Search dblp for Publications

export results for "aga"

more than 1000 matches, exporting first 1000 hits only!

 download as .bib file

@article{DBLP:journals/rcim/WangZZSZJ25,
  author       = {Ming Wang and
                  Peng Zhang and
                  Guoqing Zhang and
                  Kexin Sun and
                  Jie Zhang and
                  Mengyu Jin},
  title        = {A resilient scheduling framework for multi-robot multi-station welding
                  flow shop scheduling against robot failures},
  journal      = {Robotics Comput. Integr. Manuf.},
  volume       = {91},
  pages        = {102835},
  year         = {2025},
  url          = {https://doi.org/10.1016/j.rcim.2024.102835},
  doi          = {10.1016/J.RCIM.2024.102835},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rcim/WangZZSZJ25.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/hal/Coulon24,
  author       = {Romain Coulon},
  title        = {La mesure des rayonnements ionisants : recherche et d{\'{e}}veloppement
                  pour la s{\'{e}}curit{\'{e}} vis-{\`{a}}-vis des menaces
                  nucl{\'{e}}aires et radiologiques, pour la s{\^{u}}ret{\'{e}}
                  des r{\'{e}}acteurs nucl{\'{e}}aires, l'environnement et
                  la m{\'{e}}trologie. (Measure of ionizing radiations: research
                  and development for safeguard against radiological and Nuclear threats,
                  for nuclear safety, the environment and the metrology)},
  year         = {2024},
  url          = {https://tel.archives-ouvertes.fr/tel-04600454},
  timestamp    = {Thu, 20 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/hal/Coulon24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/basesearch/Ismail24,
  author       = {Mohannad Ismail},
  title        = {Practical Mitigations Against Memory Corruption and Transient Execution
                  Attacks},
  school       = {Virginia Tech, Blacksburg, VA, {USA}},
  year         = {2024},
  url          = {https://hdl.handle.net/10919/119211},
  timestamp    = {Wed, 10 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/basesearch/Ismail24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/basesearch/Udvarhelyi24,
  author       = {Balazs Udvarhelyi},
  title        = {Securing micro-controllers against side-channel attacks: evaluation
                  tools and applications},
  school       = {Catholic University of Louvain, Louvain-la-Neuve, Belgium},
  year         = {2024},
  url          = {http://hdl.handle.net/2078.1/286662},
  timestamp    = {Wed, 12 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/basesearch/Udvarhelyi24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/dnb/Agarwal24,
  author       = {Shivam Agarwal},
  title        = {Exploring Complex Group Dynamics: Visual Analysis of Overlapping Groups
                  and Interactions Over Time},
  school       = {University of Duisburg-Essen, Germany},
  year         = {2024},
  url          = {https://duepublico2.uni-due.de/receive/duepublico\_mods\_00081425},
  urn          = {urn:nbn:de:hbz:465-20240215-102500-9},
  timestamp    = {Wed, 10 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/dnb/Agarwal24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/dnb/Croce24,
  author       = {Francesco Croce},
  title        = {Evaluating and Improving the Robustness of Image Classifiers against
                  Adversarial Attacks},
  school       = {University of T{\"{u}}bingen, Germany},
  year         = {2024},
  url          = {https://publikationen.uni-tuebingen.de/xmlui/handle/10900/152958/},
  doi          = {10.15496/PUBLIKATION-94297},
  urn          = {urn:nbn:de:bsz:21-dspace-1529583},
  timestamp    = {Fri, 12 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/dnb/Croce24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/hal/Casalino24,
  author       = {Lorenzo Casalino},
  title        = {(On) The Impact of the Micro-architecture on Countermeasures against
                  Side-Channel Attacks. ((de l') Impact de la micro-architecture sur
                  les protections contre les attaques par canal auxiliaire)},
  school       = {Sorbonne University, Paris, France},
  year         = {2024},
  url          = {https://tel.archives-ouvertes.fr/tel-04573949},
  timestamp    = {Tue, 02 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/hal/Casalino24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/sbcs/SunW24,
  author       = {Kun Sun and
                  Shu Wang},
  title        = {Secure Voice Processing Systems against Malicious Voice Attacks},
  series       = {Springer Briefs in Computer Science},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-44748-8},
  doi          = {10.1007/978-3-031-44748-8},
  isbn         = {978-3-031-44747-1},
  timestamp    = {Fri, 12 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/sbcs/SunW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/wn/LiZWS24,
  author       = {Shaofeng Li and
                  Haojin Zhu and
                  Wen Wu and
                  Xuemin (Sherman) Shen},
  title        = {Backdoor Attacks against Learning-Based Algorithms},
  series       = {Wireless Networks},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-57389-7},
  doi          = {10.1007/978-3-031-57389-7},
  isbn         = {978-3-031-57388-0},
  timestamp    = {Thu, 18 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/wn/LiZWS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/AgarwalSAMSCPM24,
  author       = {Ishita Agarwal and
                  Aanchal Singh and
                  Aran Agarwal and
                  Shruti Mishra and
                  Sandeep Kumar Satapathy and
                  Sung{-}Bae Cho and
                  Manas Ranjan Prusty and
                  Sachi Nandan Mohanty},
  title        = {Enhancing Road Safety and Cybersecurity in Traffic Management Systems:
                  Leveraging the Potential of Reinforcement Learning},
  journal      = {{IEEE} Access},
  volume       = {12},
  pages        = {9963--9975},
  year         = {2024},
  url          = {https://doi.org/10.1109/ACCESS.2024.3350271},
  doi          = {10.1109/ACCESS.2024.3350271},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/AgarwalSAMSCPM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/AielloAVNBMS24,
  author       = {Emanuele Aiello and
                  Mirko Agarla and
                  Diego Valsesia and
                  Paolo Napoletano and
                  Tiziano Bianchi and
                  Enrico Magli and
                  Raimondo Schettini},
  title        = {Synthetic Data Pretraining for Hyperspectral Image Super-Resolution},
  journal      = {{IEEE} Access},
  volume       = {12},
  pages        = {65024--65031},
  year         = {2024},
  url          = {https://doi.org/10.1109/ACCESS.2024.3396990},
  doi          = {10.1109/ACCESS.2024.3396990},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/AielloAVNBMS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/AkhtarRAAFAK24,
  author       = {Momna Akhtar and
                  Muhammad Rahim and
                  Agaeb Mahal Alanzi and
                  Sadique Ahmad and
                  Joseph Malose Fatlane and
                  Maggie Aphane and
                  Hamiden Abd El{-}Wahed Khalifa},
  title        = {Dombi Aggregation Operators for p, qr-Spherica Fuzzy Sets: Application
                  in the Stability Assessment of Cryptocurrencies},
  journal      = {{IEEE} Access},
  volume       = {12},
  pages        = {10366--10382},
  year         = {2024},
  url          = {https://doi.org/10.1109/ACCESS.2023.3346916},
  doi          = {10.1109/ACCESS.2023.3346916},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/AkhtarRAAFAK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/AlAndoliTSGL24,
  author       = {Mohammed Nasser Al{-}Andoli and
                  Shing Chiang Tan and
                  Kok{-}Swee Sim and
                  Pey Yun Goh and
                  Chee Peng Lim},
  title        = {A Framework for Robust Deep Learning Models Against Adversarial Attacks
                  Based on a Protection Layer Approach},
  journal      = {{IEEE} Access},
  volume       = {12},
  pages        = {17522--17540},
  year         = {2024},
  url          = {https://doi.org/10.1109/ACCESS.2024.3354699},
  doi          = {10.1109/ACCESS.2024.3354699},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/AlAndoliTSGL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/AlbasheerHAN24,
  author       = {Fawzia Omer Albasheer and
                  Raghavendra Ramesh Haibatti and
                  Mayank Agarwal and
                  Seung Yeob Nam},
  title        = {A Novel {IDS} Based on Jaya Optimizer and Smote-ENN for Cyberattacks
                  Detection},
  journal      = {{IEEE} Access},
  volume       = {12},
  pages        = {101506--101527},
  year         = {2024},
  url          = {https://doi.org/10.1109/ACCESS.2024.3431534},
  doi          = {10.1109/ACCESS.2024.3431534},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/AlbasheerHAN24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/AltahatDA24,
  author       = {Mohammad A. Altahat and
                  Tariq Daradkeh and
                  Anjali Agarwal},
  title        = {Optimized Encryption-Integrated Strategy for Containers Scheduling
                  and Secure Migration in Multi-Cloud Data Centers},
  journal      = {{IEEE} Access},
  volume       = {12},
  pages        = {51330--51345},
  year         = {2024},
  url          = {https://doi.org/10.1109/ACCESS.2024.3386169},
  doi          = {10.1109/ACCESS.2024.3386169},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/AltahatDA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/CaprazO24,
  author       = {Seval Capraz and
                  Adnan Ozsoy},
  title        = {A Secure Medical Data Sharing Framework for Fight Against Pandemics
                  Like Covid-19 by Using Public Blockchain},
  journal      = {{IEEE} Access},
  volume       = {12},
  pages        = {93593--93605},
  year         = {2024},
  url          = {https://doi.org/10.1109/ACCESS.2024.3423714},
  doi          = {10.1109/ACCESS.2024.3423714},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/CaprazO24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ChoiPH24,
  author       = {Jaeho Choi and
                  Jongwon Park and
                  Kunsoo Huh},
  title        = {Robust Object Tracking Against Sensor Failures With Centralized {IMM}
                  Filter},
  journal      = {{IEEE} Access},
  volume       = {12},
  pages        = {85203--85218},
  year         = {2024},
  url          = {https://doi.org/10.1109/ACCESS.2024.3415381},
  doi          = {10.1109/ACCESS.2024.3415381},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/ChoiPH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ChrysanidisLA24,
  author       = {Georgios Chrysanidis and
                  Yanwei Liu and
                  Antonios Argyriou},
  title        = {A Replay Attack Against {ISAC} Based on {OFDM}},
  journal      = {{IEEE} Access},
  volume       = {12},
  pages        = {20998--21003},
  year         = {2024},
  url          = {https://doi.org/10.1109/ACCESS.2024.3359680},
  doi          = {10.1109/ACCESS.2024.3359680},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/ChrysanidisLA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/CriolloCUGYSRL24,
  author       = {Santiago Criollo{-}C and
                  Jos{\'{e}} Enrique Cerezo Uzc{\'{a}}tegui and
                  Andrea Guerrero{-}Arias and
                  T. Anita Y{\'{a}}nez and
                  Agariadne Dwinggo Samala and
                  Soha Rawas and
                  Sergio Luj{\'{a}}n{-}Mora},
  title        = {Use of Virtual Reality as an Educational Tool: {A} Comparison Between
                  Engineering Students and Teachers},
  journal      = {{IEEE} Access},
  volume       = {12},
  pages        = {86662--86674},
  year         = {2024},
  url          = {https://doi.org/10.1109/ACCESS.2024.3416673},
  doi          = {10.1109/ACCESS.2024.3416673},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/CriolloCUGYSRL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/DawoodIHHA24,
  author       = {Ahmed Dawood and
                  Mohamed A. Ismeil and
                  Hany S. Hussein and
                  B. M. Hasaneen and
                  A. M. Abdel{-}Aziz},
  title        = {An Efficient Protection Scheme Against Single-Phasing Fault for Three-Phase
                  Induction Motor},
  journal      = {{IEEE} Access},
  volume       = {12},
  pages        = {6298--6317},
  year         = {2024},
  url          = {https://doi.org/10.1109/ACCESS.2024.3351106},
  doi          = {10.1109/ACCESS.2024.3351106},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/DawoodIHHA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ElrawyFOMS24,
  author       = {Mohamed Faisal Elrawy and
                  Camilla Fioravanti and
                  Gabriele Oliva and
                  Maria K. Michael and
                  Roberto Setola},
  title        = {A Geometrical Approach to Enhance Security Against Cyber Attacks in
                  Digital Substations},
  journal      = {{IEEE} Access},
  volume       = {12},
  pages        = {18724--18738},
  year         = {2024},
  url          = {https://doi.org/10.1109/ACCESS.2024.3361753},
  doi          = {10.1109/ACCESS.2024.3361753},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/ElrawyFOMS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/HuangPFAAG24,
  author       = {Benxuan Huang and
                  Lihui Pang and
                  Anmin Fu and
                  Said F. Al{-}Sarawi and
                  Derek Abbott and
                  Yansong Gao},
  title        = {Sponge Attack Against Multi-Exit Networks With Data Poisoning},
  journal      = {{IEEE} Access},
  volume       = {12},
  pages        = {33843--33851},
  year         = {2024},
  url          = {https://doi.org/10.1109/ACCESS.2024.3370849},
  doi          = {10.1109/ACCESS.2024.3370849},
  timestamp    = {Wed, 07 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/HuangPFAAG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/HuzirAYIT24,
  author       = {Siti Mariatul Hazwa Mohd Huzir and
                  Anis Hazirah 'Izzati Hasnu Al{-}Hadi and
                  Zakiah Mohd Yusoff and
                  Nurlaila Ismail and
                  Mohd Nasir Taib},
  title        = {Accurate Agarwood Oil Quality Determination: {A} Breakthrough With
                  Artificial Neural Networks and the Levenberg- Marquardt Algorithm},
  journal      = {{IEEE} Access},
  volume       = {12},
  pages        = {50389--50403},
  year         = {2024},
  url          = {https://doi.org/10.1109/ACCESS.2024.3381627},
  doi          = {10.1109/ACCESS.2024.3381627},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/HuzirAYIT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/IshiharaUKH24,
  author       = {Masataka Ishihara and
                  Kazuhiro Umetani and
                  Akihiro Konishi and
                  Eiji Hiraki},
  title        = {Feasibility of Active Reactance Compensator for Autonomously Maximizing
                  Repeater Coil Current of Wireless Power Transfer System Against Variations
                  in Resonant Frequency and Magnetic Coupling Intensity},
  journal      = {{IEEE} Access},
  volume       = {12},
  pages        = {98175--98188},
  year         = {2024},
  url          = {https://doi.org/10.1109/ACCESS.2024.3428864},
  doi          = {10.1109/ACCESS.2024.3428864},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/IshiharaUKH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/KhanKLUAYZ24,
  author       = {Nek Dil Khan and
                  Javed Ali Khan and
                  Jianqiang Li and
                  Tahir Ullah and
                  Ayed Alwadain and
                  Affan Yasin and
                  Qing Zhao},
  title        = {How Do Crowd-Users Express Their Opinions Against Software Applications
                  in Social Media? {A} Fine-Grained Classification Approach},
  journal      = {{IEEE} Access},
  volume       = {12},
  pages        = {98004--98028},
  year         = {2024},
  url          = {https://doi.org/10.1109/ACCESS.2024.3425830},
  doi          = {10.1109/ACCESS.2024.3425830},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/KhanKLUAYZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/KomiyamaKOIMUKZ24,
  author       = {Yutaro Komiyama and
                  Ayano Komanaka and
                  Hiroaki Ota and
                  Yuki Ito and
                  Taichi Mishima and
                  Takeshi Uematsu and
                  Akihiro Konishi and
                  Wenqi Zhu and
                  Kien Nguyen and
                  Hiroo Sekiya},
  title        = {Analysis and Design of High-Frequency {WPT} System Using Load-Independent
                  Inverter With Robustness Against Load Variations and Coil Misalignment},
  journal      = {{IEEE} Access},
  volume       = {12},
  pages        = {23043--23056},
  year         = {2024},
  url          = {https://doi.org/10.1109/ACCESS.2024.3361029},
  doi          = {10.1109/ACCESS.2024.3361029},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/KomiyamaKOIMUKZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/KwonL24,
  author       = {Hyun Kwon and
                  Jun Lee},
  title        = {AdvGuard: Fortifying Deep Neural Networks Against Optimized Adversarial
                  Example Attack},
  journal      = {{IEEE} Access},
  volume       = {12},
  pages        = {5345--5356},
  year         = {2024},
  url          = {https://doi.org/10.1109/ACCESS.2020.3042839},
  doi          = {10.1109/ACCESS.2020.3042839},
  timestamp    = {Wed, 24 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/KwonL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/LiRL0Q24,
  author       = {Jianfeng Li and
                  Yang Rong and
                  Zhan Li and
                  Shuai Li and
                  Linxi Qu},
  title        = {A High Order Integration Enhanced Zeroing Neural Network for Time-Varying
                  Convex Quadratic Program Against Nonlinear Noise},
  journal      = {{IEEE} Access},
  volume       = {12},
  pages        = {22098--22109},
  year         = {2024},
  url          = {https://doi.org/10.1109/ACCESS.2024.3364377},
  doi          = {10.1109/ACCESS.2024.3364377},
  timestamp    = {Sun, 24 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/LiRL0Q24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/LiuLLX24,
  author       = {Yonggui Liu and
                  Ziyuan Li and
                  Qinxue Li and
                  Xuhuan Xie},
  title        = {Secure Consensus Control for Connected Vehicle Systems With Resilient
                  Predictors Against Denial-of-Service Attacks},
  journal      = {{IEEE} Access},
  volume       = {12},
  pages        = {41908--41917},
  year         = {2024},
  url          = {https://doi.org/10.1109/ACCESS.2024.3379420},
  doi          = {10.1109/ACCESS.2024.3379420},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/LiuLLX24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/MaMJC24,
  author       = {Hao Ma and
                  Haigang Ma and
                  Jiangtao Ji and
                  Hongwei Cui},
  title        = {FES-YOLOv5s: {A} Lightweight Model for Agaricus Bisporus Detection},
  journal      = {{IEEE} Access},
  volume       = {12},
  pages        = {71219--71231},
  year         = {2024},
  url          = {https://doi.org/10.1109/ACCESS.2024.3397835},
  doi          = {10.1109/ACCESS.2024.3397835},
  timestamp    = {Tue, 18 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/MaMJC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/McconkeyO24,
  author       = {Ryan Mcconkey and
                  Oluwafemi Olukoya},
  title        = {Runtime and Design Time Completeness Checking of Dangerous Android
                  App Permissions Against {GDPR}},
  journal      = {{IEEE} Access},
  volume       = {12},
  pages        = {1--22},
  year         = {2024},
  url          = {https://doi.org/10.1109/ACCESS.2023.3347194},
  doi          = {10.1109/ACCESS.2023.3347194},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/McconkeyO24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/PandeA24,
  author       = {Sagar Pande and
                  Raghav Agarwal},
  title        = {Multi-Class Kidney Abnormalities Detecting Novel System Through Computed
                  Tomography},
  journal      = {{IEEE} Access},
  volume       = {12},
  pages        = {21147--21155},
  year         = {2024},
  url          = {https://doi.org/10.1109/ACCESS.2024.3351181},
  doi          = {10.1109/ACCESS.2024.3351181},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/PandeA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/RahmanKABIC24,
  author       = {Khaista Rahman and
                  Muhammad Asghar Khan and
                  Fatemeh Afghah and
                  Gordana Barb and
                  Nisreen Innab and
                  Tanveer Ahmed Cheema},
  title        = {An Efficient Authentication and Access Control Protocol for Securing
                  {UAV} Networks Against Anomaly-Based Intrusion},
  journal      = {{IEEE} Access},
  volume       = {12},
  pages        = {62750--62764},
  year         = {2024},
  url          = {https://doi.org/10.1109/ACCESS.2024.3395494},
  doi          = {10.1109/ACCESS.2024.3395494},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/RahmanKABIC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/SCS24,
  author       = {Neha A S and
                  Vivek Chaturvedi and
                  Muhammad Shafique},
  title        = {FRNet: {A} Feature-Rich {CNN} Architecture to Defend Against Adversarial
                  Attacks},
  journal      = {{IEEE} Access},
  volume       = {12},
  pages        = {26943--26956},
  year         = {2024},
  url          = {https://doi.org/10.1109/ACCESS.2024.3364818},
  doi          = {10.1109/ACCESS.2024.3364818},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/SCS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ShanbhagVGKF24,
  author       = {Aganith Shanbhag and
                  Shweta Vincent and
                  Bore Gowda S. B and
                  Om Prakash Kumar and
                  Sharmila Anand John Francis},
  title        = {Leveraging Metaheuristics for Feature Selection With Machine Learning
                  Classification for Malicious Packet Detection in Computer Networks},
  journal      = {{IEEE} Access},
  volume       = {12},
  pages        = {21745--21764},
  year         = {2024},
  url          = {https://doi.org/10.1109/ACCESS.2024.3362246},
  doi          = {10.1109/ACCESS.2024.3362246},
  timestamp    = {Sun, 11 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/ShanbhagVGKF24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/SharmaD24,
  author       = {Nitin Kumar Sharma and
                  Sabyasachi Dey},
  title        = {Analyzing the Probability of Key Recovery in the Differential Attacks
                  Against ChaCha},
  journal      = {{IEEE} Access},
  volume       = {12},
  pages        = {37000--37011},
  year         = {2024},
  url          = {https://doi.org/10.1109/ACCESS.2024.3372857},
  doi          = {10.1109/ACCESS.2024.3372857},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/SharmaD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ShiLB24,
  author       = {Wenlong Shi and
                  Hao Liang and
                  Myrna Bittner},
  title        = {Decision Support for Smart Distribution System Against Natural Disasters
                  During Health Pandemics Considering Resilience},
  journal      = {{IEEE} Access},
  volume       = {12},
  pages        = {66335--66351},
  year         = {2024},
  url          = {https://doi.org/10.1109/ACCESS.2024.3397892},
  doi          = {10.1109/ACCESS.2024.3397892},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/ShiLB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ThankappanRG24,
  author       = {Manesh Thankappan and
                  Helena Rif{\`{a}}{-}Pous and
                  Carles Garrigues},
  title        = {A Signature-Based Wireless Intrusion Detection System Framework for
                  Multi-Channel Man-in-the-Middle Attacks Against Protected Wi-Fi Networks},
  journal      = {{IEEE} Access},
  volume       = {12},
  pages        = {23096--23121},
  year         = {2024},
  url          = {https://doi.org/10.1109/ACCESS.2024.3362803},
  doi          = {10.1109/ACCESS.2024.3362803},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/ThankappanRG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/TianJLW24,
  author       = {Yue Tian and
                  Qi Jiang and
                  Zuxing Li and
                  Chao Wang},
  title        = {Adversarial Reinforcement Learning Against Statistic Inference on
                  Agent Identity},
  journal      = {{IEEE} Access},
  volume       = {12},
  pages        = {70305--70317},
  year         = {2024},
  url          = {https://doi.org/10.1109/ACCESS.2024.3402351},
  doi          = {10.1109/ACCESS.2024.3402351},
  timestamp    = {Tue, 18 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/TianJLW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/TianYLM24,
  author       = {Chang Tian and
                  Wenpeng Yin and
                  Dan Li and
                  Marie{-}Francine Moens},
  title        = {Fighting Against the Repetitive Training and Sample Dependency Problem
                  in Few-Shot Named Entity Recognition},
  journal      = {{IEEE} Access},
  volume       = {12},
  pages        = {37600--37614},
  year         = {2024},
  url          = {https://doi.org/10.1109/ACCESS.2024.3374727},
  doi          = {10.1109/ACCESS.2024.3374727},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/TianYLM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/VermaSKCK24,
  author       = {Amandeep Verma and
                  Rahul Saha and
                  Gulshan Kumar and
                  Mauro Conti and
                  Tai{-}Hoon Kim},
  title        = {{PREVIR:} Fortifying Vehicular Networks Against Denial of Service
                  Attacks},
  journal      = {{IEEE} Access},
  volume       = {12},
  pages        = {48301--48320},
  year         = {2024},
  url          = {https://doi.org/10.1109/ACCESS.2024.3382992},
  doi          = {10.1109/ACCESS.2024.3382992},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/VermaSKCK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/YuZ24,
  author       = {Chengxu Yu and
                  Yulai Zhang},
  title        = {Defending Against Backdoor Attacks by Quarantine Training},
  journal      = {{IEEE} Access},
  volume       = {12},
  pages        = {10681--10689},
  year         = {2024},
  url          = {https://doi.org/10.1109/ACCESS.2024.3354385},
  doi          = {10.1109/ACCESS.2024.3354385},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/YuZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ZahraouiKRZAM24,
  author       = {Younes Zahraoui and
                  Tarmo Kor{\~{o}}tko and
                  Argo Rosin and
                  Tekai Eddine Khalil Zidane and
                  Hannes Agabus and
                  Saad Mekhilef},
  title        = {A Competitive Framework for the Participation of Multi-Microgrids
                  in the Community Energy Trading Market: {A} Case Study},
  journal      = {{IEEE} Access},
  volume       = {12},
  pages        = {68232--68248},
  year         = {2024},
  url          = {https://doi.org/10.1109/ACCESS.2024.3399168},
  doi          = {10.1109/ACCESS.2024.3399168},
  timestamp    = {Tue, 18 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/ZahraouiKRZAM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/ChaudharyAMS24,
  author       = {Sameeksha Chaudhary and
                  Anirudh Agarwal and
                  Deepak Mishra and
                  Santosh Shah},
  title        = {Enhancing longevity: Sustainable channel modeling for wireless-powered
                  implantable BANs},
  journal      = {Ad Hoc Networks},
  volume       = {163},
  pages        = {103584},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.adhoc.2024.103584},
  doi          = {10.1016/J.ADHOC.2024.103584},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adhoc/ChaudharyAMS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/CrosaraLB24,
  author       = {Laura Crosara and
                  Nicola Laurenti and
                  Leonardo Badia},
  title        = {Age of information is not just a number: Status updates against an
                  eavesdropping node},
  journal      = {Ad Hoc Networks},
  volume       = {155},
  pages        = {103388},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.adhoc.2023.103388},
  doi          = {10.1016/J.ADHOC.2023.103388},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/adhoc/CrosaraLB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/KabdjouFRAK24,
  author       = {Joelle Kabdjou and
                  Elie Tagne Fute and
                  Danda B. Rawat and
                  Jaime C. Acosta and
                  Charles A. Kamhoua},
  title        = {A pipeline approach for privacy preservation against poisoning attacks
                  in a Mobile Edge Computing environment},
  journal      = {Ad Hoc Networks},
  volume       = {154},
  pages        = {103385},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.adhoc.2023.103385},
  doi          = {10.1016/J.ADHOC.2023.103385},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/adhoc/KabdjouFRAK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/aei/YueDLLNQ24,
  author       = {Changyang Yue and
                  Wenli Du and
                  Zhongmei Li and
                  Bing Liu and
                  Rong Nie and
                  Feng Qian},
  title        = {Differential privacy distributed optimization algorithm against adversarial
                  attacks for efficiency optimization of complex industrial processes},
  journal      = {Adv. Eng. Informatics},
  volume       = {62},
  pages        = {102662},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.aei.2024.102662},
  doi          = {10.1016/J.AEI.2024.102662},
  timestamp    = {Mon, 29 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/aei/YueDLLNQ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/aiedu/Pelletier24,
  author       = {Caroline Pelletier},
  title        = {Against Personalised Learning},
  journal      = {Int. J. Artif. Intell. Educ.},
  volume       = {34},
  number       = {1},
  pages        = {111--115},
  year         = {2024},
  url          = {https://doi.org/10.1007/s40593-023-00348-z},
  doi          = {10.1007/S40593-023-00348-Z},
  timestamp    = {Fri, 08 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/aiedu/Pelletier24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/aiedu/Selwyn24,
  author       = {Neil Selwyn},
  title        = {Constructive Criticism? Working with (Rather than Against) the {AIED}
                  Back-Lash},
  journal      = {Int. J. Artif. Intell. Educ.},
  volume       = {34},
  number       = {1},
  pages        = {84--91},
  year         = {2024},
  url          = {https://doi.org/10.1007/s40593-023-00344-3},
  doi          = {10.1007/S40593-023-00344-3},
  timestamp    = {Fri, 08 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/aiedu/Selwyn24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/aiethics/AgarwalA24,
  author       = {Avinash Agarwal and
                  Harsh Agarwal},
  title        = {A seven-layer model with checklists for standardising fairness assessment
                  throughout the {AI} lifecycle},
  journal      = {{AI} Ethics},
  volume       = {4},
  number       = {2},
  pages        = {299--314},
  year         = {2024},
  url          = {https://doi.org/10.1007/s43681-023-00266-9},
  doi          = {10.1007/S43681-023-00266-9},
  timestamp    = {Sat, 06 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/aiethics/AgarwalA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ail/OliveiraBZNGAN24,
  author       = {F{\'{a}}bio M. Oliveira and
                  Marcelo de Sousa Balbino and
                  Luis E. Z{\'{a}}rate and
                  Fawn Ngo and
                  Ramakrishna Govindu and
                  Anurag Agarwal and
                  Cristiane Neri Nobre},
  title        = {Predicting inmates misconduct using the {SHAP} approach},
  journal      = {Artif. Intell. Law},
  volume       = {32},
  number       = {2},
  pages        = {369--395},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10506-023-09352-z},
  doi          = {10.1007/S10506-023-09352-Z},
  timestamp    = {Tue, 18 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ail/OliveiraBZNGAN24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/aim/ChernovaMRSY24,
  author       = {Sonia Chernova and
                  Elizabeth D. Mynatt and
                  Agata Rozga and
                  Reid G. Simmons and
                  Holly A. Yanco},
  title        = {{AI-CARING:} National {AI} Institute for Collaborative Assistance
                  and Responsive Interaction for Networked Groups},
  journal      = {{AI} Mag.},
  volume       = {45},
  number       = {1},
  pages        = {124--130},
  year         = {2024},
  url          = {https://doi.org/10.1002/aaai.12162},
  doi          = {10.1002/AAAI.12162},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/aim/ChernovaMRSY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/aim/FernBDDPK24,
  author       = {Alan Fern and
                  Margaret Burnett and
                  Joseph R. Davidson and
                  Janardhan Rao Doppa and
                  Paola Pes{\'{a}}ntez{-}Cabrera and
                  Ananth Kalyanaraman},
  title        = {AgAID Institute - {AI} for agricultural labor and decision support},
  journal      = {{AI} Mag.},
  volume       = {45},
  number       = {1},
  pages        = {99--104},
  year         = {2024},
  url          = {https://doi.org/10.1002/aaai.12156},
  doi          = {10.1002/AAAI.12156},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/aim/FernBDDPK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/air/AkhtomSC24,
  author       = {Dua'a Mkhiemir Akhtom and
                  Manmeet Mahinderjit Singh and
                  XinYing Chew},
  title        = {Enhancing trustworthy deep learning for image classification against
                  evasion attacks: a systematic literature review},
  journal      = {Artif. Intell. Rev.},
  volume       = {57},
  number       = {7},
  pages        = {174},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10462-024-10777-4},
  doi          = {10.1007/S10462-024-10777-4},
  timestamp    = {Mon, 15 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/air/AkhtomSC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/air/ElAgamySAAE24,
  author       = {Rasha F. El{-}Agamy and
                  Hanaa A. Sayed and
                  Arwa M. AL Akhatatneh and
                  Mansourah Aljohani and
                  Mostafa A. El{-}Hosseini},
  title        = {Comprehensive analysis of digital twins in smart cities: a 4200-paper
                  bibliometric study},
  journal      = {Artif. Intell. Rev.},
  volume       = {57},
  number       = {6},
  pages        = {154},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10462-024-10781-8},
  doi          = {10.1007/S10462-024-10781-8},
  timestamp    = {Thu, 04 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/air/ElAgamySAAE24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ais/CurtoACZ24,
  author       = {Georgina Curto and
                  Mario Fernando Jojoa Acosta and
                  Flavio Comim and
                  Bego{\~{n}}a Garc{\'{\i}}a Zapirain},
  title        = {Are {AI} systems biased against the poor? {A} machine learning analysis
                  using Word2Vec and GloVe embeddings},
  journal      = {{AI} Soc.},
  volume       = {39},
  number       = {2},
  pages        = {617--632},
  year         = {2024},
  url          = {https://doi.org/10.1007/s00146-022-01494-z},
  doi          = {10.1007/S00146-022-01494-Z},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ais/CurtoACZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/aisy/ChenHC24,
  author       = {Guanxing Chen and
                  Haohuai He and
                  Calvin Yu{-}Chian Chen},
  title        = {{MFAE:} Multilevel Feature Aggregation Enhanced Drug-Target Affinity
                  Prediction for Drug Repurposing Against Colorectal Cancer},
  journal      = {Adv. Intell. Syst.},
  volume       = {6},
  number       = {3},
  year         = {2024},
  url          = {https://doi.org/10.1002/aisy.202300546},
  doi          = {10.1002/AISY.202300546},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/aisy/ChenHC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amc/CuiLDJYW24,
  author       = {Guanghai Cui and
                  Jun{-}Li Li and
                  Kun{-}Xiang Dong and
                  Xing Jin and
                  Hong{-}Yong Yang and
                  Zhen Wang},
  title        = {Influence of subsidy policies against insurances on controlling the
                  propagation of epidemic security risks in networks},
  journal      = {Appl. Math. Comput.},
  volume       = {476},
  pages        = {128797},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.amc.2024.128797},
  doi          = {10.1016/J.AMC.2024.128797},
  timestamp    = {Thu, 20 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/amc/CuiLDJYW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amc/DingS24,
  author       = {Lusong Ding and
                  Weiwei Sun},
  title        = {Neuroadaptive prescribed-time secure control for nonlinear interconnected
                  NCSs via multiple triggering against DoS attacks},
  journal      = {Appl. Math. Comput.},
  volume       = {470},
  pages        = {128562},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.amc.2024.128562},
  doi          = {10.1016/J.AMC.2024.128562},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/amc/DingS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amc/DingWS24,
  author       = {Hongfei Ding and
                  Yudong Wang and
                  Hao Shen},
  title        = {A reinforcement learning integral sliding mode control scheme against
                  lumped disturbances in hot strip rolling},
  journal      = {Appl. Math. Comput.},
  volume       = {465},
  pages        = {128407},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.amc.2023.128407},
  doi          = {10.1016/J.AMC.2023.128407},
  timestamp    = {Mon, 01 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/amc/DingWS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amc/GuoL24,
  author       = {Ming{-}Juan Guo and
                  Yuan{-}Xin Li},
  title        = {Estimator-based adaptive prescribed performance cooperative bipartite
                  containment control of nonlinear multiagent system against DoS attacks},
  journal      = {Appl. Math. Comput.},
  volume       = {470},
  pages        = {128585},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.amc.2024.128585},
  doi          = {10.1016/J.AMC.2024.128585},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/amc/GuoL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amc/LaxmiJAM24,
  author       = {Parik Laxmi and
                  Shilpi Jain and
                  Praveen Agarwal and
                  Gradimir V. Milovanovic},
  title        = {Numerical calculation of the extension of k-beta function and some
                  new extensions by using two parameter k-Mittag-Leffler function},
  journal      = {Appl. Math. Comput.},
  volume       = {479},
  pages        = {128857},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.amc.2024.128857},
  doi          = {10.1016/J.AMC.2024.128857},
  timestamp    = {Thu, 04 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/amc/LaxmiJAM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/anor/GoreckiBR24,
  author       = {Jan G{\'{o}}recki and
                  David Bartl and
                  Jaroslav Ram{\'{\i}}k},
  title        = {Robustness of priority deriving methods for pairwise comparison matrices
                  against rank reversal: a probabilistic approach},
  journal      = {Ann. Oper. Res.},
  volume       = {333},
  number       = {1},
  pages        = {249--273},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10479-023-05753-0},
  doi          = {10.1007/S10479-023-05753-0},
  timestamp    = {Fri, 08 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/anor/GoreckiBR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/apin/ChengLPWL24,
  author       = {Yao Cheng and
                  Senlin Luo and
                  Limin Pan and
                  Yunwei Wan and
                  Xinshuai Li},
  title        = {{HAMIATCM:} high-availability membership inference attack against
                  text classification models under little knowledge},
  journal      = {Appl. Intell.},
  volume       = {54},
  number       = {17-18},
  pages        = {7994--8019},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10489-024-05495-x},
  doi          = {10.1007/S10489-024-05495-X},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/apin/ChengLPWL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/apin/FilipiakFF24,
  author       = {Dominik Filipiak and
                  Anna Fensel and
                  Agata Filipowska},
  title        = {KGTN-ens: few-shot image classification with knowledge graph ensembles},
  journal      = {Appl. Intell.},
  volume       = {54},
  number       = {2},
  pages        = {1893--1908},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10489-023-05129-8},
  doi          = {10.1007/S10489-023-05129-8},
  timestamp    = {Fri, 08 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/apin/FilipiakFF24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/apin/JiangY0ME024,
  author       = {Yan Jiang and
                  Guisheng Yin and
                  Weipeng Jing and
                  Linda Mohaisen and
                  Mahmoud Emam and
                  Ye Yuan},
  title        = {Box-spoof attack against single object tracking},
  journal      = {Appl. Intell.},
  volume       = {54},
  number       = {2},
  pages        = {1585--1601},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10489-023-05264-2},
  doi          = {10.1007/S10489-023-05264-2},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/apin/JiangY0ME024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/apin/Zhang0ZX24,
  author       = {Sicong Zhang and
                  Yang Xu and
                  Xinyu Zhang and
                  Xiaoyao Xie},
  title        = {Amplification methods to promote the attacks against machine learning-based
                  intrusion detection systems},
  journal      = {Appl. Intell.},
  volume       = {54},
  number       = {4},
  pages        = {2941--2961},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10489-024-05311-6},
  doi          = {10.1007/S10489-024-05311-6},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/apin/Zhang0ZX24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/artmed/AbbasiCRA24,
  author       = {Maryam Abbasi and
                  Filipa G. Carvalho and
                  Bernardete Ribeiro and
                  Joel P. Arrais},
  title        = {Predicting drug activity against cancer through genomic profiles and
                  {SMILES}},
  journal      = {Artif. Intell. Medicine},
  volume       = {150},
  pages        = {102820},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.artmed.2024.102820},
  doi          = {10.1016/J.ARTMED.2024.102820},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/artmed/AbbasiCRA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/artmed/AgarwalR24,
  author       = {Harsh Agarwal and
                  Heena Rathore},
  title        = {{BGRL:} Basal Ganglia inspired Reinforcement Learning based framework
                  for deep brain stimulators},
  journal      = {Artif. Intell. Medicine},
  volume       = {147},
  pages        = {102736},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.artmed.2023.102736},
  doi          = {10.1016/J.ARTMED.2023.102736},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/artmed/AgarwalR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/artmed/CottinZPGK24,
  author       = {Aziliz Cottin and
                  Marine Zulian and
                  Nicolas P{\'{e}}cuchet and
                  Agathe Guilloux and
                  Sandrine Katsahian},
  title        = {{MS-CPFI:} {A} model-agnostic Counterfactual Perturbation Feature
                  Importance algorithm for interpreting black-box Multi-State models},
  journal      = {Artif. Intell. Medicine},
  volume       = {147},
  pages        = {102741},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.artmed.2023.102741},
  doi          = {10.1016/J.ARTMED.2023.102741},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/artmed/CottinZPGK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/asc/ChenZZLXG24,
  author       = {Jinyin Chen and
                  Xiaoming Zhao and
                  Haibin Zheng and
                  Xiao Li and
                  Sheng Xiang and
                  Haifeng Guo},
  title        = {Robust knowledge distillation based on feature variance against backdoored
                  teacher model},
  journal      = {Appl. Soft Comput.},
  volume       = {163},
  pages        = {111907},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.asoc.2024.111907},
  doi          = {10.1016/J.ASOC.2024.111907},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/asc/ChenZZLXG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/asc/ChengLHX24,
  author       = {Shuyan Cheng and
                  Peng Li and
                  Keji Han and
                  He Xu},
  title        = {Feature-aware transferable adversarial attacks against image classification},
  journal      = {Appl. Soft Comput.},
  volume       = {161},
  pages        = {111729},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.asoc.2024.111729},
  doi          = {10.1016/J.ASOC.2024.111729},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/asc/ChengLHX24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/asc/DaiZWZ24,
  author       = {Zhenglin Dai and
                  Liping Zhao and
                  Ke Wang and
                  Yanlin Zhou},
  title        = {Mode standardization: {A} practical countermeasure against mode collapse
                  of GAN-based signal synthesis},
  journal      = {Appl. Soft Comput.},
  volume       = {150},
  pages        = {111089},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.asoc.2023.111089},
  doi          = {10.1016/J.ASOC.2023.111089},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/asc/DaiZWZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/asc/DongQFCCS24,
  author       = {Liang Dong and
                  Jiawei Qiu and
                  Zhongwang Fu and
                  Leiyang Chen and
                  Xiaohui Cui and
                  Zhidong Shen},
  title        = {Stealthy dynamic backdoor attack against neural networks for image
                  classification},
  journal      = {Appl. Soft Comput.},
  volume       = {149},
  number       = {Part {A}},
  pages        = {110993},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.asoc.2023.110993},
  doi          = {10.1016/J.ASOC.2023.110993},
  timestamp    = {Thu, 04 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/asc/DongQFCCS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/asc/LinCZH24,
  author       = {Delv Lin and
                  Qi Chen and
                  Chengyu Zhou and
                  Kun He},
  title        = {Tracklet-switch and imperceivable adversarial attack against pedestrian
                  Multi-Object Tracking trackers},
  journal      = {Appl. Soft Comput.},
  volume       = {162},
  pages        = {111860},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.asoc.2024.111860},
  doi          = {10.1016/J.ASOC.2024.111860},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/asc/LinCZH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/asc/ShenCLSWY24,
  author       = {Shigen Shen and
                  Chenpeng Cai and
                  Zhenwei Li and
                  Yizhou Shen and
                  Guowen Wu and
                  Shui Yu},
  title        = {Deep Q-network-based heuristic intrusion detection against edge-based
                  SIoT zero-day attacks},
  journal      = {Appl. Soft Comput.},
  volume       = {150},
  pages        = {111080},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.asoc.2023.111080},
  doi          = {10.1016/J.ASOC.2023.111080},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/asc/ShenCLSWY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/asc/UddinJO24,
  author       = {Kutub Uddin and
                  Tae Hyun Jeong and
                  Byung Tae Oh},
  title        = {Counter-act against GAN-based attacks: {A} collaborative learning
                  approach for anti-forensic detection},
  journal      = {Appl. Soft Comput.},
  volume       = {153},
  pages        = {111287},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.asoc.2024.111287},
  doi          = {10.1016/J.ASOC.2024.111287},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/asc/UddinJO24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ascom/RissakiPFPE24,
  author       = {Agapi Rissaki and
                  Orestis Pavlou and
                  Dimitris Fotakis and
                  Vicky Papadopoulou and
                  Andreas Efstathiou},
  title        = {Reconstructing the mid-infrared spectra of galaxies using ultraviolet
                  to submillimeter photometry and Deep Generative Networks},
  journal      = {Astron. Comput.},
  volume       = {47},
  pages        = {100823},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.ascom.2024.100823},
  doi          = {10.1016/J.ASCOM.2024.100823},
  timestamp    = {Tue, 18 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ascom/RissakiPFPE24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/automatica/GaoY24,
  author       = {Rui Gao and
                  Guang{-}Hong Yang},
  title        = {Resilient cluster consensus for discrete-time high-order multi-agent
                  systems against malicious adversaries},
  journal      = {Autom.},
  volume       = {159},
  pages        = {111382},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.automatica.2023.111382},
  doi          = {10.1016/J.AUTOMATICA.2023.111382},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/automatica/GaoY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/automatica/LiP24b,
  author       = {Haifang Li and
                  Ju H. Park},
  title        = {Adaptive event-triggered fault detection filter for unmanned surface
                  vehicles against randomly occurring injection attacks},
  journal      = {Autom.},
  volume       = {163},
  pages        = {111555},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.automatica.2024.111555},
  doi          = {10.1016/J.AUTOMATICA.2024.111555},
  timestamp    = {Mon, 05 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/automatica/LiP24b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/automatica/WangZZLXZ24,
  author       = {Jiamin Wang and
                  Liqi Zhou and
                  Dong Zhang and
                  Jian Liu and
                  Feng Xiao and
                  Yuanshi Zheng},
  title        = {Protocol selection for second-order consensus against disturbance},
  journal      = {Autom.},
  volume       = {161},
  pages        = {111497},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.automatica.2023.111497},
  doi          = {10.1016/J.AUTOMATICA.2023.111497},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/automatica/WangZZLXZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/automatica/WeiZZS24,
  author       = {Henglai Wei and
                  Kunwu Zhang and
                  Hui Zhang and
                  Yang Shi},
  title        = {Resilient and constrained consensus against adversarial attacks: {A}
                  distributed {MPC} framework},
  journal      = {Autom.},
  volume       = {160},
  pages        = {111417},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.automatica.2023.111417},
  doi          = {10.1016/J.AUTOMATICA.2023.111417},
  timestamp    = {Thu, 25 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/automatica/WeiZZS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/automatica/XieWJ24,
  author       = {Qian Xie and
                  Jiayi Wang and
                  Li Jin},
  title        = {Cost-aware defense for parallel server systems against reliability
                  and security failures},
  journal      = {Autom.},
  volume       = {160},
  pages        = {111467},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.automatica.2023.111467},
  doi          = {10.1016/J.AUTOMATICA.2023.111467},
  timestamp    = {Thu, 25 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/automatica/XieWJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/automatica/YaoLY24,
  author       = {Jingshi Yao and
                  Shaoyuan Li and
                  Xiang Yin},
  title        = {Sensor deception attacks against security in supervisory control systems},
  journal      = {Autom.},
  volume       = {159},
  pages        = {111330},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.automatica.2023.111330},
  doi          = {10.1016/J.AUTOMATICA.2023.111330},
  timestamp    = {Wed, 03 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/automatica/YaoLY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/axioms/AgarwalDES24,
  author       = {Ravi P. Agarwal and
                  Mohamed Abdalla Darwish and
                  Hamdi Ali Elshamy and
                  Samir H. Saker},
  title        = {Fundamental Properties of Muckenhoupt and Gehring Weights on Time
                  Scales},
  journal      = {Axioms},
  volume       = {13},
  number       = {2},
  pages        = {98},
  year         = {2024},
  url          = {https://doi.org/10.3390/axioms13020098},
  doi          = {10.3390/AXIOMS13020098},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/axioms/AgarwalDES24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/axioms/AgarwalMZMZ24,
  author       = {Ravi P. Agarwal and
                  Soheyb Milles and
                  Brahim Ziane and
                  Abdelaziz Mennouni and
                  Lemnaouar Zedam},
  title        = {Ideals and Filters on Neutrosophic Topologies Generated by Neutrosophic
                  Relations},
  journal      = {Axioms},
  volume       = {13},
  number       = {5},
  pages        = {292},
  year         = {2024},
  url          = {https://doi.org/10.3390/axioms13050292},
  doi          = {10.3390/AXIOMS13050292},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/axioms/AgarwalMZMZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/axioms/DongCDFGJKMMMU24,
  author       = {Zhongtian Dong and
                  Mar{\c{c}}al Comajoan Cara and
                  Gopal Ramesh Dahale and
                  Roy T. Forestano and
                  Sergei Gleyzer and
                  Daniel Justice and
                  Kyoungchul Kong and
                  Tom Magorsch and
                  Konstantin T. Matchev and
                  Katia Matcheva and
                  Eyup B. Unlu},
  title        = {{\(\mathbb{Z}\)}2 {\texttimes} {\(\mathbb{Z}\)}2 Equivariant Quantum
                  Neural Networks: Benchmarking against Classical Neural Networks},
  journal      = {Axioms},
  volume       = {13},
  number       = {3},
  pages        = {188},
  year         = {2024},
  url          = {https://doi.org/10.3390/axioms13030188},
  doi          = {10.3390/AXIOMS13030188},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/axioms/DongCDFGJKMMMU24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/axioms/DuAKKC24,
  author       = {Wei{-}Shih Du and
                  Ravi Prakash Agarwal and
                  Erdal Karapinar and
                  Marko Kostic and
                  Jian Cao},
  title        = {Preface to the Special Issue "A Themed Issue on Mathematical Inequalities,
                  Analytic Combinatorics and Related Topics in Honor of Professor Feng
                  Qi"},
  journal      = {Axioms},
  volume       = {12},
  number       = {9},
  pages        = {846},
  year         = {2024},
  url          = {https://doi.org/10.3390/axioms12090846},
  doi          = {10.3390/AXIOMS12090846},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/axioms/DuAKKC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/axioms/GerkeM24,
  author       = {Oke Gerke and
                  S{\"{o}}ren M{\"{o}}ller},
  title        = {Modeling Bland-Altman Limits of Agreement with Fractional Polynomials
                  - An Example with the Agatston Score for Coronary Calcification},
  journal      = {Axioms},
  volume       = {12},
  number       = {9},
  pages        = {884},
  year         = {2024},
  url          = {https://doi.org/10.3390/axioms12090884},
  doi          = {10.3390/AXIOMS12090884},
  timestamp    = {Wed, 24 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/axioms/GerkeM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bc/Elliott24,
  author       = {Terry Elliott},
  title        = {Stability against fluctuations: a two-dimensional study of scaling,
                  bifurcations and spontaneous symmetry breaking in stochastic models
                  of synaptic plasticity},
  journal      = {Biol. Cybern.},
  volume       = {118},
  number       = {1-2},
  pages        = {39--81},
  year         = {2024},
  url          = {https://doi.org/10.1007/s00422-024-00985-0},
  doi          = {10.1007/S00422-024-00985-0},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/bc/Elliott24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bdcc/VillegasChJL24,
  author       = {William Eduardo Villegas{-}Ch. and
                  Angel Jaramillo{-}Alc{\'{a}}zar and
                  Sergio Luj{\'{a}}n{-}Mora},
  title        = {Evaluating the Robustness of Deep Learning Models against Adversarial
                  Attacks: An Analysis with FGSM, {PGD} and {CW}},
  journal      = {Big Data Cogn. Comput.},
  volume       = {8},
  number       = {1},
  pages        = {8},
  year         = {2024},
  url          = {https://doi.org/10.3390/bdcc8010008},
  doi          = {10.3390/BDCC8010008},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bdcc/VillegasChJL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/behaviourIT/AgarwalJJ24,
  author       = {Alka Agarwal and
                  Ashish Kumar Jha and
                  Jyoti Jagasia},
  title        = {She has got a gig: affordances of on-demand work apps for marginalised
                  women enduring time scarcity},
  journal      = {Behav. Inf. Technol.},
  volume       = {43},
  number       = {8},
  pages        = {1636--1651},
  year         = {2024},
  url          = {https://doi.org/10.1080/0144929x.2023.2223298},
  doi          = {10.1080/0144929X.2023.2223298},
  timestamp    = {Tue, 30 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/behaviourIT/AgarwalJJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bigdata/ThotaSJKRGP24,
  author       = {Chandu Thota and
                  Dinesh Jackson Samuel and
                  Mustafa Musa Jaber and
                  M. M. Kamruzzaman and
                  Renjith V. Ravi and
                  Lydia J. Gnanasigamani and
                  R. Premalatha},
  title        = {Image Smart Segmentation Analysis Against Diabetic Foot Ulcer Using
                  Internet of Things with Virtual Sensing},
  journal      = {Big Data},
  volume       = {12},
  number       = {2},
  pages        = {155--172},
  year         = {2024},
  url          = {https://doi.org/10.1089/big.2022.0283},
  doi          = {10.1089/BIG.2022.0283},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/bigdata/ThotaSJKRGP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/braininf/AgarwalDD24,
  author       = {Navneet Agarwal and
                  Ga{\"{e}}l Dias and
                  Sonia Dollfus},
  title        = {Multi-view graph-based interview representation to improve depression
                  level estimation},
  journal      = {Brain Informatics},
  volume       = {11},
  number       = {1},
  pages        = {14},
  year         = {2024},
  url          = {https://doi.org/10.1186/s40708-024-00227-w},
  doi          = {10.1186/S40708-024-00227-W},
  timestamp    = {Mon, 10 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/braininf/AgarwalDD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bspc/CheeSLG24,
  author       = {Lit Zhi Chee and
                  Saaveethya Sivakumar and
                  King Hann Lim and
                  Alpha Agape Gopalai},
  title        = {Gait acceleration-based diabetes detection using hybrid deep learning},
  journal      = {Biomed. Signal Process. Control.},
  volume       = {92},
  pages        = {105998},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.bspc.2024.105998},
  doi          = {10.1016/J.BSPC.2024.105998},
  timestamp    = {Thu, 04 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/bspc/CheeSLG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bspc/IshwerlalAS24,
  author       = {Rathod Dharmesh Ishwerlal and
                  Reshu Agarwal and
                  K. S. Sujatha},
  title        = {Lung disease classification using chest {X} ray image: An optimal
                  ensemble of classification with hybrid training},
  journal      = {Biomed. Signal Process. Control.},
  volume       = {91},
  pages        = {105941},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.bspc.2023.105941},
  doi          = {10.1016/J.BSPC.2023.105941},
  timestamp    = {Thu, 27 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/bspc/IshwerlalAS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bspc/KulwaLSZOAML24,
  author       = {Frank Kulwa and
                  Yongcheng Li and
                  Oluwarotimi Williams Samuel and
                  Haipeng Zhang and
                  Tolulope Tofunmi Oyemakinde and
                  Mojisola Grace Asogbon and
                  Alistair A. McEwan and
                  Guanglin Li},
  title        = {A robust feature adaptation approach against variation of muscle contraction
                  forces for myoelectric pattern recognition-based gesture characterization},
  journal      = {Biomed. Signal Process. Control.},
  volume       = {95},
  pages        = {106446},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.bspc.2024.106446},
  doi          = {10.1016/J.BSPC.2024.106446},
  timestamp    = {Thu, 04 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/bspc/KulwaLSZOAML24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bspc/MahmoodRAKS24,
  author       = {Md Junaid Mahmood and
                  Pranaw Raj and
                  Divyansh Agarwal and
                  Suruchi Kumari and
                  Pravendra Singh},
  title        = {{SPLAL:} Similarity-based pseudo-labeling with alignment loss for
                  semi-supervised medical image classification},
  journal      = {Biomed. Signal Process. Control.},
  volume       = {89},
  pages        = {105665},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.bspc.2023.105665},
  doi          = {10.1016/J.BSPC.2023.105665},
  timestamp    = {Thu, 04 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/bspc/MahmoodRAKS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bspc/ShaoGFXLH24,
  author       = {Jiahao Shao and
                  Shijia Geng and
                  Zhaoji Fu and
                  Weilun Xu and
                  Tong Liu and
                  Shenda Hong},
  title        = {CardioDefense: Defending against adversarial attack in {ECG} classification
                  with adversarial distillation training},
  journal      = {Biomed. Signal Process. Control.},
  volume       = {91},
  pages        = {105922},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.bspc.2023.105922},
  doi          = {10.1016/J.BSPC.2023.105922},
  timestamp    = {Thu, 04 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/bspc/ShaoGFXLH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bspc/SinghGGAD24,
  author       = {Arjun Singh and
                  Sonam Gupta and
                  Lipika Goel and
                  Abhay Kumar Agarwal and
                  Shashi Kant Dargar},
  title        = {Archimedes optimization-based Elman Recurrent Neural Network for detection
                  of post-traumatic stress disorder},
  journal      = {Biomed. Signal Process. Control.},
  volume       = {90},
  pages        = {105806},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.bspc.2023.105806},
  doi          = {10.1016/J.BSPC.2023.105806},
  timestamp    = {Thu, 27 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/bspc/SinghGGAD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bspc/YuanZA24,
  author       = {Chunyu Yuan and
                  Dongfang Zhao and
                  Sos S. Agaian},
  title        = {UCM-Net: {A} lightweight and efficient solution for skin lesion segmentation
                  using {MLP} and {CNN}},
  journal      = {Biomed. Signal Process. Control.},
  volume       = {96},
  pages        = {106573},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.bspc.2024.106573},
  doi          = {10.1016/J.BSPC.2024.106573},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/bspc/YuanZA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/CranorAN24,
  author       = {Lorrie Faith Cranor and
                  Yuvraj Agarwal and
                  Pardis Emami Naeini},
  title        = {Internet of Things Security and Privacy Labels Should Empower Consumers},
  journal      = {Commun. {ACM}},
  volume       = {67},
  number       = {3},
  pages        = {29--31},
  year         = {2024},
  url          = {https://doi.org/10.1145/3637630},
  doi          = {10.1145/3637630},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cacm/CranorAN24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/LimayeST24,
  author       = {Nutan Limaye and
                  Srikanth Srinivasan and
                  S{\'{e}}bastien Tavenas},
  title        = {Superpolynomial Lower Bounds Against Low-Depth Algebraic Circuits},
  journal      = {Commun. {ACM}},
  volume       = {67},
  number       = {2},
  pages        = {101--108},
  year         = {2024},
  url          = {https://doi.org/10.1145/3611094},
  doi          = {10.1145/3611094},
  timestamp    = {Fri, 23 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/LimayeST24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cal/AgarwalFGSB24,
  author       = {Nikhil Agarwal and
                  Mitchell Fream and
                  Souradip Ghosh and
                  Brian C. Schwedock and
                  Nathan Beckmann},
  title        = {{UDIR:} Towards a Unified Compiler Framework for Reconfigurable Dataflow
                  Architectures},
  journal      = {{IEEE} Comput. Archit. Lett.},
  volume       = {23},
  number       = {1},
  pages        = {99--103},
  year         = {2024},
  url          = {https://doi.org/10.1109/LCA.2023.3342130},
  doi          = {10.1109/LCA.2023.3342130},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cal/AgarwalFGSB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/candc/AslimDB24,
  author       = {Belma Aslim and
                  Serap Nigdelioglu Dolanbay and
                  Sahra Setenay Baran},
  title        = {Exploring allocryptopine as a neuroprotective agent against oxidative
                  stress-induced neural apoptosis via Akt/GSK-3{\(\beta\)}/tau pathway
                  modulation},
  journal      = {Comput. Biol. Chem.},
  volume       = {112},
  pages        = {108144},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.compbiolchem.2024.108144},
  doi          = {10.1016/J.COMPBIOLCHEM.2024.108144},
  timestamp    = {Mon, 29 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/candc/AslimDB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/candc/DwivediRRKAK24,
  author       = {Kountay Dwivedi and
                  Ankit Rajpal and
                  Sheetal Rajpal and
                  Virendra Kumar and
                  Manoj Agarwal and
                  Naveen Kumar},
  title        = {\emph{XL\({}_{\mbox{1}}\)R-Net}: Explainable AI-driven improved L1-regularized
                  deep neural architecture for {NSCLC} biomarker identification},
  journal      = {Comput. Biol. Chem.},
  volume       = {108},
  pages        = {107990},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.compbiolchem.2023.107990},
  doi          = {10.1016/J.COMPBIOLCHEM.2023.107990},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/candc/DwivediRRKAK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/candc/MacalaladOO24,
  author       = {Mark Andrian B. Macalalad and
                  Nyzar Mabeth O. Odchimar and
                  Fredmoore L. Orosco},
  title        = {High-throughput virtual screening of Streptomyces spp. metabolites
                  as antiviral inhibitors against the Nipah virus matrix protein},
  journal      = {Comput. Biol. Chem.},
  volume       = {112},
  pages        = {108133},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.compbiolchem.2024.108133},
  doi          = {10.1016/J.COMPBIOLCHEM.2024.108133},
  timestamp    = {Mon, 29 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/candc/MacalaladOO24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/candc/MishraRSDP24,
  author       = {Sarbani Mishra and
                  Madhusmita Rout and
                  Mahender Kumar Singh and
                  Budheswar Dehury and
                  Sanghamitra Pati},
  title        = {Classical molecular dynamics simulation identifies catechingallate
                  as a promising antiviral polyphenol against {MPOX} palmitoylated surface
                  protein},
  journal      = {Comput. Biol. Chem.},
  volume       = {110},
  pages        = {108070},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.compbiolchem.2024.108070},
  doi          = {10.1016/J.COMPBIOLCHEM.2024.108070},
  timestamp    = {Thu, 04 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/candc/MishraRSDP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/candc/PurohitBDM24,
  author       = {Priyanka Purohit and
                  Debashis Barik and
                  Jarmani Dansana and
                  Biswa Ranjan Meher},
  title        = {Investigating Lycotoxin-An1a (\emph{An1a}), a defense antiviral peptide
                  from \emph{Alopecosa nagpag} venom as prospective anti-dengue agent
                  against {DENV-2} {NS2B-NS3} protease},
  journal      = {Comput. Biol. Chem.},
  volume       = {108},
  pages        = {108005},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.compbiolchem.2023.108005},
  doi          = {10.1016/J.COMPBIOLCHEM.2023.108005},
  timestamp    = {Sun, 28 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/candc/PurohitBDM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/candc/SuvarnaSKMN24,
  author       = {Eashita Suvarna and
                  Anagha S. Setlur and
                  Chandrashekar K and
                  Sridharan M and
                  Vidya Niranjan},
  title        = {Computational molecular perspectives on novel carbazole derivative
                  as an anti-cancer molecule against {CDK1} of breast and colorectal
                  cancers via gene expression studies, novel two-way docking strategies,
                  molecular mechanics and dynamics},
  journal      = {Comput. Biol. Chem.},
  volume       = {108},
  pages        = {107979},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.compbiolchem.2023.107979},
  doi          = {10.1016/J.COMPBIOLCHEM.2023.107979},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/candc/SuvarnaSKMN24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/candc/YangLMGQ24,
  author       = {Zhiguo Yang and
                  Bo Lyu and
                  Bin Ma and
                  Yuefeng Gao and
                  Dongmei Qin},
  title        = {Screening of the effective sites of Cichorium glandulosum against
                  hyperuricemia combined with hyperlipidemia and its network pharmacology
                  analysis},
  journal      = {Comput. Biol. Chem.},
  volume       = {110},
  pages        = {108088},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.compbiolchem.2024.108088},
  doi          = {10.1016/J.COMPBIOLCHEM.2024.108088},
  timestamp    = {Thu, 27 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/candc/YangLMGQ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/candc/ZhaoG24,
  author       = {Yuting Zhao and
                  Junfeng Guo},
  title        = {Integrated study reveals mechanism of Tripterygium Wilfordii against
                  cholangiocarcinoma based on bioinformatics approaches and molecular
                  dynamics simulation},
  journal      = {Comput. Biol. Chem.},
  volume       = {109},
  pages        = {108030},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.compbiolchem.2024.108030},
  doi          = {10.1016/J.COMPBIOLCHEM.2024.108030},
  timestamp    = {Thu, 27 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/candc/ZhaoG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/candc/ZhuMLJXCCJY24,
  author       = {Jingyu Zhu and
                  Huiqin Meng and
                  Xintong Li and
                  Lei Jia and
                  Lei Xu and
                  Yanfei Cai and
                  Yun Chen and
                  Jian Jin and
                  Li Yu},
  title        = {Optimization of virtual screening against phosphoinositide 3-kinase
                  delta: Integration of common feature pharmacophore and multicomplex-based
                  molecular docking},
  journal      = {Comput. Biol. Chem.},
  volume       = {109},
  pages        = {108011},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.compbiolchem.2023.108011},
  doi          = {10.1016/J.COMPBIOLCHEM.2023.108011},
  timestamp    = {Thu, 04 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/candc/ZhuMLJXCCJY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cbm/AsadHWAKOIB24,
  author       = {Muhammad Asad and
                  Ahmad Hassan and
                  Weiyu Wang and
                  Wadi B. Alonazi and
                  Muhammad Saroosh Khan and
                  Solabomi Olaitan Ogunyemi and
                  Muhammad Ibrahim and
                  Li Bin},
  title        = {An integrated in silico approach for the identification of novel potential
                  drug target and chimeric vaccine against Neisseria meningitides strain
                  331401 serogroup {X} by subtractive genomics and reverse vaccinology},
  journal      = {Comput. Biol. Medicine},
  volume       = {178},
  pages        = {108738},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.compbiomed.2024.108738},
  doi          = {10.1016/J.COMPBIOMED.2024.108738},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cbm/AsadHWAKOIB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cbm/CeskoutseBZABZ24,
  author       = {Ribot Fleury T. Ceskouts{\'{e}} and
                  Alain Bertrand Bomgni and
                  David R. Gnimpieba Zanfack and
                  Diing D. M. Agany and
                  Thomas Bou{\'{e}}tou Bou{\'{e}}tou and
                  Etienne Gnimpieba Zohim},
  title        = {Sub-clustering based recommendation system for stroke patient: Identification
                  of a specific drug class for a given patient},
  journal      = {Comput. Biol. Medicine},
  volume       = {171},
  pages        = {108117},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.compbiomed.2024.108117},
  doi          = {10.1016/J.COMPBIOMED.2024.108117},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cbm/CeskoutseBZABZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cbm/ChengSHTNLXMZXQLZB24,
  author       = {Ka Wing Cheng and
                  Jingchun Shi and
                  Chunhua Huang and
                  Hor Yue Tan and
                  Ziwan Ning and
                  Cheng Lyu and
                  Yiqi Xu and
                  Heung Lam Mok and
                  Lixiang Zhai and
                  Li Xiang and
                  Hongyan Qin and
                  Chengyuan Lin and
                  Lin Zhu and
                  Zhaoxiang Bian},
  title        = {Integrated metabolomics and serum-feces pharmacochemistry-based network
                  pharmacology to reveal the mechanisms of an herbal prescription against
                  ulcerative colitis},
  journal      = {Comput. Biol. Medicine},
  volume       = {178},
  pages        = {108775},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.compbiomed.2024.108775},
  doi          = {10.1016/J.COMPBIOMED.2024.108775},
  timestamp    = {Mon, 05 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cbm/ChengSHTNLXMZXQLZB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cbm/ChengYSLFW24,
  author       = {Hanrong Cheng and
                  Yifei Yang and
                  Jingshu Shi and
                  Zhangbo Li and
                  Yang Feng and
                  Xingjun Wang},
  title        = {Comparison of automated deep neural network against manual sleep stage
                  scoring in clinical data},
  journal      = {Comput. Biol. Medicine},
  volume       = {179},
  pages        = {108855},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.compbiomed.2024.108855},
  doi          = {10.1016/J.COMPBIOMED.2024.108855},
  timestamp    = {Mon, 29 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cbm/ChengYSLFW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cbm/RenLSZSJRDBIH24,
  author       = {Yunxiao Ren and
                  Carmen Li and
                  Dulmini Nanayakkara Sapugahawatte and
                  Chendi Zhu and
                  Sebastian Sp{\"{a}}nig and
                  Dorota Jamrozy and
                  Julian Rothen and
                  Claudia A. Daubenberger and
                  Stephen D. Bentley and
                  Margaret Ip and
                  Dominik Heider},
  title        = {Predicting hosts and cross-species transmission of Streptococcus agalactiae
                  by interpretable machine learning},
  journal      = {Comput. Biol. Medicine},
  volume       = {171},
  pages        = {108185},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.compbiomed.2024.108185},
  doi          = {10.1016/J.COMPBIOMED.2024.108185},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cbm/RenLSZSJRDBIH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cbm/WangPLWZSTGLSPLS24,
  author       = {Xiaoyu Wang and
                  Nitin Patil and
                  Fuyi Li and
                  Zhikang Wang and
                  Haolan Zhan and
                  Daniel Schmidt and
                  Philip Thompson and
                  Yuming Guo and
                  Cornelia B. Landersdorfer and
                  Hsin{-}Hui Shen and
                  Anton Y. Peleg and
                  Jian Li and
                  Jiangning Song},
  title        = {PmxPred: {A} data-driven approach for the identification of active
                  polymyxin analogues against gram-negative bacteria},
  journal      = {Comput. Biol. Medicine},
  volume       = {168},
  pages        = {107681},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.compbiomed.2023.107681},
  doi          = {10.1016/J.COMPBIOMED.2023.107681},
  timestamp    = {Sat, 27 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cbm/WangPLWZSTGLSPLS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cbm/YaghoobizadehARKG24,
  author       = {Fatemeh Yaghoobizadeh and
                  Mohammad Roayaei Ardakani and
                  Mohammad Mehdi Ranjbar and
                  Mohammad Khosravi and
                  Hamid Galehdari},
  title        = {Development of a potent recombinant scFv antibody against the SARS-CoV-2
                  by in-depth bioinformatics study: Paving the way for vaccine/diagnostics
                  development},
  journal      = {Comput. Biol. Medicine},
  volume       = {170},
  pages        = {108091},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.compbiomed.2024.108091},
  doi          = {10.1016/J.COMPBIOMED.2024.108091},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cbm/YaghoobizadehARKG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cbsn/GamitoOSRMDDMCAS24,
  author       = {Pedro Gamito and
                  Jorge Oliveira and
                  Jorge Silva and
                  Pedro J. Rosa and
                  Maria L. R. Mendes and
                  Ricardo Dias and
                  F{\'{a}}bio Dias and
                  Shivani Atul Mansuklal and
                  Joana Cartaxo and
                  H{\'{e}}lder Ant{\'{o}}nio and
                  {\'{A}}gata Salvador},
  title        = {Stress Inoculation in Police Officers Using Virtual Reality: {A} Controlled
                  Study},
  journal      = {Cyberpsychology Behav. Soc. Netw.},
  volume       = {27},
  number       = {4},
  pages        = {253--260},
  year         = {2024},
  url          = {https://doi.org/10.1089/cyber.2023.0385},
  doi          = {10.1089/CYBER.2023.0385},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cbsn/GamitoOSRMDDMCAS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cbsn/MaddocksSEA24,
  author       = {Sophie Maddocks and
                  Jaclyn A. Siegel and
                  Asia A. Eaton and
                  Shivam Agarwal},
  title        = {Who Is Invited to the Metaverse? Analyzing Media Coverage of an Emerging
                  Virtual World},
  journal      = {Cyberpsychology Behav. Soc. Netw.},
  volume       = {27},
  number       = {1},
  pages        = {76--82},
  year         = {2024},
  url          = {https://doi.org/10.1089/cyber.2022.0394},
  doi          = {10.1089/CYBER.2022.0394},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cbsn/MaddocksSEA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ce/JiangHFL24,
  author       = {Yang Jiang and
                  Jiangang Hao and
                  Michael Fauss and
                  Chen Li},
  title        = {Detecting ChatGPT-generated essays in a large-scale writing assessment:
                  Is there a bias against non-native English speakers?},
  journal      = {Comput. Educ.},
  volume       = {217},
  pages        = {105070},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.compedu.2024.105070},
  doi          = {10.1016/J.COMPEDU.2024.105070},
  timestamp    = {Thu, 04 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ce/JiangHFL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cea/ZhongHLHCL24,
  author       = {Ming Zhong and
                  Ruiqing Han and
                  Yan Liu and
                  Bo Huang and
                  Xiujuan Chai and
                  Yaxin Liu},
  title        = {Development, integration, and field evaluation of an autonomous Agaricus
                  bisporus picking robot},
  journal      = {Comput. Electron. Agric.},
  volume       = {220},
  pages        = {108871},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.compag.2024.108871},
  doi          = {10.1016/J.COMPAG.2024.108871},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cea/ZhongHLHCL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/AgacI24,
  author       = {Sumeyye Agac and
                  {\"{O}}zlem Durmaz Incel},
  title        = {Resource-efficient, sensor-based human activity recognition with lightweight
                  deep models boosted with attention},
  journal      = {Comput. Electr. Eng.},
  volume       = {117},
  pages        = {109274},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.compeleceng.2024.109274},
  doi          = {10.1016/J.COMPELECENG.2024.109274},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cee/AgacI24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/AhmadS24,
  author       = {Hussien Al{-}haj Ahmad and
                  Yasser Sedaghat},
  title        = {BiGResi: Robust bit-level fault injection framework for assessing
                  intrinsic software resilience against soft errors},
  journal      = {Comput. Electr. Eng.},
  volume       = {116},
  pages        = {109222},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.compeleceng.2024.109222},
  doi          = {10.1016/J.COMPELECENG.2024.109222},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cee/AhmadS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/LiTC24,
  author       = {David Chunhu Li and
                  Hsuan{-}Hao Tu and
                  Li{-}Der Chou},
  title        = {Cross-layer detection and defence mechanism against DDoS and DRDoS
                  attacks in software-defined networks using {P4} switches},
  journal      = {Comput. Electr. Eng.},
  volume       = {118},
  pages        = {109307},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.compeleceng.2024.109307},
  doi          = {10.1016/J.COMPELECENG.2024.109307},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cee/LiTC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/RameshraoKG24,
  author       = {Awagan Goyal Rameshrao and
                  Ebha Koley and
                  Subhojit Ghosh},
  title        = {Reliability enhancement of hybrid microgrid protection against communication
                  data loss and converter faults using cubic-spline interpolation, Savitzky
                  Golay filtering and {GRU} network},
  journal      = {Comput. Electr. Eng.},
  volume       = {116},
  pages        = {109144},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.compeleceng.2024.109144},
  doi          = {10.1016/J.COMPELECENG.2024.109144},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cee/RameshraoKG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/ZhongQZ24,
  author       = {Nan Zhong and
                  Zhenxing Qian and
                  Xinpeng Zhang},
  title        = {Sparse Backdoor Attack Against Neural Networks},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {5},
  pages        = {1783--1793},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxad100},
  doi          = {10.1093/COMJNL/BXAD100},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/ZhongQZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/ZhouZC24,
  author       = {Chunning Zhou and
                  Wentao Zhang and
                  Weiwei Cao},
  title        = {A New Approach of Evaluating the Security Against Differential and
                  Linear Cryptanalysis and Its Applications to Serpent, {NOEKEON} and
                  {ASCON}},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {1},
  pages        = {274--291},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxac173},
  doi          = {10.1093/COMJNL/BXAC173},
  timestamp    = {Sat, 27 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/ZhouZC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Vandezande24,
  author       = {Niels Vandezande},
  title        = {Cybersecurity in the {EU:} How the NIS2-directive stacks up against
                  its predecessor},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {52},
  pages        = {105890},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.clsr.2023.105890},
  doi          = {10.1016/J.CLSR.2023.105890},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Vandezande24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cluster/AMV24,
  author       = {Jyothish A. and
                  Ashik Mathew and
                  P. Vinod},
  title        = {Effectiveness of machine learning based android malware detectors
                  against adversarial attacks},
  journal      = {Clust. Comput.},
  volume       = {27},
  number       = {3},
  pages        = {2549--2569},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10586-023-04086-8},
  doi          = {10.1007/S10586-023-04086-8},
  timestamp    = {Wed, 05 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cluster/AMV24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cluster/AurangzebAKAS24,
  author       = {Sana Aurangzeb and
                  Muhammad Aleem and
                  Muhammad Taimoor Khan and
                  Haris Anwar and
                  Muhammad Shaoor Siddique},
  title        = {Cybersecurity for autonomous vehicles against malware attacks in smart-cities},
  journal      = {Clust. Comput.},
  volume       = {27},
  number       = {3},
  pages        = {3363--3378},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10586-023-04114-7},
  doi          = {10.1007/S10586-023-04114-7},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cluster/AurangzebAKAS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cluster/DaraghmehAJ24,
  author       = {Mustafa Daraghmeh and
                  Anjali Agarwal and
                  Yaser Jararweh},
  title        = {An ensemble clustering approach for modeling hidden categorization
                  perspectives for cloud workloads},
  journal      = {Clust. Comput.},
  volume       = {27},
  number       = {4},
  pages        = {4779--4803},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10586-023-04205-5},
  doi          = {10.1007/S10586-023-04205-5},
  timestamp    = {Mon, 12 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cluster/DaraghmehAJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cluster/LiHF24,
  author       = {Shaoyong Li and
                  Xueshu Hong and
                  Yao Feng},
  title        = {MuChat against active attacks, passive attacks, and traffic analysis
                  methods: a free convert chat application for instant communication
                  on mobile},
  journal      = {Clust. Comput.},
  volume       = {27},
  number       = {3},
  pages        = {2653--2671},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10586-023-04070-2},
  doi          = {10.1007/S10586-023-04070-2},
  timestamp    = {Wed, 05 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cluster/LiHF24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cmig/MachuraKBEKPRSZGKTN24,
  author       = {Bartosz Machura and
                  Damian Kucharski and
                  Oskar Bozek and
                  Bartosz Eksner and
                  Bartosz Kokoszka and
                  Tomasz Pekala and
                  Mateusz Radom and
                  Marek Strzelczak and
                  Lukasz Zarudzki and
                  Benjam{\'{\i}}n Guti{\'{e}}rrez{-}Becker and
                  Agata Krason and
                  Jean Tessier and
                  Jakub Nalepa},
  title        = {Deep learning ensembles for detecting brain metastases in longitudinal
                  multi-modal {MRI} studies},
  journal      = {Comput. Medical Imaging Graph.},
  volume       = {116},
  pages        = {102401},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.compmedimag.2024.102401},
  doi          = {10.1016/J.COMPMEDIMAG.2024.102401},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cmig/MachuraKBEKPRSZGKTN24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cmpb/DwivediRRKAK24,
  author       = {Kountay Dwivedi and
                  Ankit Rajpal and
                  Sheetal Rajpal and
                  Virendra Kumar and
                  Manoj Agarwal and
                  Naveen Kumar},
  title        = {Enlightening the path to {NSCLC} biomarkers: Utilizing the power of
                  XAI-guided deep learning},
  journal      = {Comput. Methods Programs Biomed.},
  volume       = {243},
  pages        = {107864},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cmpb.2023.107864},
  doi          = {10.1016/J.CMPB.2023.107864},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cmpb/DwivediRRKAK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/BuccafurriAIL24,
  author       = {Francesco Buccafurri and
                  Vincenzo De Angelis and
                  Maria Francesca Idone and
                  Cecilia Labrini},
  title        = {A hierarchical distributed trusted location service achieving location
                  k-anonymity against the global observer},
  journal      = {Comput. Networks},
  volume       = {243},
  pages        = {110301},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.comnet.2024.110301},
  doi          = {10.1016/J.COMNET.2024.110301},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/BuccafurriAIL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/QinJQGLD24,
  author       = {Xingsheng Qin and
                  Frank Jiang and
                  Xingguo Qin and
                  Lina Ge and
                  Meiqu Lu and
                  Robin Doss},
  title        = {CGAN-based cyber deception framework against reconnaissance attacks
                  in {ICS}},
  journal      = {Comput. Networks},
  volume       = {251},
  pages        = {110655},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.comnet.2024.110655},
  doi          = {10.1016/J.COMNET.2024.110655},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/QinJQGLD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/SariS24,
  author       = {T. Tolga Sari and
                  G{\"{o}}khan Se{\c{c}}inti},
  title        = {Using Centrality Based Topology Control for {FANET} Survivability
                  Against Jamming},
  journal      = {Comput. Networks},
  volume       = {242},
  pages        = {110250},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.comnet.2024.110250},
  doi          = {10.1016/J.COMNET.2024.110250},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/SariS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/WangW24,
  author       = {You{-}Chiun Wang and
                  Cheng{-}Yan Wu},
  title        = {{EC-NTD:} Efficient countermeasure against DrDoS attacks with {NAPT}
                  and two-stage detection in SDN-based networks},
  journal      = {Comput. Networks},
  volume       = {250},
  pages        = {110594},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.comnet.2024.110594},
  doi          = {10.1016/J.COMNET.2024.110594},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/WangW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/WuJZLL24,
  author       = {Xiaodong Wu and
                  Zhigang Jin and
                  Junyi Zhou and
                  Kai Liu and
                  Zepei Liu},
  title        = {Against network attacks in renewable power plants: Malicious behavior
                  defense for federated learning},
  journal      = {Comput. Networks},
  volume       = {250},
  pages        = {110577},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.comnet.2024.110577},
  doi          = {10.1016/J.COMNET.2024.110577},
  timestamp    = {Mon, 08 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/WuJZLL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/ZhangHCH24,
  author       = {Fan Zhang and
                  Hui Huang and
                  Zhixiong Chen and
                  Zhenjie Huang},
  title        = {Robust and privacy-preserving federated learning with distributed
                  additive encryption against poisoning attacks},
  journal      = {Comput. Networks},
  volume       = {245},
  pages        = {110383},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.comnet.2024.110383},
  doi          = {10.1016/J.COMNET.2024.110383},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/ZhangHCH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cnsns/AgasthyaM24,
  author       = {Lokahith Agasthya and
                  Caroline Jane Muller},
  title        = {Dynamics and scaling of internally cooled convection},
  journal      = {Commun. Nonlinear Sci. Numer. Simul.},
  volume       = {134},
  pages        = {108011},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cnsns.2024.108011},
  doi          = {10.1016/J.CNSNS.2024.108011},
  timestamp    = {Thu, 04 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cnsns/AgasthyaM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/NguyenBTTT24,
  author       = {Viet Hung Nguyen and
                  Duy Tien Bui and
                  Thanh Lam Tran and
                  Truong Cong Thang and
                  Thu Huong Truong},
  title        = {Scalable and resilient 360-degree-video adaptive streaming over {HTTP/2}
                  against sudden network drops},
  journal      = {Comput. Commun.},
  volume       = {216},
  pages        = {1--15},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.comcom.2024.01.001},
  doi          = {10.1016/J.COMCOM.2024.01.001},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/NguyenBTTT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/RajputAR24,
  author       = {Amitesh Singh Rajput and
                  Arnav Agarwal and
                  Kiran B. Raja},
  title        = {A robust multi-key authority system for privacy-preserving distribution
                  and access control of healthcare data},
  journal      = {Comput. Commun.},
  volume       = {225},
  pages        = {195--204},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.comcom.2024.07.005},
  doi          = {10.1016/J.COMCOM.2024.07.005},
  timestamp    = {Thu, 08 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/RajputAR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/VermaSKC24,
  author       = {Amandeep Verma and
                  Rahul Saha and
                  Gulshan Kumar and
                  Mauro Conti},
  title        = {{PETRAK:} {A} solution against DDoS attacks in vehicular networks},
  journal      = {Comput. Commun.},
  volume       = {221},
  pages        = {142--154},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.comcom.2024.04.025},
  doi          = {10.1016/J.COMCOM.2024.04.025},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/VermaSKC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comgeo/AgarwalKS24,
  author       = {Pankaj K. Agarwal and
                  Matthew J. Katz and
                  Micha Sharir},
  title        = {On reverse shortest paths in geometric proximity graphs},
  journal      = {Comput. Geom.},
  volume       = {117},
  pages        = {102053},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.comgeo.2023.102053},
  doi          = {10.1016/J.COMGEO.2023.102053},
  timestamp    = {Fri, 20 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comgeo/AgarwalKS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comgeo/CurryDGHKM24,
  author       = {Justin Curry and
                  Jordan DeSha and
                  Ad{\'{e}}lie Garin and
                  Kathryn Hess and
                  Lida Kanari and
                  Brendan Mallery},
  title        = {From trees to barcodes and back again {II:} Combinatorial and probabilistic
                  aspects of a topological inverse problem},
  journal      = {Comput. Geom.},
  volume       = {116},
  pages        = {102031},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.comgeo.2023.102031},
  doi          = {10.1016/J.COMGEO.2023.102031},
  timestamp    = {Mon, 04 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comgeo/CurryDGHKM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compnet/DehghanSSBMKP24,
  author       = {Ashkan Dehghan and
                  Kinga Siuta and
                  Agata Skorupka and
                  Andrei Betlen and
                  David Miller and
                  Bogumil Kaminski and
                  Pawel Pralat},
  title        = {Unsupervised framework for evaluating and explaining structural node
                  embeddings of graphs},
  journal      = {J. Complex Networks},
  volume       = {12},
  number       = {2},
  year         = {2024},
  url          = {https://doi.org/10.1093/comnet/cnae003},
  doi          = {10.1093/COMNET/CNAE003},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compnet/DehghanSSBMKP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AllenMVG24,
  author       = {Ashley Allen and
                  Alexios Mylonas and
                  Stilianos Vidalis and
                  Dimitris Gritzalis},
  title        = {Smart homes under siege: Assessing the robustness of physical security
                  against wireless network attacks},
  journal      = {Comput. Secur.},
  volume       = {139},
  pages        = {103687},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103687},
  doi          = {10.1016/J.COSE.2023.103687},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AllenMVG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/DingMZ24,
  author       = {Hongli Ding and
                  Zhao Ma and
                  Jing Zhu},
  title        = {Local graph smoothing for link prediction against universal attack},
  journal      = {Comput. Secur.},
  volume       = {144},
  pages        = {103935},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103935},
  doi          = {10.1016/J.COSE.2024.103935},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/DingMZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GernotR24,
  author       = {Tanguy Gernot and
                  Christophe Rosenberger},
  title        = {Robust biometric scheme against replay attacks using one-time biometric
                  templates},
  journal      = {Comput. Secur.},
  volume       = {137},
  pages        = {103586},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103586},
  doi          = {10.1016/J.COSE.2023.103586},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/GernotR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HeSXHTZ24,
  author       = {Ying He and
                  Zhili Shen and
                  Chang Xia and
                  Jingyu Hua and
                  Wei Tong and
                  Sheng Zhong},
  title        = {{SGBA:} {A} stealthy scapegoat backdoor attack against deep neural
                  networks},
  journal      = {Comput. Secur.},
  volume       = {136},
  pages        = {103523},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103523},
  doi          = {10.1016/J.COSE.2023.103523},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HeSXHTZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HuangYZDYY24,
  author       = {Yuxian Huang and
                  Geng Yang and
                  Hao Zhou and
                  Hua Dai and
                  Dong Yuan and
                  Shui Yu},
  title        = {{VPPFL:} {A} verifiable privacy-preserving federated learning scheme
                  against poisoning attacks},
  journal      = {Comput. Secur.},
  volume       = {136},
  pages        = {103562},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103562},
  doi          = {10.1016/J.COSE.2023.103562},
  timestamp    = {Thu, 16 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HuangYZDYY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KimL24,
  author       = {Hee Yeon Kim and
                  Dong Hoon Lee},
  title        = {CatchFuzz: Reliable active anti-fuzzing techniques against coverage-guided
                  fuzzer},
  journal      = {Comput. Secur.},
  volume       = {143},
  pages        = {103904},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103904},
  doi          = {10.1016/J.COSE.2024.103904},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KimL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KruzikovaMKDSM24,
  author       = {Agata Kruzikova and
                  Michal Muzik and
                  Lenka Knapova and
                  Lenka Dedkova and
                  David Smahel and
                  Vashek Matyas},
  title        = {Two-factor authentication time: How time-efficiency and time-satisfaction
                  are associated with perceived security and satisfaction},
  journal      = {Comput. Secur.},
  volume       = {138},
  pages        = {103667},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103667},
  doi          = {10.1016/J.COSE.2023.103667},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/KruzikovaMKDSM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiWYG24,
  author       = {Xuan Li and
                  Naiyu Wang and
                  Shuai Yuan and
                  Zhitao Guan},
  title        = {FedIMP: Parameter Importance-based Model Poisoning attack against
                  Federated learning system},
  journal      = {Comput. Secur.},
  volume       = {144},
  pages        = {103936},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103936},
  doi          = {10.1016/J.COSE.2024.103936},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LiWYG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiangHZZ24,
  author       = {Chuang Liang and
                  Jie Huang and
                  Zeping Zhang and
                  Shuaishuai Zhang},
  title        = {Defending against model extraction attacks with {OOD} feature learning
                  and decision boundary confusion},
  journal      = {Comput. Secur.},
  volume       = {136},
  pages        = {103563},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103563},
  doi          = {10.1016/J.COSE.2023.103563},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/LiangHZZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiuKLZ24,
  author       = {Liang Liu and
                  Xinyu Kuang and
                  Lin Liu and
                  Lei Zhang},
  title        = {Defend against adversarial attacks in malware detection through attack
                  space management},
  journal      = {Comput. Secur.},
  volume       = {141},
  pages        = {103841},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103841},
  doi          = {10.1016/J.COSE.2024.103841},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LiuKLZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MonkamLB24,
  author       = {Galamo Monkam and
                  Michael J. De Lucia and
                  Nathaniel D. Bastian},
  title        = {A topological data analysis approach for detecting data poisoning
                  attacks against machine learning based network intrusion detection
                  systems},
  journal      = {Comput. Secur.},
  volume       = {144},
  pages        = {103929},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103929},
  doi          = {10.1016/J.COSE.2024.103929},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MonkamLB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/PayaAGG24,
  author       = {Antonio Paya and
                  Sergio Arroni and
                  Vicente Garc{\'{\i}}a{-}D{\'{\i}}az and
                  Alberto G{\'{o}}mez},
  title        = {Apollon: {A} robust defense system against Adversarial Machine Learning
                  attacks in Intrusion Detection Systems},
  journal      = {Comput. Secur.},
  volume       = {136},
  pages        = {103546},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103546},
  doi          = {10.1016/J.COSE.2023.103546},
  timestamp    = {Fri, 08 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/PayaAGG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/QinYYH24,
  author       = {Yang Qin and
                  Xiaofan Yang and
                  Lu{-}Xing Yang and
                  Kaifan Huang},
  title        = {Modeling and study of defense outsourcing against advanced persistent
                  threat through impulsive differential game approach},
  journal      = {Comput. Secur.},
  volume       = {145},
  pages        = {104003},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.104003},
  doi          = {10.1016/J.COSE.2024.104003},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/QinYYH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/RenZYLM24,
  author       = {Qixian Ren and
                  Yu Zheng and
                  Chao Yang and
                  Yue Li and
                  Jian{-}Feng Ma},
  title        = {Shadow backdoor attack: Multi-intensity backdoor attack against federated
                  learning},
  journal      = {Comput. Secur.},
  volume       = {139},
  pages        = {103740},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103740},
  doi          = {10.1016/J.COSE.2024.103740},
  timestamp    = {Tue, 13 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/RenZYLM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WangSW24,
  author       = {Wenjie Wang and
                  Yuanhai Shao and
                  Yiju Wang},
  title        = {Optimization-based adversarial perturbations against twin support
                  vector machines},
  journal      = {Comput. Secur.},
  volume       = {136},
  pages        = {103573},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103573},
  doi          = {10.1016/J.COSE.2023.103573},
  timestamp    = {Fri, 12 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/WangSW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/YangJKQZ24,
  author       = {Chengyi Yang and
                  Kun Jia and
                  Deli Kong and
                  Jiayin Qi and
                  Aimin Zhou},
  title        = {{DP-GSGLD:} {A} Bayesian optimizer inspired by differential privacy
                  defending against privacy leakage in federated learning},
  journal      = {Comput. Secur.},
  volume       = {142},
  pages        = {103839},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103839},
  doi          = {10.1016/J.COSE.2024.103839},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/YangJKQZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZhangSL24,
  author       = {Huijie Zhang and
                  Weizhen Sun and
                  Ling Lv},
  title        = {A frequency-injection backdoor attack against DNN-Based finger vein
                  verification},
  journal      = {Comput. Secur.},
  volume       = {144},
  pages        = {103956},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103956},
  doi          = {10.1016/J.COSE.2024.103956},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ZhangSL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZhangXLYLGF24,
  author       = {Xiyuan Zhang and
                  Gang Xiong and
                  Zhen Li and
                  Chen Yang and
                  Xinjie Lin and
                  Gaopeng Gou and
                  Binxing Fang},
  title        = {Traffic spills the beans: {A} robust video identification attack against
                  YouTube},
  journal      = {Comput. Secur.},
  volume       = {137},
  pages        = {103623},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103623},
  doi          = {10.1016/J.COSE.2023.103623},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/ZhangXLYLGF24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computation/FatimaAAMSC24,
  author       = {Mubeen Fatima and
                  Ravi P. Agarwal and
                  Muhammad Abbas and
                  Pshtiwan Othman Mohammed and
                  Madiha Shafiq and
                  Nejmeddine Chorfi},
  title        = {Extension of Cubic B-Spline for Solving the Time-Fractional Allen-Cahn
                  Equation in the Context of Mathematical Physics},
  journal      = {Comput.},
  volume       = {12},
  number       = {3},
  pages        = {51},
  year         = {2024},
  url          = {https://doi.org/10.3390/computation12030051},
  doi          = {10.3390/COMPUTATION12030051},
  timestamp    = {Tue, 18 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computation/FatimaAAMSC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computation/SampathSA24,
  author       = {Karthick Sampath and
                  V. Subburayan and
                  Ravi P. Agarwal},
  title        = {Solving a System of One-Dimensional Hyperbolic Delay Differential
                  Equations Using the Method of Lines and Runge-Kutta Methods},
  journal      = {Comput.},
  volume       = {12},
  number       = {4},
  pages        = {64},
  year         = {2024},
  url          = {https://doi.org/10.3390/computation12040064},
  doi          = {10.3390/COMPUTATION12040064},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computation/SampathSA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/AgarwalAJ24,
  author       = {Sugandha Agarwal and
                  Norita B. Ahmad and
                  Dima Jamali},
  title        = {{AI} and Big Data in Contemporary Marketing},
  journal      = {Computer},
  volume       = {57},
  number       = {4},
  pages        = {137--142},
  year         = {2024},
  url          = {https://doi.org/10.1109/MC.2024.3360588},
  doi          = {10.1109/MC.2024.3360588},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/AgarwalAJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/AkersB24,
  author       = {Matthew Akers and
                  Armon Barton},
  title        = {Forming Adversarial Example Attacks Against Deep Neural Networks With
                  Reinforcement Learning},
  journal      = {Computer},
  volume       = {57},
  number       = {1},
  pages        = {88--99},
  year         = {2024},
  url          = {https://doi.org/10.1109/MC.2023.3324751},
  doi          = {10.1109/MC.2023.3324751},
  timestamp    = {Sun, 14 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computer/AkersB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/CinaGDBRP24,
  author       = {Antonio Emanuele Cin{\`{a}} and
                  Kathrin Grosse and
                  Ambra Demontis and
                  Battista Biggio and
                  Fabio Roli and
                  Marcello Pelillo},
  title        = {Machine Learning Security Against Data Poisoning: Are We There Yet?},
  journal      = {Computer},
  volume       = {57},
  number       = {3},
  pages        = {26--34},
  year         = {2024},
  url          = {https://doi.org/10.1109/MC.2023.3299572},
  doi          = {10.1109/MC.2023.3299572},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/CinaGDBRP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computing/KaryakarteAKPCS24,
  author       = {Mandar Subhash Karyakarte and
                  Aarti Amod Agarkar and
                  Lalit Kulkarni and
                  Milind Patil and
                  Gajanan H. Chavhan and
                  Bipin Sule},
  title        = {Dynamic opportunistic routing protocol for ad-hoc Internet of Vehicles
                  (IoV)},
  journal      = {Computing},
  volume       = {106},
  number       = {6},
  pages        = {1707--1728},
  year         = {2024},
  url          = {https://doi.org/10.1007/s00607-023-01248-9},
  doi          = {10.1007/S00607-023-01248-9},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computing/KaryakarteAKPCS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computing/ZengWMLC24,
  author       = {Zhuo Zeng and
                  Chengliang Wang and
                  Fei Ma and
                  Xusheng Li and
                  Xinrun Chen},
  title        = {Incorporating self-attentions into robust spatial-temporal graph representation
                  learning against dynamic graph perturbations},
  journal      = {Computing},
  volume       = {106},
  number       = {7},
  pages        = {2211--2237},
  year         = {2024},
  url          = {https://doi.org/10.1007/s00607-023-01235-0},
  doi          = {10.1007/S00607-023-01235-0},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computing/ZengWMLC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/AbbasJABA24,
  author       = {Syed Minhal Abbas and
                  Nadeem Javaid and
                  Nabil Ali Alrajeh and
                  Safdar Hussain Bouk and
                  Soliman Alhudaithy},
  title        = {Towards a robust scale-free network in internet of health things against
                  multiple attacks using an inter-core based reconnection strategy},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {36},
  number       = {17},
  year         = {2024},
  url          = {https://doi.org/10.1002/cpe.8125},
  doi          = {10.1002/CPE.8125},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/concurrency/AbbasJABA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/HuoZQWZ24,
  author       = {Yachao Huo and
                  Zongqu Zhao and
                  Panke Qin and
                  Shujing Wang and
                  Chengfu Zheng},
  title        = {Post-quantum secure two-party computing protocols against malicious
                  adversaries},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {36},
  number       = {4},
  year         = {2024},
  url          = {https://doi.org/10.1002/cpe.7923},
  doi          = {10.1002/CPE.7923},
  timestamp    = {Mon, 11 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/concurrency/HuoZQWZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cor/YakiciKEC24,
  author       = {Ertan Yakici and
                  Mumtaz Karatas and
                  Levent Eriskin and
                  Engin Cicek},
  title        = {Location and routing of armed Unmanned Aerial Vehicles and carrier
                  platforms against mobile targets},
  journal      = {Comput. Oper. Res.},
  volume       = {169},
  pages        = {106727},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cor.2024.106727},
  doi          = {10.1016/J.COR.2024.106727},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cor/YakiciKEC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/crossroads/RuizesparzaM24,
  author       = {Alejandro Ruizesparza and
                  Freddy Martinez},
  title        = {Up Against the Firewall},
  journal      = {{XRDS}},
  volume       = {30},
  number       = {4},
  year         = {2024},
  url          = {https://doi.org/10.1145/3665595},
  doi          = {10.1145/3665595},
  timestamp    = {Sat, 13 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/crossroads/RuizesparzaM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/HaywoodB24,
  author       = {Gregor Haywood and
                  Saleem N. Bhatti},
  title        = {Defence against Side-Channel Attacks for Encrypted Network Communication
                  Using Multiple Paths},
  journal      = {Cryptogr.},
  volume       = {8},
  number       = {2},
  pages        = {22},
  year         = {2024},
  url          = {https://doi.org/10.3390/cryptography8020022},
  doi          = {10.3390/CRYPTOGRAPHY8020022},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/HaywoodB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/LanLWYY24,
  author       = {Caihui Lan and
                  Haifeng Li and
                  Caifen Wang and
                  Xiaodong Yang and
                  Hailong Yao},
  title        = {{KASE-AKA:} Key-aggregate keyword searchable encryption against keyword
                  guessing attack and authorization abuse},
  journal      = {Comput. Stand. Interfaces},
  volume       = {90},
  pages        = {103852},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.csi.2024.103852},
  doi          = {10.1016/J.CSI.2024.103852},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csi/LanLWYY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cssc/OladugbaY24,
  author       = {Abimibola Victoria Oladugba and
                  Brenda Mbouamba Yankam},
  title        = {Robustness of orthogonal uniform composite designs against outlier},
  journal      = {Commun. Stat. Simul. Comput.},
  volume       = {53},
  number       = {4},
  pages        = {1729--1743},
  year         = {2024},
  url          = {https://doi.org/10.1080/03610918.2022.2055068},
  doi          = {10.1080/03610918.2022.2055068},
  timestamp    = {Thu, 04 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cssc/OladugbaY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cssp/GuoZW24,
  author       = {Ning Guo and
                  Zhi Zheng and
                  Wen{-}Qin Wang},
  title        = {Robust {DOA} Estimator Against Mutual Coupling Using One-Bit Sampling},
  journal      = {Circuits Syst. Signal Process.},
  volume       = {43},
  number       = {4},
  pages        = {2626--2638},
  year         = {2024},
  url          = {https://doi.org/10.1007/s00034-023-02583-0},
  doi          = {10.1007/S00034-023-02583-0},
  timestamp    = {Fri, 08 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cssp/GuoZW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cssp/SankalaM24,
  author       = {Sreekanth Sankala and
                  Kodukula Sri Rama Murty},
  title        = {Defending Adversarial Attacks Against {ASV} Systems Using Spectral
                  Masking},
  journal      = {Circuits Syst. Signal Process.},
  volume       = {43},
  number       = {7},
  pages        = {4487--4507},
  year         = {2024},
  url          = {https://doi.org/10.1007/s00034-024-02665-7},
  doi          = {10.1007/S00034-024-02665-7},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cssp/SankalaM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/LiXGYX24,
  author       = {Yanjie Li and
                  Bin Xie and
                  Songtao Guo and
                  Yuanyuan Yang and
                  Bin Xiao},
  title        = {A Survey of Robustness and Safety of 2D and 3D Deep Learning Models
                  against Adversarial Attacks},
  journal      = {{ACM} Comput. Surv.},
  volume       = {56},
  number       = {6},
  pages        = {138:1--138:37},
  year         = {2024},
  url          = {https://doi.org/10.1145/3636551},
  doi          = {10.1145/3636551},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csur/LiXGYX24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csysl/ArslantasYS24,
  author       = {Yuksel Arslantas and
                  Ege Yuceel and
                  Muhammed O. Sayin},
  title        = {Strategizing Against Q-Learners: {A} Control-Theoretical Approach},
  journal      = {{IEEE} Control. Syst. Lett.},
  volume       = {8},
  pages        = {1733--1738},
  year         = {2024},
  url          = {https://doi.org/10.1109/LCSYS.2024.3416240},
  doi          = {10.1109/LCSYS.2024.3416240},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csysl/ArslantasYS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csysl/ZouLLRW24,
  author       = {Jiaying Zou and
                  Hanxiao Liu and
                  Chun Liu and
                  Xiaoqiang Ren and
                  Xiao Fan Wang},
  title        = {Optimal Privacy-Preserving Transmission Schedule Against Eavesdropping
                  Attacks on Remote State Estimation},
  journal      = {{IEEE} Control. Syst. Lett.},
  volume       = {8},
  pages        = {538--543},
  year         = {2024},
  url          = {https://doi.org/10.1109/LCSYS.2024.3398200},
  doi          = {10.1109/LCSYS.2024.3398200},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csysl/ZouLLRW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cvgip/NieZZLZC24,
  author       = {Yongwei Nie and
                  Meihua Zhao and
                  Qing Zhang and
                  Ping Li and
                  Jian Zhu and
                  Hongmin Cai},
  title        = {Make static person walk again via separating pose action from shape},
  journal      = {Graph. Model.},
  volume       = {134},
  pages        = {101222},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.gmod.2024.101222},
  doi          = {10.1016/J.GMOD.2024.101222},
  timestamp    = {Tue, 06 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cvgip/NieZZLZC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/daach/HelfmanCRCC24,
  author       = {Nathan Helfman and
                  Maayan Cohen and
                  Josef Rott and
                  Michelle Creisher and
                  Deborah Cvikel},
  title        = {From shipwreck to seaworthy: {A} digital reconstruction of the Ma'agan
                  Mikhael {B} ship},
  journal      = {Digit. Appl. Archaeol. Cult. Heritage},
  volume       = {34},
  pages        = {00346},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.daach.2024.e00346},
  doi          = {10.1016/J.DAACH.2024.E00346},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/daach/HelfmanCRCC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dai/FineM24,
  author       = {Anna M. Fine and
                  Shawn Marsh},
  title        = {Judicial leadership matters (yet again): the association between judge
                  and public trust for artificial intelligence in courts},
  journal      = {Discov. Artif. Intell.},
  volume       = {4},
  number       = {1},
  pages        = {44},
  year         = {2024},
  url          = {https://doi.org/10.1007/s44163-024-00142-3},
  doi          = {10.1007/S44163-024-00142-3},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dai/FineM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dai/Holl24,
  author       = {Cody Holl},
  title        = {The content intelligence: an argument against the lethality of artificial
                  intelligence},
  journal      = {Discov. Artif. Intell.},
  volume       = {4},
  number       = {1},
  year         = {2024},
  url          = {https://doi.org/10.1007/s44163-024-00112-9},
  doi          = {10.1007/S44163-024-00112-9},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dai/Holl24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/data/AgarwalVMM24,
  author       = {Kanak Agarwal and
                  Vedant Vijaykrishnan and
                  Dyutit Mohanty and
                  Manikandan Murugaiah},
  title        = {A Comprehensive Dataset of the Aerodynamic and Geometric Coefficients
                  of Airfoils in the Public Domain},
  journal      = {Data},
  volume       = {9},
  number       = {5},
  pages        = {64},
  year         = {2024},
  url          = {https://doi.org/10.3390/data9050064},
  doi          = {10.3390/DATA9050064},
  timestamp    = {Tue, 18 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/data/AgarwalVMM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/data/PtaszynskiPDSSF24,
  author       = {Michal Ptaszynski and
                  Agata Pieciukiewicz and
                  Pawel Dybala and
                  Pawel Skrzek and
                  Kamil Soliwoda and
                  Marcin Fortuna and
                  Gniewosz Leliwa and
                  Michal Wroczynski},
  title        = {Expert-Annotated Dataset to Study Cyberbullying in Polish Language},
  journal      = {Data},
  volume       = {9},
  number       = {1},
  pages        = {1},
  year         = {2024},
  url          = {https://doi.org/10.3390/data9010001},
  doi          = {10.3390/DATA9010001},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/data/PtaszynskiPDSSF24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/datascience/BailoPMMSCLMAJF24,
  author       = {Daniele Bailo and
                  Rossana Paciello and
                  Jan Michalek and
                  Daniela Mercurio and
                  Agata Sangianantoni and
                  Kauzar Saleh Contell and
                  Otto Lange and
                  Giovanna Maracchia and
                  Kuvvet Atakan and
                  Keith G. Jeffery and
                  Carmela Freda},
  title        = {Data Management in Distributed, Federated Research Infrastructures:
                  The Case of {EPOS}},
  journal      = {Data Sci. J.},
  volume       = {23},
  year         = {2024},
  url          = {https://doi.org/10.5334/dsj-2024-005},
  doi          = {10.5334/DSJ-2024-005},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/datascience/BailoPMMSCLMAJF24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcan/WangFZLY24,
  author       = {Silv Wang and
                  Kai Fan and
                  Kuan Zhang and
                  Hui Li and
                  Yintang Yang},
  title        = {Data complexity-based batch sanitization method against poison in
                  distributed learning},
  journal      = {Digit. Commun. Networks},
  volume       = {10},
  number       = {2},
  pages        = {416--428},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.dcan.2022.12.001},
  doi          = {10.1016/J.DCAN.2022.12.001},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcan/WangFZLY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CheriereMRM24,
  author       = {Agathe Cheriere and
                  Lina Mortajine and
                  Tania Richmond and
                  Nadia El Mrabet},
  title        = {Exploiting ROLLO's constant-time implementations with a single-trace
                  analysis},
  journal      = {Des. Codes Cryptogr.},
  volume       = {92},
  number       = {3},
  pages        = {587--608},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10623-023-01227-3},
  doi          = {10.1007/S10623-023-01227-3},
  timestamp    = {Sat, 27 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/CheriereMRM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dhq/Agarwal24,
  author       = {Himadri Agarwal},
  title        = {Gamer Trouble: {A} Review},
  journal      = {Digit. Humanit. Q.},
  volume       = {18},
  number       = {1},
  year         = {2024},
  url          = {http://www.digitalhumanities.org/dhq/vol/18/1/000432/000432.html},
  timestamp    = {Wed, 08 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dhq/Agarwal24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/displays/Yin0WWZ24,
  author       = {Liyao Yin and
                  Shen Wang and
                  Zhenbang Wang and
                  Changdong Wang and
                  Dechen Zhan},
  title        = {Attribution guided purification against adversarial patch},
  journal      = {Displays},
  volume       = {83},
  pages        = {102720},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.displa.2024.102720},
  doi          = {10.1016/J.DISPLA.2024.102720},
  timestamp    = {Mon, 01 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/displays/Yin0WWZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dsp/TianS24,
  author       = {Tian Tian and
                  Shuli Sun},
  title        = {Fusion estimation against mixed network attacks for systems with random
                  parameter matrices, correlated noises, and quantized measurements},
  journal      = {Digit. Signal Process.},
  volume       = {150},
  pages        = {104523},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.dsp.2024.104523},
  doi          = {10.1016/J.DSP.2024.104523},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dsp/TianS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dss/AgarwalHJZ24,
  author       = {Puneet Agarwal and
                  Kyle Hunt and
                  Esther Jose and
                  Jun Zhuang},
  title        = {Shutdown and compliance decisions in the face of a viral pandemic:
                  {A} game between governments and citizens},
  journal      = {Decis. Support Syst.},
  volume       = {178},
  pages        = {114128},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.dss.2023.114128},
  doi          = {10.1016/J.DSS.2023.114128},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dss/AgarwalHJZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dss/BiswasMKD24,
  author       = {Baidyanath Biswas and
                  Arunabha Mukhopadhyay and
                  Ajay Kumar and
                  Dursun Delen},
  title        = {A hybrid framework using explainable {AI} {(XAI)} in cyber-risk management
                  for defence and recovery against phishing attacks},
  journal      = {Decis. Support Syst.},
  volume       = {177},
  pages        = {114102},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.dss.2023.114102},
  doi          = {10.1016/J.DSS.2023.114102},
  timestamp    = {Wed, 10 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dss/BiswasMKD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BrehmerSS24,
  author       = {Martin Brehmer and
                  Vanessa Maria Steinherr and
                  Raphaela St{\"{o}}ckl},
  title        = {Toward {A} Higher Resilience Against Cyberattacks},
  journal      = {Datenschutz und Datensicherheit (dud)},
  volume       = {48},
  number       = {6},
  pages        = {352--357},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11623-024-1923-0},
  doi          = {10.1007/S11623-024-1923-0},
  timestamp    = {Thu, 13 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/BrehmerSS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eaai/MishraSG24,
  author       = {Akanksha Mishra and
                  Sharad Sinha and
                  Clint Pazhayidam George},
  title        = {Shielding against online harm: {A} survey on text analysis to prevent
                  cyberbullying},
  journal      = {Eng. Appl. Artif. Intell.},
  volume       = {133},
  pages        = {108241},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.engappai.2024.108241},
  doi          = {10.1016/J.ENGAPPAI.2024.108241},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eaai/MishraSG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eaai/ShobanaSMK24,
  author       = {N. Shobana and
                  Rathinasamy Sakthivel and
                  Saminathan Mohanapriya and
                  Oh{-}Min Kwon},
  title        = {Hybrid-triggered Proportional-Integral tracking control for fuzzy
                  model based networked control systems against disturbance and actuator
                  fault},
  journal      = {Eng. Appl. Artif. Intell.},
  volume       = {136},
  pages        = {108900},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.engappai.2024.108900},
  doi          = {10.1016/J.ENGAPPAI.2024.108900},
  timestamp    = {Tue, 30 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eaai/ShobanaSMK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejasp/XuCW24,
  author       = {Daxing Xu and
                  Zhiqiang Chen and
                  Hailun Wang},
  title        = {Event-Triggered confidentiality fusion estimation against eavesdroppers
                  in cyber-physical systems},
  journal      = {{EURASIP} J. Adv. Signal Process.},
  volume       = {2024},
  number       = {1},
  pages        = {56},
  year         = {2024},
  url          = {https://doi.org/10.1186/s13634-024-01124-4},
  doi          = {10.1186/S13634-024-01124-4},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejasp/XuCW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejcon/ZhangT24,
  author       = {Jun Zhang and
                  Shaocheng Tong},
  title        = {Event-triggered fuzzy adaptive output feedback containment fault-tolerant
                  control for nonlinear multi-agent systems against actuator faults},
  journal      = {Eur. J. Control},
  volume       = {75},
  pages        = {100887},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.ejcon.2023.100887},
  doi          = {10.1016/J.EJCON.2023.100887},
  timestamp    = {Wed, 14 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ejcon/ZhangT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejis/SollnerMBL24,
  author       = {Matthias S{\"{o}}llner and
                  Abhay Nath Mishra and
                  Jan{-}Michael Becker and
                  Jan Marco Leimeister},
  title        = {Use {IT} again? Dynamic roles of habit, intention and their interaction
                  on continued system use by individuals in utilitarian, volitional
                  contexts},
  journal      = {Eur. J. Inf. Syst.},
  volume       = {33},
  number       = {1},
  pages        = {80--96},
  year         = {2024},
  url          = {https://doi.org/10.1080/0960085x.2022.2115949},
  doi          = {10.1080/0960085X.2022.2115949},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ejis/SollnerMBL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/Li24b,
  title        = {Retraction Note: Improved {RFID} mutual authentication protocol against
                  exhaustive attack in the context of big data},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2024},
  number       = {1},
  pages        = {16},
  year         = {2024},
  url          = {https://doi.org/10.1186/s13635-024-00163-6},
  doi          = {10.1186/S13635-024-00163-6},
  timestamp    = {Thu, 13 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/Li24b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/elektrik/Gursoy24,
  author       = {Mehmet Emre G{\"{u}}rsoy},
  title        = {Longitudinal attacks against iterative data collection with local
                  differential privacy},
  journal      = {Turkish J. Electr. Eng. Comput. Sci.},
  volume       = {32},
  number       = {1},
  pages        = {198--218},
  year         = {2024},
  url          = {https://doi.org/10.55730/1300-0632.4063},
  doi          = {10.55730/1300-0632.4063},
  timestamp    = {Thu, 07 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/elektrik/Gursoy24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/entropy/AyuntsGA24,
  author       = {Hrach Ayunts and
                  Artyom M. Grigoryan and
                  Sos S. Agaian},
  title        = {Novel Entropy for Enhanced Thermal Imaging and Uncertainty Quantification},
  journal      = {Entropy},
  volume       = {26},
  number       = {5},
  pages        = {374},
  year         = {2024},
  url          = {https://doi.org/10.3390/e26050374},
  doi          = {10.3390/E26050374},
  timestamp    = {Thu, 04 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/entropy/AyuntsGA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/entropy/Kraikivski24,
  author       = {Pavel Kraikivski},
  title        = {A Mechanistic Model of Perceptual Binding Predicts That Binding Mechanism
                  Is Robust against Noise},
  journal      = {Entropy},
  volume       = {26},
  number       = {2},
  pages        = {133},
  year         = {2024},
  url          = {https://doi.org/10.3390/e26020133},
  doi          = {10.3390/E26020133},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/entropy/Kraikivski24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/entropy/LiCJ24,
  author       = {Yuxuan Li and
                  Yanqiu Chen and
                  Xiaopeng Ji},
  title        = {Secure User Pairing and Power Allocation for Downlink Non-Orthogonal
                  Multiple Access against External Eavesdropping},
  journal      = {Entropy},
  volume       = {26},
  number       = {1},
  pages        = {64},
  year         = {2024},
  url          = {https://doi.org/10.3390/e26010064},
  doi          = {10.3390/E26010064},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/entropy/LiCJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/entropy/ShayovitzBF24,
  author       = {Shachar Shayovitz and
                  Koby Bibas and
                  Meir Feder},
  title        = {Deep Individual Active Learning: Safeguarding against Out-of-Distribution
                  Challenges in Neural Networks},
  journal      = {Entropy},
  volume       = {26},
  number       = {2},
  pages        = {129},
  year         = {2024},
  url          = {https://doi.org/10.3390/e26020129},
  doi          = {10.3390/E26020129},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/entropy/ShayovitzBF24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/entropy/Spanos24,
  author       = {Aris Spanos},
  title        = {How the Post-Data Severity Converts Testing Results into Evidence
                  for or against Pertinent Inferential Claims},
  journal      = {Entropy},
  volume       = {26},
  number       = {1},
  pages        = {95},
  year         = {2024},
  url          = {https://doi.org/10.3390/e26010095},
  doi          = {10.3390/E26010095},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/entropy/Spanos24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/entropy/ZhangXCYXZL24,
  author       = {Chengjun Zhang and
                  Yifan Xie and
                  Yadang Chen and
                  Wenbin Yu and
                  Gaofeng Xiang and
                  Peijun Zhao and
                  Yi Lei},
  title        = {Improving Robustness of High-Low-Order Coupled Networks against Malicious
                  Attacks Based on a Simulated Annealing Algorithm},
  journal      = {Entropy},
  volume       = {26},
  number       = {1},
  pages        = {8},
  year         = {2024},
  url          = {https://doi.org/10.3390/e26010008},
  doi          = {10.3390/E26010008},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/entropy/ZhangXCYXZL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eor/HamidA24,
  author       = {Faiz Hamid and
                  Yogesh Kumar Agarwal},
  title        = {Train stop scheduling problem: An exact approach using valid inequalities
                  and polar duality},
  journal      = {Eur. J. Oper. Res.},
  volume       = {313},
  number       = {1},
  pages        = {207--224},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.ejor.2023.07.023},
  doi          = {10.1016/J.EJOR.2023.07.023},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/eor/HamidA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eor/MonaciAG24,
  author       = {Marta Monaci and
                  Valerio Agasucci and
                  Giorgio Grani},
  title        = {An actor-critic algorithm with policy gradients to solve the job shop
                  scheduling problem using deep double recurrent agents},
  journal      = {Eur. J. Oper. Res.},
  volume       = {312},
  number       = {3},
  pages        = {910--926},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.ejor.2023.07.037},
  doi          = {10.1016/J.EJOR.2023.07.037},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eor/MonaciAG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/es/KumarA24,
  author       = {Shashi Shekhar Kumar and
                  Sonali Agarwal},
  title        = {Rule based complex event processing for IoT applications: Review,
                  classification and challenges},
  journal      = {Expert Syst. J. Knowl. Eng.},
  volume       = {41},
  number       = {9},
  year         = {2024},
  url          = {https://doi.org/10.1111/exsy.13597},
  doi          = {10.1111/EXSY.13597},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/es/KumarA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ese/CasseeACNS24,
  author       = {Nathan Cassee and
                  Andrei Agaronian and
                  Eleni Constantinou and
                  Nicole Novielli and
                  Alexander Serebrenik},
  title        = {Transformers and meta-tokenization in sentiment analysis for software
                  engineering},
  journal      = {Empir. Softw. Eng.},
  volume       = {29},
  number       = {4},
  pages        = {77},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10664-024-10468-2},
  doi          = {10.1007/S10664-024-10468-2},
  timestamp    = {Thu, 04 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ese/CasseeACNS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/esl/HsuLCTK24,
  author       = {Wei{-}Ting Hsu and
                  Pei{-}Yu Lo and
                  Chi{-}Wei Chen and
                  Chin{-}Wei Tien and
                  Sy{-}Yen Kuo},
  title        = {Hardware Trojan Detection Method Against Balanced Controllability
                  Trigger Design},
  journal      = {{IEEE} Embed. Syst. Lett.},
  volume       = {16},
  number       = {2},
  pages        = {178--181},
  year         = {2024},
  url          = {https://doi.org/10.1109/LES.2023.3318591},
  doi          = {10.1109/LES.2023.3318591},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/esl/HsuLCTK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/AgarlaBCNPPSS24,
  author       = {Mirko Agarla and
                  Simone Bianco and
                  Luigi Celona and
                  Paolo Napoletano and
                  Alexey Petrovsky and
                  Flavio Piccoli and
                  Raimondo Schettini and
                  Ivan Shanin},
  title        = {Semi-supervised cross-lingual speech emotion recognition},
  journal      = {Expert Syst. Appl.},
  volume       = {237},
  number       = {Part {A}},
  pages        = {121368},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.eswa.2023.121368},
  doi          = {10.1016/J.ESWA.2023.121368},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eswa/AgarlaBCNPPSS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/AgarwalSMJNS24,
  author       = {Amit Agarwal and
                  Deorishabh Sahu and
                  Rishabh Mohata and
                  Kuldeep Jeengar and
                  Anuj Nautiyal and
                  Dhish Kumar Saxena},
  title        = {Dynamic traffic signal control for heterogeneous traffic conditions
                  using Max Pressure and Reinforcement Learning},
  journal      = {Expert Syst. Appl.},
  volume       = {254},
  pages        = {124416},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.eswa.2024.124416},
  doi          = {10.1016/J.ESWA.2024.124416},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eswa/AgarwalSMJNS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/AzizAMKZ24,
  author       = {Ridwan Al Aziz and
                  Puneet Agarwal and
                  Jack McGuinness and
                  Chitra Lekha Karmaker and
                  Jun Zhuang},
  title        = {Temporal patterns and life cycle dynamics of social media user activity
                  during disasters: {A} data-driven approach for effective crisis communication},
  journal      = {Expert Syst. Appl.},
  volume       = {255},
  pages        = {124454},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.eswa.2024.124454},
  doi          = {10.1016/J.ESWA.2024.124454},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eswa/AzizAMKZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/BansalDAC24,
  author       = {Chaarvi Bansal and
                  P. R. Deepa and
                  Vinti Agarwal and
                  Rohitash Chandra},
  title        = {A clustering and graph deep learning-based framework for {COVID-19}
                  drug repurposing},
  journal      = {Expert Syst. Appl.},
  volume       = {249},
  pages        = {123560},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.eswa.2024.123560},
  doi          = {10.1016/J.ESWA.2024.123560},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eswa/BansalDAC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/BitirgenF24,
  author       = {K{\"{u}}bra Bitirgen and
                  {\"{U}}mm{\"{u}}han Basaran Filik},
  title        = {Markov game based on reinforcement learning solution against cyber-physical
                  attacks in smart grid},
  journal      = {Expert Syst. Appl.},
  volume       = {255},
  pages        = {124607},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.eswa.2024.124607},
  doi          = {10.1016/J.ESWA.2024.124607},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eswa/BitirgenF24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/ChenHZLC24,
  author       = {Guanxing Chen and
                  Haohuai He and
                  Lu Zhao and
                  Qiujie Lv and
                  Calvin Yu{-}Chian Chen},
  title        = {{GINCM-DTA:} {A} graph isomorphic network with protein contact map
                  representation for potential use against {COVID-19} and Omicron subvariants
                  BQ.1, BQ.1.1, XBB.1.5, {XBB.1.16}},
  journal      = {Expert Syst. Appl.},
  volume       = {236},
  pages        = {121274},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.eswa.2023.121274},
  doi          = {10.1016/J.ESWA.2023.121274},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/eswa/ChenHZLC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/FuLY24,
  author       = {Fang Fu and
                  Qi Liu and
                  Guodong Yu},
  title        = {Robustifying the resource-constrained project scheduling against uncertain
                  durations},
  journal      = {Expert Syst. Appl.},
  volume       = {238},
  number       = {Part {E}},
  pages        = {122002},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.eswa.2023.122002},
  doi          = {10.1016/J.ESWA.2023.122002},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/eswa/FuLY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/GovarthanPGR24,
  author       = {Praveen Kumar Govarthan and
                  Sriram Kumar P and
                  Nagarajan Ganapathy and
                  Jac Fredo Agastinose Ronickom},
  title        = {Emotion classification using electrocardiogram and machine learning:
                  {A} study on the effect of windowing techniques},
  journal      = {Expert Syst. Appl.},
  volume       = {254},
  pages        = {124371},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.eswa.2024.124371},
  doi          = {10.1016/J.ESWA.2024.124371},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eswa/GovarthanPGR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/PingaleKA24,
  author       = {Sagar Pingale and
                  Arshinder Kaur and
                  Renu Agarwal},
  title        = {Collaborative last mile delivery: {A} two-echelon vehicle routing
                  model with collaboration points},
  journal      = {Expert Syst. Appl.},
  volume       = {252},
  pages        = {124164},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.eswa.2024.124164},
  doi          = {10.1016/J.ESWA.2024.124164},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eswa/PingaleKA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/RoshanZ24,
  author       = {Khushnaseeb Roshan and
                  Aasim Zafar},
  title        = {Boosting robustness of network intrusion detection systems: {A} novel
                  two phase defense strategy against untargeted white-box optimization
                  adversarial attack},
  journal      = {Expert Syst. Appl.},
  volume       = {249},
  pages        = {123567},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.eswa.2024.123567},
  doi          = {10.1016/J.ESWA.2024.123567},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eswa/RoshanZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ett/AgarwalS24,
  author       = {Amit Agarwal and
                  Keshav Singh},
  title        = {Energy-efficient {UOWC-RF} systems with {SLIPT}},
  journal      = {Trans. Emerg. Telecommun. Technol.},
  volume       = {35},
  number       = {1},
  year         = {2024},
  url          = {https://doi.org/10.1002/ett.4889},
  doi          = {10.1002/ETT.4889},
  timestamp    = {Fri, 29 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ett/AgarwalS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ett/BelsareSGMAG24,
  author       = {Karan Belsare and
                  Manwinder Singh and
                  Anudeep Gandam and
                  Praveen Kumar Malik and
                  Ritu Agarwal and
                  Anita Gehlot},
  title        = {An integrated approach of IoT and {WSN} using wavelet transform and
                  machine learning for the solid waste image classification in smart
                  cities},
  journal      = {Trans. Emerg. Telecommun. Technol.},
  volume       = {35},
  number       = {4},
  year         = {2024},
  url          = {https://doi.org/10.1002/ett.4857},
  doi          = {10.1002/ETT.4857},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ett/BelsareSGMAG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ett/VermaBBSCV24,
  author       = {Priyanka Verma and
                  Nitesh Bharot and
                  John G. Breslin and
                  Mukta Sharma and
                  Nisha Chaurasia and
                  Ankit Vidyarthi},
  title        = {Uncovering collateral damages and advanced defense strategies in cloud
                  environments against DDoS attacks: {A} comprehensive review},
  journal      = {Trans. Emerg. Telecommun. Technol.},
  volume       = {35},
  number       = {4},
  year         = {2024},
  url          = {https://doi.org/10.1002/ett.4934},
  doi          = {10.1002/ETT.4934},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ett/VermaBBSCV24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ett/WuDTWHLCJC24,
  author       = {Jun Wu and
                  Mingyuan Dai and
                  Xuyang Teng and
                  Chao Wu and
                  Meilin He and
                  Haoyu Liang and
                  Hao Chen and
                  Ye Jin and
                  Weiwei Cao},
  title        = {Less sample-cooperative spectrum sensing against large-scale Byzantine
                  attack in cognitive wireless sensor networks},
  journal      = {Trans. Emerg. Telecommun. Technol.},
  volume       = {35},
  number       = {7},
  year         = {2024},
  url          = {https://doi.org/10.1002/ett.5015},
  doi          = {10.1002/ETT.5015},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ett/WuDTWHLCJC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ett/ZhuWSXDQGHC24,
  author       = {Gefei Zhu and
                  Jun Wu and
                  Mingkun Su and
                  Xiaorong Xu and
                  Mingyuan Dai and
                  Lei Qiao and
                  Jipeng Gan and
                  Jiangtao He and
                  Weiwei Cao},
  title        = {Dynamic sliding window-cooperative spectrum sensing against massive
                  {SSDF} attack in interweave cognitive internet of things},
  journal      = {Trans. Emerg. Telecommun. Technol.},
  volume       = {35},
  number       = {3},
  year         = {2024},
  url          = {https://doi.org/10.1002/ett.4955},
  doi          = {10.1002/ETT.4955},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ett/ZhuWSXDQGHC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/evs/GolabianMA24,
  author       = {Mahdis Golabian and
                  Azar Mahmoodzadeh and
                  Hamed Agahi},
  title        = {Image enhancement based on optimized 2D histogram modification by
                  krill herd algorithm},
  journal      = {Evol. Syst.},
  volume       = {15},
  number       = {4},
  pages        = {1219--1233},
  year         = {2024},
  url          = {https://doi.org/10.1007/s12530-023-09545-6},
  doi          = {10.1007/S12530-023-09545-6},
  timestamp    = {Mon, 05 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/evs/GolabianMA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/evs/HaqueZ24,
  author       = {Sheikh Burhan Ul Haque and
                  Aasim Zafar},
  title        = {Beyond accuracy and precision: a robust deep learning framework to
                  enhance the resilience of face mask detection models against adversarial
                  attacks},
  journal      = {Evol. Syst.},
  volume       = {15},
  number       = {1},
  pages        = {1--24},
  year         = {2024},
  url          = {https://doi.org/10.1007/s12530-023-09522-z},
  doi          = {10.1007/S12530-023-09522-Z},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/evs/HaqueZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/evs/HaqueZ24a,
  author       = {Sheikh Burhan Ul Haque and
                  Aasim Zafar},
  title        = {Correction: Beyond accuracy and precision: a robust deep learning
                  framework to enhance the resilience of face mask detection models
                  against adversarial attacks},
  journal      = {Evol. Syst.},
  volume       = {15},
  number       = {3},
  pages        = {1113},
  year         = {2024},
  url          = {https://doi.org/10.1007/s12530-023-09537-6},
  doi          = {10.1007/S12530-023-09537-6},
  timestamp    = {Thu, 04 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/evs/HaqueZ24a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/evs/SaxenaCAA24,
  author       = {Akash Saxena and
                  Siddharth Singh Chouhan and
                  Rabia Musheer Aziz and
                  Vani Agarwal},
  title        = {A comprehensive evaluation of Marine predator chaotic algorithm for
                  feature selection of {COVID-19}},
  journal      = {Evol. Syst.},
  volume       = {15},
  number       = {4},
  pages        = {1235--1248},
  year         = {2024},
  url          = {https://doi.org/10.1007/s12530-023-09557-2},
  doi          = {10.1007/S12530-023-09557-2},
  timestamp    = {Mon, 05 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/evs/SaxenaCAA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/expert/ShiLZ24,
  author       = {Jiahui Shi and
                  Linjing Li and
                  Daniel Zeng},
  title        = {SHAPAttack: Shapley-Guided Multigranularity Adversarial Attack Against
                  Text Transformers},
  journal      = {{IEEE} Intell. Syst.},
  volume       = {39},
  number       = {3},
  pages        = {45--53},
  year         = {2024},
  url          = {https://doi.org/10.1109/MIS.2024.3379377},
  doi          = {10.1109/MIS.2024.3379377},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/expert/ShiLZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/LuLL24,
  author       = {Shiwei Lu and
                  Ruihu Li and
                  Wenbin Liu},
  title        = {FedDAA: a robust federated learning framework to protect privacy and
                  defend against adversarial attack},
  journal      = {Frontiers Comput. Sci.},
  volume       = {18},
  number       = {2},
  pages        = {182307},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11704-023-2283-x},
  doi          = {10.1007/S11704-023-2283-X},
  timestamp    = {Sun, 25 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fcsc/LuLL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/WangWGZXGGC24,
  author       = {Che Wang and
                  Zhenhao Wu and
                  Jianbo Gao and
                  Jiashuo Zhang and
                  Junjie Xia and
                  Feng Gao and
                  Zhi Guan and
                  Zhong Chen},
  title        = {FedTop: a constraint-loosed federated learning aggregation method
                  against poisoning attack},
  journal      = {Frontiers Comput. Sci.},
  volume       = {18},
  number       = {5},
  pages        = {185348},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11704-024-3767-z},
  doi          = {10.1007/S11704-024-3767-Z},
  timestamp    = {Tue, 13 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fcsc/WangWGZXGGC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fdata/DeianaTABGDHHLNNOPABBBBMDDFGGGHHK24,
  author       = {Allison McCarn Deiana and
                  Nhan Tran and
                  Joshua Agar and
                  Michaela Blott and
                  Giuseppe Di Guglielmo and
                  Javier M. Duarte and
                  Philip C. Harris and
                  Scott Hauck and
                  Mia Liu and
                  Mark S. Neubauer and
                  Jennifer Ngadiuba and
                  Seda Ogrenci{-}Memik and
                  Maurizio Pierini and
                  Thea Aarrestad and
                  Steffen B{\"{a}}hr and
                  J{\"{u}}rgen Becker and
                  Anne{-}Sophie Berthold and
                  Richard J. Bonventre and
                  Tom{\'{a}}s E. M{\"{u}}ller{-}Bravo and
                  Markus Diefenthaler and
                  Zhen Dong and
                  Nick Fritzsche and
                  Amir Gholami and
                  Ekaterina Govorkova and
                  Dongning Guo and
                  Kyle J. Hazelwood and
                  Christian Herwig and
                  Babar Khan and
                  Sehoon Kim and
                  Thomas Klijnsma and
                  Yaling Liu and
                  Kin Ho Lo and
                  Tri Nguyen and
                  Gianantonio Pezzullo and
                  Seyedramin Rasoulinezhad and
                  Ryan A. Rivera and
                  Kate Scholberg and
                  Justin Selig and
                  Sougata Sen and
                  Dmitri Strukov and
                  William Tang and
                  Savannah Thais and
                  Kai Lukas Unger and
                  Ricardo Vilalta and
                  Belinavon Krosigk and
                  Shen Wang and
                  Thomas K. Warburton},
  title        = {Corrigendum: Applications and techniques for fast machine learning
                  in science},
  journal      = {Frontiers Big Data},
  volume       = {6},
  year         = {2024},
  url          = {https://doi.org/10.3389/fdata.2023.1301942},
  doi          = {10.3389/FDATA.2023.1301942},
  timestamp    = {Tue, 02 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fdata/DeianaTABGDHHLNNOPABBBBMDDFGGGHHK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fdata/NagvanshiKAS24,
  author       = {Suraj Singh Nagvanshi and
                  Inderjeet Kaur and
                  Charu Agarwal and
                  Ashish Sharma},
  title        = {Nonstationary time series forecasting using optimized-EVDHM-ARIMA
                  for {COVID-19}},
  journal      = {Frontiers Big Data},
  volume       = {6},
  year         = {2024},
  url          = {https://doi.org/10.3389/fdata.2023.1081639},
  doi          = {10.3389/FDATA.2023.1081639},
  timestamp    = {Tue, 02 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fdata/NagvanshiKAS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fdgth/AgafonovBSA24,
  author       = {Oleg Agafonov and
                  Aleksandar Babic and
                  Sonia Sousa and
                  Sharmini Alagaratnam},
  title        = {Editorial: Trustworthy {AI} for healthcare},
  journal      = {Frontiers Digit. Health},
  volume       = {6},
  year         = {2024},
  url          = {https://doi.org/10.3389/fdgth.2024.1427233},
  doi          = {10.3389/FDGTH.2024.1427233},
  timestamp    = {Thu, 11 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fdgth/AgafonovBSA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/ErdolUEU24,
  author       = {Eda Sena Erdol and
                  Beste Ustubioglu and
                  Hakan Erd{\"{o}}l and
                  G{\"{u}}zin Ulutas},
  title        = {Low dimensional secure federated learning framework against poisoning
                  attacks},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {158},
  pages        = {183--199},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.future.2024.04.017},
  doi          = {10.1016/J.FUTURE.2024.04.017},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/ErdolUEU24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/FatimaRAN24,
  author       = {Mahawish Fatima and
                  Osama M. Hussain Rehman and
                  Saqib Ali and
                  Moazzam Fareed Niazi},
  title        = {{ELIDS:} Ensemble Feature Selection for Lightweight {IDS} against
                  DDoS Attacks in Resource-Constrained IoT Environment},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {159},
  pages        = {172--187},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.future.2024.05.013},
  doi          = {10.1016/J.FUTURE.2024.05.013},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/FatimaRAN24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/LiuMWZZL24,
  author       = {Hang Liu and
                  Yang Ming and
                  Chenhao Wang and
                  Yi Zhao and
                  Songnian Zhang and
                  Rongxing Lu},
  title        = {Blockchain-assisted verifiable certificate-based searchable encryption
                  against untrusted cloud server for Industrial Internet of Things},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {153},
  pages        = {97--112},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.future.2023.11.016},
  doi          = {10.1016/J.FUTURE.2023.11.016},
  timestamp    = {Tue, 06 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/LiuMWZZL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/MerlinoTDBLP24,
  author       = {Giovanni Merlino and
                  Giuseppe Tricomi and
                  Luca D'Agati and
                  Zakaria Benomar and
                  Francesco Longo and
                  Antonio Puliafito},
  title        = {FaaS for IoT: Evolving Serverless towards Deviceless in I/Oclouds},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {154},
  pages        = {189--205},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.future.2023.12.029},
  doi          = {10.1016/J.FUTURE.2023.12.029},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/MerlinoTDBLP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fi/AftowiczKDL24,
  author       = {Marcin Aftowicz and
                  Ievgen Kabin and
                  Zoya Dyka and
                  Peter Langend{\"{o}}rfer},
  title        = {Non-Profiled Unsupervised Horizontal Iterative Attack against Hardware
                  Elliptic Curve Scalar Multiplication Using Machine Learning},
  journal      = {Future Internet},
  volume       = {16},
  number       = {2},
  pages        = {45},
  year         = {2024},
