Evaluation of Bayesian and Dempster-Shafer approaches to fusion of video...
Wang, S., Orwell, J., Hunter, G.. 2014. Evaluation of Bayesian and Dempster-Shafer approaches to fusion of video surveillance information. Information Fusion (FUSION), 2014 17th International...
View ArticleFlow-based conflict detection in OpenFlow networks using first-order logic
Lopes Alcantara Batista, B., Lima de Campos, G.A., Fernandez, M.P.. 2014. Flow-based conflict detection in OpenFlow networks using first-order logic. Computers and Communication (ISCC), 2014 IEEE...
View ArticleA reliable solution against Packet dropping attack due to malicious nodes...
Chaudhary, A., Kumar, A., Tiwari, V.N.. 2014. A reliable solution against Packet dropping attack due to malicious nodes using fuzzy Logic in MANETs. Optimization, Reliabilty, and Information...
View ArticleVerification of DNSsec Delegation Signatures
Kammuller, F.. 2014. Verification of DNSsec Delegation Signatures. Telecommunications (ICT), 2014 21st International Conference on. :298-392.
View ArticleDmodel: Online Taxicab Demand Model from Big Sensor Data in a Roving Sensor...
D. Zhang, T. He, S. Lin, S. Munir, J. A. Stankovic. 2014. Dmodel: Online Taxicab Demand Model from Big Sensor Data in a Roving Sensor Network. 2014 IEEE International Congress on Big Data. :152-159.
View ArticleSymbolic execution and probabilistic reasoning
Pasareanu, C.. 2017. Symbolic execution and probabilistic reasoning. 2017 32nd Annual ACM/IEEE Symposium on Logic in Computer Science (LICS). :1–1.
View ArticleA Fault Diagnosis Expert System for Flight Control Software Based on SFMEA...
Shao, Y., Liu, B., Li, G., Yan, R.. 2017. A Fault Diagnosis Expert System for Flight Control Software Based on SFMEA and SFTA. 2017 IEEE International Conference on Software Quality, Reliability and...
View ArticleFocal Visual-Text Attention for Visual Question Answering
Liang, J., Jiang, L., Cao, L., Li, L., Hauptmann, A.. 2018. Focal Visual-Text Attention for Visual Question Answering. 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition. :6135–6143.
View ArticleFrom Big Data to Knowledge: Issues of Provenance, Trust, and Scientific...
Huang, Jingwei. 2018. From Big Data to Knowledge: Issues of Provenance, Trust, and Scientific Computing Integrity. 2018 IEEE International Conference on Big Data (Big Data). :2197–2205.
View ArticleResearch and Design of Subway BAS Intrusion Detection Expert System
Yu, Jianguo, Tian, Pei, Feng, Haonan, Xiao, Yan. 2018. Research and Design of Subway BAS Intrusion Detection Expert System. 2018 IEEE 3rd Advanced Information Technology, Electronic and Automation...
View ArticleExpert System for Managing Policy of Technological Security in Uncertainty...
Shabanov, Boris, Sotnikov, Alexander, Palyukh, Boris, Vetrov, Alexander, Alexandrova, Darya. 2019. Expert System for Managing Policy of Technological Security in Uncertainty Conditions:...
View ArticleAn Expert System Based on Belief Rule to Assess Bank Surveillance Security
Alam, Md Jamshed, Kamrul, MD. Imtiaz, Zia Ur Rashid, S. M., Rashid, Syed Zahidur. 2018. An Expert System Based on Belief Rule to Assess Bank Surveillance Security. 2018 International Conference on...
View ArticleSCTD: Smart Reasoning Based Content Threat Defense in Semantics Knowledge...
Liu, Yi, Dong, Mianxiong, Ota, Kaoru, Wu, Jun, Li, Jianhua, Chen, Hao. 2019. SCTD: Smart Reasoning Based Content Threat Defense in Semantics Knowledge Enhanced ICN. ICC 2019 - 2019 IEEE International...
View ArticleDecision Support System for Risk Assessment Using Fuzzy Inference in Supply...
Salamai, Abdullah, Hussain, Omar, Saberi, Morteza. 2019. Decision Support System for Risk Assessment Using Fuzzy Inference in Supply Chain Big Data. 2019 International Conference on High Performance...
View ArticleDeliberative and Affective Reasoning: a Bayesian Dual-Process Model
Hoey, Jesse, Sheikhbahaee, Zahra, MacKinnon, Neil J.. 2019. Deliberative and Affective Reasoning: a Bayesian Dual-Process Model. 2019 8th International Conference on Affective Computing and...
View ArticleComprehensive Privacy Analysis of Deep Learning: Passive and Active White-Box...
Nasr, Milad, Shokri, Reza, Houmansadr, Amir. 2019. Comprehensive Privacy Analysis of Deep Learning: Passive and Active White-Box Inference Attacks against Centralized and Federated Learning. 2019...
View ArticleEvaluating Fault Resiliency of Compressed Deep Neural Networks
Sabbagh, Majid, Gongye, Cheng, Fei, Yunsi, Wang, Yanzhi. 2019. Evaluating Fault Resiliency of Compressed Deep Neural Networks. 2019 IEEE International Conference on Embedded Software and Systems...
View ArticleBeyond Pixels: Image Provenance Analysis Leveraging Metadata
Bharati, Aparna, Moreira, Daniel, Brogan, Joel, Hale, Patricia, Bowyer, Kevin, Flynn, Patrick, Rocha, Anderson, Scheirer, Walter. 2019. Beyond Pixels: Image Provenance Analysis Leveraging Metadata....
View ArticleUncertainty-Aware Opinion Inference Under Adversarial Attacks
Alim, Adil, Zhao, Xujiang, Cho, Jin-Hee, Chen, Feng. 2019. Uncertainty-Aware Opinion Inference Under Adversarial Attacks. 2019 IEEE International Conference on Big Data (Big Data). :6—15.
View ArticleMeasuring the Effectiveness of Network Deception
Sugrim, Shridatt, Venkatesan, Sridhar, Youzwak, Jason A., Chiang, Cho-Yu J., Chadha, Ritu, Albanese, Massimiliano, Cam, Hasan. 2018. Measuring the Effectiveness of Network Deception. 2018 IEEE...
View Article
More Pages to Explore .....