AI Bibliography

List Resources

Displaying 1 - 20 of 82
Parameters
Order by:

Ascending
Descending
Use all checked: 
Use all displayed: 
Use all in list: 
Aggarwal, A., Chauhan, A., Kumar, D., Mittal, M., & Verma, S. (2020). Classification of fake news by fine-tuning deep bidirectional transformers based language model. EAI Endorsed Transactions on Scalable Information Systems Online First; EAI: Ghent, Belgium.  
28/10/2020, 13:54
Baonan, W., Feng, H., Huanguo, Z., & Chao, W. (2019). From evolutionary cryptography to quantum artificial intelligent cryptography. Journal of Computer Research and Development, 56(10), 2112.  
12/07/2021, 09:45
Bertino, E., Calo, S., Toma, M., Verma, D., Williams, C., & Rivera, B. 2017, A cognitive policy framework for next-generation distributed federated systems: Concepts and research directions. Paper presented at 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).  
12/06/2023, 18:16
Blasch, E., Schuck, T., & Gagne, O. B. (2021). Trusted entropy-based information maneuverability for ai information systems engineering. In Engineering Artificially Intelligent Systems (pp. 34–52). Springer.  
21/07/2022, 10:16
Booker, C. M. (2013). First-strike advantage: The united states' counter to china's preemptive integrated network electronic warfare strategy AIR UNIV MAXWELL AFB AL SCHOOL OF ADVANCED AIR AND SPACE STUDIES.  
17/08/2021, 10:12
Carlin, J. P., & Graff, G. M. (2019). Dawn of the code war: America's battle against russia, china, and the rising global cyber threat. PublicAffairs.  
25/06/2020, 10:16
DC, J. C. O. S. W. (2012). Joint electromagnetic spectrum management operations. Joint Publication.  
20/10/2023, 20:27
Deng, S., Zhao, H., Fang, W., Yin, J., Dustdar, S., & Zomaya, A. Y. (2020). Edge intelligence: The confluence of edge computing and artificial intelligence. IEEE Internet of Things Journal.  
12/08/2020, 09:34
Devlin, J., Chang, M.-W., Lee, K., & Toutanova, K. (2018). Bert: Pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805.  
28/10/2020, 16:47
Dulhanty, C., Deglint, J. L., Daya, I. B., & Wong, A. (2019). Taking a stance on fake news: Towards automatic disinformation assessment via deep bidirectional transformer language models for stance detection. arXiv preprint arXiv:1911.11951.  
28/10/2020, 16:50
Elhefnawy, N. (2021). 'a sixth generation fighter?' an update. An Update (May 4, 2021).  
18/05/2021, 15:31
Elonheimo, T. (2021). Comprehensive security approach in response to russian hybrid warfare. Strategic Studies Quarterly, 15(3).  
21/09/2021, 14:27
Fenstermacher, L., Perez, M., Larson, K., & Rice, K. 2021, A playbook for characterization of multi-domain information. Paper presented at Signal Processing, Sensor/Information Fusion, and Target Recognition XXX.  
15/09/2021, 13:49
Ferreira, P. V. R., Paffenroth, R., Wyglinski, A. M., Hackett, T. M., Bilen, S. G., & Reinhart, R. C., et al.. (2018). Multiobjective reinforcement learning for cognitive satellite communications using deep neural network ensembles. IEEE Journal on Selected Areas in Communications, 36(5), 1030–1041.  
26/04/2021, 09:21
Fugate, S., & Ferguson-Walter, K. (2019). Artificial intelligence and game theory models for defending critical networks with cyber deception. AI Magazine, 40(1), 49–62.  
28/10/2020, 13:50
Gadepally, V. N., Hancock, B. J., Greenfield, K. B., Campbell, J. P., Campbell, W. M., & Reuther, A. I. (2016). Recommender systems for the department of defense and intelligence community. Lincoln Laboratory Journal, 22(1), 74–89.  
11/12/2022, 13:33
Gia, T. N., Nawaz, A., Querata, J. P. N., Tenhunen, H., & Westerlund, T. 2019, Artificial intelligence at the edge in the blockchain of things. Paper presented at International Conference on Wireless Mobile Communication and Healthcare.  
12/08/2020, 09:42
Graber, M. M. (2021). Using artificial intelligence and machine learning to tackle big data. ISR Research Task Force - ACSC.  
07/12/2021, 15:27
Grooms, G. B. (2019). Artificial intelligence applications for automated battle management aids in future military endeavors Naval Postgraduate School Monterey United States.  
04/11/2020, 10:23
Gu, T., Dolan-Gavitt, B., & Garg, S. (2017). Badnets: Identifying vulnerabilities in the machine learning model supply chain. arXiv preprint arXiv:1708.06733.  
18/11/2020, 11:34
1 - 20  |  21 - 40  |  41 - 60  |  61 - 80  |  81 - 82
WIKINDX 6.7.0 | Total resources: 1621 | Username: -- | Bibliography: WIKINDX Master Bibliography | Style: American Psychological Association (APA)