Next Article in Journal
UAV Swarm Mission Planning and Load Sensitivity Analysis Based on Clustering and Optimization Algorithms
Next Article in Special Issue
Camouflage Backdoor Attack against Pedestrian Detection
Previous Article in Journal
Noise-to-Norm Reconstruction for Industrial Anomaly Detection and Localization
Previous Article in Special Issue
Fine-Auth: A Fine-Grained User Authentication and Key Agreement Protocol Based on Physical Unclonable Functions for Wireless Body Area Networks
 
 
Article

Article Versions Notes

Appl. Sci. 2023, 13(22), 12437; https://doi.org/10.3390/app132212437
Action Date Notes Link
article xml file uploaded 17 November 2023 10:15 CET Original file -
article xml uploaded. 17 November 2023 10:15 CET Update -
article pdf uploaded. 17 November 2023 10:15 CET Version of Record -
article html file updated 17 November 2023 10:17 CET Original file -
article xml file uploaded 17 November 2023 10:45 CET Update -
article xml uploaded. 17 November 2023 10:45 CET Update https://www.mdpi.com/2076-3417/13/22/12437/xml
article pdf uploaded. 17 November 2023 10:45 CET Updated version of record https://www.mdpi.com/2076-3417/13/22/12437/pdf
article html file updated 17 November 2023 10:46 CET Update https://www.mdpi.com/2076-3417/13/22/12437/html
Back to TopTop