Next Article in Journal
CSIER-FM: A Chinese Sensitive Information Entity Recognition Framework with Few-Shot Learning and Multi-Instance Integration
Next Article in Special Issue
Mouse Data Protection in Image-Based User Authentication Using Two-Dimensional Generative Adversarial Networks: Based on a WM_INPUT Message Approach
Previous Article in Journal
Context-Aware Tourism Recommendations Using Retrieval-Augmented Large Language Models and Semantic Re-Ranking
Previous Article in Special Issue
Effect of Deep Recurrent Architectures on Code Vulnerability Detection: Performance Evaluation for SQL Injection in Python
 
 
Review

Article Versions Notes

Electronics 2025, 14(22), 4449; https://doi.org/10.3390/electronics14224449
Action Date Notes Link
article html file updated 20 November 2025 08:53 CET Update https://www.mdpi.com/2079-9292/14/22/4449/html
article pdf uploaded. 20 November 2025 08:51 CET Updated version of record https://www.mdpi.com/2079-9292/14/22/4449/pdf
article xml uploaded. 20 November 2025 08:51 CET Update https://www.mdpi.com/2079-9292/14/22/4449/xml
article xml file uploaded 20 November 2025 08:51 CET Update -
article html file updated 20 November 2025 04:38 CET Update -
article pdf uploaded. 20 November 2025 04:35 CET Updated version of record https://www.mdpi.com/2079-9292/14/22/4449/pdf-vor
article xml uploaded. 20 November 2025 04:35 CET Update -
article xml file uploaded 20 November 2025 04:35 CET Update -
article html file updated 18 November 2025 01:45 CET Original file -
article pdf uploaded. 18 November 2025 01:43 CET Updated version of record https://www.mdpi.com/2079-9292/14/22/4449/pdf-vor
article xml uploaded. 18 November 2025 01:43 CET Update -
article xml file uploaded 18 November 2025 01:43 CET Original file -
article pdf uploaded. 14 November 2025 14:16 CET Version of Record https://www.mdpi.com/2079-9292/14/22/4449/pdf-vor
Back to TopTop