每週二報 報告紀錄
回首頁
帳號: 密碼:
上傳報告 登出
報告日期 論文標題 論文期刊 論文作者 報告者 分類 下載次數
2018-04-19Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategySignal Processing, Volume 138, April 2017, pp. 280-393Chuan Qin, Ping Ji, Xinpeng Zhang, Jing Dong, Jinwei Wang​何思亮image16
2018-04-19Outsourcing secret sharing scheme based on homomorphism encryptionIET Information security, Vol.12, pp. 94-99, 2017En Zhang, Jie Peng, Ming LI胡慧丹security23
2018-04-19Outsourcing secret sharing scheme based on homomorphism encryptionIET Information securityEn Zhang, Jie Peng, Ming LI胡慧丹security9
2018-04-12A Novel NTRU-Based Handover Authentication Scheme for Wireless NetworksIEEE Communications Letters, Vol. 22, No. 3, March 2018Rui Chen and Dezhong PengNguyen Ngoc Tusecurity16
2018-04-12Multi-Task Learning for Intrusion Detection on Web LogsJournal of Systems Architecture, vol. 81, pp. 92-100, November 2017Bo Li, Ying Lin, Simin Zhang李坤印other42
2018-03-29Separable and error-free reversible data hiding in encrypted imagesSignal Processing, 2016, 123:9-21.DawenXu, RangdingWang 謝小竹image51
2018-03-29An Efficient Fusion-Based DefoggingIEEE Transactions on Image Processing, Vol. 26, No. 9, pp. 4217-4227, Sep. 2017.Jing-Ming Guo, Jin-yu Syue, Vincent R. Radzicki, and Hua Lee李心瑜image35
2018-03-22An efficient reversible data hiding algorithm using two steganographic imagesSignal Processing, vol. 126, pp. 98-109,  November 2016lyad F.Jafar , Khalid A.Darabkh , Read T.AI-Zubi and Ramzi R.Saifan石家碩image52
2018-03-22TrustChain: A Sybil-resistant scalable blockchainFuture Generation Computer Systems, Article in Press, Sep. 2017Pim Otte, Martijn de Vos, and Johan Pouwelse楊仁凱security63
2018-03-15CloudBot: Advanced mobile botnets using ubiquitous cloud technologiesPervasive and Mobile Computing, vol. 41, pp. 270-285, October 2017Wei Chen, Xiapu Luo, Chengyu Yin, Bin Xiao, Man Ho Au, Yajuan Tang周澤捷other49
2018-03-15Separable reversible data hiding in encrypted image based on pixel value ordering and additive homomorphismJ. Vis. Commun. Image R. 45 (2017) 1–10Di Xiao, Yanping Xiang, Hongying Zheng, Yong Wang曾群丰image58
2018-03-08Learning Optimal Seeds for Ranking SaliencyCognitive Computation, pp. 1-12, Dec. 2017Huiling Wang, Lixiang Xu, Xiaofeng Wang, and Bin Luo粘育維image67
2018-03-08Hybrid Data Hiding Scheme Using Right-Most Digit Replacement and Adaptive Least Significant Bit for Digital ImagesSymmetry, vol. 8, no. 6, June 2016. Mehdi Hussain, Ainuddin Wahid Abdul Wahab, Noman,Javed and Ki-Hyun Jung林江毅image62
2018-03-01A novel reversible data hiding method with image contrast enhancement Signal Processing: Image Communication, March 2018, Pages 64-73 Hao-Tian Wu, Shaohua Tang, Jiwu Huang, Yun-Qing Shi王資猛image53
2018-03-01Cropping-resilient 3D mesh watermarking based on consistent segmentation and mesh steganalysisMultimedia Tools and Applications, pp. 1-28, Mar. 2017Han-Ul Jang, Hak-Yeol Choi, Jeongho Son, Dongkyu Kim, Jong-Uk Hou, Sunghee Choi, and Heung-Kyu Lee劉潔image60
[上一頁]
1/14 頁 [下一頁]