ΤύποςΌνομα ΚάτωΜέγεθοςΗμερομηνία
A Survey of Methods for Explaining Black Box Models.pdf 3.84 MB15-10-2019
A Survey on Automatic Detection of Hate Speech in Text.pdf 1.54 MB15-10-2019
A Survey on Deep Learning Algorithms, Techniques,.pdf 3.37 MB15-10-2019
A Survey on IoT Security Application Areas,.pdf 3.86 MB21-10-2019
A Systematic Review for Smart City Data Analytics.pdf 8.93 MB15-10-2019
A Systematic Review on Cloud Testing.pdf 4 MB15-10-2019
An IoT sensor and scenario survey for.pdf 1.08 MB21-10-2019
Automated Expertise Retrieval.pdf 587.88 KB15-10-2019
Comparison of Software Design Models.pdf 4.19 MB15-10-2019
Deep Learning Based Recommender System.pdf 2.07 MB15-10-2019
Demystifying IoT Security.pdf 25.57 MB21-10-2019
Demystifying Parallel and Distributed Deep Learning.pdf 5.07 MB15-10-2019
Dynamic Malware Analysis in the Modern Era—A State of the Art Survey.pdf 13.22 MB15-10-2019
Evaluating Domain Ontologies.pdf 5.26 MB15-10-2019
Identifying Top-k Nodes in Social Networks A Survey.pdf 1.03 MB15-10-2019
Indoor Localization Improved by Spatial Context.pdf 4.92 MB15-10-2019
Infrastructure-Independent Indoor Localization and Navigation.pdf 1.13 MB15-10-2019
Large-scale Semantic Integration of Linked Data.pdf 4.89 MB15-10-2019
Methods and Tools for Policy Analysis.pdf 1.55 MB15-10-2019
Prevailing and emerging cyber threats and security practices.pdf 3.21 MB21-10-2019
Security and Privacy on Blockchain.pdf 908.55 KB15-10-2019
Security Modeling of Autonomous Systems, A Survey.pdf 4.03 MB15-10-2019
Security, Privacy and Trust for Smart.pdf 2.14 MB21-10-2019
Sequence-Aware Recommender Systems.pdf 918.58 KB15-10-2019
Software-defined Networking-based DDoS defense mechanisms.pdf 1.83 MB15-10-2019
State of the art survey of deep learning and machine learning models for smart cities.pdf 328.23 KB21-10-2019
STRAM Measuring the Trustworthiness of computer-based systems.pdf 6.4 MB15-10-2019
Survey on Brain-Computer Interface.pdf 2.09 MB15-10-2019
Survey on Computational Trust and Reputation Models.pdf 778.98 KB15-10-2019
Systematically Understanding the Cyber Attack Business.pdf 1.91 MB15-10-2019
Text Analysis in Adversarial Settings Does Deception Leave.pdf 448.93 KB15-10-2019