Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 135 matches
- 2024
- Euclides Carlos Pinto Neto, Sajjad Dadkhah, Somayeh Sadeghi, Heather Molyneaux, Ali A. Ghorbani:
A review of Machine Learning (ML)-based IoT security in healthcare: A dataset perspective. Comput. Commun. 213: 61-77 (2024) - Easa Alalwany, Imad Mahgoub:
Security and Trust Management in the Internet of Vehicles (IoV): Challenges and Machine Learning Solutions. Sensors 24(2): 368 (2024) - Lauren Deason, Sagar Samtani, Edward Raff, Ethan M. Rudd:
Proceedings of the Conference on Applied Machine Learning in Information Security, Arlington, Virginia, USA, October 19-20, 2023. CEUR Workshop Proceedings 3652, CEUR-WS.org 2024 [contents] - 2023
- Sayawu Yakubu Diaba, Miadreza Shafie-Khah, Mohammed Elmusrati:
Cyber Security in Power Systems Using Meta-Heuristic and Deep Learning Algorithms. IEEE Access 11: 18660-18672 (2023) - Zie Eya Ekolle, Hideki Ochiai, Ryuji Kohno:
Collabo: A Collaborative Machine Learning Model and Its Application to the Security of Heterogeneous Medical Data in an IoT Network. IEEE Access 11: 142663-142675 (2023) - Nahid Eddermoug, Abdeljebar Mansour, Mohamed Sadik, Essaid Sabir, Mohamed Azmi:
klm-PPSA v. 1.1: machine learning-augmented profiling and preventing security attacks in cloud environments. Ann. des Télécommunications 78(11-12): 729-755 (2023) - Kristtopher Kayo Coelho, Michele Nogueira, Alex Borges Vieira, Edelberto F. Silva, José Augusto Miranda Nacif:
A survey on federated learning for security and privacy in healthcare applications. Comput. Commun. 207: 113-127 (2023) - Zaher Salah, Esraa Abu Elsoud:
Enhancing Network Security: A Machine Learning-Based Approach for Detecting and Mitigating Krack and Kr00k Attacks in IEEE 802.11. Future Internet 15(8): 269 (2023) - Emmanuel Obeng Frimpong, Taehoon Kim, Inkyu Bang:
Deep learning approach for physical-layer security in Gaussian multiple access wiretap channel. ICT Express 9(4): 728-733 (2023) - Venkatesan Muthukumar, R. Sivakami, Vinoth Kumar Venkatesan, J. Balajee, T. R. Mahesh, E. Mohan, B. Swapna:
Optimizing Heterogeneity in IoT Infra Using Federated Learning and Blockchain-based Security Strategies. Int. J. Comput. Commun. Control 18(6) (2023) - Hadeel T. El Kassabi, Mohamed Adel Serhani, Mohammad M. Masud, Khaled Shuaib, Khaled Khalil:
Deep learning approach to security enforcement in cloud workflow orchestration. J. Cloud Comput. 12(1): 10 (2023) - M. Navaneethan, S. Janakiraman:
An optimized deep learning model to ensure data integrity and security in IoT based e-commerce block chain application. J. Intell. Fuzzy Syst. 44(5): 8697-8709 (2023) - Eman Abdullah Aldakheel, Mohammed Zakariah, Ghada Abdalaziz Gashgari, Fahdah A. Almarshad, Abdullah I. A. Alzahrani:
A Deep Learning-Based Innovative Technique for Phishing Detection in Modern Security with Uniform Resource Locators. Sensors 23(9): 4403 (2023) - N. M. Saravana Kumar, E. Suryaprabha, K. Hariprasath, V. Vijayakumar:
Deep Learning Based Hybrid Security Model in Wireless Sensor Network. Wirel. Pers. Commun. 129(3): 1789-1805 (2023) - Hisham A. Kholidy, Abdelkader Berrouachedi, Elhadj Benkhelifa, Rakia Jaziri:
