Search

Your search keyword '"Computer Science::Multimedia"' showing total 7,380 results

Search Constraints

Start Over You searched for: Descriptor "Computer Science::Multimedia" Remove constraint Descriptor: "Computer Science::Multimedia" Publication Year Range Last 10 years Remove constraint Publication Year Range: Last 10 years
7,380 results on '"Computer Science::Multimedia"'

Search Results

1. Nash Equilibrium Control Policy Against Bus-off Attacks in CAN Networks

2. Input-Output History Feedback Controller for Encrypted Control With Leveled Fully Homomorphic Encryption

3. Robust Digital Image Encryption Approach Based on Extended Large-Scale Randomization Key-Stream Generator

4. State Estimation Under Joint False Data Injection Attacks: Dealing With Constraints and Insecurity

5. Worst-Case Stealthy Innovation-Based Linear Attacks on Remote State Estimation Under Kullback–Leibler Divergence

6. Multiview PCA: A Methodology of Feature Extraction and Dimension Reduction for High-Order Data

7. Stealth Data Injection Attacks with Sparsity Constraints

8. Compressed sensing based fingerprint imaging system using a chaotic model-based deterministic sensing matrix

9. An FPP-resistant SVD-based image watermarking scheme based on chaotic control

10. HERS: Homomorphically Encrypted Representation Search

11. Performance Analysis for Covert Communications Under Faster-Than-Nyquist Signaling

12. Can we Bring EM Enhancement to the Multi-wavelength Scale?*

13. Audio Bank: A High-Level Acoustic Signal Representation for Audio Event Recognition

14. Uniform modelling of the stellar density of thirteen tidal streams within the Galactic halo

15. Image Encryption Algorithm Based on Artificial Bee Colony Algorithm and Chaotic System

16. Fuzzified Contrast Enhancement for Nearly Invisible Images

17. Detection of Double JPEG Compression With the Same Quantization Matrix via Convergence Analysis

18. Kullback–Leibler-Divergence-Based Attacks Against Remote State Estimation in Cyber-Physical Systems

19. Stochastic Denial-of-Service Attack Allocation in Leader-Following Multiagent Systems

20. Exploring Stable Coefficients on Joint Sub-Bands for Robust Video Watermarking in DT CWT Domain

21. Worst-Case Stealthy Attacks on Stochastic Event-Based State Estimation

22. Wireless Sensor Network Security Based on Improved Identity Encryption

23. A truncated SVD-based ARIMA model for multiple QoS prediction in mobile edge computing

24. Modeling and analysis of electromagnetic force in interior permanent magnet synchronous motor used for electric vehicles

25. Automatic detection of low surface brightness galaxies from Sloan Digital Sky Survey images

26. Robust Watermarking Algorithm against the Geometric Attacks based on Non-Subsampled Shearlet Transform and Harris-Laplace Detector

27. Robust color image watermarking using multiple fractional-order moments and chaotic map

28. Convolutional Code Theory based Steganography Technique

29. Forensic Analysis of JPEG-Domain Enhanced Images via Coefficient Likelihood Modeling

30. Noise Removal in Embedded Image With Bit Approximation

31. Privacy-Preserving QoS Forecasting in Mobile Edge Environments

32. Adaptive scaling factors based on the impact of selected DCT coefficients for image watermarking

33. Optimal Stealthy Linear Attack on Remote State Estimation With Side Information

34. An enhanced time efficient technique for image watermarking using ant colony optimization and light gradient boosting algorithm

35. Enhanced Lorenz-Chaotic Encryption Method for Partial Medical Image Encryption and Data Hiding in Big Data Healthcare

36. Efficient Hybrid DCT-Wiener Algorithm Based Deep Learning Approach For Semantic Shape Segmentation

37. Quantum Attacks on 1K-AES and PRINCE

38. A New Image Encryption Algorithm Based on Multi Chaotic System

39. A Proposed Technique for Gray Image Colorization

40. Nature Inspired Algorithm for Pixel Location Optimization in Video Steganography Using Deep RNN

41. STPD: Defending against ℓ0-norm attacks with space transformation

42. Modified Multiway Pixel-Value Differencing Methods Based on General Quantization Ranges for Image Steganography

43. A novel application on mutually orthogonal graph squares and graph-orthogonal arrays

44. Fourier Series Approximation of Tensor Green’s Function in Biaxial Anisotropic Media

45. Cryptographic switching functions for multiplicative watermarking in cyber-physical systems

46. Image encryption based on logistic chaotic systems and deep autoencoder

47. Combination of SIFT and Canny Edge Detection for Registration Between SAR and Optical Images

48. A Reinforcement-Learning-Based Energy-Efficient Framework for Multi-Task Video Analytics Pipeline

49. Lossless White Balance for Improved Lossless CFA Image and Video Compression

50. Enhancing MIMO Covert Communications via Intelligent Reflecting Surface

Catalog

Books, media, physical & digital resources