Author:Axel Egon

Publications
EasyChair Preprint 15062
EasyChair Preprint 15061
EasyChair Preprint 15060
EasyChair Preprint 15059
EasyChair Preprint 15058
EasyChair Preprint 15049
EasyChair Preprint 15042
EasyChair Preprint 15041
EasyChair Preprint 15040
EasyChair Preprint 15039
EasyChair Preprint 14818
EasyChair Preprint 14783
EasyChair Preprint 14782
EasyChair Preprint 14781
EasyChair Preprint 14780
EasyChair Preprint 14779
EasyChair Preprint 14766
EasyChair Preprint 14644
EasyChair Preprint 14640
EasyChair Preprint 14606
EasyChair Preprint 14580
EasyChair Preprint 14569
EasyChair Preprint 14568
EasyChair Preprint 14567
EasyChair Preprint 14566
EasyChair Preprint 14565
EasyChair Preprint 14564
EasyChair Preprint 14442
EasyChair Preprint 14272
EasyChair Preprint 14271
EasyChair Preprint 14270
EasyChair Preprint 14269
EasyChair Preprint 14268
EasyChair Preprint 14267
EasyChair Preprint 14266
EasyChair Preprint 14265
EasyChair Preprint 14264
EasyChair Preprint 14163
EasyChair Preprint 14162
EasyChair Preprint 14160
EasyChair Preprint 14124
EasyChair Preprint 14111
EasyChair Preprint 14048
EasyChair Preprint 14033
EasyChair Preprint 14032
EasyChair Preprint 14031
EasyChair Preprint 13985
EasyChair Preprint 13957
EasyChair Preprint 13956
EasyChair Preprint 13859
EasyChair Preprint 13858
EasyChair Preprint 13824
EasyChair Preprint 13812
EasyChair Preprint 13811
EasyChair Preprint 13810
EasyChair Preprint 12795
EasyChair Preprint 12788
EasyChair Preprint 12676
EasyChair Preprint 12675
EasyChair Preprint 12673
EasyChair Preprint 12670
EasyChair Preprint 12669
EasyChair Preprint 12668
EasyChair Preprint 12667

Keyphrases

acquisition, adversarial attacks, Adversarial machine learning (AML), adversarial robustness, adversarial training2, Affected, AI algorithms, AI-based network, AI-driven, Alveolar Ridge Preservation2, anomaling, Anomaly Detection Systems, Application of Artificial Intelligence, Archaeological Datasets, archaeological materials, Archaeological Site Prospection, archaeological sites, Architecture, artifact provenance, Artificial Intelligence2, Artificial Intelligence (AI)2, Attacks, Aurora kinase2, Balanced Scorecard4, Banking Operations, Banking Sector, Banking Strategy, behavior, BET10, biocompatibility, biomechanical analysis, Biotechnology, Blockchain, bone regeneration, Bromodomain9, Business, cancer7, cancer treatment, CDK2, CDK92, Cellular Mechanisms, Circulating tumor DNA (ctDNA), Clinical Success Rates, Computed Tomography (CT) Scans, computer-aided drug design3, Computer Science2, consumer2, Contemporary, Critical Infrastructure, Customer, Customer Engagement, customer loyalty, customer perspective, customer satisfaction, Cyberattacks2, Cybersecurity2, Cyberthreat, data processing, data transmission, Deciphering Ancient, Deepfakes, defense mechanisms, Dental, Dental implants2, detection, Detection and Mitigation, Detection and Prevention, Development of digital tools, Digital approaches, Digital Archaeological Resources, digital archiving, Digitization, disease control, DNA methylation, dual inhibitor7, Early Warning Systems (EWS), Economic challenges, Economics, Ecosystems, Edge Computing, electrode design, Energy5, Engagement, Engineering, Epigenetics9, Ethical and Legal Issues, Explainable AI, Federated Learning, Finance, Financial Inclusion, Financial Performance, financial perspective, financial stability2, Gamification Strategies, GIS, Green Consumerism, Guided bone regeneration, heat2, implantable microelectronic devices, inhibitor10, Insider Threat, Integration of GIS, Internal Business Process Perspective, Internet of Things (IoT), Invasive, Islamic Microfinance, kinase10, low-power circuits, Lung Cancer3, lung cancer treatment technologies, machine learning, Machine Learning (ML), Machine learning algorithm for lung cancer, Machine Learning Security, Machine Learning Techniques, Malware, managing, Marketers, Marketing2, Minimally invasive extraction, Minimally Invasive Tooth Extraction, Mitigation, Model resilience, molecular mechanisms, Molecular Signaling Pathways, natural disasters, Network Management, neural interfaces, Neural prosthetics, neurological impairments, nutrient, online artifacts and interactions, operational efficiency, osteoinduction, Palestinian banks3, panel, patient satisfaction, performance measurement, phenotypic plasticity, Plant Epigenetics, Plant-pathogen interactions, plant root, plant stress, power4, power transfer, predictive modeling, predictive policing, privacy preserving, Process Improvement, product, profit sharing, Profitability, public engagement, Ransomware, Rapid Documentation, Regulatory Compliance, reliability and security, Renewable2, research, risk management2, Risk Mitigation, robust optimization, Scripts and Languages, Secure AI, Security, Security Analytics, security decision-making, Security Frameworks, service quality, Shariah Compliance, signal resolution, social, social justice, Social media archaeology, socio-economic development, Solar4, sophisticated, species, spectrum efficiency, Standards for Long-Term Preservation, Strategic Alignment, Strategic Management2, stratigraphic analysis, studies and authentication, Studying digital culture, Sustainable, technological solutions, Technology4, Telecommunication Networks, Thermal4, Tolerance Mechanisms, Traditional machine learning, Use of Drones and Photogrammetry, visualization, Vulnerabilities, wireless communication, Xenograft Materials2, Xenografts, Zakat, zero-day.