Machine Learning

A Study on the Application of TensorFlow Compression Techniques to Human Activity Recognition

A Study on the Application of TensorFlow Compression Te...

A Study on the Application of TensorFlow Compression Techniques to Human Activit...

A Comprehensive Survey of V2X Cybersecurity Mechanisms and Future Research Paths

A Comprehensive Survey of V2X Cybersecurity Mechanisms ...

A Comprehensive Survey of V2X Cybersecurity Mechanisms and Future Research Paths

A Study on the Optimal Design of PMa-SynRM for Electric Vehicles Combining Random Forest

A Study on the Optimal Design of PMa-SynRM for Electric...

A Study on the Optimal Design of PMa-SynRM for Electric Vehicles Combining Rando...

A Comprehensive Survey on Arabic Sarcasm Detection Approaches, Challenges and Future Trends

A Comprehensive Survey on Arabic Sarcasm Detection Appr...

A Comprehensive Survey on Arabic Sarcasm Detection Approaches, Challenges and Fu...

A Super-Resolution-Based Feature Map Compression for Machine-Oriented Video Coding

A Super-Resolution-Based Feature Map Compression for Ma...

A Super-Resolution-Based Feature Map Compression for Machine-Oriented Video Coding

A Compressed Unsupervised Deep Domain Adaptation Model for Efficient Cross-Domain Fault Diagnosis

A Compressed Unsupervised Deep Domain Adaptation Model ...

A Compressed Unsupervised Deep Domain Adaptation Model for Efficient Cross-Domai...

A Supervised Learning Algorithm for Multilayer Spiking Neural Networks Based on Temporal Coding Toward Energy-Efficient VLSI Processor Design

A Supervised Learning Algorithm for Multilayer Spiking ...

A Supervised Learning Algorithm for Multilayer Spiking Neural Networks Based on ...

A Configurable 10T SRAM-Based IMC Accelerator With Scaled-Voltage-Based Pulse Count Modulation for MAC

A Configurable 10T SRAM-Based IMC Accelerator With Scal...

A Configurable 10T SRAM-Based IMC Accelerator With Scaled-Voltage-Based Pulse Co...

A Survey of Adversarial Attack and Defense Methods for Malware Classification in Cyber Security

A Survey of Adversarial Attack and Defense Methods for ...

A Survey of Adversarial Attack and Defense Methods for Malware Classification in...

A Contextual Multimodal System for Increasing Situation Awareness and Takeover Quality in Conditionally Automated Driving

A Contextual Multimodal System for Increasing Situation...

A Contextual Multimodal System for Increasing Situation Awareness and Takeover Q...

A Survey of Important Issues in Quantum Computing and Communications

A Survey of Important Issues in Quantum Computing and C...

A Survey of Important Issues in Quantum Computing and Communications

A Continuous Late-Onset Sepsis Prediction Algorithm for Preterm Infants Using Multi-Channel Physiological Signals From a Patient Monitor

A Continuous Late-Onset Sepsis Prediction Algorithm for...

A Continuous Late-Onset Sepsis Prediction Algorithm for Preterm Infants Using Mu...

A Survey of Intelligent Detection Designs of HTML URL Phishing Attacks

A Survey of Intelligent Detection Designs of HTML URL P...

A Survey of Intelligent Detection Designs of HTML URL Phishing Attacks

A Convolutional Neural Network-Based Maximum Power Point Voltage Forecasting Method for Pavement PV Array

A Convolutional Neural Network-Based Maximum Power Poin...

A Convolutional Neural Network-Based Maximum Power Point Voltage Forecasting Met...

A Survey of Self-Supervised and Few-Shot Object Detection

A Survey of Self-Supervised and Few-Shot Object Detection

A Survey of Self-Supervised and Few-Shot Object Detection

A Critical Survey of EEG-Based BCI Systems for Applications in Industrial Internet of Things

A Critical Survey of EEG-Based BCI Systems for Applicat...

A Critical Survey of EEG-Based BCI Systems for Applications in Industrial Intern...