | 2014 |
MalwareMonitor: An SDN-based Framework for Securing Large Networks. | 4 | 0.43 | 2014 |
Iterative Security Risk Analysis for Network Flows Based on Provenance and Interdependency | 0 | 0.34 | 2013 |
A robust iterative filtering technique for wireless sensor networks in the presence of malicious attacks | 10 | 0.51 | 2013 |
Specification of channel codes types using the PSD and histogram attributes of the received signal | 0 | 0.34 | 2011 |
Specification and Verification of Security Policies in Firewalls | 2 | 0.37 | 2002 |