The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2022 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS) 2022
DOI: 10.1109/icccis56430.2022.10037690
|View full text |Cite
|
Sign up to set email alerts
|

Detection of Covid-19 using Transfer Learning Technique

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 18 publications
0
0
0
Order By: Relevance
“…GenAI can also be used in generating secure code and writing secure code. However, attackers can also misuse GenAI to create malicious code, phishing attacks, and social engineering attacks [193].…”
Section: Potential Approaches Related To Genaimentioning
confidence: 99%
“…GenAI can also be used in generating secure code and writing secure code. However, attackers can also misuse GenAI to create malicious code, phishing attacks, and social engineering attacks [193].…”
Section: Potential Approaches Related To Genaimentioning
confidence: 99%