Enhancing Security in 5G Networks: A Hybrid Machine Learning Approach for Attack Classification. AICCSA 2023: 1-8 - Luke E. Richards, Edward Raff, Cynthia Matuszek:
Measuring Equality in Machine Learning Security Defenses: A Case Study in Speech Recognition. AISec@CCS 2023: 161-171 - Joseph Maguire, Rosanne English, Steve Draper:
Research-led Active Learning Sessions in Cyber Security through Research Paper Reading. CEP 2023: 33-36 - Seema G. Aarella, Saraju P. Mohanty, Elias Kougianos:
Fortified Edge 3.0: A Lightweight Machine Learning based Approach for Security in Collaborative Edge Computing. OCIT 2023: 450-455 - Alessandro Bellini, Emanuele Bellini, Massimo Bertini, Doaa Almhaithawi, Stefano Cuomo:
Multi-party Computation for Privacy and Security in Machine Learning: a Practical Review. CSR 2023: 174-179 - P. T. Devadarshini, B. Chandrashekar, Sumit Pundir, Mohit Tiwari, Ravikiran Madala, E. Indhuma:
Cognitive Defense Cyber Attack Prediction and Security Design in Machine Learning Model. IC3I 2023: 1361-1366 - Zakaria Abou El Houda, Diala Naboulsi, Georges Kaddoum:
Advancing Security and Efficiency in Federated Learning Service Aggregation for Wireless Networks. PIMRC 2023: 1-6 - Asli Atabek, Egehan Eralp, Mehmet Emre Gursoy:
Trust, Privacy and Security Aspects of Bias and Fairness in Machine Learning. TPS-ISA 2023: 111-121 - Aji Teguh Prihatno, Naufal Suryanto, Harashta Tatimma Larasati, Yustus Eko Oktian, Thi-Thu-Huong Le, Howon Kim:
A New Frontier in Digital Security: Verification for NFT Image Using Deep Learning-Based ConvNeXt Model in Quantum Blockchain. WISA 2023: 79-90 - Edward Raff, Sagar Samtani, Lauren Deason:
Proceedings of the Conference on Applied Machine Learning in Information Security, CAMLIS 2022, Arlington, Virginia, USA, October 20-21, 2022. CEUR Workshop Proceedings 3391, CEUR-WS.org 2023 [contents] - Shlomi Dolev, Ehud Gudes, Pascal Paillier:
Cyber Security, Cryptology, and Machine Learning - 7th International Symposium, CSCML 2023, Be'er Sheva, Israel, June 29-30, 2023, Proceedings. Lecture Notes in Computer Science 13914, Springer 2023, ISBN 978-3-031-34670-5 [contents] - Luke E. Richards, Edward Raff, Cynthia Matuszek:
Measuring Equality in Machine Learning Security Defenses. CoRR abs/2302.08973 (2023) - 2022
- Ilya S. Lebedev, Mikhail E. Sukhoparov:
Using Information about Influencing Factors to Split Data Samples in Machine Learning Methods for the Purposes of Assessing Information Security. Autom. Control. Comput. Sci. 56(8): 981-987 (2022) - Aleksa Damljanovic, Annachiara Ruospo, Ernesto Sánchez, Giovanni Squillero:
Machine learning for hardware security: Classifier-based identification of Trojans in pipelined microprocessors. Appl. Soft Comput. 116: 108068 (2022) - Ishai Rosenberg, Asaf Shabtai, Yuval Elovici, Lior Rokach:
Adversarial Machine Learning Attacks and Defense Methods in the Cyber Security Domain. ACM Comput. Surv. 54(5): 108:1-108:36 (2022) - Hugo Deléglise, Roberto Interdonato, Agnès Bégué, Elodie Maître d'Hôtel, Maguelonne Teisseire, Mathieu Roche:
Food security prediction from heterogeneous data combining machine and deep learning methods. Expert Syst. Appl. 190: 116189 (2022)
skipping 105 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-24 04:50 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint