Linked e-resources

Details

Machine Learning
Detection of Fake News Through Heterogeneous Graph Interactions
Species Recognition via Active Learning
Federated Graph Neural Network for Threat Intelligence
Formal Methods
A Formal Analysis of Karn’s Algorithm
Comparing Causal Convergence Consistency Models
Security & Privacy
Encrypted search is not enough to ensure privacy
Case Study on the Performance of ML-Based Network Intrusion Detection Systems in SDN
Beyond Locks and Keys: Structural Equation Modeling based Framework to Explore Security Breaches through the Lens of Crime Theories
Fault Tolerance
Consensus on Unknown Torus with Dense Byzantine Faults
Distributed Systems
Approximation Algorithms for Drone Delivery Scheduling Problem
Pebble guided Treasure Hunt in Plane
Distance-2-Dispersion: Dispersion with Further Constraints.

Browse Subjects

Show more subjects...

Statistics

from
to
Export