| Issue | Title | |
| Vol 20, No 3 (2019) | Coverage Overlaps Reduction with Delaunay Triangulation for Visual Sensor Networks | Abstract PDF |
| Shun-Miao Zhang, De-Gen Huang | ||
| Vol 18, No 2 (2017) | Coverless Image Steganography Based on SIFT and BOF | Abstract |
| Chengsheng Yuan, Zhihua Xia, Xingming Sun | ||
| Vol 18, No 5 (2017) | Coverless Image Steganography Using Histograms of Oriented Gradients-Based Hashing Algorithm | Abstract |
| Zhili Zhou, Q. M. Jonathan Wu, Ching-Nung Yang, Xingming Sun, Zhaoqing Pan | ||
| Vol 18, No 6 (2017) | Coverless Information Hiding Method Based on LSB of the Character's Unicode | Abstract |
| Zhihua Xia, Xuan Li | ||
| Vol 18, No 2 (2017) | Coverless Information Hiding Method Based on the Chinese Character Encoding | Abstract |
| Xianyi Chen, Sheng Chen, Yulei Wu | ||
| Vol 19, No 2 (2018) | Coverless Steganography Based on English Texts Using Binary Tags Protocol | Abstract PDF |
| Yulei Wu, Xianyi Chen, Xingming Sun | ||
| Vol 18, No 2 (2017) | Coverless Text Information Hiding Method Based on the Rank Map | Abstract |
| Jianjun Zhang, Lucai Wang, Haijun Lin | ||
| Vol 15, No 2 (2014) | CPA: A Cluster-Based Packet Acknowledgement Approach in WSNs | Abstract |
| Yun-Lei Sun, Xiu-Quan Qiao, Bo Cheng, Si-Da Xue, Jun-Liang Chen | ||
| Vol 19, No 3 (2018) | CP-ABE based Access Control with Policy Updating and Fast Decryption for Intelligent Manufacturing | Abstract PDF |
| Long Li, Tianlong Gu, Liang Chang, Jingjing Li, Junyan Qian | ||
| Vol 17, No 2 (2016) | Creation Method and Evolution Evaluation of Concept Knowledge Maps | Abstract |
| Meng Li, Sheng Cao, Zhi-Quang Qin | ||
| Vol 24, No 1 (2023) | CRF-MEM: Conditional Random Field Model Based Modified Expectation Maximization Algorithm for Sarcasm Detection in Social Media | Abstract PDF |
| Anbarasu Sivalingam, Karthik Sundararajan, Anandhakumar Palanisamy | ||
| Vol 16, No 3 (2015) | Critical Comparison of Access Control Models for Cloud Computing | Abstract |
| Mutaz Beraka, Jalal Al-Muhtadi | ||
| Vol 8, No 3 (2007) | Cross-layer Mobility with SIP and MIPv6 | Abstract |
| Rui Prior, Susana Sargento | ||
| Vol 23, No 4 (2022) | Cross-Project Defect Prediction Method based on Feature Distribution Alignment and Neighborhood Instance Selection | Abstract PDF |
| Yi Zhu, Yu Zhao, Qiao Yu, Xiaoying Chen | ||
| Vol 19, No 3 (2018) | Cryptanalysis and Improvements on Three-party-authenticated Key Agreement Protocols Based on Chaotic Maps | Abstract PDF |
| Chien-Ming Chen, Linlin Xu, King-Hang Wang, Shuai Liu, Tsu-Yang Wu | ||
| Vol 11, No 6 (2010) | Cryptanalysis by Using Differential-Linear Hull: An Extension to Differential-Linear Cryptanalysis | Abstract |
| Zhi-Qiang Liu, Da-Wu Gu, Shi-Jing Ge, Wei Li | ||
| Vol 14, No 2 (2013) | Cryptanalysis of a Secure and Efficient Three-Pass Authenticated Key Agreement Protocol Based on Elliptic Curves | Abstract |
| Zeyad Mohammad, Chien-Lung Hsu, Yaw-Chung Chen, Chi-Chun Lo | ||
| Vol 13, No 1 (2012) | Cryptanalysis of the Knapsack Cipher 0/255 | Abstract |
| Junfang Xiao, Guihua Zeng, Baocang Wang | ||
| Vol 24, No 2 (2023) | CSCP: Energy Charging Mechanism for Surveillance Quality, Network Connectivity and Perpetual Lifetime in WRSNs | Abstract PDF |
| Yuanping Kan, Chih-Yung Chang, Shih-Jung Wu, Chin-Hwa Kuo, Diptendu Sinha Roy | ||
| Vol 13, No 3 (2012) | CSP Based Web Service Composition Model with Buffer at the Business Logic Process Level | Abstract |
| Hwa-Young Jeong, Yang-Sun Lee | ||
| Vol 25, No 3 (2024) | Current Status and Emerging Trends of Generative Artificial Intelligence Technology: A Bibliometric Analysis | Abstract |
| Nan Wang, Suqi Li, Chenhui Wang, Li Zhao | ||
| Vol 13, No 6 (2012) | Customer Behavior Analysis by Using Multiple Databases: A Case of University Students' Use of Online Bookstore Services | Abstract |
| Ko-Tsung Chu, Sheng-Ming Wang, Jia-Li Hou, Jih-Hsin Tang, Jyh-Jian Sheu | ||
| Vol 9, No 4 (2008) | Customized Advertising in E-Commerce Services Provision | Abstract |
| Vincenzo Loia, Sabrina Senatore, Maria I. Sessa, Mario Veniero | ||
| Vol 20, No 5 (2019) | Customized Panorama System for Wayfinding and Walkthrough | Abstract PDF |
| Yu-Yi Chen, Yih-Jiun Lee, Kai-Wen Lien, Tzu-Yi Chen | ||
| Vol 26, No 6 (2025) | Cyber Situational Awareness for Oil & Gas Pipeline Networks: A Systematized Review of Methods, Models, and Engineering Practice | Abstract |
| Fei Song, Tieliang Sun, Shuai Jiang, Yuqin Wang, Shiyin Zhu | ||
| 976 - 1000 of 2743 Items | << < 35 36 37 38 39 40 41 42 43 44 > >> | |
