-
441
Graph coarsening for fugitive interception
Published 2025-01-01Subjects: “…Graph coarsening…”
Get full text
Article -
442
A graph backdoor detection method for data collection scenarios
Published 2025-01-01Subjects: Get full text
Article -
443
-
444
Quantitative method for network security situation based on attack prediction
Published 2017-10-01Subjects: Get full text
Article -
445
Uncovering and estimating complementarity in urban lives
Published 2025-02-01Subjects: Get full text
Article -
446
MO-GCN: A multi-omics graph convolutional network for discriminative analysis of schizophrenia
Published 2025-02-01Subjects: Get full text
Article -
447
Graph-based D2D communication resource allocation algorithm in full duplex network
Published 2018-10-01Subjects: Get full text
Article -
448
Efficient algorithm for calculating short cycles in Tanner graph based on matrix computation
Published 2017-04-01Subjects: “…Tanner graph…”
Get full text
Article -
449
Dual-Targeted adversarial example in evasion attack on graph neural networks
Published 2025-01-01Subjects: “…Graph neural network…”
Get full text
Article -
450
With just one tap. Network study of tweets dissemination during the war in Ukraine
Published 2025-12-01Subjects: Get full text
Article -
451
Autonomous security analysis and penetration testing model based on attack graph and deep Q-learning network
Published 2023-12-01Subjects: Get full text
Article -
452
Access control relationship prediction method based on GNN dual source learning
Published 2022-10-01Subjects: Get full text
Article -
453
Configuration Synthesis of Actuators for Underwater Vehicles<italic>'</italic> Receiving and Placing System
Published 2024-07-01Subjects: “…Graph theory…”
Get full text
Article -
454
Turing patterns in a networked vegetation model
Published 2024-11-01Subjects: Get full text
Article -
455
Smart contract vulnerability detection method based on pre-training and novel timing graph neural network
Published 2024-09-01Subjects: Get full text
Article -
456
Honeypot contract detection method for Ethereum based on source code structure and graph attention network
Published 2023-09-01Subjects: Get full text
Article -
457
Survey of attack graph based network security metric
Published 2018-09-01Subjects: Get full text
Article -
458
Pre-processing of paleogenomes: mitigating reference bias and postmortem damage in ancient genome data
Published 2025-01-01Subjects: Get full text
Article -
459
Dynamic spectrum allocation for cognitive radio sensor networks based on improved genetic algorithm
Published 2017-08-01Subjects: Get full text
Article -
460
Bypass node non-redundant adding algorithm for crossing-level data transmission in two-dimension reconfigurable cell array
Published 2015-04-01Subjects: Get full text
Article