|
Issue |
Title |
|
Vol 14, No 1 (2013) |
Cover the Trace of Image Forgery by PSO |
Abstract
|
Shen Wang, Xia-Mu Niu |
|
Vol 20, No 3 (2019) |
Coverage Overlaps Reduction with Delaunay Triangulation for Visual Sensor Networks |
Abstract
PDF
|
Shun-Miao Zhang, De-Gen Huang |
|
Vol 18, No 2 (2017) |
Coverless Image Steganography Based on SIFT and BOF |
Abstract
|
Chengsheng Yuan, Zhihua Xia, Xingming Sun |
|
Vol 18, No 5 (2017) |
Coverless Image Steganography Using Histograms of Oriented Gradients-Based Hashing Algorithm |
Abstract
|
Zhili Zhou, Q. M. Jonathan Wu, Ching-Nung Yang, Xingming Sun, Zhaoqing Pan |
|
Vol 18, No 6 (2017) |
Coverless Information Hiding Method Based on LSB of the Character's Unicode |
Abstract
|
Zhihua Xia, Xuan Li |
|
Vol 18, No 2 (2017) |
Coverless Information Hiding Method Based on the Chinese Character Encoding |
Abstract
|
Xianyi Chen, Sheng Chen, Yulei Wu |
|
Vol 19, No 2 (2018) |
Coverless Steganography Based on English Texts Using Binary Tags Protocol |
Abstract
PDF
|
Yulei Wu, Xianyi Chen, Xingming Sun |
|
Vol 18, No 2 (2017) |
Coverless Text Information Hiding Method Based on the Rank Map |
Abstract
|
Jianjun Zhang, Lucai Wang, Haijun Lin |
|
Vol 15, No 2 (2014) |
CPA: A Cluster-Based Packet Acknowledgement Approach in WSNs |
Abstract
|
Yun-Lei Sun, Xiu-Quan Qiao, Bo Cheng, Si-Da Xue, Jun-Liang Chen |
|
Vol 19, No 3 (2018) |
CP-ABE based Access Control with Policy Updating and Fast Decryption for Intelligent Manufacturing |
Abstract
PDF
|
Long Li, Tianlong Gu, Liang Chang, Jingjing Li, Junyan Qian |
|
Vol 17, No 2 (2016) |
Creation Method and Evolution Evaluation of Concept Knowledge Maps |
Abstract
|
Meng Li, Sheng Cao, Zhi-Quang Qin |
|
Vol 24, No 1 (2023) |
CRF-MEM: Conditional Random Field Model Based Modified Expectation Maximization Algorithm for Sarcasm Detection in Social Media |
Abstract
PDF
|
Anbarasu Sivalingam, Karthik Sundararajan, Anandhakumar Palanisamy |
|
Vol 16, No 3 (2015) |
Critical Comparison of Access Control Models for Cloud Computing |
Abstract
|
Mutaz Beraka, Jalal Al-Muhtadi |
|
Vol 8, No 3 (2007) |
Cross-layer Mobility with SIP and MIPv6 |
Abstract
|
Rui Prior, Susana Sargento |
|
Vol 23, No 4 (2022) |
Cross-Project Defect Prediction Method based on Feature Distribution Alignment and Neighborhood Instance Selection |
Abstract
PDF
|
Yi Zhu, Yu Zhao, Qiao Yu, Xiaoying Chen |
|
Vol 19, No 3 (2018) |
Cryptanalysis and Improvements on Three-party-authenticated Key Agreement Protocols Based on Chaotic Maps |
Abstract
PDF
|
Chien-Ming Chen, Linlin Xu, King-Hang Wang, Shuai Liu, Tsu-Yang Wu |
|
Vol 11, No 6 (2010) |
Cryptanalysis by Using Differential-Linear Hull: An Extension to Differential-Linear Cryptanalysis |
Abstract
|
Zhi-Qiang Liu, Da-Wu Gu, Shi-Jing Ge, Wei Li |
|
Vol 14, No 2 (2013) |
Cryptanalysis of a Secure and Efficient Three-Pass Authenticated Key Agreement Protocol Based on Elliptic Curves |
Abstract
|
Zeyad Mohammad, Chien-Lung Hsu, Yaw-Chung Chen, Chi-Chun Lo |
|
Vol 13, No 1 (2012) |
Cryptanalysis of the Knapsack Cipher 0/255 |
Abstract
|
Junfang Xiao, Guihua Zeng, Baocang Wang |
|
Vol 24, No 2 (2023) |
CSCP: Energy Charging Mechanism for Surveillance Quality, Network Connectivity and Perpetual Lifetime in WRSNs |
Abstract
PDF
|
Yuanping Kan, Chih-Yung Chang, Shih-Jung Wu, Chin-Hwa Kuo, Diptendu Sinha Roy |
|
Vol 13, No 3 (2012) |
CSP Based Web Service Composition Model with Buffer at the Business Logic Process Level |
Abstract
|
Hwa-Young Jeong, Yang-Sun Lee |
|
Vol 25, No 3 (2024) |
Current Status and Emerging Trends of Generative Artificial Intelligence Technology: A Bibliometric Analysis |
Abstract
|
Nan Wang, Suqi Li, Chenhui Wang, Li Zhao |
|
Vol 13, No 6 (2012) |
Customer Behavior Analysis by Using Multiple Databases: A Case of University Students' Use of Online Bookstore Services |
Abstract
|
Ko-Tsung Chu, Sheng-Ming Wang, Jia-Li Hou, Jih-Hsin Tang, Jyh-Jian Sheu |
|
Vol 9, No 4 (2008) |
Customized Advertising in E-Commerce Services Provision |
Abstract
|
Vincenzo Loia, Sabrina Senatore, Maria I. Sessa, Mario Veniero |
|
Vol 20, No 5 (2019) |
Customized Panorama System for Wayfinding and Walkthrough |
Abstract
PDF
|
Yu-Yi Chen, Yih-Jiun Lee, Kai-Wen Lien, Tzu-Yi Chen |
|
951 - 975 of 2669 Items |
<< < 34 35 36 37 38 39 40 41 42 43 > >> |