AI Bibliography

List Resources

Displaying 1 - 20 of 1610
Parameters
Order by:

Ascending
Descending
Use all checked: 
Use all displayed: 
Use all in list: 
Abaimov, S., & Martellini, M. (2020). Cyber arms: Security in cyberspace. CRC Press, Taylor & Francis Group.  
6/10/20, 9:59 PM
Abbass, H. A. (2019). Social integration of artificial intelligence: Functions, automation allocation logic and human-autonomy trust. Cognitive Computation, 11(2), 159–171.  
6/21/21, 11:26 AM
Abbass, H. A., Scholz, J., & Reid, D. J. (2018). Foundations of trusted autonomy. Springer International Publishing.  
6/12/20, 12:04 PM
Abbeel, P., Coates, A., Quigley, M., & Ng, A. (2006). An application of reinforcement learning to aerobatic helicopter flight. Advances in Neural Information Processing Systems, 19.  
2/19/24, 3:11 PM
Abdel-Basset, M., Gamal, A., Moustafa, N., Abdel-Monem, A., & El-Saber, N. (2021). A security-by-design decision-making model for risk management in autonomous vehicles. IEEE Access, 9, 107657–107679.  
6/14/23, 6:25 PM
Abderhalden, N. (2022). risk hindered decision making: how the dod’s faulty understanding of risk jeopardizes its strategy. The Strategy Bridge.  
5/29/22, 9:05 AM
Abell, T. (2020). Artificial intelligence ethics and debates. North Star Editions.  
6/10/20, 5:04 PM
Aberdeen, D., Thi'ebaux, S., Zhang, L., & others. 2004, Decision-theoretic military operations planning.. Paper presented at ICAPS.  
6/30/20, 9:40 AM
Abiteboul, S., Dowek, G., & Nelson, K. R. (2020). The age of algorithms. Cambridge University Press.  
6/11/20, 3:03 AM
Acton, J. M. (2018). Escalation through entanglement: How the vulnerability of command-and-control systems raises the risks of an inadvertent nuclear war. International Security, 43(1), 56–99.  
11/23/21, 1:56 PM
Adadi, A., & Berrada, M. (2018). Peeking inside the black-box: A survey on explainable artificial intelligence (xai). IEEE Access, 6, 52138–52160.  
6/29/20, 4:09 PM
Addo, A., Centhala, S., & Shanmugam, M. (2020). Artificial intelligence design and solution for risk and security. Business Expert Press.  
6/10/20, 4:56 PM
Agadakos, I., Agadakos, N., Polakis, J., & Amer, M. R. 2020, Chameleons' oblivion: Complex-valued deep neural networks for protocol-agnostic rf device fingerprinting. Paper presented at 2020 IEEE European Symposium on Security and Privacy (EuroS&P).  
10/4/21, 4:22 PM
Agarwal, R. K. (2018). Advances in some hypersonic vehicles technologies. IntechOpen.  
6/11/20, 1:36 AM
Agency, D. I. (2019). Challenges to security in space. Independently Published.  
6/22/20, 1:16 PM
Aggarwal, A., Chauhan, A., Kumar, D., Mittal, M., & Verma, S. (2020). Classification of fake news by fine-tuning deep bidirectional transformers based language model. EAI Endorsed Transactions on Scalable Information Systems Online First; EAI: Ghent, Belgium.  
10/28/20, 1:54 PM
Aghajan, H., Augusto, J. C., & Delgado, R. L. C. (2009). Human-centric interfaces for ambient intelligence. Elsevier Science.  
6/11/20, 2:47 AM
Ahirwar, K. (2019). Generative adversarial networks projects: Build next-generation generative models using tensorflow and keras. Packt Publishing.  
6/24/20, 2:50 PM
Ahlqvist, C. O., & Ahlgren, M. 2022. Analog computer prototyping for the future.  
5/18/23, 8:54 PM
Ahmed, S., & Bajema, N. 2019. Artificial intelligence, china, russia, and the global order Technological, political, global, and creative perspectives. Air University Press. 158566295X.  
7/1/20, 12:25 PM
1 - 20  |  21 - 40  |  41 - 60  |  61 - 80  |  81 - 100  |  101 - 120  |  121 - 140  |  141 - 160  |  161 - 180  |  181 - 200  |  . . .  |  End
WIKINDX 6.7.0 | Total resources: 1610 | Username: -- | Bibliography: WIKINDX Master Bibliography | Style: American Psychological Association (APA)