„processor“
Suchergebnisse
10.000+ Treffer
-
A distributed cluster-based routing protocol using fuzzy logic and deep reinforcement learning for wireless sensor networks
-
Differential privacy-enabled federated learning for secure neural synchronization in protecting industrial data streams
-
Enhanced medical image security: a chaotic map and laplace transform-based encryption scheme
-
Contract-guardian: a bagging-based gradient boosting decision tree for detection vulnerability in smart contract
-
Optimizing task offloading and resource allocation in latency-constrained vehicular edge computing
-
A robust and scalable intrusion detection framework for SDN with GAN-CL-STO
-
Joint device assignment and resource allocation for hierarchical semi-asynchronous federated learning over wireless networks
-
A blockchain framework for enhancing data security and intrusion detection in the internet of things environment using hybrid deep learning model
-
Blockchain-based access control and privacy preservation in healthcare: a comprehensive survey
-
Advanced attack graph framework for operational technology: scalable modeling, validation, and risk mitigation
-
TBSSMC: a trusted blockchain solution for social media content integrity and performance simulation
-
Dbn-igr: dual-branch network for identification and gesture recognition with WiFi signals
-
A cloud service security risk measurement method based on information entropy and Markov chain
-
Speech organ disease classification using bidirectional block self-adaptive attention mechanism enabled quantum convolutional neural network
-
WHANet: wavelet and hybrid attention network for vessel segmentation in OCTA fundus images
-
Enhancing disaster readiness: a comprehensive review of IoT-enabled WSN path planning for effective emergency response
-
A stochastic differential oligopoly game for risk management of resource mining in blockchain
-
MedReward: privacy preservation of electronic health records (EHR) and secure incentive distribution in the presence of active insider and outsider adversaries using blockchain
-
Retraction Note: On connection number-based topological indices and entropy measures for triangular γ-graphyne network
-
Retraction Note: Research on a distributed auto-negotiation model based on Stackelberg game theory