Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
71 | Massimiliano Giacomin |
Self-Stabilizing Distributed Algorithms for Defeat Status Computation in Argumentation. |
Multi-Agent-Systems and Applications |
2001 |
DBLP DOI BibTeX RDF |
|
71 | Brent Heeringa, Paul R. Cohen |
An underlying model for defeat mechanisms. |
WSC |
2000 |
DBLP DOI BibTeX RDF |
|
59 | Gary W. King, Brent Heeringa, David L. Westbrook, Joe Catalano, Paul R. Cohen |
Agent modeling: models of defeat. |
WSC |
2002 |
DBLP DOI BibTeX RDF |
|
48 | Lei Liu 0021, Songqing Chen |
Malyzer: Defeating Anti-detection for Application-Level Malware Analysis. |
ACNS |
2009 |
DBLP DOI BibTeX RDF |
|
47 | Diego C. Martínez, Alejandro Javier García, Guillermo Ricardo Simari |
Progressive Defeat Paths in Abstract Argumentation Frameworks. |
Canadian AI |
2006 |
DBLP DOI BibTeX RDF |
|
36 | Sanjay Modgil |
Nested Argumentation and Its Application to Decision Making over Actions. |
ArgMAS |
2005 |
DBLP DOI BibTeX RDF |
|
35 | Kurosh Madani, Véronique Amarger, Christophe Sabourin |
ANN Based Solutions: It Is Time to Defeat Real-World and Industrial Dilemmas. |
IWANN (1) |
2009 |
DBLP DOI BibTeX RDF |
Real-Time, Artificial Neural Networks, Implementation, Industrial, Solutions, Real-world |
35 | Praveen Sivadasan, P. Sojan Lal, Naveen Sivadasan |
JDATATRANS for array obfuscation in Java source codes to defeat reverse engineering from decompiled codes. |
Bangalore Compute Conf. |
2009 |
DBLP DOI BibTeX RDF |
restructured arrays, source code obfuscation, reverse engineering |
35 | Yinan Jing, Jingtao Li, Xueping Wang, Xiaochun Xiao, Gendu Zhang |
A Distributed-Log-based IP Traceback Scheme to Defeat DDoS Attacks. |
AINA (2) |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Xin Li 0008, Fang Bian, Mark Crovella, Christophe Diot, Ramesh Govindan, Gianluca Iannaccone, Anukool Lakhina |
Detection and identification of network anomalies using sketch subspaces. |
Internet Measurement Conference |
2006 |
DBLP DOI BibTeX RDF |
defeat, anomaly detection, sketch, subspace method |
33 | Quoc Bao Vo, Norman Y. Foo, Joe Thurbon |
Semantics for a theory of defeasible reasoning. |
Ann. Math. Artif. Intell. |
2005 |
DBLP DOI BibTeX RDF |
argument-based systems, argumentation-theoretic semantics, defeat, justification, defeasible reasoning |
24 | Battista Biggio, Giorgio Fumera, Ignazio Pillai, Fabio Roli |
Image Spam Filtering Using Visual Information. |
ICIAP |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Paul C. van Oorschot, Anil Somayaji, Glenn Wurster |
Hardware-Assisted Circumvention of Self-Hashing Software Tamper Resistance. |
IEEE Trans. Dependable Secur. Comput. |
2005 |
DBLP DOI BibTeX RDF |
self-hashing, operating system kernels, software protection, Tamper resistance, checksumming, application security, processor design |
24 | Shuo Chen 0001, Jun Xu 0003, Nithin Nakka, Zbigniew Kalbarczyk, Ravishankar K. Iyer |
Defeating Memory Corruption Attacks via Pointer Taintedness Detection. |
DSN |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Qinghua Zhang, Pan Wang, Douglas S. Reeves, Peng Ning |
Defending against Sybil Attacks in Sensor Networks. |
ICDCS Workshops |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Jaap Hage |
Law and Defeasibility. |
