Volume 16, Issue 7
Threat of Adversarial Attacks within Deep Learning: Survey
Article ID: e251122211280
Author(s): Ata-us-Samad and Roshni Singh*
DOI: 10.2174/2666255816666221125155715
UCDM: A User-Centric Data Model in Power Blockchain
Article ID: e120123212673
Author(s): ZhiXing Lv*, Hui Yu, Kai Kang, Teng Chang Li and Guo Li Du
DOI: 10.2174/2666255816666230112165555
An Exploratory Study on Code Smells during Code Review in OSS Projects: A Case Study on OpenStack and WikiMedia
Article ID: e220223213896
Author(s): Aziz Nanthaamornphong and Ekkarat Boonchieng*
DOI: 10.2174/2666255816666230222112313
DeepFake Detection with Remote Heart Rate Estimation Using 3D Central Difference Convolution Attention Network
Article ID: e010323214186
Author(s): Xiao Feng, Hua Ma* and Yijie Sun
DOI: 10.2174/2666255816666230301091725
Image Generation Method Based on Improved Generative Adversarial Network
Article ID: e300323215251
Author(s): Huanjun Zhang*
DOI: 10.2174/2666255816666230330153428
Review on Applicability and Utilization of Blockchain Technology in Ubiquitous Computing
Article ID: e210323214821
Author(s): Ramander Singh, Rajesh Kumar Tyagi*, Anil Kumar Mishra and Umakant Choudhury
DOI: 10.2174/2666255816666230321120653
PUPC-GANs: A Novel Image Conversion Model using Modified CycleGANs in Healthcare
Article ID: e300323215192
Author(s): Shweta Taneja*, Bhawna Suri, Aman Kumar, Ashish Chowdhry, Harsh Kumar and Kautuk Dwivedi
DOI: 10.2174/2666255816666230330100005
Selection of Digital Watermarking Techniques for Medical Image Security by Using the Fuzzy Analytical Hierarchy Process
Article ID: e020523216404
Author(s): Masood Ahmad*, Mohd Nadeem, Mohd Islam, Saquib Ali, Alka Agrawal and Raees Ahmad Khan
DOI: 10.2174/2666255816666230502100729