Threat actors are exploiting complex routing scenarios and misconfigured spoof protections to send spoofed phishing emails, ...
Abstract: Many multi-robot deployments, such as automated construction of buildings, distributed search, or cooperative mapping, often require agents to intelligently coordinate their trajectories and ...
Abstract: With the development of the brain-computer interface, it is possible to assess the image quality based on an electroencephalogram (EEG) signal, which is essential to construct a quality ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results