Cited By
View all- Turukmane AKhekare GShelke NSakarkar GBuchade S(2024)Evasion Techniques in Cybersecurity: An In-Depth Analysis2024 International Conference on Artificial Intelligence and Quantum Computation-Based Sensor Application (ICAIQSA)10.1109/ICAIQSA64000.2024.10882284(1-9)Online publication date: 20-Dec-2024
- Wang SKo RBai GDong NChoi TZhang Y(2024)Evasion Attack and Defense on Machine Learning Models in Cyber-Physical Systems: A SurveyIEEE Communications Surveys & Tutorials10.1109/COMST.2023.334480826:2(930-966)Online publication date: Oct-2025
- Li JZhang XYao Y(2024)A bi-level robust optimization model for the coupling allocation of post-disaster personnel and materials assistanceJournal of Cleaner Production10.1016/j.jclepro.2024.143099(143099)Online publication date: Jul-2024
- Show More Cited By