-
181
ROBO-SPOT: Detecting Robocalls by Understanding User Engagement and Connectivity Graph
Published 2024-06-01Get full text
Article -
182
-
183
Giant Posttraumatic Angiolipoma of the Forearm: A Case Report and Review of the Literature
Published 2021-01-01Get full text
Article -
184
Pain Management for Nerve Injury following Dental Implant Surgery at Tokyo Dental College Hospital
Published 2012-01-01“…Moreover, if sensory damage does occur it is essential to avoid breaking the bond of trust between dentist and patient by giving false assurances of recovery. …”
Get full text
Article -
185
Quantum theory-inspired inter-sentence semantic interaction model for textual adversarial defense
Published 2024-12-01Get full text
Article -
186
-
187
IRMAOC: an interpretable role mining algorithm based on overlapping clustering
Published 2025-01-01Get full text
Article -
188
Privacy and Security in Digital Health Contact-Tracing: A Narrative Review
Published 2025-01-01Get full text
Article -
189
-
190
-
191
Collusion-Tolerable and Efficient Privacy-Preserving Time-Series Data Aggregation Protocol
Published 2016-07-01“…In this paper, we proposed an efficient aggregation protocol which tolerates up to k passive adversaries that do not try to tamper the computation. The proposed protocol does not require a trusted key dealer and needs only one initialization during the whole time-series data aggregation. …”
Get full text
Article -
192
Formal Verification of ERC-Based Smart Contracts: A Systematic Literature Review
Published 2025-01-01“…Defined as an agreement between multiple parties and systematically executed by a computer code, smart contracts enable trust-less execution without a third party. …”
Get full text
Article -
193
Social diagnostics of information security of digital society: methodological and regulatory aspects
Published 2020-02-01“…The essence of digital society as an object of protection from adverse effects at the technological level (computer, software and hardware base of digital communications), as well as at the level of content distributed in the information and communication network “Internet” has been stated. …”
Get full text
Article -
194
-
195
Blockchain‐Enabled Car Sharing: Enhancing Reliability and Vehicle History Management
Published 2025-01-01Get full text
Article -
196
Enhancing Agricultural Disease Detection: A Multi‐Model Deep Learning Novel Approach
Published 2025-01-01Get full text
Article -
197
Automated Bitcoin Trading dApp Using Price Prediction from a Deep Learning Model
Published 2025-01-01Get full text
Article -
198
Investigating and prioritizing the factors affecting the success of e-commerce using the best and worst (BWM) technique.
Published 2024-05-01“…For example, researchers in e-commerce have mentioned the skills and techniques of gaining customer trust as an essential factor (Murphy & Tocher, 2011). …”
Get full text
Article -
199
Lattice‐based unidirectional Proxy Re‐Encryption and Proxy Re‐Encryption+ schemes
Published 2021-01-01“…In this concept, a semi‐trusted proxy user acquires a re‐encryption key from the delegator. …”
Get full text
Article -
200
Remodeling the light-adapted electroretinogram using a bayesian statistical approach
Published 2025-01-01Get full text
Article