| A Comprehensive Study of Machine Learning Techniques for Log-Based Anomaly Detection | Jul 31, 2023 | Anomaly DetectionDeep Learning | —Unverified | 0 |
| An Empirical Study on Capability of Large Language Models in Understanding Code Semantics | Jul 4, 2024 | Code SummarizationMethod name prediction | —Unverified | 0 |
| Adversarial Networks for Prostate Cancer Detection | Nov 28, 2017 | Sensitivity | —Unverified | 0 |
| A Comparative Study of Polynomial Chaos Expansion-Based Methods for Global Sensitivity Analysis in Power System Uncertainty Control | Jul 13, 2023 | ManagementSensitivity | —Unverified | 0 |
| An Empirical Analysis of Proximal Policy Optimization with Kronecker-factored Natural Gradients | Jan 17, 2018 | MuJoCoSensitivity | —Unverified | 0 |
| An Empirical Analysis of Deep Audio-Visual Models for Speech Recognition | Dec 21, 2018 | Lip ReadingSensitivity | —Unverified | 0 |
| Adversarial jamming attacks and defense strategies via adaptive deep reinforcement learning | Jul 12, 2020 | Decision MakingDeep Reinforcement Learning | —Unverified | 0 |
| An EMD-based Method for the Detection of Power Transformer Faults with a Hierarchical Ensemble Classifier | Oct 21, 2021 | Sensitivity | —Unverified | 0 |
| An Effective Networks Intrusion Detection Approach Based on Hybrid Harris Hawks and Multi-Layer Perceptron | Feb 21, 2024 | Evolutionary AlgorithmsIntrusion Detection | —Unverified | 0 |
| Adversarial Examples for Model-Based Control: A Sensitivity Analysis | Jul 14, 2022 | Adversarial AttackSensitivity | —Unverified | 0 |