Adversarial domain adaptation network with pseudo-siamese feature extractors for cross-bearing fault transfer diagnosis | 0 | 0.34 | 2022 |
Blockchain and Homomorphic Encryption For Digital Copyright Protection. | 0 | 0.34 | 2020 |
Binary Executable Files Homology Detection with Genetic Algorithm. | 0 | 0.34 | 2020 |
Dynamic API call sequence visualisation for malware classification | 2 | 0.38 | 2019 |
Android Malware Identification Through Visual Exploration of Disambly Files. | 0 | 0.34 | 2018 |
Clustering Based K-anonymity Algorithm for Privacy Preservation. | 0 | 0.34 | 2017 |
Multi-level Grid Based Clustering and GPU Parallel Implementations | 0 | 0.34 | 2017 |
A Lightweight RFID Security Protocol Based on Elliptic Curve Crytography. | 5 | 0.47 | 2016 |
Malicious Behavior Monitoring for Android Applications. | 0 | 0.34 | 2016 |
Grid-based high performance ensemble classification for evolving data stream. | 1 | 0.37 | 2016 |
Efficiency Priority Schedule Mechanism with Network Coding in Wireless Networks | 0 | 0.34 | 2014 |
Opportunistic Scheduling and Performance Analysis on Wireless Network Coding | 5 | 0.61 | 2011 |