-
1
-
Reversible Data Hiding in Encrypted Image Based on MSB Inversion
-
2
-
Comments on the Visual Binary QR Code
-
3
-
NLP-Based Hardware Solution for Censoring Audio on Over-the-Top (OTT) Media Services
-
4
-
Efficient Steganographic Method Based on Modulo Cube
-
5
-
A High Capacity Reversible Data Hiding in Encrypted Images Using Multi-MSB Prediction and Huffman Coding
-
6
-
Reversible Data Hiding Based on Bidirectional Generalized Integer Transform
-
7
-
A Prototype Design on Privacy-Preserving Outsourced Bayesian Network
-
8
-
The Security Challenge of Consumers’ Mobile Payment
-
9
-
Research on the Analysis of Key Attack Modes in a Wireless Environment
-
10
-
Default Risk Prediction Using Random Forest and XGBoosting Classifier
-
11
-
An RFID Ownership Transfer Based on Multiple Owners with Different Weights
-
12
-
Comments on a Scalable Healthcare Authentication Protocol with Attack-Resilience and Anonymous Key-Agreement
-
13
-
A LWE-Based Receiver-Deniable Encryption Scheme
-
14
-
Privacy-Preserved Hierarchical Authentication and Key Agreement for AI-Enabled Telemedicine Systems
-
15
-
Fuzzy C-Means Based Feature Selection Mechanism for Wireless Intrusion Detection
-
16
-
An Active User-Side Detector for Evil Twins
-
17
-
Evaluation of Recurrent Neural Network Model Training for Health Care Suggestions
-
18
-
E-learning Behavior Analytics in the Curriculum of Big Data Visualization Application
-
19
-
Malware Detection Based on Image Conversion
-
20
-
Automobile Theft Detection by Driving Behavior Identification Using Deep Autoencoder
-
21
-
Combining a Bi-LSTM-Based Siamese Network with Word2Vec Algorithm for Classifying High-Dimensional Dataset
-
22
-
Real Time Drowsiness Detection Based on Facial Dynamic Features
-
23
-
Gradient Deep Learning Boosting and Its Application on the Imbalanced Datasets Containing Noises in Manufacturing
-
24
-
Fabric Defect Detection by Applying Structural Similarity Index to the Combination of Variational Autoencode and Generative Adversarial Network
-
25
-
A Novel Defense Mechanism Against Label-Flipping Attacks for Support Vector Machines
-
26
-
Study of Contribution Verifiability for Privacy-preserving Federated Learning
-
27
-
Design and Application of Handwritten Numeral Recognizer Based on Convolutional Neural Network
-
28
-
Collision Avoidance in Crowded Zone Using Adversarial Reinforcement Learning
-
29
-
Cryptanaylsis to Sowjanya et al.’s ABEs from ECC
-
30
-
IIoT Key Distribution and Authentication Technology Based on Physical Unclonable Function
-
31
-
Lattice-Based Anonymous Multi-Receiver ID-Based Encryption
-
32
-
The Design of Concurrent Signature Combined with Blind Signature Generation and Its Application on E-commerce
-
33
-
Identification of the Issues in IoT Devices with HSTS Not Enforced and Their Exploitation
-
34
-
A Critique of a Lightweight Authentication and Key Agreement Scheme for Internet of Drones
-
35
-
A Blockchain-Based Custody System for Preserving Critical Video Evidence
-
36
-
Lightweight and Efficient Source Authentication Scheme Based on Blockchain Approach in Open Data Environment
-
37
-
Reconfigurable PM2.5 Sensor Green Deployment Mechanism Based on Blockchain Technology
-
38
-
Trustworthy Blockchain Oracles for Smart Contracts
-
39
-
Analysis and Acquisition of APFS Data from a Forensic Perspective