_ | vulnerability | _ |
Actual and Forecasted | vulnerability | Assessment to Seawater Intrusion via GALDIT-SUSI in the Volturno River Mouth (Italy) |
Adaptation to Flooding Events Through | vulnerability | Mapping in Historic Urban Areas |
Addressing Model | vulnerability | to Distributional Shifts Over Image Transformation Sets |
Advances in Remote Sensing Technology, Machine Learning and Deep Learning for Marine Oil Spill Detection, Prediction and | vulnerability | Assessment |
Adversarial Deepfakes: Evaluating | vulnerability | of Deepfake Detectors to Adversarial Examples |
Adversarial | vulnerability | of Temporal Feature Networks for Object Detection |
Analysis of Vegetation | vulnerability | Dynamics and Driving Forces to Multiple Drought Stresses in a Changing Environment |
Analysis of Vegetative Cover | vulnerability | in Rohingya Refugee Camps of Bangladesh Utilizing Landsat and Per Capita Greening Area (PCGA) Datasets |
Analyzing Ecological | vulnerability | and Vegetation Phenology Response Using NDVI Time Series Data and the BFAST Algorithm |
Application of WebGIS Tools for Visualizing Coastal Flooding | vulnerability | and Planning for Resiliency: The New Jersey Experience, The |
Assessing Agricultural | vulnerability | to Drought in a Heterogeneous Environment: A Remote Sensing-Based Approach |
Assessing Salt Marsh | vulnerability | Using High-Resolution Hyperspectral Imagery |
Assessment Method for Traffic State | vulnerability | Based on a Cloud Model for Urban Road Network Traffic Systems, An |
Assessment of Coastal | vulnerability | To Sea Level Rise of Bolinao, Pangasinan Using Remote Sensing and Geographic Information Systems |
Assessment of Enhanced Dempster-Shafer Theory for Uncertainty Modeling in a GIS-Based Seismic | vulnerability | Assessment Model, Case Study: Tabriz City |
Batch Normalization Increases Adversarial | vulnerability | and Decreases Adversarial Transferability: A Non-Robust Feature Perspective |
Beyond thinking in common categories: Predicting obstacle | vulnerability | using large random codebooks |
Change Detection Analysis for Assessing the | vulnerability | and Protective Effect of Beach Forests in Case of the Tsunami 2004 in Thailand |
Climate Change and | vulnerability | : The Case of MENA Countries |
CNNs Under Attack: On the | vulnerability | of Deep Neural Networks Based Face Recognition to Image Morphing |
Coastal | vulnerability | Assessment of Bali Province, Indonesia Using Remote Sensing and GIS Approaches |
Coastal | vulnerability | Assessment of Thrace Peninsula: Implications for Climate Change and Sea Level Rise |
Coastal | vulnerability | Index Development: a Review |
Coastline | vulnerability | Assessment through Landsat and Cubesats in a Coastal Mega City |
Combined Use of Airborne Remote Sensing Techniques within a GIS Environment for the Seismic | vulnerability | Assessment of Urban Areas: An Operational Application, The |
Comprehensive | vulnerability | Evaluation of Face Recognition Systems to Template Inversion Attacks via 3D Face Reconstruction |
County-Level Assessment of | vulnerability | to COVID-19 in Alabama |
Cyber | vulnerability | : An Attentional Dilemma |
Data Integration for Climate | vulnerability | Mapping in West Africa |
Data Poisoning Attack Aiming the | vulnerability | of Continual Learning |
Decision Model for Predicting Social | vulnerability | Using Artificial Intelligence |
Deep Image Destruction: | vulnerability | of Deep Image-to-Image Models against Adversarial Attacks |
Determination of network | vulnerability | factor using rough set |
Developing a Relative Ranking of Social | vulnerability | of Governorates of Yemen to Humanitarian Crisis |
Developing | vulnerability | Index to Quantify Urban Heat Islands Effects Coupled with Air Pollution: A Case Study of Camden, NJ |
Disaster Management, Seismic | vulnerability | , Earthquakes |
Drought | vulnerability | Curves Based on Remote Sensing and Historical Disaster Dataset |
Earthquake | vulnerability | Assessment for Urban Areas Using an ANN and Hybrid SWOT-QSPM Model |
Eco-environmental | vulnerability | Zonation In Essence of Environmental Monitoring and Management |
Estimating Fine-Scale Heat | vulnerability | in Beijing Through Two Approaches: Spatial Patterns, Similarities, and Divergence |
