| Issue | Title | |
| Vol 25, No 3 (2024) | Securing AI Models Against Backdoor Attacks: A Novel Approach Using Image Steganography | Abstract |
| Candra Ahmadi, Jiann-Liang Chen, Yu-Ting Lin | ||
| Vol 11, No 3 (2010) | Securing Digital Images over the Internet Using a Robust Watermarking Scheme | Abstract |
| Yun-Ho Lee, Sang-Soo Yeo, Jin Kwak | ||
| Vol 20, No 1 (2019) | Security Analysis and Improvement on an Image Encryption Algorithm Using Chebyshev Generator | Abstract PDF |
| Tsu-Yang Wu, Xiaoning Fan, King-Hang Wang, Jeng-Shyang Pan, Chien-Ming Chen | ||
| Vol 14, No 2 (2013) | Security Analysis of Block Cipher LED | Abstract |
| Ki-Tae Jeong, Sang-Soo Yeo | ||
| Vol 17, No 2 (2016) | Security Analysis of RFID Relay Attacks | Abstract |
| Sghaier Guizani | ||
| Vol 24, No 3 (2023) | Security Attack on Remote Sensing Equipment: PoIs Recognition Based on HW with Bi-LSTM Attention | Abstract PDF |
| Wei Jiang, Xianhua Zhang, Yanpeng Li, Chuansheng Chen, Jianfeng Zhu | ||
| Vol 11, No 3 (2010) | Security Challenges for User-Oriented RFID Applications within the "Internet of Things" | Abstract |
| G. P. Hancke, K. Markantonakis, K. E. Mayes | ||
| Vol 17, No 5 (2016) | Security Challenges in Recent Internet Threats and Enhanced Security Service Model for Future IT Environments | Abstract |
| Man-Sik Kim, Jeong-Kyu Lee, Jong Hyuk Park, Jung-Ho Kang | ||
| Vol 18, No 3 (2017) | Security Collaborative Optimization Strategy for Perception Layer in Cognitive IoT | Abstract |
| Ruijuan Zheng, Mingchuan Zhang, Qinghua Zheng, Qingtao Wu, Wangyang Wei | ||
| Vol 14, No 3 (2013) | Security Evaluation of Double-Block-Length Hash Modes with Preimage Attacks on PGV Schemes | Abstract |
| Duk-Jae Moon, Deuk-Jo Hong, Bon-Wook Koo, Seok-Hie Hong | ||
| Vol 7, No 3 (2006) | Security Frame and Evaluation in Mobile Agent System | Abstract |
| Su-Zhen Wang, Jia-Zhen Wang | ||
| Vol 8, No 1 (2007) | Security Protocols for Wireless Local Area Networks (WLANs) and Cellular Networks | Abstract |
| Sherali Zeadally, Farhan Siddiqui | ||
| Vol 10, No 1 (2009) | Security Simulation Modeling Using Contract Net Protocol | Abstract |
| Jong-Hyuk Park, Hee-Suk Seo | ||
| Vol 24, No 5 (2023) | Security Threat Early Warning of Distance Education System Based on Blockchain | Abstract |
| Zhihua Chen, Gautam Srivastava | ||
| Vol 23, No 6 (2022) | Segmentation-based Decision Networks for Steel Surface Defect Detection | Abstract PDF |
| Zhongqin Bi, Qiancong Wu, Meijing Shan, Wei Zhong | ||
| Vol 24, No 4 (2023) | Selective Layered Blockchain Framework for Privacy-preserving Data Management in Low-latency Mobile Networks | Abstract |
| Sun-Woo Yun, Eun-Young Lee, Il-Gu Lee | ||
| Vol 17, No 4 (2016) | Self-Adaptive Chaotic Logistic Map: An Efficient Image Encryption Method | Abstract |
| Hai Cheng, Yu Song, Chunguang Huang, Qun Ding | ||
| Vol 11, No 7 (2010) | Self-Certified Multi-authenticated Encryption Scheme | Abstract |
| Jia-Lun Tsai, Tzong-Chen Wu, Kuo-Yu Tsai | ||
| Vol 22, No 3 (2021) | Self-efficacy in Home-based Online Learning Environments | Abstract PDF |
| He-Hai Liu, Yi-Chen Ye, Hui-Ling Jiang | ||
| Vol 19, No 2 (2018) | Self-enforcing Game Theory-based Resource Allocation for LoRaWAN Assisted Public Safety Communications | Abstract PDF |
| Vishal Sharma, Gaurav Choudhary, Ilsun You, Jae Deok Lim, Jeong Nyeo Kim | ||
| Vol 10, No 5 (2009) | Self-Recovery Algorithm Based on Motion Estimation of I-Frames for Compressed Video | Abstract |
| Xiao Zeng, Zhen-Yong Chen, Zhang Xiong | ||
| Vol 12, No 3 (2011) | Self-Similar Traffic Prediction Algorithm Based on an Improved Kalman Filtering | Abstract |
| Zhen-Yu Na, Zi-He Gao | ||
| Vol 14, No 3 (2013) | Semantic Link Networks: Theory, Applications, and Future Trends | Abstract |
| Yun-Chuan Sun, Rong-Fang Bie, Xiao-Feng Yu, Shen-Ling Wang | ||
| Vol 13, No 4 (2012) | Semantic Representation of Motion for Tracing Object in Surveillance System | Abstract |
| Chang Choi, Junho Choi, Juhyun Shin, Sung-Ryul Kim, Pankoo Kim | ||
| Vol 8, No 4 (2007) | Semantic Retrieval of Electronic Medical Records Based on Concept Networks | Abstract |
| Tzung-Pei Hong, Jung-Chih Wang, Jiann-Horng Lin | ||
| 2251 - 2275 of 2731 Items | << < 86 87 88 89 90 91 92 93 94 95 > >> | |