  url          = {https://doi.org/10.3390/fi16020045},
  doi          = {10.3390/FI16020045},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fi/AftowiczKDL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fi/ImranAM24,
  author       = {Muhammad Imran and
                  Annalisa Appice and
                  Donato Malerba},
  title        = {Evaluating Realistic Adversarial Attacks against Machine Learning
                  Models for Windows {PE} Malware Detection},
  journal      = {Future Internet},
  volume       = {16},
  number       = {5},
  pages        = {168},
  year         = {2024},
  url          = {https://doi.org/10.3390/fi16050168},
  doi          = {10.3390/FI16050168},
  timestamp    = {Thu, 04 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fi/ImranAM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fi/KampourakisMK24,
  author       = {Vyron Kampourakis and
                  Georgios Michail Makrakis and
                  Constantinos Kolias},
  title        = {From Seek-and-Destroy to Split-and-Destroy: Connection Partitioning
                  as an Effective Tool against Low-Rate DoS Attacks},
  journal      = {Future Internet},
  volume       = {16},
  number       = {4},
  pages        = {137},
  year         = {2024},
  url          = {https://doi.org/10.3390/fi16040137},
  doi          = {10.3390/FI16040137},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fi/KampourakisMK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/focm/AgarwalDLT24,
  author       = {Sameer Agarwal and
                  Timothy Duff and
                  Max Lieblich and
                  Rekha R. Thomas},
  title        = {An Atlas for the Pinhole Camera},
  journal      = {Found. Comput. Math.},
  volume       = {24},
  number       = {1},
  pages        = {227--277},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10208-022-09592-6},
  doi          = {10.1007/S10208-022-09592-6},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/focm/AgarwalDLT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/frai/AgarwalSCCRPLGFMDSFSNVKKSS24,
  author       = {Sushant Agarwal and
                  Sanjay Saxena and
                  Alessandro Carriero and
                  Gian Luca Chabert and
                  Gobinath Ravindran and
                  Sudip Paul and
                  John R. Laird and
                  Deepak Garg and
                  Mostafa Fatemi and
                  Lopamudra Mohanty and
                  Arun Kumar Dubey and
                  Rajesh Singh and
                  Mostafa M. Fouda and
                  Narpinder Singh and
                  Subbaram Naidu and
                  Klaudija Viskovic and
                  Melita Kukuljan and
                  Manudeep K. Kalra and
                  Luca Saba and
                  Jasjit S. Suri},
  title        = {{COVLIAS} 3.0: cloud-based quantized hybrid UNet3+ deep learning for
                  {COVID-19} lesion detection in lung computed tomography},
  journal      = {Frontiers Artif. Intell.},
  volume       = {7},
  year         = {2024},
  url          = {https://doi.org/10.3389/frai.2024.1304483},
  doi          = {10.3389/FRAI.2024.1304483},
  timestamp    = {Thu, 15 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/frai/AgarwalSCCRPLGFMDSFSNVKKSS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fss/Agahi24,
  author       = {Hamzeh Agahi},
  title        = {A strengthening of Jensen's inequality for asymmetric Choquet integral},
  journal      = {Fuzzy Sets Syst.},
  volume       = {483},
  pages        = {108927},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.fss.2024.108927},
  doi          = {10.1016/J.FSS.2024.108927},
  timestamp    = {Mon, 27 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fss/Agahi24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fss/HuangZ00A24,
  author       = {Sai Huang and
                  Guangdeng Zong and
                  Ning Zhao and
                  Xudong Zhao and
                  Adil M. Ahmad},
  title        = {Performance recovery-based fuzzy robust control of networked nonlinear
                  systems against actuator fault: {A} deferred actuator-switching method},
  journal      = {Fuzzy Sets Syst.},
  volume       = {480},
  pages        = {108858},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.fss.2024.108858},
  doi          = {10.1016/J.FSS.2024.108858},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fss/HuangZ00A24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/hij/AgarwalLB24,
  author       = {Vertika Agarwal and
                  MC Lohani and
                  Ankur Singh Bist},
  title        = {A novel deep learning technique for medical image analysis using improved
                  optimizer},
  journal      = {Health Informatics J.},
  volume       = {30},
  number       = {2},
  year         = {2024},
  url          = {https://doi.org/10.1177/14604582241255584},
  doi          = {10.1177/14604582241255584},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/hij/AgarwalLB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iajit/AgarwalD24,
  author       = {Khushboo Agarwal and
                  Manish Dixit},
  title        = {Scrupulous {SCGAN} framework for recognition of restored images with
                  caffe based {PCA} filtration},
  journal      = {Int. Arab J. Inf. Technol.},
  volume       = {21},
  number       = {1},
  pages        = {107--116},
  year         = {2024},
  url          = {https://doi.org/10.34028/iajit/21/1/10},
  doi          = {10.34028/IAJIT/21/1/10},
  timestamp    = {Thu, 21 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iajit/AgarwalD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iajit/KarraL24,
  author       = {Rachid Karra and
                  Abdelali Lasfar},
  title        = {Analysis of {QA} system behavior against context and question changes},
  journal      = {Int. Arab J. Inf. Technol.},
  volume       = {21},
  number       = {2},
  pages        = {191--200},
  year         = {2024},
  url          = {https://doi.org/10.34028/iajit/21/2/2},
  doi          = {10.34028/IAJIT/21/2/2},
  timestamp    = {Mon, 13 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iajit/KarraL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iam/KumarRASS24,
  author       = {Harish Kumar and
                  Philipp A. Rauschnabel and
                  Madhushree N. Agarwal and
                  Rajesh Kumar Singh and
                  Ritu Srivastava},
  title        = {Towards a theoretical framework for augmented reality marketing: {A}
                  means-end chain perspective on retailing},
  journal      = {Inf. Manag.},
  volume       = {61},
  number       = {2},
  pages        = {103910},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.im.2023.103910},
  doi          = {10.1016/J.IM.2023.103910},
  timestamp    = {Fri, 08 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iam/KumarRASS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/icl/SongLLJ24,
  author       = {Yi Song and
                  Qingbo Li and
                  Xingbo Lu and
                  Xiaoying Jin},
  title        = {Pairing Inspired Covert Communication in Uplink {NOMA} Systems Against
                  {SIC} Warden},
  journal      = {{IEEE} Commun. Lett.},
  volume       = {28},
  number       = {5},
  pages        = {994--998},
  year         = {2024},
  url          = {https://doi.org/10.1109/LCOMM.2024.3373238},
  doi          = {10.1109/LCOMM.2024.3373238},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/icl/SongLLJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeejas/GuoPL24,
  author       = {Haibin Guo and
                  Zhong{-}Hua Pang and
                  Chao Li},
  title        = {Side Information-Based Stealthy False Data Injection Attacks Against
                  Multi-Sensor Remote Estimation},
  journal      = {{IEEE} {CAA} J. Autom. Sinica},
  volume       = {11},
  number       = {4},
  pages        = {1054--1056},
  year         = {2024},
  url          = {https://doi.org/10.1109/JAS.2023.124086},
  doi          = {10.1109/JAS.2023.124086},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeejas/GuoPL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeenl/KumarSA24,
  author       = {Anmol Kumar and
                  Gaurav Somani and
                  Mayank Agarwal},
  title        = {Comparing HAProxy Scheduling Algorithms During the DDoS Attacks},
  journal      = {{IEEE} Netw. Lett.},
  volume       = {6},
  number       = {2},
  pages        = {139--142},
  year         = {2024},
  url          = {https://doi.org/10.1109/LNET.2024.3383601},
  doi          = {10.1109/LNET.2024.3383601},
  timestamp    = {Thu, 04 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeenl/KumarSA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieiceta/TakeuchiSSI24,
  author       = {Nobuyuki Takeuchi and
                  Kosei Sakamoto and
                  Takuro Shiraya and
                  Takanori Isobe},
  title        = {Improving the Security Bounds against Differential Attacks for Pholkos
                  Family},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {107},
  number       = {8},
  pages        = {1196--1204},
  year         = {2024},
  url          = {https://doi.org/10.1587/transfun.2023eap1098},
  doi          = {10.1587/TRANSFUN.2023EAP1098},
  timestamp    = {Mon, 05 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieiceta/TakeuchiSSI24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-cps/TahaniZG24,
  author       = {Vahid Tahani and
                  Mohammad Haddad Zarif and
                  Hossein Gholizade{-}Narm},
  title        = {A new stable scheme against false data injection attacks in distributed
                  control microgrid},
  journal      = {{IET} Cyper-Phys. Syst.: Theory {\&} Appl.},
  volume       = {9},
  number       = {1},
  pages        = {27--40},
  year         = {2024},
  url          = {https://doi.org/10.1049/cps2.12064},
  doi          = {10.1049/CPS2.12064},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-cps/TahaniZG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-cps/YaoLSL24,
  author       = {Hongjin Yao and
                  Yisheng Li and
                  Yunpeng Sun and
                  Zhichao Lian},
  title        = {Selective real-time adversarial perturbations against deep reinforcement
                  learning agents},
  journal      = {{IET} Cyper-Phys. Syst.: Theory {\&} Appl.},
  volume       = {9},
  number       = {1},
  pages        = {41--49},
  year         = {2024},
  url          = {https://doi.org/10.1049/cps2.12065},
  doi          = {10.1049/CPS2.12065},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-cps/YaoLSL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ipr/ChenXQ24,
  author       = {Ping Chen and
                  Ming Xu and
                  Jianxiang Qi},
  title        = {DeepFake detection against adversarial examples based on {D-VAEGAN}},
  journal      = {{IET} Image Process.},
  volume       = {18},
  number       = {3},
  pages        = {615--626},
  year         = {2024},
  url          = {https://doi.org/10.1049/ipr2.12973},
  doi          = {10.1049/IPR2.12973},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ipr/ChenXQ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ipr/EbrahimnejadNP24,
  author       = {Javad Ebrahimnejad and
                  Alireza Naghsh and
                  Hossein Pourghasem},
  title        = {A robust watermarking approach against high-density salt and pepper
                  noise {(RWSPN)} to enhance medical image security},
  journal      = {{IET} Image Process.},
  volume       = {18},
  number       = {1},
  pages        = {116--128},
  year         = {2024},
  url          = {https://doi.org/10.1049/ipr2.12937},
  doi          = {10.1049/IPR2.12937},
  timestamp    = {Fri, 08 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iet-ipr/EbrahimnejadNP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ipr/ZhangCW24,
  author       = {Wei Zhang and
                  Rongrong Chen and
                  Bin Wang},
  title        = {A robust watermarking algorithm against {JPEG} compression based on
                  multiscale autoencoder},
  journal      = {{IET} Image Process.},
  volume       = {18},
  number       = {2},
  pages        = {455--469},
  year         = {2024},
  url          = {https://doi.org/10.1049/ipr2.12961},
  doi          = {10.1049/IPR2.12961},
  timestamp    = {Fri, 08 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iet-ipr/ZhangCW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-qtc/AnandNI24,
  author       = {Ravi Anand and
                  Rimpa Nandi and
                  Takanori Isobe},
  title        = {Analysis of Atom against quantum attacks},
  journal      = {{IET} Quantum Commun.},
  volume       = {5},
  number       = {1},
  pages        = {88--102},
  year         = {2024},
  url          = {https://doi.org/10.1049/qtc2.12076},
  doi          = {10.1049/QTC2.12076},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-qtc/AnandNI24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-wss/YildirimK24,
  author       = {Alper Yildirim and
                  Serkan Kiranyaz},
  title        = {Smart binary phase-coding for pulse-compression radar: An electronic
                  protection technique against repeater jamming},
  journal      = {{IET} Wirel. Sens. Syst.},
  volume       = {14},
  number       = {3},
  pages        = {47--55},
  year         = {2024},
  url          = {https://doi.org/10.1049/wss2.12071},
  doi          = {10.1049/WSS2.12071},
  timestamp    = {Thu, 04 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-wss/YildirimK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijaip/GuptaJAN24,
  author       = {Shikha Gupta and
                  Satbir Jain and
                  Mohit Agarwal and
                  Nalin Nanda},
  title        = {An encryption approach to improve the security and performance of
                  data by integrating {AES} with a modified {OTP} technique},
  journal      = {Int. J. Adv. Intell. Paradigms},
  volume       = {27},
  number       = {2},
  pages        = {129--149},
  year         = {2024},
  url          = {https://doi.org/10.1504/IJAIP.2024.137187},
  doi          = {10.1504/IJAIP.2024.137187},
  timestamp    = {Mon, 11 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijaip/GuptaJAN24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijbis/BagriGA24,
  author       = {Gyanendra Prasad Bagri and
                  Dixit Garg and
                  Ashish Agarwal},
  title        = {Analysing inhibitors of green practices implementation in Indian companies},
  journal      = {Int. J. Bus. Inf. Syst.},
  volume       = {45},
  number       = {3},
  pages        = {375--396},
  year         = {2024},
  url          = {https://doi.org/10.1504/IJBIS.2024.136882},
  doi          = {10.1504/IJBIS.2024.136882},
  timestamp    = {Fri, 08 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijbis/BagriGA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijbra/SharmaS24,
  author       = {Arijit Das Sharma and
                  Himanshu Singh},
  title        = {In-Silico Design of a Multi-Epitope Vaccine Candidate against Rotaviruses
                  by targeting the Outer Capsid Protein {VP-4}},
  journal      = {Int. J. Bioinform. Res. Appl.},
  volume       = {20},
  number       = {3},
  year         = {2024},
  url          = {https://doi.org/10.1504/ijbra.2024.10065143},
  doi          = {10.1504/IJBRA.2024.10065143},
  timestamp    = {Sat, 13 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijbra/SharmaS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/RazaM24,
  author       = {Nazia Raza and
                  Faegheh Moazeni},
  title        = {Chance-constrained vulnerability assessment of smart water distribution
                  systems against stealthy false data injection attacks},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {44},
  pages        = {100645},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.ijcip.2023.100645},
  doi          = {10.1016/J.IJCIP.2023.100645},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/RazaM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcisys/AshryMEA24,
  author       = {Eman Ragab Ashry and
                  Fahima A. Maghraby and
                  Yasser M. Abd El{-}Latif and
                  Mohamed Agag},
  title        = {Pediatric Posterior Fossa Tumors Classification and Explanation-Driven
                  with Explainable Artificial Intelligence Models},
  journal      = {Int. J. Comput. Intell. Syst.},
  volume       = {17},
  number       = {1},
  pages        = {166},
  year         = {2024},
  url          = {https://doi.org/10.1007/s44196-024-00527-3},
  doi          = {10.1007/S44196-024-00527-3},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcisys/AshryMEA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomsys/RamasamyVM24,
  author       = {Gandhi Ramasamy and
                  Agalya Vedi and
                  Muthuvinayagam Madasamy},
  title        = {Multi-objective optimization for optimal energy transporting path
                  and energy distribution in electric vehicles energy internet},
  journal      = {Int. J. Commun. Syst.},
  volume       = {37},
  number       = {6},
  year         = {2024},
  url          = {https://doi.org/10.1002/dac.5700},
  doi          = {10.1002/DAC.5700},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomsys/RamasamyVM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcon/SunZZ24,
  author       = {Lucheng Sun and
                  Li Zhang and
                  Ya Zhang},
  title        = {A transmission scheme for secure estimation of cyber-physical systems
                  against malicious attack},
  journal      = {Int. J. Control},
  volume       = {97},
  number       = {4},
  pages        = {811--822},
  year         = {2024},
  url          = {https://doi.org/10.1080/00207179.2023.2175409},
  doi          = {10.1080/00207179.2023.2175409},
  timestamp    = {Wed, 20 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcon/SunZZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcon/TianD24,
  author       = {Mingyang Tian and
                  Chunmei Duan},
  title        = {Event-triggered control for uncertain delayed neural networks with
                  actuator saturation against deception attack},
  journal      = {Int. J. Control},
  volume       = {97},
  number       = {3},
  pages        = {554--566},
  year         = {2024},
  url          = {https://doi.org/10.1080/00207179.2022.2159536},
  doi          = {10.1080/00207179.2022.2159536},
  timestamp    = {Wed, 20 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcon/TianD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcta/KandpalSA24,
  author       = {Naveen Kandpal and
                  Anil Singh and
                  Alpana Agarwal},
  title        = {An artificial intelligence-based 4-to-10-bit variable resolution Flash
                  {ADC} with 3.6 to 1.04 GS/s sampling rate},
  journal      = {Int. J. Circuit Theory Appl.},
  volume       = {52},
  number       = {8},
  pages        = {4067--4085},
  year         = {2024},
  url          = {https://doi.org/10.1002/cta.3948},
  doi          = {10.1002/CTA.3948},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcta/KandpalSA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcta/SunLCPWSSPJZWWKZWKY24,
  author       = {Nengyuan Sun and
                  Wenrui Liu and
                  Jiafeng Cheng and
                  Zhaokang Peng and
                  Chunyang Wang and
                  Caiban Sun and
                  Heng Sha and
                  Zhiyuan Pan and
                  Ming Jin and
                  Hongyang Zhao and
                  Jinghe Wang and
                  Yiming Wen and
                  Pengliang Kong and
                  Yunfeng Zhao and
                  Yaoqiang Wang and
                  Sel{\c{c}}uk K{\"{o}}se and
                  Weize Yu},
  title        = {A novel {SM4} cryptographic architecture against higher order power
                  analysis attacks},
  journal      = {Int. J. Circuit Theory Appl.},
  volume       = {52},
  number       = {8},
  pages        = {4184--4198},
  year         = {2024},
  url          = {https://doi.org/10.1002/cta.3962},
  doi          = {10.1002/CTA.3962},
  timestamp    = {Fri, 09 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcta/SunLCPWSSPJZWWKZWKY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcv/ZhangHY24,
  author       = {Yifan Zhang and
                  Junhui Hou and
                  Yixuan Yuan},
  title        = {A Comprehensive Study of the Robustness for LiDAR-Based 3D Object
                  Detectors Against Adversarial Attacks},
  journal      = {Int. J. Comput. Vis.},
  volume       = {132},
  number       = {5},
  pages        = {1592--1624},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11263-023-01934-3},
  doi          = {10.1007/S11263-023-01934-3},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcv/ZhangHY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsa/StephanieRVP24,
  author       = {E. M. A. Stephanie and
                  Luis G. Baca Ru{\'{\i}}z and
                  Maria{-}Amparo Vila and
                  Maria del Carmen Pegalajar},
  title        = {Study of violence against women and its characteristics through the
                  application of text mining techniques},
  journal      = {Int. J. Data Sci. Anal.},
  volume       = {18},
  number       = {1},
  pages        = {35--48},
  year         = {2024},
  url          = {https://doi.org/10.1007/s41060-023-00448-y},
  doi          = {10.1007/S41060-023-00448-Y},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdsa/StephanieRVP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijeb/AnujCAKST24,
  author       = {Anuj and
                  Jitendra Singh Chauhan and
                  Pankaj Agarwal and
                  Harish Kumar and
                  Megha Sharma and
                  Madhur Thapliyal},
  title        = {Analysing antecedent and consequences of trust in m-commerce for sustainability
                  in tourism industry in Uttarakhand},
  journal      = {Int. J. Electron. Bus.},
  volume       = {19},
  number       = {2},
  pages        = {139--155},
  year         = {2024},
  url          = {https://doi.org/10.1504/IJEB.2024.137689},
  doi          = {10.1504/IJEB.2024.137689},
  timestamp    = {Tue, 30 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijeb/AnujCAKST24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijfs/KongLCKSZ24,
  author       = {Linghuan Kong and
                  Mengzhuo Luo and
                  Jun Cheng and
                  Iyad A. Katib and
                  Kaibo Shi and
                  Shouming Zhong},
  title        = {Quantization-Based Event-Triggering Fault Detection Filtering for
                  {T-S} Fuzzy Singular Semi-Markovian Jump Systems Against Multi-cyber-attacks},
  journal      = {Int. J. Fuzzy Syst.},
  volume       = {26},
  number       = {4},
  pages        = {1328--1346},
  year         = {2024},
  url          = {https://doi.org/10.1007/s40815-023-01669-w},
  doi          = {10.1007/S40815-023-01669-W},
  timestamp    = {Tue, 18 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijfs/KongLCKSZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijfs/ZhaoLZL24,
  author       = {Yong Zhao and
                  Jiaxin Luo and
                  Weihai Zhang and
                  Xiangyun Lin},
  title        = {Asynchronous Finite-Time Exponential Dissipative Filtering for Stochastic
                  Fuzzy Markov Jump Systems Against Deception Attacks Based on Event-Triggered
                  Scheme},
  journal      = {Int. J. Fuzzy Syst.},
  volume       = {26},
  number       = {3},
  pages        = {735--752},
  year         = {2024},
  url          = {https://doi.org/10.1007/s40815-023-01631-w},
  doi          = {10.1007/S40815-023-01631-W},
  timestamp    = {Thu, 18 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijfs/ZhaoLZL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijfs/ZhaoY24,
  author       = {Jipeng Zhao and
                  Guang{-}Hong Yang},
  title        = {An Observer-Based Resilient Control Method Against Intermittent DoS
                  Attacks for Nonstrict-Feedback Nonlinear Cyberphysical Systems with
                  Tracking Errors Constraint},
  journal      = {Int. J. Fuzzy Syst.},
  volume       = {26},
  number       = {2},
  pages        = {596--612},
  year         = {2024},
  url          = {https://doi.org/10.1007/s40815-023-01619-6},
  doi          = {10.1007/S40815-023-01619-6},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijfs/ZhaoY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijim/ChandrakalaSJK24,
  author       = {C. B. Chandrakala and
                  Pooja Somarajan and
                  Sanjana Jadhav and
                  Agam Kapoor},
  title        = {Empowering Safety-Conscious Women Travelers: Examining the Benefits
                  of Electronic Word of Mouth and Mobile Travel Assistant},
  journal      = {Int. J. Interact. Mob. Technol.},
  volume       = {18},
  number       = {5},
  pages        = {112--134},
  year         = {2024},
  url          = {https://doi.org/10.3991/ijim.v18i05.43573},
  doi          = {10.3991/IJIM.V18I05.43573},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijim/ChandrakalaSJK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijim/SamalaMBHC24,
  author       = {Agariadne Dwinggo Samala and
                  David Mhlanga and
                  Ljubisa Bojic and
                  Natalie{-}Jane Howard and
                  Diogo Pereira Coelho},
  title        = {Blockchain Technology in Education: Opportunities, Challenges, and
                  Beyond},
  journal      = {Int. J. Interact. Mob. Technol.},
  volume       = {18},
  number       = {1},
  pages        = {20--42},
  year         = {2024},
  url          = {https://doi.org/10.3991/ijim.v18i01.46307},
  doi          = {10.3991/IJIM.V18I01.46307},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijim/SamalaMBHC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijim/SamalaZABZ24,
  author       = {Agariadne Dwinggo Samala and
                  Xiaoming Zhai and
                  Kumiko Aoki and
                  Ljubisa Bojic and
                  Simona Zikic},
  title        = {An In-Depth Review of ChatGPT's Pros and Cons for Learning and Teaching
                  in Education},
  journal      = {Int. J. Interact. Mob. Technol.},
  volume       = {18},
  number       = {2},
  pages        = {96--117},
  year         = {2024},
  url          = {https://doi.org/10.3991/ijim.v18i02.46509},
  doi          = {10.3991/IJIM.V18I02.46509},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijim/SamalaZABZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijinfoman/MukhopadhyayJ24,
  author       = {Arunabha Mukhopadhyay and
                  Swati Jain},
  title        = {A framework for cyber-risk insurance against ransomware: {A} mixed-method
                  approach},
  journal      = {Int. J. Inf. Manag.},
  volume       = {74},
  pages        = {102724},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.ijinfomgt.2023.102724},
  doi          = {10.1016/J.IJINFOMGT.2023.102724},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijinfoman/MukhopadhyayJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/ElberriTRL24,
  author       = {Mustafa Ahmed Elberri and
                  {\"{U}}mit Tokeser and
                  Javad Rahebi and
                  Jos{\'{e}} Manuel L{\'{o}}pez{-}Guede},
  title        = {A cyber defense system against phishing attacks with deep learning
                  game theory and {LSTM-CNN} with African vulture optimization algorithm
                  {(AVOA)}},
  journal      = {Int. J. Inf. Sec.},
  volume       = {23},
  number       = {4},
  pages        = {2583--2606},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10207-024-00851-x},
  doi          = {10.1007/S10207-024-00851-X},
  timestamp    = {Tue, 30 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/ElberriTRL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/MvahTDATK24,
  author       = {Fabrice Mvah and
                  Vianney Kengne Tchendji and
                  Cl{\'{e}}mentin Tayou Djam{\'{e}}gni and
                  Ahmed H. Anwar and
                  Deepak K. Tosh and
                  Charles A. Kamhoua},
  title        = {GaTeBaSep: game theory-based security protocol against {ARP} spoofing
                  attacks in software-defined networks},
  journal      = {Int. J. Inf. Sec.},
  volume       = {23},
  number       = {1},
  pages        = {373--387},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10207-023-00749-0},
  doi          = {10.1007/S10207-023-00749-0},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/MvahTDATK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmi/LopezUbedaMDL24,
  author       = {Pilar L{\'{o}}pez{-}{\'{U}}beda and
                  Teodoro Mart{\'{\i}}n{-}Noguerol and
                  Carolina D{\'{\i}}az{-}Angulo and
                  Antonio Luna},
  title        = {Evaluation of large language models performance against humans for
                  summarizing {MRI} knee radiology reports: {A} feasibility study},
  journal      = {Int. J. Medical Informatics},
  volume       = {187},
  pages        = {105443},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.ijmedinf.2024.105443},
  doi          = {10.1016/J.IJMEDINF.2024.105443},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijmi/LopezUbedaMDL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmms/HefkalukLT24,
  author       = {Natalia Hefkaluk and
                  Conor Linehan and
                  Anna Trace},
  title        = {Fail, fail again, fail better: How players who enjoy challenging games
                  persist after failure in "Celeste"},
  journal      = {Int. J. Hum. Comput. Stud.},
  volume       = {183},
  pages        = {103199},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.ijhcs.2023.103199},
  doi          = {10.1016/J.IJHCS.2023.103199},
  timestamp    = {Fri, 08 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijmms/HefkalukLT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/AgarwalRTY24,
  author       = {Udit Agarwal and
                  Vinay Rishiwal and
                  Sudeep Tanwar and
                  Mano Yadav},
  title        = {Blockchain and crypto forensics: Investigating crypto frauds},
  journal      = {Int. J. Netw. Manag.},
  volume       = {34},
  number       = {2},
  year         = {2024},
  url          = {https://doi.org/10.1002/nem.2255},
  doi          = {10.1002/NEM.2255},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/AgarwalRTY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijns/PR24,
  author       = {Sriram Kumar P and
                  Jac Fredo Agastinose Ronickom},
  title        = {Optimal Electrodermal Activity Segment for Enhanced Emotion Recognition
                  Using Spectrogram-Based Feature Extraction and Machine Learning},
  journal      = {Int. J. Neural Syst.},
  volume       = {34},
  number       = {5},
  pages        = {2450027:1--2450027:22},
  year         = {2024},
  url          = {https://doi.org/10.1142/S0129065724500278},
  doi          = {10.1142/S0129065724500278},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijns/PR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijoe/AsmanYYNRS24,
  author       = {Aulia Asman and
                  Yulkifli and
                  Yohandri and
                  Naurah Nazhifah and
                  Soha Rawas and
                  Agariadne Dwinggo Samala},
  title        = {Safeguarding Vascular Health: Unleashing the Potential of Smartphone
                  Early Warning Systems to Elevate Phlebitis Prevention in {IV} Infusion
                  Therapy},
  journal      = {Int. J. Online Biomed. Eng.},
  volume       = {20},
  number       = {8},
  pages        = {139--148},
  year         = {2024},
  url          = {https://doi.org/10.3991/ijoe.v20i08.48345},
  doi          = {10.3991/IJOE.V20I08.48345},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijoe/AsmanYYNRS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijoe/RawasS24,
  author       = {Soha Rawas and
                  Agariadne Dwinggo Samala},
  title        = {Revolutionizing Brain Tumor Analysis: {A} Fusion of ChatGPT and Multi-Modal
                  {CNN} for Unprecedented Precision},
  journal      = {Int. J. Online Biomed. Eng.},
  volume       = {20},
  number       = {8},
  pages        = {37--48},
  year         = {2024},
  url          = {https://doi.org/10.3991/ijoe.v20i08.47347},
  doi          = {10.3991/IJOE.V20I08.47347},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijoe/RawasS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijoe/SamalaR24,
  author       = {Agariadne Dwinggo Samala and
                  Soha Rawas},
  title        = {Transforming Healthcare Data Management: {A} Blockchain-Based Cloud
                  {EHR} System for Enhanced Security and Interoperability},
  journal      = {Int. J. Online Biomed. Eng.},
  volume       = {20},
  number       = {2},
  pages        = {46--60},
  year         = {2024},
  url          = {https://doi.org/10.3991/ijoe.v20i02.45693},
  doi          = {10.3991/IJOE.V20I02.45693},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijoe/SamalaR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijoe/SamalaR24a,
  author       = {Agariadne Dwinggo Samala and
                  Soha Rawas},
  title        = {Generative {AI} as Virtual Healthcare Assistant for Enhancing Patient
                  Care Quality},
  journal      = {Int. J. Online Biomed. Eng.},
  volume       = {20},
  number       = {5},
  pages        = {174--187},
  year         = {2024},
  url          = {https://doi.org/10.3991/ijoe.v20i05.45937},
  doi          = {10.3991/IJOE.V20I05.45937},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijoe/SamalaR24a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijoe/SamalaRRBRA24,
  author       = {Agariadne Dwinggo Samala and
                  Marina Ricci and
                  Christian Jonathan Angel Rueda and
                  Ljubisa Bojic and
                  Fadhli Ranuharja and
                  Winda Agustiarmi},
  title        = {Exploring Campus through Web-Based Immersive Adventures Using Virtual
                  Reality Photography: {A} Low-Cost Virtual Tour Experience},
  journal      = {Int. J. Online Biomed. Eng.},
  volume       = {20},
  number       = {1},
  pages        = {104--127},
  year         = {2024},
  url          = {https://doi.org/10.3991/ijoe.v20i01.44339},
  doi          = {10.3991/IJOE.V20I01.44339},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijoe/SamalaRRBRA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijon/DaiXC24,
  author       = {Jiazhu Dai and
                  Zhipeng Xiong and
                  Chenhong Cao},
  title        = {A semantic backdoor attack against graph convolutional networks},
  journal      = {Neurocomputing},
  volume       = {600},
  pages        = {128133},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.neucom.2024.128133},
  doi          = {10.1016/J.NEUCOM.2024.128133},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijon/DaiXC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijon/DuanZLDY24,
  author       = {Chengxu Duan and
                  Zhicheng Zhang and
                  Xiaoli Liu and
                  Yonghao Dang and
                  Jianqin Yin},
  title        = {Physics-constrained attack against convolution-based human motion
                  prediction},
  journal      = {Neurocomputing},
  volume       = {575},
  pages        = {127272},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.neucom.2024.127272},
  doi          = {10.1016/J.NEUCOM.2024.127272},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijon/DuanZLDY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijon/GuoLZWW24,
  author       = {Weiran Guo and
                  Guanjun Liu and
                  Ziyuan Zhou and
                  Ling Wang and
                  Jiacun Wang},
  title        = {Enhancing the robustness of {QMIX} against state-adversarial attacks},
  journal      = {Neurocomputing},
  volume       = {572},
  pages        = {127191},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.neucom.2023.127191},
  doi          = {10.1016/J.NEUCOM.2023.127191},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijon/GuoLZWW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijon/TangYJZS24,
  author       = {Guijian Tang and
                  Wen Yao and
                  Tingsong Jiang and
                  Yong Zhao and
                  Jialiang Sun},
  title        = {Adversarial patch-based false positive creation attacks against aerial
                  imagery object detectors},
  journal      = {Neurocomputing},
  volume       = {579},
  pages        = {127431},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.neucom.2024.127431},
  doi          = {10.1016/J.NEUCOM.2024.127431},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijon/TangYJZS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijon/ZhangTZQG24,
  author       = {Jian Zhang and
                  Ze Tao and
                  Shichao Zhang and
                  Zike Qiao and
                  Kehua Guo},
  title        = {Soft Hybrid Knowledge Distillation against deep neural networks},
  journal      = {Neurocomputing},
  volume       = {570},
  pages        = {127142},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.neucom.2023.127142},
  doi          = {10.1016/J.NEUCOM.2023.127142},
  timestamp    = {Fri, 05 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijon/ZhangTZQG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijon/ZhaoY24,
  author       = {Jipeng Zhao and
                  Guang{-}Hong Yang},
  title        = {Fuzzy adaptive resilient control against unknown false data injection
                  attacks for high-order nonlinear systems with actuator failures},
  journal      = {Neurocomputing},
  volume       = {563},
  pages        = {126939},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.neucom.2023.126939},
  doi          = {10.1016/J.NEUCOM.2023.126939},
  timestamp    = {Mon, 13 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijon/ZhaoY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijpr/RahmanPAST24,
  author       = {Towfique Rahman and
                  Sanjoy Kumar Paul and
                  Renu Agarwal and
                  Nagesh Shukla and
                  Firouzeh Taghikhah},
  title        = {A viable supply chain model for managing panic-buying related challenges:
                  lessons learned from the {COVID-19} pandemic},
  journal      = {Int. J. Prod. Res.},
  volume       = {62},
  number       = {10},
  pages        = {3415--3434},
  year         = {2024},
  url          = {https://doi.org/10.1080/00207543.2023.2237609},
  doi          = {10.1080/00207543.2023.2237609},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijpr/RahmanPAST24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/Ganesan24,
  author       = {Sangeetha Ganesan},
  title        = {Enabling secure modern web browsers against cache-based timing attacks},
  journal      = {Int. J. Secur. Networks},
  volume       = {19},
  number       = {1},
  pages        = {43--54},
  year         = {2024},
  url          = {https://doi.org/10.1504/IJSN.2024.137330},
  doi          = {10.1504/IJSN.2024.137330},
  timestamp    = {Tue, 30 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/Ganesan24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsysc/LiSCXX24,
  author       = {Jun Li and
                  Yuhan Suo and
                  Senchun Chai and
                  Yihao Xu and
                  Yuanqing Xia},
  title        = {Resilient and event-triggered control of singular Markov jump systems
                  against cyber attacks},
  journal      = {Int. J. Syst. Sci.},
  volume       = {55},
  number       = {2},
  pages        = {222--236},
  year         = {2024},
  url          = {https://doi.org/10.1080/00207721.2023.2269293},
  doi          = {10.1080/00207721.2023.2269293},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsysc/LiSCXX24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsysc/YeYCJ24,
  author       = {Zhengyu Ye and
                  Ziquan Yu and
                  Yuehua Cheng and
                  Bin Jiang},
  title        = {Finite-time sliding-mode observer based distributed robust fault tolerant
                  control for multi-agent systems against actuator and sensor faults},
  journal      = {Int. J. Syst. Sci.},
  volume       = {55},
  number       = {4},
  pages        = {618--630},
  year         = {2024},
  url          = {https://doi.org/10.1080/00207721.2023.2293482},
  doi          = {10.1080/00207721.2023.2293482},
  timestamp    = {Tue, 12 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsysc/YeYCJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ile/AgatovaPA24,
  author       = {Olga Agatova and
                  Alexander Popov and
                  Suad Abdalkareem Alwaely},
  title        = {Special aspects of using Big Data in the learning process},
  journal      = {Interact. Learn. Environ.},
  volume       = {32},
  number       = {3},
  pages        = {1105--1116},
  year         = {2024},
  url          = {https://doi.org/10.1080/10494820.2022.2114500},
  doi          = {10.1080/10494820.2022.2114500},
  timestamp    = {Sat, 06 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ile/AgatovaPA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imwut/BoovaraghavanZGA24,
  author       = {Sudershan Boovaraghavan and
                  Haozhe Zhou and
                  Mayank Goel and
                  Yuvraj Agarwal},
  title        = {Kirigami: Lightweight Speech Filtering for Privacy-Preserving Activity
                  Recognition using Audio},
  journal      = {Proc. {ACM} Interact. Mob. Wearable Ubiquitous Technol.},
  volume       = {8},
  number       = {1},
  pages        = {36:1--36:28},
  year         = {2024},
  url          = {https://doi.org/10.1145/3643502},
  doi          = {10.1145/3643502},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imwut/BoovaraghavanZGA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imwut/LiCAH24,
  author       = {Tianshi Li and
                  Lorrie Faith Cranor and
                  Yuvraj Agarwal and
                  Jason I. Hong},
  title        = {Matcha: An {IDE} Plugin for Creating Accurate Privacy Nutrition Labels},
  journal      = {Proc. {ACM} Interact. Mob. Wearable Ubiquitous Technol.},
  volume       = {8},
  number       = {1},
  pages        = {33:1--33:38},
  year         = {2024},
  url          = {https://doi.org/10.1145/3643544},
  doi          = {10.1145/3643544},
  timestamp    = {Thu, 02 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imwut/LiCAH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imwut/PatidarNZOA24,
  author       = {Prasoon Patidar and
                  Tricia J. Ngoon and
                  John Zimmerman and
                  Amy Ogan and
                  Yuvraj Agarwal},
  title        = {ClassID: Enabling Student Behavior Attribution from Ambient Classroom
                  Sensing Systems},
  journal      = {Proc. {ACM} Interact. Mob. Wearable Ubiquitous Technol.},
  volume       = {8},
  number       = {2},
  pages        = {55:1--55:28},
  year         = {2024},
  url          = {https://doi.org/10.1145/3659586},
  doi          = {10.1145/3659586},
  timestamp    = {Tue, 18 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imwut/PatidarNZOA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/inffus/CohenShapiraR24,
  author       = {Noy Cohen{-}Shapira and
                  Lior Rokach},
  title        = {PnT: Born-again tree-based model via fused decision path encoding},
  journal      = {Inf. Fusion},
  volume       = {112},
  pages        = {102545},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.inffus.2024.102545},
  doi          = {10.1016/J.INFFUS.2024.102545},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/inffus/CohenShapiraR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/inffus/KhanRPKHLK24,
  author       = {Izhar Ahmed Khan and
                  Imran Razzak and
                  Dechang Pi and
                  Nasrullah Khan and
                  Yasir Hussain and
                  Bentian Li and
                  Tanzeela Kousar},
  title        = {Fed-Inforce-Fusion: {A} federated reinforcement-based fusion model
                  for security and privacy protection of IoMT networks against cyber-attacks},
  journal      = {Inf. Fusion},
  volume       = {101},
  pages        = {102002},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.inffus.2023.102002},
  doi          = {10.1016/J.INFFUS.2023.102002},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/inffus/KhanRPKHLK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/inffus/WangZX24,
  author       = {Yongkang Wang and
                  Di{-}Hua Zhai and
                  Yuanqing Xia},
  title        = {{RFVIR:} {A} robust federated algorithm defending against Byzantine
                  attacks},
  journal      = {Inf. Fusion},
  volume       = {105},
  pages        = {102251},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.inffus.2024.102251},
  doi          = {10.1016/J.INFFUS.2024.102251},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/inffus/WangZX24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/inffus/ZhangSHHD24,
  author       = {Boyuan Zhang and
                  Yucheng Shi and
                  Yahong Han and
                  Qinghua Hu and
                  Weiping Ding},
  title        = {Cascade {\&} allocate: {A} cross-structure adversarial attack
                  against models fusing vision and language},
  journal      = {Inf. Fusion},
  volume       = {104},
  pages        = {102179},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.inffus.2023.102179},
  doi          = {10.1016/J.INFFUS.2023.102179},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/inffus/ZhangSHHD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/inffus/ZhuHCAW24,
  author       = {Yonghua Zhu and
                  Jincheng Huang and
                  Yang Chen and
                  Robert Amor and
                  Michael Witbrock},
  title        = {A graph transformer defence against graph perturbation by a flexible-pass
                  filter},
  journal      = {Inf. Fusion},
  volume       = {107},
  pages        = {102296},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.inffus.2024.102296},
  doi          = {10.1016/J.INFFUS.2024.102296},
  timestamp    = {Wed, 03 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/inffus/ZhuHCAW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/informaticaSI/HanN24,
  author       = {Mengmeng Han and
                  Imelda Lorenzo Najord},
  title        = {A Typical Model Evaluation System for Rural Vocational Education Against
                  Poverty Is Based on a Decision Tree Mining Algorithm},
  journal      = {Informatica (Slovenia)},
  volume       = {48},
  number       = {9},
  year         = {2024},
  url          = {https://doi.org/10.31449/inf.v48i9.5670},
  doi          = {10.31449/INF.V48I9.5670},
  timestamp    = {Thu, 11 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/informaticaSI/HanN24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/information/SchrotterNS24,
  author       = {Max Schr{\"{o}}tter and
                  Andreas Niemann and
                  Bettina Schnor},
  title        = {A Comparison of Neural-Network-Based Intrusion Detection against Signature-Based
                  Detection in IoT Networks},
  journal      = {Inf.},
  volume       = {15},
  number       = {3},
  pages        = {164},
  year         = {2024},
  url          = {https://doi.org/10.3390/info15030164},
  doi          = {10.3390/INFO15030164},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/information/SchrotterNS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/inroads/Clear24,
  author       = {Tony Clear},
  title        = {{THINKING} {ISSUES:} Large Language Models, the 'Doctrine of Discovery'
                  and 'Terra Nullius' Declared Again?},
  journal      = {Inroads},
  volume       = {15},
  number       = {2},
  pages        = {6--9},
  year         = {2024},
  url          = {https://doi.org/10.1145/3638564},
  doi          = {10.1145/3638564},
  timestamp    = {Thu, 06 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/inroads/Clear24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iot/SekiguchiT24,
  author       = {Naoya Sekiguchi and
                  Hidema Tanaka},
  title        = {{BGP} hijack attack policy against {AS} topology map},
  journal      = {Internet Things},
  volume       = {25},
  pages        = {101059},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.iot.2024.101059},
  doi          = {10.1016/J.IOT.2024.101059},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iot/SekiguchiT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/AgarwalP24,
  author       = {Vidushi Agarwal and
                  Sujata Pal},
  title        = {HierChain: {A} Hierarchical-Blockchain-Based Data Management System
                  for Smart Healthcare},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {2},
  pages        = {2924--2934},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2023.3295847},
  doi          = {10.1109/JIOT.2023.3295847},
  timestamp    = {Wed, 24 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/AgarwalP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/ChenGWXXB24,
  author       = {Yinfeng Chen and
                  Yu Guo and
                  Mingyue Wang and
                  Enliang Xu and
                  Hongcheng Xie and
                  Rongfang Bie},
  title        = {Securing {IOTA} Blockchain Against Tangle Vulnerability by Using Large
                  Deviation Theory},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {2},
  pages        = {1952--1965},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2023.3283788},
  doi          = {10.1109/JIOT.2023.3283788},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/ChenGWXXB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/ChenZZL24,
  author       = {Haijiao Chen and
                  Huan Zhao and
                  Zixing Zhang and
                  Keqin Li},
  title        = {Discriminative Feature Learning-Based Federated Lightweight Distillation
                  Against Multiple Attacks},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {10},
  pages        = {17663--17677},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2024.3360094},
  doi          = {10.1109/JIOT.2024.3360094},
  timestamp    = {Wed, 22 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/ChenZZL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/CuiZZJC24,
  author       = {Ting Cui and
                  Yi Zhang and
                  Jiyan Zhang and
                  Chenhui Jin and
                  Shiwei Chen},
  title        = {Differential-Invariant Subspace Cryptanalysis - {A} Real-Time Attack
                  Against IoT-Friendly Word-Based Block Ciphers},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {10},
  pages        = {17642--17650},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2024.3358346},
  doi          = {10.1109/JIOT.2024.3358346},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/CuiZZJC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/FanHLZLY24,
  author       = {Kai Fan and
                  Jingtao Hong and
                  Wenjie Li and
                  Xingwen Zhao and
                  Hui Li and
                  Yintang Yang},
  title        = {{FLSG:} {A} Novel Defense Strategy Against Inference Attacks in Vertical
                  Federated Learning},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {2},
  pages        = {1816--1826},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2023.3302792},
  doi          = {10.1109/JIOT.2023.3302792},
  timestamp    = {Thu, 15 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/FanHLZLY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/FuWLYZDYZ24,
  author       = {Fang Fu and
                  Yan Wang and
                  Shu Li and
                  Laurence T. Yang and
                  Ruonan Zhao and
                  Yueyue Dai and
                  Zhaohui Yang and
                  Zhicai Zhang},
  title        = {Incentive Mechanism Against Bounded Rationality for Federated Learning-Enabled
                  Internet of UAVs: {A} Prospect Theory-Based Approach},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {12},
  pages        = {20958--20969},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2024.3381636},
  doi          = {10.1109/JIOT.2024.3381636},
  timestamp    = {Wed, 14 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/FuWLYZDYZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/GaoZGLCZ24,
  author       = {Ya Gao and
                  Yang Zhang and
                  He Geng and
                  Xingwang Li and
                  Daniel Benevides da Costa and
                  Ming Zeng},
  title        = {Aerial-IRS-Assisted Securing Communications Against Eavesdropping:
                  Joint Trajectory and Resource Allocation},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {7},
  pages        = {11974--11985},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2023.3332038},
  doi          = {10.1109/JIOT.2023.3332038},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/GaoZGLCZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/GengLLQYZ24,
  author       = {Jiayue Geng and
                  Chen Ling and
                  Jinyu Liu and
                  Kexin Qiao and
                  Xiangjian Yi and
                  Liehuang Zhu},
  title        = {Security Evaluation of Lightweight Block Ciphers Against Mixture Differential
                  Cryptanalysis},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {12},
  pages        = {22116--22127},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2024.3380254},
  doi          = {10.1109/JIOT.2024.3380254},
  timestamp    = {Thu, 04 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/GengLLQYZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/GunawardenaJSMK24,
  author       = {Ravin Gunawardena and
                  Sandani Jayawardena and
                  Suranga Seneviratne and
                  Rahat Masood and
                  Salil S. Kanhere},
  title        = {Single-Sensor Sparse Adversarial Perturbation Attacks Against Behavioral
                  Biometrics},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {16},
  pages        = {27303--27321},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2024.3401101},
  doi          = {10.1109/JIOT.2024.3401101},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/GunawardenaJSMK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/LiCCLWLS24,
  author       = {Zedong Li and
                  Xin Chen and
                  Yuqi Chen and
                  Shijie Li and
                  Hangyu Wang and
                  Shichao Lv and
                  Limin Sun},
  title        = {Detecting Cyber-Attacks Against Cyber-Physical Manufacturing System:
                  {A} Machining Process Invariant Approach},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {10},
  pages        = {17602--17614},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2024.3358798},
  doi          = {10.1109/JIOT.2024.3358798},
  timestamp    = {Wed, 12 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/LiCCLWLS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/LiOH24,
  author       = {Yantao Li and
                  Caike Ouyang and
                  Hongyu Huang},
  title        = {AEGANAuth: Autoencoder GAN-Based Continuous Authentication With Conditional
                  Variational Autoencoder Generative Adversarial Network},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {16},
  pages        = {27635--27650},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2024.3399549},
  doi          = {10.1109/JIOT.2024.3399549},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/LiOH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/LiWHLW24,
  author       = {Xiumin Li and
                  Mi Wen and
                  Siying He and
                  Rongxing Lu and
                  Liangliang Wang},
  title        = {A Privacy-Preserving Federated Learning Scheme Against Poisoning Attacks
                  in Smart Grid},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {9},
  pages        = {16805--16816},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2024.3365142},
  doi          = {10.1109/JIOT.2024.3365142},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/LiWHLW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/LinC24,
  author       = {Yan{-}Ming Lin and
                  Edward T.{-}H. Chu},
  title        = {Evaluation of the Practicability of Internet of Things in Fighting
                  Against {COVID-19}},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {5},
  pages        = {8064--8077},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2023.3317248},
  doi          = {10.1109/JIOT.2023.3317248},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/LinC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/LiuLSCZD24,
  author       = {Shukan Liu and
                  Zhenyu Li and
                  Qiao Sun and
                  Lin Chen and
                  Xianfeng Zhang and
                  Li Duan},
  title        = {{FLOW:} {A} Robust Federated Learning Framework to Defend Against
                  Model Poisoning Attacks in IoT},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {9},
  pages        = {15075--15086},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2023.3341811},
  doi          = {10.1109/JIOT.2023.3341811},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/LiuLSCZD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/LiuWPLXCXL24,
  author       = {Xin Liu and
                  Ruxue Wang and
                  Lu Peng and
                  Dan Luo and
                  Gang Xu and
                  Xiu{-}Bo Chen and
                  Neal Xiong and
                  Xiaomeng Liu},
  title        = {Secure Computing Protocols for Internet of Things Data Fusion Based
                  on Set Intersection and Union Against Malicious Enemies},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {14},
  pages        = {24918--24932},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2024.3385476},
  doi          = {10.1109/JIOT.2024.3385476},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/LiuWPLXCXL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/LiuWXLL24,
  author       = {Jianhua Liu and
                  Xin Wang and
                  Guangtao Xue and
                  Tong Liu and
                  Minglu Li},
  title        = {An {ECA} Regret Learning Game for Cross-Tier Computation Offloading
                  Against Swarm Attacks in Sensor Edge Cloud},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {1},
  pages        = {1201--1216},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2023.3287996},
  doi          = {10.1109/JIOT.2023.3287996},
  timestamp    = {Fri, 09 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/LiuWXLL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/MaYGLSC24,
  author       = {Ruiqian Ma and
                  Weiwei Yang and
                  Xinrong Guan and
                  Xingbo Lu and
                  Yi Song and
                  Dechuan Chen},
  title        = {Covert mmWave Communications With Finite Blocklength Against Spatially
                  Random Wardens},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {2},
  pages        = {3402--3416},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2023.3296414},
  doi          = {10.1109/JIOT.2023.3296414},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/MaYGLSC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/ParkEJB24,
  author       = {Wonbin Park and
                  Sungbo Eo and
                  Changhee Joo and
                  Saewoong Bahk},
  title        = {B-hop: Time-Domain Adjustment of {BLE} Frequency Hopping Against Wi-Fi
                  Beacon Interference},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {7},
  pages        = {12853--12863},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2023.3337252},
  doi          = {10.1109/JIOT.2023.3337252},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/ParkEJB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/QiaoPFLH24,
  author       = {Hongyi Qiao and
                  Cong Peng and
                  Qi Feng and
                  Min Luo and
                  Debiao He},
  title        = {Ciphertext Range Query Scheme Against Agent Transfer and Permission
                  Extension Attacks for Cloud Computing},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {10},
  pages        = {17975--17988},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2024.3360141},
  doi          = {10.1109/JIOT.2024.3360141},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/QiaoPFLH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/RenZCYZL24,
  author       = {Yan Ren and
                  Heng Zhang and
                  Xianghui Cao and
                  Chaoqun Yang and
                  Jian Zhang and
                  Hongran Li},
  title        = {Promoting or Hindering: Stealthy Black-Box Attacks Against DRL-Based
                  Traffic Signal Control},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {4},
  pages        = {5816--5825},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2023.3308260},
  doi          = {10.1109/JIOT.2023.3308260},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/RenZCYZL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/ShenCSWKY24,
  author       = {Shigen Shen and
                  Chenpeng Cai and
                  Yizhou Shen and
                  Xiaoping Wu and
                  Wenlong Ke and
                  Shui Yu},
  title        = {{MFGD3QN:} Enhancing Edge Intelligence Defense Against DDoS With Mean-Field
                  Games and Dueling Double Deep Q-Network},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {13},
  pages        = {23931--23945},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2024.3387090},
  doi          = {10.1109/JIOT.2024.3387090},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/ShenCSWKY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/ShenKSZSZWZ24,
  author       = {Liyan Shen and
                  Zhenhan Ke and
                  Jinqiao Shi and
                  Xi Zhang and
                  Yanwei Sun and
                  Jiapeng Zhao and
                  Xuebin Wang and
                  Xiaojie Zhao},
  title        = {{SPEFL:} Efficient Security and Privacy-Enhanced Federated Learning
                  Against Poisoning Attacks},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {8},
  pages        = {13437--13451},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2023.3339638},
  doi          = {10.1109/JIOT.2023.3339638},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/ShenKSZSZWZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/ShenLLL24,
  author       = {Xicong Shen and
                  Ying Liu and
                  Fu Li and
                  Chunguang Li},
  title        = {Privacy-Preserving Federated Learning Against Label-Flipping Attacks
                  on Non-IID Data},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {1},
  pages        = {1241--1255},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2023.3288886},
  doi          = {10.1109/JIOT.2023.3288886},
  timestamp    = {Fri, 09 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/ShenLLL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/WangC24,
  author       = {Nian{-}Zu Wang and
                  Hung{-}Yu Chien},
  title        = {Design and Implementation of MQTT-Based Over-the-Air Updating Against
                  Curious Brokers},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {6},
  pages        = {10768--10777},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2023.3327447},
  doi          = {10.1109/JIOT.2023.3327447},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/WangC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/WangCMMCF24,
  author       = {Jianhua Wang and
                  Xiaolin Chang and
                  Jelena V. Misic and
                  Vojislav B. Misic and
                  Zhi Chen and
                  Junchao Fan},
  title        = {PA-iMFL: Communication-Efficient Privacy Amplification Method Against
                  Data Reconstruction Attack in Improved Multilayer Federated Learning},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {10},
  pages        = {17960--17974},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2024.3360007},
  doi          = {10.1109/JIOT.2024.3360007},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/WangCMMCF24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/WangCMMW24,
  author       = {Jianhua Wang and
                  Xiaolin Chang and
                  Jelena V. Misic and
                  Vojislav B. Misic and
                  Yixiang Wang},
  title        = {{PASS:} {A} Parameter Audit-Based Secure and Fair Federated Learning
                  Scheme Against Free-Rider Attack},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {1},
  pages        = {1374--1384},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2023.3288936},
  doi          = {10.1109/JIOT.2023.3288936},
  timestamp    = {Fri, 09 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/WangCMMW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/WangLZLNGC24,
  author       = {Yilei Wang and
                  Chunmei Li and
                  Yiting Zhang and
                  Tao Li and
                  Jianting Ning and
                  Keke Gai and
                  Kim{-}Kwang Raymond Choo},
  title        = {A Detection Method Against Selfish Mining-Like Attacks Based on Ensemble
                  Deep Learning in IoT},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {11},
  pages        = {19564--19574},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2024.3367689},
  doi          = {10.1109/JIOT.2024.3367689},
  timestamp    = {Tue, 18 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/WangLZLNGC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/WangMCFGQJ24,
  author       = {Yao Wang and
                  Xue Mei and
                  Zhengtai Chang and
                  Wenbing Fan and
                  Benqing Guo and
                  Zhi Quan and
                  Deepak Kumar Jain},
  title        = {A Lightweight Authentication Protocol Against Modeling Attacks Based
                  on a Novel {LFSR-APUF}},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {1},
  pages        = {283--295},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2023.3314058},
  doi          = {10.1109/JIOT.2023.3314058},
  timestamp    = {Fri, 09 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/WangMCFGQJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/WangZLST24,
  author       = {Jingpei Wang and
                  Ming Zhu and
                  Mohan Li and
                  Yanbin Sun and
                  Zhihong Tian},
  title        = {An Access Control Method Against Unauthorized and Noncompliant Behaviors
                  of Real-Time Data in Industrial IoT},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {1},
  pages        = {708--727},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2023.3285992},
  doi          = {10.1109/JIOT.2023.3285992},
  timestamp    = {Fri, 09 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/WangZLST24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/WangZQHG24,
  author       = {Weixu Wang and
                  Xiaobo Zhou and
                  Tie Qiu and
                  Xin He and
                  Shuxin Ge},
  title        = {Location-Privacy-Aware Service Migration Against Inference Attacks
                  in Multiuser {MEC} Systems},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {1},
  pages        = {1413--1426},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2023.3290145},
  doi          = {10.1109/JIOT.2023.3290145},
  timestamp    = {Fri, 09 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/WangZQHG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/WuLQWYPX24,
  author       = {Tao Wu and
                  Junhui Luo and
                  Shaojie Qiao and
                  Chao Wang and
                  Lin Yuan and
                  Xiao Pu and
                  Xingping Xian},
  title        = {Multiview-Ensemble-Learning-Based Robust Graph Convolutional Networks
                  Against Adversarial Attacks},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {16},
  pages        = {27700--27714},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2024.3400056},
  doi          = {10.1109/JIOT.2024.3400056},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/WuLQWYPX24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/YanZHZ24,
  author       = {Jiayu Yan and
                  Fengchi Zhu and
                  Yulong Huang and
                  Yonggang Zhang},
  title        = {Robust Decentralized Cooperative Localization for Multirobot System
                  Against Measurement Outliers},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {10},
  pages        = {17934--17947},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2024.3360983},
  doi          = {10.1109/JIOT.2024.3360983},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/YanZHZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/YangAISLH24,
  author       = {Mingyu Yang and
                  Tanvir Ahmed and
                  Saya Inagaki and
                  Kazuo Sakiyama and
                  Yang Li and
                  Yuko Hara{-}Azumi},
  title        = {Hardware/Software Cooperative Design Against Power Side-Channel Attacks
                  on IoT Devices},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {9},
  pages        = {16758--16768},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2024.3355417},
  doi          = {10.1109/JIOT.2024.3355417},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/YangAISLH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/YangGH24,
  author       = {Han Yang and
                  Dongbing Gu and
                  Jianhua He},
  title        = {A Robust and Efficient Federated Learning Algorithm Against Adaptive
                  Model Poisoning Attacks},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {9},
  pages        = {16289--16302},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2024.3351371},
  doi          = {10.1109/JIOT.2024.3351371},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/YangGH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/YouCCLC24,
  author       = {Chun{-}Heng You and
                  Chih{-}Hao Chiang and
                  Paul C.{-}P. Chao and
                  Wen{-}Ching Lin and
                  Kai{-}Hsin Chuang},
  title        = {New Adaptive Template Attacks Against Montgomery-Ladder-Based ECCs
                  in IoT Devices},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {12},
  pages        = {22716--22725},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2024.3384076},
  doi          = {10.1109/JIOT.2024.3384076},
  timestamp    = {Thu, 04 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/YouCCLC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/YuanTL24,
  author       = {Fenying Yuan and
                  Shengda Tang and
                  Didi Liu},
  title        = {AoI-Based Transmission Scheduling for Cyber Physical Systems Over
                  Fading Channel Against Eavesdropping},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {3},
  pages        = {5455--5466},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2023.3307351},
  doi          = {10.1109/JIOT.2023.3307351},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/YuanTL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/ZhangWLQWTM24,
  author       = {Zhenyong Zhang and
                  Bingdong Wang and
                  Mengxiang Liu and
                  Yan Qin and
                  Jingpei Wang and
                  Youliang Tian and
                  Jianfeng Ma},
  title        = {Limitation of Reactance Perturbation Strategy Against False Data Injection
                  Attacks on IoT-Based Smart Grid},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {7},
  pages        = {11619--11631},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2023.3332660},
  doi          = {10.1109/JIOT.2023.3332660},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/ZhangWLQWTM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/ZhangWMM24,
  author       = {Jiahui Zhang and
                  Zhuzhu Wang and
                  Zhuoran Ma and
                  Jianfeng Ma},
  title        = {Adaptive Robust Learning Against Backdoor Attacks in Smart Homes},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {13},
  pages        = {23906--23916},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2024.3392772},
  doi          = {10.1109/JIOT.2024.3392772},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/ZhangWMM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/ZhangWWG24,
  author       = {Qianyun Zhang and
                  Zhendong Wang and
                  Bi{-}Yi Wu and
                  Guan Gui},
  title        = {A Robust and Practical Solution to {ADS-B} Security Against Denial-of-Service
                  Attacks},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {8},
  pages        = {13647--13659},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2023.3337543},
  doi          = {10.1109/JIOT.2023.3337543},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/ZhangWWG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotm/AissaKKLB24,
  author       = {Nour El Houda Sayah Ben Aissa and
                  Chaker Abdelaziz Kerrache and
                  Ahmed Korichi and
                  Abderrahmane Lakas and
                  Abdelkader Nasreddine Belkacem},
  title        = {Enhancing {EEG} Signal Classifier Robustness Against Adversarial Attacks
                  Using a Generative Adversarial Network Approach},
  journal      = {{IEEE} Internet Things Mag.},
  volume       = {7},
  number       = {3},
  pages        = {44--49},
  year         = {2024},
  url          = {https://doi.org/10.1109/IOTM.001.2300262},
  doi          = {10.1109/IOTM.001.2300262},
  timestamp    = {Tue, 14 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotm/AissaKKLB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/MoritaSYY24,
  author       = {Kohei Morita and
                  Shinya Shiroshita and
                  Yutaro Yamaguchi and
                  Yu Yokoi},
  title        = {Fast primal-dual update against local weight update in linear assignment
                  problem and its application},
  journal      = {Inf. Process. Lett.},
  volume       = {183},
  pages        = {106432},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.ipl.2023.106432},
  doi          = {10.1016/J.IPL.2023.106432},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/MoritaSYY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/irjocs/GatateA24,
  author       = {Veeranna Gatate and
                  Jayashree Agarkhed},
  title        = {Enhancing intrusion detection in wireless sensor networks through
                  deep hybrid network empowered by SC-attention mechanism},
  journal      = {Iran J. Comput. Sci.},
  volume       = {7},
  number       = {2},
  pages        = {229--240},
  year         = {2024},
  url          = {https://doi.org/10.1007/s42044-024-00171-2},
  doi          = {10.1007/S42044-024-00171-2},
  timestamp    = {Wed, 10 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/irjocs/GatateA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/CharizanosDI24,
  author       = {Georgios Charizanos and
                  Haydar Demirhan and
                  Duygu I{\c{c}}en},
  title        = {A Monte Carlo fuzzy logistic regression framework against imbalance
                  and separation},
  journal      = {Inf. Sci.},
  volume       = {655},
  pages        = {119893},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.ins.2023.119893},
  doi          = {10.1016/J.INS.2023.119893},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/CharizanosDI24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/ChenLLZDC24,
  author       = {Jinyin Chen and
                  Mingjun Li and
                  Tao Liu and
                  Haibin Zheng and
                  Hang Du and
                  Yao Cheng},
  title        = {Rethinking the defense against free-rider attack from the perspective
                  of model weight evolving frequency},
  journal      = {Inf. Sci.},
  volume       = {668},
  pages        = {120527},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.ins.2024.120527},
  doi          = {10.1016/J.INS.2024.120527},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/ChenLLZDC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/ChenZQLLC24,
  author       = {Chenyang Chen and
                  Xiaoyu Zhang and
                  Hongyi Qiu and
                  Jian Lou and
                  Zhengyang Liu and
                  Xiaofeng Chen},
  title        = {MaskArmor: Confidence masking-based defense mechanism for {GNN} against
                  {MIA}},
  journal      = {Inf. Sci.},
  volume       = {669},
  pages        = {120579},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.ins.2024.120579},
  doi          = {10.1016/J.INS.2024.120579},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/ChenZQLLC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/Li024,
  author       = {Yuan{-}Yuan Li and
                  Yuan{-}Xin Li},
  title        = {Security-based distributed fuzzy funnel cooperative control for uncertain
                  nonlinear multi-agent systems against DoS attacks},
  journal      = {Inf. Sci.},
  volume       = {661},
  pages        = {120189},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.ins.2024.120189},
  doi          = {10.1016/J.INS.2024.120189},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/Li024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/Li0XF024,
  author       = {Duomei Li and
                  Feng Li and
                  Jianwei Xia and
                  Xihong Fei and
                  Hao Shen},
  title        = {Multi-group consensus of multi-agent systems subject to semi-Markov
                  jump topologies against hybrid cyber-attacks},
  journal      = {Inf. Sci.},
  volume       = {679},
  pages        = {121092},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.ins.2024.121092},
  doi          = {10.1016/J.INS.2024.121092},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/Li0XF024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/LiLCR024,
  author       = {Jinyan Li and
                  Xiao{-}Meng Li and
                  Zhijian Cheng and
                  Hongru Ren and
                  Hongyi Li},
  title        = {Event-based secure control for cyber-physical systems against false
                  data injection attacks},
  journal      = {Inf. Sci.},
  volume       = {679},
  pages        = {121093},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.ins.2024.121093},
  doi          = {10.1016/J.INS.2024.121093},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/LiLCR024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/LiSZMWX24,
  author       = {Ning Li and
                  Haiwei Sang and
                  Jiamin Zheng and
                  Huawei Ma and
                  Xiaoying Wang and
                  Fu{-}an Xiao},
  title        = {Spatial-temporal graph Transformer for object tracking against noise
                  spoofing interference},
  journal      = {Inf. Sci.},
  volume       = {678},
  pages        = {120936},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.ins.2024.120936},
  doi          = {10.1016/J.INS.2024.120936},
  timestamp    = {Mon, 24 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/LiSZMWX24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/LiWSSWMS24,
  author       = {Jiliang Li and
                  Yuheng Wang and
                  Yuan Su and
                  Zhou Su and
                  Yuyi Wang and
                  Weizhi Meng and
                  Yinghua Shen},
  title        = {Delayed packing attack and countermeasure against transaction information
                  based applications},
  journal      = {Inf. Sci.},
  volume       = {652},
  pages        = {119742},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.ins.2023.119742},
  doi          = {10.1016/J.INS.2023.119742},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/LiWSSWMS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/LiZSCL24,
  author       = {Yihao Li and
                  Xiongwei Zhang and
                  Meng Sun and
                  Weiwei Chen and
                  Yinan Li},
  title        = {An attack-agnostic defense method against adversarial attacks on speaker
                  verification by fusing downsampling and upsampling of speech signals},
  journal      = {Inf. Sci.},
  volume       = {670},
  pages        = {120618},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.ins.2024.120618},
  doi          = {10.1016/J.INS.2024.120618},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/LiZSCL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/LiuLMYJY24,
  author       = {Qi Liu and
                  Jianxun Li and
                  Shuping Ma and
                  Shen Yin and
                  Baoping Jiang and
                  Chunyu Yang},
  title        = {A random-switch-surface based neural sliding mode framework against
                  actuator attacks of delayed singular semi-Markov jump systems},
  journal      = {Inf. Sci.},
  volume       = {652},
