Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
Likely matches
- Pankaj K. Agarwal
aka: Pankaj Kumar Agarwal
Duke University, Department of Computer Science - Sos S. Agaian
City University of New York, USA - Ravi P. Agarwal
aka: Ravi Prakash Agarwal
Texas A&M University-Kingsville, Department of Mathematics, TX, USA - Agathoniki Trigoni
aka: Niki Trigoni
University of Oxford, UK - Nitin Agarwal
Venue search results
Likely matches
- International Conference on Database and Expert Systems Applications (DEXA)
also: International Workshop on Defence against Spam in Electronic Communication (DaSECo @ DEXA) - Information and Communication on Technology for the Fight against Global Warming (ICT-GLOW)
- International Conference on Computer Science Protecting Human Society Against Epidemics (ANTICOVID)
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 34,088 matches
- 2024
- Kun Sun, Shu Wang:
Secure Voice Processing Systems against Malicious Voice Attacks. Springer Briefs in Computer Science, Springer 2024, ISBN 978-3-031-44747-1, pp. 1-111 - Ishita Agarwal, Aanchal Singh, Aran Agarwal, Shruti Mishra, Sandeep Kumar Satapathy, Sung-Bae Cho, Manas Ranjan Prusty, Sachi Nandan Mohanty:
Enhancing Road Safety and Cybersecurity in Traffic Management Systems: Leveraging the Potential of Reinforcement Learning. IEEE Access 12: 9963-9975 (2024) - Emanuele Aiello, Mirko Agarla, Diego Valsesia, Paolo Napoletano, Tiziano Bianchi, Enrico Magli, Raimondo Schettini:
Synthetic Data Pretraining for Hyperspectral Image Super-Resolution. IEEE Access 12: 65024-65031 (2024) - Momna Akhtar, Muhammad Rahim, Agaeb Mahal Alanzi, Sadique Ahmad, Joseph Malose Fatlane, Maggie Aphane, Hamiden Abd El-Wahed Khalifa:
Dombi Aggregation Operators for p, qr-Spherica Fuzzy Sets: Application in the Stability Assessment of Cryptocurrencies. IEEE Access 12: 10366-10382 (2024) - Mohammed Nasser Al-Andoli, Shing Chiang Tan, Kok-Swee Sim, Pey Yun Goh, Chee Peng Lim:
A Framework for Robust Deep Learning Models Against Adversarial Attacks Based on a Protection Layer Approach. IEEE Access 12: 17522-17540 (2024) - Mohammad A. Altahat, Tariq Daradkeh, Anjali Agarwal:
Optimized Encryption-Integrated Strategy for Containers Scheduling and Secure Migration in Multi-Cloud Data Centers. IEEE Access 12: 51330-51345 (2024) - Georgios Chrysanidis, Yanwei Liu, Antonios Argyriou:
A Replay Attack Against ISAC Based on OFDM. IEEE Access 12: 20998-21003 (2024) - Ahmed Dawood, Mohamed A. Ismeil, Hany S. Hussein, B. M. Hasaneen, A. M. Abdel-Aziz:
An Efficient Protection Scheme Against Single-Phasing Fault for Three-Phase Induction Motor. IEEE Access 12: 6298-6317 (2024) - Mohamed Faisal Elrawy, Camilla Fioravanti, Gabriele Oliva, Maria K. Michael, Roberto Setola:
A Geometrical Approach to Enhance Security Against Cyber Attacks in Digital Substations. IEEE Access 12: 18724-18738 (2024) - Benxuan Huang, Lihui Pang, Anmin Fu, Said F. Al-Sarawi, Derek Abbott, Yansong Gao:
Sponge Attack Against Multi-Exit Networks With Data Poisoning. IEEE Access 12: 33843-33851 (2024) - Siti Mariatul Hazwa Mohd Huzir, Anis Hazirah 'Izzati Hasnu Al-Hadi, Zakiah Mohd Yusoff, Nurlaila Ismail, Mohd Nasir Taib:
Accurate Agarwood Oil Quality Determination: A Breakthrough With Artificial Neural Networks and the Levenberg- Marquardt Algorithm. IEEE Access 12: 50389-50403 (2024) - Yutaro Komiyama, Ayano Komanaka, Hiroaki Ota, Yuki Ito, Taichi Mishima, Takeshi Uematsu, Akihiro Konishi, Wenqi Zhu, Kien Nguyen, Hiroo Sekiya:
Analysis and Design of High-Frequency WPT System Using Load-Independent Inverter With Robustness Against Load Variations and Coil Misalignment. IEEE Access 12: 23043-23056 (2024) - Hyun Kwon, Jun Lee:
AdvGuard: Fortifying Deep Neural Networks Against Optimized Adversarial Example Attack. IEEE Access 12: 5345-5356 (2024) - Jianfeng Li, Yang Rong, Zhan Li, Shuai Li, Linxi Qu:
A High Order Integration Enhanced Zeroing Neural Network for Time-Varying Convex Quadratic Program Against Nonlinear Noise. IEEE Access 12: 22098-22109 (2024) - Yonggui Liu, Ziyuan Li, Qinxue Li, Xuhuan Xie:
Secure Consensus Control for Connected Vehicle Systems With Resilient Predictors Against Denial-of-Service Attacks. IEEE Access 12: 41908-41917 (2024) - Ryan Mcconkey, Oluwafemi Olukoya:
Runtime and Design Time Completeness Checking of Dangerous Android App Permissions Against GDPR. IEEE Access 12: 1-22 (2024) - Sagar Pande, Raghav Agarwal:
Multi-Class Kidney Abnormalities Detecting Novel System Through Computed Tomography. IEEE Access 12: 21147-21155 (2024) - Khaista Rahman, Muhammad Asghar Khan, Fatemeh Afghah, Gordana Barb, Nisreen Innab, Tanveer Ahmed Cheema:
An Efficient Authentication and Access Control Protocol for Securing UAV Networks Against Anomaly-Based Intrusion. IEEE Access 12: 62750-62764 (2024) - Neha A S, Vivek Chaturvedi, Muhammad Shafique:
FRNet: A Feature-Rich CNN Architecture to Defend Against Adversarial Attacks. IEEE Access 12: 26943-26956 (2024) - Aganith Shanbhag, Shweta Vincent, S. B. Bore Gowda, Om Prakash Kumar, Sharmila Anand John Francis:
Leveraging Metaheuristics for Feature Selection With Machine Learning Classification for Malicious Packet Detection in Computer Networks. IEEE Access 12: 21745-21764 (2024) - Nitin Kumar Sharma, Sabyasachi Dey:
Analyzing the Probability of Key Recovery in the Differential Attacks Against ChaCha. IEEE Access 12: 37000-37011 (2024) - Wenlong Shi, Hao Liang, Myrna Bittner:
Decision Support for Smart Distribution System Against Natural Disasters During Health Pandemics Considering Resilience. IEEE Access 12: 66335-66351 (2024) - Manesh Thankappan, Helena Rifà-Pous, Carles Garrigues:
A Signature-Based Wireless Intrusion Detection System Framework for Multi-Channel Man-in-the-Middle Attacks Against Protected Wi-Fi Networks. IEEE Access 12: 23096-23121 (2024) - Chang Tian, Wenpeng Yin, Dan Li, Marie-Francine Moens:
Fighting Against the Repetitive Training and Sample Dependency Problem in Few-Shot Named Entity Recognition. IEEE Access 12: 37600-37614 (2024) - Amandeep Verma, Rahul Saha, Gulshan Kumar, Mauro Conti, Tai-Hoon Kim:
PREVIR: Fortifying Vehicular Networks Against Denial of Service Attacks. IEEE Access 12: 48301-48320 (2024) - Chengxu Yu, Yulai Zhang:
Defending Against Backdoor Attacks by Quarantine Training. IEEE Access 12: 10681-10689 (2024) - Laura Crosara, Nicola Laurenti, Leonardo Badia:
Age of information is not just a number: Status updates against an eavesdropping node. Ad Hoc Networks 155: 103388 (2024) - Joelle Kabdjou, Elie Tagne Fute, Danda B. Rawat, Jaime C. Acosta, Charles A. Kamhoua:
A pipeline approach for privacy preservation against poisoning attacks in a Mobile Edge Computing environment. Ad Hoc Networks 154: 103385 (2024) - Caroline Pelletier:
Against Personalised Learning. Int. J. Artif. Intell. Educ. 34(1): 111-115 (2024) - Neil Selwyn:
Constructive Criticism? Working with (Rather than Against) the AIED Back-Lash. Int. J. Artif. Intell. Educ. 34(1): 84-91 (2024)
skipping 34,058 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-23 18:21 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint