共 24 条
[1]
Abdullah A.S.S., 2019, PERIODICALS ENG NATU, V7, P430
[2]
Aileni RM, 2020, EAI SPRINGER INNOVAT, P117, DOI 10.1007/978-3-030-19353-9_6
[3]
Alberry Hesham A., 2018, Future Computing and Informatics Journal, V3, P159, DOI 10.1016/j.fcij.2018.03.001
[4]
Alfifi Mona, INT J ADV COMPUTER S, V11, P2020, DOI [10.14569/IJACSA.2020.0110763, DOI 10.14569/IJACSA.2020.0110763]
[5]
[Anonymous], 2016, P IEEE C COMP VIS PA
[6]
Baker N., 2019, Workshop Report on Basic Research Needs for Scientific Machine Learning: Core Technologies for Artificial Intelligence
[7]
A Formal Analysis of 5G Authentication
[J].
PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18),
2018,
:1383-1396
[9]
Gupta S., 2020, VISUAL COMPUT, P1