Autor der Publikation

An Efficient DCT-SVD Steganographic Approach Applied to JPEG Images.

, , , , und . EAI Endorsed Trans. Ind. Networks Intell. Syst., 7 (24): e2 (2020)

Bitte wählen Sie eine Person um die Publikation zuzuordnen

Um zwischen Personen mit demselben Namen zu unterscheiden, wird der akademische Grad und der Titel einer wichtigen Publikation angezeigt. Zudem lassen sich über den Button neben dem Namen einige der Person bereits zugeordnete Publikationen anzeigen.

 

Weitere Publikationen von Autoren mit dem selben Namen

LimonDroid: a system coupling three signature-based schemes for profiling Android malware., , , und . Iran J. Comput. Sci., 4 (2): 95-114 (2021)Creating awareness about security and safety on highways to mitigate wildlife-vehicle collisions by detecting and recognizing wildlife fences using deep learning and drone technology., , , , , und . CoRR, (2023)Supervised Learning Based Detection of Malware on Android., und . Mobile Security and Privacy, Elsevier, (2017)Detection of Vulnerabilities Related to Permissions Requests for Android Apps Using Machine Learning Techniques., , , , und . SoCPaR, Volume 1383 von Advances in Intelligent Systems and Computing, Seite 810-822. Springer, (2020)An Efficient DCT-SVD Steganographic Approach Applied to JPEG Images., , , , und . EAI Endorsed Trans. Ind. Networks Intell. Syst., 7 (24): e2 (2020)Mobile Money Phishing Cybercrimes: Vulnerabilities, Taxonomies, Characterization from an Investigation in Cameroon., , , , und . AFRICOMM, Volume 499 von Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Seite 430-445. Springer, (2022)Support to Interaction Between Medical Practitioners and Patients: A Systematic Review., und . SAFER-TEA, Volume 566 von Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Seite 380-408. Springer, (2023)Feature Analysis and Classification of Collusive Android App-Pairs Using DBSCAN Clustering Algorithm., , , und . SAFER-TEA, Volume 566 von Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Seite 86-96. Springer, (2023)A Reliable Weighting Scheme for the Aggregation of Crowd Intelligence to Detect Fake News., , , und . Inf., 11 (6): 319 (2020)Crawl-shing: A focused crawler for fetching phishing contents based on graph isomorphism., , , , und . J. King Saud Univ. Comput. Inf. Sci., 34 (10 Part A): 8888-8898 (2022)