Next Article in Journal
A Comparative Study of the Fractional-Order Clock Chemical Model
Next Article in Special Issue
Enhancing the Security of Deep Learning Steganography via Adversarial Examples
Previous Article in Journal
Suboptimal Disturbance Observer Design Using All Stabilizing Q Filter for Precise Tracking Control
Previous Article in Special Issue
Coverless Image Steganography Based on Generative Adversarial Network
 
 
Article

Article Versions Notes

Mathematics 2020, 8(9), 1435; https://doi.org/10.3390/math8091435
Action Date Notes Link
article pdf uploaded. 26 August 2020 16:22 CEST Version of Record https://www.mdpi.com/2227-7390/8/9/1435/pdf-vor
article xml file uploaded 27 August 2020 10:15 CEST Original file -
article xml uploaded. 27 August 2020 10:15 CEST Update https://www.mdpi.com/2227-7390/8/9/1435/xml
article pdf uploaded. 27 August 2020 10:15 CEST Updated version of record https://www.mdpi.com/2227-7390/8/9/1435/pdf
article html file updated 27 August 2020 10:16 CEST Original file -
article html file updated 22 July 2022 04:55 CEST Update https://www.mdpi.com/2227-7390/8/9/1435/html
Back to TopTop