Font Size: a A A
Keyword [Adversary]
Result: 21 - 40 | Page: 2 of 3
21. Research And Implementation Of Wideband High Resolution Frequency Synthesizer
22. Safety Analysis Of EtherNet/IP Protocol Of Industrial Control System
23. Research On Correct Possession Checking Of The User Data In Cloud
24. Research On Image Data Augmentation Method Based On Generative Adversary Network
25. Research On Sample Generation And Recognition And Anti-spoofing Integration For Finger Vein Authentication Systems
26. Research On Pose Migration Method Based On Adversary Network
27. Design And Implementation Of Object Detection Algorithm Based On Feature Fusion And Adversary Occlusion Networks
28. Research And Implementation Of Dance Motion Generation Model Based On Deep Learning Network
29. On Adaptive Security and Round Efficiency in Secure Multi-Party Computation
30. Data security in unattended wireless sensor networks
31. Optimizing Source Anonymity of Wireless Sensor Networks against Global Adversary Using Fake Packet Injection
32. Keep the adversary guessing: Agent security by policy randomization
33. Security of wireless sensor networks in the presence of captured nodes
34. Adversary For a Strange Hero Depictions of Journalists in Showtime's Dexter With Comparisons to Jeff Lindsay's novel Darkly Dreaming Dexte
35. Methods Development for Optimal Defense against Adaptive Adversaries -- Quantification of Uncertain Preferences and Development of Computational Approaches
36. Localization under adversary misdirection
37. Mathematical results on Database Privacy
38. Anonymous and untraceable communications in mobile wireless networks
39. Effect of quantization noise in statistical key exchange
40. An adversary-centric logic of security and authenticity
  <<First  <Prev  Next>  Last>>  Jump to