Picture for Murat Simsek

Murat Simsek

On the Interplay Between Network Metrics and Performance of Mobile Edge Offloading

Add code
Jan 23, 2024
Figure 1 for On the Interplay Between Network Metrics and Performance of Mobile Edge Offloading
Figure 2 for On the Interplay Between Network Metrics and Performance of Mobile Edge Offloading
Figure 3 for On the Interplay Between Network Metrics and Performance of Mobile Edge Offloading
Figure 4 for On the Interplay Between Network Metrics and Performance of Mobile Edge Offloading
Viaarxiv icon

Rethinking Detection Based Table Structure Recognition for Visually Rich Documents

Add code
Dec 01, 2023
Viaarxiv icon

Multidomain transformer-based deep learning for early detection of network intrusion

Add code
Sep 03, 2023
Viaarxiv icon

Host-Based Network Intrusion Detection via Feature Flattening and Two-stage Collaborative Classifier

Add code
Jun 15, 2023
Viaarxiv icon

Table Detection for Visually Rich Document Images

Add code
May 30, 2023
Viaarxiv icon

Revisiting Table Detection Datasets for Visually Rich Documents

Add code
May 04, 2023
Viaarxiv icon

Efficient Information Sharing in ICT Supply Chain Social Network via Table Structure Recognition

Add code
Nov 03, 2022
Viaarxiv icon

Handling big tabular data of ICT supply chains: a multi-task, machine-interpretable approach

Add code
Aug 11, 2022
Figure 1 for Handling big tabular data of ICT supply chains: a multi-task, machine-interpretable approach
Figure 2 for Handling big tabular data of ICT supply chains: a multi-task, machine-interpretable approach
Figure 3 for Handling big tabular data of ICT supply chains: a multi-task, machine-interpretable approach
Figure 4 for Handling big tabular data of ICT supply chains: a multi-task, machine-interpretable approach
Viaarxiv icon

Machine Learning-Enabled IoT Security: Open Issues and Challenges Under Advanced Persistent Threats

Add code
Apr 17, 2022
Figure 1 for Machine Learning-Enabled IoT Security: Open Issues and Challenges Under Advanced Persistent Threats
Figure 2 for Machine Learning-Enabled IoT Security: Open Issues and Challenges Under Advanced Persistent Threats
Figure 3 for Machine Learning-Enabled IoT Security: Open Issues and Challenges Under Advanced Persistent Threats
Figure 4 for Machine Learning-Enabled IoT Security: Open Issues and Challenges Under Advanced Persistent Threats
Viaarxiv icon

Table Structure Recognition with Conditional Attention

Add code
Mar 08, 2022
Figure 1 for Table Structure Recognition with Conditional Attention
Figure 2 for Table Structure Recognition with Conditional Attention
Figure 3 for Table Structure Recognition with Conditional Attention
Figure 4 for Table Structure Recognition with Conditional Attention
Viaarxiv icon