EEJE: Two-Step Input Transformation for Robust DNN against Adversarial Examples | 0 | 0.34 | 2021 |
Robust Indoor Localization Methods Using Random Forest-Based Filter Against Mac Spoofing Attack | 0 | 0.34 | 2020 |
Secure and Blockchain-Based Emergency Driven Message Protocol for 5G Enabled Vehicular Edge Computing. | 1 | 0.36 | 2020 |
Unsupervised multi-stage attack detection framework without details on single-stage attacks | 0 | 0.34 | 2019 |
Dynamic Nonparametric Random Forest Using Covariance. | 0 | 0.34 | 2019 |
Authentication Protocol for Wearable Devices Using Mobile Authentication Proxy. | 0 | 0.34 | 2018 |
Efficient Proximity Computation Techniques Using ZIP Code Data for Smart Cities †. | 0 | 0.34 | 2018 |
w-Bit Shifting Non-Adjacent Form Conversion. | 0 | 0.34 | 2018 |
Memory-Efficient Random Forest Generation Method for Network Intrusion Detection | 1 | 0.34 | 2018 |
Privacy-Preserving Compressed Reference-Oriented Alignment Map Using Decentralized Storage. | 0 | 0.34 | 2018 |
An Enhanced Map-Matching Algorithm for Real-Time Position Accuracy Improvement with a Low-Cost GPS Receiver. | 0 | 0.34 | 2018 |
A similarity query system for road traffic data based on a NoSQL document store. | 1 | 0.35 | 2017 |
Secure and Lightweight Cloud-Assisted Video Reporting Protocol over 5G-Enabled Vehicular Networks. | 1 | 0.35 | 2017 |
A game theoretic model for dynamic configuration of large-scale intrusion detection signatures | 2 | 0.37 | 2016 |