|
|
|
Xie He, Arash Habibi Lashkari, Nikhill Vombatkere and Dilli Prasad Sharma
Over the past few decades, researchers have put their effort and paid significant attention to the authorship attribution field, as it plays an important role in software forensics analysis, plagiarism detection, security attack detection, and protection...
ver más
|
|
|
|
|
|
Jianfeng Zhu, Guochen Huang, Maoguang Xu, Ming Liu, Bo Diao and Po Li
Combined with the development trend of high speed generators and the high voltage of DC microgrids in high-power series hybrid aero propulsion system, a set of hybrid systems with a power of 200 kW, voltage of 540 V, and speed of 21,000 r/min is establis...
ver más
|
|
|
|
|
|
Paolo Ciancarini, Raffaele Giancarlo and Gennaro Grimaudo
Digital transformation in the public sector provides digital services to the citizens aiming at increasing their quality of life, as well as the transparency and accountability of a public administration. Since adaptation to the citizens changing needs i...
ver más
|
|
|
|
|
|
Ioana Branescu, Octavian Grigorescu and Mihai Dascalu
Effectively understanding and categorizing vulnerabilities is vital in the ever-evolving cybersecurity landscape, since only one exposure can have a devastating effect on the entire system. Given the increasingly massive number of threats and the size of...
ver más
|
|
|
|
|
|
Cheolhyeon Kwon and Donghyun Kang
Recently, the technologies of on-device AI have been accelerated with the development of new hardware and software platforms. Therefore, many researchers and engineers focus on how to enable ML technologies on mobile devices with limited hardware resourc...
ver más
|
|
|