Evaluating the Spatial Risk of Bacterial Foodborne Diseases Using | vulnerability | Assessment and Geographically Weighted Logistic Regression |
Evaluating the | vulnerability | of Siberian Crane Habitats and the Influences of Water Level Intervals in Poyang Lake Wetland, China |
Evaluation of Coastal Erosion in the Watersheds of Municipality of Buenaventura, Colombia: Using Geospatial Techniques and the Composite | vulnerability | Index |
Evaluation of Drought | vulnerability | of Maize and Influencing Factors in Songliao Plain Based on the SE-DEA-Tobit Model |
Evaluation of Groundwater | vulnerability | in the Upper Kelkit Valley (Northeastern Turkey) Using DRASTIC and AHP-DRASTICLu Models |
Evasion Attack STeganography: Turning | vulnerability | Of Machine Learning To Adversarial Attacks Into A Real-world Application |
Expeditious Methods of Urban Survey for Seismic | vulnerability | Assessments |
Exploitation of Mcda to Learn The Radial Base Neural Network (rbfnn) Aim Physical and Social | vulnerability | Analysis Versus The Earthquake (case Study: Sanandaj City, Iran) |
Exploratory Testing of an Artificial Neural Network Classification for Enhancement of the Social | vulnerability | Index |
Exploring presentation attack | vulnerability | and usability of face recognition systems |
Exposing Fine-Grained Adversarial | vulnerability | of Face Anti-Spoofing Models |
Facial Expressions as a | vulnerability | in Face Recognition |
Fine-Scale Coastal Storm Surge Disaster | vulnerability | and Risk Assessment Model: A Case Study of Laizhou Bay, China |
Fixing the Double Agent | vulnerability | of Deep Watermarking: A Patch-Level Solution Against Artwork Plagiarism |
Flood Management, Characterization and | vulnerability | Analysis Using an Integrated RS-GIS and 2D Hydrodynamic Modelling Approach: The Case of Deg Nullah, Pakistan |
Flood | vulnerability | Assessment and Mapping: A Case Study for Australia's Hawkesbury-Nepean Catchment |
Flood | vulnerability | Reduction, Using A Partial Participatory Gis Approach. A Study Case in Baja California Sur, Mexico. |
Food | vulnerability | And Alluvial Farming for Food Security in Central Dry Zone Area of Myanmar |
Forest Fire Hazards | vulnerability | and Risk Assessment in Sirmaur District Forest of Himachal Pradesh (India): A Geospatial Approach |
Framing VRRSability Relationships among | vulnerability | , Risk, Resilience, and Sustainability for Improving Geo-Information Evaluations within Geodesign Decision Support |
Gauging Heat | vulnerability | in Southeast Florida: A Multimodal Approach Integrating Physical Exposure, Sensitivity, and Adaptive Capacity |
Geo-Based Statistical Models for | vulnerability | Prediction of Highway Network Segments |
Geo-Environment | vulnerability | Assessment of Multiple Geohazards Using VWT-AHP: A Case Study of the Pearl River Delta, China |
GIS Models for | vulnerability | of Coastal Erosion Assessment in a Tropical Protected Area |
GIS-Based Assessment of | vulnerability | to Aeolian Desertification in the Source Areas of the Yangtze and Yellow Rivers, A |
GIS-Based Fuzzy Decision Making Model for Seismic | vulnerability | Assessment in Areas with Incomplete Data, A |
GIS-based method for the environmental | vulnerability | assessment to volcanic ashfall at Etna Volcano |
GIS-Based Multi-Criteria Decision Analysis Model for Determining Glacier | vulnerability | , A |
GIS-Based Support Vector Machine Model for Flash Flood | vulnerability | Assessment and Mapping in China, A |
Groundwater | vulnerability | Mapping Using a Modified-drastic Model In Ajabshir Plain, Southeast Coast of Urmia Lake, Iran |
HBIM for The Seismic | vulnerability | Assessment of Traditional Bell Towers |
Holistic Approach to Measure Sample-level Adversarial | vulnerability | and its Utility in Building Trustworthy Systems |
Household Level | vulnerability | Analysis: Index and Fuzzy Based Methods |
Hybrid Analytic Network Process and Artificial Neural Network (ANP-ANN) Model for Urban Earthquake | vulnerability | Assessment, A |
Impact of Environmental Exposure on Chronic Diseases in China and Assessment of Population Health | vulnerability | |
Impact of Expansion Pattern of Built-Up Land in Floodplains on Flood | vulnerability | : A Case Study in the North China Plain Area |