Artif. Intell. Law |
2003 |
DBLP DOI BibTeX RDF |
defeasibility, legal justification, non-monotonic logic |
24 | Mike Burmester, Yvo Desmedt, Yongge Wang |
Using Approximation Hardness to Achieve Dependable Computation. |
RANDOM |
1998 |
DBLP DOI BibTeX RDF |
|
22 | Hamza Javed, Zainab Abaid, Shahid Akbar, Kifayat Ullah 0004, Ashfaq Ahmad, Aamir Saeed, Hashim Ali, Yazeed Yasin Ghadi, Tahani Jaser Alahmadi, Hend Khalid Alkahtani, Ali Raza |
Blockchain-Based Logging to Defeat Malicious Insiders: The Case of Remote Health Monitoring Systems. |
IEEE Access |
2024 |
DBLP DOI BibTeX RDF |
|
22 | Ke Sun, Pei Liu, Pengfei Li, Zhifang Liao |
ModWaveMLP: MLP-Based Mode Decomposition and Wavelet Denoising Model to Defeat Complex Structures in Traffic Forecasting. |
AAAI |
2024 |
DBLP DOI BibTeX RDF |
|
22 | Vid Kocijan, Ernest Davis, Thomas Lukasiewicz, Gary Marcus 0001, Leora Morgenstern |
The Defeat of the Winograd Schema Challenge (Abstract Reprint). |
AAAI |
2024 |
DBLP DOI BibTeX RDF |
|
22 | Wenjian Sun, Dongsheng Wu, Yang Luo, Lu Liu, Hongjing Zhang, Shuang Wu, Yan Zhang, Chenglong Wang, Houjun Zheng, Jiang Shen, Chunbo Luo |
ExpertNet: Defeat noisy labels by deep expert consultation paradigm for pneumoconiosis staging on chest radiographs. |
Expert Syst. Appl. |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Wolfgang Dvorák, Anna Rapberger, Stefan Woltran |
A claim-centric perspective on abstract argumentation semantics: Claim-defeat, principles, and expressiveness. |
Artif. Intell. |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Vid Kocijan, Ernest Davis, Thomas Lukasiewicz, Gary Marcus 0001, Leora Morgenstern |
The defeat of the Winograd Schema Challenge. |
Artif. Intell. |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Mashari Alatawi, Nitesh Saxena |
Exploring Encrypted Keyboards to Defeat Client-Side Scanning in End-to-End Encryption Systems. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Guangyuan Hu, Ruby B. Lee |
Random and Safe Cache Architecture to Defeat Cache Timing Attacks. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Pascal Urien |
Innovative Countermeasures to Defeat Cyber Attacks Against Blockchain Wallets: A Crypto Terminal Use Case. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Libor Caha, Xavier Coiteux-Roy, Robert Koenig |
A colossal advantage: 3D-local noisy shallow quantum circuits defeat unbounded fan-in classical circuits. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Aleks Knoks |
Conciliatory Reasoning, Self-Defeat, and Abstract Argumentation. |
Rev. Symb. Log. |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Yishay Mansour, Richard Nock, Robert C. Williamson |
Random Classification Noise does not defeat All Convex Potential Boosters Irrespective of Model Choice. |
ICML |
2023 |
DBLP BibTeX RDF |
|
22 | Zeyu Deng, Long Huang, Chen Wang 0009 |
Enhanced In-air Signature Verification via Hand Skeleton Tracking to Defeat Robot-level Replays. |
ACSAC |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Lee Sharkey |
Circumventing interpretability: How to defeat mind-readers. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Vid Kocijan, Ernest Davis, Thomas Lukasiewicz, Gary Marcus 0001, Leora Morgenstern |
The Defeat of the Winograd Schema Challenge. |
