COMING SOON! PQDT Open is getting a new home!

ProQuest Open Access Dissertations & Theses will remain freely available as part of a new and enhanced search experience at www.proquest.com.

Questions? Please refer to this FAQ.

Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
10381 open access dissertations and theses found for:
if(Generative Attacks)  »   Refine Search
271.
The Vulnerabilities of Autonomous Vehicles
by Wierzynski, Amanda J., M.S.  Utica College. 2019: 125 pages; 13881137.
272.
Computer Aided Analysis of Prostate Histopathology Images
by Ren, Jian, Ph.D.  Rutgers The State University of New Jersey, School of Graduate Studies. 2019: 142 pages; 22623293.
273.
Probabilistic models of phase variables for visual representation and neural dynamics
by Cadieu, Charles, Ph.D.  University of California, Berkeley. 2009: 120 pages; 3402686.
274.
The Role of Empirical Evidence in Modeling Speech Segmentation
by Phillips, Lawrence, Ph.D.  University of California, Irvine. 2015: 150 pages; 10027743.
275.
A brief history of topical invention in 20th century United States rhetorical studies
by Hubbell, Gaines S., Ph.D.  Rensselaer Polytechnic Institute. 2015: 332 pages; 3727031.
276.
Images in the Rhetoric of the Far-Right in France and Germany
by Moreno, Brandon Alexander, M.A.  Northern Arizona University. 2018: 68 pages; 13421845.
279.
Grammatical Concept Acquisition: An Historical Textbook Analysis of Advanced Secondary Students' Writing Errors (From 1949 to 2000)
by Dumas, Gabrielle L., M.A.T.  State University of New York College at Cortland. 2002: 58 pages; 1504749.
281.
Two Statistical Methods for Clustering Medicare Claims into Episodes of Care
by Gibbons, Robert Lyon, Ph.D.  University of California, Berkeley. 2011: 135 pages; 3473890.
282.
Enhancing privacy in cryptographic protocols
by Shin, Ji Sun, Ph.D.  University of Maryland, College Park. 2009: 146 pages; 3359424.
283.
Computational Analysis of Deformable Manifolds: From Geometric Modeling to Deep Learning
by Schonsheck, Stefan C., Ph.D.  Rensselaer Polytechnic Institute. 2020: 137 pages; 28001226.
284.
285.
Continuity and Change: Structural Realism and International Stability in the Information Age
by Mitsutomi, Yuichiro, M.A.  The George Washington University. 2011: 105 pages; 1502439.
286.
Zero-Day Defense: Discovering and Removing Vulnerabilities throughProgram Customization and Fuzzing
by Chen, Yurong, D.Engr.  The George Washington University. 2020: 102 pages; 27740940.
287.
The Role of Efficacy in Organizational Change Capacity in a Primary Care Setting
by Rockey, Debra M., Psy.D.  The Chicago School of Professional Psychology. 2016: 104 pages; 10250738.
288.
Giving Perfections, Receiving Perfections: The Essential Divine Attributes in Aquinas's Trinitarian Theology
by Higgins, Michael Joseph, Th.D.  Pontifical John Paul II Institute for Studies on Marriage and Family. 2017: 376 pages; 10746510.
289.
Security and privacy in location-based mobile ad-hoc networks
by El Defrawy, Karim, Ph.D.  University of California, Irvine. 2010: 174 pages; 3422236.
290.
292.
The Role of Delayed Consequences in Human Decision-Making
by White, John Myles, Ph.D.  Princeton University. 2013: 188 pages; 3562231.
295.
Conspiracy Theory and 9/11
by de Benveniste, Isabelle Villon, M.A.  The American University of Paris (France). 2013: 52 pages; 10305840.
296.
Mapping biological ideas: Concept maps as knowledge integration tools for evolution education
by Schwendimann, Beat Adrian, Ph.D.  University of California, Berkeley. 2011: 381 pages; 3499067.
297.
Prioritization of Open Source Defects Using Predictive Models
by Martinez, Jorge E., D.Engr.  The George Washington University. 2020: 164 pages; 28088873.
298.
Strategies of violence and restraint in civil war
by Stanton, Jessica, Ph.D.  Columbia University. 2009: 494 pages; 3373719.
299.
An Exploration of Countermeasures to Defend Against Weaponized AI Malware Exploiting Facial Recognition
by Jalaluddin, Arooj Zafar, D.Sc.  Capitol Technology University. 2020: 197 pages; 28094887.
300.
Defeating memory error exploits using automated software diversity
by Bhatkar, Sandeep, Ph.D.  State University of New York at Stony Brook. 2007: 123 pages; 3337612.
271 - 300 of 10381 displayed.
« First < Previous |   7    8    9    10    11    12    13    14    15    16    17   Next >
Copyright © 2021 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest