Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 376 matches
- 2024
- Shideh Yavary Mehr, Byrav Ramamurthy:
Protection Techniques using Resource Delayed Release for SDN-based OTN over WDM Networks. Opt. Switch. Netw. 51: 100762 (2024) - Jaehyuk Lee, Wonbin Jeong, Kyungroul Lee:
Keyboard Data Protection Technique Using GAN in Password-Based User Authentication: Based on C/D Bit Vulnerability. Sensors 24(4): 1229 (2024) - Syed Raza Bashir, Shaina Raza, Vojislav B. Misic:
Progress in Privacy Protection: A Review of Privacy Preserving Techniques in Recommender Systems, Edge Computing, and Cloud Computing. CoRR abs/2401.11305 (2024) - 2023
- Juan Carlos Bernal-Romero, Juan Manuel Ramírez-Cortés, Jose de Jesus Rangel-Magdaleno, Pilar Gómez-Gil, Hayde Peregrina-Barreto, Israel Cruz-Vega:
A Review on Protection and Cancelable Techniques in Biometric Systems. IEEE Access 11: 8531-8568 (2023) - Md. Rezwan Hasan, Richard M. Guest, Farzin Deravi:
Presentation-level Privacy Protection Techniques for Automated Face Recognition - A Survey. ACM Comput. Surv. 55(13s): 286:1-286:27 (2023) - Mingfu Xue, Shichang Sun, Can He, Dujuan Gu, Yushu Zhang, Jian Wang, Weiqiang Liu:
ActiveGuard: An active intellectual property protection technique for deep neural networks by leveraging adversarial examples as users' fingerprints. IET Comput. Digit. Tech. 17(3-4): 111-126 (2023) - Si-Yi Li, Sheng Cheng Lee, Sheng-Hsi Hung, Zheng-Lun Huang, Ke-Horng Chen, Kuo-Lin Zheng, Ying-Hsi Lin, Shian-Ru Lin, Tsung-Yen Tsai:
A 4-40 V Wide Input Range Boost Converter With the Protection Re-Cycling Technique for 200 W High Power LiDAR System in a Long-Distance Object Detection. IEEE J. Solid State Circuits 58(7): 1850-1859 (2023) - Hager Fahmy, Eman M. El-Gendy, M. A. Mohamed, Mahmoud M. Saafan:
ECH3OA: An Enhanced Chimp-Harris Hawks Optimization Algorithm for copyright protection in Color Images using watermarking techniques. Knowl. Based Syst. 269: 110494 (2023) - Mohammed Lansari, Reda Bellafqira, Katarzyna Kapusta, Vincent Thouvenot, Olivier Bettan, Gouenou Coatrieux:
When Federated Learning Meets Watermarking: A Comprehensive Overview of Techniques for Intellectual Property Protection. Mach. Learn. Knowl. Extr. 5(4): 1382-1406 (2023) - Ferda Ernawan, Dhani Ariatmanto:
A recent survey on image watermarking using scaling factor techniques for copyright protection. Multim. Tools Appl. 82(18): 27123-27163 (2023) - Purushottam Sharma, Shaurya Kapoor, Richa Sharma:
Ransomware detection, prevention and protection in IoT devices using ML techniques based on dynamic analysis approach. Int. J. Syst. Assur. Eng. Manag. 14(1): 287-296 (2023) - Wael Al Hanaineh, José Matas, Josep M. Guerrero:
A Comparative Study of Smart THD-Based Fault Protection Techniques for Distribution Networks. Sensors 23(10): 4874 (2023) - Andrea Pinto, Luis-Carlos Herrera, Yezid Donoso, Jairo A. Gutiérrez:
Survey on Intrusion Detection Systems Based on Machine Learning Techniques for the Protection of Critical Infrastructure. Sensors 23(5): 2415 (2023) - Rijoy Mukherjee, Rajat Subhra Chakraborty:
Attacks on Recent DNN IP Protection Techniques and Their Mitigation. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 42(11): 3642-3650 (2023) - Mingfu Xue, Zhiyu Wu, Yushu Zhang, Jian Wang, Weiqiang Liu:
AdvParams: An Active DNN Intellectual Property Protection Technique via Adversarial Perturbation Based Parameter Encryption. IEEE Trans. Emerg. Top. Comput. 11(3): 664-678 (2023) - Vedrana Krivokuca Hahn, Sébastien Marcel:
