Volume 16, Issue 7
Threat of Adversarial Attacks within Deep Learning: Survey
Article ID: e251122211280
Author(s): Ata-us-Samad and Roshni Singh*
DOI: 10.2174/2666255816666221125155715
UCDM: A User-Centric Data Model in Power Blockchain
Article ID: e120123212673
Author(s): ZhiXing Lv*, Hui Yu, Kai Kang, Teng Chang Li and Guo Li Du
DOI: 10.2174/2666255816666230112165555
An Exploratory Study on Code Smells during Code Review in OSS Projects: A Case Study on OpenStack and WikiMedia
Article ID: e220223213896
Author(s): Aziz Nanthaamornphong and Ekkarat Boonchieng*
DOI: 10.2174/2666255816666230222112313