Next Article in Journal
BIM-Based Adversarial Attacks Against Speech Deepfake Detectors
Previous Article in Journal
Consistency-Oriented SLAM Approach: Theoretical Proof and Numerical Validation
Previous Article in Special Issue
An RF Fingerprinting Blind Identification Method Based on Deep Clustering for IoMT Security
 
 
Article

Article Versions Notes

Electronics 2025, 14(15), 2965; https://doi.org/10.3390/electronics14152965
Action Date Notes Link
article xml file uploaded 24 July 2025 16:26 CEST Original file -
article xml uploaded. 24 July 2025 16:26 CEST Update https://www.mdpi.com/2079-9292/14/15/2965/xml
article pdf uploaded. 24 July 2025 16:26 CEST Version of Record https://www.mdpi.com/2079-9292/14/15/2965/pdf
article html file updated 24 July 2025 16:29 CEST Original file https://www.mdpi.com/2079-9292/14/15/2965/html
Back to TopTop