Next Article in Journal
FLSAD: Defending Backdoor Attacks in Federated Learning via Self-Attention Distillation
Previous Article in Journal
Clean-Label Backdoor Watermarking for Dataset Copyright Protection via Trigger Optimization
 
 
Article

Article Versions Notes

Symmetry 2024, 16(11), 1495; https://doi.org/10.3390/sym16111495
Action Date Notes Link
article xml file uploaded 8 November 2024 10:09 CET Original file -
article xml uploaded. 8 November 2024 10:09 CET Update -
article pdf uploaded. 8 November 2024 10:09 CET Version of Record -
article html file updated 8 November 2024 10:10 CET Original file -
article xml file uploaded 8 November 2024 10:23 CET Update -
article xml uploaded. 8 November 2024 10:23 CET Update -
article pdf uploaded. 8 November 2024 10:23 CET Updated version of record -
article xml file uploaded 8 November 2024 10:24 CET Update -
article xml uploaded. 8 November 2024 10:24 CET Update https://www.mdpi.com/2073-8994/16/11/1495/xml
article pdf uploaded. 8 November 2024 10:24 CET Updated version of record https://www.mdpi.com/2073-8994/16/11/1495/pdf
article html file updated 8 November 2024 10:25 CET Update -
article html file updated 8 November 2024 10:28 CET Update https://www.mdpi.com/2073-8994/16/11/1495/html
Back to TopTop