An efficient evolutionary deep learning-based attack prediction in supply chain management systems
Published 2023 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
An efficient evolutionary deep learning-based attack prediction in supply chain management systems
Authors
Keywords
-
Journal
COMPUTERS & ELECTRICAL ENGINEERING
Volume 109, Issue -, Pages 108768
Publisher
Elsevier BV
Online
2023-05-17
DOI
10.1016/j.compeleceng.2023.108768
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- Multiscale Feature Extraction and Fusion of Image and Text in VQA
- (2023) Siyu Lu et al. International Journal of Computational Intelligence Systems
- Deep Learning-based Smart Predictive Evaluation for Interactive Multimedia-enabled Smart Healthcare
- (2022) Zhihan Lv et al. ACM Transactions on Multimedia Computing Communications and Applications
- TBSM: A traffic burst-sensitive model for short-term prediction under special events
- (2022) Yilong Ren et al. KNOWLEDGE-BASED SYSTEMS
- Artificial intelligence based optimization with deep learning model for blockchain enabled intrusion detection in CPS environment
- (2022) Romany F. Mansour Scientific Reports
- Evolutionary-Based Deep Stacked Autoencoder for Intrusion Detection in a Cloud-Based Cyber-Physical System
- (2022) Mesfer Al Duhayyim et al. Applied Sciences-Basel
- Enhancing Physical-Layer Security for IoT With Nonorthogonal Multiple Access Assisted Semi-Grant-Free Transmission
- (2022) Kunrui Cao et al. IEEE Internet of Things Journal
- Unified Spatial-Temporal Neighbor Attention Network for Dynamic Traffic Prediction
- (2022) Wangchen Long et al. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
- Achieving Reliable and Secure Communications in Wireless-Powered NOMA Systems
- (2021) Kunrui Cao et al. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
- Deep Learning-based Anomaly Detection in Cyber-physical Systems
- (2021) Yuan Luo et al. ACM COMPUTING SURVEYS
- A Utility-Aware General Framework With Quantifiable Privacy Preservation for Destination Prediction in LBSs
- (2021) Hongbo Jiang et al. IEEE-ACM TRANSACTIONS ON NETWORKING
- An intelligent cognitive computing based intrusion detection for industrial cyber-physical systems
- (2021) Maha M. Althobaiti et al. MEASUREMENT
- 3D Trajectory Optimization for Energy-Efficient UAV Communication: A Control Design Perspective
- (2021) Bin Li et al. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS
- A Structural Evolution-Based Anomaly Detection Method for Generalized Evolving Social Networks
- (2020) Huan Wang et al. COMPUTER JOURNAL
- DeepFed: Federated Deep Learning for Intrusion Detection in Industrial Cyber–Physical Systems
- (2020) Beibei Li et al. IEEE Transactions on Industrial Informatics
- Continuous Authentication Through Finger Gesture Interaction for Smart Homes Using WiFi
- (2020) Hao Kong et al. IEEE TRANSACTIONS ON MOBILE COMPUTING
- Data-Driven Feedforward Learning With Force Ripple Compensation for Wafer Stages: A Variable-Gain Robust Approach
- (2020) Fazhi Song et al. IEEE Transactions on Neural Networks and Learning Systems
- Evolving deep learning architectures for network intrusion detection using a double PSO metaheuristic
- (2019) Wisam Elmasry et al. Computer Networks
- An Indirect Eavesdropping Attack of Keystrokes on Touch Screen through Acoustic Sensing
- (2019) Jiadi Yu et al. IEEE TRANSACTIONS ON MOBILE COMPUTING
Become a Peeref-certified reviewer
The Peeref Institute provides free reviewer training that teaches the core competencies of the academic peer review process.
Get StartedAsk a Question. Answer a Question.
Quickly pose questions to the entire community. Debate answers and get clarity on the most important issues facing researchers.
Get Started