  pages        = {119763},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.ins.2023.119763},
  doi          = {10.1016/J.INS.2023.119763},
  timestamp    = {Mon, 10 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/LiuLMYJY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/LuoLQFL24,
  author       = {Yuling Luo and
                  Yuanze Li and
                  Sheng Qin and
                  Qiang Fu and
                  Junxiu Liu},
  title        = {Copyright protection framework for federated learning models against
                  collusion attacks},
  journal      = {Inf. Sci.},
  volume       = {680},
  pages        = {121161},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.ins.2024.121161},
  doi          = {10.1016/J.INS.2024.121161},
  timestamp    = {Mon, 29 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/LuoLQFL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/RenHYFZ24,
  author       = {Yanli Ren and
                  Mingqi Hu and
                  Zhe Yang and
                  Guorui Feng and
                  Xinpeng Zhang},
  title        = {{BPFL:} Blockchain-based privacy-preserving federated learning against
                  poisoning attack},
  journal      = {Inf. Sci.},
  volume       = {665},
  pages        = {120377},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.ins.2024.120377},
  doi          = {10.1016/J.INS.2024.120377},
  timestamp    = {Tue, 13 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/RenHYFZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/SunYD24,
  author       = {Qingdong Sun and
                  Guang{-}Hong Yang and
                  Georgi Marko Dimirovski},
  title        = {Secure state estimation with disturbance rejection against switched
                  sparse sensor attacks},
  journal      = {Inf. Sci.},
  volume       = {675},
  pages        = {120709},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.ins.2024.120709},
  doi          = {10.1016/J.INS.2024.120709},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/SunYD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/WangWG24,
  author       = {Xiaodong Wang and
                  Longfei Wu and
                  Zhitao Guan},
  title        = {GradDiff: Gradient-based membership inference attacks against federated
                  distillation with differential comparison},
  journal      = {Inf. Sci.},
  volume       = {658},
  pages        = {120068},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.ins.2023.120068},
  doi          = {10.1016/J.INS.2023.120068},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/WangWG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/YangCLLHL24,
  author       = {Zuopeng Yang and
                  Pengyu Chen and
                  Tao Li and
                  Kangjun Liu and
                  Yuan Huang and
                  Xin Lin},
  title        = {Defending against similarity shift attack for EaaS via adaptive multi-target
                  watermarking},
  journal      = {Inf. Sci.},
  volume       = {678},
  pages        = {120893},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.ins.2024.120893},
  doi          = {10.1016/J.INS.2024.120893},
  timestamp    = {Mon, 24 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/YangCLLHL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/YangGBLP24,
  author       = {Xianqi Yang and
                  Qing Gao and
                  Michael V. Basin and
                  Hao Li and
                  Xin Peng},
  title        = {An ETH-based approach to securing industrial Internet systems against
                  mutinous attacks},
  journal      = {Inf. Sci.},
  volume       = {655},
  pages        = {119904},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.ins.2023.119904},
  doi          = {10.1016/J.INS.2023.119904},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/YangGBLP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/YangK24,
  author       = {Jung{-}Min Yang and
                  Seong Woo Kwak},
  title        = {Robust corrective control against fundamental and non-fundamental
                  mode attacks with application to an asynchronous digital system},
  journal      = {Inf. Sci.},
  volume       = {661},
  pages        = {120145},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.ins.2024.120145},
  doi          = {10.1016/J.INS.2024.120145},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/YangK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/ZhangL24a,
  author       = {Dongyu Zhang and
                  Xiao{-}Jian Li},
  title        = {Stealthy attacks against distributed state estimation of stochastic
                  multi-agent systems under composite attack detection mechanisms},
  journal      = {Inf. Sci.},
  volume       = {672},
  pages        = {120584},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.ins.2024.120584},
  doi          = {10.1016/J.INS.2024.120584},
  timestamp    = {Thu, 04 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/ZhangL24a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/ZhangMMYWZ24,
  author       = {Zheng Zhang and
                  Jianfeng Ma and
                  Xindi Ma and
                  Ruikang Yang and
                  Xiangyu Wang and
                  Junying Zhang},
  title        = {Defending against membership inference attacks: {RM} Learning is all
                  you need},
  journal      = {Inf. Sci.},
  volume       = {670},
  pages        = {120636},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.ins.2024.120636},
  doi          = {10.1016/J.INS.2024.120636},
  timestamp    = {Wed, 10 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/ZhangMMYWZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/ZhangYJ24,
  author       = {Weihai Zhang and
                  Zunjie Yu and
                  Xiushan Jiang},
  title        = {Event-triggered security consensus of continuous-time multi-agent
                  systems against complex cooperative attacks},
  journal      = {Inf. Sci.},
  volume       = {662},
  pages        = {120260},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.ins.2024.120260},
  doi          = {10.1016/J.INS.2024.120260},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/ZhangYJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/ZhaoTZH24,
  author       = {Ning Zhao and
                  Yongjie Tian and
                  Huiyan Zhang and
                  Enrique Herrera{-}Viedma},
  title        = {Fuzzy-based adaptive event-triggered control for nonlinear cyber-physical
                  systems against deception attacks via a single parameter learning
                  method},
  journal      = {Inf. Sci.},
  volume       = {657},
  pages        = {119948},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.ins.2023.119948},
  doi          = {10.1016/J.INS.2023.119948},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/ZhaoTZH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isf/TiwariGZMA24,
  author       = {Amit Anand Tiwari and
                  Samrat Gupta and
                  Efpraxia D. Zamani and
                  Neeraj Mittal and
                  Renu Agarwal},
  title        = {An Overarching Conceptual Framework for ICT-enabled Responsive Governance},
  journal      = {Inf. Syst. Frontiers},
  volume       = {26},
  number       = {3},
  pages        = {1161--1182},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10796-023-10415-4},
  doi          = {10.1007/S10796-023-10415-4},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isf/TiwariGZMA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isj/LeeCCH24,
  author       = {Joyce Yi{-}Hui Lee and
                  Chih{-}Yuan Chou and
                  Hsin{-}Lu Chang and
                  Carol Hsu},
  title        = {Building digital resilience against crises: The case of Taiwan's {COVID-19}
                  pandemic management},
  journal      = {Inf. Syst. J.},
  volume       = {34},
  number       = {1},
  pages        = {39--79},
  year         = {2024},
  url          = {https://doi.org/10.1111/isj.12471},
  doi          = {10.1111/ISJ.12471},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isj/LeeCCH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/MI24,
  author       = {Savitha M. M and
                  Basarkod P. I},
  title        = {Securing AMI-IoT networks against multiple {RPL} attacks using ensemble
                  learning {IDS} and light-chain based prediction detection and mitigation
                  mechanisms},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {33},
  number       = {1},
  pages        = {73--95},
  year         = {2024},
  url          = {https://doi.org/10.1080/19393555.2023.2218852},
  doi          = {10.1080/19393555.2023.2218852},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/MI24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isse/RaoGABB24,
  author       = {Hamnah Rao and
                  Meenu Gupta and
                  Parul Agarwal and
                  Surbhi Bhatia and
                  Rajat Bhardwaj},
  title        = {Mental health issues assessment using tools during {COVID-19} pandemic},
  journal      = {Innov. Syst. Softw. Eng.},
  volume       = {20},
  number       = {3},
  pages        = {393--404},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11334-022-00510-1},
  doi          = {10.1007/S11334-022-00510-1},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isse/RaoGABB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/AgarwalJ24,
  author       = {Saurabh Agarwal and
                  Ki{-}Hyun Jung},
  title        = {Digital image steganalysis using entropy driven deep neural network},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {84},
  pages        = {103799},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.jisa.2024.103799},
  doi          = {10.1016/J.JISA.2024.103799},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/AgarwalJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ChenMWHZW24,
  author       = {Yanli Chen and
                  Asad Malik and
                  Hongxia Wang and
                  Ben He and
                  Yonghui Zhou and
                  Hanzhou Wu},
  title        = {Enhancing robustness in video data hiding against recompression with
                  a wide parameter range},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {83},
  pages        = {103796},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.jisa.2024.103796},
  doi          = {10.1016/J.JISA.2024.103796},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ChenMWHZW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LongoLPR24,
  author       = {Giacomo Longo and
                  Francesco Lupia and
                  Andrea Pugliese and
                  Enrico Russo},
  title        = {Physics-aware targeted attacks against maritime industrial control
                  systems},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {82},
  pages        = {103724},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.jisa.2024.103724},
  doi          = {10.1016/J.JISA.2024.103724},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/LongoLPR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ParkJLKKS24,
  author       = {Jong{-}Yeon Park and
                  Jang{-}Won Ju and
                  Wonil Lee and
                  Bo{-}Gyeong Kang and
                  Yasuyuki Kachi and
                  Kouichi Sakurai},
  title        = {A statistical verification method of random permutations for hiding
                  countermeasure against side-channel attacks},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {84},
  pages        = {103797},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.jisa.2024.103797},
  doi          = {10.1016/J.JISA.2024.103797},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ParkJLKKS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/WangHZLM24,
  author       = {Jinwei Wang and
                  Wanyun Huang and
                  Jiawei Zhang and
                  Xiangyang Luo and
                  Bin Ma},
  title        = {Adversarial watermark: {A} robust and reliable watermark against removal},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {82},
  pages        = {103750},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.jisa.2024.103750},
  doi          = {10.1016/J.JISA.2024.103750},
  timestamp    = {Mon, 05 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/WangHZLM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/WuLWLWL24,
  author       = {Xinyan Wu and
                  Jin Li and
                  Huanwei Wang and
                  Xiaoguang Liu and
                  Weifeng Wu and
                  Fagen Li},
  title        = {A randomized encryption deduplication method against frequency attack},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {83},
  pages        = {103774},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.jisa.2024.103774},
  doi          = {10.1016/J.JISA.2024.103774},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/WuLWLWL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/XuS24,
  author       = {Hairuo Xu and
                  Tao Shu},
  title        = {Attack-model-agnostic defense against model poisonings in distributed
                  learning},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {82},
  pages        = {103739},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.jisa.2024.103739},
  doi          = {10.1016/J.JISA.2024.103739},
  timestamp    = {Thu, 30 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/XuS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/XuS24a,
  author       = {Hairuo Xu and
                  Tao Shu},
  title        = {Defending against model poisoning attack in federated learning: {A}
                  variance-minimization approach},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {82},
  pages        = {103744},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.jisa.2024.103744},
  doi          = {10.1016/J.JISA.2024.103744},
  timestamp    = {Thu, 30 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/XuS24a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itd/TasnimaS24,
  author       = {Touhida Tasnima and
                  Md Azalanshah Md Syed},
  title        = {Smart phone usage for women's empowerment to respond against domestic
                  violence in Bangladesh},
  journal      = {Inf. Technol. Dev.},
  volume       = {30},
  number       = {1},
  pages        = {114--131},
  year         = {2024},
  url          = {https://doi.org/10.1080/02681102.2023.2288853},
  doi          = {10.1080/02681102.2023.2288853},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/itd/TasnimaS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itp/DahabiyehFAJ24,
  author       = {Laila Dahabiyeh and
                  Ali Farooq and
                  Farhan Ahmad and
                  Yousra Javed},
  title        = {Explaining technology migration against the change in terms of use:
                  an fsQCA approach},
  journal      = {Inf. Technol. People},
  volume       = {37},
  number       = {3},
  pages        = {1073--1102},
  year         = {2024},
  url          = {https://doi.org/10.1108/ITP-07-2022-0498},
  doi          = {10.1108/ITP-07-2022-0498},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/itp/DahabiyehFAJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itp/MirowskaB24,
  author       = {Agata Mirowska and
                  Tuba Bakici},
  title        = {Working in a bubble: techno-isolation as an emerging techno-stressor
                  in teleworkers},
  journal      = {Inf. Technol. People},
  volume       = {37},
  number       = {3},
  pages        = {1403--1422},
  year         = {2024},
  url          = {https://doi.org/10.1108/ITP-09-2022-0657},
  doi          = {10.1108/ITP-09-2022-0657},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/itp/MirowskaB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itsr/AgarwalSJCS24,
  author       = {Akansha Agarwal and
                  Shreeji and
                  Ravi Jain and
                  Meeta Chaudhry and
                  Adwitiya Sinha},
  title        = {Smart Aviation with Customized Route Discovery Using Urban Transportation
                  Analytics},
  journal      = {Int. J. Intell. Transp. Syst. Res.},
  volume       = {22},
  number       = {1},
  pages        = {229--244},
  year         = {2024},
  url          = {https://doi.org/10.1007/s13177-024-00390-8},
  doi          = {10.1007/S13177-024-00390-8},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/itsr/AgarwalSJCS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ivc/WangLLZYW24,
  author       = {Weidong Wang and
                  Zhi Li and
                  Shuaiwei Liu and
                  Li Zhang and
                  Jin Yang and
                  Yi Wang},
  title        = {Feature decoupling and interaction network for defending against adversarial
                  examples},
  journal      = {Image Vis. Comput.},
  volume       = {144},
  pages        = {104931},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.imavis.2024.104931},
  doi          = {10.1016/J.IMAVIS.2024.104931},
  timestamp    = {Wed, 29 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ivc/WangLLZYW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jair/YuHT24,
  author       = {Xingrui Yu and
                  Bo Han and
                  Ivor W. Tsang},
  title        = {{USN:} {A} Robust Imitation Learning Method against Diverse Action
                  Noise},
  journal      = {J. Artif. Intell. Res.},
  volume       = {79},
  pages        = {1237--1280},
  year         = {2024},
  url          = {https://doi.org/10.1613/jair.1.15819},
  doi          = {10.1613/JAIR.1.15819},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jair/YuHT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jamia/ZengSTBCBD24,
  author       = {Chenjie Zeng and
                  David J. Schlueter and
                  Tam C. Tran and
                  Anav Babbar and
                  Thomas Cassini and
                  Lisa Bastarache and
                  Joshua C. Denny},
  title        = {Comparison of phenomic profiles in the \emph{All of Us} Research Program
                  against the {US} general population and the {UK} Biobank},
  journal      = {J. Am. Medical Informatics Assoc.},
  volume       = {31},
  number       = {4},
  pages        = {846--854},
  year         = {2024},
  url          = {https://doi.org/10.1093/jamia/ocad260},
  doi          = {10.1093/JAMIA/OCAD260},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jamia/ZengSTBCBD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jasss/DehkordiMHG24,
  author       = {Molood Ale Ebrahim Dehkordi and
                  Anna Melnyk and
                  Paulien M. Herder and
                  Amineh Ghorbani},
  title        = {Examining the Interplay Between National Strategies and Value Change
                  in the Battle Against {COVID-19:} An Agent-Based Modelling Inquiry},
  journal      = {J. Artif. Soc. Soc. Simul.},
  volume       = {27},
  number       = {1},
  year         = {2024},
  url          = {https://doi.org/10.18564/jasss.5283},
  doi          = {10.18564/JASSS.5283},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jasss/DehkordiMHG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcc/BorbaAVS24,
  author       = {Jo{\~{a}}o Ricardo Bueno de Morais Borba and
                  Leonardo Pereira de Ara{\'{u}}jo and
                  Marcia Paranho Veloso and
                  Nelson Jos{\'{e}} Freitas da Silveira},
  title        = {Applying the bioisosterism strategy to obtain lead compounds against
                  SARS-CoV-2 cysteine proteases: An in-silico approach},
  journal      = {J. Comput. Chem.},
  volume       = {45},
  number       = {1},
  pages        = {35--46},
  year         = {2024},
  url          = {https://doi.org/10.1002/jcc.27217},
  doi          = {10.1002/JCC.27217},
  timestamp    = {Wed, 24 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcc/BorbaAVS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/CarletDGT24,
  author       = {Claude Carlet and
                  Abderrahman Daif and
                  Sylvain Guilley and
                  C{\'{e}}dric Tavernier},
  title        = {A masking method based on orthonormal spaces, protecting several bytes
                  against both {SCA} and {FIA} with a reduced cost},
  journal      = {J. Cryptogr. Eng.},
  volume       = {14},
  number       = {2},
  pages        = {223--240},
  year         = {2024},
  url          = {https://doi.org/10.1007/s13389-023-00339-9},
  doi          = {10.1007/S13389-023-00339-9},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/CarletDGT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/ShaoZLCGY24,
  author       = {Cuiping Shao and
                  Dongyan Zhao and
                  Huiyun Li and
                  Song Cheng and
                  Shunxian Gao and
                  Liuqing Yang},
  title        = {Detection of security vulnerabilities in cryptographic ICs against
                  fault injection attacks based on compressed sensing and basis pursuit},
  journal      = {J. Cryptogr. Eng.},
  volume       = {14},
  number       = {1},
  pages        = {57--70},
  year         = {2024},
  url          = {https://doi.org/10.1007/s13389-023-00324-2},
  doi          = {10.1007/S13389-023-00324-2},
  timestamp    = {Mon, 13 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/ShaoZLCGY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcgs/AgarwalX24,
  author       = {Medha Agarwal and
                  Jason Xu},
  title        = {Quasi-Newton Acceleration of {EM} and {MM} Algorithms via Broyden's
                  Method},
  journal      = {J. Comput. Graph. Stat.},
  volume       = {33},
  number       = {2},
  pages        = {393--406},
  year         = {2024},
  url          = {https://doi.org/10.1080/10618600.2023.2257261},
  doi          = {10.1080/10618600.2023.2257261},
  timestamp    = {Thu, 11 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcgs/AgarwalX24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcisd/BarbosaEALAVFMTHL24,
  author       = {Henrique Barbosa and
                  Gabriel Zarzana Espinoza and
                  Maiara Amaral and
                  Erica Valadares de Castro Levatti and
                  Mariana Babberg Abiuzi and
                  Gabriel Corr{\^{e}}a Ver{\'{\i}}ssimo and
                  Philipe de Oliveira Fernandes and
                  Vinicius Gon{\c{c}}alves Maltarollo and
                  Andre Gustavo Tempone and
                  K{\'{a}}thia Maria Hon{\'{o}}rio and
                  Jo{\~{a}}o Henrique Ghilardi Lago},
  title        = {Andrographolide: {A} Diterpenoid from \emph{Cymbopogon schoenanthus}
                  Identified as a New Hit Compound against \emph{Trypanosoma cruzi}
                  Using Machine Learning and Experimental Approaches},
  journal      = {J. Chem. Inf. Model.},
  volume       = {64},
  number       = {7},
  pages        = {2565--2576},
  year         = {2024},
  url          = {https://doi.org/10.1021/acs.jcim.3c01410},
  doi          = {10.1021/ACS.JCIM.3C01410},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcisd/BarbosaEALAVFMTHL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcisd/FernandesDJSSMCVVOPOSABMAOKM24,
  author       = {Philipe Oliveira Fernandes and
                  Anna Let{\'{\i}}cia Teotonio Dias and
                  Valtair Severino dos Santos J{\'{u}}nior and
                  Mateus S{\'{a}} Magalh{\~{a}}es Serafim and
                  Yamara Viana Sousa and
                  Gustavo Claro Monteiro and
                  Isabel Duarte Coutinho and
                  Marilia Valli and
                  Marina Mol Sena Andrade Verzola and
                  Flaviano Melo Ottoni and
                  Rodrigo Maia de P{\'{a}}dua and
                  Fernando Bombarda Oda and
                  Andr{\'{e}} Gustavo dos Santos and
                  Adriano Defini Andricopulo and
                  Vanderlan da Silva Bolzani and
                  Bruno Eduardo Fernandes Mota and
                  Ricardo Jos{\'{e}} Alves and
                  Renata Barbosa de Oliveira and
                  Thales Kronenberger and
                  Vinicius Gon{\c{c}}alves Maltarollo},
  title        = {Machine Learning-Based Virtual Screening of Antibacterial Agents against
                  Methicillin-Susceptible and Resistant \emph{Staphylococcus aureus}},
  journal      = {J. Chem. Inf. Model.},
  volume       = {64},
  number       = {6},
  pages        = {1932--1944},
  year         = {2024},
  url          = {https://doi.org/10.1021/acs.jcim.4c00087},
  doi          = {10.1021/ACS.JCIM.4C00087},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcisd/FernandesDJSSMCVVOPOSABMAOKM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcisd/VelasquezLopezRAD24,
  author       = {Yendrek Vel{\'{a}}squez{-}L{\'{o}}pez and
                  Andrea Ruiz{-}Escudero and
                  Sonia Arrasate and
                  Humberto Gonz{\'{a}}lez D{\'{\i}}az},
  title        = {Implementation of {IFPTML} Computational Models in Drug Discovery
                  Against Flaviviridae Family},
  journal      = {J. Chem. Inf. Model.},
  volume       = {64},
  number       = {6},
  pages        = {1841--1852},
  year         = {2024},
  url          = {https://doi.org/10.1021/acs.jcim.3c01796},
  doi          = {10.1021/ACS.JCIM.3C01796},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcisd/VelasquezLopezRAD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcisd/XuGZCNYMZLGLJCZZW24,
  author       = {Tingjun Xu and
                  Wenxing Gao and
                  Lixin Zhu and
                  Wanning Chen and
                  Chaoqun Niu and
                  Wenjing Yin and
                  Liangxiao Ma and
                  Xinyue Zhu and
                  Yunchao Ling and
                  Sheng Gao and
                  Lei Liu and
                  Na Jiao and
                  Weiming Chen and
                  Guoqing Zhang and
                  Ruixin Zhu and
                  Dingfeng Wu},
  title        = {NAFLDkb: {A} Knowledge Base and Platform for Drug Development against
                  Nonalcoholic Fatty Liver Disease},
  journal      = {J. Chem. Inf. Model.},
  volume       = {64},
  number       = {7},
  pages        = {2817--2828},
  year         = {2024},
  url          = {https://doi.org/10.1021/acs.jcim.3c00395},
  doi          = {10.1021/ACS.JCIM.3C00395},
  timestamp    = {Fri, 09 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcisd/XuGZCNYMZLGLJCZZW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcisd/ZdybelSKSCMGP24,
  author       = {Szymon Zdybel and
                  Anita Sosnowska and
                  Dominika Kowalska and
                  Julia Sommer and
                  Beate Conrady and
                  Patrick Mester and
                  Maciej Gromelski and
                  Tomasz Puzyn},
  title        = {Hybrid Machine Learning and Experimental Studies of Antiviral Potential
                  of Ionic Liquids against P100, MS2, and Phi6},
  journal      = {J. Chem. Inf. Model.},
  volume       = {64},
  number       = {6},
  pages        = {1996--2007},
  year         = {2024},
  url          = {https://doi.org/10.1021/acs.jcim.3c02037},
  doi          = {10.1021/ACS.JCIM.3C02037},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcisd/ZdybelSKSCMGP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcise/YuHZ24,
  author       = {Haiyan Yu and
                  Yuanjun He and
                  Wenjun Zhang},
  title        = {A Novel Approach to Line Clipping Against a Rectangular Window},
  journal      = {J. Comput. Inf. Sci. Eng.},
  volume       = {24},
  number       = {2},
  year         = {2024},
  url          = {https://doi.org/10.1115/1.4062634},
  doi          = {10.1115/1.4062634},
  timestamp    = {Thu, 07 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcise/YuHZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcloudc/AlahmadA24,
  author       = {Yanal Alahmad and
                  Anjali Agarwal},
  title        = {Multiple objectives dynamic {VM} placement for application service
                  availability in cloud networks},
  journal      = {J. Cloud Comput.},
  volume       = {13},
  number       = {1},
  pages        = {46},
  year         = {2024},
  url          = {https://doi.org/10.1186/s13677-024-00610-2},
  doi          = {10.1186/S13677-024-00610-2},
  timestamp    = {Sun, 25 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcloudc/AlahmadA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcondec/WangLWWS24,
  author       = {Guanqi Wang and
                  Feng Li and
                  Yan Wang and
                  Jing Wang and
                  Hao Shen},
  title        = {Fuzzy-model-based {\(\mathscr{H}\)} \({}_{\mbox{{\(\infty\)}}}\) filtering
                  for discrete-time singular Markov jump nonlinear systems against hybrid
                  attacks},
  journal      = {J. Control. Decis.},
  volume       = {11},
  number       = {2},
  pages        = {233--244},
  year         = {2024},
  url          = {https://doi.org/10.1080/23307706.2022.2161428},
  doi          = {10.1080/23307706.2022.2161428},
  timestamp    = {Sun, 21 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcondec/WangLWWS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcphy/AgarwalB24,
  author       = {Shivang Agarwal and
                  Amartya S. Banerjee},
  title        = {Solution of the Schr{\"{o}}dinger equation for quasi-one-dimensional
                  materials using helical waves},
  journal      = {J. Comput. Phys.},
  volume       = {496},
  pages        = {112551},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.jcp.2023.112551},
  doi          = {10.1016/J.JCP.2023.112551},
  timestamp    = {Fri, 08 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcphy/AgarwalB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcphy/AgarwalB24a,
  author       = {Dhwanit Agarwal and
                  George Biros},
  title        = {Numerical simulation of an extensible capsule using regularized Stokes
                  kernels and overset finite differences},
  journal      = {J. Comput. Phys.},
  volume       = {509},
  pages        = {113042},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.jcp.2024.113042},
  doi          = {10.1016/J.JCP.2024.113042},
  timestamp    = {Fri, 09 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcphy/AgarwalB24a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/ZhangZX24,
  author       = {Jianfeng Zhang and
                  Wensheng Zhang and
                  Jingdong Xu},
  title        = {StegEraser: Defending cybersecurity against malicious covert communications},
  journal      = {J. Comput. Secur.},
  volume       = {32},
  number       = {2},
  pages        = {117--139},
  year         = {2024},
  url          = {https://doi.org/10.3233/JCS-220094},
  doi          = {10.3233/JCS-220094},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/ZhangZX24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsc/MishraSA24,
  author       = {Abhishek Mishra and
                  Anil Singh and
                  Alpana Agarwal},
  title        = {Voltage Controlled Ring Oscillator with Phase Compensation Technique
                  for Jitter Reduction in 180 nm {CMOS} Technology},
  journal      = {J. Circuits Syst. Comput.},
  volume       = {33},
  number       = {8},
  year         = {2024},
  url          = {https://doi.org/10.1142/s0218126624501433},
  doi          = {10.1142/S0218126624501433},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsc/MishraSA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jd/ErdelezHA24,
  author       = {Sanda Erdelez and
                  Yuan{-}Ho Huang and
                  Naresh Kumar Agarwal},
  title        = {Does serendipity matter in knowledge management? Organizational sharing
                  and use of encountered information},
  journal      = {J. Documentation},
  volume       = {80},
  number       = {1},
  pages        = {1--26},
  year         = {2024},
  url          = {https://doi.org/10.1108/JD-10-2022-0211},
  doi          = {10.1108/JD-10-2022-0211},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jd/ErdelezHA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jei/ShenLCMYQ24,
  author       = {Xiong Shen and
                  Yiqin Lu and
                  Zhe Cheng and
                  Zhongshu Mao and
                  Zhang Yang and
                  Jiancheng Qin},
  title        = {Reconstructing images with attention generative adversarial network
                  against adversarial attacks},
  journal      = {J. Electronic Imaging},
  volume       = {33},
  number       = {3},
  year         = {2024},
  url          = {https://doi.org/10.1117/1.jei.33.3.033029},
  doi          = {10.1117/1.JEI.33.3.033029},
  timestamp    = {Fri, 09 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jei/ShenLCMYQ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jfi/ChenLZZLYL24,
  author       = {Cong Chen and
                  Xiao Liang and
                  Zhao Zhang and
                  Kai Zheng and
                  Dianyong Liu and
                  Changdong Yu and
                  Wei Li},
  title        = {Cooperative target allocation for air-sea heterogeneous unmanned vehicles
                  against saturation attacks},
  journal      = {J. Frankl. Inst.},
  volume       = {361},
  number       = {3},
  pages        = {1386--1402},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.jfranklin.2023.12.058},
  doi          = {10.1016/J.JFRANKLIN.2023.12.058},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jfi/ChenLZZLYL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jfi/GongZS24,
  author       = {Xin Gong and
                  Zhipeng Zhang and
                  Jun Shen},
  title        = {Data-driven leader-following consensus for nonlinear multi-agent systems
                  against composite attacks: {A} twins layer approach},
  journal      = {J. Frankl. Inst.},
  volume       = {361},
  number       = {14},
  pages        = {107067},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.jfranklin.2024.107067},
  doi          = {10.1016/J.JFRANKLIN.2024.107067},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jfi/GongZS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jfi/GuoYXL24,
  author       = {Mingkun Guo and
                  Feng Yang and
                  Guangqing Xia and
                  Kai Liu},
  title        = {Three-dimensional free-will arbitrary time cooperative guidance law
                  against moving target},
  journal      = {J. Frankl. Inst.},
  volume       = {361},
  number       = {14},
  pages        = {106969},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.jfranklin.2024.106969},
  doi          = {10.1016/J.JFRANKLIN.2024.106969},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jfi/GuoYXL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jfi/LiHG24,
  author       = {Mengqi Li and
                  Yanpeng Hu and
                  Jin Guo},
  title        = {State estimation for linear discrete-time systems with binary-valued
                  quantized innovations against data tampering attacks},
  journal      = {J. Frankl. Inst.},
  volume       = {361},
  number       = {8},
  pages        = {106817},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.jfranklin.2024.106817},
  doi          = {10.1016/J.JFRANKLIN.2024.106817},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jfi/LiHG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jfi/LiuWZCS24,
  author       = {Dan Liu and
                  Binrui Wang and
                  Kun Zhou and
                  Xiaohong Cui and
                  Kaibo Shi},
  title        = {Distributed event-triggered collaborative control for multiagent systems
                  against DoS attacks},
  journal      = {J. Frankl. Inst.},
  volume       = {361},
  number       = {11},
  pages        = {106959},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.jfranklin.2024.106959},
  doi          = {10.1016/J.JFRANKLIN.2024.106959},
  timestamp    = {Mon, 12 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jfi/LiuWZCS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jfi/LouLCSK24,
  author       = {Yuxin Lou and
                  Mengzhuo Luo and
                  Jun Cheng and
                  Kaibo Shi and
                  Iyad A. Katib},
  title        = {Improved asynchronous fault detection filter design for singular fuzzy
                  Markovian jump systems against multi-cyber-attacks},
  journal      = {J. Frankl. Inst.},
  volume       = {361},
  number       = {7},
  pages        = {106764},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.jfranklin.2024.106764},
  doi          = {10.1016/J.JFRANKLIN.2024.106764},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jfi/LouLCSK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jfi/PanYLTP24,
  author       = {Kunpeng Pan and
                  Feisheng Yang and
                  Yang Lyu and
                  Zheng Tan and
                  Quan Pan},
  title        = {Observer based attack detection and security control for UAVs against
                  attacks on desired trajectory},
  journal      = {J. Frankl. Inst.},
  volume       = {361},
  number       = {11},
  pages        = {106920},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.jfranklin.2024.106920},
  doi          = {10.1016/J.JFRANKLIN.2024.106920},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jfi/PanYLTP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jfi/PerodouCZ24,
  author       = {Arthur Perodou and
                  Christophe Combastel and
                  Ali Zolghadri},
  title        = {Critical-time metric for risk analysis against sharp input anomalies:
                  Computation and application case study},
  journal      = {J. Frankl. Inst.},
  volume       = {361},
  number       = {7},
  pages        = {106756},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.jfranklin.2024.106756},
  doi          = {10.1016/J.JFRANKLIN.2024.106756},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jfi/PerodouCZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jfi/TianZ24,
  author       = {Yongjie Tian and
                  Ning Zhao},
  title        = {Event-based adaptive secure asymptotic tracking control for nonlinear
                  cyber-physical systems against unknown deception attacks},
  journal      = {J. Frankl. Inst.},
  volume       = {361},
  number       = {7},
  pages        = {106766},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.jfranklin.2024.106766},
  doi          = {10.1016/J.JFRANKLIN.2024.106766},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jfi/TianZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jfi/WangXSMAM24,
  author       = {Chunlian Wang and
                  Fangzheng Xue and
                  Xiaojie Su and
                  Xiaoyu Ma and
                  Wengang Ao and
                  Luis I. Minchala},
  title        = {Dynamic event-triggered asynchronous filtering of Markovian jump systems
                  against cyber-attacks},
  journal      = {J. Frankl. Inst.},
  volume       = {361},
  number       = {3},
  pages        = {1268--1283},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.jfranklin.2023.12.007},
  doi          = {10.1016/J.JFRANKLIN.2023.12.007},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jfi/WangXSMAM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jfi/WuL24,
  author       = {Han{-}Yu Wu and
                  Qingshan Liu},
  title        = {Event-triggered secure consensus for second-order nonlinear multiagent
                  systems against asynchronous DoS attacks},
  journal      = {J. Frankl. Inst.},
  volume       = {361},
  number       = {14},
  pages        = {107065},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.jfranklin.2024.107065},
  doi          = {10.1016/J.JFRANKLIN.2024.107065},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jfi/WuL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jfi/WuWCYH24,
  author       = {Di Wu and
                  Yi Wang and
                  Peng Cheng and
                  Hu Ye and
                  Shuping He},
  title        = {Enhancing security control in Markov jump networked systems against
                  DoS attacks: {A} dynamic-memory based event-triggered mechanism},
  journal      = {J. Frankl. Inst.},
  volume       = {361},
  number       = {5},
  pages        = {106688},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.jfranklin.2024.106688},
  doi          = {10.1016/J.JFRANKLIN.2024.106688},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jfi/WuWCYH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jfi/ZhouCP24,
  author       = {Youmei Zhou and
                  Xiao{-}Heng Chang and
                  Ju H. Park},
  title        = {Quantized filtering for switched memristive neural networks against
                  deception attacks},
  journal      = {J. Frankl. Inst.},
  volume       = {361},
  number       = {10},
  pages        = {106883},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.jfranklin.2024.106883},
  doi          = {10.1016/J.JFRANKLIN.2024.106883},
  timestamp    = {Mon, 12 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jfi/ZhouCP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jifs/RahimDKGAK24,
  author       = {Muhammad Rahim and
                  Elsayed M. Tag El Din and
                  Salma Khan and
                  Nivin A. Ghamry and
                  Agaeb Mahal Alanzi and
                  Hamiden Abd El{-}Wahed Khalifa},
  title        = {Multi-criteria group decision-making based on dombi aggregation operators
                  under p, q-quasirung orthopair fuzzy sets},
  journal      = {J. Intell. Fuzzy Syst.},
  volume       = {46},
  number       = {1},
  pages        = {53--74},
  year         = {2024},
  url          = {https://doi.org/10.3233/jifs-233327},
  doi          = {10.3233/JIFS-233327},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jifs/RahimDKGAK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jiii/BanerjeeJKAR24,
  author       = {Shantanu Banerjee and
                  Naveen G. Jesubalan and
                  Amey Kulkarni and
                  Anshul Agarwal and
                  Anurag S. Rathore},
  title        = {Developing cyber-physical system and digital twin for smart manufacturing:
                  Methodology and case study of continuous clarification},
  journal      = {J. Ind. Inf. Integr.},
  volume       = {38},
  pages        = {100577},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.jii.2024.100577},
  doi          = {10.1016/J.JII.2024.100577},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jiii/BanerjeeJKAR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jim/HamraniAAM24,
  author       = {Abderrachid Hamrani and
                  Arvind Agarwal and
                  Amine Allouhi and
                  Dwayne McDaniel},
  title        = {Applying machine learning to wire arc additive manufacturing: a systematic
                  data-driven literature review},
  journal      = {J. Intell. Manuf.},
  volume       = {35},
  number       = {6},
  pages        = {2407--2439},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10845-023-02171-8},
  doi          = {10.1007/S10845-023-02171-8},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jim/HamraniAAM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jimaging/FizaineBPRBLV24,
  author       = {Florian C{\^{o}}me Fizaine and
                  Patrick Bard and
                  Michel Paindavoine and
                  C{\'{e}}cile Robin and
                  Edouard Bouy{\'{e}} and
                  Rapha{\"{e}}l Lef{\`{e}}vre and
                  Annie Vinter},
  title        = {Historical Text Line Segmentation Using Deep Learning Algorithms:
                  Mask-RCNN against U-Net Networks},
  journal      = {J. Imaging},
  volume       = {10},
  number       = {3},
  pages        = {65},
  year         = {2024},
  url          = {https://doi.org/10.3390/jimaging10030065},
  doi          = {10.3390/JIMAGING10030065},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jimaging/FizaineBPRBLV24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jirs/PanLYTP24,
  author       = {Kunpeng Pan and
                  Yang Lyu and
                  Feisheng Yang and
                  Zheng Tan and
                  Quan Pan},
  title        = {Attack Detection and Security Control for UAVs Against Attacks on
                  Desired Trajectory},
  journal      = {J. Intell. Robotic Syst.},
  volume       = {110},
  number       = {2},
  pages        = {68},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10846-024-02086-3},
  doi          = {10.1007/S10846-024-02086-3},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jirs/PanLYTP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jiteiip/MuskhirLWUFS24,
  author       = {Mukhlidi Muskhir and
                  Afdal Luthfi and
                  Ronal Watrianthos and
                  Usmeldi and
                  Aprilla Fortuna and
                  Agariadne Dwinggo Samala},
  title        = {Emerging Research on Virtual Reality Applications in Vocational Education:
                  {A} Bibliometric Analysis},
  journal      = {J. Inf. Technol. Educ. Innov. Pract.},
  volume       = {23},
  pages        = {5},
  year         = {2024},
  url          = {https://doi.org/10.28945/5284},
  doi          = {10.28945/5284},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jiteiip/MuskhirLWUFS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jksucis/YeY24,
  author       = {Jun Ye and
                  Zewen Yang},
  title        = {An {ECC} with error detection and against side channel attacks for
                  resource constrained devices},
  journal      = {J. King Saud Univ. Comput. Inf. Sci.},
  volume       = {36},
  number       = {4},
  pages        = {102019},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.jksuci.2024.102019},
  doi          = {10.1016/J.JKSUCI.2024.102019},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jksucis/YeY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jlap/SchneiderMG24,
  author       = {Sven Schneider and
                  Maria Maximova and
                  Holger Giese},
  title        = {Bounded model checking for interval probabilistic timed graph transformation
                  systems against properties of probabilistic metric temporal graph
                  logic},
  journal      = {J. Log. Algebraic Methods Program.},
  volume       = {137},
  pages        = {100938},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.jlamp.2023.100938},
  doi          = {10.1016/J.JLAMP.2023.100938},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jlap/SchneiderMG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmiv/LiWXA24,
  author       = {Xiaopan Li and
                  Shiqian Wu and
                  Shoulie Xie and
                  Sos S. Agaian},
  title        = {Dynamic-Clustering Extreme Intensity Prior Based Blind Image Deblurring},
  journal      = {J. Math. Imaging Vis.},
  volume       = {66},
  number       = {1},
  pages        = {22--36},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10851-023-01161-y},
  doi          = {10.1007/S10851-023-01161-Y},
  timestamp    = {Mon, 15 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmiv/LiWXA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/AgateFRD24,
  author       = {Vincenzo Agate and
                  Pierluca Ferraro and
                  Giuseppe Lo Re and
                  Sajal K. Das},
  title        = {{BLIND:} {A} privacy preserving truth discovery system for mobile
                  crowdsensing},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {223},
  pages        = {103811},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.jnca.2023.103811},
  doi          = {10.1016/J.JNCA.2023.103811},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/AgateFRD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/AlHawawrehAFH24,
  author       = {Muna Al{-}Hawawreh and
                  Mamoun Alazab and
                  Mohamed Amine Ferrag and
                  M. Shamim Hossain},
  title        = {Securing the Industrial Internet of Things against ransomware attacks:
                  {A} comprehensive analysis of the emerging threat landscape and detection
                  mechanisms},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {223},
  pages        = {103809},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.jnca.2023.103809},
  doi          = {10.1016/J.JNCA.2023.103809},
  timestamp    = {Fri, 12 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/AlHawawrehAFH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/HerranzOliverosMGTH24,
  author       = {David Herranz{-}Oliveros and
                  Ivan Mars{\'{a}}{-}Maestre and
                  Jos{\'{e}} Manuel Gim{\'{e}}nez{-}Guzm{\'{a}}n and
                  Marino Tejedor{-}Romero and
                  Enrique de la Hoz},
  title        = {Surgical immunization strategies against lateral movement in Active
                  Directory environments},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {222},
  pages        = {103810},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.jnca.2023.103810},
  doi          = {10.1016/J.JNCA.2023.103810},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/HerranzOliverosMGTH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/KumarA24,
  author       = {Anmol Kumar and
                  Mayank Agarwal},
  title        = {Quick service during DDoS attacks in the container-based cloud environment},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {229},
  pages        = {103946},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.jnca.2024.103946},
  doi          = {10.1016/J.JNCA.2024.103946},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/KumarA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/KitagawaN24,
  author       = {Fuyuki Kitagawa and
                  Ryo Nishimaki},
  title        = {Watermarking PRFs and {PKE} Against Quantum Adversaries},
  journal      = {J. Cryptol.},
  volume       = {37},
  number       = {3},
  pages        = {22},
  year         = {2024},
  url          = {https://doi.org/10.1007/s00145-024-09500-x},
  doi          = {10.1007/S00145-024-09500-X},
  timestamp    = {Wed, 08 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/KitagawaN24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocch/LiuA24,
  author       = {Shao Liu and
                  Sos S. Agaian},
  title        = {3DEmo: For Portrait Emotion Recognition with New Dataset},
  journal      = {{ACM} Journal on Computing and Cultural Heritage},
  volume       = {17},
  number       = {2},
  pages        = {17:1--17:26},
  year         = {2024},
  url          = {https://doi.org/10.1145/3631133},
  doi          = {10.1145/3631133},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jocch/LiuA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocec/AgarwalJJ24,
  author       = {Alka Agarwal and
                  Ashish Kumar Jha and
                  Jyoti Jagasia},
  title        = {{DIGITAL} {PAYMENT} {PLATFORMS} {AND} {SUBSISTENCE} {ENTREPRENEURS:}
                  {CHAMPIONING} {BEYOND} {THE} {PANDEMIC}},
  journal      = {J. Organ. Comput. Electron. Commer.},
  volume       = {34},
  number       = {2},
  pages        = {108--133},
  year         = {2024},
  url          = {https://doi.org/10.1080/10919392.2024.2316474},
  doi          = {10.1080/10919392.2024.2316474},
  timestamp    = {Sat, 13 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jocec/AgarwalJJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocss/Ferrara24,
  author       = {Emilio Ferrara},
  title        = {GenAI against humanity: nefarious applications of generative artificial
                  intelligence and large language models},
  journal      = {J. Comput. Soc. Sci.},
  volume       = {7},
  number       = {1},
  pages        = {549--569},
  year         = {2024},
  url          = {https://doi.org/10.1007/s42001-024-00250-1},
  doi          = {10.1007/S42001-024-00250-1},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jocss/Ferrara24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jodl/BhartiGAE24,
  author       = {Prabhat Kumar Bharti and
                  Tirthankar Ghosal and
                  Mayank Agarwal and
                  Asif Ekbal},
  title        = {PEERRec: An AI-based approach to automatically generate recommendations
                  and predict decisions in peer review},
  journal      = {Int. J. Digit. Libr.},
  volume       = {25},
  number       = {1},
  pages        = {55--72},
  year         = {2024},
  url          = {https://doi.org/10.1007/s00799-023-00375-0},
  doi          = {10.1007/S00799-023-00375-0},
  timestamp    = {Mon, 08 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jodl/BhartiGAE24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jossac/LiuPZ24,
  author       = {Zhen Liu and
                  Yanbin Pan and
                  Jinwei Zheng},
  title        = {Polynomial-Time Key-Recovery Attacks Against NTRUReEncrypt from ASIACCS'15},
  journal      = {J. Syst. Sci. Complex.},
  volume       = {37},
  number       = {3},
  pages        = {1308--1325},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11424-024-2426-7},
  doi          = {10.1007/S11424-024-2426-7},
  timestamp    = {Thu, 18 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jossac/LiuPZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jot/MaheBGLG24,
  author       = {Erwan Mahe and
                  Boutheina Bannour and
                  Christophe Gaston and
                  Arnault Lapitre and
                  Pascale Le Gall},
  title        = {Tooling Offline Runtime Verification against Interaction Models: recognizing
                  sliced behaviors using parameterized simulation},
  journal      = {J. Object Technol.},
  volume       = {23},
  number       = {2},
  pages        = {2},
  year         = {2024},
  url          = {https://doi.org/10.5381/jot.2024.23.2.a2},
  doi          = {10.5381/JOT.2024.23.2.A2},
  timestamp    = {Thu, 02 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jot/MaheBGLG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jota/HassaniAAEE24,
  author       = {Hossein Hassani and
                  Zakieh Avazzadeh and
                  Praveen Agarwal and
                  Mohammad Javad Ebadi and
                  Ali Bayati Eshkaftaki},
  title        = {Generalized Bernoulli-Laguerre Polynomials: Applications in Coupled
                  Nonlinear System of Variable-Order Fractional PDEs},
  journal      = {J. Optim. Theory Appl.},
  volume       = {200},
  number       = {1},
  pages        = {371--393},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10957-023-02346-6},
  doi          = {10.1007/S10957-023-02346-6},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jota/HassaniAAEE24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsa/GuoWYL24,
  author       = {Shasha Guo and
                  Lei Wang and
                  Zhijie Yang and
                  Yuliang Lu},
  title        = {A robust defense for spiking neural networks against adversarial examples
                  via input filtering},
  journal      = {J. Syst. Archit.},
  volume       = {153},
  pages        = {103209},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.sysarc.2024.103209},
  doi          = {10.1016/J.SYSARC.2024.103209},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsa/GuoWYL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsa/LiuHLS24,
  author       = {Xueyan Liu and
                  Li Juan Huan and
                  Wen Jing Li and
                  Ruirui Sun},
  title        = {An efficient multi-data owner cooperative resource sharing scheme
                  against key regeneration in edge computing},
  journal      = {J. Syst. Archit.},
  volume       = {146},
  pages        = {103032},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.sysarc.2023.103032},
  doi          = {10.1016/J.SYSARC.2023.103032},
  timestamp    = {Sun, 25 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsa/LiuHLS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsa/LiuJX24,
  author       = {Zhen Liu and
                  Changsong Jiang and
                  Chunxiang Xu},
  title        = {A portable blind cloud storage scheme against compromised servers},
  journal      = {J. Syst. Archit.},
  volume       = {146},
  pages        = {103037},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.sysarc.2023.103037},
  doi          = {10.1016/J.SYSARC.2023.103037},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsa/LiuJX24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsa/MosqueraEHKMJ24,
  author       = {Fernando Mosquera and
                  Ashen Ekanayake and
                  William Hua and
                  Krishna Kavi and
                  Gayatri Mehta and
                  Lizy Kurian John},
  title        = {SecurityCloak: Protection against cache timing and speculative memory
                  access attacks},
  journal      = {J. Syst. Archit.},
  volume       = {150},
  pages        = {103107},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.sysarc.2024.103107},
  doi          = {10.1016/J.SYSARC.2024.103107},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsa/MosqueraEHKMJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsa/WeiWYJY24,
  author       = {Xiaohui Wei and
                  Xiaonan Wang and
                  Yumin Yan and
                  Nan Jiang and
                  Hengshan Yue},
  title        = {{ALERT:} {A} lightweight defense mechanism for enhancing {DNN} robustness
                  against {T-BFA}},
  journal      = {J. Syst. Archit.},
  volume       = {152},
  pages        = {103160},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.sysarc.2024.103160},
  doi          = {10.1016/J.SYSARC.2024.103160},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsa/WeiWYJY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsa/WuLXZZ24,
  author       = {Axin Wu and
                  Fagen Li and
                  Xiangjun Xin and
                  Yinghui Zhang and
                  Jianhao Zhu},
  title        = {Efficient public-key searchable encryption against inside keyword
                  guessing attacks for cloud storage},
  journal      = {J. Syst. Archit.},
  volume       = {149},
  pages        = {103104},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.sysarc.2024.103104},
  doi          = {10.1016/J.SYSARC.2024.103104},
  timestamp    = {Wed, 07 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsa/WuLXZZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsa/YazdinejadDSKP24,
  author       = {Abbas Yazdinejad and
                  Ali Dehghantanha and
                  Gautam Srivastava and
                  Hadis Karimipour and
                  Reza M. Parizi},
  title        = {Hybrid Privacy Preserving Federated Learning Against Irregular Users
                  in Next-Generation Internet of Things},
  journal      = {J. Syst. Archit.},
  volume       = {148},
  pages        = {103088},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.sysarc.2024.103088},
  doi          = {10.1016/J.SYSARC.2024.103088},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsa/YazdinejadDSKP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/YuLGMK24,
  author       = {Yinbo Yu and
                  Jiajia Liu and
                  Hongzhi Guo and
                  Bomin Mao and
                  Nei Kato},
  title        = {A Spatiotemporal Backdoor Attack Against Behavior-Oriented Decision
                  Makers in Metaverse: From Perspective of Autonomous Driving},
  journal      = {{IEEE} J. Sel. Areas Commun.},
  volume       = {42},
  number       = {4},
  pages        = {948--962},
  year         = {2024},
  url          = {https://doi.org/10.1109/JSAC.2023.3345379},
  doi          = {10.1109/JSAC.2023.3345379},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsac/YuLGMK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/ZivariFardC24,
  author       = {Hassan ZivariFard and
                  R{\'{e}}mi A. Chou},
  title        = {Secure Source Coding Resilient Against Compromised Users via an Access
                  Structure},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {5},
  pages        = {478--492},
  year         = {2024},
  url          = {https://doi.org/10.1109/JSAIT.2024.3410235},
  doi          = {10.1109/JSAIT.2024.3410235},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsait/ZivariFardC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jssc/IesurumMPBB24,
  author       = {Agata Iesurum and
                  Davide Manente and
                  Fabio Padovan and
                  Matteo Bassi and
                  Andrea Bevilacqua},
  title        = {Analysis and Design of Coupled PLL-Based {CMOS} Quadrature VCOs},
  journal      = {{IEEE} J. Solid State Circuits},
  volume       = {59},
  number       = {1},
  pages        = {294--306},
  year         = {2024},
  url          = {https://doi.org/10.1109/JSSC.2023.3280360},
  doi          = {10.1109/JSSC.2023.3280360},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jssc/IesurumMPBB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jzusc/LiGXXHLZ24,
  author       = {Na Li and
                  Yuanyuan Gao and
                  Kui Xu and
                  Xiaochen Xia and
                  Huazhi Hu and
                  Yang Li and
                  Yueyue Zhang},
  title        = {Secure resource allocation against colluding eavesdropping in a user-centric
                  cell-free massive multiple-input multiple-output system},
  journal      = {Frontiers Inf. Technol. Electron. Eng.},
  volume       = {25},
  number       = {4},
  pages        = {500--512},
  year         = {2024},
  url          = {https://doi.org/10.1631/FITEE.2200599},
  doi          = {10.1631/FITEE.2200599},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jzusc/LiGXXHLZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jzusc/MaWLX24,
  author       = {Yajing Ma and
                  Yuan Wang and
                  Zhanjie Li and
                  Xiangpeng Xie},
  title        = {Event-triggered finite-time command-filtered tracking control for
                  nonlinear time-delay cyber physical systems against cyber attacks},
  journal      = {Frontiers Inf. Technol. Electron. Eng.},
  volume       = {25},
  number       = {2},
  pages        = {225--236},
  year         = {2024},
  url          = {https://doi.org/10.1631/FITEE.2300613},
  doi          = {10.1631/FITEE.2300613},
  timestamp    = {Tue, 02 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jzusc/MaWLX24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jzusc/ZhangWZF24,
  author       = {Wenbo Zhang and
                  Tao Wang and
                  Chaoyang Zhang and
                  Jingyu Feng},
  title        = {Securing multi-chain consensus against diverse miner behavior attacks
                  in blockchain networks},
  journal      = {Frontiers Inf. Technol. Electron. Eng.},
  volume       = {25},
  number       = {4},
  pages        = {540--554},
  year         = {2024},
  url          = {https://doi.org/10.1631/FITEE.2200505},
  doi          = {10.1631/FITEE.2200505},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jzusc/ZhangWZF24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/kais/AgarwalDA24,
  author       = {Gaurav Agarwal and
                  Shail Kumar Dinkar and
                  Ajay Agarwal},
  title        = {Binarized spiking neural networks optimized with Nomadic People Optimization-based
                  sentiment analysis for social product recommendation},
  journal      = {Knowl. Inf. Syst.},
  volume       = {66},
  number       = {2},
  pages        = {933--958},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10115-023-01956-w},
  doi          = {10.1007/S10115-023-01956-W},
  timestamp    = {Tue, 06 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/kais/AgarwalDA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/kais/AgarwalR24,
  author       = {Swathi Agarwal and
                  C. R. K. Reddy},
  title        = {A smart intelligent approach based on hybrid group search and pelican
                  optimization algorithm for data stream clustering},
  journal      = {Knowl. Inf. Syst.},
  volume       = {66},
  number       = {4},
  pages        = {2467--2500},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10115-023-02002-5},
  doi          = {10.1007/S10115-023-02002-5},
  timestamp    = {Sun, 14 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/kais/AgarwalR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/kais/AgarwalSA24,
  author       = {Neha Agarwal and
                  Geeta Sikka and
                  Lalit Kumar Awasthi},
  title        = {Integrating semantic similarity with Dirichlet multinomial mixture
                  model for enhanced web service clustering},
  journal      = {Knowl. Inf. Syst.},
  volume       = {66},
  number       = {4},
  pages        = {2327--2353},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10115-023-02034-x},
  doi          = {10.1007/S10115-023-02034-X},
  timestamp    = {Sun, 14 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/kais/AgarwalSA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/kbs/CaiWGL24,
  author       = {Hongyun Cai and
                  Jiahao Wang and
                  Lijing Gao and
                  Fengyu Li},
  title        = {FLMAAcBD: Defending against backdoors in Federated Learning via Model
                  Anomalous Activation Behavior Detection},
  journal      = {Knowl. Based Syst.},
  volume       = {289},
  pages        = {111511},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.knosys.2024.111511},
  doi          = {10.1016/J.KNOSYS.2024.111511},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/kbs/CaiWGL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/kbs/GaoZYZ24,
  author       = {Kun Gao and
                  Tianqing Zhu and
                  Dayong Ye and
                  Wanlei Zhou},
  title        = {Defending against gradient inversion attacks in federated learning
                  via statistical machine unlearning},
  journal      = {Knowl. Based Syst.},
  volume       = {299},
  pages        = {111983},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.knosys.2024.111983},
  doi          = {10.1016/J.KNOSYS.2024.111983},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/kbs/GaoZYZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/kbs/GuanZTZ24,
  author       = {Faqian Guan and
                  Tianqing Zhu and
                  Hanjin Tong and
                  Wanlei Zhou},
  title        = {A realistic model extraction attack against graph neural networks},
  journal      = {Knowl. Based Syst.},
  volume       = {300},
  pages        = {112144},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.knosys.2024.112144},
  doi          = {10.1016/J.KNOSYS.2024.112144},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/kbs/GuanZTZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/kbs/NguyenRNJNY24,
  author       = {Thanh Tam Nguyen and
                  Zhao Ren and
                  Thanh Thi Nguyen and
                  Jun Jo and
                  Quoc Viet Hung Nguyen and
                  Hongzhi Yin},
  title        = {Portable graph-based rumour detection against multi-modal heterophily},
  journal      = {Knowl. Based Syst.},
  volume       = {284},
  pages        = {111310},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.knosys.2023.111310},
  doi          = {10.1016/J.KNOSYS.2023.111310},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/kbs/NguyenRNJNY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/kbs/OsamaGSRF24,
  author       = {Alaa Osama and
                  Samar I. Gadallah and
                  Lobna A. Said and
                  Ahmed G. Radwan and
                  Mohammed E. Fouda},
  title        = {Chaotic neural network quantization and its robustness against adversarial
                  attacks},
  journal      = {Knowl. Based Syst.},
  volume       = {286},
  pages        = {111319},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.knosys.2023.111319},
  doi          = {10.1016/J.KNOSYS.2023.111319},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/kbs/OsamaGSRF24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/kbs/WangZX24,
  author       = {Yongkang Wang and
                  Di{-}Hua Zhai and
                  Yuanqing Xia},
  title        = {RoPE: Defending against backdoor attacks in federated learning systems},
  journal      = {Knowl. Based Syst.},
  volume       = {293},
  pages        = {111660},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.knosys.2024.111660},
  doi          = {10.1016/J.KNOSYS.2024.111660},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/kbs/WangZX24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/lalc/HolobutRS24,
  author       = {Agata Holobut and
                  Jan Rybicki and
                  Milosz Stelmach},
  title        = {A statistical approach to Hollywood remake and sequel metadata},
  journal      = {Digit. Scholarsh. Humanit.},
  volume       = {39},
  number       = {2},
  pages        = {556--574},
  year         = {2024},
  url          = {https://doi.org/10.1093/llc/fqae012},
  doi          = {10.1093/LLC/FQAE012},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/lalc/HolobutRS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/lgrs/LiuCLMG24,
  author       = {Zhenchang Liu and
                  Dongyang Cheng and
                  Ning Li and
                  Lin Min and
                  Zhengwei Guo},
  title        = {Two-Dimensional Precise Controllable Smart Jamming Against {SAR} via
                  Phase Errors Modulation of Transmitted Signal},
  journal      = {{IEEE} Geosci. Remote. Sens. Lett.},
  volume       = {21},
  pages        = {1--5},
  year         = {2024},
  url          = {https://doi.org/10.1109/LGRS.2023.3331581},
  doi          = {10.1109/LGRS.2023.3331581},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/lgrs/LiuCLMG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/lgrs/ZhouPXPLL24,
  author       = {Jie Zhou and
                  Bo Peng and
                  Jianyue Xie and
                  Bowen Peng and
                  Li Liu and
                  Xiang Li},
  title        = {Conditional Random Field-Based Adversarial Attack Against {SAR} Target
                  Detection},
  journal      = {{IEEE} Geosci. Remote. Sens. Lett.},
  volume       = {21},
  pages        = {1--5},
  year         = {2024},
  url          = {https://doi.org/10.1109/LGRS.2024.3365788},
  doi          = {10.1109/LGRS.2024.3365788},
  timestamp    = {Tue, 18 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/lgrs/ZhouPXPLL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/lp/PiekniewskaHHMBS24,
  author       = {Agata Piekniewska and
                  Laurel L. Haak and
                  Darla Henderson and
                  Katherine McNeill and
                  Anita E. Bandrowski and
                  Yvette Seger},
  title        = {Establishing an early indicator for data sharing and reuse},
  journal      = {Learn. Publ.},
  volume       = {37},
  number       = {1},
  pages        = {22--29},
  year         = {2024},
  url          = {https://doi.org/10.1002/leap.1586},
  doi          = {10.1002/LEAP.1586},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/lp/PiekniewskaHHMBS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/make/RivasOJDK24,
  author       = {Pablo Rivas and
                  Javier Orduz and
                  Tonni Das Jui and
                  Casimer M. DeCusatis and
                  Bikram Khanal},
  title        = {Quantum-Enhanced Representation Learning: {A} Quanvolutional Autoencoder
                  Approach against DDoS Threats},
  journal      = {Mach. Learn. Knowl. Extr.},
  volume       = {6},
  number       = {2},
  pages        = {944--964},
  year         = {2024},
  url          = {https://doi.org/10.3390/make6020044},
  doi          = {10.3390/MAKE6020044},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/make/RivasOJDK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mam/EsmaeilianB24,
  author       = {Maryam Esmaeilian and
                  Hakem Beitollahi},
  title        = {Experimental evaluation of {RISC-V} micro-architecture against fault
                  injection attack},
  journal      = {Microprocess. Microsystems},
  volume       = {104},
  pages        = {104991},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.micpro.2023.104991},
  doi          = {10.1016/J.MICPRO.2023.104991},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mam/EsmaeilianB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mansci/AgarwalAK24,
  author       = {Sumit Agarwal and
                  Meghana Ayyagari and
                  Ren{\'{a}}ta Kosov{\'{a}}},
  title        = {Minimum Wage Increases and Employer Performance: Role of Employer
                  Heterogeneity},
  journal      = {Manag. Sci.},
  volume       = {70},
  number       = {1},
  pages        = {225--254},
  year         = {2024},
  url          = {https://doi.org/10.1287/mnsc.2022.4650},
  doi          = {10.1287/MNSC.2022.4650},
  timestamp    = {Thu, 04 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mansci/AgarwalAK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mansci/AgarwalGRZ24,
  author       = {Sumit Agarwal and
                  Pulak Ghosh and
                  Tianyue Ruan and
                  Yunqi Zhang},
  title        = {Transient Customer Response to Data Breaches of Their Information},
  journal      = {Manag. Sci.},
  volume       = {70},
  number       = {6},
  pages        = {4105--4114},
  year         = {2024},
  url          = {https://doi.org/10.1287/mnsc.2021.01335},
  doi          = {10.1287/MNSC.2021.01335},
  timestamp    = {Thu, 04 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mansci/AgarwalGRZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mansci/AgarwalQYZ24,
  author       = {Sumit Agarwal and
                  Wenlan Qian and
                  Bernard Yeung and
                  Huanhuan Zheng},
  title        = {Taxing the Rich to Finance Redistribution: Evidence from a Permanent
                  Tax Increase in Singapore},
  journal      = {Manag. Sci.},
  volume       = {70},
  number       = {4},
  pages        = {2518--2548},
  year         = {2024},
  url          = {https://doi.org/10.1287/mnsc.2023.4823},
  doi          = {10.1287/MNSC.2023.4823},
  timestamp    = {Thu, 04 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mansci/AgarwalQYZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mansci/CanidioD24,
  author       = {Andrea Canidio and
                  Vincent Danos},
  title        = {Commitment Against Front-Running Attacks},
  journal      = {Manag. Sci.},
  volume       = {70},
  number       = {7},
  pages        = {4429--4440},
  year         = {2024},
  url          = {https://doi.org/10.1287/mnsc.2023.01239},
  doi          = {10.1287/MNSC.2023.01239},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mansci/CanidioD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mcs/AgathiyanGF24,
  author       = {A. Agathiyan and
                  A. Gowrisankar and
                  Nur Aisyah Abdul Fataf},
  title        = {On the integral transform of fractal interpolation functions},
  journal      = {Math. Comput. Simul.},
  volume       = {222},
  pages        = {209--224},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.matcom.2023.08.018},
  doi          = {10.1016/J.MATCOM.2023.08.018},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mcs/AgathiyanGF24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mcs/SelvarajKLSL24,
  author       = {Palanisamy Selvaraj and
                  Oh{-}Min Kwon and
                  Seung{-}Hoon Lee and
                  R. Sakthivel and
                  S. M. Lee},
  title        = {Event-triggered control design with varying gains for polynomial fuzzy
                  systems against DoS attacks},
  journal      = {Math. Comput. Simul.},
  volume       = {218},
  pages        = {1--14},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.matcom.2023.11.022},
  doi          = {10.1016/J.MATCOM.2023.11.022},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mcs/SelvarajKLSL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mcs/SriwastavBRAS24,
  author       = {Nikhil Sriwastav and
                  Amit K. Barnwal and
                  Higinio Ramos and
                  Ravi P. Agarwal and
                  Mehakpreet Singh},
  title        = {Advanced numerical scheme and its convergence analysis for a class
                  of two-point singular boundary value problems},
  journal      = {Math. Comput. Simul.},
  volume       = {216},
  pages        = {30--48},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.matcom.2023.08.037},
  doi          = {10.1016/J.MATCOM.2023.08.037},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mcs/SriwastavBRAS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mcs/TianZLZM24,
  author       = {Yongjie Tian and
                  Huiyan Zhang and
                  Yongchao Liu and
                  Ning Zhao and
                  Kalidass Mathiyalagan},
  title        = {Event-triggered adaptive secure tracking control for nonlinear cyber-physical
                  systems against unknown deception attacks},
  journal      = {Math. Comput. Simul.},
  volume       = {221},
  pages        = {79--93},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.matcom.2024.02.022},
  doi          = {10.1016/J.MATCOM.2024.02.022},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mcs/TianZLZM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ml/XueWHL24,
  author       = {Yunsheng Xue and
                  Mi Wen and
                  Wei He and
                  Weiwei Li},
  title        = {{DPG:} a model to build feature subspace against adversarial patch
                  attack},
  journal      = {Mach. Learn.},
  volume       = {113},
  number       = {8},
  pages        = {5601--5622},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10994-023-06417-7},
  doi          = {10.1007/S10994-023-06417-7},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ml/XueWHL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ml/YaoPLTY24,
  author       = {Yinghua Yao and
                  Yuangang Pan and
                  Jing Li and
                  Ivor W. Tsang and
                  Xin Yao},
  title        = {Sanitized clustering against confounding bias},
  journal      = {Mach. Learn.},
  volume       = {113},
  number       = {6},
  pages        = {3711--3730},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10994-023-06451-5},
  doi          = {10.1007/S10994-023-06451-5},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ml/YaoPLTY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mlc/WangSML24,
  author       = {Fan Wang and
                  Mingwen Shao and
                  Lingzhuang Meng and
                  Fukang Liu},
  title        = {Dual stage black-box adversarial attack against vision transformer},
  journal      = {Int. J. Mach. Learn. Cybern.},
  volume       = {15},
  number       = {8},
  pages        = {3367--3378},
  year         = {2024},
  url          = {https://doi.org/10.1007/s13042-024-02097-4},
  doi          = {10.1007/S13042-024-02097-4},
  timestamp    = {Mon, 15 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mlc/WangSML24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mlc/XieW24,
  author       = {Zongkui Xie and
                  Zhongqiang Wu},
  title        = {Event-triggered consensus control for {DC} microgrids based on {MKELM}
                  and state observer against false data injection attacks},
  journal      = {Int. J. Mach. Learn. Cybern.},
  volume       = {15},
  number       = {3},
  pages        = {775--793},
  year         = {2024},
  url          = {https://doi.org/10.1007/s13042-023-01938-y},
  doi          = {10.1007/S13042-023-01938-Y},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mlc/XieW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mlst/BanerjeeAKSBAPMH24,
  author       = {Pragyan Banerjee and
                  Shivam Milind Akarte and
                  Prakhar Kumar and
                  Muhammad Shamsuzzaman and
                  Ankit Butola and
                  Krishna Agarwal and
                  Dilip K. Prasad and
                  Frank Melands{\o} and
                  Anowarul Habib},
  title        = {High-resolution imaging in acoustic microscopy using deep learning},
  journal      = {Mach. Learn. Sci. Technol.},
  volume       = {5},
  number       = {1},
  pages        = {15007},
  year         = {2024},
  url          = {https://doi.org/10.1088/2632-2153/ad1c30},
  doi          = {10.1088/2632-2153/AD1C30},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mlst/BanerjeeAKSBAPMH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mms/IqbalSIAAS24,
  author       = {Aga Basit Iqbal and
                  Idris Afzal Shah and
                  Injila and
                  Assif Assad and
                  Mushtaq Ahmed and
                  Syed Zubair Shah},
  title        = {A review of deep learning algorithms for modeling drug interactions},
  journal      = {Multim. Syst.},
  volume       = {30},
  number       = {3},
  pages        = {124},
  year         = {2024},
  url          = {https://doi.org/10.1007/s00530-024-01325-9},
  doi          = {10.1007/S00530-024-01325-9},
  timestamp    = {Thu, 23 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mms/IqbalSIAAS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/AgarwalB24,
  author       = {Chandni Agarwal and
                  Charul Bhatnagar},
  title        = {Unmasking the potential: evaluating image inpainting techniques for
                  masked face reconstruction},
  journal      = {Multim. Tools Appl.},
  volume       = {83},
  number       = {1},
  pages        = {893--918},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11042-023-15807-x},
  doi          = {10.1007/S11042-023-15807-X},
  timestamp    = {Wed, 24 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mta/AgarwalB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/AgarwalGV24,
  author       = {Archana Agarwal and
                  Shailender Gupta and
                  Munish Vashishath},
  title        = {Contrast enhancement of underwater images using conditional generative
                  adversarial network},
  journal      = {Multim. Tools Appl.},
  volume       = {83},
  number       = {14},
  pages        = {41375--41404},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11042-023-17158-z},
  doi          = {10.1007/S11042-023-17158-Z},
  timestamp    = {Sun, 14 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/AgarwalGV24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/AgarwalJ24,
  author       = {Saurabh Agarwal and
                  Ki{-}Hyun Jung},
  title        = {Forensic analysis and detection using polycolor model binary pattern
                  for colorized images},
  journal      = {Multim. Tools Appl.},
  volume       = {83},
  number       = {14},
  pages        = {41683--41702},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11042-023-16675-1},
  doi          = {10.1007/S11042-023-16675-1},
  timestamp    = {Sun, 14 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/AgarwalJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/AgarwalJ24a,
  author       = {Saurabh Agarwal and
                  Ki{-}Hyun Jung},
  title        = {Image operator forensics and sequence estimation using robust deep
                  neural network},
  journal      = {Multim. Tools Appl.},
  volume       = {83},
  number       = {16},
  pages        = {47431--47454},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11042-023-17389-0},
  doi          = {10.1007/S11042-023-17389-0},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/AgarwalJ24a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/AgarwalJNKY24,
  author       = {Riya Agarwal and
                  Shaifali Jindal and
                  Shradha Narain and
                  Rishabh Kaushal and
                  Kalpana Yadav},
  title        = {A novel framework for fine-grained spatio-temporal change detection
                  in satellite images},
  journal      = {Multim. Tools Appl.},
  volume       = {83},
  number       = {1},
  pages        = {1241--1260},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11042-023-14705-6},
  doi          = {10.1007/S11042-023-14705-6},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mta/AgarwalJNKY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/AgarwalK24,
  author       = {Prabhakar Agarwal and
                  Sandeep Kumar},
  title        = {EEG-based imagined words classification using Hilbert transform and
                  deep networks},
  journal      = {Multim. Tools Appl.},
  volume       = {83},
  number       = {1},
  pages        = {2725--2748},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11042-023-15664-8},
  doi          = {10.1007/S11042-023-15664-8},
  timestamp    = {Wed, 24 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mta/AgarwalK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/AgarwalK24a,
  author       = {Varun Agarwal and
                  Dhirendra Kumar},
  title        = {Secure chaotic image encryption method using random graph traversal
                  and three step diffusion},
  journal      = {Multim. Tools Appl.},
  volume       = {83},
  number       = {16},
  pages        = {46799--46824},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11042-023-17418-y},
  doi          = {10.1007/S11042-023-17418-Y},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/AgarwalK24a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/AgarwalKG24,
  author       = {Swati Agarwal and
                  Ashrut Kumar and
                  Rijul Ganguly},
  title        = {Investigating transformer-based models for automated e-governance
                  in Indian Railway using Twitter},
  journal      = {Multim. Tools Appl.},
  volume       = {83},
  number       = {2},
  pages        = {4551--4577},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11042-023-15331-y},
  doi          = {10.1007/S11042-023-15331-Y},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mta/AgarwalKG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/AgarwalM24,
  author       = {Sakshi Agarwal and
                  Shikha Mehta},
  title        = {{GNPA:} a hybrid model for social influence maximization in dynamic
                  networks},
  journal      = {Multim. Tools Appl.},
  volume       = {83},
  number       = {1},
  pages        = {3057--3084},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11042-021-11606-4},
  doi          = {10.1007/S11042-021-11606-4},
  timestamp    = {Wed, 24 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mta/AgarwalM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/AgarwalMD24,
  author       = {Charu Agarwal and
                  Anurag Mishra and
                  Gaurav Dubey},
  title        = {A novel gray-scale image watermarking framework using harmony search
                  algorithm optimization of multiple scaling factors},
  journal      = {Multim. Tools Appl.},
  volume       = {83},
  number       = {8},
  pages        = {21801--21822},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11042-023-15533-4},
  doi          = {10.1007/S11042-023-15533-4},
  timestamp    = {Fri, 01 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mta/AgarwalMD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/AgarwalMD24a,
  author       = {Charu Agarwal and
                  Anurag Mishra and
                  Gaurav Dubey},
  title        = {Correction: {A} novel gray-scale image watermarking framework using
                  harmony search algorithm optimization of multiple scaling factors},
  journal      = {Multim. Tools Appl.},
  volume       = {83},
  number       = {8},
  pages        = {21823},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11042-024-18292-y},
  doi          = {10.1007/S11042-024-18292-Y},
  timestamp    = {Fri, 01 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mta/AgarwalMD24a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/AgarwalPU24,
  author       = {Yatin Kumar Agarwal and
                  Dilkeshwar Pandey and
                  Lokendra Singh Umrao},
  title        = {Hybrid query refinement based approach for enhanced biomedical image
                  retrieval},
  journal      = {Multim. Tools Appl.},
  volume       = {83},
  number       = {16},
  pages        = {49515--49536},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11042-023-17469-1},
  doi          = {10.1007/S11042-023-17469-1},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/AgarwalPU24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/AgarwalRCACG24,
  author       = {Snigdha Agarwal and
                  Adarsh Raj and
                  Anjan Chowdhury and
                  Geetanjali Aich and
                  Rajdeep Chatterjee and
                  Kuntal Ghosh},
  title        = {Investigating the impact of standard brain atlases and connectivity
                  measures on the accuracy of {ADHD} detection from fMRI data using
                  deep learning},
  journal      = {Multim. Tools Appl.},
  volume       = {83},
  number       = {25},
  pages        = {67023--67057},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11042-023-17962-7},
  doi          = {10.1007/S11042-023-17962-7},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/AgarwalRCACG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/AgarwalRPSK24,
  author       = {Isha Y. Agarwal and
                  Dipti P. Rana and
                  Kalp Panwala and
                  Raj Shah and
                  Viren Kathiriya},
  title        = {Analysis of contextual features' granularity for fake news detection},
  journal      = {Multim. Tools Appl.},
  volume       = {83},
  number       = {17},
  pages        = {51835--51851},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11042-023-17465-5},
  doi          = {10.1007/S11042-023-17465-5},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/AgarwalRPSK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/AgarwalSSM24,
  author       = {Divya Agarwal and
                  Vijay Singh and
                  Ashwini Kumar Singh and
                  Parul Madan},
  title        = {Stacked ensemble model for analyzing mental health disorder from social
                  media data},
  journal      = {Multim. Tools Appl.},
  volume       = {83},
  number       = {18},
  pages        = {53923--53948},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11042-023-17395-2},
  doi          = {10.1007/S11042-023-17395-2},
  timestamp    = {Mon, 20 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/AgarwalSSM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/AgarwalV24,
  author       = {Lakshita Agarwal and
                  Bindu Verma},
  title        = {From methods to datasets: {A} survey on Image-Caption Generators},
  journal      = {Multim. Tools Appl.},
  volume       = {83},
  number       = {9},
  pages        = {28077--28123},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11042-023-16560-x},
  doi          = {10.1007/S11042-023-16560-X},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mta/AgarwalV24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/ChakravertiAPCCK24,
  author       = {Sugandha Chakraverti and
                  Pankaj Agarwal and
                  Himansu Sekhar Pattanayak and
                  Sanjay Pratap Singh Chauhan and
                  Ashish Kumar Chakraverti and
                  Manoj Kumar},
  title        = {De-noising the image using {DBST-LCM-CLAHE:} {A} deep learning approach},
  journal      = {Multim. Tools Appl.},
  volume       = {83},
  number       = {4},
  pages        = {11017--11042},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11042-023-16016-2},
  doi          = {10.1007/S11042-023-16016-2},
  timestamp    = {Fri, 08 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mta/ChakravertiAPCCK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/FahimullahAAT24,
  author       = {Muhammad Fahimullah and
                  Shohreh Ahvar and
                  Mihir Agarwal and
                  Maria Trocan},
  title        = {Machine learning-based solutions for resource management in fog computing},
  journal      = {Multim. Tools Appl.},
  volume       = {83},
  number       = {8},
  pages        = {23019--23045},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11042-023-16399-2},
  doi          = {10.1007/S11042-023-16399-2},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mta/FahimullahAAT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/FernandezN24,
  author       = {Jincy J. Fernandez and
                  P. Nithyanandam},
  title        = {Protection of online images against theft using robust multimodal
                  biometric watermarking and T-norms},
  journal      = {Multim. Tools Appl.},
  volume       = {83},
  number       = {17},
  pages        = {52405--52431},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11042-023-17497-x},
  doi          = {10.1007/S11042-023-17497-X},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/FernandezN24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/GuptaAAP24,
  author       = {Sachi Gupta and
                  Gaurav Agarwal and
                  Shivani Agarwal and
                  Dilkeshwar Pandey},
  title        = {Depression detection using cascaded attention based deep learning
                  framework using speech data},
  journal      = {Multim. Tools Appl.},
  volume       = {83},
  number       = {25},
  pages        = {66135--66173},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11042-023-18076-w},
  doi          = {10.1007/S11042-023-18076-W},
  timestamp    = {Tue, 23 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/GuptaAAP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/HamidaHSJJ24,
  author       = {Sameh Ben Hamida and
                  Sana Ben Hamida and
                  Ahmed Snoun and
                  Olfa Jemai and
                  Abderrazek Jemai},
  title        = {The influence of dropout and residual connection against membership
                  inference attacks on transformer model: a neuro generative disease
                  case study},
  journal      = {Multim. Tools Appl.},
  volume       = {83},
  number       = {6},
  pages        = {16231--16253},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11042-023-16126-x},
  doi          = {10.1007/S11042-023-16126-X},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mta/HamidaHSJJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/HamidaMCJ24,
  author       = {Sana Ben Hamida and
                  Hichem Mrabet and
                  Faten Chaieb and
                  Abderrazak Jemai},
  title        = {Assessment of data augmentation, dropout with {L2} Regularization
                  and differential privacy against membership inference attacks},
  journal      = {Multim. Tools Appl.},
  volume       = {83},
  number       = {15},
  pages        = {44455--44484},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11042-023-17394-3},
  doi          = {10.1007/S11042-023-17394-3},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/HamidaMCJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/JoshiRAAS24,
  author       = {Nisarg S. Joshi and
                  Raghav Raghuwanshi and
                  Yash M. Agarwal and
                  B. Annappa and
                  D. N. Sachin},
  title        = {{ARIMA-PID:} container auto scaling based on predictive analysis and
                  control theory},
  journal      = {Multim. Tools Appl.},
  volume       = {83},
  number       = {9},
  pages        = {26369--26386},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11042-023-16587-0},
  doi          = {10.1007/S11042-023-16587-0},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/JoshiRAAS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/Kwon24,
  author       = {Hyun Kwon},
  title        = {AudioGuard: Speech Recognition System Robust against Optimized Audio
                  Adversarial Examples},
  journal      = {Multim. Tools Appl.},
  volume       = {83},
  number       = {20},
  pages        = {57943--57962},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11042-023-15961-2},
  doi          = {10.1007/S11042-023-15961-2},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/Kwon24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/LiZC24,
  author       = {Jiarui Li and
                  Li Zhou and
                  Jie Chen},
  title        = {MobileFaceFormer: a lightweight face recognition model against face
                  variations},
  journal      = {Multim. Tools Appl.},
  volume       = {83},
  number       = {5},
  pages        = {12669--12685},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11042-023-15954-1},
  doi          = {10.1007/S11042-023-15954-1},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mta/LiZC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/MehtaKA24,
  author       = {Shikha Mehta and
                  Parmeet Kaur and
                  Parul Agarwal},
  title        = {Improved whale optimization variants for SLA-compliant placement of
                  virtual machines in cloud data centers},
  journal      = {Multim. Tools Appl.},
  volume       = {83},
  number       = {1},
  pages        = {149--171},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11042-023-15528-1},
  doi          = {10.1007/S11042-023-15528-1},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mta/MehtaKA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/MengJZLS24,
  author       = {Laijin Meng and
                  Xinghao Jiang and
                  Zhenzhen Zhang and
                  Zhaohong Li and
                  Tanfeng Sun},
  title        = {A robust coverless video steganography based on maximum {DC} coefficients
                  against video attacks},
  journal      = {Multim. Tools Appl.},
  volume       = {83},
  number       = {5},
  pages        = {13427--13461},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11042-023-15697-z},
  doi          = {10.1007/S11042-023-15697-Z},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mta/MengJZLS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/PalKA24,
  author       = {Puneet Kumar Pal and
                  Dhirendra Kumar and
                  Varun Agarwal},
  title        = {Efficient image encryption using the Tinkerbell map in conjunction
                  with linear feedback shift registers},
  journal      = {Multim. Tools Appl.},
  volume       = {83},
  number       = {15},
  pages        = {44903--44932},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11042-023-17236-2},
  doi          = {10.1007/S11042-023-17236-2},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/PalKA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/QuasarSMSAD24,
  author       = {Syeda Reeha Quasar and
                  Rishika Sharma and
                  Aayushi Mittal and
                  Moolchand Sharma and
                  Deevyankar Agarwal and
                  Isabel de la Torre D{\'{\i}}ez},
  title        = {Ensemble methods for computed tomography scan images to improve lung
                  cancer detection and classification},
  journal      = {Multim. Tools Appl.},
  volume       = {83},
  number       = {17},
  pages        = {52867--52897},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11042-023-17616-8},
  doi          = {10.1007/S11042-023-17616-8},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/QuasarSMSAD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/RaiAGA24,
  author       = {Atul Kumar Rai and
                  Shivani Agarwal and
                  Sachi Gupta and
                  Gaurav Agarwal},
  title        = {An effective fuzzy based segmentation and twin attention based convolutional
                  gated recurrent network for skin cancer detection},
  journal      = {Multim. Tools Appl.},
  volume       = {83},
  number       = {17},
  pages        = {52113--52140},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11042-023-17538-5},
  doi          = {10.1007/S11042-023-17538-5},
  timestamp    = {Thu, 23 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/RaiAGA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/RezaimehrD24,
  author       = {Fatemeh Rezaimehr and
                  Chitra Dadkhah},
  title        = {T{\&}TRS: robust collaborative filtering recommender systems against
                  attacks},
  journal      = {Multim. Tools Appl.},
  volume       = {83},
  number       = {11},
  pages        = {31701--31731},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11042-023-16641-x},
  doi          = {10.1007/S11042-023-16641-X},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/RezaimehrD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/SaraswatSKA24,
  author       = {Shipra Saraswat and
                  Pooja Singh and
                  Manoj Kumar and
                  Jyoti Agarwal},
  title        = {Advanced detection of fungi-bacterial diseases in plants using modified
                  deep neural network and {DSURF}},
  journal      = {Multim. Tools Appl.},
  volume       = {83},
  number       = {6},
  pages        = {16711--16733},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11042-023-16281-1},
  doi          = {10.1007/S11042-023-16281-1},
  timestamp    = {Sat, 27 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/SaraswatSKA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/SinghPAASP24,
  author       = {Kavinder Singh and
                  Ashutosh Pandey and
                  Akshat Agarwal and
                  Mohit Kumar Agarwal and
                  Aditya Shankar and
                  Anil Singh Parihar},
  title        = {{FRN:} Fusion and recalibration network for low-light image enhancement},
  journal      = {Multim. Tools Appl.},
  volume       = {83},
  number       = {4},
  pages        = {12235--12252},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11042-023-15908-7},
  doi          = {10.1007/S11042-023-15908-7},
  timestamp    = {Wed, 24 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mta/SinghPAASP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/SinghSA24,
  author       = {Prabhdeep Singh and
                  Pawan Singh and
                  Abhay Kumar Agarwal},
  title        = {Improved encryption and obfuscation process of lightweight secured
                  auditable cloud storage with data dynamics},
  journal      = {Multim. Tools Appl.},
  volume       = {83},
  number       = {13},
  pages        = {37687--37711},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11042-023-17060-8},
  doi          = {10.1007/S11042-023-17060-8},
  timestamp    = {Wed, 10 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/SinghSA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/SinghalA24,
  author       = {Amit Singhal and
                  Megha Agarwal},
  title        = {An automatic risk assessment system for sudden cardiac death using
                  look ahead pattern},
  journal      = {Multim. Tools Appl.},
  volume       = {83},
  number       = {9},
  pages        = {27243--27258},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11042-023-16548-7},
  doi          = {10.1007/S11042-023-16548-7},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mta/SinghalA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/SriramRGRADT24,
  author       = {Dharwada Sesha Sriram and
                  Aseem Ranjan and
                  Vedant Ghuge and
                  Naveen Rathore and
                  Raghav Agarwal and
                  Tausif Diwan and
                  Jitendra V. Tembhurne},
  title        = {Personalized federated learning for the detection of {COVID-19}},
  journal      = {Multim. Tools Appl.},
  volume       = {83},
  number       = {10},
  pages        = {29067--29084},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11042-023-16810-y},
  doi          = {10.1007/S11042-023-16810-Y},
  timestamp    = {Wed, 20 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mta/SriramRGRADT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/TyagiAJSR24,
  author       = {Prachi Tyagi and
                  Khushboo Agarwal and
                  Garima Jaiswal and
                  Arun Sharma and
                  Ritu Rani},
  title        = {Forged document detection and writer identification through unsupervised
                  deep learning approach},
  journal      = {Multim. Tools Appl.},
  volume       = {83},
  number       = {6},
  pages        = {18459--18478},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11042-023-16146-7},
  doi          = {10.1007/S11042-023-16146-7},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/TyagiAJSR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nca/AgarwalGB24,
  author       = {Mohit Agarwal and
                  Suneet K. Gupta and
                  K. K. Biswas},
  title        = {{DECACNN:} differential evolution-based approach to compress and accelerate
                  the convolution neural network model},
  journal      = {Neural Comput. Appl.},
  volume       = {36},
  number       = {6},
  pages        = {2665--2681},
  year         = {2024},
  url          = {https://doi.org/10.1007/s00521-023-09166-9},
  doi          = {10.1007/S00521-023-09166-9},
  timestamp    = {Fri, 09 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/nca/AgarwalGB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nca/HuangC24,
  author       = {Jiacheng Huang and
                  Long Chen},
  title        = {Defense against adversarial attacks via textual embeddings based on
                  semantic associative field},
  journal      = {Neural Comput. Appl.},
  volume       = {36},
  number       = {1},
  pages        = {289--301},
  year         = {2024},
  url          = {https://doi.org/10.1007/s00521-023-08946-7},
  doi          = {10.1007/S00521-023-08946-7},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/nca/HuangC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nca/LiZZL24,
  author       = {Ye Li and
                  Jiale Zhang and
                  Junwu Zhu and
                  Wenjuan Li},
  title        = {Blockfd: blockchain-based federated distillation against poisoning
                  attacks},
  journal      = {Neural Comput. Appl.},
  volume       = {36},
  number       = {21},
  pages        = {12901--12916},
  year         = {2024},
  url          = {https://doi.org/10.1007/s00521-024-09715-w},
  doi          = {10.1007/S00521-024-09715-W},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/nca/LiZZL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nca/RaksheKSMR24,
  author       = {Chetan Rakshe and
                  Suja Kunneth and
                  Soumya Sundaram and
                  Murugappan Murugappan and
                  Jac Fredo Agastinose Ronickom},
  title        = {Autism spectrum disorder diagnosis using fractal and non-fractal-based
                  functional connectivity analysis and machine learning methods},
  journal      = {Neural Comput. Appl.},
  volume       = {36},
  number       = {20},
  pages        = {12565--12585},
  year         = {2024},
  url          = {https://doi.org/10.1007/s00521-024-09770-3},
  doi          = {10.1007/S00521-024-09770-3},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/nca/RaksheKSMR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nca/RaksheKSMR24a,
  author       = {Chetan Rakshe and
                  Suja Kunneth and
                  Soumya Sundaram and
                  Murugappan Murugappan and
                  Jac Fredo Agastinose Ronickom},
  title        = {Correction: Autism spectrum disorder diagnosis using fractal and non-fractal-based
                  functional connectivity analysis and machine learning methods},
  journal      = {Neural Comput. Appl.},
  volume       = {36},
  number       = {20},
  pages        = {12587},
  year         = {2024},
  url          = {https://doi.org/10.1007/s00521-024-10017-4},
  doi          = {10.1007/S00521-024-10017-4},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/nca/RaksheKSMR24a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/networks/GargASJ24,
  author       = {Ankur Garg and
                  Yogesh Agarwal and
                  Rajiv Kumar Srivastava and
                  Suresh Kumar Jakhar},
  title        = {Integrated commercial and operations planning model for schedule design,
                  aircraft rotation and crew scheduling in airlines},
  journal      = {Networks},
  volume       = {83},
  number       = {4},
  pages        = {653--672},
  year         = {2024},
  url          = {https://doi.org/10.1002/net.22211},
  doi          = {10.1002/NET.22211},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/networks/GargASJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/neuroimage/CiceriCMCSBABP24,
  author       = {Tommaso Ciceri and
                  Luca Casartelli and
                  Florian Montano and
                  Stefania Conte and
                  Letizia Squarcina and
                  Alessandra Bertoldo and
                  Nivedita Agarwal and
                  Paolo Brambilla and
                  Denis Peruzzo},
  title        = {Fetal brain {MRI} atlases and datasets: {A} review},
  journal      = {NeuroImage},
  volume       = {292},
  pages        = {120603},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.neuroimage.2024.120603},
  doi          = {10.1016/J.NEUROIMAGE.2024.120603},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/neuroimage/CiceriCMCSBABP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nlpj/UpadhyayADSC24,
  author       = {Prashant Upadhyay and
                  Rishabh Agarwal and
                  Sumeet Dhiman and
                  Abhinav Sarkar and
                  Saumya Chaturvedi},
  title        = {A comprehensive survey on answer generation methods using {NLP}},
  journal      = {Nat. Lang. Process. J.},
  volume       = {8},
  pages        = {100088},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.nlp.2024.100088},
  doi          = {10.1016/J.NLP.2024.100088},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/nlpj/UpadhyayADSC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nms/Gagrcin24,
  author       = {Emilija Gagrcin},
  title        = {Your social ties, your personal public sphere, your responsibility:
                  How users construe a sense of personal responsibility for intervention
                  against uncivil comments on Facebook},
  journal      = {New Media Soc.},
  volume       = {26},
  number       = {8},
  pages        = {4299--4316},
  year         = {2024},
  url          = {https://doi.org/10.1177/14614448221117499},
  doi          = {10.1177/14614448221117499},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/nms/Gagrcin24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nms/JonesJangC24,
  author       = {S. Mo Jones{-}Jang and
                  Myojung Chung},
  title        = {Can we blame social media for polarization? Counter-evidence against
                  filter bubble claims during the {COVID-19} pandemic},
  journal      = {New Media Soc.},
  volume       = {26},
  number       = {6},
  pages        = {3370--3389},
  year         = {2024},
  url          = {https://doi.org/10.1177/14614448221099591},
  doi          = {10.1177/14614448221099591},
  timestamp    = {Tue, 18 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/nms/JonesJangC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nms/MakKR24,
  author       = {Macau K. F. Mak and
                  Alex Zhi{-}Xiong Koo and
                  Hernando Rojas},
  title        = {Social media engagement against fear of restrictions and surveillance:
                  The mediating role of privacy management},
  journal      = {New Media Soc.},
  volume       = {26},
  number       = {4},
  pages        = {1984--2005},
  year         = {2024},
  url          = {https://doi.org/10.1177/14614448221077240},
  doi          = {10.1177/14614448221077240},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/nms/MakKR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nms/Obermaier24,
  author       = {Magdalena Obermaier},
  title        = {Youth on standby? Explaining adolescent and young adult bystanders'
                  intervention against online hate speech},
  journal      = {New Media Soc.},
  volume       = {26},
  number       = {8},
  pages        = {4785--4807},
  year         = {2024},
  url          = {https://doi.org/10.1177/14614448221125417},
  doi          = {10.1177/14614448221125417},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/nms/Obermaier24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nn/AgarwalVSR24,
  author       = {Akshay Agarwal and
                  Mayank Vatsa and
                  Richa Singh and
                  Nalini K. Ratha},
  title        = {Corruption depth: Analysis of {DNN} depth for misclassification},
  journal      = {Neural Networks},
  volume       = {172},
  pages        = {106013},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.neunet.2023.11.035},
  doi          = {10.1016/J.NEUNET.2023.11.035},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/nn/AgarwalVSR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nn/HwangZCHL24,
  author       = {Jaehui Hwang and
                  Huan Zhang and
                  Jun{-}Ho Choi and
                  Cho{-}Jui Hsieh and
                  Jong{-}Seok Lee},
  title        = {Temporal shuffling for defending deep action recognition models against
                  adversarial attacks},
  journal      = {Neural Networks},
  volume       = {169},
  pages        = {388--397},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.neunet.2023.10.033},
  doi          = {10.1016/J.NEUNET.2023.10.033},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/nn/HwangZCHL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nn/JebreelDSB24,
  author       = {Najeeb Moharram Jebreel and
                  Josep Domingo{-}Ferrer and
                  David S{\'{a}}nchez and
                  Alberto Blanco{-}Justicia},
  title        = {LFighter: Defending against the label-flipping attack in federated
                  learning},
  journal      = {Neural Networks},
  volume       = {170},
  pages        = {111--126},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.neunet.2023.11.019},
  doi          = {10.1016/J.NEUNET.2023.11.019},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/nn/JebreelDSB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nn/StephenKSRA24,
  author       = {A. Stephen and
                  R. Karthikeyan and
                  Chandran Sowmiya and
                  Ramachandran Raja and
                  Ravi P. Agarwal},
  title        = {Sampled-data controller scheme for multi-agent systems and its Application
                  to circuit network},
  journal      = {Neural Networks},
  volume       = {170},
  pages        = {506--520},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.neunet.2023.11.059},
  doi          = {10.1016/J.NEUNET.2023.11.059},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/nn/StephenKSRA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nn/TaoLZL24,
  author       = {Qian Tao and
                  Jianpeng Liao and
                  Enze Zhang and
                  Lusi Li},
  title        = {A Dual Robust Graph Neural Network Against Graph Adversarial Attacks},
  journal      = {Neural Networks},
  volume       = {175},
  pages        = {106276},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.neunet.2024.106276},
  doi          = {10.1016/J.NEUNET.2024.106276},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/nn/TaoLZL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nn/WangLSL24,
  author       = {Huiwei Wang and
                  Tianhua Liu and
                  Ziyu Sheng and
                  Huaqing Li},
  title        = {Explanatory subgraph attacks against Graph Neural Networks},
  journal      = {Neural Networks},
  volume       = {172},
  pages        = {106097},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.neunet.2024.106097},
  doi          = {10.1016/J.NEUNET.2024.106097},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/nn/WangLSL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nn/WangWZ24,
  author       = {Haoyu Wang and
                  Chunhua Wu and
                  Kangfeng Zheng},
  title        = {Defense against adversarial attacks based on color space transformation},
  journal      = {Neural Networks},
  volume       = {173},
  pages        = {106176},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.neunet.2024.106176},
  doi          = {10.1016/J.NEUNET.2024.106176},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/nn/WangWZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nn/ZhouYHLZ24,
  author       = {Ting Zhou and
                  Hanshu Yan and
                  Bo Han and
                  Lei Liu and
                  Jingfeng Zhang},
  title        = {Learning a robust foundation model against clean-label data poisoning
                  attacks at downstream tasks},
  journal      = {Neural Networks},
  volume       = {169},
  pages        = {756--763},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.neunet.2023.10.034},
  doi          = {10.1016/J.NEUNET.2023.10.034},
  timestamp    = {Wed, 24 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/nn/ZhouYHLZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/npjdm/ZahedaniMVAHARTWHS24,
  author       = {Ashkan Dehghani Zahedani and
                  Tracey McLaughlin and
                  Arvind Veluvali and
                  Nima Aghaeepour and
                  Amir Hosseinian and
                  Saransh Agarwal and
                  Jingyi Ruan and
                  Shital Tripathi and
                  Mark Woodward and
                  Noosheen Hashemi and
                  Michael Snyder},
  title        = {Correction: Digital health application integrating wearable data and
                  behavioral patterns improves metabolic health},
  journal      = {npj Digit. Medicine},
  volume       = {7},
  number       = {1},
  year         = {2024},
  url          = {https://doi.org/10.1038/s41746-024-00996-y},
  doi          = {10.1038/S41746-024-00996-Y},
  timestamp    = {Fri, 08 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/npjdm/ZahedaniMVAHARTWHS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/npl/YinCLG24,
  author       = {Jianyao Yin and
                  Honglong Chen and
                  Junjian Li and
                  Yudong Gao},
  title        = {Enhanced Coalescence Backdoor Attack Against {DNN} Based on Pixel
                  Gradient},
  journal      = {Neural Process. Lett.},
  volume       = {56},
  number       = {2},
  pages        = {114},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11063-024-11469-4},
  doi          = {10.1007/S11063-024-11469-4},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/npl/YinCLG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ns/Walsh24,
  author       = {Brendan Walsh},
  title        = {Enhancing network resilience against growing cyberthreats},
  journal      = {Netw. Secur.},
  volume       = {2024},
  number       = {6},
  year         = {2024},
  url          = {https://doi.org/10.12968/s1353-4858(24)70024-5},
  doi          = {10.12968/S1353-4858(24)70024-5},
  timestamp    = {Fri, 09 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ns/Walsh24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/oir/Zhang24,
  author       = {Zizhong Zhang},
  title        = {Fight against hair loss together: exploring self-disclosure and social
                  support in an online hair loss support community},
  journal      = {Online Inf. Rev.},
  volume       = {48},
  number       = {5},
  pages        = {841--856},
  year         = {2024},
  url          = {https://doi.org/10.1108/OIR-07-2023-0346},
  doi          = {10.1108/OIR-07-2023-0346},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/oir/Zhang24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ojcs/GhoshKIBAASCAY24,
  author       = {Moloy Kumar Ghosh and
                  Milton Kumar Kundu and
                  Md. Ibrahim and
                  A. S. M. Badrudduza and
                  Md. Shamim Anower and
                  Imran Shafique Ansari and
                  Annie Solomon and
                  Sumit Chakravarty and
                  Imtiaz Ahmed and
                  Heejung Yu},
  title        = {Physical-Layer Security in Mixed {UOWC-RF} Networks With Energy Harvesting
                  Relay Against Multiple Eavesdroppers},
  journal      = {{IEEE} Open J. Commun. Soc.},
  volume       = {5},
  pages        = {2884--2902},
  year         = {2024},
  url          = {https://doi.org/10.1109/OJCOMS.2024.3373476},
  doi          = {10.1109/OJCOMS.2024.3373476},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ojcs/GhoshKIBAASCAY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ojcs/IvanovTPM24,
  author       = {Antoni Ivanov and
                  Krasimir Tonchev and
                  Vladimir Poulkov and
                  Agata Manolova},
  title        = {Deep Learning for Reduced Sampling Spatial 3-D {REM} Reconstruction},
  journal      = {{IEEE} Open J. Commun. Soc.},
  volume       = {5},
  pages        = {2287--2301},
  year         = {2024},
  url          = {https://doi.org/10.1109/OJCOMS.2024.3386635},
  doi          = {10.1109/OJCOMS.2024.3386635},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ojcs/IvanovTPM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/oms/AgafonovKDGT24,
  author       = {Artem Agafonov and
                  Dmitry Kamzolov and
                  Pavel E. Dvurechensky and
                  Alexander V. Gasnikov and
                  Martin Tak{\'{a}}c},
  title        = {Inexact tensor methods and their application to stochastic convex
                  optimization},
  journal      = {Optim. Methods Softw.},
  volume       = {39},
  number       = {1},
  pages        = {42--83},
  year         = {2024},
  url          = {https://doi.org/10.1080/10556788.2023.2261604},
  doi          = {10.1080/10556788.2023.2261604},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/oms/AgafonovKDGT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/orf/MamoAT24,
  author       = {Dejen Ketema Mamo and
                  Enat Agachew Ayele and
                  Shewafera Wondimagegnhu Teklu},
  title        = {Modelling and Analysis of the Impact of Corruption on Economic Growth
                  and Unemployment},
  journal      = {Oper. Res. Forum},
  volume       = {5},
  number       = {2},
  pages        = {36},
  year         = {2024},
  url          = {https://doi.org/10.1007/s43069-024-00316-w},
  doi          = {10.1007/S43069-024-00316-W},
  timestamp    = {Thu, 16 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/orf/MamoAT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/orf/NearchouO24,
  author       = {Andreas C. Nearchou and
                  Sotiris L. Omirou},
  title        = {Self-Adaptive Biased Differential Evolution for Scheduling Against
                  Common Due Dates},
  journal      = {Oper. Res. Forum},
  volume       = {5},
  number       = {2},
  pages        = {53},
  year         = {2024},
  url          = {https://doi.org/10.1007/s43069-024-00330-y},
  doi          = {10.1007/S43069-024-00330-Y},
  timestamp    = {Mon, 24 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/orf/NearchouO24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/paa/AgarwalAK24,
  author       = {Ruchi Agarwal and
                  Sara Ahmed and
                  Manoj Kumar},
  title        = {Selective bin model for reversible data hiding in encrypted images},
  journal      = {Pattern Anal. Appl.},
  volume       = {27},
  number       = {1},
  pages        = {21},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10044-024-01220-z},
  doi          = {10.1007/S10044-024-01220-Z},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/paa/AgarwalAK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/paapp/NairPAPRP24,
  author       = {Arun S. Nair and
                  Geeta Patil and
                  Archit Agarwal and
                  Aboli Vijayan Pai and
                  Biju K. Raveendran and
                  Sasikumar Punnekkat},
  title        = {{CAMP:} a hierarchical cache architecture for multi-core mixed criticality
                  processors},
  journal      = {Int. J. Parallel Emergent Distributed Syst.},
  volume       = {39},
  number       = {3},
  pages        = {317--352},
  year         = {2024},
  url          = {https://doi.org/10.1080/17445760.2023.2293913},
  doi          = {10.1080/17445760.2023.2293913},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/paapp/NairPAPRP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pacmhci/LuPACE24,
  author       = {Xi Lu and
                  Jacquelyn E. Powell and
                  Elena Agapie and
                  Yunan Chen and
                  Daniel A. Epstein},
  title        = {Examining the Social Aspects of Pregnancy Tracking Applications},
  journal      = {Proc. {ACM} Hum. Comput. Interact.},
  volume       = {8},
  number       = {{CSCW1}},
  pages        = {1--30},
  year         = {2024},
  url          = {https://doi.org/10.1145/3637328},
  doi          = {10.1145/3637328},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pacmhci/LuPACE24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pacmhci/OkoloADV24,
  author       = {Chinasa T. Okolo and
                  Dhruv Agarwal and
                  Nicola Dell and
                  Aditya Vashistha},
  title        = {"If it is easy to understand then it will have value": Examining Perceptions
                  of Explainable {AI} with Community Health Workers in Rural India},
  journal      = {Proc. {ACM} Hum. Comput. Interact.},
  volume       = {8},
  number       = {{CSCW1}},
  pages        = {1--28},
  year         = {2024},
  url          = {https://doi.org/10.1145/3637348},
  doi          = {10.1145/3637348},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pacmhci/OkoloADV24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pacmmod/AgarwalHSY24,
  author       = {Pankaj K. Agarwal and
                  Xiao Hu and
                  Stavros Sintos and
                  Jun Yang},
  title        = {On Reporting Durable Patterns in Temporal Proximity Graphs},
  journal      = {Proc. {ACM} Manag. Data},
  volume       = {2},
  number       = {2},
  pages        = {81},
  year         = {2024},
  url          = {https://doi.org/10.1145/3651144},
  doi          = {10.1145/3651144},
  timestamp    = {Tue, 06 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pacmmod/AgarwalHSY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pacmmod/ZhengLLZLW24,
  author       = {Yihang Zheng and
                  Chen Lin and
                  Xian Lyu and
                  Xuanhe Zhou and
                  Guoliang Li and
                  Tianqing Wang},
  title        = {Robustness of Updatable Learning-based Index Advisors against Poisoning
                  Attack},
  journal      = {Proc. {ACM} Manag. Data},
  volume       = {2},
  number       = {1},
  pages        = {V2mod010:1--V2mod010:26},
  year         = {2024},
  url          = {https://doi.org/10.1145/3639265},
  doi          = {10.1145/3639265},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pacmmod/ZhengLLZLW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pacmpl/AndriciCHMRTW24,
  author       = {Cezar{-}Constantin Andrici and
                  {\c{S}}tefan Ciob{\^{a}}c{\u{a}} and
                  Catalin Hritcu and
                  Guido Mart{\'{\i}}nez and
                  Exequiel Rivas and
                  {\'{E}}ric Tanter and
                  Th{\'{e}}o Winterhalter},
  title        = {Securing Verified {IO} Programs Against Unverified Code in {F}},
  journal      = {Proc. {ACM} Program. Lang.},
  volume       = {8},
  number       = {{POPL}},
  pages        = {2226--2259},
  year         = {2024},
  url          = {https://doi.org/10.1145/3632916},
  doi          = {10.1145/3632916},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/pacmpl/AndriciCHMRTW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pacmpl/AngM24,
  author       = {Zhendong Ang and
                  Umang Mathur},
  title        = {Predictive Monitoring against Pattern Regular Languages},
  journal      = {Proc. {ACM} Program. Lang.},
  volume       = {8},
  number       = {{POPL}},
  pages        = {2191--2225},
  year         = {2024},
  url          = {https://doi.org/10.1145/3632915},
  doi          = {10.1145/3632915},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/pacmpl/AngM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pacmpl/SunSCC24,
  author       = {Pu Sun and
                  Fu Song and
                  Yuqi Chen and
                  Taolue Chen},
  title        = {EasyBC: {A} Cryptography-Specific Language for Security Analysis of
                  Block Ciphers against Differential Cryptanalysis},
  journal      = {Proc. {ACM} Program. Lang.},
  volume       = {8},
  number       = {{POPL}},
  pages        = {848--881},
  year         = {2024},
  url          = {https://doi.org/10.1145/3632871},
  doi          = {10.1145/3632871},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/pacmpl/SunSCC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pami/WangQLRW24,
  author       = {Yang Wang and
                  Biao Qian and
                  Haipeng Liu and
                  Yong Rui and
                  Meng Wang},
  title        = {Unpacking the Gap Box Against Data-Free Knowledge Distillation},
  journal      = {{IEEE} Trans. Pattern Anal. Mach. Intell.},
  volume       = {46},
  number       = {9},
  pages        = {6280--6291},
  year         = {2024},
  url          = {https://doi.org/10.1109/TPAMI.2024.3379505},
  doi          = {10.1109/TPAMI.2024.3379505},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pami/WangQLRW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pc/AgathosA24,
  author       = {Alexander Agathos and
                  Phillip N. Azariadis},
  title        = {Multi-GPU 3D k-nearest neighbors computation with application to ICP,
                  point cloud smoothing and normals computation},
  journal      = {Parallel Comput.},
  volume       = {121},
  pages        = {103093},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.parco.2024.103093},
  doi          = {10.1016/J.PARCO.2024.103093},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pc/AgathosA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/peerj-cs/EltoukhyGAM24,
  author       = {Mohamed Meselhy Eltoukhy and
                  Tarek Gaber and
                  Abdulwahab Ali Almazroi and
                  Marwa F. Mohamed},
  title        = {{ONE3A:} one-against-all authentication model for smartphone using
                  {GAN} network and optimization techniques},
  journal      = {PeerJ Comput. Sci.},
  volume       = {10},
  pages        = {e2001},
  year         = {2024},
  url          = {https://doi.org/10.7717/peerj-cs.2001},
  doi          = {10.7717/PEERJ-CS.2001},
  timestamp    = {Sun, 14 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/peerj-cs/EltoukhyGAM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/peerj-cs/GhadiMAHSLA24,
  author       = {Yazeed Yasin Ghadi and
                  Tehseen Mazhar and
                  Khursheed Aurangzeb and
                  Inayatul Haq and
                  Tariq Shahzad and
                  Asif Ali Laghari and
                  Muhammad Shahid Anwar},
  title        = {Security risk models against attacks in smart grid using big data
                  and artificial intelligence},
  journal      = {PeerJ Comput. Sci.},
  volume       = {10},
  pages        = {e1840},
  year         = {2024},
  url          = {https://doi.org/10.7717/peerj-cs.1840},
  doi          = {10.7717/PEERJ-CS.1840},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/peerj-cs/GhadiMAHSLA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/percom/KapoorK24,
  author       = {Ayshika Kapoor and
                  Dheeraj Kumar},
  title        = {Computation and communication efficient approach for federated learning
                  based urban sensing applications against inference attacks},
  journal      = {Pervasive Mob. Comput.},
  volume       = {98},
  pages        = {101875},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.pmcj.2024.101875},
  doi          = {10.1016/J.PMCJ.2024.101875},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/percom/KapoorK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/phycomm/Agarwal24,
  author       = {Amit Agarwal},
  title        = {Transmitter design and {AE-AR} region characterization for {NOMA-SLIPT}
                  {UWOC} systems with uniformly distributed message and Imp-SIC},
  journal      = {Phys. Commun.},
  volume       = {64},
  pages        = {102317},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.phycom.2024.102317},
  doi          = {10.1016/J.PHYCOM.2024.102317},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/phycomm/Agarwal24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/ChowHHIWL24,
  author       = {Ka{-}Ho Chow and
                  Sihao Hu and
                  Tiansheng Huang and
                  Fatih Ilhan and
                  Wenqi Wei and
                  Ling Liu},
  title        = {Diversity-driven Privacy Protection Masks Against Unauthorized Face
                  Recognition},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2024},
  number       = {4},
  pages        = {381--392},
  year         = {2024},
  url          = {https://doi.org/10.56553/popets-2024-0122},
  doi          = {10.56553/POPETS-2024-0122},
  timestamp    = {Thu, 18 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/ChowHHIWL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/JiAYL24,
  author       = {Tianxi Ji and
                  Erman Ayday and
                  Emre Yilmaz and
                  Pan Li},
  title        = {Privacy-Preserving Fingerprinting Against Collusion and Correlation
                  Threats in Genomic Data},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2024},
  number       = {3},
  pages        = {659--673},
  year         = {2024},
  url          = {https://doi.org/10.56553/popets-2024-0098},
  doi          = {10.56553/POPETS-2024-0098},
  timestamp    = {Thu, 18 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/JiAYL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/LeC24,
  author       = {Minh{-}Ha Le and
                  Niklas Carlsson},
  title        = {StyleAdv: {A} Usable Privacy Framework Against Facial Recognition
                  with Adversarial Image Editing},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2024},
  number       = {2},
  pages        = {106--123},
  year         = {2024},
  url          = {https://doi.org/10.56553/popets-2024-0043},
  doi          = {10.56553/POPETS-2024-0043},
  timestamp    = {Wed, 08 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/LeC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/MourisST24,
  author       = {Dimitris Mouris and
                  Pratik Sarkar and
                  Nektarios Georgios Tsoutsos},
  title        = {{PLASMA:} Private, Lightweight Aggregated Statistics against Malicious
                  Adversaries},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2024},
  number       = {3},
  pages        = {4--24},
  year         = {2024},
  url          = {https://doi.org/10.56553/popets-2024-0064},
  doi          = {10.56553/POPETS-2024-0064},
  timestamp    = {Thu, 18 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/MourisST24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/OksuzHA24,
  author       = {Abdullah {\c{C}}aglar {\"{O}}ks{\"{u}}z and
                  Anisa Halimi and
                  Erman Ayday},
  title        = {{AUTOLYCUS:} Exploiting Explainable Artificial Intelligence {(XAI)}
                  for Model Extraction Attacks against Interpretable Models},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2024},
  number       = {4},
  pages        = {684--699},
  year         = {2024},
  url          = {https://doi.org/10.56553/popets-2024-0137},
  doi          = {10.56553/POPETS-2024-0137},
  timestamp    = {Thu, 18 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/OksuzHA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/OzmenFC24,
  author       = {Muslum Ozgur Ozmen and
                  Habiba Farrukh and
                  Z. Berkay Celik},
  title        = {Physical Side-Channel Attacks against Intermittent Devices},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2024},
  number       = {3},
  pages        = {461--476},
  year         = {2024},
  url          = {https://doi.org/10.56553/popets-2024-0088},
  doi          = {10.56553/POPETS-2024-0088},
  timestamp    = {Thu, 18 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/OzmenFC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/SchererWS24,
  author       = {Philip Scherer and
                  Christiane Weis and
                  Thorsten Strufe},
  title        = {A Framework for Provably Secure Onion Routing against a Global Adversary},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2024},
  number       = {2},
  pages        = {141--159},
  year         = {2024},
  url          = {https://doi.org/10.56553/popets-2024-0045},
  doi          = {10.56553/POPETS-2024-0045},
  timestamp    = {Wed, 08 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/SchererWS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/WangW24,
  author       = {Xiuling Wang and
                  Wendy Hui Wang},
  title        = {GCL-Leak: Link Membership Inference Attacks against Graph Contrastive
                  Learning},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2024},
  number       = {3},
  pages        = {165--185},
  year         = {2024},
  url          = {https://doi.org/10.56553/popets-2024-0073},
  doi          = {10.56553/POPETS-2024-0073},
  timestamp    = {Thu, 18 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/WangW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/WangW24a,
  author       = {Xiuling Wang and
                  Wendy Hui Wang},
  title        = {Subgraph Structure Membership Inference Attacks against Graph Neural
                  Networks},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2024},
  number       = {4},
  pages        = {268--290},
  year         = {2024},
  url          = {https://doi.org/10.56553/popets-2024-0116},
  doi          = {10.56553/POPETS-2024-0116},
  timestamp    = {Thu, 18 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/WangW24a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/WuHBHBGZ24,
  author       = {Yixin Wu and
                  Xinlei He and
                  Pascal Berrang and
                  Mathias Humbert and
                  Michael Backes and
                  Neil Zhenqiang Gong and
                  Yang Zhang},
  title        = {Link Stealing Attacks Against Inductive Graph Neural Networks},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2024},
  number       = {4},
  pages        = {818--839},
  year         = {2024},
  url          = {https://doi.org/10.56553/popets-2024-0143},
  doi          = {10.56553/POPETS-2024-0143},
  timestamp    = {Mon, 05 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/WuHBHBGZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppna/ChenamTA24,
  author       = {Venkata Bhikshapathi Chenam and
                  Suneeth Yadav Tummala and
                  Syed Taqi Ali},
  title        = {Public key authenticated encryption with field-free subset conjunctive
                  and disjunctive keyword search against keyword guessing attacks},
  journal      = {Peer Peer Netw. Appl.},
  volume       = {17},
  number       = {3},
  pages        = {1036--1050},
  year         = {2024},
  url          = {https://doi.org/10.1007/s12083-023-01618-2},
  doi          = {10.1007/S12083-023-01618-2},
  timestamp    = {Mon, 24 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ppna/ChenamTA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppna/Hemkumar24,
  author       = {D. Hemkumar},
  title        = {Preserving location privacy against inference attacks in indoor positioning
                  system},
  journal      = {Peer Peer Netw. Appl.},
  volume       = {17},
  number       = {2},
  pages        = {784--799},
  year         = {2024},
  url          = {https://doi.org/10.1007/s12083-023-01609-3},
  doi          = {10.1007/S12083-023-01609-3},
  timestamp    = {Thu, 11 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ppna/Hemkumar24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppna/HonarmandK24,
  author       = {Farnam Honarmand and
                  Alireza Keshavarz{-}Haddad},
  title        = {{T-AODV:} {A} trust-based routing against black-hole attacks in VANETs},
  journal      = {Peer Peer Netw. Appl.},
  volume       = {17},
  number       = {3},
  pages        = {1309--1321},
  year         = {2024},
  url          = {https://doi.org/10.1007/s12083-024-01632-y},
  doi          = {10.1007/S12083-024-01632-Y},
  timestamp    = {Thu, 04 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ppna/HonarmandK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pr/ChenPTZ24,
  author       = {Xu Chen and
                  Yuangang Pan and
                  Ivor W. Tsang and
                  Ya Zhang},
  title        = {Learning node representations against perturbations},
  journal      = {Pattern Recognit.},
  volume       = {145},
  pages        = {109976},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.patcog.2023.109976},
  doi          = {10.1016/J.PATCOG.2023.109976},
  timestamp    = {Wed, 07 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pr/ChenPTZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/prl/BoatoNSPR24,
  author       = {Giulia Boato and
                  Francesco G. B. De Natale and
                  Gianluca De Stefano and
                  Cecilia Pasquini and
                  Fabio Roli},
  title        = {Adversarial mimicry attacks against image splicing forensics: An approach
                  for jointly hiding manipulations and creating false detections},
  journal      = {Pattern Recognit. Lett.},
  volume       = {179},
  pages        = {73--79},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.patrec.2024.01.023},
  doi          = {10.1016/J.PATREC.2024.01.023},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/prl/BoatoNSPR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/prl/DaiTMTRWSL24,
  author       = {Zhuangzhuang Dai and
                  Vu Tran and
                  Andrew Markham and
                  Niki Trigoni and
                  M. Arif Rahman and
                  Lahiru N. S. Wijayasingha and
                  John A. Stankovic and
                  Chen Li},
  title        = {EgoCap and EgoFormer: First-person image captioning with context fusion},
  journal      = {Pattern Recognit. Lett.},
  volume       = {181},
  pages        = {50--56},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.patrec.2024.03.012},
  doi          = {10.1016/J.PATREC.2024.03.012},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/prl/DaiTMTRWSL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/prl/TangSX24,
  author       = {Yu Tang and
                  Lijuan Sun and
                  Xiaolong Xu},
  title        = {SilentTrig: An imperceptible backdoor attack against speaker identification
                  with hidden triggers},
  journal      = {Pattern Recognit. Lett.},
  volume       = {177},
  pages        = {103--109},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.patrec.2023.12.002},
  doi          = {10.1016/J.PATREC.2023.12.002},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/prl/TangSX24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/LiZZZXW24,
  author       = {Zijian Li and
                  Bingbing Zheng and
                  Chengxian Zhang and
                  Zhenrong Zhang and
                  Hong{-}Bo Xie and
                  Kejin Wei},
  title        = {Improved security bounds against the Trojan-horse attack in decoy-state
                  quantum key distribution},
  journal      = {Quantum Inf. Process.},
  volume       = {23},
  number       = {2},
  pages        = {40},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11128-023-04238-0},
  doi          = {10.1007/S11128-023-04238-0},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qip/LiZZZXW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ral/BoselloAKPKCPHPP24,
  author       = {Michael Bosello and
                  Davide Aguiari and
                  Yvo Keuter and
                  Enrico Pallotta and
                  Sara Kiade and
                  Gyordan Caminati and
                  Flavio Pinzarrone and
                  Junaid Halepota and
                  Jacopo Panerati and
                  Giovanni Pau},
  title        = {Race Against the Machine: {A} Fully-Annotated, Open-Design Dataset
                  of Autonomous and Piloted High-Speed Flight},
  journal      = {{IEEE} Robotics Autom. Lett.},
  volume       = {9},
  number       = {4},
  pages        = {3799--3806},
  year         = {2024},
  url          = {https://doi.org/10.1109/lra.2024.3371288},
  doi          = {10.1109/LRA.2024.3371288},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ral/BoselloAKPKCPHPP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ral/DaxLSAK24,
  author       = {Victoria Magdalena Dax and
                  Jiachen Li and
                  Enna Sachdeva and
                  Nakul Agarwal and
                  Mykel J. Kochenderfer},
  title        = {Disentangled Neural Relational Inference for Interpretable Motion
                  Prediction},
  journal      = {{IEEE} Robotics Autom. Lett.},
  volume       = {9},
  number       = {2},
  pages        = {1452--1459},
  year         = {2024},
  url          = {https://doi.org/10.1109/LRA.2023.3342554},
  doi          = {10.1109/LRA.2023.3342554},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ral/DaxLSAK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ral/LambertiCABMBBGCP24,
  author       = {Lorenzo Lamberti and
                  Elia Cereda and
                  Gabriele Abbate and
                  Lorenzo Bellone and
                  Victor Javier Kartsch Morinigo and
                  Michal Barcis and
                  Agata Barcis and
                  Alessandro Giusti and
                  Francesco Conti and
                  Daniele Palossi},
  title        = {A Sim-to-Real Deep Learning-Based Framework for Autonomous Nano-Drone
                  Racing},
  journal      = {{IEEE} Robotics Autom. Lett.},
  volume       = {9},
  number       = {2},
  pages        = {1899--1906},
  year         = {2024},
  url          = {https://doi.org/10.1109/LRA.2024.3349814},
  doi          = {10.1109/LRA.2024.3349814},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ral/LambertiCABMBBGCP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ral/LiZS24,
  author       = {Xing Li and
                  Rui Zhou and
                  Guibin Sun},
  title        = {Adaptive Shape Formation Against Swarm-Scale Variants in Robot Swarms},
  journal      = {{IEEE} Robotics Autom. Lett.},
  volume       = {9},
  number       = {8},
  pages        = {6776--6783},
  year         = {2024},
  url          = {https://doi.org/10.1109/LRA.2024.3414210},
  doi          = {10.1109/LRA.2024.3414210},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ral/LiZS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ral/Tao0SA024,
  author       = {Yuezhan Tao and
                  Xu Liu and
                  Igor Spasojevic and
                  Saurav Agarwal and
                  Vijay Kumar},
  title        = {3D Active Metric-Semantic {SLAM}},
  journal      = {{IEEE} Robotics Autom. Lett.},
  volume       = {9},
  number       = {3},
  pages        = {2989--2996},
  year         = {2024},
  url          = {https://doi.org/10.1109/LRA.2024.3363542},
  doi          = {10.1109/LRA.2024.3363542},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ral/Tao0SA024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ras/FrancosB24,
  author       = {Roee Mordechai Francos and
                  Alfred M. Bruckstein},
  title        = {Defense against smart invaders with swarms of sweeping agents},
  journal      = {Robotics Auton. Syst.},
  volume       = {173},
  pages        = {104620},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.robot.2024.104620},
  doi          = {10.1016/J.ROBOT.2024.104620},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ras/FrancosB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/remotesensing/AgabinPCB24,
  author       = {Angelina Agabin and
                  J. Xavier Prochaska and
                  Peter C. Cornillon and
                  Christian E. Buckingham},
  title        = {Mitigating Masked Pixels in a Climate-Critical Ocean Dataset},
  journal      = {Remote. Sens.},
  volume       = {16},
  number       = {13},
  pages        = {2439},
  year         = {2024},
  url          = {https://doi.org/10.3390/rs16132439},
  doi          = {10.3390/RS16132439},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/remotesensing/AgabinPCB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/remotesensing/AgapiouG24,
  author       = {Athos Agapiou and
                  Elias Gravanis},
  title        = {A Machine-Learning-Assisted Classification Algorithm for the Detection
                  of Archaeological Proxies (Cropmarks) Based on Reflectance Signatures},
  journal      = {Remote. Sens.},
  volume       = {16},
  number       = {10},
  pages        = {1705},
  year         = {2024},
  url          = {https://doi.org/10.3390/rs16101705},
  doi          = {10.3390/RS16101705},
  timestamp    = {Tue, 18 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/remotesensing/AgapiouG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/remotesensing/DattiZTCPAO24,
  author       = {Aminu Dalhatu Datti and
                  Gang Zeng and
                  Elena Tarnavsky and
                  Rosalind Cornforth and
                  Florian Pappenberger and
                  Bello Ahmad Abdullahi and
                  Anselem Onyejuruwa},
  title        = {Evaluation of Satellite-Based Rainfall Estimates against Rain Gauge
                  Observations across Agro-Climatic Zones of Nigeria, West Africa},
  journal      = {Remote. Sens.},
  volume       = {16},
  number       = {10},
  pages        = {1755},
  year         = {2024},
  url          = {https://doi.org/10.3390/rs16101755},
  doi          = {10.3390/RS16101755},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/remotesensing/DattiZTCPAO24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/remotesensing/GuWWLZZ24,
  author       = {Guowei Gu and
                  Zhongchen Wang and
                  Liguo Weng and
                  Haifeng Lin and
                  Zikai Zhao and
                  Liling Zhao},
  title        = {Attention Guide Axial Sharing Mixed Attention {(AGASMA)} Network for
                  Cloud Segmentation and Cloud Shadow Segmentation},
  journal      = {Remote. Sens.},
  volume       = {16},
  number       = {13},
  pages        = {2435},
  year         = {2024},
  url          = {https://doi.org/10.3390/rs16132435},
  doi          = {10.3390/RS16132435},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/remotesensing/GuWWLZZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/remotesensing/KuleszaH24,
  author       = {Kinga Kulesza and
                  Agata Hoscilo},
  title        = {Temporal Patterns of Vegetation Greenness for the Main Forest-Forming
                  Tree Species in the European Temperate Zone},
  journal      = {Remote. Sens.},
  volume       = {16},
  number       = {15},
  pages        = {2844},
  year         = {2024},
  url          = {https://doi.org/10.3390/rs16152844},
  doi          = {10.3390/RS16152844},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/remotesensing/KuleszaH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/remotesensing/LiuGXLH24,
  author       = {Qiang Liu and
                  Fucheng Guo and
                  Kunlai Xiong and
                  Zhangmeng Liu and
                  Weidong Hu},
  title        = {{LPI} Sequences Optimization Method against Summation Detector Based
                  on {FFT} Filter Bank},
  journal      = {Remote. Sens.},
  volume       = {16},
  number       = {11},
  pages        = {2021},
  year         = {2024},
  url          = {https://doi.org/10.3390/rs16112021},
  doi          = {10.3390/RS16112021},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/remotesensing/LiuGXLH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/remotesensing/LuHK24,
  author       = {Minjiao Lu and
                  Kim Oanh Hoang and
                  Agampodi Deva Thisaru Nayanathara Kumarasiri},
  title        = {Temperature Effects in {AMSR2} Soil Moisture Products and Development
                  of a Removal Method Using Data at Ascending and Descending Overpasses},
  journal      = {Remote. Sens.},
  volume       = {16},
  number       = {9},
  pages        = {1606},
  year         = {2024},
  url          = {https://doi.org/10.3390/rs16091606},
  doi          = {10.3390/RS16091606},
  timestamp    = {Tue, 18 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/remotesensing/LuHK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/remotesensing/MiaoZABZL24,
  author       = {Lijuan Miao and
                  Yuyang Zhang and
                  Evgenios Agathokleous and
                  Gang Bao and
                  Ziyu Zhu and
                  Qiang Liu},
  title        = {Modeling with Hysteresis Better Captures Grassland Growth in Asian
                  Drylands},
  journal      = {Remote. Sens.},
  volume       = {16},
  number       = {11},
  pages        = {1838},
  year         = {2024},
  url          = {https://doi.org/10.3390/rs16111838},
  doi          = {10.3390/RS16111838},
  timestamp    = {Tue, 06 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/remotesensing/MiaoZABZL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/remotesensing/OmarzadehGBMSSLB24,
  author       = {Davoud Omarzadeh and
                  Adonis Gonz{\'{a}}lez{-}Godoy and
                  Cristina Bustos and
                  Kevin Mart{\'{\i}}n{-}Fern{\'{a}}ndez and
                  Carles Scotto and
                  C{\'{e}}sar S{\'{a}}nchez and
                  {\`{A}}gata Lapedriza and
                  Javier Borge{-}Holthoefer},
  title        = {Explainable Automatic Detection of Fiber-Cement Roofs in Aerial {RGB}
                  Images},
  journal      = {Remote. Sens.},
  volume       = {16},
  number       = {8},
  pages        = {1342},
  year         = {2024},
  url          = {https://doi.org/10.3390/rs16081342},
  doi          = {10.3390/RS16081342},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/remotesensing/OmarzadehGBMSSLB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/remotesensing/PengLLJ24,
  author       = {Lingbing Peng and
                  Zhi Lu and
                  Tao Lei and
                  Ping Jiang},
  title        = {Dual-Structure Elements Morphological Filtering and Local Z-Score
                  Normalization for Infrared Small Target Detection against Heavy Clouds},
  journal      = {Remote. Sens.},
  volume       = {16},
  number       = {13},
  pages        = {2343},
  year         = {2024},
  url          = {https://doi.org/10.3390/rs16132343},
  doi          = {10.3390/RS16132343},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/remotesensing/PengLLJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ress/ChahrourBT24,
  author       = {Nour Chahrour and
                  Christophe B{\'{e}}renguer and
                  Jean{-}Marc Tacnet},
  title        = {Incorporating cascading effects analysis in the maintenance policy
                  assessment of torrent check dams against torrential floods},
  journal      = {Reliab. Eng. Syst. Saf.},
  volume       = {243},
  pages        = {109875},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.ress.2023.109875},
  doi          = {10.1016/J.RESS.2023.109875},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ress/ChahrourBT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ress/HuangTWYG24,
  author       = {Keke Huang and
                  Shijun Tao and
                  Dehao Wu and
                  Chunhua Yang and
                  Weihua Gui},
  title        = {Robust condition identification against label noise in industrial
                  processes based on trusted connection dictionary learning},
  journal      = {Reliab. Eng. Syst. Saf.},
  volume       = {247},
  pages        = {110133},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.ress.2024.110133},
  doi          = {10.1016/J.RESS.2024.110133},
  timestamp    = {Tue, 28 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ress/HuangTWYG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ress/MandelliWALM24,
  author       = {Diego Mandelli and
                  Congjian Wang and
                  Vivek Agarwal and
                  Linyu Lin and
                  Koushik A. Manjunatha},
  title        = {Reliability modeling in a predictive maintenance context: {A} margin-based
                  approach},
  journal      = {Reliab. Eng. Syst. Saf.},
  volume       = {243},
  pages        = {109861},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.ress.2023.109861},
  doi          = {10.1016/J.RESS.2023.109861},
  timestamp    = {Fri, 09 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ress/MandelliWALM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sadm/GaoKNRZA24,
  author       = {Wenyu Gao and
                  Inyoung Kim and
                  Wonil Nam and
                  Xiang Ren and
                  Wei Zhou and
                  Masoud Agah},
  title        = {Nonparametric Bayesian functional clustering with applications to
                  racial disparities in breast cancer},
  journal      = {Stat. Anal. Data Min.},
  volume       = {17},
  number       = {1},
  year         = {2024},
  url          = {https://doi.org/10.1002/sam.11657},
  doi          = {10.1002/SAM.11657},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sadm/GaoKNRZA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/saem/AgarwalMG24,
  author       = {Shilpa Agarwal and
                  Priyanka Malik and
                  Shalini Gautam},
  title        = {Analysis of financial performance with regard to digital payment:
                  a case of {HDFC} bank},
  journal      = {Int. J. Syst. Assur. Eng. Manag.},
  volume       = {15},
  number       = {6},
  pages        = {2085--2096},
  year         = {2024},
  url          = {https://doi.org/10.1007/s13198-023-02201-x},
  doi          = {10.1007/S13198-023-02201-X},
  timestamp    = {Thu, 04 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/saem/AgarwalMG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/saem/AlamKRAM24,
  author       = {Intekhab Alam and
                  Mustafa Kamal and
                  Ahmadur Rahman and
                  Trapty Agarwal and
                  Awakash Mishra},
  title        = {Statistical analysis using multiple censoring scheme under partially
                  accelerated life tests for the power Lindley distribution},
  journal      = {Int. J. Syst. Assur. Eng. Manag.},
  volume       = {15},
  number       = {7},
  pages        = {3424--3436},
  year         = {2024},
  url          = {https://doi.org/10.1007/s13198-024-02350-7},
  doi          = {10.1007/S13198-024-02350-7},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/saem/AlamKRAM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/KumarTAKC24,
  author       = {Sachin Kumar and
                  Akshit Tyagi and
                  Kadambri Agarwal and
                  Saru Kumari and
                  Chien{-}Ming Chen},
  title        = {A trustworthy data collection approach from sensor nodes using trust
                  score of mobile vehicles for smart city},
  journal      = {Secur. Priv.},
  volume       = {7},
  number       = {4},
  year         = {2024},
  url          = {https://doi.org/10.1002/spy2.382},
  doi          = {10.1002/SPY2.382},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/KumarTAKC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/SankhwarACJJV24,
  author       = {Shweta Sankhwar and
                  Rupali Ahuja and
                  Tanya Choubey and
                  Priyanshi Jain and
                  Tanusha Jain and
                  Muskan Verma},
  title        = {Cybercrime in India: An analysis of crime against women in ever expanding
                  digital space},
  journal      = {Secur. Priv.},
  volume       = {7},
  number       = {1},
  year         = {2024},
  url          = {https://doi.org/10.1002/spy2.340},
  doi          = {10.1002/SPY2.340},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/SankhwarACJJV24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sbcjis/MedeirosJACCNS24,
  author       = {Alana Miranda Medeiros and
                  Jo{\~{a}}o L{\'{u}}cio de Souza J{\'{u}}nior and
                  Marisa C. M. A. de Andrade and
                  Saulo William Da Silva Costa and
                  Fernando Augusto Ribeiro Costa and
                  Nelson Cruz Sampaio Neto and
                  Marcos C{\'{e}}sar da Rocha Seruffo},
  title        = {Application of a multicriteria decision model for the classification
                  of Para{\'{\i}}ba's municipalities as to the occurrence of domestic
                  and family violence against women},
  journal      = {J. Interact. Syst.},
  volume       = {15},
  number       = {1},
  pages        = {323--332},
  year         = {2024},
  url          = {https://doi.org/10.5753/jis.2024.3740},
  doi          = {10.5753/JIS.2024.3740},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sbcjis/MedeirosJACCNS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scientometrics/BhartiAE24,
  author       = {Prabhat Kumar Bharti and
                  Mayank Agarwal and
                  Asif Ekbal},
  title        = {Please be polite to your peers: a multi-task model for assessing the
                  tone and objectivity of critiques of peer review comments},
  journal      = {Scientometrics},
  volume       = {129},
  number       = {3},
  pages        = {1377--1413},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11192-024-04938-z},
  doi          = {10.1007/S11192-024-04938-Z},
  timestamp    = {Thu, 11 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scientometrics/BhartiAE24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scirobotics/Crawford24,
  author       = {Jacob E. Crawford},
  title        = {Virus-blocking mosquitoes take flight in the fight against dengue},
  journal      = {Sci. Robotics},
  volume       = {9},
  number       = {92},
  year         = {2024},
  url          = {https://doi.org/10.1126/scirobotics.adr0224},
  doi          = {10.1126/SCIROBOTICS.ADR0224},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scirobotics/Crawford24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scl/RenJNWYZ24,
  author       = {Lu Ren and
                  Yuxin Jin and
                  Zijia Niu and
                  Guofang Wang and
                  Wang Yao and
                  Xiao Zhang},
  title        = {Optimal strategies for large-scale pursuers against one evader: {A}
                  mean field game-based hierarchical control approach},
  journal      = {Syst. Control. Lett.},
  volume       = {183},
  pages        = {105697},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.sysconle.2023.105697},
  doi          = {10.1016/J.SYSCONLE.2023.105697},
  timestamp    = {Mon, 20 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scl/RenJNWYZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/AgarwalSA24,
  author       = {Anurag Agarwal and
