Search

Your search keyword '"Said F"' showing total 1,453 results

Search Constraints

Start Over You searched for: Author "Said F" Remove constraint Author: "Said F"
1,453 results on '"Said F"'

Search Results

1. Sponge Attack Against Multi-Exit Networks With Data Poisoning

2. Antifungal activity of eco-safe nanoemulsions based on Nigella sativa oil against Penicillium verrucosum infecting maize seeds: Biochemical and physiological traits

3. Generation expansion planning with high shares of variable renewable energies

4. Comparative Study of Discrete PI and PR Controls for Single-Phase UPS Inverter

5. A Review of Cyber-security Measuring and Assessment Methods for Modern Enterprises

6. Probabilistic Optimal Power Flow Solution Using a Novel Hybrid Metaheuristic and Machine Learning Algorithm

7. Considerations on optimal design of hybrid power generation systems using whale and sine cosine optimization algorithms

8. A case of thymoma with type A and micronodular thymoma with lymphoid stroma elements

9. One-to-Multiple Clean-Label Image Camouflage (OmClic) based Backdoor Attack on Deep Learning

10. ANALISIS QSAR-2D DE LOS DERIVADOS DE 1,4-DI-N-OXIDOS DE QUINOXALINA CON ACTIVIDAD CONTRA LA ENFERMEDAD DE CHAGAS

11. Emerging Physical Unclonable Functions With Nanotechnology

12. ESTUDIO TEÓRICO DE LA REACTIVIDAD QUÍMICA DEL CARBÓN ACTIVO

13. Exploración estocástica de las superficies de energía potencial de dímeros cis-trans y trans-trans del ácido fórmico

14. Description of the Magnetic Field and Divergence of Multisolenoid Aharonov-Bohm Potential

15. TransCAB: Transferable Clean-Annotation Backdoor to Object Detection with Natural Trigger in Real-World

16. Effect of Maclura pomifera total acetonic extract, pomiferin and osajin on the autooxidation of purified sunflower triacylglycerols

17. MLMSA: Multi-Label Multi-Side-Channel-Information enabled Deep Learning Attacks on APUF Variants

18. MUD-PQFed: Towards Malicious User Detection in Privacy-Preserving Quantized Federated Learning

19. Dangerous Cloaking: Natural Trigger based Backdoor Attacks on Object Detectors in the Physical World

21. NTD: Non-Transferability Enabled Backdoor Detection

23. RBNN: Memory-Efficient Reconfigurable Deep Binary Neural Network with IP Protection for Internet of Things

25. 3D Printing Concrete Incoroprating Environmentally Friendly Materials

31. Modeling Attack Resilient Reconfigurable Latent Obfuscation Technique for PUF based Lightweight Authentication

32. Detecting Recycled Commodity SoCs: Exploiting Aging-Induced SRAM PUF Unreliability

33. Exploiting PUF Models for Error Free Response Generation

35. ÍNDICES DE PODER ELECTROFÍLICO GLOBAL Y LOCAL PARA EL ESTUDIO TEÓRICO DE LA REACTIVIDAD QUÍMICA: APLICACIÓN A DERIVADOS CARBONILO α,β-INSATURADOS

36. DESARROLLO DE LOS ÍNDICES DE PODER ELECTROFÍLICO Y NUCLEOFÍLICO DENTRO DEL MARCO CONCEPTUAL DE LA TEORÍA DEL FUNCIONAL DE LA DENSIDAD

37. Future Large-Scale Memristive Device Crossbar Arrays: Limits Imposed by Sneak-Path Currents on Read Operations

42. Aortite : à propos de douze cas

Catalog

Books, media, physical & digital resources