Effects of Image Processing Operations on Adversarial Noise and Their Use in Detecting and Correcting Adversarial Images | 0 | 0.34 | 2022 |
Coded DNN Watermark: Robustness against Pruning Models Using Constant Weight Code | 0 | 0.34 | 2022 |
A Fingerprint-Based Indoor Localization System Using IEEE 802.15.4 for Staying Room Detection | 0 | 0.34 | 2022 |
Detecting Deepfake Videos using Digital Watermarking | 0 | 0.34 | 2021 |
A Proposal of Air-Conditioning Guidance System Using Discomfort Index. | 0 | 0.34 | 2020 |
A Generalized Tcp Fairness Control Method For Multiple-Host Concurrent Communications In Elastic Wlan System Using Raspberry Pi Access Point | 0 | 0.34 | 2020 |
A Calligraphy Learning Assistant System with Letter Portion Practice Function Using Projection Mapping | 0 | 0.34 | 2020 |
A Proposal Of Calligraphy Learning Assistant System With Letter Portion Practice Function Using Projection Mapping | 0 | 0.34 | 2020 |
Survey On Decentralized Fingerprinting Solutions: Copyright Protection Through Piracy Tracing | 0 | 0.34 | 2020 |
A Proposal of Transmission Power Optimization Method for Concurrently Communicating Two Access-Points in Wireless Local-Area Network | 0 | 0.34 | 2020 |
A Proposal Of Android Programming Learning Assistant System With Implementation Of Basic Application Learning | 1 | 0.63 | 2020 |
Web-Server Implementation of Code Completion Problem for Java Programming Learning Assistant System. | 0 | 0.34 | 2019 |
Robust And Secure Data Hiding For Pdf Text Document | 0 | 0.34 | 2019 |
Advanced Searchable Encryption: An Adaptively Secure Keyword Search for Matrix-type Storages. | 0 | 0.34 | 2019 |
Efficient and error-tolerant schemes for non-adaptive complex group testing and its application in complex disease genetics. | 0 | 0.34 | 2019 |
Reversible Data Hiding in PDF Document Exploiting Prefix Zeros in Glyph Coordinates | 0 | 0.34 | 2019 |
Improved encoding and decoding for non-adaptive threshold group testing. | 0 | 0.34 | 2019 |
Throughput Measurement and Estimation Model for Concurrent Communications of Multiple Raspberry Pi Access-Points in Wireless Local-Area Network. | 0 | 0.34 | 2019 |
An Informative Test Code Approach in Code Writing Problem for Java Collections Framework in Java Programming Learning Assistant System. | 0 | 0.34 | 2019 |
Enhancements Of Minimax Access-Point Setup Optimisation Approach For Ieee 802.11 Wlan | 0 | 0.34 | 2019 |
Improved DM-QIM Watermarking Scheme for PDF Document. | 0 | 0.34 | 2019 |
Efficient Decentralized Tracing Protocol for Fingerprinting System with Index Table | 0 | 0.34 | 2019 |
Advanced Searchable Encryption: Keyword Search for Matrix-Type Storage | 0 | 0.34 | 2018 |
Bias-Based Binary Fingerprinting Code Under Erasure Channel. | 0 | 0.34 | 2018 |
Efficient (nonrandom) construction and decoding of non-adaptive group testing. | 2 | 0.38 | 2018 |
Universal Scoring Function Based On Bias Equalizer For Bias-Based Fingerprinting Codes | 1 | 0.37 | 2018 |
Efficiently Decodable Non-Adaptive Threshold Group Testing. | 4 | 0.44 | 2018 |
Efficient Decoding Algorithm for Cyclically Permutable Code | 0 | 0.34 | 2018 |
Efficient Decoding Schemes for Noisy Non-Adaptive Group Testing when Noise Depends on Number of Items in Test. | 1 | 0.38 | 2018 |
Fingerprinting for multimedia content broadcasting system. | 0 | 0.34 | 2018 |
Sublinear decoding schemes for non-adaptive group testing with inhibitors. | 0 | 0.34 | 2018 |
A framework for generalized group testing with inhibitors and its potential application in neuroscience. | 2 | 0.38 | 2018 |
Dynamic Access-Point Configuration Approach for Elastic Wireless Local-Area Network System and Its Implementation Using Raspberry Pi. | 0 | 0.34 | 2018 |
Estimation of Collusion Attack in Bias-based Binary Fingerprinting Code. | 0 | 0.34 | 2018 |
Reversible data hiding based compressible privacy preserving system for color image. | 0 | 0.34 | 2018 |
A Throughput Estimation Model Under Two-Link Concurrent Communications With Partially Overlapping Channels And Its Application To Channel Assignment In Ieee 802.11n Wlan | 1 | 0.43 | 2018 |
Secure data management system with traceability against internal leakage. | 0 | 0.34 | 2017 |
Information Hiding And Its Criteria For Evaluation | 2 | 0.37 | 2017 |
Dynamic Access-Point Configuration Approach for Elastic Wireless Local-Area Network System | 1 | 0.35 | 2017 |
Obfuscation in digital fingerprinting. | 0 | 0.34 | 2017 |
Aesthetic Qr Code Based On Modified Systematic Encoding Function | 2 | 0.42 | 2017 |
A Proposal of Software Architecture for Java Programming Learning Assistant System | 0 | 0.34 | 2017 |
Dct-Ofdm Watermarking Scheme Based On Communication System Model | 0 | 0.34 | 2017 |
A Minimax Approach for Access Point Setup Optimization in IEEE 802.11n Wireless Networks. | 0 | 0.34 | 2017 |
Non-Adaptive Group Testing Framework based on Concatenation Code. | 0 | 0.34 | 2017 |
A Minimax Approach for Access-Point Setup Optimization Using Throughput Measurements in IEEE802.11n Wireless Networks | 0 | 0.34 | 2016 |
Simple Countermeasure To Non-Linear Collusion Attacks Targeted For Spread-Spectrum Fingerprinting Scheme | 1 | 0.37 | 2016 |
A proposal of three extensions in blank element selection algorithm for Java programming learning assistant system | 0 | 0.34 | 2016 |
Worker Pc Performance Measurements Using Benchmarks For User-Pc Computing System | 0 | 0.34 | 2016 |
Throughput Measurements For Access-Point Installation Optimization In Ieee802.11n Wireless Networks | 0 | 0.34 | 2016 |