Abstract: Trust management has been widely employed to determine a user’s trustworthiness based on evaluations from other entities, and trustless users are those with low trustworthiness due to ...
Abstract: Recent research has demonstrated that recommendation systems exhibit vulnerability under data poisoning attacks. The primary process of data poisoning attacks involves generating malicious ...
Zonotopes and their generalizations are set representations widely used for reachability analysis. A major advantage of these set representations when compared to alternatives such as halfspace ...
A team of national laboratory researchers recently released version 1.0 of the Marine Hydrokinetic Toolkit (MHKiT)?a free, publicly available software tool used to process, analyze, ...
一些您可能无法访问的结果已被隐去。
显示无法访问的结果