This copy is for your personal, non-commercial use only. Distribution and use of this material are governed by our Subscriber Agreement and by copyright law. For non-personal use or to order multiple ...
HEK’s collection holds 117 media artworks created in Switzerland between 1983 and 2024, 30 to 40 of which are born-digital ...
Bitdefender finds a sharp rise in phishing and malware emails targeting Gulf countries after February 28 escalation.
Java has endured radical transformations in the technology landscape and many threats to its prominence. What makes this ...
Abstract: In this article, a deep learning (DL) method based on autoencoder network is proposed to achieve the inverse design of phase retrieval for large-scale antenna arrays. The inverse problem ...
Abstract: Reverse engineering of agnostic industrial control protocols (ICPs) based on traffic traces is significant for the security analysis of industrial control systems. Field semantics deduction ...
aDepartment of Clinical Epidemiology, Shengjing Hospital of China Medical University, Shenyang, China bKey Laboratory of Precision Medical Research on Major Chronic Disease, Shengjing Hospital of ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results