Abaimov, S., & Martellini, M. (2020). Cyber arms: Security in cyberspace. CRC Press, Taylor & Francis Group. |
|
6/10/20, 9:59 PM |
|
Abbass, H. A. (2019). Social integration of artificial intelligence: Functions, automation allocation logic and human-autonomy trust. Cognitive Computation, 11(2), 159–171. |
|
6/21/21, 11:26 AM |
|
Abbass, H. A., Scholz, J., & Reid, D. J. (2018). Foundations of trusted autonomy. Springer International Publishing. |
|
6/12/20, 12:04 PM |
|
Abbeel, P., Coates, A., Quigley, M., & Ng, A. (2006). An application of reinforcement learning to aerobatic helicopter flight. Advances in Neural Information Processing Systems, 19. |
|
2/19/24, 3:11 PM |
|
Abdel-Basset, M., Gamal, A., Moustafa, N., Abdel-Monem, A., & El-Saber, N. (2021). A security-by-design decision-making model for risk management in autonomous vehicles. IEEE Access, 9, 107657–107679. |
|
6/14/23, 6:25 PM |
|
Abell, T. (2020). Artificial intelligence ethics and debates. North Star Editions. |
|
6/10/20, 5:04 PM |
|
Aberdeen, D., Thi'ebaux, S., Zhang, L., & others. 2004, Decision-theoretic military operations planning.. Paper presented at ICAPS. |
|
6/30/20, 9:40 AM |
|
Abiteboul, S., Dowek, G., & Nelson, K. R. (2020). The age of algorithms. Cambridge University Press. |
|
6/11/20, 3:03 AM |
|
Acton, J. M. (2018). Escalation through entanglement: How the vulnerability of command-and-control systems raises the risks of an inadvertent nuclear war. International Security, 43(1), 56–99. |
|
11/23/21, 1:56 PM |
|
Adadi, A., & Berrada, M. (2018). Peeking inside the black-box: A survey on explainable artificial intelligence (xai). IEEE Access, 6, 52138–52160. |
|
6/29/20, 4:09 PM |
|
Addo, A., Centhala, S., & Shanmugam, M. (2020). Artificial intelligence design and solution for risk and security. Business Expert Press. |
|
6/10/20, 4:56 PM |
|
Agadakos, I., Agadakos, N., Polakis, J., & Amer, M. R. 2020, Chameleons' oblivion: Complex-valued deep neural networks for protocol-agnostic rf device fingerprinting. Paper presented at 2020 IEEE European Symposium on Security and Privacy (EuroS&P). |
|
10/4/21, 4:22 PM |
|
Agarwal, R. K. (2018). Advances in some hypersonic vehicles technologies. IntechOpen. |
|
6/11/20, 1:36 AM |
|
Agency, D. I. (2019). Challenges to security in space. Independently Published. |
|
6/22/20, 1:16 PM |
|
Aggarwal, A., Chauhan, A., Kumar, D., Mittal, M., & Verma, S. (2020). Classification of fake news by fine-tuning deep bidirectional transformers based language model. EAI Endorsed Transactions on Scalable Information Systems Online First; EAI: Ghent, Belgium. |
|
10/28/20, 1:54 PM |
|
Aghajan, H., Augusto, J. C., & Delgado, R. L. C. (2009). Human-centric interfaces for ambient intelligence. Elsevier Science. |
|
6/11/20, 2:47 AM |
|
Ahirwar, K. (2019). Generative adversarial networks projects: Build next-generation generative models using tensorflow and keras. Packt Publishing. |
|
6/24/20, 2:50 PM |
|
Ahlqvist, C. O., & Ahlgren, M. 2022. Analog computer prototyping for the future. |
|
5/18/23, 8:54 PM |
|
Ahmed, S., & Bajema, N. 2019. Artificial intelligence, china, russia, and the global order Technological, political, global, and creative perspectives. Air University Press. 158566295X. |
|
7/1/20, 12:25 PM |
|
Ahmet, C. (2018). Artificial intelligence: How advance machine learning will shape the future of our world. |
|
6/10/20, 4:33 PM |
|