Publikacje
Found 1349 results
Application of a Hybrid Algorithm Based on Quantum Annealing to Solve a Metropolitan Scale Railway Dispatching Problem. arXiv preprint. arXiv:2309.06763
.
Submitted. Associated Random Neural Networks for Collective Classification of Nodes in Botnet Attacks. arXiv.
(1.86 MB)
.
Submitted. 
Comment to Spatial Search by Quantum Walk is Optimal for Almost all Graphs. arXiv:2009.13309.
.
Submitted. Discrimination and certification of unknown quantum measurements. arXiv preprint arXiv:2301.04948.
(369.29 KB)
.
Submitted. 
Hamiltonian-Oriented Homotopy QAOA. arXiv preprint arXiv:2301.13170.
.
Submitted. Hard hat wearing detection based on head keypoint localization. arXiv:2106.10944.
.
Submitted. Near-optimal circuit design for variational quantum optimization. arXiv preprint arXiv:2209.03386.
.
Submitted. A New Approach for Detecting Process Injection Attacks Using Memory Analysis. International Journal of Information Security.
(2.49 MB)
.
Submitted. 
Online Self-Supervised Learning in Machine Learning Intrusion Detection for the Internet of Things. arXiv.
(6.78 MB)
.
Submitted. 
Optimizing the Production of Test Vehicles using Hybrid Constrained Quantum Annealing. arXiv preprint arXiv:2203.15421.
.
Submitted. Quantum readiness for scheduling of Automatic Guided Vehicles (AGVs) as job-shop problem. arXiv preprint. arXiv:2309.03088
.
Submitted. Resource engines. preprint.
.
Submitted. State-efficient QFA Algorithm for Quantum Computers. arXiv preprint arXiv:2107.02262.
.
Submitted. Statistical method for analysis of interactions between chosen protein and chondroitin sulfate in an aqueous environment. The 16th International Conference "Dynamical Systems – Theory and Applications" (DSTA 2021).
.
Submitted. Decentralized Online Federated G-Network Learning for Lightweight Intrusion Detection. Modeling, Analysis, and Simulation On Computer and Telecommunication Systems (MASCOTS).
(1.06 MB)
.
In Press. 
Global Entropy Pooling Layer for Convolutional Neural Networks. Neurocomputing.
.
In Press. Measurement Based Evaluation and Mitigation of Flood Attacks on a LAN Test-Bed. The 48th IEEE Conference on Local Computer Networks.
(1001.85 KB)
.
In Press. 
Performance and Cost Evaluation of an Adaptive Queuing System with Customer Reneging and Retention: Steady-state and Transient Analysis. International Journal of Services, Economics and Management.
(305.23 KB)
.
In Press. 
Protecting IoT Servers Against Flood Attacks with the Quasi Deterministic Transmission Policy.
(1.52 MB)
.
In Press. 
Symbolic quantum programming for supporting applications of quantum computing technologies. QP2023 Workshop, Programming'23, Tokyo, JP, March 13-17, 2023.
.
In Press. Zastosowanie Heurystyki do Wyboru Lokalizacji Węzłów Pośredniczących w Sieciach LP WAN. Konferencja Radiokomunikacji i Teleinformatyki KRiT 2023.
.
In Press. .
2023.
DC-HEN: A Deadline-aware and Congestion-relieved Hierarchical Emergency Navigation Algorithm for Ship Indoor Environments. IEEE International Conference on Mobility, Operations, Services and Technologies.
.
2023. Detection of emergent leaks using machine learning approaches. Water Supply. 23(6)
.
2023. Efficient Universal Indoor Multicharacteristic Propagation model for indoor environments. 2023 International Wireless Communications and Mobile Computing (IWCMC). :1052-1058.
.
2023.