skip to main content
Language:
Search Limited to: Search Limited to: Resource type Show Results with: Show Results with: Search type Index

Results 1 - 20 of 8,427  for All Library Resources

Results 1 2 3 4 5 next page
Show only
Result Number Material Type Add to My Shelf Action Record Details and Options
1
Medical image segmentation using deep learning: A survey
Material Type:
Article
Add to My Research

Medical image segmentation using deep learning: A survey

IET image processing, 2022-04, Vol.16 (5), p.1243-1267 [Peer Reviewed Journal]

2022 The Authors. published by John Wiley & Sons Ltd on behalf of The Institution of Engineering and Technology ;ISSN: 1751-9659 ;EISSN: 1751-9667 ;DOI: 10.1049/ipr2.12419

Full text available

2
Text‐based emotion detection: Advances, challenges, and opportunities
Material Type:
Article
Add to My Research

Text‐based emotion detection: Advances, challenges, and opportunities

Engineering reports (Hoboken, N.J.), 2020-07, Vol.2 (7), p.n/a [Peer Reviewed Journal]

2020 The Authors. published by John Wiley & Sons, Ltd. ;ISSN: 2577-8196 ;EISSN: 2577-8196 ;DOI: 10.1002/eng2.12189

Full text available

3
A survey of Blockchain technologies applied to software‐defined networking: Research challenges and solutions
Material Type:
Article
Add to My Research

A survey of Blockchain technologies applied to software‐defined networking: Research challenges and solutions

IET wireless sensor systems, 2021-11, Vol.11 (6), p.233-247 [Peer Reviewed Journal]

Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 2043-6386 ;EISSN: 2043-6394 ;DOI: 10.1049/wss2.12031

Full text available

4
An Efficient RTL Design for a Wearable Brain–Computer Interface
Material Type:
Article
Add to My Research

An Efficient RTL Design for a Wearable Brain–Computer Interface

IET computers & digital techniques, 2024-03, Vol.2024 [Peer Reviewed Journal]

Copyright © 2024 Tahereh Vasei et al. ;ISSN: 1751-8601 ;EISSN: 1751-861X ;DOI: 10.1049/2024/5596468

Full text available

5
Adaptive Shrink and Shard Architecture Design for Blockchain Storage Efficiency
Material Type:
Article
Add to My Research

Adaptive Shrink and Shard Architecture Design for Blockchain Storage Efficiency

IET computers & digital techniques, 2024-02, Vol.2024 [Peer Reviewed Journal]

Copyright © 2024 Daniel Soesanto et al. ;ISSN: 1751-8601 ;EISSN: 1751-861X ;DOI: 10.1049/2024/2280828

Full text available

6
Accelerated and Highly Correlated ASIC Synthesis of AI Hardware Subsystems Using CGP
Material Type:
Article
Add to My Research

Accelerated and Highly Correlated ASIC Synthesis of AI Hardware Subsystems Using CGP

IET computers & digital techniques, 2024-01, Vol.2024, p.1-23 [Peer Reviewed Journal]

Copyright © 2024 H. C. Prashanth and Madhav Rao. ;ISSN: 1751-8601 ;EISSN: 1751-861X ;DOI: 10.1049/2024/6623637

Full text available

7
A survey on adversarial attacks and defences
Material Type:
Article
Add to My Research

A survey on adversarial attacks and defences

CAAI Transactions on Intelligence Technology, 2021-03, Vol.6 (1), p.25-45 [Peer Reviewed Journal]

2021 The Authors. published by John Wiley & Sons Ltd on behalf of The Institution of Engineering and Technology and Chongqing University of Technology. ;ISSN: 2468-2322 ;EISSN: 2468-2322 ;DOI: 10.1049/cit2.12028

Full text available

8
A Fast Fully Parallel Ant Colony Optimization Algorithm Based on CUDA for Solving TSP
Material Type:
Article
Add to My Research

A Fast Fully Parallel Ant Colony Optimization Algorithm Based on CUDA for Solving TSP

IET computers & digital techniques, 2023-10, Vol.2023, p.1-14 [Peer Reviewed Journal]

Copyright © 2023 Zhi Zeng et al. ;ISSN: 1751-8601 ;EISSN: 1751-861X ;DOI: 10.1049/2023/9915769

Full text available

9
Deep learning: Applications, architectures, models, tools, and frameworks: A comprehensive survey
Material Type:
Article
Add to My Research

Deep learning: Applications, architectures, models, tools, and frameworks: A comprehensive survey

CAAI Transactions on Intelligence Technology, 2023-09, Vol.8 (3), p.581-606 [Peer Reviewed Journal]

ISSN: 2468-2322 ;EISSN: 2468-2322 ;DOI: 10.1049/cit2.12180

Full text available

10
A robust deformed convolutional neural network (CNN) for image denoising
Material Type:
Article
Add to My Research

A robust deformed convolutional neural network (CNN) for image denoising

CAAI Transactions on Intelligence Technology, 2023-06, Vol.8 (2), p.331-342 [Peer Reviewed Journal]

2022 The Authors. published by John Wiley & Sons Ltd on behalf of The Institution of Engineering and Technology and Chongqing University of Technology. ;ISSN: 2468-2322 ;EISSN: 2468-2322 ;DOI: 10.1049/cit2.12110