                  Asif Salahuddin and
                  Mohammed Jalal Ahamed},
  title        = {Demonstration of a Transparent and Adhesive Sealing Top for Microfluidic
                  Lab-Chip Applications},
  journal      = {Sensors},
  volume       = {24},
  number       = {6},
  pages        = {1797},
  year         = {2024},
  url          = {https://doi.org/10.3390/s24061797},
  doi          = {10.3390/S24061797},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/AgarwalSA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/AgazarDFGILLMMMPRB24,
  author       = {Mohamed Agazar and
                  Giovanni D'Avanzo and
                  Guglielmo Frigo and
                  Domenico Giordano and
                  Claudio Iodice and
                  Palma Sara Letizia and
                  Mario Luiso and
                  Andrea Mariscotti and
                  Alessandro Mingotti and
                  Fabio Mu{\~{n}}oz and
                  Daniele Palladini and
                  Gert Rietveld and
                  Helko E. van den Brom},
  title        = {Power Grids and Instrument Transformers up to 150 kHz: {A} Review
                  of Literature and Standards},
  journal      = {Sensors},
  volume       = {24},
  number       = {13},
  pages        = {4148},
  year         = {2024},
  url          = {https://doi.org/10.3390/s24134148},
  doi          = {10.3390/S24134148},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/AgazarDFGILLMMMPRB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/HospDSSAW24,
  author       = {Benedikt W. Hosp and
                  Martin Dechant and
                  Yannick Sauer and
                  Bj{\"{o}}rn Severitt and
                  Rajat Agarwala and
                  Siegfried Wahl},
  title        = {VisionaryVR: An Optical Simulation Tool for Evaluating and Optimizing
                  Vision Correction Solutions in Virtual Reality},
  journal      = {Sensors},
  volume       = {24},
  number       = {8},
  pages        = {2458},
  year         = {2024},
  url          = {https://doi.org/10.3390/s24082458},
  doi          = {10.3390/S24082458},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/HospDSSAW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/IonescuCYKMBOFYN24,
  author       = {Clara M. Ionescu and
                  Dana Copot and
                  Erhan Yumuk and
                  Robin De Keyser and
                  Cristina I. Muresan and
                  Isabela Roxana Birs and
                  Ghada Ben Othman and
                  Hamed Farbakhsh and
                  Amani R. Ynineb and
                  Martine Neckebroek},
  title        = {Development, Validation, and Comparison of a Novel Nociception/Anti-Nociception
                  Monitor against Two Commercial Monitors in General Anesthesia},
  journal      = {Sensors},
  volume       = {24},
  number       = {7},
  pages        = {2031},
  year         = {2024},
  url          = {https://doi.org/10.3390/s24072031},
  doi          = {10.3390/S24072031},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/IonescuCYKMBOFYN24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/IqbalBM24,
  author       = {Umair Iqbal and
                  Johan Barth{\'{e}}lemy and
                  Guillaume Michal},
  title        = {An End-to-End Artificial Intelligence of Things (AIoT) Solution for
                  Protecting Pipeline Easements against External Interference - An Australian
                  Use-Case},
  journal      = {Sensors},
  volume       = {24},
  number       = {9},
  pages        = {2799},
  year         = {2024},
  url          = {https://doi.org/10.3390/s24092799},
  doi          = {10.3390/S24092799},
  timestamp    = {Tue, 18 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/IqbalBM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/KangHL24,
  author       = {Tenglong Kang and
                  Yifan Hou and
                  Ding Liu},
  title        = {Sensor Network Attack Synthesis against Fault Diagnosis of Discrete
                  Event Systems},
  journal      = {Sensors},
  volume       = {24},
  number       = {14},
  pages        = {4445},
  year         = {2024},
  url          = {https://doi.org/10.3390/s24144445},
  doi          = {10.3390/S24144445},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/KangHL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/KaratzasACZVBFRBM24,
  author       = {Nicolaos Karatzas and
                  Patrik Abdelnour and
                  Jason Philip Aaron Hiro Corban and
                  Kevin Y. Zhao and
                  Louis{-}Nicolas Veilleux and
                  Stephane G. Bergeron and
                  Thomas Fevens and
                  Hassan Rivaz and
                  Athanasios Babouras and
                  Paul A. Martineau},
  title        = {Comparing a Portable Motion Analysis System against the Gold Standard
                  for Potential Anterior Cruciate Ligament Injury Prevention and Screening},
  journal      = {Sensors},
  volume       = {24},
  number       = {6},
  pages        = {1970},
  year         = {2024},
  url          = {https://doi.org/10.3390/s24061970},
  doi          = {10.3390/S24061970},
  timestamp    = {Mon, 13 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/KaratzasACZVBFRBM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/KowalMWDBMSMWPMWP24,
  author       = {Mateusz Kowal and
                  Ewa Morgiel and
                  Slawomir Winiarski and
                  Robert Dymarek and
                  Weronika Bajer and
                  Marta Madej and
                  Agata Sebastian and
                  Marcin Madziarski and
                  Nicole Wedel and
                  Krzysztof Proc and
                  Katarzyna Madziarska and
                  Piotr Wiland and
                  Malgorzata Paprocka{-}Borowicz},
  title        = {Ebbing Strength, Fading Power: Unveiling the Impact of Persistent
                  Fatigue on Muscle Performance in {COVID-19} Survivors},
  journal      = {Sensors},
  volume       = {24},
  number       = {4},
  pages        = {1250},
  year         = {2024},
  url          = {https://doi.org/10.3390/s24041250},
  doi          = {10.3390/S24041250},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/KowalMWDBMSMWPMWP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/LeeMCKL24,
  author       = {Sang{-}su Lee and
                  Jong{-}sik Moon and
                  Yong{-}je Choi and
                  Daewon Kim and
                  Seungkwang Lee},
  title        = {{DTR-SHIELD:} Mutual Synchronization for Protecting against DoS Attacks
                  on the {SHIELD} Protocol with {AES-CTR} Mode},
  journal      = {Sensors},
  volume       = {24},
  number       = {13},
  pages        = {4163},
  year         = {2024},
  url          = {https://doi.org/10.3390/s24134163},
  doi          = {10.3390/S24134163},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/LeeMCKL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/LiLAJLSCA24,
  author       = {Wei Li and
                  Manpeng Li and
                  Muhammad Awais and
                  Leilei Ji and
                  Haoming Li and
                  Rui Song and
                  Muhammad Jehanzeb Masud Cheema and
                  Ramesh K. Agarwal},
  title        = {Research on Assimilation of Unmanned Aerial Vehicle Remote Sensing
                  Data and AquaCrop Model},
  journal      = {Sensors},
  volume       = {24},
  number       = {10},
  pages        = {3255},
  year         = {2024},
  url          = {https://doi.org/10.3390/s24103255},
  doi          = {10.3390/S24103255},
  timestamp    = {Tue, 18 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/LiLAJLSCA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/LuoWTLY24,
  author       = {Peng Luo and
                  Buhong Wang and
                  Jiwei Tian and
                  Chao Liu and
                  Yong Yang},
  title        = {Adversarial Attacks against Deep-Learning-Based Automatic Dependent
                  Surveillance-Broadcast Unsupervised Anomaly Detection Models in the
                  Context of Air Traffic Management},
  journal      = {Sensors},
  volume       = {24},
  number       = {11},
  pages        = {3584},
  year         = {2024},
  url          = {https://doi.org/10.3390/s24113584},
  doi          = {10.3390/S24113584},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/LuoWTLY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/MaLG24,
  author       = {Bowen Ma and
                  Qing Lu and
                  Zhou Gu},
  title        = {Resilient Event-Based Fuzzy Fault Detection for {DC} Microgrids in
                  Finite-Frequency Domain against DoS Attacks},
  journal      = {Sensors},
  volume       = {24},
  number       = {9},
  pages        = {2677},
  year         = {2024},
  url          = {https://doi.org/10.3390/s24092677},
  doi          = {10.3390/S24092677},
  timestamp    = {Tue, 18 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/MaLG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/MaromBADKKD24,
  author       = {Pnina Marom and
                  Michael Brik and
                  Nirit Agay and
                  Rachel Dankner and
                  Zoya Katzir and
                  Naama Keshet and
                  Dana Doron},
  title        = {The Reliability and Validity of the OneStep Smartphone Application
                  for Gait Analysis among Patients Undergoing Rehabilitation for Unilateral
                  Lower Limb Disability},
  journal      = {Sensors},
  volume       = {24},
  number       = {11},
  pages        = {3594},
  year         = {2024},
  url          = {https://doi.org/10.3390/s24113594},
  doi          = {10.3390/S24113594},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/MaromBADKKD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/MiloneLMMRD24,
  author       = {Dario Milone and
                  Francesco Longo and
                  Giovanni Merlino and
                  Cristiano De Marchis and
                  Giacomo Risitano and
                  Luca D'Agati},
  title        = {MocapMe: DeepLabCut-Enhanced Neural Network for Enhanced Markerless
                  Stability in Sit-to-Stand Motion Capture},
  journal      = {Sensors},
  volume       = {24},
  number       = {10},
  pages        = {3022},
  year         = {2024},
  url          = {https://doi.org/10.3390/s24103022},
  doi          = {10.3390/S24103022},
  timestamp    = {Tue, 18 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/MiloneLMMRD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/MoskalJPZ24,
  author       = {Arkadiusz Moskal and
                  Wiktor Jagodowicz and
                  Agata Penconek and
                  Krzysztof Zaraska},
  title        = {Low-Cost Sensor System for Air Purification Process Evaluation},
  journal      = {Sensors},
  volume       = {24},
  number       = {6},
  pages        = {1769},
  year         = {2024},
  url          = {https://doi.org/10.3390/s24061769},
  doi          = {10.3390/S24061769},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/MoskalJPZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/ParentGRP24,
  author       = {Andr{\'{e}}e{-}Anne Parent and
                  Veronica Guadagni and
                  Jean M. Rawling and
                  Marc J. Poulin},
  title        = {Performance Evaluation of a New Sport Watch in Sleep Tracking: {A}
                  Comparison against Overnight Polysomnography in Young Adults},
  journal      = {Sensors},
  volume       = {24},
  number       = {7},
  pages        = {2218},
  year         = {2024},
  url          = {https://doi.org/10.3390/s24072218},
  doi          = {10.3390/S24072218},
  timestamp    = {Mon, 06 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/ParentGRP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/SalmiB24,
  author       = {Younes Salmi and
                  Hanna Bogucka},
  title        = {Poisoning Attacks against Communication and Computing Task Classification
                  and Detection Techniques},
  journal      = {Sensors},
  volume       = {24},
  number       = {2},
  pages        = {338},
  year         = {2024},
  url          = {https://doi.org/10.3390/s24020338},
  doi          = {10.3390/S24020338},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/SalmiB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/SzlapaKulaKKBK24,
  author       = {Agata Szlapa{-}Kula and
                  Slawomir Kula and
                  Lukasz Kazmierski and
                  Anna Biernasiuk and
                  Przemyslaw Krawczyk},
  title        = {Can a Small Change in the Heterocyclic Substituent Significantly Impact
                  the Physicochemical and Biological Properties of (Z)-2-(5-Benzylidene-4-oxo-2-thioxothiazolidin-3-yl)acetic
                  Acid Derivatives?},
  journal      = {Sensors},
  volume       = {24},
  number       = {5},
  pages        = {1524},
  year         = {2024},
  url          = {https://doi.org/10.3390/s24051524},
  doi          = {10.3390/S24051524},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/SzlapaKulaKKBK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/TranKSN24,
  author       = {Cuong Dinh Tran and
                  Martin Kuchar and
                  Vojtech Sotola and
                  Phuong Duy Nguyen},
  title        = {Fault-Tolerant Control Based on Current Space Vectors against Total
                  Sensor Failures},
  journal      = {Sensors},
  volume       = {24},
  number       = {11},
  pages        = {3558},
  year         = {2024},
  url          = {https://doi.org/10.3390/s24113558},
  doi          = {10.3390/S24113558},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/TranKSN24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/WziatekKuczmikSCMNS24,
  author       = {Daria Wziatek{-}Kuczmik and
                  Antoni Swiatkowski and
                  Armand Cholewka and
                  Aleksandra Mrowiec and
                  Iwona Niedzielska and
                  Agata Stanek},
  title        = {Thermal Imaging of the Tongue Surface as a Predictive Method in the
                  Diagnosis of Type 2 Diabetes Mellitus},
  journal      = {Sensors},
  volume       = {24},
  number       = {8},
  pages        = {2447},
  year         = {2024},
  url          = {https://doi.org/10.3390/s24082447},
  doi          = {10.3390/S24082447},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/WziatekKuczmikSCMNS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamco/SanjariSY24,
  author       = {Sina Sanjari and
                  Naci Saldi and
                  Serdar Y{\"{u}}ksel},
  title        = {Nash Equilibria for Exchangeable Team-Against-Team Games, Their Mean-Field
                  Limit, and the Role of Common Randomness},
  journal      = {{SIAM} J. Control. Optim.},
  volume       = {62},
  number       = {3},
  pages        = {1437--1464},
  year         = {2024},
  url          = {https://doi.org/10.1137/22m1534055},
  doi          = {10.1137/22M1534055},
  timestamp    = {Wed, 12 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamco/SanjariSY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigmetrics/AgarwalK24,
  author       = {Khushboo Agarwal and
                  Veeraruna Kavitha},
  title        = {Robust fake-post detection against real-coloring adversaries},
  journal      = {{SIGMETRICS} Perform. Evaluation Rev.},
  volume       = {51},
  number       = {4},
  pages        = {30--31},
  year         = {2024},
  url          = {https://doi.org/10.1145/3649477.3649494},
  doi          = {10.1145/3649477.3649494},
  timestamp    = {Wed, 20 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigmetrics/AgarwalK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigpro/FengWS24,
  author       = {Pengxing Feng and
                  Zhi{-}Yong Wang and
                  Hing Cheung So},
  title        = {Projection FxLMS framework of active noise control against impulsive
                  noise environments},
  journal      = {Signal Process.},
  volume       = {225},
  pages        = {109624},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.sigpro.2024.109624},
  doi          = {10.1016/J.SIGPRO.2024.109624},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigpro/FengWS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigpro/HuangLWL24,
  author       = {Yingkai Huang and
                  Zhuxian Liu and
                  Qiwen Wu and
                  Xiaolong Liu},
  title        = {Robust image steganography against {JPEG} compression based on {DCT}
                  residual modulation},
  journal      = {Signal Process.},
  volume       = {219},
  pages        = {109431},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.sigpro.2024.109431},
  doi          = {10.1016/J.SIGPRO.2024.109431},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigpro/HuangLWL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigpro/YuanLWZ24,
  author       = {Zihan Yuan and
                  Li Li and
                  Zichi Wang and
                  Xinpeng Zhang},
  title        = {Ambiguity attack against text-to-image diffusion model watermarking},
  journal      = {Signal Process.},
  volume       = {221},
  pages        = {109509},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.sigpro.2024.109509},
  doi          = {10.1016/J.SIGPRO.2024.109509},
  timestamp    = {Mon, 05 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigpro/YuanLWZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigpro/ZhengLZYJ24,
  author       = {Hao Zheng and
                  Yang Liu and
                  Yinghui Zhang and
                  Junkun Yan and
                  Bo Jiu},
  title        = {Pulse train coding and decoding matrix design based {ECCM} scheme
                  for {MIMO} radar against interrupted sampling repeater jamming},
  journal      = {Signal Process.},
  volume       = {214},
  pages        = {109245},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.sigpro.2023.109245},
  doi          = {10.1016/J.SIGPRO.2023.109245},
  timestamp    = {Tue, 19 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigpro/ZhengLZYJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/simpra/DaraghmehAJ24,
  author       = {Mustafa Daraghmeh and
                  Anjali Agarwal and
                  Yaser Jararweh},
  title        = {Optimizing serverless computing: {A} comparative analysis of multi-output
                  regression models for predictive function invocations},
  journal      = {Simul. Model. Pract. Theory},
  volume       = {134},
  pages        = {102925},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.simpat.2024.102925},
  doi          = {10.1016/J.SIMPAT.2024.102925},
  timestamp    = {Thu, 04 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/simpra/DaraghmehAJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sivp/AgarwalR24,
  author       = {Kanika Agarwal and
                  Chandra Shekhar Rai},
  title        = {Constrained complex correntropy applied to adaptive beamforming in
                  non-Gaussian noise environment},
  journal      = {Signal Image Video Process.},
  volume       = {18},
  number       = {3},
  pages        = {2333--2343},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11760-023-02910-7},
  doi          = {10.1007/S11760-023-02910-7},
  timestamp    = {Tue, 26 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sivp/AgarwalR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sivp/MehraRA24,
  author       = {Sunakshi Mehra and
                  Virender Ranga and
                  Ritu Agarwal},
  title        = {Improving speech command recognition through decision-level fusion
                  of deep filtered speech cues},
  journal      = {Signal Image Video Process.},
  volume       = {18},
  number       = {2},
  pages        = {1365--1373},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11760-023-02845-z},
  doi          = {10.1007/S11760-023-02845-Z},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sivp/MehraRA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sivp/OzerKOGKC24,
  author       = {Ilyas Ozer and
                  Ali Can Karaca and
                  Caner Kaya Ozer and
                  Kutlucan Gorur and
                  Ismail Kocak and
                  Onursal Cetin},
  title        = {The exploration of the transfer learning technique for Globotruncanita
                  genus against the limited low-cost light microscope images},
  journal      = {Signal Image Video Process.},
  volume       = {18},
  number       = {8},
  pages        = {6363--6377},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11760-024-03322-x},
  doi          = {10.1007/S11760-024-03322-X},
  timestamp    = {Tue, 06 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sivp/OzerKOGKC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sivp/YuanCWWXOW24,
  author       = {An Yuan and
                  Nian Cai and
                  Zhouyixiao Wu and
                  Zhiliang Wu and
                  Shaoqiu Xu and
                  Weicheng Ou and
                  Han Wang},
  title        = {Visual inspection via a global-to-local optimization method for agarwood
                  sticks},
  journal      = {Signal Image Video Process.},
  volume       = {18},
  number       = {1},
  pages        = {27--35},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11760-023-02704-x},
  doi          = {10.1007/S11760-023-02704-X},
  timestamp    = {Tue, 13 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sivp/YuanCWWXOW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sj/JoseASGCB24,
  author       = {Justin Jose and
                  Anirudh Agarwal and
                  Parvez Shaik and
                  Vinat Goyal and
                  Kwonhue Choi and
                  Vimal Bhatia},
  title        = {Performance Analysis and Learning-Assisted Power Control for {NOMA}
                  Enabled D2D-Cellular Network},
  journal      = {{IEEE} Syst. J.},
  volume       = {18},
  number       = {1},
  pages        = {278--281},
  year         = {2024},
  url          = {https://doi.org/10.1109/JSYST.2023.3331123},
  doi          = {10.1109/JSYST.2023.3331123},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sj/JoseASGCB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sj/ZhangSAK24,
  author       = {Daotong Zhang and
                  Peng Shi and
                  Ramesh K. Agarwal and
                  Levente Kov{\'{a}}cs},
  title        = {Reference Tracking {MPC} for Cyber-Physical Systems Under Denial-of-Service
                  Attacks: An Omnidirectional Robot Application},
  journal      = {{IEEE} Syst. J.},
  volume       = {18},
  number       = {2},
  pages        = {1248--1256},
  year         = {2024},
  url          = {https://doi.org/10.1109/JSYST.2024.3384372},
  doi          = {10.1109/JSYST.2024.3384372},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sj/ZhangSAK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/smr/ZhangLLJMLL24,
  author       = {Huangzhao Zhang and
                  Shuai Lu and
                  Zhuo Li and
                  Zhi Jin and
                  Lei Ma and
                  Yang Liu and
                  Ge Li},
  title        = {CodeBERT-Attack: Adversarial attack against source code deep learning
                  models via pre-trained model},
  journal      = {J. Softw. Evol. Process.},
  volume       = {36},
  number       = {3},
  year         = {2024},
  url          = {https://doi.org/10.1002/smr.2571},
  doi          = {10.1002/SMR.2571},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/smr/ZhangLLJMLL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/snam/AkinnubiAAA24,
  author       = {Abiola Akinnubi and
                  Mustafa Alassad and
                  Ridwan Amure and
                  Nitin Agarwal},
  title        = {{KG-CFSA:} a comprehensive approach for analyzing multi-source heterogeneous
                  social network knowledge graph},
  journal      = {Soc. Netw. Anal. Min.},
  volume       = {14},
  number       = {1},
  pages        = {159},
  year         = {2024},
  url          = {https://doi.org/10.1007/s13278-024-01320-y},
  doi          = {10.1007/S13278-024-01320-Y},
  timestamp    = {Sun, 18 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/snam/AkinnubiAAA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/snam/AlkhateebBA23,
  author       = {Samer Al{-}khateeb and
                  Jack Burright and
                  Nitin Agarwal},
  title        = {Evaluating collective action theory-based model to simulate mobs},
  journal      = {Soc. Netw. Anal. Min.},
  volume       = {14},
  number       = {1},
  pages        = {127},
  year         = {2024},
  url          = {https://doi.org/10.1007/s13278-024-01284-z},
  doi          = {10.1007/S13278-024-01284-Z},
  timestamp    = {Wed, 17 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/snam/AlkhateebBA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/snam/MbilaUmaKUAA24,
  author       = {Stella Mbila{-}Uma and
                  Oyindamola Koleoso and
                  Ifeanyichukwu Umoga and
                  Mustafa Alassad and
                  Nitin Agarwal},
  title        = {The Multi-attribute impact of hyperlinks in blogs: an emotion-centric
                  approach},
  journal      = {Soc. Netw. Anal. Min.},
  volume       = {14},
  number       = {1},
  pages        = {134},
  year         = {2024},
  url          = {https://doi.org/10.1007/s13278-024-01295-w},
  doi          = {10.1007/S13278-024-01295-W},
  timestamp    = {Tue, 23 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/snam/MbilaUmaKUAA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sncs/ShuklaASS24,
  author       = {Rashmi G. Shukla and
                  Anuja Agarwal and
                  Vidhu Shekhar and
                  Shekhar Shukla},
  title        = {A Fuzzy Approach to Assess Blockchain for Sustainable Transformation
                  of Healthcare},
  journal      = {{SN} Comput. Sci.},
  volume       = {5},
  number       = {1},
  pages        = {44},
  year         = {2024},
  url          = {https://doi.org/10.1007/s42979-023-02331-w},
  doi          = {10.1007/S42979-023-02331-W},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sncs/ShuklaASS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sncs/VashisthaT24,
  author       = {Astha Vashistha and
                  Anoop Kumar Tiwari},
  title        = {Building Resilience in Banking Against Fraud with Hyper Ensemble Machine
                  Learning and Anomaly Detection Strategies},
  journal      = {{SN} Comput. Sci.},
  volume       = {5},
  number       = {5},
  pages        = {556},
  year         = {2024},
  url          = {https://doi.org/10.1007/s42979-024-02854-w},
  doi          = {10.1007/S42979-024-02854-W},
  timestamp    = {Tue, 25 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sncs/VashisthaT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sncs/VermaG24,
  author       = {Chakradhar Verma and
                  C. P. Gupta},
  title        = {Effect of Vaccination on Stability of Wireless Sensor Network Against
                  Malware Attack: An Epidemiological Model},
  journal      = {{SN} Comput. Sci.},
  volume       = {5},
  number       = {2},
  pages        = {240},
  year         = {2024},
  url          = {https://doi.org/10.1007/s42979-023-02532-3},
  doi          = {10.1007/S42979-023-02532-3},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sncs/VermaG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sncs/YadavRA24,
  author       = {Sapna Yadav and
                  Syed Afzal Murtaza Rizvi and
                  Pankaj Agarwal},
  title        = {Detection of Lung Diseases for Pneumonia, Tuberculosis, and {COVID-19}
                  with Artificial Intelligence Tools},
  journal      = {{SN} Comput. Sci.},
  volume       = {5},
  number       = {3},
  pages        = {303},
  year         = {2024},
  url          = {https://doi.org/10.1007/s42979-024-02617-7},
  doi          = {10.1007/S42979-024-02617-7},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sncs/YadavRA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/soco/ManikandanRJSA24,
  author       = {V. Manikandan and
                  Vinoth Raj and
                  Siva Janakiraman and
                  R. Sivaraman and
                  Rengarajan Amirtharajan},
  title        = {Let wavelet authenticate and tent-map encrypt: a sacred connect against
                  a secret nexus},
  journal      = {Soft Comput.},
  volume       = {28},
  number       = {9-10},
  pages        = {6839--6853},
  year         = {2024},
  url          = {https://doi.org/10.1007/s00500-023-09580-0},
  doi          = {10.1007/S00500-023-09580-0},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/soco/ManikandanRJSA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/soco/MishraKRBRAK24,
  author       = {Rashmi Mishra and
                  Kavita and
                  Ankit Rajpal and
                  Varnika Bhatia and
                  Sheetal Rajpal and
                  Manoj Agarwal and
                  Naveen Kumar},
  title        = {{I-LDD:} an interpretable leaf disease detector},
  journal      = {Soft Comput.},
  volume       = {28},
  number       = {3},
  pages        = {2517--2533},
  year         = {2024},
  url          = {https://doi.org/10.1007/s00500-023-08512-2},
  doi          = {10.1007/S00500-023-08512-2},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/soco/MishraKRBRAK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/software/BullK24,
  author       = {Christopher Bull and
                  Ahmed Kharrufa},
  title        = {Generative Artificial Intelligence Assistants in Software Development
                  Education: {A} Vision for Integrating Generative Artificial Intelligence
                  Into Educational Practice, Not Instinctively Defending Against It},
  journal      = {{IEEE} Softw.},
  volume       = {41},
  number       = {2},
  pages        = {52--59},
  year         = {2024},
  url          = {https://doi.org/10.1109/MS.2023.3300574},
  doi          = {10.1109/MS.2023.3300574},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/software/BullK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/softx/BerardiGMMP24,
  author       = {Davide Berardi and
                  Saverio Giallorenzo and
                  Andrea Melis and
                  Simone Melloni and
                  Marco Prandini},
  title        = {Ranflood: {A} mitigation tool based on the principles of data flooding
                  against ransomware},
  journal      = {SoftwareX},
  volume       = {25},
  pages        = {101605},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.softx.2023.101605},
  doi          = {10.1016/J.SOFTX.2023.101605},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/softx/BerardiGMMP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spl/DongCMZ24,
  author       = {Shihang Dong and
                  Beijing Chen and
                  Kaijie Ma and
                  Guoying Zhao},
  title        = {Active Defense Against Voice Conversion Through Generative Adversarial
                  Network},
  journal      = {{IEEE} Signal Process. Lett.},
  volume       = {31},
  pages        = {706--710},
  year         = {2024},
  url          = {https://doi.org/10.1109/LSP.2024.3365034},
  doi          = {10.1109/LSP.2024.3365034},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/spl/DongCMZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spl/MiaoNT24,
  author       = {Yifan Miao and
                  Wanli Ni and
                  Hui Tian},
  title        = {One-Bit Aggregation for Over-the-Air Federated Learning Against Byzantine
                  Attacks},
  journal      = {{IEEE} Signal Process. Lett.},
  volume       = {31},
  pages        = {1024--1028},
  year         = {2024},
  url          = {https://doi.org/10.1109/LSP.2024.3384077},
  doi          = {10.1109/LSP.2024.3384077},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/spl/MiaoNT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spl/WangWXZ24,
  author       = {Heng Wang and
                  Hongxia Wang and
                  Jinghong Xia and
                  Fei Zhang},
  title        = {Robust Watermarking Against Camera Shooting for PowerPoint Presentation},
  journal      = {{IEEE} Signal Process. Lett.},
  volume       = {31},
  pages        = {1264--1268},
  year         = {2024},
  url          = {https://doi.org/10.1109/LSP.2024.3393392},
  doi          = {10.1109/LSP.2024.3393392},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/spl/WangWXZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spl/XiaoLZL24,
  author       = {Wudang Xiao and
                  Yingsong Li and
                  Luyu Zhao and
                  Rodrigo C. de Lamare},
  title        = {Robust {DOA} Estimation Against Outliers via Joint Sparse Representation},
  journal      = {{IEEE} Signal Process. Lett.},
  volume       = {31},
  pages        = {2015--2019},
  year         = {2024},
  url          = {https://doi.org/10.1109/LSP.2024.3436675},
  doi          = {10.1109/LSP.2024.3436675},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/spl/XiaoLZL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spl/XuQXWZ24,
  author       = {Shengwang Xu and
                  Tong Qiao and
                  Ming Xu and
                  Wei Wang and
                  Ning Zheng},
  title        = {Robust Adversarial Watermark Defending Against {GAN} Synthesization
                  Attack},
  journal      = {{IEEE} Signal Process. Lett.},
  volume       = {31},
  pages        = {351--355},
  year         = {2024},
  url          = {https://doi.org/10.1109/LSP.2024.3350983},
  doi          = {10.1109/LSP.2024.3350983},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/spl/XuQXWZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spl/YangLYE24,
  author       = {Hao Yang and
                  Tiancheng Li and
                  Junkun Yan and
                  V{\'{\i}}ctor Elvira},
  title        = {Hierarchical Average Fusion With {GM-PHD} Filters Against {FDI} and
                  DoS Attacks},
  journal      = {{IEEE} Signal Process. Lett.},
  volume       = {31},
  pages        = {934--938},
  year         = {2024},
  url          = {https://doi.org/10.1109/LSP.2024.3356823},
  doi          = {10.1109/LSP.2024.3356823},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/spl/YangLYE24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spl/ZhangJPYT24,
  author       = {Zhanxi Zhang and
                  Lijuan Jia and
                  Senran Peng and
                  Zi{-}Jiang Yang and
                  Ran Tao},
  title        = {Communication-Efficient Secure Distributed Estimation With Noisy Measurement
                  Against {FDI} Attack},
  journal      = {{IEEE} Signal Process. Lett.},
  volume       = {31},
  pages        = {1214--1218},
  year         = {2024},
  url          = {https://doi.org/10.1109/LSP.2024.3388963},
  doi          = {10.1109/LSP.2024.3388963},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/spl/ZhangJPYT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spm/GrigoryanA24,
  author       = {Artyom M. Grigoryan and
                  Sos S. Agaian},
  title        = {Quaternion-Based Arithmetic in Quantum Information Processing: {A}
                  promising approach for efficient color quantum imaging [Hypercomplex
                  Signal and Image Processing]},
  journal      = {{IEEE} Signal Process. Mag.},
  volume       = {41},
  number       = {2},
  pages        = {64--74},
  year         = {2024},
  url          = {https://doi.org/10.1109/MSP.2023.3327627},
  doi          = {10.1109/MSP.2023.3327627},
  timestamp    = {Thu, 04 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/spm/GrigoryanA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/staeors/DhoteASCTOPS24,
  author       = {Pankaj R. Dhote and
                  Ankit Agarwal and
                  Gaurish Singhal and
                  St{\'{e}}phane Calmant and
                  Praveen K. Thakur and
                  Hind Oubanas and
                  Adrien Paris and
                  Raghavendra P. Singh},
  title        = {River Water Level and Water Surface Slope Measurement From Spaceborne
                  Radar and LiDAR Altimetry: Evaluation and Implications for Hydrological
                  Studies in the Ganga River},
  journal      = {{IEEE} J. Sel. Top. Appl. Earth Obs. Remote. Sens.},
  volume       = {17},
  pages        = {7825--7840},
  year         = {2024},
  url          = {https://doi.org/10.1109/JSTARS.2024.3379874},
  doi          = {10.1109/JSTARS.2024.3379874},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/staeors/DhoteASCTOPS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/staeors/ZhangGWHXJZ24,
  author       = {Yu Zhang and
                  Zhiqiang Gong and
                  Hao Wen and
                  Xikun Hu and
                  Xiaoyan Xia and
                  Hejun Jiang and
                  Ping Zhong},
  title        = {Pattern Corruption-Assisted Physical Attacks Against Object Detection
                  in {UAV} Remote Sensing},
  journal      = {{IEEE} J. Sel. Top. Appl. Earth Obs. Remote. Sens.},
  volume       = {17},
  pages        = {12931--12944},
  year         = {2024},
  url          = {https://doi.org/10.1109/JSTARS.2024.3422377},
  doi          = {10.1109/JSTARS.2024.3422377},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/staeors/ZhangGWHXJZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/staeors/ZhangYMZ24,
  author       = {Fan Zhang and
                  Yameng Yu and
                  Fei Ma and
                  Yongsheng Zhou},
  title        = {A Physically Realizable Adversarial Attack Method Against {SAR} Target
                  Recognition Model},
  journal      = {{IEEE} J. Sel. Top. Appl. Earth Obs. Remote. Sens.},
  volume       = {17},
  pages        = {11943--11957},
  year         = {2024},
  url          = {https://doi.org/10.1109/JSTARS.2024.3420690},
  doi          = {10.1109/JSTARS.2024.3420690},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/staeors/ZhangYMZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/staeors/ZhuMLHM24,
  author       = {Rui Zhu and
                  Shiping Ma and
                  Jiawei Lian and
                  Linyuan He and
                  Shaohui Mei},
  title        = {Generating Adversarial Examples Against Remote Sensing Scene Classification
                  via Feature Approximation},
  journal      = {{IEEE} J. Sel. Top. Appl. Earth Obs. Remote. Sens.},
  volume       = {17},
  pages        = {10174--10187},
  year         = {2024},
  url          = {https://doi.org/10.1109/JSTARS.2024.3399780},
  doi          = {10.1109/JSTARS.2024.3399780},
  timestamp    = {Tue, 18 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/staeors/ZhuMLHM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/symmetry/MohammedABAKY24,
  author       = {Pshtiwan Othman Mohammed and
                  Ravi P. Agarwal and
                  Iver Brevik and
                  Mohamed Abdelwahed and
                  Artion Kashuri and
                  Majeed A. Yousif},
  title        = {On Multiple-Type Wave Solutions for the Nonlinear Coupled Time-Fractional
                  Schr{\"{o}}dinger Model},
  journal      = {Symmetry},
  volume       = {16},
  number       = {5},
  pages        = {553},
  year         = {2024},
  url          = {https://doi.org/10.3390/sym16050553},
  doi          = {10.3390/SYM16050553},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/symmetry/MohammedABAKY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/symmetry/MohammedAYAMC24,
  author       = {Pshtiwan Othman Mohammed and
                  Ravi P. Agarwal and
                  Majeed A. Yousif and
                  Eman Al{-}Sarairah and
                  Sarkhel Akbar Mahmood and
                  Nejmeddine Chorfi},
  title        = {Some Properties of a Falling Function and Related Inequalities on
                  Green's Functions},
  journal      = {Symmetry},
  volume       = {16},
  number       = {3},
  pages        = {337},
  year         = {2024},
  url          = {https://doi.org/10.3390/sym16030337},
  doi          = {10.3390/SYM16030337},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/symmetry/MohammedAYAMC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/symmetry/NietoYMA24,
  author       = {Juan J. Nieto and
                  Ashish Yadav and
                  Trilok Mathur and
                  Shivi Agarwal},
  title        = {Fixed Point Method for Nonlinear Fractional Differential Equations
                  with Integral Boundary Conditions on Tetramethyl-Butane Graph},
  journal      = {Symmetry},
  volume       = {16},
  number       = {6},
  pages        = {756},
  year         = {2024},
  url          = {https://doi.org/10.3390/sym16060756},
  doi          = {10.3390/SYM16060756},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/symmetry/NietoYMA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/symmetry/ZahraNARABA24,
  author       = {Syeda Wajiha Zahra and
                  Muhammad Nadeem and
                  Ali Arshad and
                  Saman Riaz and
                  Waqas Ahmed and
                  Muhammad Abu Bakr and
                  Amerah A. Alabrah},
  title        = {Emergence of Novel WEDEx-Kerberotic Cryptographic Framework to Strengthen
                  the Cloud Data Security against Malicious Attacks},
  journal      = {Symmetry},
  volume       = {16},
  number       = {5},
  pages        = {605},
  year         = {2024},
  url          = {https://doi.org/10.3390/sym16050605},
  doi          = {10.3390/SYM16050605},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/symmetry/ZahraNARABA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tac/DuanXYT24,
  author       = {Xiaoming Duan and
                  Zhe Xu and
                  Rui Yan and
                  Ufuk Topcu},
  title        = {Privacy-Utility Tradeoffs Against Limited Adversaries},
  journal      = {{IEEE} Trans. Autom. Control.},
  volume       = {69},
  number       = {1},
  pages        = {519--526},
  year         = {2024},
  url          = {https://doi.org/10.1109/TAC.2023.3269360},
  doi          = {10.1109/TAC.2023.3269360},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tac/DuanXYT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tac/GaoY24,
  author       = {Rui Gao and
                  Guang{-}Hong Yang},
  title        = {Trust-Based Distributed Secure State Estimation Against Malicious
                  Agents via Two-Hop Communication},
  journal      = {{IEEE} Trans. Autom. Control.},
  volume       = {69},
  number       = {2},
  pages        = {1006--1013},
  year         = {2024},
  url          = {https://doi.org/10.1109/TAC.2023.3274792},
  doi          = {10.1109/TAC.2023.3274792},
  timestamp    = {Sat, 27 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tac/GaoY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tac/KimuraI24,
  author       = {Kosuke Kimura and
                  Hideaki Ishii},
  title        = {Quantized Zero Dynamics Attacks Against Sampled-Data Control Systems},
  journal      = {{IEEE} Trans. Autom. Control.},
  volume       = {69},
  number       = {5},
  pages        = {3418--3425},
  year         = {2024},
  url          = {https://doi.org/10.1109/TAC.2023.3338051},
  doi          = {10.1109/TAC.2023.3338051},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tac/KimuraI24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tac/LeiWZF24,
  author       = {Xuqiang Lei and
                  Guanghui Wen and
                  Wei Xing Zheng and
                  Junjie Fu},
  title        = {Security Strategy Against Location-Varying Sparse Attack on Distributed
                  State Monitoring},
  journal      = {{IEEE} Trans. Autom. Control.},
  volume       = {69},
  number       = {4},
  pages        = {2514--2521},
  year         = {2024},
  url          = {https://doi.org/10.1109/TAC.2023.3307528},
  doi          = {10.1109/TAC.2023.3307528},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tac/LeiWZF24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tac/LiSXXD24,
  author       = {Zhengcai Li and
                  Yang Shi and
                  Shengyuan Xu and
                  Huiling Xu and
                  Lewei Dong},
  title        = {Distributed Model Predictive Consensus of MASs Against False Data
                  Injection Attacks and Denial-of-Service Attacks},
  journal      = {{IEEE} Trans. Autom. Control.},
  volume       = {69},
  number       = {8},
  pages        = {5538--5545},
  year         = {2024},
  url          = {https://doi.org/10.1109/TAC.2024.3371895},
  doi          = {10.1109/TAC.2024.3371895},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tac/LiSXXD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tac/RiveraOrtizKD24,
  author       = {Phillip Rivera{-}Ortiz and
                  Marin Kobilarov and
                  Yancy Diaz{-}Mercado},
  title        = {Pursuer Coordination Against a Fast Evader via Coverage Control},
  journal      = {{IEEE} Trans. Autom. Control.},
  volume       = {69},
  number       = {2},
  pages        = {1119--1124},
  year         = {2024},
  url          = {https://doi.org/10.1109/TAC.2023.3278794},
  doi          = {10.1109/TAC.2023.3278794},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tac/RiveraOrtizKD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tac/TaiLS24,
  author       = {Ruochen Tai and
                  Liyong Lin and
                  Rong Su},
  title        = {On Decidability of Existence of Fortified Supervisors Against Covert
                  Actuator Attackers},
  journal      = {{IEEE} Trans. Autom. Control.},
  volume       = {69},
  number       = {3},
  pages        = {1898--1905},
  year         = {2024},
  url          = {https://doi.org/10.1109/TAC.2023.3329341},
  doi          = {10.1109/TAC.2023.3329341},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tac/TaiLS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tac/UmsonstSDS24,
  author       = {David Umsonst and
                  Serkan Saritas and
                  Gy{\"{o}}rgy D{\'{a}}n and
                  Henrik Sandberg},
  title        = {A Bayesian Nash Equilibrium-Based Moving Target Defense Against Stealthy
                  Sensor Attacks},
  journal      = {{IEEE} Trans. Autom. Control.},
  volume       = {69},
  number       = {3},
  pages        = {1659--1674},
  year         = {2024},
  url          = {https://doi.org/10.1109/TAC.2023.3328754},
  doi          = {10.1109/TAC.2023.3328754},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tac/UmsonstSDS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tac/WangWYS24,
  author       = {Jing Wang and
                  Dongji Wang and
                  Huaicheng Yan and
                  Hao Shen},
  title        = {Composite Antidisturbance {\textdollar}{\textbackslash}mathcal \{H\}{\_}\{{\textbackslash}infty
                  \}{\textdollar} Control for Hidden Markov Jump Systems With Multi-Sensor
                  Against Replay Attacks},
  journal      = {{IEEE} Trans. Autom. Control.},
  volume       = {69},
  number       = {3},
  pages        = {1760--1766},
  year         = {2024},
  url          = {https://doi.org/10.1109/TAC.2023.3326861},
  doi          = {10.1109/TAC.2023.3326861},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tac/WangWYS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tac/YangLSQ24,
  author       = {Yake Yang and
                  Yuzhe Li and
                  Yang Shi and
                  Daniel E. Quevedo},
  title        = {The Vulnerability Analysis of Remote Estimation With Batch-Data Detectors
                  Against Integrity Attacks},
  journal      = {{IEEE} Trans. Autom. Control.},
  volume       = {69},
  number       = {5},
  pages        = {3096--3111},
  year         = {2024},
  url          = {https://doi.org/10.1109/TAC.2023.3332013},
  doi          = {10.1109/TAC.2023.3332013},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tac/YangLSQ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tac/ZhangYJC24,
  author       = {Chencheng Zhang and
                  Hao Yang and
                  Bin Jiang and
                  Ming Cao},
  title        = {Flocking Control Against Malicious Agent},
  journal      = {{IEEE} Trans. Autom. Control.},
  volume       = {69},
  number       = {5},
  pages        = {3278--3285},
  year         = {2024},
  url          = {https://doi.org/10.1109/TAC.2023.3319549},
  doi          = {10.1109/TAC.2023.3319549},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tac/ZhangYJC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tac/ZhongZC24,
  author       = {Bingzhuo Zhong and
                  Majid Zamani and
                  Marco Caccamo},
  title        = {Formal Synthesis of Controllers for Uncertain Linear Systems Against
                  -Regular Properties: {A} Set-Based Approach},
  journal      = {{IEEE} Trans. Autom. Control.},
  volume       = {69},
  number       = {1},
  pages        = {214--229},
  year         = {2024},
  url          = {https://doi.org/10.1109/TAC.2023.3267397},
  doi          = {10.1109/TAC.2023.3267397},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tac/ZhongZC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/taes/HuYYQG24,
  author       = {Pengwei Hu and
                  Jian Yang and
                  Xiang Yu and
                  Jianzhong Qiao and
                  Lei Guo},
  title        = {Underwater Autonomous Geolocalization Using Time Differential Polarization
                  Field Against Measurement Deviations},
  journal      = {{IEEE} Trans. Aerosp. Electron. Syst.},
  volume       = {60},
  number       = {1},
  pages        = {348--359},
  year         = {2024},
  url          = {https://doi.org/10.1109/TAES.2023.3323418},
  doi          = {10.1109/TAES.2023.3323418},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/taes/HuYYQG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/taes/HuangSJLW24,
  author       = {Lijie Huang and
                  Chen Song and
                  Guodong Jin and
                  Pingping Lu and
                  Yu Wang},
  title        = {Multiscale Barrage Jamming Against {SAR:} {A} Jamming Signal Modulation
                  Method and a Template Design Method},
  journal      = {{IEEE} Trans. Aerosp. Electron. Syst.},
  volume       = {60},
  number       = {4},
  pages        = {4543--4558},
  year         = {2024},
  url          = {https://doi.org/10.1109/TAES.2024.3380583},
  doi          = {10.1109/TAES.2024.3380583},
  timestamp    = {Wed, 21 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/taes/HuangSJLW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/taes/KucukNDC24,
  author       = {Mustafa K{\"{u}}{\c{c}}{\"{u}}k and
                  Mustafa Atahan Nuhoglu and
                  Lutfiye Durak{-}Ata and
                  Hakan Ali {\c{C}}irpan},
  title        = {Optimized Scan Rate Modulation Jamming Against Sequential Lobing Radars},
  journal      = {{IEEE} Trans. Aerosp. Electron. Syst.},
  volume       = {60},
  number       = {2},
  pages        = {1440--1449},
  year         = {2024},
  url          = {https://doi.org/10.1109/TAES.2023.3337758},
  doi          = {10.1109/TAES.2023.3337758},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/taes/KucukNDC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/taes/WangJSMZWZ24,
  author       = {Yu Wang and
                  Guodong Jin and
                  Tianyue Shi and
                  Runfa Ma and
                  Ying Zhang and
                  Di Wu and
                  Daiyin Zhu},
  title        = {Knowledge-Aided Precise Jamming Technique Against Spaceborne {SAR}
                  System},
  journal      = {{IEEE} Trans. Aerosp. Electron. Syst.},
  volume       = {60},
  number       = {3},
  pages        = {2791--2806},
  year         = {2024},
  url          = {https://doi.org/10.1109/TAES.2024.3353716},
  doi          = {10.1109/TAES.2024.3353716},
  timestamp    = {Thu, 04 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/taes/WangJSMZWZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tai/DongWSKKX24,
  author       = {Nanqing Dong and
                  Zhipeng Wang and
                  Jiahao Sun and
                  Michael Kampffmeyer and
                  William J. Knottenbelt and
                  Eric P. Xing},
  title        = {Defending Against Poisoning Attacks in Federated Learning With Blockchain},
  journal      = {{IEEE} Trans. Artif. Intell.},
  volume       = {5},
  number       = {7},
  pages        = {3743--3756},
  year         = {2024},
  url          = {https://doi.org/10.1109/TAI.2024.3376651},
  doi          = {10.1109/TAI.2024.3376651},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tai/DongWSKKX24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tai/LiangCP24,
  author       = {Hongjing Liang and
                  Zhenyu Chang and
                  Yingnan Pan},
  title        = {Dual-Event-Triggered Intelligence Security Control for Multiagent
                  Systems Against DoS Attacks With Applications in Mobile Robot Systems},
  journal      = {{IEEE} Trans. Artif. Intell.},
  volume       = {5},
  number       = {2},
  pages        = {916--924},
  year         = {2024},
  url          = {https://doi.org/10.1109/TAI.2023.3275938},
  doi          = {10.1109/TAI.2023.3275938},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tai/LiangCP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tai/ShahidI24,
  author       = {Abdur R. Shahid and
                  Ahmed Imteaj},
  title        = {Securing User Privacy in Cloud-Based Whiteboard Services Against Health
                  Attribute Inference Attacks},
  journal      = {{IEEE} Trans. Artif. Intell.},
  volume       = {5},
  number       = {8},
  pages        = {3872--3885},
  year         = {2024},
  url          = {https://doi.org/10.1109/TAI.2024.3352529},
  doi          = {10.1109/TAI.2024.3352529},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tai/ShahidI24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tai/TakiddinIADS24,
  author       = {Abdulrahman Takiddin and
                  Muhammad Ismail and
                  Rachad Atat and
                  Katherine R. Davis and
                  Erchin Serpedin},
  title        = {Robust Graph Autoencoder-Based Detection of False Data Injection Attacks
                  Against Data Poisoning in Smart Grids},
  journal      = {{IEEE} Trans. Artif. Intell.},
  volume       = {5},
  number       = {3},
  pages        = {1287--1301},
  year         = {2024},
  url          = {https://doi.org/10.1109/TAI.2023.3286831},
  doi          = {10.1109/TAI.2023.3286831},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tai/TakiddinIADS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tai/ZhouWTWZZL24,
  author       = {Huipeng Zhou and
                  Yajie Wang and
                  Yu{-}an Tan and
                  Shangbo Wu and
                  Yuhang Zhao and
                  Quanxin Zhang and
                  Yuanzhang Li},
  title        = {Crafting Transferable Adversarial Examples Against Face Recognition
                  via Gradient Eroding},
  journal      = {{IEEE} Trans. Artif. Intell.},
  volume       = {5},
  number       = {1},
  pages        = {412--419},
  year         = {2024},
  url          = {https://doi.org/10.1109/TAI.2023.3253083},
  doi          = {10.1109/TAI.2023.3253083},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tai/ZhouWTWZZL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/talip/KumarBKMA24,
  author       = {Ankit Kumar and
                  Surbhi Bhatia and
                  Mohammad Reza Khosravi and
                  Arwa A. Mashat and
                  Parul Agarwal},
  title        = {Semantic and Context Understanding for Sentiment Analysis in Hindi
                  Handwritten Character Recognition Using a Multiresolution Technique},
  journal      = {{ACM} Trans. Asian Low Resour. Lang. Inf. Process.},
  volume       = {23},
  number       = {1},
  pages        = {5:1--5:22},
  year         = {2024},
  url          = {https://doi.org/10.1145/3557895},
  doi          = {10.1145/3557895},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/talip/KumarBKMA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tamd/LiLSC24,
  author       = {Yang Li and
                  Huaping Liu and
                  Fuchun Sun and
                  Zhihong Chen},
  title        = {Adversarial Decision Making Against Intelligent Targets in Cooperative
                  Multiagent Systems},
  journal      = {{IEEE} Trans. Cogn. Dev. Syst.},
  volume       = {16},
  number       = {1},
  pages        = {141--150},
  year         = {2024},
  url          = {https://doi.org/10.1109/TCDS.2023.3234061},
  doi          = {10.1109/TCDS.2023.3234061},
  timestamp    = {Fri, 08 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tamd/LiLSC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tase/AnZCY24,
  author       = {Dou An and
                  Feiye Zhang and
                  Feifei Cui and
                  Qingyu Yang},
  title        = {Toward Data Integrity Attacks Against Distributed Dynamic State Estimation
                  in Smart Grid},
  journal      = {{IEEE} Trans Autom. Sci. Eng.},
  volume       = {21},
  number       = {1},
  pages        = {881--894},
  year         = {2024},
  url          = {https://doi.org/10.1109/TASE.2023.3236102},
  doi          = {10.1109/TASE.2023.3236102},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tase/AnZCY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tase/ChenNWLW24,
  author       = {Wen{-}Di Chen and
                  Ben Niu and
                  Huan{-}Qing Wang and
                  Haitao Li and
                  Ding Wang},
  title        = {Adaptive Event-Triggered Control for Non-Strict Feedback Nonlinear
                  CPSs With Time Delays Against Deception Attacks and Actuator Faults},
  journal      = {{IEEE} Trans Autom. Sci. Eng.},
  volume       = {21},
  number       = {3},
  pages        = {4106--4116},
  year         = {2024},
  url          = {https://doi.org/10.1109/TASE.2023.3292367},
  doi          = {10.1109/TASE.2023.3292367},
  timestamp    = {Wed, 21 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tase/ChenNWLW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tase/LiHDGSZ24,
  author       = {Yushuai Li and
                  Bonan Huang and
                  Jing Dai and
                  David Wenzhong Gao and
                  Qiuye Sun and
                  Huaguang Zhang},
  title        = {Distributed Resilient Initialization-Free Jacobi Descent Algorithm
                  for Constrained Optimization Against DoS Attacks},
  journal      = {{IEEE} Trans Autom. Sci. Eng.},
  volume       = {21},
  number       = {3},
  pages        = {3332--3343},
  year         = {2024},
  url          = {https://doi.org/10.1109/TASE.2023.3278865},
  doi          = {10.1109/TASE.2023.3278865},
  timestamp    = {Wed, 21 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tase/LiHDGSZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tase/LinRYHGZ24,
  author       = {Xubin Lin and
                  Jiahao Ruan and
                  Yirui Yang and
                  Li He and
                  Yisheng Guan and
                  Hong Zhang},
  title        = {Robust Data Association Against Detection Deficiency for Semantic
                  {SLAM}},
  journal      = {{IEEE} Trans Autom. Sci. Eng.},
  volume       = {21},
  number       = {1},
  pages        = {868--880},
  year         = {2024},
  url          = {https://doi.org/10.1109/TASE.2022.3233662},
  doi          = {10.1109/TASE.2022.3233662},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tase/LinRYHGZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tase/LiuYZ24,
  author       = {Dan Liu and
                  Dan Ye and
                  Xingang Zhao},
  title        = {Fully Distributed Secure State Estimation for Nonlinear Multi-Agent
                  Systems Against DoS Attacks: An Edge-Pinning-Based Method},
  journal      = {{IEEE} Trans Autom. Sci. Eng.},
  volume       = {21},
  number       = {3},
  pages        = {4237--4246},
  year         = {2024},
  url          = {https://doi.org/10.1109/TASE.2023.3293844},
  doi          = {10.1109/TASE.2023.3293844},
  timestamp    = {Wed, 21 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tase/LiuYZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/taslp/AgarwalGSAR24,
  author       = {Vibhav Agarwal and
                  Sourav Ghosh and
                  Harichandana B. S. S and
                  Himanshu Arora and
                  Barath Raj Kandur Raja},
  title        = {TrICy: Trigger-Guided Data-to-Text Generation With Intent Aware Attention-Copy},
  journal      = {{IEEE} {ACM} Trans. Audio Speech Lang. Process.},
  volume       = {32},
  pages        = {1173--1184},
  year         = {2024},
  url          = {https://doi.org/10.1109/TASLP.2024.3353574},
  doi          = {10.1109/TASLP.2024.3353574},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/taslp/AgarwalGSAR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/taslp/WangYZX24,
  author       = {Li Wang and
                  Lingyun Yu and
                  Yongdong Zhang and
                  Hongtao Xie},
  title        = {Generalizable Speech Spoofing Detection Against Silence Trimming With
                  Data Augmentation and Multi-Task Meta-Learning},
  journal      = {{IEEE} {ACM} Trans. Audio Speech Lang. Process.},
  volume       = {32},
  pages        = {3296--3310},
  year         = {2024},
  url          = {https://doi.org/10.1109/TASLP.2024.3414340},
  doi          = {10.1109/TASLP.2024.3414340},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/taslp/WangYZX24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tasm/Rowley24,
  author       = {Steve Rowley},
  title        = {The Autumn Ghost: How the Battle Against a Polio Epidemic Revolutionized
                  Modern Medical Care - Hannah Wunsch (Vancouver, BC, Canada: Greystone
                  Books, 2023, 360 pp.)},
  journal      = {{IEEE} Technol. Soc. Mag.},
  volume       = {43},
  number       = {2},
  pages        = {30--32},
  year         = {2024},
  url          = {https://doi.org/10.1109/MTS.2024.3367383},
  doi          = {10.1109/MTS.2024.3367383},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tasm/Rowley24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tbbis/ManchandaBBACDCVS24,
  author       = {Sunny Manchanda and
                  Kaushik Bhagwatkar and
                  Kavita Balutia and
                  Shivang Agarwal and
                  Jyoti Chaudhary and
                  Muskan Dosi and
                  Chiranjeev Chiranjeev and
                  Mayank Vatsa and
                  Richa Singh},
  title        = {{D-LORD:} {DYSL-AI} Database for Low-Resolution Disguised Face Recognition},
  journal      = {{IEEE} Trans. Biom. Behav. Identity Sci.},
  volume       = {6},
  number       = {2},
  pages        = {147--157},
  year         = {2024},
  url          = {https://doi.org/10.1109/TBIOM.2023.3306703},
  doi          = {10.1109/TBIOM.2023.3306703},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tbbis/ManchandaBBACDCVS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tbbis/OtroshiShahrezaM24,
  author       = {Hatef Otroshi{-}Shahreza and
                  S{\'{e}}bastien Marcel},
  title        = {Template Inversion Attack Using Synthetic Face Images Against Real
                  Face Recognition Systems},
  journal      = {{IEEE} Trans. Biom. Behav. Identity Sci.},
  volume       = {6},
  number       = {3},
  pages        = {374--384},
  year         = {2024},
  url          = {https://doi.org/10.1109/TBIOM.2024.3391759},
  doi          = {10.1109/TBIOM.2024.3391759},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tbbis/OtroshiShahrezaM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tbcas/WangAOLC24,
  author       = {Peng Wang and
                  Rishika Agarwala and
                  Natalie B. Ownby and
                  Xinjian Liu and
                  Benton H. Calhoun},
  title        = {A 2.3-5.7 {\(\mu\)}W Tri-Modal Self-Adaptive Photoplethysmography
                  Sensor Interface {IC} for Heart Rate, SpO\({}_{\mbox{2}}\), and Pulse
                  Transit Time Co-Monitoring},
  journal      = {{IEEE} Trans. Biomed. Circuits Syst.},
  volume       = {18},
  number       = {3},
  pages        = {564--579},
  year         = {2024},
  url          = {https://doi.org/10.1109/TBCAS.2024.3360140},
  doi          = {10.1109/TBCAS.2024.3360140},
  timestamp    = {Tue, 18 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tbcas/WangAOLC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tbe/AzapagicAGLNSS24,
  author       = {Azur Azapagic and
                  Jayant P. Agarwal and
                  Bruce K. Gale and
                  Huizhong Li and
                  Samuel Nelson and
                  Jill Shea and
                  Himanshu J. Sant},
  title        = {A Novel Vascular Anastomotic Coupling Device for End-to-End Anastomosis
                  of Arteries and Veins},
  journal      = {{IEEE} Trans. Biomed. Eng.},
  volume       = {71},
  number       = {2},
  pages        = {542--552},
  year         = {2024},
  url          = {https://doi.org/10.1109/TBME.2023.3308890},
  doi          = {10.1109/TBME.2023.3308890},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tbe/AzapagicAGLNSS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/CuiCYCM24,
  author       = {Laizhong Cui and
                  Ziteng Chen and
                  Shu Yang and
                  Ruiyu Chen and
                  Zhong Ming},
  title        = {A Secure and Decentralized DLaaS Platform for Edge Resource Scheduling
                  Against Adversarial Attacks},
  journal      = {{IEEE} Trans. Computers},
  volume       = {73},
  number       = {3},
  pages        = {631--644},
  year         = {2024},
  url          = {https://doi.org/10.1109/TC.2021.3074806},
  doi          = {10.1109/TC.2021.3074806},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tc/CuiCYCM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/LiHFW24,
  author       = {Luyi Li and
                  Jiayi Huang and
                  Lang Feng and
                  Zhongfeng Wang},
  title        = {Prefender: {A} Prefetching Defender Against Cache Side Channel Attacks
                  as a Pretender},
  journal      = {{IEEE} Trans. Computers},
  volume       = {73},
  number       = {6},
  pages        = {1457--1471},
  year         = {2024},
  url          = {https://doi.org/10.1109/TC.2024.3377891},
  doi          = {10.1109/TC.2024.3377891},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/LiHFW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/SongXHLL24,
  author       = {Wei Song and
                  Zihan Xue and
                  Jinchi Han and
                  Zhenzhen Li and
                  Peng Liu},
  title        = {Randomizing Set-Associative Caches Against Conflict-Based Cache Side-Channel
                  Attacks},
  journal      = {{IEEE} Trans. Computers},
  volume       = {73},
  number       = {4},
  pages        = {1019--1033},
  year         = {2024},
  url          = {https://doi.org/10.1109/TC.2024.3349659},
  doi          = {10.1109/TC.2024.3349659},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/SongXHLL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/TanZYZF24,
  author       = {Kai Tan and
                  Dongyang Zhan and
                  Lin Ye and
                  Hongli Zhang and
                  Binxing Fang},
  title        = {A Practical Adversarial Attack Against Sequence-Based Deep Learning
                  Malware Classifiers},
  journal      = {{IEEE} Trans. Computers},
  volume       = {73},
  number       = {3},
  pages        = {708--721},
  year         = {2024},
  url          = {https://doi.org/10.1109/TC.2023.3339955},
  doi          = {10.1109/TC.2023.3339955},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tc/TanZYZF24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/XuXJLLFZ24,
  author       = {Guangquan Xu and
                  Guohua Xin and
                  Litao Jiao and
                  Jian Liu and
                  Shaoying Liu and
                  Meiqi Feng and
                  Xi Zheng},
  title        = {{OFEI:} {A} Semi-Black-Box Android Adversarial Sample Attack Framework
                  Against DLaaS},
  journal      = {{IEEE} Trans. Computers},
  volume       = {73},
  number       = {4},
  pages        = {956--969},
  year         = {2024},
  url          = {https://doi.org/10.1109/TC.2023.3236872},
  doi          = {10.1109/TC.2023.3236872},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/XuXJLLFZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/ZhangMLJZ24,
  author       = {Tianze Zhang and
                  Xuhong Miao and
                  Yibin Li and
                  Lei Jia and
                  Yinghao Zhuang},
  title        = {{AUV} Surfacing Control With Adversarial Attack Against DLaaS Framework},
  journal      = {{IEEE} Trans. Computers},
  volume       = {73},
  number       = {2},
  pages        = {327--339},
  year         = {2024},
  url          = {https://doi.org/10.1109/TC.2021.3072072},
  doi          = {10.1109/TC.2021.3072072},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tc/ZhangMLJZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/ZhangXZGC24,
  author       = {Qingyang Zhang and
                  Chang Xu and
                  Hong Zhong and
                  Chengjie Gu and
                  Jie Cui},
  title        = {Revocable and Efficient Blockchain-Based Fine-Grained Access Control
                  Against EDoS Attacks in Cloud Storage},
  journal      = {{IEEE} Trans. Computers},
  volume       = {73},
  number       = {8},
  pages        = {2012--2024},
  year         = {2024},
  url          = {https://doi.org/10.1109/TC.2024.3398502},
  doi          = {10.1109/TC.2024.3398502},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/ZhangXZGC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/ZhongCYGSY24,
  author       = {Fangtian Zhong and
                  Xiuzhen Cheng and
                  Dongxiao Yu and
                  Bei Gong and
                  Shuaiwen Song and
                  Jiguo Yu},
  title        = {MalFox: Camouflaged Adversarial Malware Example Generation Based on
                  Conv-GANs Against Black-Box Detectors},
  journal      = {{IEEE} Trans. Computers},
  volume       = {73},
  number       = {4},
  pages        = {980--993},
  year         = {2024},
  url          = {https://doi.org/10.1109/TC.2023.3236901},
  doi          = {10.1109/TC.2023.3236901},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/ZhongCYGSY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcad/HanHHXDWZDGWZC24,
  author       = {Husheng Han and
                  Xing Hu and
                  Yifan Hao and
                  Kaidi Xu and
                  Pucheng Dang and
                  Ying Wang and
                  Yongwei Zhao and
                  Zidong Du and
                  Qi Guo and
                  Yanzhi Wang and
                  Xishan Zhang and
                  Tianshi Chen},
  title        = {Real-Time Robust Video Object Detection System Against Physical-World
                  Adversarial Attacks},
  journal      = {{IEEE} Trans. Comput. Aided Des. Integr. Circuits Syst.},
  volume       = {43},
  number       = {1},
  pages        = {366--379},
  year         = {2024},
  url          = {https://doi.org/10.1109/TCAD.2023.3305932},
  doi          = {10.1109/TCAD.2023.3305932},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcad/HanHHXDWZDGWZC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcad/ZhouQLGW24,
  author       = {Jiayun Zhou and
                  Guofeng Qin and
                  Lu Li and
                  Chun Guo and
                  Weijia Wang},
  title        = {{ISA} Extensions of Shuffling Against Side-Channel Attacks},
  journal      = {{IEEE} Trans. Comput. Aided Des. Integr. Circuits Syst.},
  volume       = {43},
  number       = {3},
  pages        = {761--773},
  year         = {2024},
  url          = {https://doi.org/10.1109/TCAD.2023.3323165},
  doi          = {10.1109/TCAD.2023.3323165},
  timestamp    = {Fri, 23 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcad/ZhouQLGW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcasI/WanZCY24,
  author       = {Keting Wan and
                  Jinghan Zhao and
                  Yongpan Chen and
                  Miao Yu},
  title        = {A Decentralized Resilient Control Scheme for {DC} Microgrids Against
                  Faults on Sensor and Actuator},
  journal      = {{IEEE} Trans. Circuits Syst. {I} Regul. Pap.},
  volume       = {71},
  number       = {2},
  pages        = {816--827},
  year         = {2024},
  url          = {https://doi.org/10.1109/TCSI.2023.3331881},
  doi          = {10.1109/TCSI.2023.3331881},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcasI/WanZCY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcasII/AgarwalK24,
  author       = {Neha Agarwal and
                  Haranath Kar},
  title        = {New Stability Results for 2-D Digital Filters With Generalized Overflow
                  Nonlinearities},
  journal      = {{IEEE} Trans. Circuits Syst. {II} Express Briefs},
  volume       = {71},
  number       = {5},
  pages        = {2829--2833},
  year         = {2024},
  url          = {https://doi.org/10.1109/TCSII.2023.3335244},
  doi          = {10.1109/TCSII.2023.3335244},
  timestamp    = {Tue, 18 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcasII/AgarwalK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcasII/DongXPL24,
  author       = {Lewei Dong and
                  Huiling Xu and
                  Ju H. Park and
                  Wuquan Li},
  title        = {Intermediate-Variable-Based Robust State Estimation for Cyber-Physical
                  Systems Against {FDI} Attacks},
  journal      = {{IEEE} Trans. Circuits Syst. {II} Express Briefs},
  volume       = {71},
  number       = {5},
  pages        = {2719--2723},
  year         = {2024},
  url          = {https://doi.org/10.1109/TCSII.2024.3351159},
  doi          = {10.1109/TCSII.2024.3351159},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcasII/DongXPL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcasII/JiaLWP24,
  author       = {Peilin Jia and
                  Jie Lian and
                  Feiyue Wu and
                  Xinyu Pei},
  title        = {Optimal Energy Transmission Scheduling in Event-Triggered Redundant
                  Channel of Cyber-Physical Systems Against DoS Attacks},
  journal      = {{IEEE} Trans. Circuits Syst. {II} Express Briefs},
  volume       = {71},
  number       = {6},
  pages        = {3136--3140},
  year         = {2024},
  url          = {https://doi.org/10.1109/TCSII.2024.3358389},
  doi          = {10.1109/TCSII.2024.3358389},
  timestamp    = {Thu, 04 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcasII/JiaLWP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcasII/LiuJQYWW24,
  author       = {Xinghua Liu and
                  Qianmeng Jiao and
                  Siwei Qiao and
                  Ziming Yan and
                  Shiping Wen and
                  Peng Wang},
  title        = {A Hybrid Monotonic Neural Network Approach for Multi-Area Power System
                  Load Frequency Control Against {FGSM} Attack},
  journal      = {{IEEE} Trans. Circuits Syst. {II} Express Briefs},
  volume       = {71},
  number       = {8},
  pages        = {3780--3784},
  year         = {2024},
  url          = {https://doi.org/10.1109/TCSII.2024.3367184},
  doi          = {10.1109/TCSII.2024.3367184},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcasII/LiuJQYWW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcasII/LiuWNSWZ24,
  author       = {Shenghang Liu and
                  Xinjun Wang and
                  Ben Niu and
                  Xinmin Song and
                  Huanqing Wang and
                  Xudong Zhao},
  title        = {Adaptive Resilient Output Feedback Control Against Unknown Deception
                  Attacks for Nonlinear Cyber-Physical Systems},
  journal      = {{IEEE} Trans. Circuits Syst. {II} Express Briefs},
  volume       = {71},
  number       = {8},
  pages        = {3855--3859},
  year         = {2024},
  url          = {https://doi.org/10.1109/TCSII.2024.3372413},
  doi          = {10.1109/TCSII.2024.3372413},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcasII/LiuWNSWZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcasII/LiuZRW24,
  author       = {Hanxiao Liu and
                  Jiaying Zou and
                  Xiaoqiang Ren and
                  Xiaofan Wang},
  title        = {A Privacy-Preserving Approach Against Eavesdropping Attacks on Remote
                  State Estimation for Cyber-Physical Systems},
  journal      = {{IEEE} Trans. Circuits Syst. {II} Express Briefs},
  volume       = {71},
  number       = {3},
  pages        = {1221--1225},
  year         = {2024},
  url          = {https://doi.org/10.1109/TCSII.2023.3326734},
  doi          = {10.1109/TCSII.2023.3326734},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcasII/LiuZRW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcasII/RezayatiMAJ24,
  author       = {Mohammad Hadi Rezayati and
                  Mohammad Hossein Moaiyeri and
                  Abdolah Amirany and
                  Kian Jafari},
  title        = {A New Paradigm for Immunization of Deep Neural Networks Against Replication
                  Attacks Based on Spintronics},
  journal      = {{IEEE} Trans. Circuits Syst. {II} Express Briefs},
  volume       = {71},
  number       = {8},
  pages        = {3925--3929},
  year         = {2024},
  url          = {https://doi.org/10.1109/TCSII.2024.3371154},
  doi          = {10.1109/TCSII.2024.3371154},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcasII/RezayatiMAJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcasII/SathikPHVMA24,
  author       = {M. Jagabar Sathik and
                  Gopinath Narayanan Pandurangan and
                  Arpan Hota and
                  K. Vijayakumar and
                  Saad Mekhilef and
                  Vivek Agarwal},
  title        = {Improved Dual Boost Mid-Point Clamped Five-Level Inverter Topology},
  journal      = {{IEEE} Trans. Circuits Syst. {II} Express Briefs},
  volume       = {71},
  number       = {6},
  pages        = {3221--3225},
  year         = {2024},
  url          = {https://doi.org/10.1109/TCSII.2024.3356171},
  doi          = {10.1109/TCSII.2024.3356171},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcasII/SathikPHVMA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcasII/XuFXSZY24,
  author       = {Dongwei Xu and
                  Ruochen Fang and
                  Qi Xuan and
                  Weiguo Shen and
                  Shilian Zheng and
                  Xiaoniu Yang},
  title        = {{AT-GAN:} {A} Backdoor Attack Against Radio Signals Modulation Based
                  on Adaptive Trigger},
  journal      = {{IEEE} Trans. Circuits Syst. {II} Express Briefs},
  volume       = {71},
  number       = {6},
  pages        = {3251--3255},
  year         = {2024},
  url          = {https://doi.org/10.1109/TCSII.2024.3357830},
  doi          = {10.1109/TCSII.2024.3357830},
  timestamp    = {Thu, 04 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcasII/XuFXSZY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcc/ShiLLJDF24,
  author       = {Yang Shi and
                  Yimin Li and
                  Tianyuan Luo and
                  Xiong Jiang and
                  Bowen Du and
                  Hongfei Fan},
  title        = {Space-Hard Obfuscation Against Shared Cache Attacks and its Application
                  in Securing {ECDSA} for Cloud-Based Blockchains},
  journal      = {{IEEE} Trans. Cloud Comput.},
  volume       = {12},
  number       = {2},
  pages        = {625--643},
  year         = {2024},
  url          = {https://doi.org/10.1109/TCC.2024.3383661},
  doi          = {10.1109/TCC.2024.3383661},
  timestamp    = {Thu, 04 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcc/ShiLLJDF24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tccn/GuoLAY24,
  author       = {Lantu Guo and
                  Jun Lu and
                  Jianping An and
                  Kai Yang},
  title        = {{DSIL:} An Effective Spectrum Prediction Framework Against Spectrum
                  Concept Drift},
  journal      = {{IEEE} Trans. Cogn. Commun. Netw.},
  volume       = {10},
  number       = {3},
  pages        = {794--806},
  year         = {2024},
  url          = {https://doi.org/10.1109/TCCN.2024.3355430},
  doi          = {10.1109/TCCN.2024.3355430},
  timestamp    = {Thu, 04 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tccn/GuoLAY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tccn/ParmarSCLP24,
  author       = {Ashok Parmar and
                  Karan Shah and
                  Kamal M. Captain and
                  Miguel L{\'{o}}pez{-}Ben{\'{\i}}tez and
                  Jignesh R. Patel},
  title        = {Gaussian Mixture Model-Based Anomaly Detection for Defense Against
                  Byzantine Attack in Cooperative Spectrum Sensing},
  journal      = {{IEEE} Trans. Cogn. Commun. Netw.},
  volume       = {10},
  number       = {2},
  pages        = {499--509},
  year         = {2024},
  url          = {https://doi.org/10.1109/TCCN.2023.3342409},
  doi          = {10.1109/TCCN.2023.3342409},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tccn/ParmarSCLP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tccn/ZhangLYZXXWW24,
  author       = {Sicheng Zhang and
                  Yun Lin and
                  Jiarun Yu and
                  Jianting Zhang and
                  Qi Xuan and
                  Dongwei Xu and
                  Juzhen Wang and
                  Meiyu Wang},
  title        = {{HFAD:} Homomorphic Filtering Adversarial Defense Against Adversarial
                  Attacks in Automatic Modulation Classification},