Biometric Template Protection for Neural-Network-Based Face Recognition Systems: A Survey of Methods and Evaluation Techniques. IEEE Trans. Inf. Forensics Secur. 18: 639-666 (2023) - Veerakumar Bose, Hany F. Habib, Christopher Alan Belcastro, Harish Suryanarayana:
A New Protection Scheme for Static Transfer Switch Using Quasi Resonant Turn-Off Technique. IAS 2023: 1-25 - Xingnan Zhang, Jingjia Huang, Yue Feng:
A Comprehensive Approach to Mitigate Return-Oriented Programming Attacks: Combining Operating System Protection Mechanisms and Hardware-Assisted Techniques. ICSECS 2023: 453-458 - Serhii Mitsenko, Serhii Naumenko, Inna Rozlomii, Andrii Yarmilko:
Information Protection and Recovery Hamming Codes Based' Hash Technique. ICST 2023: 64-77 - Le Danh Tai, Ta Minh Thanh:
Digital Image Watermarking Algorithm Using Blockmarking Technique for Copyright Protection. KSE 2023: 1-4 - Matheus M. Silveira, Ariel L. C. Portela, Rafael A. Menezes, Michael S. Souza, Danielle S. Silva, Maria C. Mesquita, Rafael L. Gomes:
Data Protection based on Searchable Encryption and Anonymization Techniques. NOMS 2023: 1-5 - Kalid Nafil, Aziza Saufi, Ouafae Hdili, Sara Faqihi, Halima Maghraoui, Abdellatif Kobbane, Mohammed El Koutbi:
Lettuce Leaf Disease Protection and Detection Using Image Processing Technique. WINCOM 2023: 1-6 - Mohammed Lansari, Reda Bellafqira, Katarzyna Kapusta, Vincent Thouvenot, Olivier Bettan, Gouenou Coatrieux:
When Federated Learning meets Watermarking: A Comprehensive Overview of Techniques for Intellectual Property Protection. CoRR abs/2308.03573 (2023) - Diego André Cerqueira, Rafael Maiani de Mello, Guilherme Horta Travassos:
Experimental Evaluation of a Checklist-Based Inspection Technique to Verify the Compliance of Software Systems with the Brazilian General Data Protection Law. CoRR abs/2308.14874 (2023) - 2022
- Ishu Gupta, Ashutosh Kumar Singh, Chung-Nan Lee, Rajkumar Buyya:
Secure Data Storage and Sharing Techniques for Data Protection in Cloud Environments: A Systematic Review, Analysis, and Future Directions. IEEE Access 10: 71247-71277 (2022) - Abhishek Gupta, Ramesh Kumar Pachar, Om Prakash Mahela, Baseem Khan:
Fusion of Signal Processing Techniques to Design Current and Voltage Features Based Protection Scheme for Utility Grid With Renewable Energy Penetration. IEEE Access 10: 118222-118235 (2022) - Ahmed Y. Hatata, Mohammed Abd-Elnaby, Bishoy E. Sedhom:
Adaptive Protection Scheme for FREEDM Microgrid Based on Convolutional Neural Network and Gorilla Troops Optimization Technique. IEEE Access 10: 55583-55601 (2022) - Suzana Pil Ramli, Meysam Pashaei, Mazaher Karimi, Kimmo Kauhaniemi, Alireza Pourdaryaei, Mehdi Daryaei, Masoud Zarei:
The Recent Development of Optimal DOCR Protection Strategies for Sustainable Power Systems via Computational Intelligence Techniques. IEEE Access 10: 134277-134291 (2022) - Isabel Herrera Montano, José J. García-Aranda, Juan Ramos-Díaz, Sergio Molina-Cardín, Isabel de la Torre Díez, Joel J. P. C. Rodrigues:
Survey of Techniques on Data Leakage Protection and Methods to address the Insider threat. Clust. Comput. 25(6): 4289-4302 (2022) - Sang-Wook Kwon, Yong-Seo Koo:
Design of high-reliability LDO regulator with SCR based ESD protection circuit using body technique and load transient detection. IEICE Electron. Express 19(11): 20220110 (2022)
skipping 346 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-03-28 17:58 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint