default search action
17th SOLI 2023: Singapore
- IEEE International Conference on Service Operations and Logistics, and Informatics, SOLI 2023, Singapore, December 11-13, 2023. IEEE 2023, ISBN 979-8-3503-9600-3
- Abdul Hady Bin Zaydie, Malcolm Yoke Hean Low, Weidong Lin:
Perception Pipeline of Autonomous Mobile Robots Using 3D Point Cloud Classification. 1-7 - Muhammad Farhan Ahmed, Vincent Frémont, Isabelle Fantoni:
Active SLAM Utility Function Exploiting Path Entropy. 1-7 - Davis Yang Zheng, Ken Kwok Sheng Tong, Mario Tow Ann Lim, Wei Jie Chan, Weihan Goh:
AfterImage: Evading Traditional Indicator of Compromise (IOC) Blocking. 1-6 - Haixin Sun, Song-Ming Chen, Minh-Quan Dao, Vincent Frémont:
EV-FuseMODNet: Moving Object Detection Using the Fusion of Event Camera and Frame Camera. 1-6 - Danial Ritzuan Junaidi, Maode Ma, Rong Su:
An Efficient Multi-Blockchain Approach Towards Secure Platoon Management. 1-6 - Vivek Balachandran, Ryan Fraser Kirwan, Peter Loh, Mohamed Riaz Ebrahim, Ravishanker Kusuma:
ASAP: Application Security Assessment Protocol. 1-4 - Etienne Alain Feukeu, Mbuyu Sumbwanyambe:
Application of Machine Learning for Link Adaptation in VANETs. 1-5 - Nibi Kulangara Velayudhan, Aryadevi Remanidevi Devidas, Maneesha Vinodini Ramesh, Durgapu Sathvik, Janvi P, Kolluru Durga Naga Venkata Sreeja, Shyju P. Thadathil:
Impact Analysis of Contamination and Sensor Placement in Water Distribution Network in Kochi, India. 1-7 - Adriel Yeo, Benjamin Wei Jie Kwok, Zi Feng Wong, Guo-Xun Koh, Ryan W. Tan, Krystal Yamin, Yeni Liew, Derwin H. Yan, Jeannie S. Lee:
Cycling Simulation in Virtual Reality for Autonomous Vehicle Traffic Scenarios. 1-6 - Dylan Zhang, Homin Park, Shili Xiang:
Linking Mobility Traces of the Same User Across Different Datasets. 1-8 - Charlotte Beaune, Elwan Héry, Vincent Frémont, Antonio Sgorbissa, Carmine Recchiuto:
Collaborative Navigation Strategies Based on Vehicles Features in Connected Environments. 1-7 - Anwesha Chakravarty, Ayesha Choudhary:
Mobility Assistance for the Visually Impaired in Unstructured Environment. 1-8 - Hamdi A. Bashir, Salah Haridy, Mohammad Shamsuzzaman, Sarah Abdul-kadir Hamid:
Factor Analysis-Based Method for Clustering Taxi Zones. 1-5 - Aditya Kulkarni, Shahil Manishbhai Patel, Shivam Pradip Tirrnare, Vivek Balachandran, Tamal Das:
Bridging the Gap in Phishing Detection: A Comprehensive Phishing Dataset Collector. 1-7 - Waafi Abdullah Bin Adam, Ivriah Yue Xuan Tan, Chung Shing Lai, Nurtiara Tania Rahim, Benjamin Yu Bin Tham, Huaqun Guo:
VishingDefender: An Advanced Vishing Defence System Against Vishing Attacks. 1-8 - Ian McLoughlin:
A Framework for Understanding the Weaponisation of the Internet. 1-7 - Max Plotnikov, Arkadius Schier:
Concept About Shared Digital Twin of EV Batteries to Improve the Data Exchange in the Context of Battery Transport. 1-6 - Rongjie Zhou, Huaqun Guo, Francis E. C. Teo, Spiridon Bakiras:
A Survey on Post-Quantum Cryptography for 5G/6G Communications. 1-6 - Shyam Shanckin, Mayank, Anshuman Singh, Rahul Patwadi:
Unveiling Latent Spaces with Variational Autoencoders. 1-5 - Hamdi A. Bashir, Sarah Abdul-kadir Hamid, Salah Haridy, Mohammad Shamsuzzaman, Udechukwu Ojiako:
A Literature-Based Comprehensive Model for Factors Affecting Firm Productivity in the Service Sector. 1-7 - Daiyu Sim, Huaqun Guo, Luying Zhou:
A SIEM and Multiple Analysis Software Integrated Malware Detection Approach. 1-7 - Dongyeong Kim, Yooncheol Choi, Dongweon Yoon:
Blind Estimation of a Scrambler in Long-Code Direct Sequence Spread Spectrum Systems. 1-6 - Andrew Keong Ng, Jing Zhi Chin, R. Mahkeswaran:
Energy Conservation Strategies for Increased Sustainability and Energy Efficiency in Urban Farming. 1-6 - Swarali Borde:
Mitigating Catastrophic Forgetting in Continual Learning-Based Image Classification. 1-16 - Wei Herng Ang, Huaqun Guo, Eyasu Getahun Chekole:
VulnGen: Vulnerable Virtual Machine Generator. 1-8 - Zeus Sze Hao Chan, Hon Ngee Teo, Jing Hao Lim, Leslie Zhen Yong Tan, Huaqun Guo:
Unifying Web Security Assessments with MALA: A Modular Approach. 1-7 - Aditya Kumar, Ayesha Choudhary:
Water-Puddle Segmentation Using Deep Learning in Unstructured Environments. 1-6 - Sarat Chandra Nagavarapu, Anuj Abraham, Nithish Muthuchamy Selvaraj, Justin Dauwels:
A Dynamic Object Removal and Reconstruction Algorithm for Point Clouds. 1-8 - Terence Charles Ong, A. Benjamin Premkumar, Huaqun Guo:
Cyber Range Revolution: Transforming the Future of Cybersecurity Training. 1-6 - Enoch Solomon, Abraham Woubie, Eyael Solomon Emiru:
Self-supervised Deep Learning Based End-to-End Face Verification Method using Siamese Network. 1-6
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.