Digital Library
Vol. 17, No. 6, June 30, 2023
[Regular Papers]
Artificial Intelligence & Big Data
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Motor gearbox
- Operating sound
- Mel-spectrogram
- Anomaly Detection
- Normalizing Flow
- Hierarchical feature extraction
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Kubernetes
- Cloud Data Preprocessing
- Artificial Intelligence for IT operations
- Resource Prediction
- Microservice
IoT & Application
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- cypher text policy attribute-based encryption
- Block Chain
- IoT application
- DAC
- security enhancement and AOA
Multimedia & Computer Vision
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- multi-target tracking
- sensor scanning
- sampling time diversity
- random finite set
- Poisson multi-Bernoulli mixture
Security & Privacy
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Cyber Security
- Malicious Attacks
- Cyber-Physical Systems
- banking sector
- Hierarchical network feature extraction
- Wrapper stepwise ResNet
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Quantum Computing
- quantum discriminator
- quantum machine learning
- quantum steganalysis
- quantum steganography
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Vulnerability Detection
- XSS(cross-site scripting) vulnerability
- Static Analysis
- Dynamic Testing
- Webpage attack simulation
Wireless Communication
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Intrusion Detection System
- Under-Water Sensor Networks
- Energy-Efficient Standalone Intrusion Detection System
- Wireless Sensor Network.
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Archives