Search Results
12. Applying machine learning and NLP techniques to Cyber Security: three selected studies
![restricted_to_institution](/assets/restricted_to_institution_icon-7d7fc9806cb362d0af51e67b7302f7f9dbd0e97c4946cdf9449c0a7bd69f8c7d.png)
Restricted (Penn State Only)
13. Underwater wall detection using robotic flapping wing and Long Short-Term Memory
![restricted_to_institution](/assets/restricted_to_institution_icon-7d7fc9806cb362d0af51e67b7302f7f9dbd0e97c4946cdf9449c0a7bd69f8c7d.png)
Restricted (Penn State Only)
14. Understanding Light-Matter Interactions in Low-Dimensional and Quantum Materials
![restricted_to_institution](/assets/restricted_to_institution_icon-7d7fc9806cb362d0af51e67b7302f7f9dbd0e97c4946cdf9449c0a7bd69f8c7d.png)
Restricted (Penn State Only)
15. Trustworthy Unsupervised and Supervised Learning
![restricted_to_institution](/assets/restricted_to_institution_icon-7d7fc9806cb362d0af51e67b7302f7f9dbd0e97c4946cdf9449c0a7bd69f8c7d.png)
Restricted (Penn State Only)
16. Studying the Performance and Security Trade-offs in Modern Linux Systems
![restricted_to_institution](/assets/restricted_to_institution_icon-7d7fc9806cb362d0af51e67b7302f7f9dbd0e97c4946cdf9449c0a7bd69f8c7d.png)
Restricted (Penn State Only)
17. the relationship between overexcitability and learning experiences among Chinese adult learners
![restricted_to_institution](/assets/restricted_to_institution_icon-7d7fc9806cb362d0af51e67b7302f7f9dbd0e97c4946cdf9449c0a7bd69f8c7d.png)
Restricted (Penn State Only)
18. Lexicographic Hyperparameter Optimization and its Applications
![restricted_to_institution](/assets/restricted_to_institution_icon-7d7fc9806cb362d0af51e67b7302f7f9dbd0e97c4946cdf9449c0a7bd69f8c7d.png)
Restricted (Penn State Only)
19. In-situ Evaluation of Asphalt Pavement Modulus with Embedded Wireless Sensors: Data Collection, Processing, and Modeling
![restricted_to_institution](/assets/restricted_to_institution_icon-7d7fc9806cb362d0af51e67b7302f7f9dbd0e97c4946cdf9449c0a7bd69f8c7d.png)
Restricted (Penn State Only)