  journal      = {{IEEE} Trans. Cogn. Commun. Netw.},
  volume       = {10},
  number       = {3},
  pages        = {880--892},
  year         = {2024},
  url          = {https://doi.org/10.1109/TCCN.2024.3360514},
  doi          = {10.1109/TCCN.2024.3360514},
  timestamp    = {Thu, 04 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tccn/ZhangLYZXXWW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tccn/ZhouQZZZL24,
  author       = {Xiaoyu Zhou and
                  Peihan Qi and
                  Weilin Zhang and
                  Shilian Zheng and
                  Ning Zhang and
                  Zan Li},
  title        = {GAN-Based Siamese Neuron Network for Modulation Classification Against
                  White-Box Adversarial Attacks},
  journal      = {{IEEE} Trans. Cogn. Commun. Netw.},
  volume       = {10},
  number       = {1},
  pages        = {122--137},
  year         = {2024},
  url          = {https://doi.org/10.1109/TCCN.2023.3320868},
  doi          = {10.1109/TCCN.2023.3320868},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tccn/ZhouQZZZL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tce/AgrahariASKGV24,
  author       = {Ashutosh Agrahari and
                  Ruchi Agarwal and
                  Pawan Singh and
                  Abhishek Singh Kilak and
                  Deepak Gupta and
                  Ankit Vidyarthi},
  title        = {Marvelous Hand: An IoT-Enabled Artificial Intelligence-Based Human-Centric
                  Biosensor Design for Consumer Personal Security Application},
  journal      = {{IEEE} Trans. Consumer Electron.},
  volume       = {70},
  number       = {1},
  pages        = {1063--1070},
  year         = {2024},
  url          = {https://doi.org/10.1109/TCE.2023.3320768},
  doi          = {10.1109/TCE.2023.3320768},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tce/AgrahariASKGV24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tce/AhmedHMAIGM24,
  author       = {Amjed Abbas Ahmed and
                  Mohammad Kamrul Hasan and
                  Imran Memon and
                  Azana Hafizah Mohd Aman and
                  Shayla Islam and
                  Thippa Reddy Gadekallu and
                  Sufyan Ali Memon},
  title        = {Secure {AI} for 6G Mobile Devices: Deep Learning Optimization Against
                  Side-Channel Attacks},
  journal      = {{IEEE} Trans. Consumer Electron.},
  volume       = {70},
  number       = {1},
  pages        = {3951--3959},
  year         = {2024},
  url          = {https://doi.org/10.1109/TCE.2024.3372018},
  doi          = {10.1109/TCE.2024.3372018},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tce/AhmedHMAIGM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tce/ShrivastavaJRB24,
  author       = {Shivanshu Shrivastava and
                  Sunju John and
                  Alentattil Rajesh and
                  Prabin Kumar Bora},
  title        = {Collision Penalty-Based Defense Against Collusion Attacks in Cognitive
                  Radio Enabled Smart Devices},
  journal      = {{IEEE} Trans. Consumer Electron.},
  volume       = {70},
  number       = {1},
  pages        = {3963--3976},
  year         = {2024},
  url          = {https://doi.org/10.1109/TCE.2023.3321797},
  doi          = {10.1109/TCE.2023.3321797},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tce/ShrivastavaJRB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tce/YamanyKMT24,
  author       = {Waleed Yamany and
                  Marwa Keshk and
                  Nour Moustafa and
                  Benjamin P. Turnbull},
  title        = {Swarm Optimization-Based Federated Learning for the Cyber Resilience
                  of Internet of Things Systems Against Adversarial Attacks},
  journal      = {{IEEE} Trans. Consumer Electron.},
  volume       = {70},
  number       = {1},
  pages        = {1359--1369},
  year         = {2024},
  url          = {https://doi.org/10.1109/TCE.2023.3319039},
  doi          = {10.1109/TCE.2023.3319039},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tce/YamanyKMT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tce/ZuoXWW24,
  author       = {Shaojun Zuo and
                  Yong Xie and
                  Libing Wu and
                  Jing Wu},
  title        = {ApaPRFL: Robust Privacy-Preserving Federated Learning Scheme Against
                  Poisoning Adversaries for Intelligent Devices Using Edge Computing},
  journal      = {{IEEE} Trans. Consumer Electron.},
  volume       = {70},
  number       = {1},
  pages        = {725--734},
  year         = {2024},
  url          = {https://doi.org/10.1109/TCE.2024.3376561},
  doi          = {10.1109/TCE.2024.3376561},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tce/ZuoXWW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BurszteinIKMPZ24,
  author       = {Elie Bursztein and
                  Luca Invernizzi and
                  Karel Kr{\'{a}}l and
                  Daniel Moghimi and
                  Jean{-}Michel Picod and
                  Marina Zhang},
  title        = {Generalized Power Attacks against Crypto Hardware using Long-Range
                  Deep Learning},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {3},
  pages        = {472--499},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i3.472-499},
  doi          = {10.46586/TCHES.V2024.I3.472-499},
  timestamp    = {Wed, 21 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/BurszteinIKMPZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/CarletDGT24,
  author       = {Claude Carlet and
                  Abderrahman Daif and
                  Sylvain Guilley and
                  C{\'{e}}dric Tavernier},
  title        = {Quasi-linear masking against {SCA} and FIA, with cost amortization},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {1},
  pages        = {398--432},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i1.398-432},
  doi          = {10.46586/TCHES.V2024.I1.398-432},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/CarletDGT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/CassiersSV24,
  author       = {Ga{\"{e}}tan Cassiers and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Corentin Verhamme},
  title        = {Low-Latency Masked Gadgets Robust against Physical Defaults with Application
                  to Ascon},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {3},
  pages        = {603--633},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i3.603-633},
  doi          = {10.46586/TCHES.V2024.I3.603-633},
  timestamp    = {Wed, 21 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/CassiersSV24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/CastelnoviH24,
  author       = {Laurent Castelnovi and
                  Agathe Houzelot},
  title        = {On the (Im)possibility of Preventing Differential Computation Analysis
                  with Internal Encodings},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {3},
  pages        = {452--471},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i3.452-471},
  doi          = {10.46586/TCHES.V2024.I3.452-471},
  timestamp    = {Wed, 21 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/CastelnoviH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/DhoogheOT24,
  author       = {Siemen Dhooghe and
                  Artemii Ovchinnikov and
                  Dilara Toprakhisar},
  title        = {StaTI: Protecting against Fault Attacks Using Stable Threshold Implementations},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {1},
  pages        = {229--263},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i1.229-263},
  doi          = {10.46586/TCHES.V2024.I1.229-263},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/DhoogheOT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/RaviPJDB24,
  author       = {Prasanna Ravi and
                  Thales Paiva and
                  Dirmanto Jap and
                  Jan{-}Pieter D'Anvers and
                  Shivam Bhasin},
  title        = {Defeating Low-Cost Countermeasures against Side-Channel Attacks in
                  Lattice-based Encryption {A} Case Study on Crystals-Kyber},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {2},
  pages        = {795--818},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i2.795-818},
  doi          = {10.46586/TCHES.V2024.I2.795-818},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/RaviPJDB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcns/SadabadiAAG24,
  author       = {Mahdieh Sadat Sadabadi and
                  Made Widhi Surya Atman and
                  Anirudh Aynala and
                  Azwirman Gusrialdi},
  title        = {Resilient Design of Leader-Follower Consensus Against Cyber-Attacks},
  journal      = {{IEEE} Trans. Control. Netw. Syst.},
  volume       = {11},
  number       = {2},
  pages        = {1080--1092},
  year         = {2024},
  url          = {https://doi.org/10.1109/TCNS.2023.3332778},
  doi          = {10.1109/TCNS.2023.3332778},
  timestamp    = {Thu, 04 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcns/SadabadiAAG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcns/ZhaoLXX24,
  author       = {Xudong Zhao and
                  Le Liu and
                  Wei Xing and
                  Ning Xu},
  title        = {Stochastic Event-Based Physical Watermarks Against Replay Attacks
                  in Cyber-Physical Systems},
  journal      = {{IEEE} Trans. Control. Netw. Syst.},
  volume       = {11},
  number       = {2},
  pages        = {1035--1045},
  year         = {2024},
  url          = {https://doi.org/10.1109/TCNS.2023.3331161},
  doi          = {10.1109/TCNS.2023.3331161},
  timestamp    = {Tue, 16 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcns/ZhaoLXX24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcom/ZhouMLZYVL24,
  author       = {Yi Zhou and
                  Zheng Ma and
                  Gang Liu and
                  Zhengquan Zhang and
                  Phee Lep Yeoh and
                  Branka Vucetic and
                  Yonghui Li},
  title        = {Secure Multi-Layer {MEC} Systems With UAV-Enabled Reconfigurable Intelligent
                  Surface Against Full-Duplex Eavesdropper},
  journal      = {{IEEE} Trans. Commun.},
  volume       = {72},
  number       = {3},
  pages        = {1565--1577},
  year         = {2024},
  url          = {https://doi.org/10.1109/TCOMM.2023.3337239},
  doi          = {10.1109/TCOMM.2023.3337239},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcom/ZhouMLZYVL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcps/CsikorLWRPC24,
  author       = {Levente Csikor and
                  Hoon Wei Lim and
                  Jun Wen Wong and
                  Soundarya Ramesh and
                  Rohini Poolat Parameswarath and
                  Mun Choon Chan},
  title        = {RollBack: {A} New Time-Agnostic Replay Attack Against the Automotive
                  Remote Keyless Entry Systems},
  journal      = {{ACM} Trans. Cyber Phys. Syst.},
  volume       = {8},
  number       = {1},
  pages        = {5:1--5:25},
  year         = {2024},
  url          = {https://doi.org/10.1145/3627827},
  doi          = {10.1145/3627827},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcps/CsikorLWRPC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcps/ManLG24,
  author       = {Yanmao Man and
                  Ming Li and
                  Ryan M. Gerdes},
  title        = {Remote Perception Attacks against Camera-based Object Recognition
                  Systems and Countermeasures},
  journal      = {{ACM} Trans. Cyber Phys. Syst.},
  volume       = {8},
  number       = {2},
  pages        = {14},
  year         = {2024},
  url          = {https://doi.org/10.1145/3596221},
  doi          = {10.1145/3596221},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcps/ManLG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/Choudhury24,
  author       = {Ashish Choudhury},
  title        = {Almost-surely terminating asynchronous Byzantine agreement against
                  general adversaries with optimal resilience},
  journal      = {Theor. Comput. Sci.},
  volume       = {995},
  pages        = {114492},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.tcs.2024.114492},
  doi          = {10.1016/J.TCS.2024.114492},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcs/Choudhury24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcss/ChenJM24,
  author       = {Cong Chen and
                  Zhongyuan Jiang and
                  Jianfeng Ma},
  title        = {Privacy Protection for Marginal-Sensitive Community Individuals Against
                  Adversarial Community Detection Attacks},
  journal      = {{IEEE} Trans. Comput. Soc. Syst.},
  volume       = {11},
  number       = {1},
  pages        = {782--794},
  year         = {2024},
  url          = {https://doi.org/10.1109/TCSS.2022.3229162},
  doi          = {10.1109/TCSS.2022.3229162},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcss/ChenJM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcss/QiaoLK24,
  author       = {Feifei Qiao and
                  Zhong Li and
                  Yubo Kong},
  title        = {A Privacy-Aware and Incremental Defense Method Against GAN-Based Poisoning
                  Attack},
  journal      = {{IEEE} Trans. Comput. Soc. Syst.},
  volume       = {11},
  number       = {2},
  pages        = {1708--1721},
  year         = {2024},
  url          = {https://doi.org/10.1109/TCSS.2023.3263241},
  doi          = {10.1109/TCSS.2023.3263241},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcss/QiaoLK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcss/YinZ24,
  author       = {Chunyong Yin and
                  Qingkui Zeng},
  title        = {Defending Against Data Poisoning Attack in Federated Learning With
                  Non-IID Data},
  journal      = {{IEEE} Trans. Comput. Soc. Syst.},
  volume       = {11},
  number       = {2},
  pages        = {2313--2325},
  year         = {2024},
  url          = {https://doi.org/10.1109/TCSS.2023.3296885},
  doi          = {10.1109/TCSS.2023.3296885},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcss/YinZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcst/AgharaziPMFBMFDSL24,
  author       = {Hanieh Agharazi and
                  Marija Prica and
                  Abrez Mondal and
                  Qiang Fu and
                  Vijay Bhavaraju and
                  Ryan D. May and
                  Kevin Fok and
                  Skip Dise and
                  Agata Swierc and
                  Kenneth A. Loparo},
  title        = {Installation and Testing of a Two-Level Model Predictive Control Building
                  Energy Management System},
  journal      = {{IEEE} Trans. Control. Syst. Technol.},
  volume       = {32},
  number       = {2},
  pages        = {326--339},
  year         = {2024},
  url          = {https://doi.org/10.1109/TCST.2023.3313961},
  doi          = {10.1109/TCST.2023.3313961},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcst/AgharaziPMFBMFDSL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcsv/LuoZCYLC24,
  author       = {Yuanjing Luo and
                  Tongqing Zhou and
                  Shenglan Cui and
                  Yunfan Ye and
                  Fang Liu and
                  Zhiping Cai},
  title        = {Fixing the Double Agent Vulnerability of Deep Watermarking: {A} Patch-Level
                  Solution Against Artwork Plagiarism},
  journal      = {{IEEE} Trans. Circuits Syst. Video Technol.},
  volume       = {34},
  number       = {3},
  pages        = {1670--1683},
  year         = {2024},
  url          = {https://doi.org/10.1109/TCSVT.2023.3295895},
  doi          = {10.1109/TCSVT.2023.3295895},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcsv/LuoZCYLC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcyb/CaiHZ24,
  author       = {Miao Cai and
                  Xiao He and
                  Donghua Zhou},
  title        = {Self-Healing Fault-Tolerant Control for High-Order Fully Actuated
                  Systems Against Sensor Faults: {A} Redundancy Framework},
  journal      = {{IEEE} Trans. Cybern.},
  volume       = {54},
  number       = {4},
  pages        = {2628--2640},
  year         = {2024},
  url          = {https://doi.org/10.1109/TCYB.2023.3285903},
  doi          = {10.1109/TCYB.2023.3285903},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcyb/CaiHZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcyb/CuiCGBSH24,
  author       = {Yukang Cui and
                  Lingbo Cao and
                  Xin Gong and
                  Michael V. Basin and
                  Jun Shen and
                  Tingwen Huang},
  title        = {Resilient Output Containment Control of Heterogeneous Multiagent Systems
                  Against Composite Attacks: {A} Digital Twin Approach},
  journal      = {{IEEE} Trans. Cybern.},
  volume       = {54},
  number       = {5},
  pages        = {3313--3326},
  year         = {2024},
  url          = {https://doi.org/10.1109/TCYB.2023.3328979},
  doi          = {10.1109/TCYB.2023.3328979},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcyb/CuiCGBSH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcyb/GeYTCG24,
  author       = {Zhenxing Ge and
                  Shangdong Yang and
                  Pinzhuo Tian and
                  Zixuan Chen and
                  Yang Gao},
  title        = {Modeling Rationality: Toward Better Performance Against Unknown Agents
                  in Sequential Games},
  journal      = {{IEEE} Trans. Cybern.},
  volume       = {54},
  number       = {5},
  pages        = {2966--2977},
  year         = {2024},
  url          = {https://doi.org/10.1109/TCYB.2022.3228812},
  doi          = {10.1109/TCYB.2022.3228812},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcyb/GeYTCG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcyb/GongLSF24,
  author       = {Xin Gong and
                  Xiuxian Li and
                  Zhan Shu and
                  Zhiguang Feng},
  title        = {Resilient Output Formation-Tracking of Heterogeneous Multiagent Systems
                  Against General Byzantine Attacks: {A} Twin-Layer Approach},
  journal      = {{IEEE} Trans. Cybern.},
  volume       = {54},
  number       = {4},
  pages        = {2566--2578},
  year         = {2024},
  url          = {https://doi.org/10.1109/TCYB.2023.3281902},
  doi          = {10.1109/TCYB.2023.3281902},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcyb/GongLSF24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcyb/HuangZ24,
  author       = {Yabing Huang and
                  Jun Zhao},
  title        = {Active Interdiction Defence Scheme Against False Data-Injection Attacks:
                  {A} Stackelberg Game Perspective},
  journal      = {{IEEE} Trans. Cybern.},
  volume       = {54},
  number       = {1},
  pages        = {162--172},
  year         = {2024},
  url          = {https://doi.org/10.1109/TCYB.2022.3222171},
  doi          = {10.1109/TCYB.2022.3222171},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcyb/HuangZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcyb/JadidiBZ24,
  author       = {Saeedreza Jadidi and
                  Hamed Badihi and
                  Youmin Zhang},
  title        = {Active Fault-Tolerant and Attack-Resilient Control for a Renewable
                  Microgrid Against Power-Loss Faults and Data Integrity Attacks},
  journal      = {{IEEE} Trans. Cybern.},
  volume       = {54},
  number       = {4},
  pages        = {2113--2128},
  year         = {2024},
  url          = {https://doi.org/10.1109/TCYB.2023.3305240},
  doi          = {10.1109/TCYB.2023.3305240},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcyb/JadidiBZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcyb/LiuY24,
  author       = {Xuan Liu and
                  Guang{-}Hong Yang},
  title        = {Optimal Stealthy Attacks With Energy Constraint Against Remote State
                  Estimation},
  journal      = {{IEEE} Trans. Cybern.},
  volume       = {54},
  number       = {6},
  pages        = {3577--3587},
  year         = {2024},
  url          = {https://doi.org/10.1109/TCYB.2023.3312346},
  doi          = {10.1109/TCYB.2023.3312346},
  timestamp    = {Tue, 18 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcyb/LiuY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcyb/SarrafanZRS24,
  author       = {Neda Sarrafan and
                  Jafar Zarei and
                  Roozbeh Razavi{-}Far and
                  Mehrdad Saif},
  title        = {Resilient Finite-Time Consensus Tracking for Nonholonomic High-Order
                  Chained-Form Systems Against DoS Attacks},
  journal      = {{IEEE} Trans. Cybern.},
  volume       = {54},
  number       = {2},
  pages        = {739--751},
  year         = {2024},
  url          = {https://doi.org/10.1109/TCYB.2022.3186207},
  doi          = {10.1109/TCYB.2022.3186207},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcyb/SarrafanZRS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcyb/WangL24,
  author       = {Fenglan Wang and
                  Lijun Long},
  title        = {A Dual Triggering Scheme to Adaptive Fuzzy Resilient Control of Switched
                  Nonlinear Systems Against Mixed Attacks},
  journal      = {{IEEE} Trans. Cybern.},
  volume       = {54},
  number       = {3},
  pages        = {1685--1694},
  year         = {2024},
  url          = {https://doi.org/10.1109/TCYB.2023.3241396},
  doi          = {10.1109/TCYB.2023.3241396},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcyb/WangL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcyb/YangDWT24,
  author       = {Xu Yang and
                  Cheng Deng and
                  Kun Wei and
                  Dacheng Tao},
  title        = {Robust Commonsense Reasoning Against Noisy Labels Using Adaptive Correction},
  journal      = {{IEEE} Trans. Cybern.},
  volume       = {54},
  number       = {7},
  pages        = {4138--4149},
  year         = {2024},
  url          = {https://doi.org/10.1109/TCYB.2023.3339629},
  doi          = {10.1109/TCYB.2023.3339629},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcyb/YangDWT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcyb/YuZJSFJC24,
  author       = {Ziquan Yu and
                  Youmin Zhang and
                  Bin Jiang and
                  Chun{-}Yi Su and
                  Jun Fu and
                  Ying Jin and
                  Tianyou Chai},
  title        = {Refined Fractional-Order Fault-Tolerant Coordinated Tracking Control
                  of Networked Fixed-Wing UAVs Against Faults and Communication Delays
                  via Double Recurrent Perturbation FNNs},
  journal      = {{IEEE} Trans. Cybern.},
  volume       = {54},
  number       = {2},
  pages        = {1189--1201},
  year         = {2024},
  url          = {https://doi.org/10.1109/TCYB.2022.3200382},
  doi          = {10.1109/TCYB.2022.3200382},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcyb/YuZJSFJC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcyb/ZhaoY24,
  author       = {Jipeng Zhao and
                  Guang{-}Hong Yang},
  title        = {Fuzzy Adaptive Finite-Time Resilient Control Against Unknown False
                  Data Injection Attacks for {MIMO} Nonlinear Switched Systems With
                  Unknown Dead Zone},
  journal      = {{IEEE} Trans. Cybern.},
  volume       = {54},
  number       = {1},
  pages        = {586--598},
  year         = {2024},
  url          = {https://doi.org/10.1109/TCYB.2023.3258490},
  doi          = {10.1109/TCYB.2023.3258490},
  timestamp    = {Wed, 24 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcyb/ZhaoY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/GongFLWCW24,
  author       = {Xueluan Gong and
                  Zheng Fang and
                  Bowen Li and
                  Tao Wang and
                  Yanjiao Chen and
                  Qian Wang},
  title        = {Palette: Physically-Realizable Backdoor Attacks Against Video Recognition
                  Models},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {4},
  pages        = {2672--2685},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3314792},
  doi          = {10.1109/TDSC.2023.3314792},
  timestamp    = {Wed, 24 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/GongFLWCW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/HanYWW24,
  author       = {Xiao Han and
                  Yuncong Yang and
                  Leye Wang and
                  Junjie Wu},
  title        = {Privacy-Preserving Network Embedding Against Private Link Inference
                  Attacks},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {2},
  pages        = {847--859},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3264110},
  doi          = {10.1109/TDSC.2023.3264110},
  timestamp    = {Tue, 18 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/HanYWW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/JiangLXZL24,
  author       = {Wenbo Jiang and
                  Hongwei Li and
                  Guowen Xu and
                  Tianwei Zhang and
                  Rongxing Lu},
  title        = {A Comprehensive Defense Framework Against Model Extraction Attacks},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {2},
  pages        = {685--700},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3261327},
  doi          = {10.1109/TDSC.2023.3261327},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/JiangLXZL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/JiangYCSWM24,
  author       = {Tao Jiang and
                  Xu Yuan and
                  Qiong Cheng and
                  Yulong Shen and
                  Liangmin Wang and
                  Jianfeng Ma},
  title        = {FairECom: Towards Proof of E-Commerce Fairness Against Price Discrimination},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {4},
  pages        = {3528--3544},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3334197},
  doi          = {10.1109/TDSC.2023.3334197},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/JiangYCSWM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiCLXXX24,
  author       = {Deqiang Li and
                  Shicheng Cui and
                  Yun Li and
                  Jia Xu and
                  Fu Xiao and
                  Shouhuai Xu},
  title        = {{PAD:} Towards Principled Adversarial Malware Detection Against Evasion
                  Attacks},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {2},
  pages        = {920--936},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3265665},
  doi          = {10.1109/TDSC.2023.3265665},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/LiCLXXX24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiWZZ24,
  author       = {Sheng Li and
                  Zichi Wang and
                  Xiudong Zhang and
                  Xinpeng Zhang},
  title        = {Robust Image Steganography Against General Downsampling Operations
                  With Lossless Secret Recovery},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {1},
  pages        = {340--352},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3253691},
  doi          = {10.1109/TDSC.2023.3253691},
  timestamp    = {Mon, 25 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/LiWZZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/PietrantuonoFP24,
  author       = {Roberto Pietrantuono and
                  Massimo Ficco and
                  Francesco Palmieri},
  title        = {Testing the Resilience of MEC-Based IoT Applications Against Resource
                  Exhaustion Attacks},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {2},
  pages        = {804--818},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3263137},
  doi          = {10.1109/TDSC.2023.3263137},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/PietrantuonoFP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ShafeeMBSBA24,
  author       = {Ahmed Shafee and
                  Mohamed Mahmoud and
                  Jerry W. Bruce and
                  Gautam Srivastava and
                  Abdullah Balamsh and
                  Abdulah Jeza Aljohani},
  title        = {False Data Detector for Electrical Vehicles Temporal-Spatial Charging
                  Coordination Secure Against Evasion and Privacy Adversarial Attacks},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {4},
  pages        = {2027--2044},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3299522},
  doi          = {10.1109/TDSC.2023.3299522},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ShafeeMBSBA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ShuY24,
  author       = {Zhan Shu and
                  Guanhua Yan},
  title        = {{EAGLE:} Evasion Attacks Guided by Local Explanations Against Android
                  Malware Classification},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {4},
  pages        = {3165--3182},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3324265},
  doi          = {10.1109/TDSC.2023.3324265},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ShuY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/SongTRXLWG24,
  author       = {Qun Song and
                  Rui Tan and
                  Chao Ren and
                  Yan Xu and
                  Yang Lou and
                  Jianping Wang and
                  Hoay Beng Gooi},
  title        = {On Credibility of Adversarial Examples Against Learning-Based Grid
                  Voltage Stability Assessment},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {2},
  pages        = {585--599},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2022.3213012},
  doi          = {10.1109/TDSC.2022.3213012},
  timestamp    = {Sat, 27 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/SongTRXLWG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/TianCZTYT24,
  author       = {Zhiyi Tian and
                  Lei Cui and
                  Chenhan Zhang and
                  Shuaishuai Tan and
                  Shui Yu and
                  Yonghong Tian},
  title        = {The Role of Class Information in Model Inversion Attacks Against Image
                  Deep Learning Classifiers},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {4},
  pages        = {2407--2420},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3306748},
  doi          = {10.1109/TDSC.2023.3306748},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/TianCZTYT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/VasiliadisKSPIK24,
  author       = {Giorgos Vasiliadis and
                  Apostolos Karampelas and
                  Alexandros Shevtsov and
                  Panagiotis Papadopoulos and
                  Sotiris Ioannidis and
                  Alexandros Kapravelos},
  title        = {{WRIT:} Web Request Integrity and Attestation Against Malicious Browser
                  Extensions},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {4},
  pages        = {3082--3095},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3322516},
  doi          = {10.1109/TDSC.2023.3322516},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/VasiliadisKSPIK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WangLHGQLR24,
  author       = {Zhibo Wang and
                  Wenxin Liu and
                  Jiahui Hu and
                  Hengchang Guo and
                  Zhan Qin and
                  Jian Liu and
                  Kui Ren},
  title        = {Label-Free Poisoning Attack Against Deep Unsupervised Domain Adaptation},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {4},
  pages        = {1572--1586},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3286608},
  doi          = {10.1109/TDSC.2023.3286608},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/WangLHGQLR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WeiLDMJP24,
  author       = {Kang Wei and
                  Jun Li and
                  Ming Ding and
                  Chuan Ma and
                  Yo{-}Seb Jeon and
                  H. Vincent Poor},
  title        = {Covert Model Poisoning Against Federated Learning: Algorithm Design
                  and Optimization},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {3},
  pages        = {1196--1209},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3274119},
  doi          = {10.1109/TDSC.2023.3274119},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/WeiLDMJP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/XuHZXNHLD24,
  author       = {Guowen Xu and
                  Xingshuo Han and
                  Tianwei Zhang and
                  Shengmin Xu and
                  Jianting Ning and
                  Xinyi Huang and
                  Hongwei Li and
                  Robert H. Deng},
  title        = {{SIMC} 2.0: Improved Secure {ML} Inference Against Malicious Clients},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {4},
  pages        = {1708--1723},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3288557},
  doi          = {10.1109/TDSC.2023.3288557},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/XuHZXNHLD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhangCJPSX24,
  author       = {Youzhi Zhang and
                  Dongkai Chen and
                  Sushil Jajodia and
                  Andrea Pugliese and
                  V. S. Subrahmanian and
                  Yanhai Xiong},
  title        = {{GAIT:} {A} Game-Theoretic Defense Against Intellectual Property Theft},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {4},
  pages        = {1967--1980},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3299225},
  doi          = {10.1109/TDSC.2023.3299225},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ZhangCJPSX24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/technometrics/PangemananTIS24,
  author       = {Giano Excelsis Pangemanan and
                  Tamalia and
                  Hesti Indriani and
                  Suprianto},
  title        = {Mathematical Modeling and Soft Computing in Epidemiology Mathematical
                  Modeling and Soft Computing in Epidemiology , Edited by Jyoti Mishra,
                  Ritu Agarwal, and Abdon Atangana, 1st ed., Boca Raton, {FL:} {CRC}
                  Press, 2021, 440 pp., {\textsterling}120.00 (hbk), {ISBN} 9780367903053:
                  Edited by Jyoti Mishra, Ritu Agarwal, and Abdon Atangana, 1st ed.,
                  Boca Raton, {FL:} {CRC} Press, 2021, 440 pp., {\textsterling}120.00
                  (hbk), {ISBN} 9780367903053},
  journal      = {Technometrics},
  volume       = {66},
  number       = {2},
  pages        = {306--307},
  year         = {2024},
  url          = {https://doi.org/10.1080/00401706.2024.2339784},
  doi          = {10.1080/00401706.2024.2339784},
  timestamp    = {Tue, 14 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/technometrics/PangemananTIS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tele/ShenW24,
  author       = {Xiao{-}Liang Shen and
                  You Wu},
  title        = {From whispers to warriors: Public atmosphere's role in mobilizing
                  social media users against rumors},
  journal      = {Telematics Informatics},
  volume       = {90},
  pages        = {102133},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.tele.2024.102133},
  doi          = {10.1016/J.TELE.2024.102133},
  timestamp    = {Mon, 17 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tele/ShenW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/telsys/CarmoFCRLHH24,
  author       = {Rafael Moura do Carmo and
                  Guilherme de R. Ferreira and
                  Pedro Henrique Campelo and
                  Leonardo C. Resende and
                  Leonardo de Lima and
                  Felipe da Rocha Henriques and
                  Diego Barreto Haddad},
  title        = {Sparsity-aware distributed adaptive filtering with robustness against
                  impulsive noise and low {SNR}},
  journal      = {Telecommun. Syst.},
  volume       = {86},
  number       = {3},
  pages        = {451--461},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11235-024-01124-7},
  doi          = {10.1007/S11235-024-01124-7},
  timestamp    = {Wed, 31 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/telsys/CarmoFCRLHH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tem/HassaninMRTOS24,
  author       = {Mohammed Hassanin and
                  Nour Moustafa and
                  Imran Razzak and
                  M. Tanveer and
                  David G. A. Ormrod and
                  Jill Slay},
  title        = {Dynamic Hypersphere Embedding Scale Against Adversarial Attacks},
  journal      = {{IEEE} Trans. Engineering Management},
  volume       = {71},
  pages        = {12475--12486},
  year         = {2024},
  url          = {https://doi.org/10.1109/TEM.2022.3194487},
  doi          = {10.1109/TEM.2022.3194487},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tem/HassaninMRTOS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tem/VirmaniSAA24,
  author       = {Naveen Virmani and
                  Rajesh Kumar Singh and
                  Vaishali Agarwal and
                  Emel Aktas},
  title        = {Artificial Intelligence Applications for Responsive Healthcare Supply
                  Chains: {A} Decision-Making Framework},
  journal      = {{IEEE} Trans. Engineering Management},
  volume       = {71},
  pages        = {8591--8605},
  year         = {2024},
  url          = {https://doi.org/10.1109/TEM.2024.3370377},
  doi          = {10.1109/TEM.2024.3370377},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tem/VirmaniSAA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tetc/CallenesP24,
  author       = {Joseph Callenes and
                  Majid Poshtan},
  title        = {Dynamic Reconfiguration for Resilient State Estimation Against Cyber
                  Attacks},
  journal      = {{IEEE} Trans. Emerg. Top. Comput.},
  volume       = {12},
  number       = {2},
  pages        = {559--571},
  year         = {2024},
  url          = {https://doi.org/10.1109/TETC.2023.3266303},
  doi          = {10.1109/TETC.2023.3266303},
  timestamp    = {Thu, 04 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tetc/CallenesP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tetc/KalapaakingKY24,
  author       = {Aditya Pribadi Kalapaaking and
                  Ibrahim Khalil and
                  Xun Yi},
  title        = {Blockchain-Based Federated Learning With {SMPC} Model Verification
                  Against Poisoning Attack for Healthcare Systems},
  journal      = {{IEEE} Trans. Emerg. Top. Comput.},
  volume       = {12},
  number       = {1},
  pages        = {269--280},
  year         = {2024},
  url          = {https://doi.org/10.1109/TETC.2023.3268186},
  doi          = {10.1109/TETC.2023.3268186},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tetc/KalapaakingKY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tfs/AnbalaganJJ24,
  author       = {Pratap Anbalagan and
                  Jae{-}Hoon Jeong and
                  Young Hoon Joo},
  title        = {Secure Reachable Set Synthesis and Reliable Event-Driven Mechanism
                  for {T-S} Fuzzy Semi-Markovian Networked Control Systems Against Deception
                  Attacks},
  journal      = {{IEEE} Trans. Fuzzy Syst.},
  volume       = {32},
  number       = {7},
  pages        = {3928--3942},
  year         = {2024},
  url          = {https://doi.org/10.1109/TFUZZ.2024.3385783},
  doi          = {10.1109/TFUZZ.2024.3385783},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tfs/AnbalaganJJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tfs/ChenYL24,
  author       = {Zebin Chen and
                  Zhaoxu Yu and
                  Shugang Li},
  title        = {Output Feedback Adaptive Fuzzy Inverse Optimal Security Control Against
                  Sensor and Actuator Attacks for Nonlinear Cyber-Physical Systems},
  journal      = {{IEEE} Trans. Fuzzy Syst.},
  volume       = {32},
  number       = {5},
  pages        = {2554--2566},
  year         = {2024},
  url          = {https://doi.org/10.1109/TFUZZ.2024.3353813},
  doi          = {10.1109/TFUZZ.2024.3353813},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tfs/ChenYL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tfs/JiaoXP24,
  author       = {Shiyu Jiao and
                  Shengyuan Xu and
                  Ju H. Park},
  title        = {Hybrid-Triggered-Based Control Against Denial-of-Service Attacks for
                  Fuzzy Switched Systems With Persistent Dwell-Time},
  journal      = {{IEEE} Trans. Fuzzy Syst.},
  volume       = {32},
  number       = {3},
  pages        = {710--720},
  year         = {2024},
  url          = {https://doi.org/10.1109/TFUZZ.2023.3305349},
  doi          = {10.1109/TFUZZ.2023.3305349},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tfs/JiaoXP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tfs/LiJLY24,
  author       = {Lili Li and
                  Bin Jiang and
                  Tieshan Li and
                  Zhilin Yu},
  title        = {Rolling Detection Event-Triggered Output Regulation for Switched Interval
                  Type-2 Fuzzy Systems Against Data Integrity and Derivative Injection
                  Attacks},
  journal      = {{IEEE} Trans. Fuzzy Syst.},
  volume       = {32},
  number       = {3},
  pages        = {1515--1526},
  year         = {2024},
  url          = {https://doi.org/10.1109/TFUZZ.2023.3327313},
  doi          = {10.1109/TFUZZ.2023.3327313},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tfs/LiJLY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tfs/LiL24b,
  author       = {Yuan{-}Yuan Li and
                  Yuan{-}Xin Li},
  title        = {Adaptive Decentralized Fuzzy Resilient Control for Large-Scale Nonlinear
                  Systems Against Stochastic Disturbances and DoS Attacks},
  journal      = {{IEEE} Trans. Fuzzy Syst.},
  volume       = {32},
  number       = {3},
  pages        = {1494--1503},
  year         = {2024},
  url          = {https://doi.org/10.1109/TFUZZ.2023.3328030},
  doi          = {10.1109/TFUZZ.2023.3328030},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tfs/LiL24b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tfs/SajidMT24,
  author       = {M. Sajid and
                  Ashwani Kumar Malik and
                  Muhammad Tanveer},
  title        = {Intuitionistic Fuzzy Broad Learning System: Enhancing Robustness Against
                  Noise and Outliers},
  journal      = {{IEEE} Trans. Fuzzy Syst.},
  volume       = {32},
  number       = {8},
  pages        = {4460--4469},
  year         = {2024},
  url          = {https://doi.org/10.1109/TFUZZ.2024.3400898},
  doi          = {10.1109/TFUZZ.2024.3400898},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tfs/SajidMT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tfs/ShenSL24,
  author       = {Qikun Shen and
                  Peng Shi and
                  Chee Peng Lim},
  title        = {Fuzzy Adaptive Fault-Tolerant Stability Control Against Novel Actuator
                  Faults and Its Application to Mechanical Systems},
  journal      = {{IEEE} Trans. Fuzzy Syst.},
  volume       = {32},
  number       = {4},
  pages        = {2331--2340},
  year         = {2024},
  url          = {https://doi.org/10.1109/TFUZZ.2023.3343403},
  doi          = {10.1109/TFUZZ.2023.3343403},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tfs/ShenSL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tgrs/GasparyanDA24,
  author       = {Hayk A. Gasparyan and
                  Tatevik A. Davtyan and
                  Sos S. Agaian},
  title        = {A Novel Framework for Solar Panel Segmentation From Remote Sensing
                  Images: Utilizing Chebyshev Transformer and Hyperspectral Decomposition},
  journal      = {{IEEE} Trans. Geosci. Remote. Sens.},
  volume       = {62},
  pages        = {1--11},
  year         = {2024},
  url          = {https://doi.org/10.1109/TGRS.2024.3386402},
  doi          = {10.1109/TGRS.2024.3386402},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tgrs/GasparyanDA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tgrs/JiXDPF24,
  author       = {Penghui Ji and
                  Shiqi Xing and
                  Dahai Dai and
                  Bo Pang and
                  Dejun Feng},
  title        = {A Smart Multitransmitter Cooperative False Images Generation Method
                  Against Multichannel {SAR-GMTI}},
  journal      = {{IEEE} Trans. Geosci. Remote. Sens.},
  volume       = {62},
  pages        = {1--17},
  year         = {2024},
  url          = {https://doi.org/10.1109/TGRS.2024.3359317},
  doi          = {10.1109/TGRS.2024.3359317},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tgrs/JiXDPF24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tgrs/RatheeshJRSAS24,
  author       = {Smitha Ratheesh and
                  M. Jishad and
                  Vivek V. Rajiv and
                  Neerja Sharma and
                  Neeraj Agarwal and
                  Rashmi Sharma},
  title        = {Implication of Errors in Space-Based Sea Surface Salinity Measurement
                  on Ocean State Estimation: An Observing System Simulation Experiment
                  for the Tropical Indian Ocean},
  journal      = {{IEEE} Trans. Geosci. Remote. Sens.},
  volume       = {62},
  pages        = {1--6},
  year         = {2024},
  url          = {https://doi.org/10.1109/TGRS.2024.3402824},
  doi          = {10.1109/TGRS.2024.3402824},
  timestamp    = {Thu, 04 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tgrs/RatheeshJRSAS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tgrs/TollingerG24,
  author       = {Mathias Tollinger and
                  Rune Graversen},
  title        = {Validation of a SAR-Only Wind-Vector Retrieval Against Shipborne In
                  Situ Wind Observations in the European Arctic},
  journal      = {{IEEE} Trans. Geosci. Remote. Sens.},
  volume       = {62},
  pages        = {1--11},
  year         = {2024},
  url          = {https://doi.org/10.1109/TGRS.2024.3349693},
  doi          = {10.1109/TGRS.2024.3349693},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tgrs/TollingerG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tgrs/WuLGYL24,
  author       = {Zhilu Wu and
                  Bofeng Li and
                  Haibo Ge and
                  Leitong Yuan and
                  Yanxiong Liu},
  title        = {Satellite-Based Remote Sensing of Atmospheric Water Vapor Over Oceans:
                  An Inter-Comparison Against Shipborne {GNSS} Observations},
  journal      = {{IEEE} Trans. Geosci. Remote. Sens.},
  volume       = {62},
  pages        = {1--8},
  year         = {2024},
  url          = {https://doi.org/10.1109/TGRS.2024.3432774},
  doi          = {10.1109/TGRS.2024.3432774},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tgrs/WuLGYL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tgrs/XuXJGZ24,
  author       = {Yichu Xu and
                  Yonghao Xu and
                  Hongzan Jiao and
                  Zhi Gao and
                  Lefei Zhang},
  title        = {S{\({^3}\)}ANet: Spatial-Spectral Self-Attention Learning Network
                  for Defending Against Adversarial Attacks in Hyperspectral Image Classification},
  journal      = {{IEEE} Trans. Geosci. Remote. Sens.},
  volume       = {62},
  pages        = {1--13},
  year         = {2024},
  url          = {https://doi.org/10.1109/TGRS.2024.3381824},
  doi          = {10.1109/TGRS.2024.3381824},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tgrs/XuXJGZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tgrs/ZhangCPDSZ24,
  author       = {Yu Zhang and
                  Jianqi Chen and
                  Zhenbang Peng and
                  Yi Dang and
                  Zhenwei Shi and
                  Zhengxia Zou},
  title        = {Physical Adversarial Attacks Against Aerial Object Detection With
                  Feature-Aligned Expandable Textures},
  journal      = {{IEEE} Trans. Geosci. Remote. Sens.},
  volume       = {62},
  pages        = {1--15},
  year         = {2024},
  url          = {https://doi.org/10.1109/TGRS.2024.3426272},
  doi          = {10.1109/TGRS.2024.3426272},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tgrs/ZhangCPDSZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tgrs/ZhangGLWWQHZ24,
  author       = {Yu Zhang and
                  Zhiqiang Gong and
                  Wenlin Liu and
                  Hao Wen and
                  Pengcheng Wan and
                  Jiahao Qi and
                  Xikun Hu and
                  Ping Zhong},
  title        = {Empowering Physical Attacks With Jacobian Matrix Regularization Against
                  ViT-Based Detectors in {UAV} Remote Sensing Images},
  journal      = {{IEEE} Trans. Geosci. Remote. Sens.},
  volume       = {62},
  pages        = {1--14},
  year         = {2024},
  url          = {https://doi.org/10.1109/TGRS.2024.3416685},
  doi          = {10.1109/TGRS.2024.3416685},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tgrs/ZhangGLWWQHZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tgrs/ZhouSJXHZL24,
  author       = {Yue Zhou and
                  Shuqi Sun and
                  Xue Jiang and
                  Guozheng Xu and
                  Fengyuan Hu and
                  Ze Zhang and
                  Xingzhao Liu},
  title        = {{DGA:} Direction-Guided Attack Against Optical Aerial Detection in
                  Camera Shooting Direction-Agnostic Scenarios},
  journal      = {{IEEE} Trans. Geosci. Remote. Sens.},
  volume       = {62},
  pages        = {1--22},
  year         = {2024},
  url          = {https://doi.org/10.1109/TGRS.2024.3387486},
  doi          = {10.1109/TGRS.2024.3387486},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tgrs/ZhouSJXHZL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tie/BhaljaBAM24,
  author       = {Het Bhalja and
                  Bhavesh R. Bhalja and
                  Pramod Agarwal and
                  Om P. Malik},
  title        = {Time-Frequency Decomposition Based Protection Scheme for Power Transformer
                  - Simulation and Experimental Validation},
  journal      = {{IEEE} Trans. Ind. Electron.},
  volume       = {71},
  number       = {5},
  pages        = {5296--5306},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIE.2023.3288174},
  doi          = {10.1109/TIE.2023.3288174},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tie/BhaljaBAM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tie/HotaA24,
  author       = {Arpan Hota and
                  Vivek Agarwal},
  title        = {A Novel Leg-Integrated Switched Capacitor Inverter Topology for Three-Phase
                  Induction Motor Drives},
  journal      = {{IEEE} Trans. Ind. Electron.},
  volume       = {71},
  number       = {5},
  pages        = {4353--4360},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIE.2023.3281694},
  doi          = {10.1109/TIE.2023.3281694},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tie/HotaA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tie/JamaliSDSB24,
  author       = {Mahmood Jamali and
                  Mahdieh Sadat Sadabadi and
                  Masoud Davari and
                  Subham Sahoo and
                  Frede Blaabjerg},
  title        = {Resilient Cooperative Secondary Control of Islanded {AC} Microgrids
                  Utilizing Inverter-Based Resources Against State-Dependent False Data
                  Injection Attacks},
  journal      = {{IEEE} Trans. Ind. Electron.},
  volume       = {71},
  number       = {5},
  pages        = {4719--4730},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIE.2023.3281698},
  doi          = {10.1109/TIE.2023.3281698},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tie/JamaliSDSB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tie/KangGWLHP24,
  author       = {Tong Kang and
                  Nan Gu and
                  Dan Wang and
                  Lu Liu and
                  Qing Hu and
                  Zhouhua Peng},
  title        = {Neurodynamics-Based Attack-Defense Guidance of Autonomous Surface
                  Vehicles Against Multiple Attackers for Domain Protection},
  journal      = {{IEEE} Trans. Ind. Electron.},
  volume       = {71},
  number       = {10},
  pages        = {12655--12663},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIE.2024.3360603},
  doi          = {10.1109/TIE.2024.3360603},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tie/KangGWLHP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tie/PrabowoIABA24,
  author       = {Yos Prabowo and
                  Vishnu Mahadeva Iyer and
                  Apoorv Agarwal and
                  Subhashish Bhattacharya and
                  Eddy Aeloiza},
  title        = {Modular Hybrid Transformers Toward Grid Resilience: Efficiency Analysis
                  and Operation},
  journal      = {{IEEE} Trans. Ind. Electron.},
  volume       = {71},
  number       = {9},
  pages        = {10086--10097},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIE.2023.3340215},
  doi          = {10.1109/TIE.2023.3340215},
  timestamp    = {Tue, 18 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tie/PrabowoIABA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tie/RizzoS24,
  author       = {Santi Agatino Rizzo and
                  Nunzio Salerno},
  title        = {Actual Reasons Involving Turn-Off Losses Improvement With Increasing
                  Load and Gate Resistance in MOSFETs Enhanced With Kelvin Source},
  journal      = {{IEEE} Trans. Ind. Electron.},
  volume       = {71},
  number       = {1},
  pages        = {369--379},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIE.2023.3243272},
  doi          = {10.1109/TIE.2023.3243272},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tie/RizzoS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tie/VeerasamyQGCNG24,
  author       = {Veerapandiyan Veerasamy and
                  Haifeng Qiu and
                  Amer M. Y. M. Ghias and
                  Kapil Chauhan and
                  Hung Dinh Nguyen and
                  Hoay Beng Gooi},
  title        = {Federated-Learning-Based Distributed Frequency Control Against False
                  Data Injection Attack},
  journal      = {{IEEE} Trans. Ind. Electron.},
  volume       = {71},
  number       = {8},
  pages        = {8981--8992},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIE.2023.3325582},
  doi          = {10.1109/TIE.2023.3325582},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tie/VeerasamyQGCNG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AbdukhamidovATKA24,
  author       = {Eldor Abdukhamidov and
                  Mohammed Abuhamad and
                  George K. Thiruvathukal and
                  Hyoungshick Kim and
                  Tamer Abuhmed},
  title        = {SingleADV: Single-Class Target-Specific Attack Against Interpretable
                  Deep Learning Systems},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {5985--5998},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3407652},
  doi          = {10.1109/TIFS.2024.3407652},
  timestamp    = {Thu, 04 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/AbdukhamidovATKA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ArdizzonCTL24,
  author       = {Francesco Ardizzon and
                  Laura Crosara and
                  Stefano Tomasin and
                  Nicola Laurenti},
  title        = {On Mixing Authenticated and Non-Authenticated Signals Against {GNSS}
                  Spoofing},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {4480--4493},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3381473},
  doi          = {10.1109/TIFS.2024.3381473},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ArdizzonCTL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/CaiZDXKL24,
  author       = {Hanbo Cai and
                  Pengcheng Zhang and
                  Hai Dong and
                  Yan Xiao and
                  Stefanos Koffas and
                  Yiming Li},
  title        = {Toward Stealthy Backdoor Attacks Against Speech Recognition via Elements
                  of Sound},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {5852--5866},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3404885},
  doi          = {10.1109/TIFS.2024.3404885},
  timestamp    = {Tue, 18 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/CaiZDXKL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChenLHPW24,
  author       = {Yong Chen and
                  Xuedong Li and
                  Peng Hu and
                  Dezhong Peng and
                  Xu Wang},
  title        = {DifFilter: Defending Against Adversarial Perturbations With Diffusion
                  Filter},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {6779--6794},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3422923},
  doi          = {10.1109/TIFS.2024.3422923},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ChenLHPW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChenWLL24,
  author       = {Yijing Chen and
                  Hongxia Wang and
                  Wanjie Li and
                  Wenshan Li},
  title        = {A Steganography Immunoprocessing Framework Against CNN-Based and Handcrafted
                  Steganalysis},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {6055--6069},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3409075},
  doi          = {10.1109/TIFS.2024.3409075},
  timestamp    = {Thu, 04 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ChenWLL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DarjaniKRK24,
  author       = {Armin Darjani and
                  Nima Kavand and
                  Shubham Rai and
                  Akash Kumar},
  title        = {Thwarting GNN-Based Attacks Against Logic Locking},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {7200--7215},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3431991},
  doi          = {10.1109/TIFS.2024.3431991},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/DarjaniKRK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/FanHSFYL24,
  author       = {Linkun Fan and
                  Fazhi He and
                  Tongzhen Si and
                  Rubin Fan and
                  Chuanlong Ye and
                  Bing Li},
  title        = {{MBA:} Backdoor Attacks Against 3D Mesh Classifier},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {2127--2142},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3346644},
  doi          = {10.1109/TIFS.2023.3346644},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/FanHSFYL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/FanLJHYZ24,
  author       = {Wenshu Fan and
                  Hongwei Li and
                  Wenbo Jiang and
                  Meng Hao and
                  Shui Yu and
                  Xiao Zhang},
  title        = {Stealthy Targeted Backdoor Attacks Against Image Captioning},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {5655--5667},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3402179},
  doi          = {10.1109/TIFS.2024.3402179},
  timestamp    = {Tue, 18 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/FanLJHYZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/FanZWWZZY24,
  author       = {Haopeng Fan and
                  Hailong Zhang and
                  Yongjuan Wang and
                  Wenhao Wang and
                  Yanbei Zhu and
                  Haojin Zhang and
                  Qingjun Yuan},
  title        = {Screening Least Square Technique Assisted Multivariate Template Attack
                  Against the Random Polynomial Generation of Dilithium},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {7118--7132},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3430854},
  doi          = {10.1109/TIFS.2024.3430854},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/FanZWWZZY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/FuWNZ24,
  author       = {Xingquan Fu and
                  Guanghui Wen and
                  Mengfei Niu and
                  Wei Xing Zheng},
  title        = {Distributed Secure Filtering Against Eavesdropping Attacks in SINR-Based
                  Sensor Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {3483--3494},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3361177},
  doi          = {10.1109/TIFS.2024.3361177},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/FuWNZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GaoZSL24,
  author       = {Ge Gao and
                  Yuan Zhang and
                  Yaqing Song and
                  Shiyu Li},
  title        = {PrivSSO: Practical Single-Sign-On Authentication Against Subscription/Access
                  Pattern Leakage},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {5075--5089},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3392533},
  doi          = {10.1109/TIFS.2024.3392533},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/GaoZSL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GeZ24,
  author       = {Yunfei Ge and
                  Quanyan Zhu},
  title        = {{GAZETA:} GAme-Theoretic ZEro-Trust Authentication for Defense Against
                  Lateral Movement in 5G IoT Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {540--554},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3326975},
  doi          = {10.1109/TIFS.2023.3326975},
  timestamp    = {Fri, 08 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/GeZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GongSZZWBX24,
  author       = {Zirui Gong and
                  Liyue Shen and
                  Yanjun Zhang and
                  Leo Yu Zhang and
                  Jingwei Wang and
                  Guangdong Bai and
                  Yong Xiang},
  title        = {AgrAmplifier: Defending Federated Learning Against Poisoning Attacks
                  Through Local Update Amplification},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {1241--1250},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3333555},
  doi          = {10.1109/TIFS.2023.3333555},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/GongSZZWBX24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HaoLDHX24,
  author       = {Xiaohan Hao and
                  Chao Lin and
                  Wenhan Dong and
                  Xinyi Huang and
                  Hui Xiong},
  title        = {Robust and Secure Federated Learning Against Hybrid Attacks: {A} Generic
                  Architecture},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {1576--1588},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3336521},
  doi          = {10.1109/TIFS.2023.3336521},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/HaoLDHX24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HeSHDNTHLZ24,
  author       = {Ying He and
                  Zhili Shen and
                  Jingyu Hua and
                  Qixuan Dong and
                  Jiacheng Niu and
                  Wei Tong and
                  Xu Huang and
                  Chen Li and
                  Sheng Zhong},
  title        = {Backdoor Attack Against Split Neural Network-Based Vertical Federated
                  Learning},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {748--763},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3327853},
  doi          = {10.1109/TIFS.2023.3327853},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/HeSHDNTHLZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HuLZZWZD24,
  author       = {Xiaoxue Hu and
                  Geling Liu and
                  Baolin Zheng and
                  Lingchen Zhao and
                  Qian Wang and
                  Yufei Zhang and
                  Minxin Du},
  title        = {FastTextDodger: Decision-Based Adversarial Attack Against Black-Box
                  {NLP} Models With Extremely High Efficiency},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {2398--2411},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3350376},
  doi          = {10.1109/TIFS.2024.3350376},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/HuLZZWZD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/IssaMTC24,
  author       = {Wael Issa and
                  Nour Moustafa and
                  Benjamin P. Turnbull and
                  Kim{-}Kwang Raymond Choo},
  title        = {{RVE-PFL:} Robust Variational Encoder-Based Personalized Federated
                  Learning Against Model Inversion Attacks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {3772--3787},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3368879},
  doi          = {10.1109/TIFS.2024.3368879},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/IssaMTC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/JiaMLWD24,
  author       = {Ju Jia and
                  Siqi Ma and
                  Yang Liu and
                  Lina Wang and
                  Robert H. Deng},
  title        = {A Causality-Aligned Structure Rationalization Scheme Against Adversarial
                  Biased Perturbations for Graph Neural Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {59--73},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3318936},
  doi          = {10.1109/TIFS.2023.3318936},
  timestamp    = {Fri, 15 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/JiaMLWD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KeWH24,
  author       = {Da Ke and
                  Xiang Wang and
                  Zhitao Huang},
  title        = {Frequency-Selective Adversarial Attack Against Deep Learning-Based
                  Wireless Signal Classifiers},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {4001--4011},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3352423},
  doi          = {10.1109/TIFS.2024.3352423},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/KeWH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KongLJ24,
  author       = {Yubo Kong and
                  Zhong Li and
                  Changjun Jiang},
  title        = {{ASIA:} {A} Federated Boosting Tree Model Against Sequence Inference
                  Attacks in Financial Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {6991--7004},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3428412},
  doi          = {10.1109/TIFS.2024.3428412},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/KongLJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KuangLLJ24,
  author       = {Huafeng Kuang and
                  Hong Liu and
                  Xianming Lin and
                  Rongrong Ji},
  title        = {Defense Against Adversarial Attacks Using Topology Aligning Adversarial
                  Training},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {3659--3673},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3359820},
  doi          = {10.1109/TIFS.2024.3359820},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/KuangLLJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiCXLL24,
  author       = {Bin Li and
                  Jincheng Chen and
                  Yuxiong Xu and
                  Weixiang Li and
                  Zhenghui Liu},
  title        = {{DRAW:} Dual-Decoder-Based Robust Audio Watermarking Against Desynchronization
                  and Replay Attacks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {6529--6544},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3416047},
  doi          = {10.1109/TIFS.2024.3416047},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiCXLL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiZYNAP24,
  author       = {Kai Li and
                  Jingjing Zheng and
                  Xin Yuan and
                  Wei Ni and
                  {\"{O}}zg{\"{u}}r B. Akan and
                  H. Vincent Poor},
  title        = {Data-Agnostic Model Poisoning Against Federated Learning: {A} Graph
                  Autoencoder Approach},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {3465--3480},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3362147},
  doi          = {10.1109/TIFS.2024.3362147},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/LiZYNAP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuHCYLL24,
  author       = {Zizhen Liu and
                  Weiyang He and
                  Chip{-}Hong Chang and
                  Jing Ye and
                  Huawei Li and
                  Xiaowei Li},
  title        = {{SPFL:} {A} Self-Purified Federated Learning Method Against Poisoning
                  Attacks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {6604--6619},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3420135},
  doi          = {10.1109/TIFS.2024.3420135},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiuHCYLL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuJLLX24,
  author       = {Beiyuan Liu and
                  Jinjing Jiang and
                  Qian Liu and
                  Jiajia Liu and
                  Sai Xu},
  title        = {An Intelligent Reflecting Surface-Based Attack Scheme Against Dual-Functional
                  Radar and Communication Systems},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {4945--4956},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3390621},
  doi          = {10.1109/TIFS.2024.3390621},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiuJLLX24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuLCT24,
  author       = {Junlin Liu and
                  Xinchen Lyu and
                  Qimei Cui and
                  Xiaofeng Tao},
  title        = {Similarity-Based Label Inference Attack Against Training and Inference
                  of Split Learning},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {2881--2895},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3356821},
  doi          = {10.1109/TIFS.2024.3356821},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/LiuLCT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuXZWWL24,
  author       = {Gaoyang Liu and
                  Tianlong Xu and
                  Rui Zhang and
                  Zixiong Wang and
                  Chen Wang and
                  Ling Liu},
  title        = {Gradient-Leaks: Enabling Black-Box Membership Inference Attacks Against
                  Machine Learning Models},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {427--440},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3324772},
  doi          = {10.1109/TIFS.2023.3324772},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/LiuXZWWL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LuHWLZXJ24,
  author       = {Jianrong Lu and
                  Shengshan Hu and
                  Wei Wan and
                  Minghui Li and
                  Leo Yu Zhang and
                  Lulu Xue and
                  Hai Jin},
  title        = {Depriving the Survival Space of Adversaries Against Poisoned Gradients
                  in Federated Learning},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {5405--5418},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3360869},
  doi          = {10.1109/TIFS.2024.3360869},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LuHWLZXJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LvXCCJ24,
  author       = {Zefang Lv and
                  Liang Xiao and
                  Yifan Chen and
                  Haoyu Chen and
                  Xiangyang Ji},
  title        = {Safe Multi-Agent Reinforcement Learning for Wireless Applications
                  Against Adversarial Communications},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {6824--6839},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3423428},
  doi          = {10.1109/TIFS.2024.3423428},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LvXCCJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MaoYYZ24,
  author       = {Yunlong Mao and
                  Zhujing Ye and
                  Xinyu Yuan and
                  Sheng Zhong},
  title        = {Secure Model Aggregation Against Poisoning Attacks for Cross-Silo
                  Federated Learning With Robustness and Fairness},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {6321--6336},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3416042},
  doi          = {10.1109/TIFS.2024.3416042},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/MaoYYZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MiaoYLXLLD24,
  author       = {Yinbin Miao and
                  Xinru Yan and
                  Xinghua Li and
                  Shujiang Xu and
                  Ximeng Liu and
                  Hongwei Li and
                  Robert H. Deng},
  title        = {RFed: Robustness-Enhanced Privacy-Preserving Federated Learning Against
                  Poisoning Attack},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {5814--5827},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3402113},
  doi          = {10.1109/TIFS.2024.3402113},
  timestamp    = {Tue, 18 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/MiaoYLXLLD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MongardiniMJMM24,
  author       = {Alberto Maria Mongardini and
                  Massimo La Morgia and
                  Sushil Jajodia and
                  Luigi Vincenzo Mancini and
                  Alessandro Mei},
  title        = {{DARD:} Deceptive Approaches for Robust Defense Against {IP} Theft},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {5591--5606},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3402433},
  doi          = {10.1109/TIFS.2024.3402433},
  timestamp    = {Tue, 18 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/MongardiniMJMM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/PangZXX24,
  author       = {Yujing Pang and
                  Guangming Zhuang and
                  Jianwei Xia and
                  Xiangpeng Xie},
  title        = {Fault Detection and Robust Security Control for Implicit Jump Systems
                  Against Random {FDI} Attacks and Packet Loss Under Memorized Output-Perceptive
                  Event-Triggered Protocol},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {7362--7373},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3434739},
  doi          = {10.1109/TIFS.2024.3434739},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/PangZXX24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/QiuZJFYW24,
  author       = {Pengyu Qiu and
                  Xuhong Zhang and
                  Shouling Ji and
                  Chong Fu and
                  Xing Yang and
                  Ting Wang},
  title        = {HashVFL: Defending Against Data Reconstruction Attacks in Vertical
                  Federated Learning},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {3435--3450},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3356164},
  doi          = {10.1109/TIFS.2024.3356164},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/QiuZJFYW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/QuLWCJW24,
  author       = {Zhenqing Qu and
                  Xiang Ling and
                  Ting Wang and
                  Xiang Chen and
                  Shouling Ji and
                  Chunming Wu},
  title        = {AdvSQLi: Generating Adversarial {SQL} Injections Against Real-World
                  WAF-as-a-Service},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {2623--2638},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3350911},
  doi          = {10.1109/TIFS.2024.3350911},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/QuLWCJW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/QuXLLWL24,
  author       = {Zuomin Qu and
                  Zuping Xi and
                  Wei Lu and
                  Xiangyang Luo and
                  Qian Wang and
                  Bin Li},
  title        = {{DF-RAP:} {A} Robust Adversarial Perturbation for Defending Against
                  Deepfakes in Real-World Social Network Scenarios},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {3943--3957},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3372803},
  doi          = {10.1109/TIFS.2024.3372803},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/QuXLLWL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ShateriMLP24,
  author       = {Mohammadhadi Shateri and
                  Francisco Messina and
                  Fabrice Labeau and
                  Pablo Piantanida},
  title        = {Preserving Privacy in GANs Against Membership Inference Attack},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {1728--1743},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3342654},
  doi          = {10.1109/TIFS.2023.3342654},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ShateriMLP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SunJDLMDZ24,
  author       = {Wenli Sun and
                  Xinyang Jiang and
                  Shuguang Dou and
                  Dongsheng Li and
                  Duoqian Miao and
                  Cheng Deng and
                  Cairong Zhao},
  title        = {Invisible Backdoor Attack With Dynamic Triggers Against Person Re-Identification},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {307--319},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3322659},
  doi          = {10.1109/TIFS.2023.3322659},
  timestamp    = {Mon, 29 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/SunJDLMDZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TangZLDL24,
  author       = {Wenbing Tang and
                  Yuan Zhou and
                  Yang Liu and
                  Zuohua Ding and
                  Jing Liu},
  title        = {Robust Motion Planning for Multi-Robot Systems Against Position Deception
                  Attacks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {2157--2170},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3346647},
  doi          = {10.1109/TIFS.2023.3346647},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/TangZLDL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangYFW24,
  author       = {Minxiao Wang and
                  Ning Yang and
                  Nicolas J. Forcade{-}Perkins and
                  Ning Weng},
  title        = {ProGen: Projection-Based Adversarial Attack Generation Against Network
                  Intrusion Detection},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {5476--5491},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3402155},
  doi          = {10.1109/TIFS.2024.3402155},
  timestamp    = {Wed, 29 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WangYFW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WenCFWTR24,
  author       = {Yun Wen and
                  Gaojie Chen and
                  Sisai Fang and
                  Miaowen Wen and
                  Stefano Tomasin and
                  Marco Di Renzo},
  title        = {RIS-Assisted {UAV} Secure Communications With Artificial Noise-Aware
                  Trajectory Design Against Multiple Colluding Curious Users},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {3064--3076},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3356166},
  doi          = {10.1109/TIFS.2024.3356166},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/WenCFWTR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WuCFHZRXLX24,
  author       = {Cong Wu and
                  Jing Chen and
                  Qianru Fang and
                  Kun He and
                  Ziming Zhao and
                  Hao Ren and
                  Guowen Xu and
                  Yang Liu and
                  Yang Xiang},
  title        = {Rethinking Membership Inference Attacks Against Transfer Learning},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {6441--6454},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3413592},
  doi          = {10.1109/TIFS.2024.3413592},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WuCFHZRXLX24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XuZMML24,
  author       = {Chongyao Xu and
                  Litao Zhang and
                  Pui{-}In Mak and
                  Rui Paulo Martins and
                  Man{-}Kay Law},
  title        = {Fully Symmetrical Obfuscated Interconnection and Weak-PUF-Assisted
                  Challenge Obfuscation Strong PUFs Against Machine-Learning Modeling
                  Attacks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {3927--3942},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3372801},
  doi          = {10.1109/TIFS.2024.3372801},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/XuZMML24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YangXSWZ24,
  author       = {He Yang and
                  Wei Xi and
                  Yuhao Shen and
                  Canhui Wu and
                  Jizhong Zhao},
  title        = {RoseAgg: Robust Defense Against Targeted Collusion Attacks in Federated
                  Learning},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {2951--2966},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3352415},
  doi          = {10.1109/TIFS.2024.3352415},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/YangXSWZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YazdinejadDKSP24,
  author       = {Abbas Yazdinejad and
                  Ali Dehghantanha and
                  Hadis Karimipour and
                  Gautam Srivastava and
                  Reza M. Parizi},
  title        = {A Robust Privacy-Preserving Federated Learning Model Against Model
                  Poisoning Attacks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {6693--6708},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3420126},
  doi          = {10.1109/TIFS.2024.3420126},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/YazdinejadDKSP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YeZGZ24,
  author       = {Dayong Ye and
                  Tianqing Zhu and
                  Kun Gao and
                  Wanlei Zhou},
  title        = {Defending Against Label-Only Attacks via Meta-Reinforcement Learning},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {3295--3308},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3357292},
  doi          = {10.1109/TIFS.2024.3357292},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/YeZGZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YueZNWZLZ24,
  author       = {Tai Yue and
                  Fengwei Zhang and
                  Zhenyu Ning and
