Publications
Found 1516 results
Counting defects in quantum computers with Graphics Processing Units. J. Comput. Phys. 366:320-326. (1.04 MB)
.
2018. Deep Learning with Dense Random Neural Network for Detecting Attacks against IoT-connected Home Environments. The 15th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2018) / The 13th International Conference on Future Networks and Communications (FNC-2018) / Affiliated Workshops.
.
2018. Deep learning with dense random neural networks for detecting attacks against IoT-connected home environments. 1st International Symposia on Computer and Information Sciences, ISCIS 2018.
.
2018. Defects in Quantum Computers. Sci. Rep. 8:4539. (1.63 MB)
.
2018. Distributed Data Privacy Preservation in IoT Applications. IEEE Wirel. Commun.. 25:68–76.
.
2018. Does surgical site infection after Caesarean section in Polish hospitals reflect high-quality patient care or poor postdischarge surveillance? Results from a 3-year multicenter study. American Journal of Infection Control. 46(1):20-25.
.
2018. Efficient computation of higher order cumulant tensors. SIAM J. SCI. COMPUT.. 40(3):A1610.
.
2018. Energy life-time of wireless nodes with network attacks and mitigation. 2018 IEEE International Conference on Communications Workshops, ICC Workshops 2018; Kansas City; United States.
.
2018. Energy Life-Time of Wireless Nodes with Network Attacks and Mitigation. 2018 IEEE International Conference on Communications Workshops, ICC Workshops 2018, Kansas City, MO, USA, May 20-24, 2018.
.
2018. Estimating historical hourly traffic volumes via machine learning and vehicle probe data: A Maryland case study. Transportation Research Part C: Emerging Technologies. 97
.
2018. European Cybersecurity Research and the SerIoT Project. Communications in Computer and Information Science . 935:166-173.
.
2018. Gauge invariant information concerning quantum channels. Quantum. 2:60.
.
2018. GHOST - Safe-Guarding Home IoT Environments with Personalised Real-Time Risk Control. Security in Computer and Information Sciences - First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papers.
.
2018. GPU Accelerated Non-integer Order PI^αD^β Controller Used as AQM Mechanism. Communications in Computer and Information Science. 860:286-299.
.
2018. The Influence of the Traffic Self-similarity on the Choice of the Non-integer Order PI^α Controller Parameters. Communications in Computer and Information Science. 935:76-83.
.
2018. Introducing higher order correlations to marginals' subset of multivariate data by means of Archimedean copulas. arXiv:1803.07813.
.
2018. IoT European Security and Privacy Projects: Integration, Architectures and Interoperability. Next Generation Internet of Things. Distributed Intelligence at the Edge and Human Machine-to-Machine Cooperation.
.
2018. KONFIDO: An OpenNCP-Based Secure eHealth Data Exchange System. 1st International Symposia on Computer and Information Sciences, ISCIS 2018.
.
2018. Limiting properties of stochastic quantum walks on directed graphs. Journal of Physics A: Mathematical and Theoretical. 51(3)
.
2018. LTE Load Balancing with Tx Power Adjustment and the Real Life Mobility Model. Computer Networks.
.
2018. Machine Learning to Predict Toxicity of Compounds. Artificial Neural Networks and Machine Learning - ICANN 2018 - 27th International Conference on Artificial Neural Networks, Rhodes, Greece, October 4-7, 2018, Proceedings, Part I.
.
2018. Majorization uncertainty relations for mixed quantum states. Journal of Physics A: Mathematical and Theoretical. 51(17)
.
2018. Matrix and Tensor-Based Approximation of 3D Face Animations from Low-Cost Range Sensors. Computer and Information Sciences.
.
2018. Methods of Tooth Equator Estimation. Computer and Information Sciences.
.
2018. Metoda sterowania natężeniem ruchu w Internecie, referat zaproszony. XXI Krajowa Konferencja Automatyzacji Procesów Dyskretnych.
.
2018.