Author:Axel EgonPublications |
---|
EasyChair Preprint 15062 | EasyChair Preprint 15061 | EasyChair Preprint 15060 | EasyChair Preprint 15059 | EasyChair Preprint 15058 | EasyChair Preprint 15049 | EasyChair Preprint 15042 | EasyChair Preprint 15041 | EasyChair Preprint 15040 | EasyChair Preprint 15039 | EasyChair Preprint 14818 | EasyChair Preprint 14783 | EasyChair Preprint 14782 | EasyChair Preprint 14781 | EasyChair Preprint 14780 | EasyChair Preprint 14779 | EasyChair Preprint 14766 | EasyChair Preprint 14644 | EasyChair Preprint 14640 | EasyChair Preprint 14606 | EasyChair Preprint 14580 | EasyChair Preprint 14569 | EasyChair Preprint 14568 | EasyChair Preprint 14567 | EasyChair Preprint 14566 | EasyChair Preprint 14565 | EasyChair Preprint 14564 | EasyChair Preprint 14442 | EasyChair Preprint 14272 | EasyChair Preprint 14271 | EasyChair Preprint 14270 | EasyChair Preprint 14269 | EasyChair Preprint 14268 | EasyChair Preprint 14267 | EasyChair Preprint 14266 | EasyChair Preprint 14265 | EasyChair Preprint 14264 | EasyChair Preprint 14163 | EasyChair Preprint 14162 | EasyChair Preprint 14160 | EasyChair Preprint 14124 | EasyChair Preprint 14111 | EasyChair Preprint 14048 | EasyChair Preprint 14033 | EasyChair Preprint 14032 | EasyChair Preprint 14031 | EasyChair Preprint 13985 | EasyChair Preprint 13957 | EasyChair Preprint 13956 | EasyChair Preprint 13859 | EasyChair Preprint 13858 | EasyChair Preprint 13824 | EasyChair Preprint 13812 | EasyChair Preprint 13811 | EasyChair Preprint 13810 | EasyChair Preprint 12795 | EasyChair Preprint 12788 | EasyChair Preprint 12676 | EasyChair Preprint 12675 | EasyChair Preprint 12673 | EasyChair Preprint 12670 | EasyChair Preprint 12669 | EasyChair Preprint 12668 | EasyChair Preprint 12667 |
Keyphrasesacquisition, adversarial attacks, Adversarial machine learning (AML), adversarial robustness, adversarial training2, Affected, AI algorithms, AI-based network, AI-driven, Alveolar Ridge Preservation2, anomaling, Anomaly Detection Systems, Application of Artificial Intelligence, Archaeological Datasets, archaeological materials, Archaeological Site Prospection, archaeological sites, Architecture, artifact provenance, Artificial Intelligence2, Artificial Intelligence (AI)2, Attacks, Aurora kinase2, Balanced Scorecard4, Banking Operations, Banking Sector, Banking Strategy, behavior, BET10, biocompatibility, biomechanical analysis, Biotechnology, Blockchain, bone regeneration, Bromodomain9, Business, cancer7, cancer treatment, CDK2, CDK92, Cellular Mechanisms, Circulating tumor DNA (ctDNA), Clinical Success Rates, Computed Tomography (CT) Scans, computer-aided drug design3, Computer Science2, consumer2, Contemporary, Critical Infrastructure, Customer, Customer Engagement, customer loyalty, customer perspective, customer satisfaction, Cyberattacks2, Cybersecurity2, Cyberthreat, data processing, data transmission, Deciphering Ancient, Deepfakes, defense mechanisms, Dental, Dental implants2, detection, Detection and Mitigation, Detection and Prevention, Development of digital tools, Digital approaches, Digital Archaeological Resources, digital archiving, Digitization, disease control, DNA methylation, dual inhibitor7, Early Warning Systems (EWS), Economic challenges, Economics, Ecosystems, Edge Computing, electrode design, Energy5, Engagement, Engineering, Epigenetics9, Ethical and Legal Issues, Explainable AI, Federated Learning, Finance, Financial Inclusion, Financial Performance, financial perspective, financial stability2, Gamification Strategies, GIS, Green Consumerism, Guided bone regeneration, heat2, implantable microelectronic devices, inhibitor10, Insider Threat, Integration of GIS, Internal Business Process Perspective, Internet of Things (IoT), Invasive, Islamic Microfinance, kinase10, low-power circuits, Lung Cancer3, lung cancer treatment technologies, machine learning, Machine Learning (ML), Machine learning algorithm for lung cancer, Machine Learning Security, Machine Learning Techniques, Malware, managing, Marketers, Marketing2, Minimally invasive extraction, Minimally Invasive Tooth Extraction, Mitigation, Model resilience, molecular mechanisms, Molecular Signaling Pathways, natural disasters, Network Management, neural interfaces, Neural prosthetics, neurological impairments, nutrient, online artifacts and interactions, operational efficiency, osteoinduction, Palestinian banks3, panel, patient satisfaction, performance measurement, phenotypic plasticity, Plant Epigenetics, Plant-pathogen interactions, plant root, plant stress, power4, power transfer, predictive modeling, predictive policing, privacy preserving, Process Improvement, product, profit sharing, Profitability, public engagement, Ransomware, Rapid Documentation, Regulatory Compliance, reliability and security, Renewable2, research, risk management2, Risk Mitigation, robust optimization, Scripts and Languages, Secure AI, Security, Security Analytics, security decision-making, Security Frameworks, service quality, Shariah Compliance, signal resolution, social, social justice, Social media archaeology, socio-economic development, Solar4, sophisticated, species, spectrum efficiency, Standards for Long-Term Preservation, Strategic Alignment, Strategic Management2, stratigraphic analysis, studies and authentication, Studying digital culture, Sustainable, technological solutions, Technology4, Telecommunication Networks, Thermal4, Tolerance Mechanisms, Traditional machine learning, Use of Drones and Photogrammetry, visualization, Vulnerabilities, wireless communication, Xenograft Materials2, Xenografts, Zakat, zero-day. |
|