The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for exploit with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1960-1982 (20) 1983-1986 (20) 1987 (21) 1988 (19) 1989 (30) 1990 (42) 1991 (35) 1992 (33) 1993 (40) 1994 (64) 1995 (81) 1996 (131) 1997 (144) 1998 (109) 1999 (192) 2000 (289) 2001 (330) 2002 (463) 2003 (530) 2004 (780) 2005 (913) 2006 (1053) 2007 (1205) 2008 (1298) 2009 (808) 2010 (178) 2011 (27) 2012 (32) 2013 (33) 2014 (44) 2015 (48) 2016 (55) 2017 (47) 2018 (65) 2019 (77) 2020 (82) 2021 (64) 2022 (60) 2023 (86) 2024 (10)
Publication types (Num. hits)
article(2005) book(2) incollection(29) inproceedings(7505) phdthesis(17)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 9948 occurrences of 4956 keywords

Results
Found 9558 publication records. Showing 9558 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
49XiaoFeng Wang 0001, Zhuowei Li 0001, Jong Youl Choi, Jun Xu 0003, Michael K. Reiter, Chongkyung Kil Fast and Black-box Exploit Detection and Signature Generation for Commodity Software. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF black-box defense, exploit detection, vaccine injection, worm, signature generation
49David Brumley, Pongsin Poosankam, Dawn Xiaodong Song, Jiang Zheng 0002 Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications. Search on Bibsonomy SP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF exploit generation, combined execution, symbolic execution, test case generation, patch
49XiaoFeng Wang 0001, Zhuowei Li 0001, Jun Xu 0003, Michael K. Reiter, Chongkyung Kil, Jong Youl Choi Packet vaccine: black-box exploit detection and signature generation. Search on Bibsonomy CCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF black-box defense, exploit detection, vaccine injection, worm, signature generation
46Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Purushothaman Iyer Analyzing network traffic to detect self-decrypting exploit code. Search on Bibsonomy AsiaCCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF exploit code, static analysis, emulation, detection, polymorphic, decryption
46Alex McMahon, Dan Scott 0002, William N. L. Browne An autonomous explore/exploit strategy. Search on Bibsonomy GECCO Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF explore/exploit strategy, learning classifier systems, genetics-based machine learning
35Mohammad M. Masud 0001, Latifur Khan, Bhavani Thuraisingham, Xinran Wang, Peng Liu 0005, Sencun Zhu Detecting Remote Exploits Using Data Mining. (PDF / PS) Search on Bibsonomy IFIP Int. Conf. Digital Forensics The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Server attacks, exploit code, data mining, attack detection
35Vinod Ganapathy, Sanjit A. Seshia, Somesh Jha, Thomas W. Reps, Randal E. Bryant Automatic discovery of API-level exploits. Search on Bibsonomy ICSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF API-level exploit, bounded model checking
35Paul Ammann, Duminda Wijesekera, Saket Kaushik Scalable, graph-based network vulnerability analysis. Search on Bibsonomy CCS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF monotonic analysis, model checking, scalability, network security, vulnerability, exploit
32Thomas Toth, Christopher Krügel Accurate Buffer Overflow Detection via Abstract Payload Execution. Search on Bibsonomy RAID The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Intrusion Detecion, Buffer Overflow Exploit, Network Security
29Zhehui Liu, Zhongru Wang, Yuntao Zhang, Tong Liu, Binxing Fang, Zhengyuan Pang Automated Crash Analysis and Exploit Generation with Extendable Exploit Model. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
29Clément Laverdet Relations publiques et Exploitation des RéSeaux sociaux NUMéRiques en gestion des Crises: quels Rôles de Facebook pour les gestionnaires FrançAIS, et comment Exploiter CE canal de FAçon pertinente ? (Communicate and Exploit Digital Social Networks in Crisis Management: What are the Facebook Capacities for French Managers, and How to Exploit this Medium in a Relevant Way ?). Search on Bibsonomy 2021   RDF
29Fadi Yilmaz, Meera Sridhar, Wontae Choi Guide Me to Exploit: Assisted ROP Exploit Generation for ActionScript Virtual Machine. Search on Bibsonomy ACSAC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
29Murat Yilmaz Contracting with a naïve time-inconsistent agent: To exploit or not to exploit? Search on Bibsonomy Math. Soc. Sci. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
29Chao Yang, Tao Zheng, Zhitian Lin A-R Exploit: An Automatic ROP Exploit Based on Long Sequence. Search on Bibsonomy SERE (Companion) The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
29Vadim Kotov, Fabio Massacci Anatomy of Exploit Kits - Preliminary Analysis of Exploit Kits as Software Artefacts. Search on Bibsonomy ESSoS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
28Amontip Jumratjaroenvanit, Yunyong Teng-Amnuay Probability of Attack Based on System Vulnerability Life Cycle. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Zero-day attack, Exploit code, Risk window, Radar chart, Vulnerability, Exploits, Life cycle, Exposure, POA
28Daewon Kim, Yangseo Choi, Ikkyun Kim, Jintae Oh, Jongsoo Jang Function Call Mechanism Based Executable Code Detection for the Network Security. Search on Bibsonomy SAINT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF shellcode, security, network, exploit
28Ramkumar Chinchani, Eric van den Berg A Fast Static Analysis Approach to Detect Exploit Code Inside Network Flows. Search on Bibsonomy RAID The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
25Yang Yu, Hariharan Kolam, Lap-Chung Lam, Tzi-cker Chiueh Applications of a feather-weight virtual machine. Search on Bibsonomy VEE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF binary server, browser exploit, information theft, virtual machine, web crawler
25Mustapha Refai Exploiting a buffer overflow using metasploit framework. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF metasploit, framework, buffer overflow, exploit, buffer overrun
25Iván Arce The Kernel Craze. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF kernel bugs, kernel security, exploit code, vulnerabilities
25Richard Lippmann, Seth E. Webster, Douglas Stetson The Effect of Identifying Vulnerabilities and Patching Software on the Utility of Network Intrusion Detection. Search on Bibsonomy RAID The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Internet, network, Intrusion detection, DoS, attack, signature, worm, scan, vulnerability, probe, patch, exploit, false alarm
25Christophe Baraer, Kaustubh S. Phanse, Johan Nykvist, Luka Birsa ExPLoIT: Exploiting Past Location Information and Transitivity for positioning in mobile sensor networks. Search on Bibsonomy COMSWARE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
25Daniele Paolo Scarpazza, Praveen Raghavan, David Novo, Francky Catthoor, Diederik Verkest Software Simultaneous Multi-Threading, a Technique to Exploit Task-Level Parallelism to Improve Instruction- and Data-Level Parallelism. Search on Bibsonomy PATMOS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
25Zhiyuan Zhang, Yao Zhao A New Transform with Extended Product to Exploit Different Scale Redundance. Search on Bibsonomy ICICIC (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
25Sabyasachi Saha, Sandip Sen Aggressive Pricing to Exploit Market Niches in Supply Chains. Search on Bibsonomy IEEE Intell. Syst. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF pricing and scheduling strategies, wealth maximization, market niche, software agents, supply chain management
22Ariel Futoransky, Fernando Miranda, José Ignacio Orlicki, Carlos Sarraute Simulating cyber-attacks for fun and profit. Search on Bibsonomy SimuTools The full citation details ... 2009 DBLP  DOI  BibTeX  RDF 0-day, network security, training, network simulation, vulnerability, exploit, penetration test, cyber-attack
22Luis Campo-Giralte, Ricardo Jiménez-Peris, Marta Patiño-Martínez PolyVaccine: Protecting Web Servers against Zero-Day, Polymorphic and Metamorphic Exploits. Search on Bibsonomy SRDS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF polymorphic malware, metamorphic malware, zero-day malware, web server, vulnerability, exploit
22Leevar Williams, Richard Lippmann, Kyle Ingols GARNET: A Graphical Attack Graph and Reachability Network Evaluation Tool. Search on Bibsonomy VizSEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF attack path, visualization, network, recommendation, vulnerability, treemap, security metrics, attack graph, exploit, adversary model
22Scott O'Hare, Steven Noel, Kenneth Prole A Graph-Theoretic Visualization Approach to Network Risk Analysis. Search on Bibsonomy VizSEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF exploit analysis, visualization, network security, situational awareness, attack graph, vulnerability assessment
22Melanie Tupper, Nur Zincir-Heywood VEA-bility Security Metric: A Network Security Analysis Tool. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF network security, Attackability, Vulnerability, security metric, attack graphs, exploit, Exploitability, quantitative measure
22Joseph Pamula, Sushil Jajodia, Paul Ammann, Vipin Swarup A weakest-adversary security metric for network configuration security analysis. Search on Bibsonomy QoP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF network security, vulnerability, security metric, attack graphs, exploit, quantitative measure
22Joseph Pamula, Paul Ammann, Sushil Jajodia, Ronald W. Ritchey A framework for establishing, assessing, and managing trust in inter-organizational relationships. Search on Bibsonomy SWS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF access graphs, network sharing, scalability, network security, vulnerability, attack graphs, exploit
22Misha Zitser, Richard Lippmann, Tim Leek Testing static analysis tools using exploitable buffer overflows from open source code. Search on Bibsonomy SIGSOFT FSE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF test detection, security, evaluation, static analysis, source code, buffer overflow, exploit, false alarm
21Omer Khan, Sandip Kundu A model to exploit power-performance efficiency in superscalar processors via structure resizing. Search on Bibsonomy ACM Great Lakes Symposium on VLSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF modeling, power
21Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu 0005 STILL: Exploit Code Detection via Static Taint and Initialization Analyses. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21Woo-Cheol Kwon, Sungjoo Yoo, Sung-Min Hong, Byeong Min, Kyu-Myung Choi, Soo-Kwan Eo A practical approach of memory access parallelization to exploit multiple off-chip DDR memories. Search on Bibsonomy DAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF parallelization, memory, arbitration
21Ashish Deshpande, Jonathan E. Luntz A method to characterize and exploit actuation redundancy in mobility and manipulation. Search on Bibsonomy IROS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
21Venkat Pothamsetty, Prabhaker Mateti A case for exploit-robust and attack-aware protocol RFCs. Search on Bibsonomy IPDPS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
21Yabo Li, Xiang-Gen Xia 0001, Genyuan Wang Simple iterative methods to exploit the signal-space diversity. Search on Bibsonomy IEEE Trans. Commun. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21Jingyu Zhou, Giovanni Vigna Detecting Attacks That Exploit Application-Logic Errors Through Application-Level Auditing. Search on Bibsonomy ACSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
21Steven Noel, Sushil Jajodia, Brian O'Berry, Michael Jacobs 0001 Efficient Minimum-Cost Network Hardening Via Exploit Dependency Graphs. Search on Bibsonomy ACSAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
18Hilmi Günes Kayacik, Nur Zincir-Heywood, Malcolm I. Heywood, Stefan Burschka Testing Detector Parameterization Using Evolutionary Exploit Generation. Search on Bibsonomy EvoWorkshops The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
18Pedro M. Q. Aguiar, João M. F. Xavier, Marko Stosic Globally optimal solution to exploit rigidity when recovering structure from motion under occlusion. Search on Bibsonomy ICIP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu 0005 Protecting web services from remote exploit code: a static analysis approach. Search on Bibsonomy WWW The full citation details ... 2008 DBLP  DOI  BibTeX  RDF static analysis, http, code injection attack
18Carlos Morra, João Bispo, João M. P. Cardoso, Jürgen Becker 0001 Combining Rewriting-Logic, Architecture Generation, and Simulation to Exploit Coarse-Grained Reconfigurable Architectures. Search on Bibsonomy FCCM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18Fan Ding, Bin Wang 0004 An Axiomatic Approach to Exploit Term Dependencies in Language Model. Search on Bibsonomy AIRS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Language Model, Term Dependency, Axiomatic Approach, Retrieval Heuristics
18Maristella Agosti, Tullio Coppotelli, Nicola Ferro 0001, Luca Pretto An Approach for the Construction of an Experimental Test Collection to Evaluate Search Systems that Exploit Annotations. Search on Bibsonomy DELOS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Kejing Liu, Javier Garcia-Frías Hidden Markov Models as Self-Organizing Maps to Exploit Time Dependencies in Data Clustering. Search on Bibsonomy CISS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Taehee Lee 0001, Junho Shim, Hyunja Lee, Sang-goo Lee A Pragmatic Approach to Model and Exploit the Semantics of Product Information. Search on Bibsonomy J. Data Semantics The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
18Lixin Shi, Jian-Yun Nie Filtering or adapting: two strategies to exploit noisy parallel corpora for cross-language information retrieval. Search on Bibsonomy CIKM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF alignment score, parallel corpus, noise filtering
18Prashant Jain, Andrew Laffely, Wayne P. Burleson, Russell Tessier, Dennis Goeckel Dynamically Parameterized Algorithms and Architectures to Exploit Signal Variations. Search on Bibsonomy J. VLSI Signal Process. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF VLSI, motion estimation, digital signal processing, MPEG, power-aware
18Franco Frattolillo A PVM Extension to Exploit Cluster Grids. Search on Bibsonomy PVM/MPI The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
18Jike Cui, Mansur H. Samadzadeh A new hybrid approach to exploit localities: LRFU with adaptive prefetching. Search on Bibsonomy SIGMETRICS Perform. Evaluation Rev. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
18Per Stenström One Chip, One Server: How Do We Exploit Its Power? Search on Bibsonomy HiPC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
18Stavroula Zoi, Dimitrios Loukatos, Lambros Sarakis, Panagiotis Stathopoulos, Nikolas Mitrou Extending an Open MPEG-4 Video Streaming Platform to Exploit a Differentiated Services Network. Search on Bibsonomy HSNMC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
18Kaushal R. Gandhi, Nihar R. Mahapatra A Study of Hardware Techniques That Dynamically Exploit Frequent Operands to Reduce Power Consumption in Integer Function Units. Search on Bibsonomy ICCD The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
18Narasimhan Ramasubramanian, Ram Subramanian, Santosh Pande Automatic Compilation of Loops to Exploit Operator Parallelism on Configurable Arithmetic Logic Units. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF operator parallelism, FPGAs, parallel computing, Compilers, loop transformation, reconfigurable systems
18Petko Faber, Bob Fisher How can we exploit typical architectural structures to improve model recovery? Search on Bibsonomy 3DPVT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
18Yong Yan 0003, Xiaodong Zhang 0001, Zhao Zhang 0010 Cacheminer: A Runtime Approach to Exploit Cache Locality on SMP. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF symmetric multiprocessors (SMP) and task scheduling, simulation, runtime systems, nested loops, Cache locality
18Narasimhan Ramasubramanian, Ram Subramanian, Santosh Pande Automatic Analysis of Loops to Exploit Operator Parallelism on Reconfigurable Systems. Search on Bibsonomy LCPC The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
15Sara Saponaro, Francesca Lizzi, Giacomo Serra, Francesca Mainas, Piernicola Oliva, Alessia Giuliano, Sara Calderoni, Alessandra Retico Deep learning based joint fusion approach to exploit anatomical and functional brain information in autism spectrum disorders. Search on Bibsonomy Brain Informatics The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Subhalakshmi Gooptu, Shiv Issar Book Reviews: Worn Out: How Retailers Surveil and Exploit Workers in the Digital Age and How Workers Are Fighting Back Madison Van Oort. Search on Bibsonomy New Media Soc. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Juncheng Zhang, Qingmin Liao, Haoyu Ma, Jing-Hao Xue, Wenming Yang, Shaojun Liu Exploit the Best of Both End-to-End and Map-Based Methods for Multi-Focus Image Fusion. Search on Bibsonomy IEEE Trans. Multim. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Lilin Xu, Chaojie Gu, Rui Tan 0001, Shibo He, Jiming Chen MESEN: Exploit Multimodal Data to Design Unimodal Human Activity Recognition with Few Labels. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Cheng Qian, Shihao Liang, Yujia Qin, Yining Ye, Xin Cong, Yankai Lin, Yesai Wu, Zhiyuan Liu 0001, Maosong Sun 0001 Investigate-Consolidate-Exploit: A General Strategy for Inter-Task Agent Self-Evolution. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Siwei Liu 0012, Ke Ma, Stephan M. Goetz A Robbins-Monro Sequence That Can Exploit Prior Information For Faster Convergence. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Dandan Xu, Kai Chen 0012, Miaoqian Lin, Chaoyang Lin, Xiaofeng Wang AutoPwn: Artifact-Assisted Heap Exploit Generation for CTF PWN Competitions. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Simona Bottani, Elina Thibeau-Sutre, Aurélien Maire, Sebastian Ströer, Didier Dormont, Olivier Colliot, Ninon Burgos Contrast-enhanced to non-contrast-enhanced image translation to exploit a clinical data warehouse of T1-weighted brain MRI. Search on Bibsonomy BMC Medical Imaging The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Yichi Zhang, Zhihao Duan, Ming Lu, Dandan Ding, Fengqing Zhu 0001, Zhan Ma Another Way to the Top: Exploit Contextual Clustering in Learned Image Coding. Search on Bibsonomy AAAI The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Matteo Castiglioni, Alberto Latino, Alberto Marchesi 0001, Giulia Romano, Nicola Gatti 0001, Chokha Palayamkottai Finding Effective Ad Allocations: How to Exploit User History. Search on Bibsonomy AAMAS The full citation details ... 2024 DBLP  BibTeX  RDF
15Xingran Chen, Hesam Nikpey, Jungyeol Kim, Saswati Sarkar, Shirin Saeedi Bidokhti Containing a spread through sequential learning: to exploit or to explore? Search on Bibsonomy Trans. Mach. Learn. Res. The full citation details ... 2023 DBLP  BibTeX  RDF
15Marta Catillo, Umberto Villano, Massimiliano Rak A survey on auto-scaling: how to exploit cloud elasticity. Search on Bibsonomy Int. J. Grid Util. Comput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Nikhil Iyer, V. Thejas, Nipun Kwatra, Ramachandran Ramjee, Muthian Sivathanu Wide-minima Density Hypothesis and the Explore-Exploit Learning Rate Schedule. Search on Bibsonomy J. Mach. Learn. Res. The full citation details ... 2023 DBLP  BibTeX  RDF
15Mohammadreza Mohades Kasaei, Miguel Abreu, Nuno Lau, Artur Pereira, Luís Paulo Reis, Zhibin Li 0001 Learning hybrid locomotion skills - Learn to exploit residual actions and modulate model-based gait control. Search on Bibsonomy Frontiers Robotics AI The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Mengxin Yu, Aimin Tang, Xudong Wang 0001, Jinnan Liu FDOE: Exploit Concurrent Communication Opportunities in Full-Duplex Wireless Mesh Networks. Search on Bibsonomy IEEE Trans. Mob. Comput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Lennert Van der Schraelen, Kristof Stouthuysen, Seppe K. L. M. vanden Broucke, Tim Verdonck Regularization oversampling for classification tasks: To exploit what you do not know. Search on Bibsonomy Inf. Sci. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Hao Tian, Hong Zhang, Juncheng Jia, Mianxiong Dong, Kaoru Ota FedBroadcast: Exploit Broadcast Channel for Fast Convergence in Wireless Federated Learning. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Ronen Shaltiel Is it possible to improve Yao's XOR lemma using reductions that exploit the efficiency of their oracle? Search on Bibsonomy Comput. Complex. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Guifang Duan, Yunkun Xu, Zhenyu Liu 0005, Jianrong Tan Hand-in-Hand Guidance: An Explore-Exploit Based Reinforcement Learning Method for Performance Driven Assembly-Adjustment. Search on Bibsonomy IEEE Trans. Ind. Informatics The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Vincent Werner, Laurent Maingault, Marie-Laure Potet An end-to-end approach to identify and exploit multi-fault injection vulnerabilities on microcontrollers. Search on Bibsonomy J. Cryptogr. Eng. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Hayley Hung How AI can Exploit Body Language to Understand Social Behaviour in the Wild. Search on Bibsonomy ERCIM News The full citation details ... 2023 DBLP  BibTeX  RDF
15Noah L. Schrick, Peter J. Hawrylak State Space Explosion Mitigation for Large-Scale Attack and Compliance Graphs Using Synchronous Exploit Firing. Search on Bibsonomy IEEE Open J. Comput. Soc. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Yu Wang, Yipeng Zhang, Zhoujun Li 0001 AAHEG: Automatic Advanced Heap Exploit Generation Based on Abstract Syntax Tree. Search on Bibsonomy Symmetry The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Scott Cheng-Hsin Yang, Chirag Rank, Jake Alden Whritner, Olfa Nasraoui, Patrick Shafto Human Variability and the Explore-Exploit Trade-Off in Recommendation. Search on Bibsonomy Cogn. Sci. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Elena Fedorchenko, Evgenia Novikova, Andrey Fedorchenko, Sergey Verevkin An Analytical Review of the Source Code Models for Exploit Analysis. Search on Bibsonomy Inf. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Iñigo Flores Ituarte, Suraj Panicker, Hari P. N. Nagarajan, Eric Coatanéa, David W. Rosen Optimisation-driven design to explore and exploit the process-structure-property-performance linkages in digital manufacturing. Search on Bibsonomy J. Intell. Manuf. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15David M. Bossens, Nicholas Bishop Explicit Explore, Exploit, or Escape (E4): near-optimal safety-constrained reinforcement learning in polynomial time. Search on Bibsonomy Mach. Learn. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Debojyoti Biswas, Andrew G. Lamperski, Yu Yang, Kathleen Hoffman, John Guckenheimer, Eric S. Fortune, Noah J. Cowan Mode switching in organisms for solving explore-versus-exploit problems. Search on Bibsonomy Nat. Mac. Intell. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Sahibzada Adil Shahzad, Ammarah Hashmi, Yan-Tsung Peng, Yu Tsao 0001, Hsin-Min Wang AV-Lip-Sync+: Leveraging AV-HuBERT to Exploit Multimodal Inconsistency for Video Deepfake Detection. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Tong Wang 0036, Shuichi Kurabayashi Adaptive Multi-NeRF: Exploit Efficient Parallelism in Adaptive Multiple Scale Neural Radiance Field Rendering. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Michael Rodler, David Paaßen, Wenting Li, Lukas Bernhard, Thorsten Holz, Ghassan Karame, Lucas Davi EF/CF: High Performance Smart Contract Fuzzing for Exploit Generation. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Jiren Mai, Fei Zhang, Junjie Ye, Marcus Kalander, Xian Zhang, Wankou Yang, Tongliang Liu, Bo Han 0003 Exploit CAM by itself: Complementary Learning System for Weakly Supervised Semantic Segmentation. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Ke Xu, Jiangtao Wang 0001, Hongyuan Zhu, Dingchang Zheng Exploit the antenna response consistency to define the alignment criteria for CSI data. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Jay Jacobs, Sasha Romanosky, Octavian Suciuo, Benjamin Edwards, Armin Sarabi Enhancing Vulnerability Prioritization: Data-Driven Exploit Predictions with Community-Driven Insights. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Yimeng Chen, Tianyang Hu, Fengwei Zhou, Zhenguo Li, Zhiming Ma Explore and Exploit the Diverse Knowledge in Model Zoo for Domain Generalization. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Andrea Apicella 0001, Luca Di Lorenzo, Francesco Isgrò, Andrea Pollastro, Roberto Prevete Strategies to exploit XAI to improve classification systems. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Tanujay Saha, Tamjid Al Rahat, Najwa Aaraj, Yuan Tian 0001, Niraj K. Jha ML-FEED: Machine Learning Framework for Efficient Exploit Detection (Extended version). Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Bharath Muppasani, Vishal Pallagani, Biplav Srivastava, Raghava Mutharaju, Michael N. Huhns, Vignesh Narayanan A Planning Ontology to Represent and Exploit Planning Knowledge for Performance Efficiency. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Francesco Bacchiocchi, Matteo Castiglioni, Alberto Marchesi 0001, Nicola Gatti 0001 Learning Optimal Contracts: How to Exploit Small Action Spaces. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 9558 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license