Ads
-
Related paper
- A method for protecting neural networks from computer backdoor attacks based on the trigger identification
- Protecting Mobile Ad Hoc Networks from Black Hole Attacks?
- Sanitization Techniques for Protecting Social Networks from Inference Attacks?
- DEVELOPMENT OF A MOBILE APPLICATION FOR FLAG IDENTIFICATION BASED ON ARTIFICIAL NEURAL NETWORKS
- Neural Networks for Shortest Path Computation and Routing in Computer Networks
- Formation of Complex Company Evaluation Method through Neural Networks Based on the Example of Construction Companies ́ Collection
- AN IMPROVED METHOD FOR IDENTIFYING WELL-TEST INTERPRETATION MODEL BASED ON AGGREGATED NEURAL NETWORKS AND PRINCIPAL COMPONENT ANALYSIS
- Nonlinear Process Identification using Neural Networks
- Brain Computer Interfacing using Electroencephalography and Convolutional Neural Networks
- Identification of Geometric Shapes with Real-time Neural Networks