A Preliminary Study of Bots Usage in Open Source Community | 0 | 0.34 | 2022 |
Multicast Key Agreement, Revisited. | 0 | 0.34 | 2021 |
An Ordered Curtailment Strategy for Offshore Wind Power Under Extreme Weather Conditions Considering the Resilience of the Grid | 0 | 0.34 | 2019 |
Review of the false data injection attack against the cyber-physical power system | 2 | 0.64 | 2019 |
Distributed data-dependent locality sensitive hashing. | 0 | 0.34 | 2019 |
Rational adversary with flexible utility in secure two-party computation | 1 | 0.35 | 2019 |
A Security Concern About Deep Learning Models. | 0 | 0.34 | 2018 |
Generating Misleading Labels in Machine Learning Models. | 0 | 0.34 | 2018 |
Optimized installation angle and distance of a grading channel for dried jujube fruit with a push-pull actuating mechanism. | 0 | 0.34 | 2018 |
A Partial Demand Fulfilling Capacity Constrained Clustering Algorithm to Static Bike Rebalancing Problem. | 0 | 0.34 | 2018 |
Unusual News Flow and the Cross Section of Stock Returns | 0 | 0.34 | 2018 |
Dynamic Conditional Beta Is Alive and Well in the Cross Section of Daily Stock Returns. | 0 | 0.34 | 2017 |
A low-complexity resource allocation algorithm in OFDMA-based cooperative cognitive radio networks. | 0 | 0.34 | 2017 |
k-out-of-n oblivious transfer protocol with security against malicious adversaries. | 0 | 0.34 | 2017 |
Detection of content-aware image resizing based on Benford's law. | 0 | 0.34 | 2017 |
Overview of the co-simulation methods for power and communication system | 0 | 0.34 | 2016 |