CoRR |
2022 |
DBLP BibTeX RDF |
|
22 | Mohammed Baz, Sabita Khatri, Abdullah Baz, Hosam Alhakami 0001, Alka Agrawal, Raees Ahmad Khan |
Blockchain and Artificial Intelligence Applications to Defeat COVID-19 Pandemic. |
Comput. Syst. Sci. Eng. |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Lifeng Huang, Chengying Gao, Ning Liu |
DEFEAT: Decoupled feature attack across deep neural networks. |
Neural Networks |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Michael Coole, Deborah Evans, David Brooks |
A Framework for the Analysis of Security Technology Vulnerabilities: Defeat Evaluation of an Electronic Access Control Locking System. |
ICCST |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Didem Demirag, Jeremy Clark |
Opening Sentences in Academic Writing: How Security Researchers Defeat the Blinking Cursor. |
SIGCSE (1) |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Jack Mumford, Isabel Sassoon, Elizabeth Black, Simon Parsons |
On the Complexity of Determining Defeat Relations Consistent with Abstract Argumentation Semantics. |
COMMA |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Zhendong Zhao, Xiaojun Chen 0004, Yuexin Xuan, Ye Dong, Dakui Wang, Kaitai Liang |
DEFEAT: Deep Hidden Feature Backdoor Attacks by Imperceptible Perturbation and Latent Representation Constraints. |
CVPR |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Mashari Alatawi, Nitesh Saxena |
Exploring Encrypted Keyboards to Defeat Client-Side Scanning in End-to-End Encryption Systems. |
ICISC |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Lydia Blümel, Markus Ulbricht 0001 |
Defining Defense and Defeat in Abstract Argumentation From Scratch - A Generalizing Approach. |
KR |
2022 |
DBLP BibTeX RDF |
|
22 | Wei-Loon Mow, Shih-Kun Huang, Hsu-Chun Hsiao |
LAEG: Leak-based AEG using Dynamic Binary Analysis to Defeat ASLR. |
DSC |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Matthew Moore, Kristen R. Walcott |
Generating Human-Like Motion to Defeat Interaction-Based CAPTCHAs. |
FTC (2) |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Wenjie Yang, Sitong Wang, Zhenhui Peng, Chuhan Shi, Xiaojuan Ma, Diyi Yang |
Know It to Defeat It: Exploring Health Rumor Characteristics and Debunking Efforts on Chinese Social Media during COVID-19 Crisis. |
ICWSM |
2022 |
DBLP BibTeX RDF |
|
22 | Nguyen Van Huynh, Dinh Thai Hoang, Diep N. Nguyen, Eryk Dutkiewicz |
DeepFake: Deep Dueling-Based Deception Strategy to Defeat Reactive Jammers. |
IEEE Trans. Wirel. Commun. |
2021 |
DBLP DOI BibTeX RDF |
|
22 | Guangzhao Cheng, Siliang Tang |
To be a fast adaptive learner: using game history to defeat opponents. |
CoRR |
2021 |
DBLP BibTeX RDF |
|
22 | Wenjie Yang, Sitong Wang, Zhenhui Peng, Chuhan Shi, Xiaojuan Ma, Diyi Yang |
Know it to Defeat it: Exploring Health Rumor Characteristics and Debunking Efforts on Chinese Social Media during COVID-19 Crisis. |
CoRR |
2021 |
DBLP BibTeX RDF |
|
22 | Samuel Selassie Yakohene, Winfred Yaokumah, Ernest Barfo Boadi Gyebi |
Scrambling Keypad for Secure Pin Entry to Defeat Shoulder Surfing and Inference Attacks. |
Int. J. Secur. Priv. Pervasive Comput. |
2021 |
DBLP DOI BibTeX RDF |
|
22 | Margaux Dugardin, Werner Schindler, Sylvain Guilley |
