Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 528 matches
- 2024
- Talal A. A. Abdullah, Mohd Soperi Mohd Zahid, Ahmad F. Turki, Waleed Ali, Ahmad A. Jiman, Mohammed J. Abdulaal, Nebras Sobahi, Eyad T. Attar:
Sig-Lime: A Signal-Based Enhancement of Lime Explanation Technique. IEEE Access 12: 52641-52658 (2024) - Madallah Alruwaili, Muhammad Nouman Atta, Muhammad Hameed Siddiqi, Abdullah Khan, Asfandyar Khan, Yousef Alhwaiti, Saad Awadh Alanazi:
Deep Learning-Based YOLO Models for the Detection of People With Disabilities. IEEE Access 12: 2543-2566 (2024) - Alá Abdulmajid Eshmawi, Muhammad Umer, Imran Ashraf, Yongwan Park:
Enhanced Machine Learning Ensemble Approach for Securing Small Unmanned Aerial Vehicles From GPS Spoofing Attacks. IEEE Access 12: 27344-27355 (2024) - Amira Guesmi, Muhammad Abdullah Hanif, Bassem Ouni, Muhammad Shafique:
SAAM: Stealthy Adversarial Attack on Monocular Depth Estimation. IEEE Access 12: 13571-13585 (2024) - Mohamed Gamal M. Kamaleldin, Syed A. R. Abu-Bakar, Usman Ullah Sheikh:
Transfer Learning Models for CNN Fusion With Fisher Vector for Codebook Optimization of Foreground Features. IEEE Access 12: 5648-5658 (2024) - Saad Hammood Mohammed, Abdulmajeed Al-Jumaily, Jit Singh Mandeep Singh, Víctor P. Gil Jiménez, Aqeel S. Jaber, Yaseein Soubhi Hussein, Mudhar Mustafa Abdul Kader Al-Najjar, Dhiya Al-Jumeily:
A Review on the Evaluation of Feature Selection Using Machine Learning for Cyber-Attack Detection in Smart Grid. IEEE Access 12: 44023-44042 (2024) - Mona Zedan, Morsy Nour, Gaber Shabib, Ziad M. Ali, Abdullah Alharbi, Al-Attar Ali Mohamed:
Techno-Economic Assessment of Peer to Peer Energy Trading: An Egyptian Case Study. IEEE Access 12: 58317-58337 (2024) - Atta Ullah, Javid Shabbir, Abdullah Alomair, Mohammed Alomair:
Ratio-Type Estimator for Estimating the Neutrosophic Population Mean in Simple Random Sampling under Intuitionistic Fuzzy Cost Function. Axioms 12(9): 890 (2024) - Muneeb Hassan Khan, Abdul Rehman Javed, Zafar Iqbal, Muhammad Asim, Ali Ismail Awad:
DivaCAN: Detecting in-vehicle intrusion attacks on a controller area network using ensemble learning. Comput. Secur. 139: 103712 (2024) - Abdullahi Aishatu Wabi, Ismaila Idris, Olayemi Mikail Olaniyi, Joseph Adebayo Ojeniyi:
DDOS attack detection in SDN: Method of attacks, detection techniques, challenges and research gaps. Comput. Secur. 139: 103652 (2024) - Manal Abdullah Alohali, Muna Elsadig, Fahd N. Al-Wesabi, Mesfer Al Duhayyim, Anwer Mustafa Hilal, Abdelwahed Motwakel:
Digital Text Document Watermarking Based Tampering Attack Detection via Internet. Comput. Syst. Sci. Eng. 48(3): 759-771 (2024) - Sani M. Abdullahi, Shuifa Sun, Beng Wang, Ning Wei, Hong-Xia Wang:
Biometric template attacks and recent protection mechanisms: A survey. Inf. Fusion 103: 102144 (2024) - Ahmed Shihab Albahri, Rula A. Hamid, Ahmed Raheem Abdulnabi, Osamah Shihab Albahri, Abdullah Hussein Alamoodi, Muhammet Deveci, Witold Pedrycz, Laith Alzubaidi, José Santamaría, Yuantong Gu:
Fuzzy decision-making framework for explainable golden multi-machine learning models for real-time adversarial attack detection in Vehicular Ad-hoc Networks. Inf. Fusion 105: 102208 (2024) - Murat Dener, Celil Okur, Samed Al, Abdullah Orman:
WSN-BFSF: A New Data Set for Attacks Detection in Wireless Sensor Networks. IEEE Internet Things J. 11(2): 2109-2125 (2024) - Sidra Abbas, Imen Bouazzi, Stephen Ojo, Abdullah Al Hejaili, Gabriel Avelino R. Sampedro, Ahmad S. Almadhor, Michal Gregus:
Evaluating deep learning variants for cyber-attacks detection and multi-class classification in IoT networks. PeerJ Comput. Sci. 10: e1793 (2024) - Ahmed Abdulmunem Mhmood, Özgür Ergül, Javad Rahebi:
