A novel obfuscation method based on majority logic for preventing unauthorized access to binary deep neural networks. [PDF]
Mohseni A, Moaiyeri MH, Adel MJ.
europepmc +1 more source
Parameterized Complexities of Dominating and Independent Set Reconfiguration
Bodlaender HL +2 more
europepmc +1 more source
A dataset on vulnerabilities affecting dependencies in software package managers. [PDF]
Márquez AG +2 more
europepmc +1 more source
Network topology and interaction logic determine states it supports. [PDF]
Gedeon T.
europepmc +1 more source
A Process Algebraic Approach to Predict and Control Uncertainty in Smart IoT Systems for Smart Cities Based on Permissible Probabilistic Equivalence. [PDF]
Song J, Karagiannis D, Lee M.
europepmc +1 more source
Research on a Hybrid Scheduling Algorithm Based on Critical-Link Optimization for Large-Scale Time-Triggered Ethernet. [PDF]
Zhu H, Li Z, Cheng J, Jin Z.
europepmc +1 more source
Computing high-degree polynomial gradients in memory. [PDF]
Bhattacharya T +8 more
europepmc +1 more source
Routing and Scheduling in Time-Sensitive Networking by Evolutionary Algorithms. [PDF]
Wang Z, Liao W, Xia X, Wang Z, Duan Y.
europepmc +1 more source
Related searches:
ion YES NO YES Increase solution bound to cover satisfying ...
Clark W. Barrett +3 more
semanticscholar +1 more source