Stochastic methods defeat regular RSA exponentiation algorithms with combined blinding methods. |
J. Math. Cryptol. |
2021 |
DBLP DOI BibTeX RDF |
|
22 | Charles V. Lovejoy, Mary L. McDonald, Thomas W. Lucas, Susan M. Sanchez |
Investigating an Active Shooter Defeat System With Simulation And Data Farming. |
WSC |
2021 |
DBLP DOI BibTeX RDF |
|
22 | Yusi Feng, Ziyuan Zhu, Shuan Li, Ben Liu, Huozhu Wang, Dan Meng |
Constant-Time Loading: Modifying CPU Pipeline to Defeat Cache Side-Channel Attacks. |
TrustCom |
2021 |
DBLP DOI BibTeX RDF |
|
22 | James C. Davis 0001, Francisco Servant, Dongyoon Lee |
Using Selective Memoization to Defeat Regular Expression Denial of Service (ReDoS). |
SP |
2021 |
DBLP DOI BibTeX RDF |
|
22 | Pascal Urien |
Innovative Countermeasures to Defeat Cyber Attacks Against Blockchain Wallets. |
CSNet |
2021 |
DBLP DOI BibTeX RDF |
|
22 | Jan Constantin |
Replacement and reasoning: a reliabilist account of epistemic defeat. |
Synth. |
2020 |
DBLP DOI BibTeX RDF |
|
22 | Jan Constantin, Thomas Grundmann |
Epistemic authority: preemption through source sensitive defeat. |
Synth. |
2020 |
DBLP DOI BibTeX RDF |
|
22 | Ru Ye |
Higher-order defeat and intellectual responsibility. |
Synth. |
2020 |
DBLP DOI BibTeX RDF |
|
22 | Muneer Alwazzeh, Sameer Karaman, Mohammad Nur Shamma |
Man in The Middle Attacks Against SSL/TLS: Mitigation and Defeat. |
J. Cyber Secur. Mobil. |
2020 |
DBLP DOI BibTeX RDF |
|
22 | Zhi Li 0048, Hai Jin 0001, Deqing Zou, Bin Yuan |
Exploring New Opportunities to Defeat Low-Rate DDoS Attack in Container-Based Cloud Environment. |
IEEE Trans. Parallel Distributed Syst. |
2020 |
DBLP DOI BibTeX RDF |
|
22 | Jaime Spencer, Richard Bowden, Simon Hadfield |
DeFeat-Net: General Monocular Depth via Simultaneous Unsupervised Representation Learning. |
CoRR |
2020 |
DBLP BibTeX RDF |
|
22 | Nguyen Van Huynh, Dinh Thai Hoang, Diep N. Nguyen, Eryk Dutkiewicz |
DeepFake: Deep Dueling-based Deception Strategy to Defeat Reactive Jammers. |
CoRR |
2020 |
DBLP BibTeX RDF |
|
22 | Wesley H. Holliday, Eric Pacuit |
Axioms for Defeat in Democratic Elections. |
CoRR |
2020 |
DBLP BibTeX RDF |
|
22 | Cong Wu 0003, Kun He 0008, Jing Chen 0003, Ziming Zhao 0001, Ruiying Du |
Liveness is Not Enough: Enhancing Fingerprint Authentication with Behavioral Biometrics to Defeat Puppet Attacks. |
USENIX Security Symposium |
2020 |
DBLP BibTeX RDF |
|
22 | Yongge Wang, Jingwen Sun, Xin Wang, Yunchuan Wei, Hao Wu 0023, Zhou Yu, Gillian Chu |
Sperax: An Approach To Defeat Long Range Attacks In Blockchains. |
INFOCOM Workshops |
2020 |
DBLP DOI BibTeX RDF |
|
22 | Jaime Spencer, Richard Bowden, Simon Hadfield |
DeFeat-Net: General Monocular Depth via Simultaneous Unsupervised Representation Learning. |
CVPR |
2020 |
DBLP BibTeX RDF |
|
22 | B. N. Yuvaraju, M. Narender |
To Defeat DDoS Attacks in Cloud Computing Environment Using Software Defined Networking (SDN). |
CSOC (1) |
2020 |
DBLP DOI BibTeX RDF |
|
22 | Lixin Fan, Kam Woh Ng, Chee Seng Chan |
Rethinking Deep Neural Network Ownership Verification: Embedding Passports to Defeat Ambiguity Attacks. |
CoRR |
2019 |
DBLP BibTeX RDF |
|
22 | Le Guan, Chen Cao, Peng Liu 0005, Xinyu Xing, Xinyang Ge, Shengzhi Zhang, Meng Yu 0001, Trent Jaeger |