Improvement of Earthquake Risk Awareness and Seismic Literacy of Korean Citizens through Earthquake | vulnerability | Map from the 2017 Pohang Earthquake, South Korea |
Indicator-based Approach for Micro-scale Physical Flood | vulnerability | Mapping, An |
Integrated Estimation of Seismic Physical | vulnerability | of Tehran Using Rule Based Granular Computing |
Integrated HBIM-GIS Models for Multi-Scale Seismic | vulnerability | Assessment of Historical Buildings |
Investigating Eco-Environmental | vulnerability | for China-Pakistan Economic Corridor Key Sector Punjab Using Multi-Sources Geo-Information |
Just One Moment: Structural | vulnerability | of Deep Action Recognition against One Frame Attack |
Key Areas of Ecological Restoration in Inner Mongolia Based on Ecosystem | vulnerability | and Ecosystem Service |
Machine Learning-Based Wetland | vulnerability | Assessment in the Sindh Province Ramsar Site Using Remote Sensing Data |
Mapping Heat-Health | vulnerability | Based on Remote Sensing: A Case Study in Karachi |
Mapping of Highly Heterogeneous Urban Structure Type for Flood | vulnerability | Assessment |
MasterPrint: Exploring the | vulnerability | of Partial Fingerprint-based Authentication Systems |
Measuring COVID-19 | vulnerability | for Northeast Brazilian Municipalities: Social, Economic, and Demographic Factors Based on Multiple Criteria and Spatial Analysis |
Method to Construct an Environmental | vulnerability | Model Based on Multi-Source Data to Evaluate the Hazard of Short-Term Precipitation-Induced Flooding, A |
Methodology to Assess Land Use Development, Flooding, and Wetland Change as Indicators of Coastal | vulnerability | , A |
Mitigating Adversarial | vulnerability | through Causal Parameter Estimation by Adversarial Double Machine Learning |
Monitoring Coastal | vulnerability | by Using DEMs Based on UAV Spatial Data |
Monitoring the | vulnerability | of the Dam and Dikes in Germano Iron Mining Area after the Collapse of the Tailings Dam of Fundao (Mariana-MG, Brazil) Using DInSAR Techniques with TerraSAR-X Data |
Morphometric Analysis of Trail Network and Tourist | vulnerability | in a Highly Frequented Protected Area |
Multi Parametric Micro-level | vulnerability | Assessment Model For Mountain Habitat: a Case Example From Bhilangana Block, Uttarakhand Himalaya, India, A |
Multi-Criteria Decision Making (MCDM) Model for Seismic | vulnerability | Assessment (SVA) of Urban Residential Buildings |
Natural and Political Determinants of Ecological | vulnerability | in the Qinghai-Tibet Plateau: A Case Study of Shannan, China |
Network Characteristics and | vulnerability | Analysis of Chinese Railway Network under Earthquake Disasters |
New Agent-Based Methodology for the Seismic | vulnerability | Assessment of Urban Areas, A |
New ECOSTRESS and MODIS Land Surface Temperature Data Reveal Fine-Scale Heat | vulnerability | in Cities: A Case Study for Los Angeles County, California |
On the unreasonable | vulnerability | of transformers for image restoration - and an easy fix |
On the Use of Web Mapping Platforms to Support the Seismic | vulnerability | Assessment of Old Urban Areas |
On the | vulnerability | of deep learning to adversarial attacks for camera model identification |
On the | vulnerability | of Deepfake Detectors to Attacks Generated by Denoising Diffusion Models |
On the | vulnerability | of face verification systems to hill-climbing attacks |
On the | vulnerability | of Iris-based Systems to a Software Attack Based on a Genetic Algorithm |
Open Source Data-Based Solutions for Identifying Patterns of Urban Earthquake Systemic | vulnerability | in High-Seismicity Areas |
Predicting the | vulnerability | of biometric systems to attacks based on morphed biometric information |
Quantifying Vegetation | vulnerability | to Climate Variability in China |
Revealing the Distributional | vulnerability | of Discriminators by Implicit Generators |
Risk Analysis and | vulnerability | Assessment of Archeological Areas for the Preventive Conservation |
Sea Level Rise, Land Subsidence, and Flood Disaster | vulnerability | Assessment: A Case Study in Medan City, Indonesia |
Seismic | vulnerability | Assessment in Ranau, Sabah, Using Two Different Models |
Sensitivity Analysis of Ordered Weighted Averaging Operator in Earthquake | vulnerability | Assessment |
SISI Project: Developing GIS-Based Tools for | vulnerability | Assessment |
Socio-Ecological | vulnerability | in Aba Prefecture, Western Sichuan Plateau: Evaluation, Driving Forces and Scenario Simulation |
Software | vulnerability | Detection Based on Anomaly-Attention |
Spatial and Temporal Changes in Social | vulnerability | to Natural Hazards in Mexico |
Spatial Comparison Between Densely Built-up Districts From The Viewpoint Of | vulnerability | To Road Blockades With Respect To Evacuation Behavior |
Spatial Decision Support Approach for Flood | vulnerability | Analysis in Urban Areas: A Case Study of Tehran, A |
Spatio-Temporal Analysis of Ecological | vulnerability | and Driving Factor Analysis in the Dongjiang River Basin, China, in the Recent 20 Years |
Spatiotemporal Assessment of Forest Fire | vulnerability | in China Using Automated Machine Learning |
Spatiotemporal Evolution and Trend Prediction of Tourism Economic | vulnerability | in China's Major Tourist Cities |
Spatiotemporal Patterns and Driving Factors of Ecological | vulnerability | on the Qinghai-Tibet Plateau Based on the Google Earth Engine |
study on | vulnerability | in on-line writer verification system, A |
Survey Methods for Seismic | vulnerability | Assessment of Historical Masonry Buildings |
Synthesizing | vulnerability | , Risk, Resilience, and Sustainability into VRRSability for Improving Geoinformation Decision Support Evaluations |
Technological Advances to Rescue Temporary and Ephemeral Wetlands: Reducing Their | vulnerability | , Making Them Visible |
Testing a Comprehensive Volcanic Risk Assessment of Tenerife by Volcanic Hazard Simulations and Social | vulnerability | Analysis |
Three-Dimensional | vulnerability | Assessment of Peanut (Arachis hypogaea) Based on Comprehensive Drought Index and Vulnerability Surface: A Case Study of Shandong Province, China |
Three-Dimensional | vulnerability | Assessment of Peanut (Arachis hypogaea) Based on Comprehensive Drought Index and Vulnerability Surface: A Case Study of Shandong Province, China |
Towards Robust Model Watermark via Reducing Parametric | vulnerability | |
Uncertainty Management in Seismic | vulnerability | Assessment Using Granular Computing Based on Covering of Universe |
Urban | vulnerability | Analysis Based on Micro-Geographic Unit with Multi-Source Data: Case Study in Urumqi, Xinjiang, China |
Using Spatial Data Mining Techniques to Reveal | vulnerability | of People and Places Due to Oil Transportation and Accidents: A Case Study of Istanbul Strait |
Vegetation Drought | vulnerability | Mapping Using a Copula Model of Vegetation Index and Meteorological Drought Index |
Vibration-Theoretic Approach to | vulnerability | Analysis of Nonlinear Vehicle Platoons |
| vulnerability | Analysis for The Integrated Coastal Zone Management Plan Of The City of Kastela in Croatia |
| vulnerability | Analysis of Geographical Railway Network under Geological Hazard in China |
| vulnerability | Assessment of Coupled Transportation and Multi-Energy Networks Considering Electric and Hydrogen Vehicles |
| vulnerability | Identification and Cascading Failure Spatiotemporal Patterns on Road Network under the Rainstorm Disaster |
| vulnerability | Mapping And Analysis: An Implementation In Geohazard Areas In Sabah |
| vulnerability | of Feature Extractors in 2D Image-Based 3D Object Retrieval |
| vulnerability | of Person Re-Identification Models to Metric Adversarial Attacks |
| vulnerability | of pixel-value differencing steganography to histogram analysis and modification for enhanced security |
| vulnerability | of Semantic Segmentation Networks to Adversarial Attacks in Autonomous Driving: Enhancing Extensive Environment Sensing, The |
| vulnerability | -Aware Task Scheduling for Edge Intelligence Empowered Trajectory Analysis in Intelligent Transportation Systems |
Winter Wheat Drought Risk Assessment by Coupling Improved Moisture-Sensitive Crop Model and Gridded | vulnerability | Curve |
148 for vulnerability
_ | vulnerable | _ |
Adaptive personalized routing for | vulnerable | road users |
