Search Constraints
« Previous |
1 - 10 of 394
|
Next »
Search Results
Select an image to start the slideshow
Logic For Exploit Detection: Utilizing Proof Search for Exploitability Detection in Compact Software Systems
1 of 10
A Deep Semantic Segmentation Framework for Digitizing Paper Electrocardiograms with Data Augmentation using a Diffusion Model
2 of 10
Building Infrastructure Support for Organizational Security: An Approach to Network Monitoring, Threat Detection, and Incident Response
3 of 10
Mobile Paralinguistic Health Assessment from Speech: Energy-Efficient and Privacy-Preserving Neural Network Models
4 of 10
Creating Signed Language Resources to Increase Access and Representation of the Deaf Community and Advance Sign Language-Centered Research
5 of 10
Modeling User Behaviors in Online Systems and Ubiquitous Devices
6 of 10
A Foundation for Orchestrating Multiple Security Environments in Endpoint Systems
7 of 10
Pressure Injury Stage Image Classification using Cross-Shaped Window Attention Vision Transformers
8 of 10
Evaluating the Influence of Surprise and Suppression Techniques in Map Visualizations
9 of 10
Regular Session Types
10 of 10