default search action
Search dblp for Publications
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 929,649 matches
- 2025
- Jing Xu:
Connecting the dots: Exploring backdoor attacks on graph neural networks. Delft University of Technology, Netherlands, 2025 - Rafael Silva Barbon, Edmundo R. M. Madeira, Ademar Takeo Akabane:
A two-context-aware approach for navigation: A case study for vehicular route recommendation. Ad Hoc Networks 166: 103655 (2025) - Mohammed Hassanin, Marwa Keshk, Sara Salim, Majid Alsubaie, Dharmendra Sharma:
PLLM-CS: Pre-trained Large Language Model (LLM) for cyber threat detection in satellite networks. Ad Hoc Networks 166: 103645 (2025) - Baogang Li, Jiale Chen, Xinlong Yu, Zhi Yang, Jingxi Zhang:
Cross-domain gesture recognition via WiFi signals with deep learning. Ad Hoc Networks 166: 103654 (2025) - Akhtar Saeed, Mikail Erdem, Özgür Gürbüz, Mustafa Alper Akkas:
THz band drone communications with practical antennas: Performance under realistic mobility and misalignment scenarios. Ad Hoc Networks 166: 103644 (2025) - Siyu Guo, Yingnan Pan, Hongyi Li:
Dynamic event-driven optimal consensus control for state-constrained multiagent zero-sum differential graphical games. Appl. Math. Comput. 484: 128979 (2025) - Dan Li, Minghui Yan, Jixiang Meng:
Minimizing the least Laplacian eigenvalue of signed complete graphs. Appl. Math. Comput. 484: 129002 (2025) - Sunyo Moon, Seungkook Park:
Laplacian eigenvalue distribution for unicyclic graphs. Appl. Math. Comput. 485: 129022 (2025) - Francisco J. Muñoz, Luca Meacci, Juan Carlos Nuño, Mario Primicerio:
Exploring the limits of the law of mass action in the mean field description of epidemics on Erdös-Rényi networks. Appl. Math. Comput. 485: 129019 (2025) - Yi Shen, Jiemei Zhao, Liqi Yu:
Reachable set estimation of delayed second-order memristive neural networks. Appl. Math. Comput. 484: 128994 (2025) - Yu Sun, Cheng Hu, Juan Yu:
Pinning passivity and bipartite synchronization of fractional signed networks without gauge transformation. Appl. Math. Comput. 486: 129067 (2025) - R. Suvetha, Juan J. Nieto, P. Prakash:
Non-fragile output-feedback control for delayed memristive bidirectional associative memory neural networks against actuator failure. Appl. Math. Comput. 485: 129021 (2025) - Hong-Zhang Wang, Xing-Chen Shang-Guan, Du Xiong, Y.-H. An, L. Jin:
A matrix-separation-based integral inequality for aperiodic sampled-data synchronization of delayed neural networks considering communication delay. Appl. Math. Comput. 486: 129032 (2025) - Qing Yang, Yingzhi Tian:
Exploring redundant trees in bipartite graphs. Appl. Math. Comput. 486: 129006 (2025) - Jinsen Zhang, Xiaobing Nie:
Multiple exponential stability for short memory fractional impulsive Cohen-Grossberg neural networks with time delays. Appl. Math. Comput. 486: 129066 (2025) - Junyan Guo, Liyuan Chang, Yue Song, Shuang Yao, Zhi Zheng, Yihang Hao, Shixuan Zhu, Wei Guo, Ming Zhao:
AHA-BV: Access and handover authentication protocol with batch verification for satellite-terrestrial integrated networks. Comput. Stand. Interfaces 91: 103870 (2025) - Tohid Jafarian, Ali Ghaffari, Ali Seyfollahi, Bahman Arasteh:
Detecting and mitigating security anomalies in Software-Defined Networking (SDN) using Gradient-Boosted Trees and Floodlight Controller characteristics. Comput. Stand. Interfaces 91: 103871 (2025) - Aqeel Thamer Jawad, Rihab Maaloul, Lamia Chaari:
Authentication communication by using visualization cryptography for UAV networks. Comput. Stand. Interfaces 92: 103918 (2025) - Álvaro Domingo Reguero, Silverio Martínez-Fernández, Roberto Verdecchia:
Energy-efficient neural network training through runtime layer freezing, model quantization, and early stopping. Comput. Stand. Interfaces 92: 103906 (2025) - Jesús Rosa-Bilbao, Juan Boubeta-Puig, Jesús Lagares-Galán, Mark Vella:
Leveraging complex event processing for monitoring and automatically detecting anomalies in Ethereum-based blockchain networks. Comput. Stand. Interfaces 91: 103882 (2025) - Xiang Hao, Chenglin Xu, Chen Zhang, Lei Xie:
A neural network approach for speech enhancement and noise-robust bandwidth extension. Comput. Speech Lang. 89: 101709 (2025) - A. Poobalan, K. Ganapriya, K. Kalaivani, K. Parthiban:
A novel and secured email classification using deep neural network with bidirectional long short-term memory. Comput. Speech Lang. 89: 101667 (2025) - Di Wu, Peng Cheng, Yuying Zheng:
Seq2Seq dynamic planning network for progressive text generation. Comput. Speech Lang. 89: 101687 (2025) - Zhen Zhang, Mengqiu Liu, Xiyuan Jia, Gongxun Miao, Xin Wang, Hao Ni, Guohua Wu:
Improving text classification via computing category correlation matrix from text graph. Comput. Speech Lang. 89: 101688 (2025) - Diange Zhou, Shengwen Li, Lijun Dong, Renyao Chen, Xiaoyue Peng, Hong Yao:
C-KGE: Curriculum learning-based Knowledge Graph Embedding. Comput. Speech Lang. 89: 101689 (2025) - Tara Abrishami, Maria Chudnovsky, Sepehr Hajebi, Sophie Spirkl:
Induced subgraphs and tree decompositions VI. Graphs with 2-cutsets. Discret. Math. 348(1): 114195 (2025) - Kengo Aoki:
Improved 2-distance coloring of planar graphs with maximum degree 5. Discret. Math. 348(1): 114225 (2025) - Prosenjit Bose, Jean-Lou De Carufel, Thomas C. Shermer:
Pursuit-evasion in graphs: Zombies, lazy zombies and a survivor. Discret. Math. 348(1): 114220 (2025) - Csilla Bujtás, Akbar Davoodi, Laihao Ding, Ervin Györi, Zsolt Tuza, Donglei Yang:
Covering the edges of a graph with triangles. Discret. Math. 348(1): 114226 (2025) - István Estélyi, Ján Karabás, Alexander D. Mednykh, Roman Nedela:
The Jacobian of a graph and graph automorphisms. Discret. Math. 348(2): 114259 (2025)
skipping 929,619 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-09-18 05:56 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint