_ | malicious | _ |
Adaptive Intrusion Detection of | malicious | Unmanned Air Vehicles Using Behavior Rule Specifications |
Afriat's Test for Detecting | malicious | Agents |
Comprehensive Resilient Control Strategy for CBTC Systems Through Train-to-Train Communications Under | malicious | Attacks, A |
Cooperative Positioning Technique With Decentralized | malicious | Vehicle Detection |
Countering | malicious | DeepFakes: Survey, Battleground, and Horizon |
Enhanced Multi-Stage Deep Learning Framework for Detecting | malicious | Activities From Autonomous Vehicles, An |
Enhancing the Robustness of Neural Collaborative Filtering Systems Under | malicious | Attacks |
Evaluating the Resilience of Face Recognition Systems Against | malicious | Attacks |
Filtering | malicious | Messages by Trust-Aware Cognitive Routing in Vehicular Ad Hoc Networks |
HDRS: A Hybrid Reputation System With Dynamic Update Interval for Detecting | malicious | Vehicles in VANETs |
Invertible Watermarking Algorithm with Detecting Locations of | malicious | Manipulation for Biometric Image Authentication |
| malicious | User Detection in Non-Orthogonal Multiple Access Based on Spectrum Analysis |
Minimal-time Trajectories for Interception of | malicious | Drones in Constrained Environments |
Multi-Scale Fusion for Improved Localization of | malicious | Tampering in Digital Images |
Robust CAPTCHAs Towards | malicious | OCR |
robust image authentication method distinguishing JPEG compression from | malicious | manipulation, A |
RSSI Map-Based Trajectory Design for UGV Against | malicious | Radio Source: A Reinforcement Learning Approach |
Visualizing Android | malicious | Applications Using Texture Features |
18 for malicious