BRC-20: Hope or Hype. (arXiv:2310.10652v1 [cs.CR]) http://arxiv.org/abs/2310.10652
Secure and Trustworthy NFC-based Sensor Readout for Battery Packs in Battery Management Systems. (arXiv:2310.10653v1 [cs.CR]) http://arxiv.org/abs/2310.10653
Identity Prove Limited Information Governance Policy against cyber security persistent threats. (arXiv:2310.10654v1 [cs.CR]) http://arxiv.org/abs/2310.10654
Enhancing Trustworthiness in ML-Based Network Intrusion Detection with Uncertainty Quantification. (arXiv:2310.10655v1 [cs.CR]) http://arxiv.org/abs/2310.10655
VeriDIP: Verifying Ownership of Deep Neural Networks through Privacy Leakage Fingerprints. (arXiv:2310.10656v1 [cs.CR]) http://arxiv.org/abs/2310.10656
Managing Networked IoT Assets Using Practical and Scalable Traffic Inference. (arXiv:2310.10657v1 [cs.CR]) http://arxiv.org/abs/2310.10657
Checking and Automating Confidentiality Theory in Isabelle/UTP. (arXiv:2310.10658v1 [cs.CR]) http://arxiv.org/abs/2310.10658
Backdoor Attack through Machine Unlearning. (arXiv:2310.10659v1 [cs.CR]) http://arxiv.org/abs/2310.10659
Analysis and Detection against Network Attacks in the Overlapping Phenomenon of Behavior Attribute. (arXiv:2310.10660v1 [cs.CR]) http://arxiv.org/abs/2310.10660
TII-SSRC-23 Dataset: Typological Exploration of Diverse Traffic Patterns for Intrusion Detection. (arXiv:2310.10661v1 [cs.CR]) http://arxiv.org/abs/2310.10661
Unlocking the Potential of Synthetic Fuel Production: Coupled Optimization of Heat Exchanger Network and Operating Parameters of a 1 MW Power-to-Liquid Plant. (arXiv:2310.09294v1 [math.OC]) http://arxiv.org/abs/2310.09294
Understanding AI Cognition: A Neural Module for Inference Inspired by Human Memory Mechanisms. (arXiv:2310.09297v1 [cs.LG]) http://arxiv.org/abs/2310.09297
ByteStack-ID: Integrated Stacked Model Leveraging Payload Byte Frequency for Grayscale Image-based Network Intrusion Detection. (arXiv:2310.09298v1 [cs.CR]) http://arxiv.org/abs/2310.09298
Digital Twin Assisted Deep Reinforcement Learning for Online Optimization of Network Slicing Admission Control. (arXiv:2310.09299v1 [cs.LG]) http://arxiv.org/abs/2310.09299
Multirotor Newton-Euler and Euler-Lagrange Modeling Equivalence. (arXiv:2310.09306v1 [eess.SY]) http://arxiv.org/abs/2310.09306
Chemical process flowsheet optimization with full space, surrogate, and implicit formulations of a Gibbs reactor. (arXiv:2310.09307v1 [math.OC]) http://arxiv.org/abs/2310.09307
Assessment of Climate Change Impacts on the Precipitation and Temperature: A Case Study on Krishna River Basin. (arXiv:2310.09311v1 [physics.ao-ph]) http://arxiv.org/abs/2310.09311
Eliciting Model Steering Interactions from Users via Data and Visual Design Probes. (arXiv:2310.09314v1 [cs.HC]) http://arxiv.org/abs/2310.09314
Role of Morphogenetic Competency on Evolution. (arXiv:2310.09318v1 [cs.NE]) http://arxiv.org/abs/2310.09318
Topological Data Analysis in smart manufacturing processes -- A survey on the state of the art. (arXiv:2310.09319v1 [cs.LG]) http://arxiv.org/abs/2310.09319
I toot the arXiv feed for topics in Computer Science.
#ComputerScience #CS #Programming #SoftwareEngineering #Software #SoftwareDevelopment #Computers #Science #arXiv #News #PeerReview