Next Article in Journal
A High-Capacity and High-Security Image Steganography Network Based on Chaotic Mapping and Generative Adversarial Networks
Next Article in Special Issue
Adversarial Attacks with Defense Mechanisms on Convolutional Neural Networks and Recurrent Neural Networks for Malware Classification
Previous Article in Journal
Acoustic Simulations Applied to the Garden of Rufolo’s Villa in Ravello: Comparison between Different Scenarios
Previous Article in Special Issue
ICVTest: A Practical Black-Box Penetration Testing Framework for Evaluating Cybersecurity of Intelligent Connected Vehicles
 
 
Article

Article Versions Notes

Appl. Sci. 2024, 14(3), 1224; https://doi.org/10.3390/app14031224
Action Date Notes Link
article xml file uploaded 1 February 2024 08:38 CET Original file -
article xml uploaded. 1 February 2024 08:38 CET Update -
article pdf uploaded. 1 February 2024 08:38 CET Version of Record https://www.mdpi.com/2076-3417/14/3/1224/pdf-vor
article html file updated 1 February 2024 08:39 CET Original file -
article xml file uploaded 1 February 2024 09:53 CET Update -
article xml uploaded. 1 February 2024 09:53 CET Update -
article pdf uploaded. 1 February 2024 09:53 CET Updated version of record https://www.mdpi.com/2076-3417/14/3/1224/pdf-vor
article html file updated 1 February 2024 09:54 CET Update -
article xml file uploaded 5 February 2024 10:51 CET Update -
article xml uploaded. 5 February 2024 10:51 CET Update https://www.mdpi.com/2076-3417/14/3/1224/xml
article pdf uploaded. 5 February 2024 10:51 CET Updated version of record https://www.mdpi.com/2076-3417/14/3/1224/pdf
article html file updated 5 February 2024 10:53 CET Update https://www.mdpi.com/2076-3417/14/3/1224/html
Back to TopTop