Building a Trustworthy Execution Environment to Defeat Exploits from both Cyber Space and Physical Space for ARM. |
IEEE Trans. Dependable Secur. Comput. |
2019 |
DBLP DOI BibTeX RDF |
|
22 | Mohamed Zeyad, Houssem Maghrebi, Davide Alessio, Boris Batteux |
Another Look on Bucketing Attack to Defeat White-Box Implementations. |
COSADE |
2019 |
DBLP DOI BibTeX RDF |
|
22 | Md. Sabir Hossain, Mohammad Robaitul Islam Bhuiyan, Md. Shariful Islam, Md. Faridul Islam, Md. Al-Hasan |
Facilitating Hard-to-Defeat Car AI Using Flood-Fill Algorithm. |
IJCCI |
2019 |
DBLP DOI BibTeX RDF |
|
22 | Lixin Fan, Kam Woh Ng, Chee Seng Chan |
Rethinking Deep Neural Network Ownership Verification: Embedding Passports to Defeat Ambiguity Attacks. |
NeurIPS |
2019 |
DBLP BibTeX RDF |
|
22 | Mengjia Yan 0001, Jen-Yang Wen, Christopher W. Fletcher, Josep Torrellas |
SecDir: a secure directory to defeat directory side-channel attacks. |
ISCA |
2019 |
DBLP DOI BibTeX RDF |
|
22 | Arvind Rajagopalan, Duong Duc Nguyen, Jijoong Kim |
Predictive Regret-Matching for Cooperating Interceptors to Defeat an Advanced Threat. |
Australasian Conference on Artificial Intelligence |
2019 |
DBLP DOI BibTeX RDF |
|
22 | J. Adam Carter |
Meta-epistemic defeat. |
Synth. |
2018 |
DBLP DOI BibTeX RDF |
|
22 | Matthias Steup |
Destructive defeat and justificational force: the dialectic of dogmatism, conservatism, and meta-evidentialism. |
Synth. |
2018 |
DBLP DOI BibTeX RDF |
|
22 | Duncan Pritchard |
Anti-luck virtue epistemology and epistemic defeat. |
Synth. |
2018 |
DBLP DOI BibTeX RDF |
|
22 | Valentina Cardo |
Technology, popular culture and everyday life: The electoral defeat of New Zealand Internet MANA. |
Inf. Polity |
2018 |
DBLP DOI BibTeX RDF |
|
22 | Peter A. Chew |
Searching for Unknown Unknowns: Unsupervised Bot Detection to Defeat an Adaptive Adversary. |
SBP-BRiMS |
2018 |
DBLP DOI BibTeX RDF |
|
22 | Chen Cao, Le Guan, Peng Liu 0005, Neng Gao, Jingqiang Lin, Ji Xiang |
Hey, you, keep away from my device: remotely implanting a virus expeller to defeat Mirai on IoT devices. |
CoRR |
2017 |
DBLP BibTeX RDF |
|
22 | Damien Jauvart, Jacques J. A. Fournier, Louis Goubin |
First Practical Side-channel Attack to Defeat Point Randomization in Secure Implementations of Pairing-based Cryptography. |
SECRYPT |
2017 |
DBLP DOI BibTeX RDF |
|
22 | Kevin Bock 0001, Daven Patel, George Hughey, Dave Levin |
unCaptcha: A Low-Resource Defeat of reCaptcha's Audio Challenge. |
WOOT |
2017 |
DBLP BibTeX RDF |
|
22 | Ye Wang 0006, Yuanjiang Huang, Wu Zheng, Zhi Zhou 0006, Debin Liu, Mi Lu |
Combining convolutional neural network and self-adaptive algorithm to defeat synthetic multi-digit text-based CAPTCHA. |
ICIT |
2017 |
DBLP DOI BibTeX RDF |
|
22 | Moritz Contag, Vector Guo Li, Andre Pawlowski, Felix Domke, Kirill Levchenko, Thorsten Holz, Stefan Savage |
How They Did It: An Analysis of Emission Defeat Devices in Modern Automobiles. |
IEEE Symposium on Security and Privacy |
2017 |
DBLP DOI BibTeX RDF |
|
22 | Max Wolotsky, Mohammad Husain, Elisha Choe |
Chill-Pass: Using Neuro-Physiological Responses to Chill Music to Defeat Coercion Attacks. |
CoRR |
2016 |
DBLP BibTeX RDF |
|
22 | |
Future cyberdefenses will defeat cyberattacks on PCs. |
Commun. ACM |
2016 |
DBLP DOI BibTeX RDF |
|
22 | Margaux Dugardin, Sylvain Guilley, Jean-Luc Danger, Zakaria Najm, Olivier Rioul |
Correlated Extra-Reductions Defeat Blinded Regular Exponentiation - Extended Version. |
IACR Cryptol. ePrint Arch. |
2016 |
DBLP BibTeX RDF |
|
22 | Ye Wang 0006, Mi Lu |
A self-adaptive algorithm to defeat text-based CAPTCHA. |
ICIT |
2016 |
DBLP DOI BibTeX RDF |
|
22 | Margaux Dugardin, Sylvain Guilley, Jean-Luc Danger, Zakaria Najm, Olivier Rioul |
Correlated Extra-Reductions Defeat Blinded Regular Exponentiation. |
CHES |
2016 |
DBLP DOI BibTeX RDF |
|
22 | Luke Jones, Andrew J. Sellers, Martin C. Carlisle |
CARDINAL: similarity analysis to defeat malware compiler variations. |
MALWARE |
2016 |
DBLP DOI BibTeX RDF |
|
22 | Michael L. Mirer, Leticia Bode |
Tweeting in defeat: How candidates concede and claim victory in 140 characters. |
New Media Soc. |
2015 |
DBLP DOI BibTeX RDF |
|
22 | Fu-Hau Hsu, Li-Han Chen, Chia-Jun Lin |
Defeat scanning worms in cyber warfare. |
Secur. Commun. Networks |
2015 |
DBLP DOI BibTeX RDF |
|
22 | Philip Hodgers, Neil Hanley, Máire O'Neill |
Pre-processing power traces to defeat random clocking countermeasures. |
ISCAS |
2015 |
DBLP DOI BibTeX RDF |
|
22 | Luke Jones, Ryan Whelan, Jeremy Blackthorne, Graham Baker |
Flowtables: Program Skeletal Inversion for Defeat of Interprocedural Analysis with Unique Metamorphism. |
PPREW@ACSAC |
2015 |
DBLP DOI BibTeX RDF |
|
22 | Pedro Henriques Abreu, Daniel Castro Silva, João Portela, João Mendes-Moreira 0001, Luís Paulo Reis |
Using model-based collaborative filtering techniques to recommend the expected best strategy to defeat a simulated soccer opponent. |
Intell. Data Anal. |
2014 |
DBLP DOI BibTeX RDF |
|
22 | Elena Maceviciute |
Review of: Moon, David, Ruffini, Patrick and Segal, David (eds.) Hacking politics: how geeks, progressives, the Tea Party, gamers, anarchists and suits teamed up to defeat SOPA and save the internet. New York/London: OR Books, 2013. |
Inf. Res. |
2013 |
DBLP BibTeX RDF |
|
22 | J. Matias Kivikangas, Niklas Ravaja |
Emotional Responses to Victory and Defeat as a Function of Opponent. |
IEEE Trans. Affect. Comput. |
2013 |
DBLP DOI BibTeX RDF |
|
22 | Ruoting Yang, Bernie J. Daigle Jr., Seid Y. Muhie, Rasha Hammamieh, Marti Jett, Linda R. Petzold, Francis J. Doyle III |
Core modular blood and brain biomarkers in social defeat mouse model for post traumatic stress disorder. |
BMC Syst. Biol. |
2013 |
DBLP DOI BibTeX RDF |
|
22 | Christopher A. Ballinger, Sushil J. Louis |
Finding robust strategies to defeat specific opponents using case-injected coevolution. |
CIG |
2013 |
DBLP DOI BibTeX RDF |
|
22 | Seung-Hyun Kim, Daeseon Choi, Seung-Hun Jin, Sung-Hoon Lee |
Geo-location based QR-Code authentication scheme to defeat active real-time phishing attack. |
Digital Identity Management |
2013 |
DBLP DOI BibTeX RDF |
|
22 | Wentao Chang, Songqing Chen |
Defeat Information Leakage from Browser Extensions via Data Obfuscation. |
ICICS |
2013 |
DBLP DOI BibTeX RDF |
|
22 | Robert Daland, Kie Zuraw |
Does Korean defeat phonotactic word segmentation? |
ACL (2) |
2013 |
DBLP BibTeX RDF |
|
22 | Matthew Van Gundy, Hao Chen 0003 |
Noncespaces: Using randomization to defeat cross-site scripting attacks. |
Comput. Secur. |
2012 |
DBLP DOI BibTeX RDF |
|