Detection of cyber-attacks on smart grids using improved VGG19 deep neural network architecture and Aquila optimizer algorithm. Signal Image Video Process. 18(2): 1477-1491 (2024) - Israt Jahan Mouri, Muhammad Ridowan, Muhammad Abdullah Adnan:
Data Poisoning Attacks and Mitigation Strategies on Federated Support Vector Machines. SN Comput. Sci. 5(2): 241 (2024) - Abdulrahman Takiddin, Muhammad Ismail, Rachad Atat, Katherine R. Davis, Erchin Serpedin:
Robust Graph Autoencoder-Based Detection of False Data Injection Attacks Against Data Poisoning in Smart Grids. IEEE Trans. Artif. Intell. 5(3): 1287-1301 (2024) - Marc Vucovich, Devin Quinn, Kevin Choi, Christopher Redino, Abdul Rahman, Edward Bowen:
FedBayes: A Zero-Trust Federated Learning Aggregation to Defend Against Adversarial Attacks. CCWC 2024: 28-35 - Azizol Abdullah, Mohamed Aly Bouke:
Towards Image-Based Network Traffic Pattern Detection for DDoS Attacks in Cloud Computing Environments: A Comparative Study. CLOSER 2024: 287-294 - AbdulAziz AbdulGhaffar, Mohammed Mahyoub, Ashraf Matrawy:
On the Impact of Flooding Attacks on 5G Slicing with Different VNF Sharing Configurations. DRCN 2024: 136-142 - Sagar Dasgupta, Abdullah Ahmed, Mizanur Rahman, Thejesh N. Bandi:
Unveiling the Stealthy Threat: Analyzing Slow Drift GPS Spoofing Attacks for Autonomous Vehicles in Urban Environments and Enabling the Resilience. CoRR abs/2401.01394 (2024) - M. Sabbir Salek, Abdullah Al Mamun, Mashrur Chowdhury:
AR-GAN: Generative Adversarial Network-Based Defense Method Against Adversarial Attacks on the Traffic Sign Classification System of Autonomous Vehicles. CoRR abs/2401.14232 (2024) - Mehmet Ergezer, Phat Duong, Christian Green, Tommy Nguyen, Abdurrahman Zeybey:
One Noise to Rule Them All: Multi-View Adversarial Attacks with Universal Perturbation. CoRR abs/2404.02287 (2024) - 2023
- Muzammil Ahmed, Ahmed B. Altamimi, Wilayat Khan, Mohammad Salih Alsaffar, Aakash Ahmad, Zawar H. Khan, Abdulrahman Alreshidi:
PhishCatcher: Client-Side Defense Against Web Spoofing Attacks Using Machine Learning. IEEE Access 11: 61249-61263 (2023) - Hayam Alamro, Khalid Mahmood, Sumayh S. Aljameel, Ayman Yafoz, Raed Alsini, Abdullah Mohamed:
Modified Red Fox Optimizer With Deep Learning Enabled False Data Injection Attack Detection. IEEE Access 11: 79256-79264 (2023) - Madini O. Alassafi, Muhammad Sohail Ibrahim, Imran Naseem, Rayed AlGhamdi, Reem Alotaibi, Faris A. Kateb, Hadi Oqaibi, Abdulrahman A. Alshdadi, Syed Adnan Yusuf:
A Novel Deep Learning Architecture With Image Diffusion for Robust Face Presentation Attack Detection. IEEE Access 11: 59204-59216 (2023) - Mohammed Aljebreen, Hanan Abdullah Mengash, Munya A. Arasi, Sumayh S. Aljameel, Ahmed S. Salama, Manar Ahmed Hamza:
Enhancing DDoS Attack Detection Using Snake Optimizer With Ensemble Learning on Internet of Things Environment. IEEE Access 11: 104745-104753 (2023) - Amira Guesmi, Muhammad Abdullah Hanif, Bassem Ouni, Muhammad Shafique:
Physical Adversarial Attacks for Camera-Based Smart Systems: Current Trends, Categorization, Applications, Research Challenges, and Future Outlook. IEEE Access 11: 109617-109668 (2023) - Muhammad Hassan, Noshina Tariq, Amjad Alsirhani, Abdullah Alomari, Farrukh Aslam Khan, Mohammed Mujib Alshahrani, Muhammad Ashraf, Mamoona Humayun:
GITM: A GINI Index-Based Trust Mechanism to Mitigate and Isolate Sybil Attack in RPL-Enabled Smart Grid Advanced Metering Infrastructures. IEEE Access 11: 62697-62720 (2023)
skipping 498 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-06-16 16:14 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint