Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
×
Past month
  • Any time
  • Past hour
  • Past 24 hours
  • Past week
  • Past month
  • Past year
All results
Jun 1, 2024 · Interior methods are an omnipresent, conspicuous feature of the constrained optimization landscape today, but it was not always so. Primarily in the form of ...
May 14, 2024 · In this paper, we numerically study the secrecy performance of the free-space optical (FSO) system by considering different eavesdropping scenarios.
May 29, 2024 · ... attack-defense [TSW+24]. attacker [GHZS23, SS22]. Attacking [AKAFQ22]. AttackNet [KZFM24]. Attacks. [BRV+22, BBR20, CCO+20, HZG19, HZG20, KDBS22, KFS+22 ...
Missing: varying | Show results with:varying
In order to show you the most relevant results, we have omitted some entries very similar to the 3 already displayed. If you like, you can repeat the search with the omitted results included.