Show newer

Tracking and Mapping in Medical Computer Vision: A Review. (arXiv:2310.11475v1 [cs.CV]) arxiv.org/abs/2310.11475

Program Translation via Code Distillation. (arXiv:2310.11476v1 [cs.SE]) arxiv.org/abs/2310.11476

Robust-MBFD: A Robust Deep Learning System for Motor Bearing Faults Detection Using Multiple Deep Learning Training Strategies and A Novel Double Loss Function. (arXiv:2310.11477v1 [cs.LG]) arxiv.org/abs/2310.11477

ASP: Automatic Selection of Proxy dataset for efficient AutoML. (arXiv:2310.11478v1 [cs.LG]) arxiv.org/abs/2310.11478

On the Temperature of Bayesian Graph Neural Networks for Conformal Prediction. (arXiv:2310.11479v1 [cs.LG]) arxiv.org/abs/2310.11479

Secure and Trustworthy NFC-based Sensor Readout for Battery Packs in Battery Management Systems. (arXiv:2310.10653v1 [cs.CR]) arxiv.org/abs/2310.10653

Identity Prove Limited Information Governance Policy against cyber security persistent threats. (arXiv:2310.10654v1 [cs.CR]) arxiv.org/abs/2310.10654

Enhancing Trustworthiness in ML-Based Network Intrusion Detection with Uncertainty Quantification. (arXiv:2310.10655v1 [cs.CR]) arxiv.org/abs/2310.10655

VeriDIP: Verifying Ownership of Deep Neural Networks through Privacy Leakage Fingerprints. (arXiv:2310.10656v1 [cs.CR]) arxiv.org/abs/2310.10656

Managing Networked IoT Assets Using Practical and Scalable Traffic Inference. (arXiv:2310.10657v1 [cs.CR]) arxiv.org/abs/2310.10657

Checking and Automating Confidentiality Theory in Isabelle/UTP. (arXiv:2310.10658v1 [cs.CR]) arxiv.org/abs/2310.10658

Backdoor Attack through Machine Unlearning. (arXiv:2310.10659v1 [cs.CR]) arxiv.org/abs/2310.10659

Analysis and Detection against Network Attacks in the Overlapping Phenomenon of Behavior Attribute. (arXiv:2310.10660v1 [cs.CR]) arxiv.org/abs/2310.10660

TII-SSRC-23 Dataset: Typological Exploration of Diverse Traffic Patterns for Intrusion Detection. (arXiv:2310.10661v1 [cs.CR]) arxiv.org/abs/2310.10661

Unlocking the Potential of Synthetic Fuel Production: Coupled Optimization of Heat Exchanger Network and Operating Parameters of a 1 MW Power-to-Liquid Plant. (arXiv:2310.09294v1 [math.OC]) arxiv.org/abs/2310.09294

Understanding AI Cognition: A Neural Module for Inference Inspired by Human Memory Mechanisms. (arXiv:2310.09297v1 [cs.LG]) arxiv.org/abs/2310.09297

ByteStack-ID: Integrated Stacked Model Leveraging Payload Byte Frequency for Grayscale Image-based Network Intrusion Detection. (arXiv:2310.09298v1 [cs.CR]) arxiv.org/abs/2310.09298

Digital Twin Assisted Deep Reinforcement Learning for Online Optimization of Network Slicing Admission Control. (arXiv:2310.09299v1 [cs.LG]) arxiv.org/abs/2310.09299

Multirotor Newton-Euler and Euler-Lagrange Modeling Equivalence. (arXiv:2310.09306v1 [eess.SY]) arxiv.org/abs/2310.09306

Show older
Qoto Mastodon

QOTO: Question Others to Teach Ourselves
An inclusive, Academic Freedom, instance
All cultures welcome.
Hate speech and harassment strictly forbidden.