Author of the publication

A Preprocessing Methodology by Using Additional Steganography on CNN-based Steganalysis.

, , , and . GLOBECOM, page 1-6. IEEE, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Haruta, Shuichiro
add a person with the name Haruta, Shuichiro
 

Other publications of authors with the same name

Visual Similarity-Based Phishing Detection Scheme Using Image and CSS with Target Website Finder., , and . GLOBECOM, page 1-6. IEEE, (2017)A Website Fingerprinting Attack based on the Virtual Memory of the Process on Android Devices., , , and . APCC, page 7-12. IEEE, (2021)Trust-based Sybil nodes detection with robust seed selection and graph pruning on SNS., , and . WIFS, page 1-6. IEEE, (2015)Top-down Activity Representation Learning for Video Question Answering., , , , and . CoRR, (2024)Encounter Record Reduction Scheme based on Theoretical Contact Probability for Flooding Attack Mitigation in DTN., , , and . APCC, page 34-39. IEEE, (2018)An Empirical Study on News Recommendation in Multiple Domain Settings., and . MobiQuitous, volume 419 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 529-540. Springer, (2021)A Graph-Based Recommendation Model Using Contrastive Learning for Inductive Scenario., , and . ICMLA, page 174-181. IEEE, (2023)A Preprocessing Methodology by Using Additional Steganography on CNN-based Steganalysis., , , and . GLOBECOM, page 1-6. IEEE, (2020)Trust-based Verification Attack Prevention Scheme using Tendency of Contents Request on NDN., , , , and . APCC, page 159-164. IEEE, (2019)QWalkVec: Node Embedding by Quantum Walk., , , and . PAKDD (1), volume 14645 of Lecture Notes in Computer Science, page 93-104. Springer, (2024)