                  Pengfei Wang and
                  Xu Zhou and
                  Kai Lu and
                  Lei Zhou},
  title        = {Armor: Protecting Software Against Hardware Tracing Techniques},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {4247--4262},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3372816},
  doi          = {10.1109/TIFS.2024.3372816},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/YueZNWZLZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangYXTLLCD24,
  author       = {Yunming Zhang and
                  Dengpan Ye and
                  Caiyun Xie and
                  Long Tang and
                  Xin Liao and
                  Zi{-}yi Liu and
                  Chuanxi Chen and
                  Jiacheng Deng},
  title        = {Dual Defense: Adversarial, Traceable, and Invisible Robust Watermarking
                  Against Face Swapping},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {4628--4641},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3383648},
  doi          = {10.1109/TIFS.2024.3383648},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhangYXTLLCD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangZJZSW24,
  author       = {Shenyi Zhang and
                  Baolin Zheng and
                  Peipei Jiang and
                  Lingchen Zhao and
                  Chao Shen and
                  Qian Wang},
  title        = {Perception-Driven Imperceptible Adversarial Attack Against Decision-Based
                  Black-Box Models},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {3164--3177},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3359441},
  doi          = {10.1109/TIFS.2024.3359441},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhangZJZSW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhouCYCH24,
  author       = {Yuyang Zhou and
                  Guang Cheng and
                  Shui Yu and
                  Zongyao Chen and
                  Yujia Hu},
  title        = {MTDroid: {A} Moving Target Defense-Based Android Malware Detector
                  Against Evasion Attacks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {6377--6392},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3414339},
  doi          = {10.1109/TIFS.2024.3414339},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhouCYCH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhuMLZZ24,
  author       = {Yulin Zhu and
                  Tomasz P. Michalak and
                  Xiapu Luo and
                  Xiaoge Zhang and
                  Kai Zhou},
  title        = {Toward Secrecy-Aware Attacks Against Trust Prediction in Signed Social
                  Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {3567--3580},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3364366},
  doi          = {10.1109/TIFS.2024.3364366},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhuMLZZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhuZTLZ24,
  author       = {Liwang Zhu and
                  Xiaotian Zhou and
                  Jiahe Tian and
                  Wei Li and
                  Zhongzhi Zhang},
  title        = {Defending Against Malicious Influence Control in Online Leader-Follower
                  Social Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {4809--4819},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3383244},
  doi          = {10.1109/TIFS.2024.3383244},
  timestamp    = {Thu, 15 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhuZTLZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/CaoH24,
  author       = {Chaojin Cao and
                  Yaoyao He},
  title        = {An Online Probability Density Load Forecasting Against Concept Drift
                  Under Anomalous Events},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {20},
  number       = {4},
  pages        = {5241--5252},
  year         = {2024},
  url          = {https://doi.org/10.1109/TII.2023.3331076},
  doi          = {10.1109/TII.2023.3331076},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tii/CaoH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/ChengBLL24,
  author       = {Zihao Cheng and
                  Xuhui Bu and
                  Jiaqi Liang and
                  Jinghua Liu},
  title        = {Indirect-Direct Secure Load Frequency Control Against False Data Injection
                  Attacks},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {20},
  number       = {3},
  pages        = {4850--4862},
  year         = {2024},
  url          = {https://doi.org/10.1109/TII.2023.3330235},
  doi          = {10.1109/TII.2023.3330235},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tii/ChengBLL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/HanWWW24,
  author       = {Zhen Han and
                  Wei Wang and
                  Changyun Wen and
                  Lei Wang},
  title        = {Distributed Adaptive Consensus Control for Nonlinear Systems With
                  Active-Defense Mechanism Against Denial-of-Service Attacks},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {20},
  number       = {8},
  pages        = {10440--10451},
  year         = {2024},
  url          = {https://doi.org/10.1109/TII.2024.3393142},
  doi          = {10.1109/TII.2024.3393142},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tii/HanWWW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/HeLGQ24,
  author       = {Wangli He and
                  Shifen Li and
                  Xiaohua Ge and
                  Feng Qian},
  title        = {Secure Fully Distributed Event-Triggered Consensus of Multi-Agent
                  Systems Against Distributed Sequential Scaling Attacks},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {20},
  number       = {2},
  pages        = {1764--1775},
  year         = {2024},
  url          = {https://doi.org/10.1109/TII.2023.3281662},
  doi          = {10.1109/TII.2023.3281662},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tii/HeLGQ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/JinY24,
  author       = {Kaijing Jin and
                  Dan Ye},
  title        = {False-Data Injection Attacks Against Distributed Filters With Improved
                  Complete-Stealthiness},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {20},
  number       = {8},
  pages        = {10344--10353},
  year         = {2024},
  url          = {https://doi.org/10.1109/TII.2024.3393501},
  doi          = {10.1109/TII.2024.3393501},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tii/JinY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/JinZLL24,
  author       = {Wentao Jin and
                  Yadong Zhou and
                  Yang Liu and
                  Ting Liu},
  title        = {Stealthy Data Integrity Attack Against Consensus-Based Distributed
                  Energy Management Algorithm},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {20},
  number       = {8},
  pages        = {9976--9986},
  year         = {2024},
  url          = {https://doi.org/10.1109/TII.2024.3390409},
  doi          = {10.1109/TII.2024.3390409},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tii/JinZLL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/JoshiAKP24,
  author       = {Amrita Joshi and
                  Saurabh Agarwal and
                  Debi Prasanna Kanungo and
                  Rajib Kumar Panigrahi},
  title        = {Integration of Edge-AI Into IoT-Cloud Architecture for Landslide Monitoring
                  and Prediction},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {20},
  number       = {3},
  pages        = {4246--4258},
  year         = {2024},
  url          = {https://doi.org/10.1109/TII.2023.3319671},
  doi          = {10.1109/TII.2023.3319671},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tii/JoshiAKP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/LiCLLCXG24,
  author       = {Xin Li and
                  Yingxiu Chen and
                  Meihan Lin and
                  Yonghui Liang and
                  Cailian Chen and
                  Qimin Xu and
                  Xinping Guan},
  title        = {Determinacy-Oriented Task Offloading Scheduling Against DoS Attack
                  for TSN-Based Edge Computing Architecture},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {20},
  number       = {5},
  pages        = {7449--7458},
  year         = {2024},
  url          = {https://doi.org/10.1109/TII.2024.3359449},
  doi          = {10.1109/TII.2024.3359449},
  timestamp    = {Tue, 13 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tii/LiCLLCXG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/LiuLLZ24,
  author       = {Qifen Liu and
                  Siyao Liao and
                  Peng Li and
                  Hongwei Zhang},
  title        = {Resilient Control of {DC} Microgrids Against {FDI} Attacks on Communication
                  Links and Local Current Measurements},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {20},
  number       = {8},
  pages        = {10325--10333},
  year         = {2024},
  url          = {https://doi.org/10.1109/TII.2024.3393535},
  doi          = {10.1109/TII.2024.3393535},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tii/LiuLLZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/LiuLZS24,
  author       = {Yan Liu and
                  Tao Li and
                  Bo{-}Chao Zheng and
                  Mouquan Shen},
  title        = {Distributed Resilient State Estimation for Nonlinear Systems Against
                  Sensor Attacks},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {20},
  number       = {3},
  pages        = {3639--3649},
  year         = {2024},
  url          = {https://doi.org/10.1109/TII.2023.3308337},
  doi          = {10.1109/TII.2023.3308337},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tii/LiuLZS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/NaderiA24,
  author       = {Ehsan Naderi and
                  Arash Asrari},
  title        = {A Deep Learning Framework to Identify Remedial Action Schemes Against
                  False Data Injection Cyberattacks Targeting Smart Power Systems},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {20},
  number       = {2},
  pages        = {1208--1219},
  year         = {2024},
  url          = {https://doi.org/10.1109/TII.2023.3272625},
  doi          = {10.1109/TII.2023.3272625},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tii/NaderiA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/RenZYLZL24,
  author       = {Yan Ren and
                  Heng Zhang and
                  Wen Yang and
                  Ming Li and
                  Jian Zhang and
                  Hongran Li},
  title        = {Transferable Adversarial Attack Against Deep Reinforcement Learning-Based
                  Smart Grid Dynamic Pricing System},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {20},
  number       = {6},
  pages        = {9015--9025},
  year         = {2024},
  url          = {https://doi.org/10.1109/TII.2024.3379645},
  doi          = {10.1109/TII.2024.3379645},
  timestamp    = {Tue, 18 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tii/RenZYLZL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/ShenYTQ24,
  author       = {Xiaofeng Shen and
                  Heng Yao and
                  Shunquan Tan and
                  Chuan Qin},
  title        = {Hiding Face Into Background: {A} Proactive Countermeasure Against
                  Malicious Face Swapping},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {20},
  number       = {8},
  pages        = {10613--10623},
  year         = {2024},
  url          = {https://doi.org/10.1109/TII.2024.3396268},
  doi          = {10.1109/TII.2024.3396268},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tii/ShenYTQ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/ShiLB24,
  author       = {Wenlong Shi and
                  Hao Liang and
                  Myrna Bittner},
  title        = {Data-Driven Resilience Enhancement for Power Distribution Systems
                  Against Multishocks of Earthquakes},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {20},
  number       = {5},
  pages        = {7357--7369},
  year         = {2024},
  url          = {https://doi.org/10.1109/TII.2024.3359437},
  doi          = {10.1109/TII.2024.3359437},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tii/ShiLB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/TorayevMCSR24,
  author       = {Agajan Torayev and
                  Giovanna Mart{\'{\i}}nez{-}Arellano and
                  Jack C. Chaplin and
                  David Sanderson and
                  Svetan M. Ratchev},
  title        = {Online and Modular Energy Consumption Optimization of Industrial Robots},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {20},
  number       = {2},
  pages        = {1198--1207},
  year         = {2024},
  url          = {https://doi.org/10.1109/TII.2023.3272692},
  doi          = {10.1109/TII.2023.3272692},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tii/TorayevMCSR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/VermaC24,
  author       = {Praveen Verma and
                  Chandan Chakraborty},
  title        = {Load Redistribution Attacks Against Smart Grids-Models, Impacts, and
                  Defense: {A} Review},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {20},
  number       = {8},
  pages        = {10192--10208},
  year         = {2024},
  url          = {https://doi.org/10.1109/TII.2024.3393005},
  doi          = {10.1109/TII.2024.3393005},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tii/VermaC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/WangZBWLM24,
  author       = {Luyu Wang and
                  Kaifeng Zhang and
                  Wenjun Bi and
                  Ying Wang and
                  Yaping Li and
                  Wenbo Mao},
  title        = {Indirect Coordinated Attack Against Relay via Load-Side Power Electronics
                  and Its Defense Strategy},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {20},
  number       = {4},
  pages        = {5112--5124},
  year         = {2024},
  url          = {https://doi.org/10.1109/TII.2023.3330307},
  doi          = {10.1109/TII.2023.3330307},
  timestamp    = {Tue, 16 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tii/WangZBWLM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/WangZXL24,
  author       = {Yongkang Wang and
                  Di{-}Hua Zhai and
                  Yuanqing Xia and
                  Danyang Liu},
  title        = {PerVK: {A} Robust Personalized Federated Framework to Defend Against
                  Backdoor Attacks for IoT Applications},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {20},
  number       = {3},
  pages        = {4930--4939},
  year         = {2024},
  url          = {https://doi.org/10.1109/TII.2023.3329688},
  doi          = {10.1109/TII.2023.3329688},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tii/WangZXL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/XueWNZZL24,
  author       = {Mingfu Xue and
                  Yinghao Wu and
                  Shifeng Ni and
                  Leo Yu Zhang and
                  Yushu Zhang and
                  Weiqiang Liu},
  title        = {Untargeted Backdoor Attack Against Deep Neural Networks With Imperceptible
                  Trigger},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {20},
  number       = {3},
  pages        = {5004--5013},
  year         = {2024},
  url          = {https://doi.org/10.1109/TII.2023.3329641},
  doi          = {10.1109/TII.2023.3329641},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tii/XueWNZZL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/ZhaoCLLYS24,
  author       = {Yirui Zhao and
                  Yijia Cao and
                  Yong Li and
                  Zhiyi Li and
                  Wenxuan Yao and
                  Xingyu Shi},
  title        = {Robust Substation Enhancement Strategy for Allocating the Defensive
                  Resource Against the Cyber-Attacks on IEDs},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {20},
  number       = {3},
  pages        = {3539--3550},
  year         = {2024},
  url          = {https://doi.org/10.1109/TII.2023.3295417},
  doi          = {10.1109/TII.2023.3295417},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tii/ZhaoCLLYS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/ZhaoMSZ24,
  author       = {Xin Zhao and
                  Zhongjing Ma and
                  Xingyu Shi and
                  Suli Zou},
  title        = {Attack Detection and Mitigation Scheme of Load Frequency Control Systems
                  Against False Data Injection Attacks},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {20},
  number       = {8},
  pages        = {9952--9962},
  year         = {2024},
  url          = {https://doi.org/10.1109/TII.2024.3390549},
  doi          = {10.1109/TII.2024.3390549},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tii/ZhaoMSZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tim/DanZQZOLT24,
  author       = {Bingbing Dan and
                  Zijian Zhu and
                  Xiaoping Qi and
                  Jianlin Zhang and
                  Yimin Ouyang and
                  Meihui Li and
                  Tao Tang},
  title        = {Dynamic Weight-Guided Smooth-Sparse Decomposition for Small Target
                  Detection Against Strong Vignetting Background},
  journal      = {{IEEE} Trans. Instrum. Meas.},
  volume       = {73},
  pages        = {1--15},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIM.2023.3341138},
  doi          = {10.1109/TIM.2023.3341138},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tim/DanZQZOLT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tim/DumanTWD24,
  author       = {Onur Duman and
                  Azadeh Tabiban and
                  Lingyu Wang and
                  Mourad Debbabi},
  title        = {Measuring and Improving the Security Posture of {IEC} 61850 Substations
                  Against Supply Chain Attacks},
  journal      = {{IEEE} Trans. Instrum. Meas.},
  volume       = {73},
  pages        = {1--20},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIM.2024.3400328},
  doi          = {10.1109/TIM.2024.3400328},
  timestamp    = {Tue, 18 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tim/DumanTWD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tim/NaheemK24,
  author       = {Khawar Naheem and
                  Mun Sang Kim},
  title        = {A Robust Indoor Pedestrian Localization Approach Against Human Body
                  Shadowing for UWB-Enabled Smartphones},
  journal      = {{IEEE} Trans. Instrum. Meas.},
  volume       = {73},
  pages        = {1--13},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIM.2024.3368497},
  doi          = {10.1109/TIM.2024.3368497},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tim/NaheemK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tinstmc/YueGS24,
  author       = {Wei Yue and
                  XiangJun Guo and
                  Hongxia Shen},
  title        = {Internet of connected vehicles against cyber-attacks based on resilient
                  adaptive event trigger mechanism control},
  journal      = {Trans. Inst. Meas. Control},
  volume       = {46},
  number       = {2},
  pages        = {223--236},
  year         = {2024},
  url          = {https://doi.org/10.1177/01423312231169560},
  doi          = {10.1177/01423312231169560},
  timestamp    = {Wed, 24 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tinstmc/YueGS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tip/XiaZLLYWG24,
  author       = {Ruiyang Xia and
                  Dawei Zhou and
                  Decheng Liu and
                  Jie Li and
                  Lin Yuan and
                  Nannan Wang and
                  Xinbo Gao},
  title        = {Inspector for Face Forgery Detection: Defending Against Adversarial
                  Attacks From Coarse to Fine},
  journal      = {{IEEE} Trans. Image Process.},
  volume       = {33},
  pages        = {4432--4443},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIP.2024.3434388},
  doi          = {10.1109/TIP.2024.3434388},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tip/XiaZLLYWG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tip/ZhangYZSN24,
  author       = {Zheng Zhang and
                  Xu Yuan and
                  Lei Zhu and
                  Jingkuan Song and
                  Liqiang Nie},
  title        = {BadCM: Invisible Backdoor Attack Against Cross-Modal Learning},
  journal      = {{IEEE} Trans. Image Process.},
  volume       = {33},
  pages        = {2558--2571},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIP.2024.3378918},
  doi          = {10.1109/TIP.2024.3378918},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tip/ZhangYZSN24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tis/BhatiaA24,
  author       = {Kiran Vinod Bhatia and
                  Payal Arora},
  title        = {Clip the blue bird: Discursive strategies of Hindutva digital mobilization
                  against Twitter in India},
  journal      = {Inf. Soc.},
  volume       = {40},
  number       = {3},
  pages        = {232--244},
  year         = {2024},
  url          = {https://doi.org/10.1080/01972243.2024.2327852},
  doi          = {10.1080/01972243.2024.2327852},
  timestamp    = {Tue, 14 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tis/BhatiaA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/0008DANS024,
  author       = {Shen Wang and
                  Mahshid Delavar and
                  Muhammad Ajmal Azad and
                  Farshad Nabizadeh and
                  Steve Smith and
                  Feng Hao},
  title        = {Spoofing Against Spoofing: Toward Caller {ID} Verification in Heterogeneous
                  Telecommunication Systems},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {27},
  number       = {1},
  pages        = {1:1--1:25},
  year         = {2024},
  url          = {https://doi.org/10.1145/3625546},
  doi          = {10.1145/3625546},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/0008DANS024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ParkK24,
  author       = {Namgyu Park and
                  Jong Kim},
  title        = {Toward Robust {ASR} System against Audio Adversarial Examples using
                  Agitated Logit},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {27},
  number       = {2},
  pages        = {20},
  year         = {2024},
  url          = {https://doi.org/10.1145/3661822},
  doi          = {10.1145/3661822},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/ParkK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/titb/SharmaSSKSS24a,
  author       = {Ritesh Sharma and
                  Sameer Shrivastava and
                  Sanjay Kumar Singh and
                  Abhinav Kumar and
                  Amit Kumar Singh and
                  Sonal Saxena},
  title        = {Artificial Intelligence-Based Model for Predicting the Minimum Inhibitory
                  Concentration of Antibacterial Peptides Against {ESKAPEE} Pathogens},
  journal      = {{IEEE} J. Biomed. Health Informatics},
  volume       = {28},
  number       = {4},
  pages        = {1949--1958},
  year         = {2024},
  url          = {https://doi.org/10.1109/JBHI.2023.3271611},
  doi          = {10.1109/JBHI.2023.3271611},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/titb/SharmaSSKSS24a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tits/AliBFAQ24,
  author       = {Hassan Ali and
                  Muhammad Atif Butt and
                  Fethi Filali and
                  Ala I. Al{-}Fuqaha and
                  Junaid Qadir},
  title        = {Consistent Valid Physically-Realizable Adversarial Attack Against
                  Crowd-Flow Prediction Models},
  journal      = {{IEEE} Trans. Intell. Transp. Syst.},
  volume       = {25},
  number       = {6},
  pages        = {5567--5582},
  year         = {2024},
  url          = {https://doi.org/10.1109/TITS.2023.3343971},
  doi          = {10.1109/TITS.2023.3343971},
  timestamp    = {Tue, 18 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tits/AliBFAQ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tits/LiuXTP24,
  author       = {Chun Liu and
                  Zhiwei Xia and
                  Yongxiao Tian and
                  Ron J. Patton},
  title        = {Defense and Tolerance Technique Against Attacks and Faults on Leader-Following
                  Multi-USVs},
  journal      = {{IEEE} Trans. Intell. Transp. Syst.},
  volume       = {25},
  number       = {6},
  pages        = {5450--5461},
  year         = {2024},
  url          = {https://doi.org/10.1109/TITS.2023.3330570},
  doi          = {10.1109/TITS.2023.3330570},
  timestamp    = {Tue, 18 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tits/LiuXTP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tits/XieCDTTM24,
  author       = {Qian Xie and
                  Ta Ying Cheng and
                  Zhuangzhuang Dai and
                  Vu H. Tran and
                  Niki Trigoni and
                  Andrew Markham},
  title        = {Illumination-Aware Hallucination-Based Domain Adaptation for Thermal
                  Pedestrian Detection},
  journal      = {{IEEE} Trans. Intell. Transp. Syst.},
  volume       = {25},
  number       = {1},
  pages        = {315--326},
  year         = {2024},
  url          = {https://doi.org/10.1109/TITS.2023.3307167},
  doi          = {10.1109/TITS.2023.3307167},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tits/XieCDTTM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tits/XuYLCKGR24,
  author       = {Dongyang Xu and
                  Keping Yu and
                  Lei Liu and
                  Guolong Chen and
                  Neeraj Kumar and
                  Mohsen Guizani and
                  James A. Ritcey},
  title        = {Post-Quantum Authentication Against Cyber-Physical Attacks in V2X-Based
                  Autonomous Vehicle Platoon},
  journal      = {{IEEE} Trans. Intell. Transp. Syst.},
  volume       = {25},
  number       = {6},
  pages        = {5034--5044},
  year         = {2024},
  url          = {https://doi.org/10.1109/TITS.2023.3339787},
  doi          = {10.1109/TITS.2023.3339787},
  timestamp    = {Tue, 18 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tits/XuYLCKGR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tiv/DandapatGAK24,
  author       = {Jyotirindra Dandapat and
                  Nishant Gupta and
                  Satyam Agarwal and
                  Brijesh Kumbhani},
  title        = {Service Time Maximization for Data Collection in Multi-UAV-Aided Networks},
  journal      = {{IEEE} Trans. Intell. Veh.},
  volume       = {9},
  number       = {1},
  pages        = {328--337},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIV.2023.3287629},
  doi          = {10.1109/TIV.2023.3287629},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tiv/DandapatGAK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tiv/KimS24,
  author       = {Youngjun Kim and
                  Jitae Shin},
  title        = {Efficient and Robust Object Detection Against Multi-Type Corruption
                  Using Complete Edge Based on Lightweight Parameter Isolation},
  journal      = {{IEEE} Trans. Intell. Veh.},
  volume       = {9},
  number       = {2},
  pages        = {3181--3194},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIV.2024.3351271},
  doi          = {10.1109/TIV.2024.3351271},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tiv/KimS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tiv/LiuDJX24,
  author       = {Jingxuan Liu and
                  Sanbo Ding and
                  Yan{-}Hui Jing and
                  Xiangpeng Xie},
  title        = {A Periodic Event-Triggered Vehicle Platooning Scheme Against Denial-of-Service
                  Attacks},
  journal      = {{IEEE} Trans. Intell. Veh.},
  volume       = {9},
  number       = {1},
  pages        = {839--851},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIV.2023.3338235},
  doi          = {10.1109/TIV.2023.3338235},
  timestamp    = {Tue, 02 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tiv/LiuDJX24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tiv/TengYZLWWTYLCW24,
  author       = {Siyu Teng and
                  Ran Yan and
                  Xiaotong Zhang and
                  Yuchen Li and
                  Xingxia Wang and
                  Yutong Wang and
                  Yonglin Tian and
                  Hui Yu and
                  Lingxi Li and
                  Long Chen and
                  Fei{-}Yue Wang},
  title        = {Sora for Hierarchical Parallel Motion Planner: {A} Safe End-to-End
                  Method Against {OOD} Events},
  journal      = {{IEEE} Trans. Intell. Veh.},
  volume       = {9},
  number       = {4},
  pages        = {4573--4576},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIV.2024.3392647},
  doi          = {10.1109/TIV.2024.3392647},
  timestamp    = {Tue, 16 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tiv/TengYZLWWTYLCW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tiv/YuHX24,
  author       = {Wei Yu and
                  Deqing Huang and
                  Kai Xu},
  title        = {Active Quantizer-Based Model-Free Adaptive Consensus Tracking for
                  Multiple HSTs Against Sensor Bias},
  journal      = {{IEEE} Trans. Intell. Veh.},
  volume       = {9},
  number       = {1},
  pages        = {2139--2148},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIV.2023.3314824},
  doi          = {10.1109/TIV.2023.3314824},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tiv/YuHX24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/HarrazWC24,
  author       = {Sajede Harraz and
                  Yuyan Wang and
                  Shuang Cong},
  title        = {Unilateral protection scheme for N-qubit {GHZ} states against decoherence:
                  a resource-efficient approach},
  journal      = {J. Supercomput.},
  volume       = {80},
  number       = {12},
  pages        = {17004--17020},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11227-024-06101-0},
  doi          = {10.1007/S11227-024-06101-0},
  timestamp    = {Mon, 15 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tjs/HarrazWC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/HarrazWC24a,
  author       = {Sajede Harraz and
                  Yuyan Wang and
                  Shuang Cong},
  title        = {Correction to: Unilateral protection scheme for N-qubit {GHZ} states
                  against decoherence: a resource-efficient approach},
  journal      = {J. Supercomput.},
  volume       = {80},
  number       = {13},
  pages        = {19942},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11227-024-06179-6},
  doi          = {10.1007/S11227-024-06179-6},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tjs/HarrazWC24a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/MehraRA24,
  author       = {Sunakshi Mehra and
                  Virender Ranga and
                  Ritu Agarwal},
  title        = {A deep learning approach to dysarthric utterance classification with
                  BiLSTM-GRU, speech cue filtering, and log mel spectrograms},
  journal      = {J. Supercomput.},
  volume       = {80},
  number       = {10},
  pages        = {14520--14547},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11227-024-06015-x},
  doi          = {10.1007/S11227-024-06015-X},
  timestamp    = {Thu, 04 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tjs/MehraRA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/SoodH24,
  author       = {Shaurya Sood and
                  Neminath Hubballi},
  title        = {SlowTrack: detecting slow rate Denial of Service attacks against {HTTP}
                  with behavioral parameters},
  journal      = {J. Supercomput.},
  volume       = {80},
  number       = {2},
  pages        = {1788--1817},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11227-023-05453-3},
  doi          = {10.1007/S11227-023-05453-3},
  timestamp    = {Fri, 02 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tjs/SoodH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tkde/HuangOYHZZZZ24,
  author       = {Kai Huang and
                  Gaoya Ouyang and
                  Qingqing Ye and
                  Haibo Hu and
                  Bolong Zheng and
                  Xi Zhao and
                  Ruiyuan Zhang and
                  Xiaofang Zhou},
  title        = {LDPGuard: Defenses Against Data Poisoning Attacks to Local Differential
                  Privacy Protocols},
  journal      = {{IEEE} Trans. Knowl. Data Eng.},
  volume       = {36},
  number       = {7},
  pages        = {3195--3209},
  year         = {2024},
  url          = {https://doi.org/10.1109/TKDE.2024.3358909},
  doi          = {10.1109/TKDE.2024.3358909},
  timestamp    = {Tue, 18 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tkde/HuangOYHZZZZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tkde/YuanDXTL24,
  author       = {Lixiang Yuan and
                  Mingxing Duan and
                  Guoqing Xiao and
                  Zhuo Tang and
                  Kenli Li},
  title        = {{BM-FL:} {A} Balanced Weight Strategy for Multi-Stage Federated Learning
                  Against Multi-Client Data Skewing},
  journal      = {{IEEE} Trans. Knowl. Data Eng.},
  volume       = {36},
  number       = {9},
  pages        = {4486--4498},
  year         = {2024},
  url          = {https://doi.org/10.1109/TKDE.2024.3372708},
  doi          = {10.1109/TKDE.2024.3372708},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tkde/YuanDXTL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tkde/ZhangYY24,
  author       = {Shijie Zhang and
                  Wei Yuan and
                  Hongzhi Yin},
  title        = {Comprehensive Privacy Analysis on Federated Recommender System Against
                  Attribute Inference Attacks},
  journal      = {{IEEE} Trans. Knowl. Data Eng.},
  volume       = {36},
  number       = {3},
  pages        = {987--999},
  year         = {2024},
  url          = {https://doi.org/10.1109/TKDE.2023.3295601},
  doi          = {10.1109/TKDE.2023.3295601},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tkde/ZhangYY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/HongD24,
  author       = {Shu Hong and
                  Lingjie Duan},
  title        = {Location Privacy Protection Game Against Adversary Through Multi-User
                  Cooperative Obfuscation},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {23},
  number       = {3},
  pages        = {2066--2077},
  year         = {2024},
  url          = {https://doi.org/10.1109/TMC.2023.3249465},
  doi          = {10.1109/TMC.2023.3249465},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tmc/HongD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/HuangLMZLSLG24,
  author       = {Jinyang Huang and
                  Bin Liu and
                  Chenglin Miao and
                  Xiang Zhang and
                  Jianchun Liu and
                  Lu Su and
                  Zhi Liu and
                  Yu Gu},
  title        = {PhyFinAtt: An Undetectable Attack Framework Against {PHY} Layer Fingerprint-Based
                  WiFi Authentication},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {23},
  number       = {7},
  pages        = {7753--7770},
  year         = {2024},
  url          = {https://doi.org/10.1109/TMC.2023.3338954},
  doi          = {10.1109/TMC.2023.3338954},
  timestamp    = {Tue, 06 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmc/HuangLMZLSLG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/LiuZHWG24,
  author       = {Yibing Liu and
                  Xiongtao Zhang and
                  Lijun Huo and
                  Jun Wu and
                  Mohsen Guizani},
  title        = {Swarm Learning and Knowledge Distillation Empowered Self-Driving Detection
                  Against Threat Behavior for Intelligent IoT},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {23},
  number       = {6},
  pages        = {7117--7134},
  year         = {2024},
  url          = {https://doi.org/10.1109/TMC.2023.3330514},
  doi          = {10.1109/TMC.2023.3330514},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmc/LiuZHWG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/SakaiSKW24,
  author       = {Kazuya Sakai and
                  Min{-}Te Sun and
                  Wei{-}Shinn Ku and
                  Jie Wu},
  title        = {Barrier Penetration Routing Against Wireless Spy Sensors},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {23},
  number       = {5},
  pages        = {4634--4647},
  year         = {2024},
  url          = {https://doi.org/10.1109/TMC.2023.3294415},
  doi          = {10.1109/TMC.2023.3294415},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmc/SakaiSKW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/ZhangLLWCZW24,
  author       = {Xiaohan Zhang and
                  Peng Liu and
                  Bohao Lu and
                  Yang Wang and
                  Xiaohan Chen and
                  Yanxin Zhang and
                  Zhi Wang},
  title        = {MTSFBet: {A} Hand-Gesture-Recognition-Based Identity Authentication
                  Approach for Passive Keyless Entry Against Relay Attack},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {23},
  number       = {2},
  pages        = {1902--1913},
  year         = {2024},
  url          = {https://doi.org/10.1109/TMC.2023.3243772},
  doi          = {10.1109/TMC.2023.3243772},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tmc/ZhangLLWCZW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmi/WegierakCPWGKE24,
  author       = {Dana Wegierak and
                  Michaela B. Cooley and
                  Reshani Perera and
                  William J. Wulftange and
                  Umut A. Gurkan and
                  Michael C. Kolios and
                  Agata A. Exner},
  title        = {Decorrelation Time Mapping as an Analysis Tool for Nanobubble-Based
                  Contrast Enhanced Ultrasound Imaging},
  journal      = {{IEEE} Trans. Medical Imaging},
  volume       = {43},
  number       = {6},
  pages        = {2370--2380},
  year         = {2024},
  url          = {https://doi.org/10.1109/TMI.2024.3364076},
  doi          = {10.1109/TMI.2024.3364076},
  timestamp    = {Tue, 18 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmi/WegierakCPWGKE24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmlr/NokabadiL024,
  author       = {Fatemeh Nourilenjan Nokabadi and
                  Jean{-}Fran{\c{c}}ois Lalonde and
                  Christian Gagn{\'{e}}},
  title        = {Reproducibility Study on Adversarial Attacks Against Robust Transformer
                  Trackers},
  journal      = {Trans. Mach. Learn. Res.},
  volume       = {2024},
  year         = {2024},
  url          = {https://openreview.net/forum?id=FEEKR0Vl9s},
  timestamp    = {Thu, 08 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmlr/NokabadiL024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmlr/SinghCAAPGLH0XP24,
  author       = {Avi Singh and
                  John D. Co{-}Reyes and
                  Rishabh Agarwal and
                  Ankesh Anand and
                  Piyush Patil and
                  Xavier Garcia and
                  Peter J. Liu and
                  James Harrison and
                  Jaehoon Lee and
                  Kelvin Xu and
                  Aaron T. Parisi and
                  Abhishek Kumar and
                  Alexander A. Alemi and
                  Alex Rizkowsky and
                  Azade Nova and
                  Ben Adlam and
                  Bernd Bohnet and
                  Gamaleldin Fathy Elsayed and
                  Hanie Sedghi and
                  Igor Mordatch and
                  Isabelle Simpson and
                  Izzeddin Gur and
                  Jasper Snoek and
                  Jeffrey Pennington and
                  Jiri Hron and
                  Kathleen Kenealy and
                  Kevin Swersky and
                  Kshiteej Mahajan and
                  Laura Culp and
                  Lechao Xiao and
                  Maxwell L. Bileschi and
                  Noah Constant and
                  Roman Novak and
                  Rosanne Liu and
                  Tris Warkentin and
                  Yundi Qian and
                  Yamini Bansal and
                  Ethan Dyer and
                  Behnam Neyshabur and
                  Jascha Sohl{-}Dickstein and
                  Noah Fiedel},
  title        = {Beyond Human Data: Scaling Self-Training for Problem-Solving with
                  Language Models},
  journal      = {Trans. Mach. Learn. Res.},
  volume       = {2024},
  year         = {2024},
  url          = {https://openreview.net/forum?id=lNAyUngGFK},
  timestamp    = {Thu, 08 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmlr/SinghCAAPGLH0XP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmlr/ZhaoHK24,
  author       = {Tianqi Zhao and
                  Alan Hanjalic and
                  Megha Khosla},
  title        = {{AGALE:} {A} Graph-Aware Continual Learning Evaluation Framework},
  journal      = {Trans. Mach. Learn. Res.},
  volume       = {2024},
  year         = {2024},
  url          = {https://openreview.net/forum?id=xDTKRLyaNN},
  timestamp    = {Thu, 08 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmlr/ZhaoHK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmm/FrantsAP24,
  author       = {Vladimir Frants and
                  Sos S. Agaian and
                  Karen Panetta},
  title        = {QSAM-Net: Rain Streak Removal by Quaternion Neural Network With Self-Attention
                  Module},
  journal      = {{IEEE} Trans. Multim.},
  volume       = {26},
  pages        = {789--798},
  year         = {2024},
  url          = {https://doi.org/10.1109/TMM.2023.3271829},
  doi          = {10.1109/TMM.2023.3271829},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tmm/FrantsAP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmm/LiuSBKS24,
  author       = {Hong Liu and
                  Yongqing Sun and
                  Yukihiro Bandoh and
                  Masaki Kitahara and
                  Shin'ichi Satoh},
  title        = {Deep Counterfactual Representation Learning for Visual Recognition
                  Against Weather Corruptions},
  journal      = {{IEEE} Trans. Multim.},
  volume       = {26},
  pages        = {5257--5272},
  year         = {2024},
  url          = {https://doi.org/10.1109/TMM.2023.3330534},
  doi          = {10.1109/TMM.2023.3330534},
  timestamp    = {Tue, 09 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmm/LiuSBKS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmm/WangLZS24,
  author       = {Jian Wang and
                  Fan Li and
                  Xuchong Zhang and
                  Hongbin Sun},
  title        = {Adversarial Obstacle Generation Against LiDAR-Based 3D Object Detection},
  journal      = {{IEEE} Trans. Multim.},
  volume       = {26},
  pages        = {2686--2699},
  year         = {2024},
  url          = {https://doi.org/10.1109/TMM.2023.3302018},
  doi          = {10.1109/TMM.2023.3302018},
  timestamp    = {Mon, 17 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmm/WangLZS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnn/LiuKSK24,
  author       = {Guanxiong Liu and
                  Abdallah Khreishah and
                  Fatima Sharadgah and
                  Issa Khalil},
  title        = {An Adaptive Black-Box Defense Against Trojan Attacks (TrojDef)},
  journal      = {{IEEE} Trans. Neural Networks Learn. Syst.},
  volume       = {35},
  number       = {4},
  pages        = {5367--5381},
  year         = {2024},
  url          = {https://doi.org/10.1109/TNNLS.2022.3204283},
  doi          = {10.1109/TNNLS.2022.3204283},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tnn/LiuKSK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnn/LiuLLZW24,
  author       = {Ao Liu and
                  Beibei Li and
                  Tao Li and
                  Pan Zhou and
                  Rui Wang},
  title        = {{AN-GCN:} An Anonymous Graph Convolutional Network Against Edge-Perturbing
                  Attacks},
  journal      = {{IEEE} Trans. Neural Networks Learn. Syst.},
  volume       = {35},
  number       = {1},
  pages        = {88--102},
  year         = {2024},
  url          = {https://doi.org/10.1109/TNNLS.2022.3172296},
  doi          = {10.1109/TNNLS.2022.3172296},
  timestamp    = {Thu, 20 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tnn/LiuLLZW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnn/XingGEMT24,
  author       = {Yang Xing and
                  Stuart Golodetz and
                  Aluna Everitt and
                  Andrew Markham and
                  Niki Trigoni},
  title        = {Multiscale Human Activity Recognition and Anticipation Network},
  journal      = {{IEEE} Trans. Neural Networks Learn. Syst.},
  volume       = {35},
  number       = {1},
  pages        = {451--465},
  year         = {2024},
  url          = {https://doi.org/10.1109/TNNLS.2022.3175480},
  doi          = {10.1109/TNNLS.2022.3175480},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tnn/XingGEMT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnn/ZhangYDH24,
  author       = {Huifeng Zhang and
                  Dong Yue and
                  Chunxia Dou and
                  Gerhard P. Hancke},
  title        = {Resilient Optimal Defensive Strategy of Micro-Grids System via Distributed
                  Deep Reinforcement Learning Approach Against {FDI} Attack},
  journal      = {{IEEE} Trans. Neural Networks Learn. Syst.},
  volume       = {35},
  number       = {1},
  pages        = {598--608},
  year         = {2024},
  url          = {https://doi.org/10.1109/TNNLS.2022.3175917},
  doi          = {10.1109/TNNLS.2022.3175917},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tnn/ZhangYDH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnse/CuanD24,
  author       = {Zhaoyang Cuan and
                  Da{-}Wei Ding},
  title        = {Fixed-Time Adaptive Fuzzy Tracking Control for Uncertain Nonlinear
                  Cyber-Physical Systems Against Malicious Attacks},
  journal      = {{IEEE} Trans. Netw. Sci. Eng.},
  volume       = {11},
  number       = {1},
  pages        = {128--139},
  year         = {2024},
  url          = {https://doi.org/10.1109/TNSE.2023.3292843},
  doi          = {10.1109/TNSE.2023.3292843},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tnse/CuanD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnse/GaoWMLH24,
  author       = {Chen Gao and
                  Zidong Wang and
                  Lifeng Ma and
                  Hongjian Liu and
                  Xiao He},
  title        = {Private Synchronization Control of Complex Networks Against Eavesdropping
                  Attacks: {A} Differential Privacy Scheme},
  journal      = {{IEEE} Trans. Netw. Sci. Eng.},
  volume       = {11},
  number       = {3},
  pages        = {3028--3038},
  year         = {2024},
  url          = {https://doi.org/10.1109/TNSE.2024.3357804},
  doi          = {10.1109/TNSE.2024.3357804},
  timestamp    = {Sat, 03 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tnse/GaoWMLH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnse/HuWLLC24,
  author       = {Yilun Hu and
                  Jun Wu and
                  Gaolei Li and
                  Jianhua Li and
                  Jinke Cheng},
  title        = {Privacy-Preserving Few-Shot Traffic Detection Against Advanced Persistent
                  Threats via Federated Meta Learning},
  journal      = {{IEEE} Trans. Netw. Sci. Eng.},
  volume       = {11},
  number       = {3},
  pages        = {2549--2560},
  year         = {2024},
  url          = {https://doi.org/10.1109/TNSE.2023.3304556},
  doi          = {10.1109/TNSE.2023.3304556},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tnse/HuWLLC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnse/LiY24,
  author       = {Zhi{-}Hui Li and
                  Guang{-}Hong Yang},
  title        = {Design of Stealthy Attacks Against Interval Estimation for Cyber-Physical
                  Systems},
  journal      = {{IEEE} Trans. Netw. Sci. Eng.},
  volume       = {11},
  number       = {2},
  pages        = {2215--2222},
  year         = {2024},
  url          = {https://doi.org/10.1109/TNSE.2023.3341619},
  doi          = {10.1109/TNSE.2023.3341619},
  timestamp    = {Sat, 13 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tnse/LiY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnse/RenZ24,
  author       = {Jianguo Ren and
                  Qiang Zhi},
  title        = {An Efficient Multiplex Network Model for Effective Honeypot Roaming
                  Against DDoS Attacks},
  journal      = {{IEEE} Trans. Netw. Sci. Eng.},
  volume       = {11},
  number       = {2},
  pages        = {1909--1921},
  year         = {2024},
  url          = {https://doi.org/10.1109/TNSE.2023.3333230},
  doi          = {10.1109/TNSE.2023.3333230},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tnse/RenZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnse/TaoY24,
  author       = {Fei Tao and
                  Dan Ye},
  title        = {Secure State Estimation Against Eavesdropping Attacks Based on Time-Varying
                  Coding and Noise-Adding},
  journal      = {{IEEE} Trans. Netw. Sci. Eng.},
  volume       = {11},
  number       = {1},
  pages        = {174--184},
  year         = {2024},
  url          = {https://doi.org/10.1109/TNSE.2023.3293106},
  doi          = {10.1109/TNSE.2023.3293106},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tnse/TaoY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnse/WangS24,
  author       = {You{-}Chiun Wang and
                  Pin{-}Yu Su},
  title        = {Collaborative Defense Against Hybrid Network Attacks by {SDN} Controllers
                  and {P4} Switches},
  journal      = {{IEEE} Trans. Netw. Sci. Eng.},
  volume       = {11},
  number       = {2},
  pages        = {1480--1495},
  year         = {2024},
  url          = {https://doi.org/10.1109/TNSE.2023.3324329},
  doi          = {10.1109/TNSE.2023.3324329},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tnse/WangS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnsm/HammarS24,
  author       = {Kim Hammar and
                  Rolf Stadler},
  title        = {Learning Near-Optimal Intrusion Responses Against Dynamic Attackers},
  journal      = {{IEEE} Trans. Netw. Serv. Manag.},
  volume       = {21},
  number       = {1},
  pages        = {1158--1177},
  year         = {2024},
  url          = {https://doi.org/10.1109/TNSM.2023.3293413},
  doi          = {10.1109/TNSM.2023.3293413},
  timestamp    = {Fri, 08 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tnsm/HammarS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnsm/JiangCFWW24,
  author       = {Meiyi Jiang and
                  Baojiang Cui and
                  Junsong Fu and
                  Tao Wang and
                  Ziqi Wang},
  title        = {KimeraPAD: {A} Novel Low-Overhead Real-Time Defense Against Website
                  Fingerprinting Attacks Based on Deep Reinforcement Learning},
  journal      = {{IEEE} Trans. Netw. Serv. Manag.},
  volume       = {21},
  number       = {3},
  pages        = {2944--2961},
  year         = {2024},
  url          = {https://doi.org/10.1109/TNSM.2024.3360082},
  doi          = {10.1109/TNSM.2024.3360082},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tnsm/JiangCFWW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnsm/YueYLW24,
  author       = {Meng Yue and
                  Qingxin Yan and
                  Zichao Lu and
                  Zhijun Wu},
  title        = {{CCS:} {A} Cross-Plane Collaboration Strategy to Defend Against LDoS
                  Attacks in {SDN}},
  journal      = {{IEEE} Trans. Netw. Serv. Manag.},
  volume       = {21},
  number       = {3},
  pages        = {3522--3536},
  year         = {2024},
  url          = {https://doi.org/10.1109/TNSM.2024.3363490},
  doi          = {10.1109/TNSM.2024.3363490},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tnsm/YueYLW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tois/WangLWFMC24,
  author       = {Wenjie Wang and
                  Xinyu Lin and
                  Liuhui Wang and
                  Fuli Feng and
                  Yunshan Ma and
                  Tat{-}Seng Chua},
  title        = {Causal Disentangled Recommendation against User Preference Shifts},
  journal      = {{ACM} Trans. Inf. Syst.},
  volume       = {42},
  number       = {1},
  pages        = {12:1--12:27},
  year         = {2024},
  url          = {https://doi.org/10.1145/3593022},
  doi          = {10.1145/3593022},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tois/WangLWFMC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tois/WangLZLZS24,
  author       = {Tianshi Wang and
                  Fengling Li and
                  Lei Zhu and
                  Jingjing Li and
                  Zheng Zhang and
                  Heng Tao Shen},
  title        = {Invisible Black-Box Backdoor Attack against Deep Cross-Modal Hashing
                  Retrieval},
  journal      = {{ACM} Trans. Inf. Syst.},
  volume       = {42},
  number       = {4},
  pages        = {111:1--111:27},
  year         = {2024},
  url          = {https://doi.org/10.1145/3650205},
  doi          = {10.1145/3650205},
  timestamp    = {Thu, 04 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tois/WangLZLZS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tomccap/ChenYZZLE24,
  author       = {Ying Chen and
                  Rui Yao and
                  Yong Zhou and
                  Jiaqi Zhao and
                  Bing Liu and
                  Abdulmotaleb El{-}Saddik},
  title        = {Black-box Attack against Self-supervised Video Object Segmentation
                  Models with Contrastive Loss},
  journal      = {{ACM} Trans. Multim. Comput. Commun. Appl.},
  volume       = {20},
  number       = {2},
  pages        = {57:1--57:21},
  year         = {2024},
  url          = {https://doi.org/10.1145/3617502},
  doi          = {10.1145/3617502},
  timestamp    = {Fri, 26 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tomccap/ChenYZZLE24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tomccap/LiuZWST24,
  author       = {Jun Liu and
                  Jiantao Zhou and
                  Haiwei Wu and
                  Weiwei Sun and
                  Jinyu Tian},
  title        = {Generating Robust Adversarial Examples against Online Social Networks
                  (OSNs)},
  journal      = {{ACM} Trans. Multim. Comput. Commun. Appl.},
  volume       = {20},
  number       = {4},
  pages        = {98:1--98:26},
  year         = {2024},
  url          = {https://doi.org/10.1145/3632528},
  doi          = {10.1145/3632528},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tomccap/LiuZWST24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tompecs/NarayanaAPKM24,
  author       = {V. S. Ch Lakshmi Narayana and
                  Mohit Agarwala and
                  Rudrabhotla Sri Prakash and
                  Nikhil Karamchandani and
                  Sharayu Moharir},
  title        = {Online Partial Service Hosting at the Edge},
  journal      = {{ACM} Trans. Model. Perform. Evaluation Comput. Syst.},
  volume       = {9},
  number       = {1},
  pages        = {2:1--2:31},
  year         = {2024},
  url          = {https://doi.org/10.1145/3616866},
  doi          = {10.1145/3616866},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tompecs/NarayanaAPKM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/HuWSLSPLR24,
  author       = {Jiahui Hu and
                  Zhibo Wang and
                  Yongsheng Shen and
                  Bohan Lin and
                  Peng Sun and
                  Xiaoyi Pang and
                  Jian Liu and
                  Kui Ren},
  title        = {Shield Against Gradient Leakage Attacks: Adaptive Privacy-Preserving
                  Federated Learning},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {32},
  number       = {2},
  pages        = {1407--1422},
  year         = {2024},
  url          = {https://doi.org/10.1109/TNET.2023.3317870},
  doi          = {10.1109/TNET.2023.3317870},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ton/HuWSLSPLR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/LenzenMSS24,
  author       = {Christoph Lenzen and
                  Moti Medina and
                  Mehrdad Saberi and
                  Stefan Schmid},
  title        = {Robust Routing Made Easy: Reinforcing Networks Against Non-Benign
                  Faults},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {32},
  number       = {1},
  pages        = {283--297},
  year         = {2024},
  url          = {https://doi.org/10.1109/TNET.2023.3283184},
  doi          = {10.1109/TNET.2023.3283184},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ton/LenzenMSS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/DerbezFIRS24,
  author       = {Patrick Derbez and
                  Pierre{-}Alain Fouque and
                  Takanori Isobe and
                  Mostafizar Rahman and
                  Andr{\'{e}} Schrottenloher},
  title        = {Key Committing Attacks against AES-based {AEAD} Schemes},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2024},
  number       = {1},
  pages        = {135--157},
  year         = {2024},
  url          = {https://doi.org/10.46586/tosc.v2024.i1.135-157},
  doi          = {10.46586/TOSC.V2024.I1.135-157},
  timestamp    = {Tue, 26 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/DerbezFIRS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/LiuT24,
  author       = {Chen Liu and
                  Tian Tian},
  title        = {Dynamic Cube Attacks against Grain-128AEAD},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2024},
  number       = {2},
  pages        = {190--221},
  year         = {2024},
  url          = {https://doi.org/10.46586/tosc.v2024.i2.190-221},
  doi          = {10.46586/TOSC.V2024.I2.190-221},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/LiuT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/TakeuchiTI24,
  author       = {Ryunouchi Takeuchi and
                  Yosuke Todo and
                  Tetsu Iwata},
  title        = {Key Recovery, Universal Forgery, and Committing Attacks against Revised
                  Rocca: How Finalization Affects Security},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2024},
  number       = {2},
  pages        = {85--117},
  year         = {2024},
  url          = {https://doi.org/10.46586/tosc.v2024.i2.85-117},
  doi          = {10.46586/TOSC.V2024.I2.85-117},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/TakeuchiTI24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosem/GaoSC24,
  author       = {Pengfei Gao and
                  Fu Song and
                  Taolue Chen},
  title        = {Compositional Verification of First-Order Masking Countermeasures
                  against Power Side-Channel Attacks},
  journal      = {{ACM} Trans. Softw. Eng. Methodol.},
  volume       = {33},
  number       = {3},
  pages        = {79:1--79:38},
  year         = {2024},
  url          = {https://doi.org/10.1145/3635707},
  doi          = {10.1145/3635707},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosem/GaoSC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosem/LiuZSLLS24,
  author       = {Puzhuo Liu and
                  Yaowen Zheng and
                  Chengnian Sun and
                  Hong Li and
                  Zhi Li and
                  Limin Sun},
  title        = {Battling against Protocol Fuzzing: Protecting Networked Embedded Devices
                  from Dynamic Fuzzers},
  journal      = {{ACM} Trans. Softw. Eng. Methodol.},
  volume       = {33},
  number       = {4},
  pages        = {108:1--108:26},
  year         = {2024},
  url          = {https://doi.org/10.1145/3641847},
  doi          = {10.1145/3641847},
  timestamp    = {Wed, 12 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosem/LiuZSLLS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosn/HuangMGWJ24,
  author       = {Haiyang Huang and
                  Tianhui Meng and
                  Jianxiong Guo and
                  Xuekai Wei and
                  Weijia Jia},
  title        = {SecEG: {A} Secure and Efficient Strategy against DDoS Attacks in Mobile
                  Edge Computing},
  journal      = {{ACM} Trans. Sens. Networks},
  volume       = {20},
  number       = {3},
  pages        = {55:1--55:21},
  year         = {2024},
  url          = {https://doi.org/10.1145/3641106},
  doi          = {10.1145/3641106},
  timestamp    = {Tue, 18 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosn/HuangMGWJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosn/MiaoY24,
  author       = {Zhuoyi Miao and
                  Jun Yu},
  title        = {A Robust Learning Framework for Smart Grids in Defense Against False-Data
                  Injection Attacks},
  journal      = {{ACM} Trans. Sens. Networks},
  volume       = {20},
  number       = {2},
  pages        = {30:1--30:12},
  year         = {2024},
  url          = {https://doi.org/10.1145/3588439},
  doi          = {10.1145/3588439},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosn/MiaoY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/transci/HagenASVK24,
  author       = {Liana van der Hagen and
                  Niels A. H. Agatz and
                  Remy Spliet and
                  Thomas R. Visser and
                  Leendert Kok},
  title        = {Machine Learning-Based Feasibility Checks for Dynamic Time Slot Management},
  journal      = {Transp. Sci.},
  volume       = {58},
  number       = {1},
  pages        = {94--109},
  year         = {2024},
  url          = {https://doi.org/10.1287/trsc.2022.1183},
  doi          = {10.1287/TRSC.2022.1183},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/transci/HagenASVK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/trob/AgarwalA24,
  author       = {Saurav Agarwal and
                  Srinivas Akella},
  title        = {Line Coverage With Multiple Robots: Algorithms and Experiments},
  journal      = {{IEEE} Trans. Robotics},
  volume       = {40},
  pages        = {1664--1683},
  year         = {2024},
  url          = {https://doi.org/10.1109/TRO.2024.3355802},
  doi          = {10.1109/TRO.2024.3355802},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/trob/AgarwalA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/trob/LiuB24,
  author       = {Yang Liu and
                  Aude Billard},
  title        = {Tube Acceleration: Robust Dexterous Throwing Against Release Uncertainty},
  journal      = {{IEEE} Trans. Robotics},
  volume       = {40},
  pages        = {2831--2849},
  year         = {2024},
  url          = {https://doi.org/10.1109/TRO.2024.3386391},
  doi          = {10.1109/TRO.2024.3386391},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/trob/LiuB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/NowrooziMGMCU24,
  author       = {Ehsan Nowroozi and
                  Mohammadreza Mohammadi and
                  Pargol Golmohammadi and
                  Yassine Mekdad and
                  Mauro Conti and
                  A. Selcuk Uluagac},
  title        = {Resisting Deep Learning Models Against Adversarial Attack Transferability
                  via Feature Randomization},
  journal      = {{IEEE} Trans. Serv. Comput.},
  volume       = {17},
  number       = {1},
  pages        = {18--29},
  year         = {2024},
  url          = {https://doi.org/10.1109/TSC.2023.3329081},
  doi          = {10.1109/TSC.2023.3329081},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tsc/NowrooziMGMCU24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tse/ZhuWHLX24,
  author       = {Jie Zhu and
                  Leye Wang and
                  Xiao Han and
                  Anmin Liu and
                  Tao Xie},
  title        = {Safety and Performance, Why Not Both? Bi-Objective Optimized Model
                  Compression Against Heterogeneous Attacks Toward {AI} Software Deployment},
  journal      = {{IEEE} Trans. Software Eng.},
  volume       = {50},
  number       = {3},
  pages        = {376--390},
  year         = {2024},
  url          = {https://doi.org/10.1109/TSE.2023.3348515},
  doi          = {10.1109/TSE.2023.3348515},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tse/ZhuWHLX24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsg/0040WY0LZ24,
  author       = {Bo Liu and
                  Hongyu Wu and
                  Qihui Yang and
                  Hang Zhang and
                  Yajing Liu and
                  Yingchen Zhang},
  title        = {Matrix-Completion-Based False Data Injection Attacks Against Machine
                  Learning Detectors},
  journal      = {{IEEE} Trans. Smart Grid},
  volume       = {15},
  number       = {2},
  pages        = {2146--2163},
  year         = {2024},
  url          = {https://doi.org/10.1109/TSG.2023.3308339},
  doi          = {10.1109/TSG.2023.3308339},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tsg/0040WY0LZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsg/AnYXZBLH24,
  author       = {Haopeng An and
                  Jianbo Yi and
                  Yankai Xing and
                  Guangdou Zhang and
                  Olusola Bamisile and
                  Jian Li and
                  Qi Huang},
  title        = {A Robust {V2G} Voltage Control Scheme for Distribution Networks Against
                  Cyber Attacks and Customer Interruptions},
  journal      = {{IEEE} Trans. Smart Grid},
  volume       = {15},
  number       = {4},
  pages        = {3966--3978},
  year         = {2024},
  url          = {https://doi.org/10.1109/TSG.2024.3365069},
  doi          = {10.1109/TSG.2024.3365069},
  timestamp    = {Wed, 31 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsg/AnYXZBLH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsg/BianSL0B24,
  author       = {Yiheng Bian and
                  Siyuan Sun and
                  Gengfeng Li and
                  Chen Chen and
                  Zhaohong Bie},
  title        = {A Generic Bayesian Method for Faulted Section Identification in Distribution
                  Systems Against Wind-Induced Extreme Events},
  journal      = {{IEEE} Trans. Smart Grid},
  volume       = {15},
  number       = {2},
  pages        = {1821--1836},
  year         = {2024},
  url          = {https://doi.org/10.1109/TSG.2023.3295240},
  doi          = {10.1109/TSG.2023.3295240},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tsg/BianSL0B24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsg/DaiY0024,
  author       = {Jiahong Dai and
                  Jiawei Yang and
                  Yu Wang and
                  Yan Xu},
  title        = {Blockchain-Enabled Cyber-Resilience Enhancement Framework of Microgrid
                  Distributed Secondary Control Against False Data Injection Attacks},
  journal      = {{IEEE} Trans. Smart Grid},
  volume       = {15},
  number       = {2},
  pages        = {2226--2236},
  year         = {2024},
  url          = {https://doi.org/10.1109/TSG.2023.3328383},
  doi          = {10.1109/TSG.2023.3328383},
  timestamp    = {Wed, 24 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsg/DaiY0024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsg/HuZZWLG24,
  author       = {Bowen Hu and
                  Yadong Zhou and
                  Yuxun Zhou and
                  Jiang Wu and
                  Ting Liu and
                  Xiaohong Guan},
  title        = {Data Protection Method Against Cross-Domain Inference Threat in Cyber-Physical
                  Power Grid},
  journal      = {{IEEE} Trans. Smart Grid},
  volume       = {15},
  number       = {4},
  pages        = {4170--4181},
  year         = {2024},
  url          = {https://doi.org/10.1109/TSG.2024.3363049},
  doi          = {10.1109/TSG.2024.3363049},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsg/HuZZWLG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsg/RathDS24,
  author       = {Suman Rath and
                  Tapadhir Das and
                  Shamik Sengupta},
  title        = {Improvise, Adapt, Overcome: Dynamic Resiliency Against Unknown Attack
                  Vectors in Microgrid Cybersecurity Games},
  journal      = {{IEEE} Trans. Smart Grid},
  volume       = {15},
  number       = {4},
  pages        = {4245--4258},
  year         = {2024},
  url          = {https://doi.org/10.1109/TSG.2024.3372643},
  doi          = {10.1109/TSG.2024.3372643},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsg/RathDS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsg/ShereenKD24,
  author       = {Ezzeldin Shereen and
                  Kiarash Kazari and
                  Gy{\"{o}}rgy D{\'{a}}n},
  title        = {A Reinforcement Learning Approach to Undetectable Attacks Against
                  Automatic Generation Control},
  journal      = {{IEEE} Trans. Smart Grid},
  volume       = {15},
  number       = {1},
  pages        = {959--972},
  year         = {2024},
  url          = {https://doi.org/10.1109/TSG.2023.3288676},
  doi          = {10.1109/TSG.2023.3288676},
  timestamp    = {Fri, 08 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tsg/ShereenKD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsg/SunQCZG24,
  author       = {Jian Sun and
                  Guanqiu Qi and
                  Yi Chai and
                  Zhiqin Zhu and
                  Josep M. Guerrero},
  title        = {An Adaptive {V2G} Capacity-Based Frequency Regulation Scheme With
                  Integral Reinforcement Learning Against DoS Attacks},
  journal      = {{IEEE} Trans. Smart Grid},
  volume       = {15},
  number       = {1},
  pages        = {834--847},
  year         = {2024},
  url          = {https://doi.org/10.1109/TSG.2023.3270564},
  doi          = {10.1109/TSG.2023.3270564},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tsg/SunQCZG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsg/TanXGVACZ24,
  author       = {Sen Tan and
                  Peilin Xie and
                  Josep M. Guerrero and
                  Juan C. Vasquez and
                  Jos{\'{e}} Matas Alcala and
                  Jorge El Mariachet Carre{\~{n}}o and
                  Manel Guerrero Zapata},
  title        = {Lyapunov-Based Resilient Cooperative Control for {DC} Microgrid Clusters
                  Against False Data Injection Cyber-Attacks},
  journal      = {{IEEE} Trans. Smart Grid},
  volume       = {15},
  number       = {3},
  pages        = {3208--3222},
  year         = {2024},
  url          = {https://doi.org/10.1109/TSG.2023.3332946},
  doi          = {10.1109/TSG.2023.3332946},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsg/TanXGVACZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsg/WangB24,
  author       = {Zhaoyuan Wang and
                  Siqi Bu},
  title        = {Design and Defense of Modal Resonance-Oriented Cyber-Attack Against
                  Wide-Area Damping Control},
  journal      = {{IEEE} Trans. Smart Grid},
  volume       = {15},
  number       = {2},
  pages        = {2164--2178},
  year         = {2024},
  url          = {https://doi.org/10.1109/TSG.2023.3313523},
  doi          = {10.1109/TSG.2023.3313523},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tsg/WangB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsg/WangWSL24,
  author       = {Guoteng Wang and
                  Chongyu Wang and
                  Mohammad Shahidehpour and
                  Wei Lin},
  title        = {Deep Semi-Supervised Learning Method for False Data Detection Against
                  Forgery and Concealing of Faults in Cyber-Physical Power Systems},
  journal      = {{IEEE} Trans. Smart Grid},
  volume       = {15},
  number       = {1},
  pages        = {944--958},
  year         = {2024},
  url          = {https://doi.org/10.1109/TSG.2023.3286697},
  doi          = {10.1109/TSG.2023.3286697},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tsg/WangWSL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsg/WeiLXS24,
  author       = {Xuan Wei and
                  Jiajin Liu and
                  Yinliang Xu and
                  Hongbin Sun},
  title        = {Virtual Power Plants Peer-to-Peer Energy Trading in Unbalanced Distribution
                  Networks: {A} Distributed Robust Approach Against Communication Failures},
  journal      = {{IEEE} Trans. Smart Grid},
  volume       = {15},
  number       = {2},
  pages        = {2017--2029},
  year         = {2024},
  url          = {https://doi.org/10.1109/TSG.2023.3308101},
  doi          = {10.1109/TSG.2023.3308101},
  timestamp    = {Mon, 22 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsg/WeiLXS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsg/YangLCL24,
  author       = {Ting Yang and
                  Hao Li and
                  Shaotang Cai and
                  Yachuang Liu},
  title        = {Distributed Voltage Control for Microgrids Against Time-Varying Communication
                  Delay Interference},
  journal      = {{IEEE} Trans. Smart Grid},
  volume       = {15},
  number       = {3},
  pages        = {2410--2423},
  year         = {2024},
  url          = {https://doi.org/10.1109/TSG.2023.3321117},
  doi          = {10.1109/TSG.2023.3321117},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsg/YangLCL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsg/YoussefLK24,
  author       = {El{-}Nasser S. Youssef and
                  Fabrice Labeau and
                  Marthe Kassouf},
  title        = {Adversarial Dynamic Load-Altering Cyberattacks Against Peak Shaving
                  Using Residential Electric Water Heaters},
  journal      = {{IEEE} Trans. Smart Grid},
  volume       = {15},
  number       = {2},
  pages        = {2073--2088},
  year         = {2024},
  url          = {https://doi.org/10.1109/TSG.2023.3300239},
  doi          = {10.1109/TSG.2023.3300239},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tsg/YoussefLK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsg/ZhangBZH24,
  author       = {Zhongjian Zhang and
                  Shengrong Bu and
                  Yanru Zhang and
                  Zhu Han},
  title        = {Market-Level Integrated Detection Against Cyber Attacks in Real-Time
                  Market Operations by Self-Supervised Learning},
  journal      = {{IEEE} Trans. Smart Grid},
  volume       = {15},
  number       = {4},
  pages        = {4128--4142},
  year         = {2024},
  url          = {https://doi.org/10.1109/TSG.2024.3355805},
  doi          = {10.1109/TSG.2024.3355805},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsg/ZhangBZH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsg/ZhangDY24,
  author       = {Zhenyong Zhang and
                  Ruilong Deng and
                  David K. Y. Yau},
  title        = {Vulnerability of the Load Frequency Control Against the Network Parameter
                  Attack},
  journal      = {{IEEE} Trans. Smart Grid},
  volume       = {15},
  number       = {1},
  pages        = {921--933},
  year         = {2024},
  url          = {https://doi.org/10.1109/TSG.2023.3275988},
  doi          = {10.1109/TSG.2023.3275988},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tsg/ZhangDY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsg/ZhangLWLCLWT24,
  author       = {Lu Zhang and
                  Chenyu Li and
                  Mingzhe Wu and
                  Yun Wei Li and
                  Yongxiang Cai and
                  Yan Li and
                  Qiang Wang and
                  Wei Tang},
  title        = {Optimal Anti-Icing and De-Icing Coordination Scheme for Resilience
                  Enhancement in Distribution Networks Against Ice Storms},
  journal      = {{IEEE} Trans. Smart Grid},
  volume       = {15},
  number       = {4},
  pages        = {3486--3498},
  year         = {2024},
  url          = {https://doi.org/10.1109/TSG.2024.3368204},
  doi          = {10.1109/TSG.2024.3368204},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsg/ZhangLWLCLWT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsipn/HuYCDW24,
  author       = {Jun Hu and
                  Shuo Yang and
                  Raquel Caballero{-}{\'{A}}guila and
                  Hongli Dong and
                  Boying Wu},
  title        = {Mixed Static-Dynamic Protocol-Based Tobit Recursive Filtering for
                  Stochastic Nonlinear Systems Against Random False Data Injection Attacks},
  journal      = {{IEEE} Trans. Signal Inf. Process. over Networks},
  volume       = {10},
  pages        = {445--459},
  year         = {2024},
  url          = {https://doi.org/10.1109/TSIPN.2024.3388953},
  doi          = {10.1109/TSIPN.2024.3388953},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsipn/HuYCDW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsmc/JiaCH24,
  author       = {Fanlin Jia and
                  Fangfei Cao and
                  Xiao He},
  title        = {Active Fault-Tolerant Control Against Intermittent Faults for State-Constrained
                  Nonlinear Systems},
  journal      = {{IEEE} Trans. Syst. Man Cybern. Syst.},
  volume       = {54},
  number       = {4},
  pages        = {2389--2401},
  year         = {2024},
  url          = {https://doi.org/10.1109/TSMC.2023.3344292},
  doi          = {10.1109/TSMC.2023.3344292},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsmc/JiaCH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsmc/MaHXW24,
  author       = {Renjie Ma and
                  Zhijian Hu and
                  Lezhong Xu and
                  Ligang Wu},
  title        = {Distributed Secure Estimation Against Sparse False Data Injection
                  Attacks},
  journal      = {{IEEE} Trans. Syst. Man Cybern. Syst.},
  volume       = {54},
  number       = {5},
  pages        = {2685--2697},
  year         = {2024},
  url          = {https://doi.org/10.1109/TSMC.2023.3344876},
  doi          = {10.1109/TSMC.2023.3344876},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsmc/MaHXW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsmc/WangYZ24,
  author       = {Kai{-}Yu Wang and
                  Dan Ye and
                  Tian{-}Yu Zhang},
  title        = {Data-Driven Undetectable Attack Against State Estimation in Distributed
                  Control Systems},
  journal      = {{IEEE} Trans. Syst. Man Cybern. Syst.},
  volume       = {54},
  number       = {5},
  pages        = {3134--3143},
  year         = {2024},
  url          = {https://doi.org/10.1109/TSMC.2024.3356028},
  doi          = {10.1109/TSMC.2024.3356028},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsmc/WangYZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsmc/YuZ24,
  author       = {Zunjie Yu and
                  Weihai Zhang},
  title        = {Event-Triggered Secure Control for Consensus of the Discrete-Time
                  Multiagent System Against Complex Cooperative Attacks},
  journal      = {{IEEE} Trans. Syst. Man Cybern. Syst.},
  volume       = {54},
  number       = {6},
  pages        = {3834--3842},
  year         = {2024},
  url          = {https://doi.org/10.1109/TSMC.2024.3372499},
  doi          = {10.1109/TSMC.2024.3372499},
  timestamp    = {Tue, 18 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsmc/YuZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsmc/ZhangCYYXH24,
  author       = {Huifeng Zhang and
                  Zhuxiang Chen and
                  Chengqian Yu and
                  Dong Yue and
                  Xiangpeng Xie and
                  Gerhard P. Hancke},
  title        = {Event-Trigger-Based Resilient Distributed Energy Management Against
                  {FDI} and DoS Attack of Cyber-Physical System of Smart Grid},
  journal      = {{IEEE} Trans. Syst. Man Cybern. Syst.},
  volume       = {54},
  number       = {5},
  pages        = {3220--3230},
  year         = {2024},
  url          = {https://doi.org/10.1109/TSMC.2024.3357497},
  doi          = {10.1109/TSMC.2024.3357497},
  timestamp    = {Fri, 28 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsmc/ZhangCYYXH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsp/ZhengXTZ24,
  author       = {Beixiong Zheng and
                  Xue Xiong and
                  Jie Tang and
                  Rui Zhang},
  title        = {Intelligent Reflecting Surface-Aided Electromagnetic Stealth Against
                  Radar Detection},
  journal      = {{IEEE} Trans. Signal Process.},
  volume       = {72},
  pages        = {3438--3452},
  year         = {2024},
  url          = {https://doi.org/10.1109/TSP.2024.3420149},
  doi          = {10.1109/TSP.2024.3420149},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsp/ZhengXTZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvlsi/AnikDGK24,
  author       = {Md Toufiq Hasan Anik and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Naghmeh Karimi},
  title        = {On the Resiliency of Protected Masked S-Boxes Against Template Attack
                  in the Presence of Temperature and Aging Misalignments},
  journal      = {{IEEE} Trans. Very Large Scale Integr. Syst.},
  volume       = {32},
  number       = {5},
  pages        = {911--924},
  year         = {2024},
  url          = {https://doi.org/10.1109/TVLSI.2024.3374257},
  doi          = {10.1109/TVLSI.2024.3374257},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvlsi/AnikDGK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvlsi/TalukdarPOC24,
  author       = {Jonti Talukdar and
                  Woohyun Paik and
                  Eduardo Ortega and
                  Krishnendu Chakrabarty},
  title        = {ALT-Lock: Logic and Timing Ambiguity-Based {IP} Obfuscation Against
                  Reverse Engineering},
  journal      = {{IEEE} Trans. Very Large Scale Integr. Syst.},
  volume       = {32},
  number       = {8},
  pages        = {1535--1548},
  year         = {2024},
  url          = {https://doi.org/10.1109/TVLSI.2024.3411033},
  doi          = {10.1109/TVLSI.2024.3411033},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvlsi/TalukdarPOC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics