Next Article in Journal
WordBlitz: An Efficient Hard-Label Textual Adversarial Attack Method Jointly Leveraging Adversarial Transferability and Word Importance
Next Article in Special Issue
XAI-IDS: Toward Proposing an Explainable Artificial Intelligence Framework for Enhancing Network Intrusion Detection Systems
Previous Article in Journal
An NLOS Ranging Error Mitigation Method for 5G Positioning in Indoor Environments
Previous Article in Special Issue
An Effective Method for Detecting Unknown Types of Attacks Based on Log-Cosh Variational Autoencoder
 
 
Article

Article Versions Notes

Appl. Sci. 2024, 14(9), 3829; https://doi.org/10.3390/app14093829
Action Date Notes Link
article xml file uploaded 30 April 2024 11:28 CEST Original file -
article xml uploaded. 30 April 2024 11:28 CEST Update -
article pdf uploaded. 30 April 2024 11:28 CEST Version of Record -
article html file updated 30 April 2024 11:29 CEST Original file -
article xml file uploaded 30 April 2024 11:55 CEST Update -
article xml uploaded. 30 April 2024 11:55 CEST Update https://www.mdpi.com/2076-3417/14/9/3829/xml
article pdf uploaded. 30 April 2024 11:55 CEST Updated version of record https://www.mdpi.com/2076-3417/14/9/3829/pdf
article html file updated 30 April 2024 11:56 CEST Update https://www.mdpi.com/2076-3417/14/9/3829/html
Back to TopTop