|
|
|
Sitong Zhang, Yibing Li, Fang Ye, Xiaoyu Geng, Zitao Zhou and Tuo Shi
|
|
|
|
|
|
|
Dong-Kyu Chae, Sung-Jun Park, Eujeanne Kim, Jiwon Hong and Sang-Wook Kim
Malware are developed for various types of malicious attacks, e.g., to gain access to a user?s private information or control of the computer system. The identification and classification of malware has been extensively studied in academic societies and ...
ver más
|
|
|
|
|
|
|
Bohan Jiang, Xiaohui Li, Yujun Zeng and Daxue Liu
It is of utmost importance for advanced driver assistance systems to evaluate the risk of the current situation and make continuous decisions about what kind of evasive maneuver can be initiated. The purpose of this paper is to establish efficient indica...
ver más
|
|
|
|
|
|
|
Praveen Damacharla, Parashar Dhakal, Jyothi Priyanka Bandreddi, Ahmad Y. Javaid, Jennie J. Gallimore, Colin Elkin and Vijay K. Devabhaktuni
This work can be used to develop reliable intelligent systems that have the capabilities to integrate in human?machine teams in dealing with time sensitive situations.
|
|
|
|