-
201
2022–2023 Florida Citrus Production Guide: Soft-Bodied insects Attacking Foliage and Fruit
Published 2022-08-01Get full text
Article -
202
Kiai sebagai Konselor: Pendekatan Spiritual dalam Mereduksi Panic Attack Santri di Pesantren
Published 2024-12-01Subjects: Get full text
Article -
203
Ensemble of feature augmented convolutional neural network and deep autoencoder for efficient detection of network attacks
Published 2025-02-01“…Also, the proposed method improved the detection rate of minority attack classes like U2R in NSLKDD and Hearbleed in CICIDS2017.…”
Get full text
Article -
204
A Hidden Surveillant Transmission Line Protection Layer for Cyber-Attack Resilience of Power Systems
Published 2025-01-01“…This article proposes a framework to enhance the resilience of cyber-physical power systems (CPPSs) against cyber-attacks that are capable of bypassing the cyber-based defense mechanisms. …”
Get full text
Article -
205
Learning deep forest for face anti-spoofing: An alternative to the neural network against adversarial attacks
Published 2024-10-01Subjects: Get full text
Article -
206
2006 Florida Citrus Pest Management Guide: Soft-Bodied Insects Attacking Foliage and Fruit
Published 2006-08-01“…ENY-604/CG004: 2021–2022 Florida Citrus Production Guide: Soft-Bodied Insects Attacking Foliage and Fruit (ufl.edu) …”
Get full text
Article -
207
2020–2021 Florida Citrus Production Guide: Soft-Bodied Insects Attacking Foliage and Fruit
Published 2020-08-01Get full text
Article -
208
Paroxysmal Sneezing at the Onset of Syncopes and Transient Ischemic Attack Revealing a Papillary Cardiac Fibroelastoma
Published 2014-01-01“…To the best of our knowledge, this is the first description of a transient ischemic attack due to cardiac papillary fibroelastoma and revealed by violent episodes of sneezing.…”
Get full text
Article -
209
Local feature encoding for unknown presentation attack detection: An analysis of different local feature descriptors
Published 2021-07-01“…Abstract In spite of the advantages of using fingerprints for subject authentication, several works have shown that fingerprint recognition systems can be easily circumvented by means of artificial fingerprints or presentation attack instruments (PAIs). In order to address that threat, the existing presentation attack detection (PAD) methods have reported a high detection performance when materials used for the fabrication of PAIs and capture devices are known. …”
Get full text
Article -
210
The White Matter Functional Abnormalities in Patients with Transient Ischemic Attack: A Reinforcement Learning Approach
Published 2022-01-01“…Background. Transient ischemic attack (TIA) is a known risk factor for stroke. Abnormal alterations in the low-frequency range of the gray matter (GM) of the brain have been studied in patients with TIA. …”
Get full text
Article -
211
2006 Florida Citrus Pest Management Guide: Soft-Bodied Insects Attacking Foliage and Fruit
Published 2006-08-01“…ENY-604/CG004: 2021–2022 Florida Citrus Production Guide: Soft-Bodied Insects Attacking Foliage and Fruit (ufl.edu) …”
Get full text
Article -
212
A Lightweight Mitigation Technique Against a Modified Version Number Attack in IoT Networks
Published 2025-01-01“…Comparable QoS performance to the attack-free RPL was also maintained during the attack.…”
Get full text
Article -
213
2018–2019 Florida Citrus Production Guide: Soft-Bodied Insects Attacking Foliage and Fruit
Published 2018-08-01Get full text
Article -
214
Increasing Neural-Based Pedestrian Detectors’ Robustness to Adversarial Patch Attacks Using Anomaly Localization
Published 2025-01-01Subjects: “…adversarial patch attack…”
Get full text
Article -
215
-
216
2018–2019 Florida Citrus Production Guide: Soft-Bodied Insects Attacking Foliage and Fruit
Published 2018-08-01Get full text
Article -
217
Hacking Exposed: Leveraging Google Dorks, Shodan, and Censys for Cyber Attacks and the Defense Against Them
Published 2025-01-01“…Among the most commonly used tools at an attacker’s disposal are Google dorks, Shodan, and Censys, which offer unprecedented access to exposed systems, devices, and sensitive data on the World Wide Web. …”
Get full text
Article -
218
2019–2020 Florida Citrus Production Guide: Soft-Bodied Insects Attacking Foliage and Fruit
Published 2019-08-01Get full text
Article -
219
Dissipative Filter Design for Nonlinear Time-Varying-Delay Singular Systems against Deception Attacks
Published 2021-01-01“…This paper applies a T-S fuzzy model to depict a class of nonlinear time-varying-delay singular systems and investigates the dissipative filtering problem for these systems under deception attacks. The measurement output is assumed to encounter random deception attacks during signal transmission, and a Bernoulli distribution is used to describe this random phenomena. …”
Get full text
Article -
220
Defend Against Property Inference Attack for Flight Operations Data Sharing in FedMeta Framework
Published 2025-01-01Subjects: “…property inference attack…”
Get full text
Article