Posts

Revisit Weakly Supervised Hashing With Deep Multi Modal...

Revisit Weakly Supervised Hashing With Deep Multi Modal Foundation Models

A Unified Approach to Voice Classification Leveraging S...

A Unified Approach to Voice Classification Leveraging Spectrograms, Mel Spectrog...

A Deep Learning Model Using Transformer Network and Exp...

A Deep Learning Model Using Transformer Network and Expert Optimizer for an Hour...

An Adaptive Variable Weight Combination Forecasting Met...

An Adaptive Variable Weight Combination Forecasting Method for Energy Product Sa...

Unsupervised Global and Local Homography Estimation Wit...

Unsupervised Global and Local Homography Estimation With Coplanarity Aware GAN

Phish Fighter Self Updating Machine Learning Shield Aga...

Phish Fighter Self Updating Machine Learning Shield Against Phishing Kits Based ...

AI Enhanced Robotic Process Automation A Review of Inte...

AI Enhanced Robotic Process Automation A Review of Intelligent Automation Innova...

Physics Based and Data Driven Modeling of Degradation M...

Physics Based and Data Driven Modeling of Degradation Mechanisms for Lithium Ion...

Toward Low Cost Digital Twins for Urban Transportation ...

Toward Low Cost Digital Twins for Urban Transportation Systems

Real Time EEG Based BCI for Self Paced Motor Imagery an...

Real Time EEG Based BCI for Self Paced Motor Imagery and Motor Execution Using F...

Knowledge Improved Hybrid DNN KAN Framework for Intrusi...

Knowledge Improved Hybrid DNN KAN Framework for Intrusion Detection in Wireless ...

Enhancing Data Privacy A Comprehensive Survey of Privac...

Enhancing Data Privacy A Comprehensive Survey of Privacy Enabling Technologies

Efficacy of Wearable Devices in Monitoring and Treating...

Efficacy of Wearable Devices in Monitoring and Treating Parkinson s Disease Symp...

Decentralized Voltage Prediction in Multi Area Distribu...

Decentralized Voltage Prediction in Multi Area Distribution Systems A Privacy Pr...

Decoding Phishing Evasion Analyzing Attacker Strategies...

Decoding Phishing Evasion Analyzing Attacker Strategies to Circumvent Detection ...

Resource Integrity Vulnerabilities and Protections in R...

Resource Integrity Vulnerabilities and Protections in RPG Games A Case Study of ...