Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 1,495 matches
- 2024
- Imane Araf, Ali Idri, Ikram Chairi:
Cost-sensitive learning for imbalanced medical data: a review. Artif. Intell. Rev. 57(4): 80 (2024) - Tong Yi, Minyong Shi, Wenqian Shang, Haibin Zhu:
A privacy-preserving method for publishing data with multiple sensitive attributes. CAAI Trans. Intell. Technol. 9(1): 222-238 (2024) - Xin Su, Inam Ullah, Meiling Wang, Chang Choi:
Blockchain-Based System and Methods for Sensitive Data Transactions. IEEE Consumer Electron. Mag. 13(2): 87-96 (2024) - Yuzi Yi, Nafei Zhu, Jingsha He, Anca Delia Jurcut, Xiangjun Ma, Yehong Luo:
A privacy-sensitive data identification model in online social networks. Trans. Emerg. Telecommun. Technol. 35(1) (2024) - Meng Li, Jiqiang Liu, Yeping Yang:
Automated Identification of Sensitive Financial Data Based on the Topic Analysis. Future Internet 16(2): 55 (2024) - Lijun Zu, Wenyu Qi, Hongyi Li, Xiaohua Men, Zhihui Lu, Jiawei Ye, Liang Zhang:
UP-SDCG: A Method of Sensitive Data Classification for Collaborative Edge Computing in Financial Cloud Environment. Future Internet 16(3): 102 (2024) - Wenhao Shu, Qiang Xia, Wenbin Qian:
Neighborhood multigranulation rough sets for cost-sensitive feature selection on hybrid data. Neurocomputing 565: 126990 (2024) - Yichuan Liu, Jinbin Tu, Yun Wang:
Height Sensitive Multi-UAV Deployment Scheme in Edge Data Acquisition System. J. Circuits Syst. Comput. 33(6): 2450105:1-2450105:27 (2024) - Narayana Potu, Chandrashekar Jatoth, Premchand Parvataneni:
Optimum Batch Scheduling Model for Quality Aware Delay Sensitive Data Transmission over Fog Enabled IOT Network. Scalable Comput. Pract. Exp. 25(2): 1152-1166 (2024) - S. Punithavathi, S. Jeyalaksshmi:
Secure Block Chain-Based Healthcare Sensitive Data Prediction Using Pragmatic Quasi-Identifiers in a Decentralized Cloud Environment. SN Comput. Sci. 5(1): 41 (2024) - Zhengyi Yao, Liang Tan, Junhao Yi, Luxia Fu, Zhuang Zhang, Xinghong Tan, Jingxue Xie, Kun She, Peng Yang, Wanjing Wu, Danlian Ye, Ziyuan Yu:
Sensitive Data Privacy Protection of Carrier in Intelligent Logistics System. Symmetry 16(1): 68 (2024) - Haibiao Chen, Songyan Niu, Ziyun Shao, Linni Jian:
Recognizing Multitype Misalignments in Wireless EV Chargers With Orientation-Sensitive Coils: A Data-Driven Strategy Using Improved ResNet. IEEE Trans. Ind. Informatics 20(1): 280-290 (2024) - Nanbin Zhao, Bohui Wang, Kun Zhang, Yun Lu, Ruikang Luo, Rong Su:
LC-RSS: A Lane-Change Responsibility-Sensitive Safety Framework Based on Data-Driven Lane-Change Prediction. IEEE Trans. Intell. Veh. 9(1): 2531-2541 (2024) - Huawen Liu, Wenhua Zhou, Zongda Wu, Shichao Zhang, Gang Li, Xuelong Li:
Refining Codes for Locality Sensitive Hashing. IEEE Trans. Knowl. Data Eng. 36(3): 1274-1284 (2024) - Yao Tian, Xi Zhao, Xiaofang Zhou:
DB-LSH 2.0: Locality-Sensitive Hashing With Query-Based Dynamic Bucketing. IEEE Trans. Knowl. Data Eng. 36(3): 1000-1015 (2024) - Naween Kumar, Damodar Reddy Edla, Dinesh Dash, Gandharba Swain, T. N. Shankar:
Energy-efficient and delay-sensitive-based data gathering technique for multi-hop WSN using path-constraint mobile element. Wirel. Networks 30(1): 77-95 (2024) - Yucheng Li, Frank Guerin, Chenghua Lin:
LatestEval: Addressing Data Contamination in Language Model Evaluation through Dynamic and Time-Sensitive Test Construction. AAAI 2024: 18600-18607 - Richard Sances, Olivera Kotevska, Paul Laiu:
Frequency Oracle for Sensitive Data Monitoring (Student Abstract). AAAI 2024: 23642-23643 - Navya Martin Kollapally, James Geller:
Safeguarding Ethical AI: Detecting Potentially Sensitive Data Re-Identification and Generation of Misleading or Abusive Content from Quantized Large Language Models. BIOSTEC (2) 2024: 554-561 - Siang-Jhen Wu, Chien Chen, Jyh-Cheng Chen:
Design and Implementation of Data Plane Supporting Time-Sensitive Networking in 5G Networks. CCNC 2024: 905-911 - Simone De Renzis, Dennis Dosso, Alberto Testolin:
Exploiting Large Language Models to Train Automatic Detectors of Sensitive Data. IRCDL 2024: 25-33 - Naoki Tomizawa, Virach Sornlertlamvanich, Thatsanee Charoenporn:
Machine Learning-Based Classification of Catheter Ablation Site Using Person-Sensitive CARTO Coordinate Data. KST 2024: 173-177 - Ali Beikmohammadi, Mohammad Hosein Hamian, Neda Khoeyniha, Tony Lindgren, Olof Steinert, Sindri Magnússon:
A Cost-Sensitive Transformer Model for Prognostics Under Highly Imbalanced Industrial Data. CoRR abs/2402.08611 (2024) - Jens Ernstberger, Jan Lauinger, Yinnan Wu, Arthur Gervais, Sebastian Steinhorst:
ORIGO: Proving Provenance of Sensitive Data with Constant Communication. IACR Cryptol. ePrint Arch. 2024: 447 (2024) - 2023
- Anaïs Barthoulot:
Advanced encryption for the sharing of sensitive data. (Chiffrement avancé pour le partage de données sensibles). University of Limoges, France, 2023 - Ganesh Del Grosso:
Leakage of Sensitive Data from Deep Neural Networks. (Leakage of Sensitive Data from Deep Neural Networks). École Polytechnique, Palaiseau, France, 2023 - Gaia Gambarelli, Aldo Gangemi, Rocco Tripodi:
Is Your Model Sensitive? SPEDAC: A New Resource for the Automatic Classification of Sensitive Personal Data. IEEE Access 11: 10864-10880 (2023) - Hédi Hamdi, Zaki Brahmi, Alaa S. Alaerjan, Lotfi Mhamdi:
Enhancing Security and Privacy Preservation of Sensitive Information in e-Health Datasets Using FCA Approach. IEEE Access 11: 62591-62604 (2023) - Navneet Kaur, Sahil Verma, Kavita, N. Z. Jhanjhi, Saurabh Singh, Rania M. Ghoniem, Sayan Kumar Ray:
Enhanced QoS-Aware Routing Protocol for Delay Sensitive Data in Wireless Body Area Networks. IEEE Access 11: 106000-106012 (2023) - Antonio López Martínez, Manuel Gil Pérez, Antonio Ruiz-Martínez:
A Comprehensive Model for Securing Sensitive Patient Data in a Clinical Scenario. IEEE Access 11: 137083-137098 (2023)
skipping 1,465 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-06 03:00 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint