BANAL 发表于 2025-3-25 12:03:36

http://reply.papertrans.cn/47/4675/467425/467425_23.png

飞镖 发表于 2025-3-25 17:45:47

http://reply.papertrans.cn/47/4675/467425/467425_24.png

Lacerate 发表于 2025-3-25 20:42:57

An Efficient Approach to Enhance the Robustness of Scale-Free Networks,licious attacks. When the highest-degree nodes are removed from the SFNs, they greatly affect the connectivity of the remaining nodes. In the proposed method, we perform two attacks, namely, the high degree link attacks and the recalculated high degree link attacks. These link attacks affect the cor

amyloid 发表于 2025-3-26 04:02:43

http://reply.papertrans.cn/47/4675/467425/467425_26.png

Palate 发表于 2025-3-26 05:21:28

Blockchain Based Authentication and Trust Evaluation Mechanism for Secure Routing in Wireless Senso blockchains are used for authentication. The authentication of Sensor Nodes (SNs) is performed at the private blockchain, whereas the public blockchain authenticates the cluster heads. The existing malicious node detection methods do not guarantee the authentication of the entities in Wireless Sens

conjunctivitis 发表于 2025-3-26 10:23:42

Towards Energy Efficient Smart Grids: Data Augmentation Through BiWGAN, Feature Extraction and Clas of electricity, faulty meters, meter malfunctioning, unpaid bills, etc. The proposed approach is based on data-driven methods due to the sufficient availability of smart meters’ data. Therefore, a bi-directional wasserstein generative adversarial network (Bi-WGAN) is utilized to generate the synthe

fiscal 发表于 2025-3-26 15:44:56

http://reply.papertrans.cn/47/4675/467425/467425_29.png

LAITY 发表于 2025-3-26 18:13:35

http://reply.papertrans.cn/47/4675/467425/467425_30.png

Aids209 发表于 2025-3-27 00:14:10

http://reply.papertrans.cn/47/4675/467425/467425_31.png

大范围流行 发表于 2025-3-27 05:11:07

Simulation Results of a DQN Based AAV Testbed in Corner Environment: A Comparison Study for Normal earning. In the previous work, we designed and implemented a DQN-based Autonomous Aerial Vehicle (AAV) testbed and proposed a Tabu List Strategy based DQN (TLS-DQN). In this paper, we consider corner environment as a new simulation scenario and carried out simulations for normal DQN and TLS-DQN for
页: 1 2 [3] 4 5 6 7
查看完整版本: Titlebook: Innovative Mobile and Internet Services in Ubiquitous Computing; Proceedings of the 1 Leonard Barolli,Kangbin Yim,Hsing-Chung Chen Conferen