Tabular data sharing serves as a common method for data exchange. Howeve...
Estimating the similarity between two legal case documents is an importa...
Task allocation using a team or coalition of robots is one of the most
i...
In this paper, we propose a feature-free method for detecting phishing
w...
We study cascading failures in smart grids, where an attacker selectivel...
Machine learning (ML) has developed rapidly in the past few years and ha...
Phishing has grown significantly in the past few years and is predicted ...
Understanding the topical evolution in industrial innovation is a challe...
Computing similarity between two legal case documents is an important an...
Computing similarity between two legal documents is an important and
cha...
Research and innovation is important agenda for any company to remain
co...
Past work on evacuation planning assumes that evacuees will follow
instr...
Payment channel networks (PCN) are used in cryptocurrencies to enhance t...
A lot of scientific works are published in different areas of science,
t...
This paper explores an interesting new dimension to the challenging prob...