-
341
Byzantine-robust federated learning over Non-IID data
Published 2023-06-01Subjects: Get full text
Article -
342
Design of a Flapping Aircraft with Variable Angles of Attack Based on a RC/RRU Parallel Mechanism
Published 2023-10-01Subjects: Get full text
Article -
343
Study of SDN intrusion intent identification algorithm based on Bayesian attack graph
Published 2023-04-01Subjects: Get full text
Article -
344
Provable secure digital watermarking scheme
Published 2008-01-01Subjects: “…watermarking protocol attack…”
Get full text
Article -
345
LDoS attack detection method based on simple statistical features
Published 2022-11-01Subjects: Get full text
Article -
346
New certificateless aggregate signature scheme with universal designated verifier
Published 2017-11-01Subjects: Get full text
Article -
347
Distribution of Corrosion Attack in Chloride Exposed Concrete – Summary of Field Observations
Published 2024-12-01Subjects: Get full text
Article -
348
“Yeni Terörizm”in Geleceğin Güvenlik Ortamına Etkileri: Daeş Örneği
Published 2019-12-01Subjects: Get full text
Article -
349
Optimizing Stroke Detection Using Evidential Networks and Uncertainty-Based Refinement
Published 2025-01-01Subjects: Get full text
Article -
350
Efficient detection technology of DDoS attacks based onBF-DT-CUSUM algorithm in smart grid industrial control system
Published 2015-12-01Subjects: Get full text
Article -
351
Efficiently non-authenticated group key management protocol withstand interruption attack
Published 2009-01-01Subjects: Get full text
Article -
352
Research on differential privacy protection parameter configuration method based on confidence level
Published 2019-08-01Subjects: “…probability inference attack model…”
Get full text
Article -
353
Software diversity evaluation method based on the properties of ROP/JOP gadgets
Published 2022-12-01Subjects: Get full text
Article -
354
Survey of wireless sensor network security techniques
Published 2007-01-01Subjects: Get full text
Article -
355
Secure localization scheme against wormhole attack for wireless sensor networks
Published 2015-03-01Subjects: Get full text
Article -
356
Political rhetoric used by the main parties in the final debate before the 1999 election
Published 2022-10-01Subjects: Get full text
Article -
357
Related-key impossible differential attack on a lightweight block cipher MIBS
Published 2014-02-01Subjects: “…impossible differential attack…”
Get full text
Article -
358
Stealthy data poisoning attack method on offline reinforcement learning in unmanned systems
Published 2024-12-01Subjects: Get full text
Article -
359
Improvement of lightweight threshold group signature scheme
Published 2020-08-01Subjects: Get full text
Article -
360
Attack detection method based on spatiotemporal event correlation in intranet environment
Published 2020-01-01Subjects: Get full text
Article