Skip to main content
TudRepo
Research repository
Education Repository
Cultural Heritage
About
·
How to search
·
How to upload
Include full text
Search results
Back
Searched for: +
(21 - 40 of 87)
Document type
Date
Pages
1
2
3
4
5
List view
Grid view
Print
Email
export CSV
export Excel
Can You Hear It? Backdoor Attacks via Ultrasonic Triggers
Exploiting Digital Micro-Mirror Devices for Ambient Light Communication
Barrier Function-based Safe Reinforcement Learning for Formation Control of Mobile Robots
Deep confocal fluorescence microscopy with single-photon superconducting nanowire detector
Poster: Clean-label Backdoor Attack on Graph Neural Networks
More is Better (Mostly): On the Backdoor Attacks in Federated Graph Neural Networks
Label-Only Membership Inference Attack against \\Node-Level Graph Neural Networks
A Comparative Study of Deep Reinforcement Learning-based Transferable Energy Management Strategies for Hybrid Electric Vehicles
DEKS: A Secure Cloud-Based Searchable Service Can Make Attackers Pay
Deterioration of cement mortars with different water cement ratio partially immersed in sulfate
Quantitative analyses of ageing status of dam concrete for a 25-year-old dam
Lattice Boltzmann simulation of chloride transport in alkali-activated slag
Characteristics of fly ash blended mortars under ammonium chloride solution leaching
Lattice Boltzmann simulation of chloride transport in alkali-activated slag
Virtual Resistor Active Damping with Selective Harmonics Control of LCL-Filtered VSCs
The influence of the angle of attack on passenger comfort
How do user opinions influence their interaction with web search results?
Multi-Dimensional Output-Oriented Power System Resilience based on Degraded Functionality
Explainability-based Backdoor Attacks against Graph Neural Networks
Carrier-Based Modulated Model Predictive Control for Vienna Rectifiers
Searched for: +
(21 - 40 of 87)
Document type
Date
Pages
1
2
3
4
5
List view
Grid view
Print
Email
export CSV
export Excel