Full text available

11
Unveiling the Neutral Difference and Its Automated Search
Material Type:
Article
Add to My Research

Unveiling the Neutral Difference and Its Automated Search

IET information security, 2024-05, Vol.2024 [Peer Reviewed Journal]

Copyright © 2024 Guangqiu Lv et al. ;ISSN: 1751-8709 ;EISSN: 1751-8717 ;DOI: 10.1049/2024/2939486

Full text available

12
Boosting the Transferability of Ensemble Adversarial Attack via Stochastic Average Variance Descent
Material Type:
Article
Add to My Research

Boosting the Transferability of Ensemble Adversarial Attack via Stochastic Average Variance Descent

IET information security, 2024-05, Vol.2024 [Peer Reviewed Journal]

Copyright © 2024 Lei Zhao et al. ;ISSN: 1751-8709 ;EISSN: 1751-8717 ;DOI: 10.1049/2024/7983842

Full text available

13
DHRCA: A Design of Security Architecture Based on Dynamic Heterogeneous Redundant for System on Wafer
Material Type:
Article
Add to My Research

DHRCA: A Design of Security Architecture Based on Dynamic Heterogeneous Redundant for System on Wafer

IET information security, 2024-04, Vol.2024 [Peer Reviewed Journal]

Copyright © 2024 Bo Mei et al. ;ISSN: 1751-8709 ;EISSN: 1751-8717 ;DOI: 10.1049/2024/2023349

Full text available

14
Deep Learning in Cybersecurity: A Hybrid BERT–LSTM Network for SQL Injection Attack Detection
Material Type:
Article
Add to My Research

Deep Learning in Cybersecurity: A Hybrid BERT–LSTM Network for SQL Injection Attack Detection

IET information security, 2024-04, Vol.2024 [Peer Reviewed Journal]

Copyright © 2024 Yixian Liu and Yupeng Dai. ;ISSN: 1751-8709 ;EISSN: 1751-8717 ;DOI: 10.1049/2024/5565950

Full text available

15
VulMPFF: A Vulnerability Detection Method for Fusing Code Features in Multiple Perspectives
Material Type:
Article
Add to My Research

VulMPFF: A Vulnerability Detection Method for Fusing Code Features in Multiple Perspectives

IET information security, 2024-03, Vol.2024 [Peer Reviewed Journal]

Copyright © 2024 Xiansheng Cao et al. ;ISSN: 1751-8709 ;EISSN: 1751-8717 ;DOI: 10.1049/2024/4313185

Full text available

16
A Novel Security Scheme Supported by Certificateless Digital Signature and Blockchain in Named Data Networking
Material Type:
Article
Add to My Research

A Novel Security Scheme Supported by Certificateless Digital Signature and Blockchain in Named Data Networking

IET information security, 2024-03, Vol.2024 [Peer Reviewed Journal]

Copyright © 2024 Bing Li et al. ;ISSN: 1751-8709 ;EISSN: 1751-8717 ;DOI: 10.1049/2024/6616095

Full text available

17
Deciding Irreducibility/Indecomposability of Feedback Shift Registers Is NP-Hard
Material Type:
Article
Add to My Research

Deciding Irreducibility/Indecomposability of Feedback Shift Registers Is NP-Hard

IET information security, 2024-03, Vol.2024 [Peer Reviewed Journal]

Copyright © 2024 Lin Wang. ;ISSN: 1751-8709 ;EISSN: 1751-8717 ;DOI: 10.1049/2024/3219604

Full text available

18
New Practical Attacks on GEA-1 Based on a New-Found Weakness
Material Type:
Article
Add to My Research

New Practical Attacks on GEA-1 Based on a New-Found Weakness

IET information security, 2024-03, Vol.2024 [Peer Reviewed Journal]

Copyright © 2024 Zheng Wu et al. ;ISSN: 1751-8709 ;EISSN: 1751-8717 ;DOI: 10.1049/2024/6674019

Full text available

19
Man‐in‐the‐middle attacks and defence in a power system cyber‐physical testbed
Material Type:
Article
Add to My Research

Man‐in‐the‐middle attacks and defence in a power system cyber‐physical testbed

IET cyber-physical systems, 2021-09, Vol.6 (3), p.164-177 [Peer Reviewed Journal]

ISSN: 2398-3396 ;EISSN: 2398-3396 ;DOI: 10.1049/cps2.12014

Full text available

20
MFEMDroid: A Novel Malware Detection Framework Using Combined Multitype Features and Ensemble Modeling
Material Type:
Article
Add to My Research

MFEMDroid: A Novel Malware Detection Framework Using Combined Multitype Features and Ensemble Modeling

IET information security, 2024-02, Vol.2024 [Peer Reviewed Journal]

Copyright © 2024 Wei Gu et al. ;ISSN: 1751-8709 ;EISSN: 1751-8717 ;DOI: 10.1049/2024/2850804

Full text available

Results 1 - 20 of 8,427  for All Library Resources

Results 1 2 3 4 5 next page

Personalize your results

  1. Edit

Refine Search Results

Expand My Results

  1.   

Show only

  1. Peer-reviewed Journals (8,422)

Refine My Results

Creation Date 

From To
  1. Before 2001  (9)
  2. 2001 To 2005  (24)
  3. 2006 To 2010  (717)
  4. 2011 To 2016  (2,102)
  5. After 2016  (5,576)
  6. More options open sub menu

Language 

  1. Japanese  (380)
  2. Norwegian  (3)
  3. More options open sub menu

Searching Remote Databases, Please Wait