170 results on '"Hall, Russell D."'
Search Results
2. Secure Internet of Things Architecture (SIoTA) on the battlefield
3. Fusion of blockchain and biometrics: an integrated platform for aviation security and authentication
4. An anomaly detecting blockchain strategy for secure IoT networks
5. A survey on ethereum smart contract vulnerability detection using machine learning
6. Fifth Circuit hands down hard-line intent requirement in schoolyard statute.
7. Comparison of elliptical unwrapping and frontal projection for off-angle iris normalization
8. Risk management applications for disruptive technologies
9. Attritable multi-agent learning
10. Zigbee as a candidate standard for use in anomaly detection in IoT LANs
11. Holistic defenses against microarchitectural attacks
12. Automating defense against adversarial attacks: discovery of vulnerabilities and application of multi-INT imagery to protect deployed models
13. Adversarial robustness of machine learning-based indoor positioning systems
14. Deep neural network model optimizations for resource constrained tactical edge computing platforms
15. Efficient normalization techniques to optimize AI models for deployment in tactical edge
16. Towards adaptive and curious artificial agents: learning, perception, and planning in dynamic uncertain environments
17. Deep learning to predict the modulation schemes of real OFDM signals
18. Aspects of hyperdimensional computing for robotics: transfer learning, cloning, extraneous sensors, and network topology
19. The network link outlier factor (NLOF)
20. Learning lessons from smart phone developers for cyber physical systems
21. Detection and isolation of black hole attack in mobile ad hoc networks: a review
22. Assuring autonomy
23. Evaluating features for network application classification
24. Compression artifact mitigation for face in video recognition
25. Analysis of possible frameworks for a graphical query editor in a web application
26. Deep learning for modulation and coding rate classification of OFDM
27. Artificial intelligence presents new challenges in cybersecurity
28. Solving machine learning optimization problems using quantum computers
29. A zero-sum game theoretic approach for mitigating counterfeit integrated circuits in supply chain
30. Variable word length: a quantum-proof encryption solution
31. Building a high performance, secure, reliable and compliant heterogeneous computing capability through the integration of core and edge processing
32. Integration of OpenTap with quantum entanglement testbed for security analysis
33. Shannon mutual information of a qutrit in cascade model
34. Codes for straggler mitigation in secure distributed linear regression
35. Search efficient blockchain-based immutable logging and querying
36. Malware classification using fusion of neural networks
37. Privacy vs. modernity: artificial intelligence in China's infrastructure
38. PRAC: private and rateless adaptive coded computation at the edge
39. Detection of changes in the qualitative parameters for LoRaWAN and SigFox network
40. LoRaWan-Hyperledger robust network integrity on IoT devices
41. HPC enabled immersive and non-immersive visualization of large scale scientific data
42. Distributed autonomous learning framework
43. Blockchain technologies and distributed ledger systems as enablers for real time decision support
44. Performance of blockchain technology on DoD tactical networks
45. Tactical distributed ledger: an enabling technology for deploying resilient decentralized systems
46. Hardware security kernel for cyber-defense
47. Decentralized network assembly for positioning and coordination of ad hoc networks
48. Optimization problems with low SWAP tactical computing
49. Development of a 'fake news' machine learning classifier and a dataset for its testing
50. Rights of the nursing home patient and the room and board resident.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.