Analysis of the Characteristics of Climate Change in the Ecologically | vulnerable | Area of the Mu Us Dune Field under the Background of Global Warming |
Assessing Disaster Risk and Resilience: a Case Study in Urban Flood | vulnerable | Community in Kampung Asahan, Kuala Selangor |
Assessment of Land Use Land Cover Changes for Predicting | vulnerable | Agricultural Lands in River Basins of Bangladesh Using Remote Sensing and a Fuzzy Expert System |
Assessment of | vulnerable | Plaque Composition by Matching the Deformation of a Parametric Plaque Model to Measured Plaque Deformation |
Climate-Adaptive Potential Crops Selection in | vulnerable | Agricultural Lands Adjacent to the Jamuna River Basin of Bangladesh Using Remote Sensing and a Fuzzy Expert System |
Computational and Affective Intelligence in Healthcare Applications for | vulnerable | Populations |
Contextual Recurrent Predictive Model for Long-Term Intent Prediction of | vulnerable | Road Users |
Deep Transfer Learning for | vulnerable | Road Users Detection using Smartphone Sensors Data |
Deeply | vulnerable | : a study of the robustness of face recognition to presentation attacks |
Detecting Areas | vulnerable | to Sand Encroachment Using Remote Sensing and GIS Techniques in Nouakchott, Mauritania |
Diffuse Anthropization Impacts in | vulnerable | Protected Areas: Comparative Analysis of the Spatial Correlation between Land Transformation and Ecological Deterioration of Three Wetlands in Spain |
Evaluating the Accuracy and Spatial Agreement of Five Global Land Cover Datasets in the Ecologically | vulnerable | South China Karst |
Fine-Grained Large-Scale | vulnerable | Communities Mapping via Satellite Imagery and Population Census Using Deep Learning |
Fixed Sensor-Based Intersection Collision Warning System in | vulnerable | Line-of-Sight and/or Traffic-Violation-Prone Environment, A |
Fusion of Perception and V2P Communication Systems for the Safety of | vulnerable | Road Users |
Intentions of | vulnerable | Road Users: Detection and Forecasting by Means of Machine Learning |
ITS-based cooperative services development framework for improving safety of | vulnerable | road users |
ITS-G5 performance improvement and evaluation for | vulnerable | road user safety services |
Kinetic measures for distinguishing | vulnerable | from stable atherosclerotic plaque with dynamic contrast-enhanced MRI |
Landslide Susceptibility Mapping and Driving Mechanisms in a | vulnerable | Region Based on Multiple Machine Learning Models |
Large-Scale Detection of the Tableland Areas and Erosion- | vulnerable | Hotspots on the Chinese Loess Plateau |
LEA2: A Lightweight Ensemble Adversarial Attack via Non-overlapping | vulnerable | Frequency Regions |
Mapping | vulnerable | Urban Areas Affected by Slow-Moving Landslides Using Sentinel-1 InSAR Data |
Measuring the Motion of | vulnerable | Road Users Relative to Moving HGVs |
Multiplatform Earth Observation Systems for Monitoring Water Quality in | vulnerable | Inland Ecosystems: Maspalomas Water Lagoon |
Pattern Recognition Method to Detect | vulnerable | Spots in an RNA Sequence for Bacterial Resistance to the Antibiotic Spectinomycin |
Platform enabling intelligent safety applications for | vulnerable | road users |
Pose Based Trajectory Forecast of | vulnerable | Road Users Using Recurrent Neural Networks |
Simulation of the Ecological Service Value and Ecological Compensation in Arid Area: A Case Study of Ecologically | vulnerable | Oasis |
Spatial-Temporal Land Loss Modeling and Simulation in a | vulnerable | Coast: A Case Study in Coastal Louisiana |
State Estimation and Motion Prediction of Vehicles and | vulnerable | Road Users for Cooperative Autonomous Driving: A Survey |
Three-Phases Smartphone-Based Warning System to Protect | vulnerable | Road Users Under Fuzzy Conditions |
UAV Photogrammetry of Forests as a | vulnerable | Process. A Sensitivity Analysis for a Structure from Motion RGB-Image Pipeline |
| vulnerable | Atherosclerotic Plaque Elasticity Reconstruction Based on a Segmentation-Driven Optimization Procedure Using Strain Measurements: Theoretical Framework |
| vulnerable | Road User Skeletal Pose Estimation Using mmWave Radars |
| vulnerable | Road User Trajectory Prediction for Autonomous Driving Using a Data-Driven Integrated Approach |
37 for vulnerable