Search

Your search keyword '"Data_MISCELLANEOUS"' showing total 26,820 results

Search Constraints

Start Over You searched for: Descriptor "Data_MISCELLANEOUS" Remove constraint Descriptor: "Data_MISCELLANEOUS"
26,820 results on '"Data_MISCELLANEOUS"'

Search Results

1. Saliency Attack: Towards Imperceptible Black-box Adversarial Attack

2. Multi-Use Trust in Crowdsourced IoT Services

3. Noiseless Privacy: Definition, Guarantees, and Applications

4. A comprehensive survey on the biometric systems based on physiological and behavioural characteristics

5. An efficient data flow material model based cloud authentication data security and reduce a cloud storage cost using Index-level Boundary Pattern Convergent Encryption algorithm

6. Theoretical analysis on applications aspects of smart materials preserving the security and privacy in medical big data and cloud

7. Robust image watermarking using the social group optimization algorithm

8. Application of Algorithmic Cognitive Decision Trust Modeling for Cyber Security Within Organisations

9. Application of Watermarking Technology based on Deep Learning in Face Recognition

10. The scINSIGHT Package for Integrating Single-Cell RNA-Seq Data from Different Biological Conditions

11. Spatio-Temporal Context Based Adaptive Camcorder Recording Watermarking

12. iMag+: An Accurate and Rapidly Deployable Inertial Magneto-Inductive SLAM System

13. A Survey on Integrity Auditing for Data Storage in the Cloud: From Single Copy to Multiple Replicas

14. Identity-Certifying Authority-Aided Identity-Based Searchable Encryption Framework in Cloud Systems

15. Anticipated emotions associated with trust in autonomous vehicles

16. (In)secure Acoustic Mobile Authentication

17. PrivFace: Fast Privacy-Preserving Face Authentication With Revocable and Reusable Biometric Credentials

18. A Hybrid robust watermarking system based on discrete cosine transform, discrete wavelet transform, and singular value decomposition

19. Anonymous Authenticated Key Agreement and Group Proof Protocol for Wearable Computing

20. Embedding Guided End-to-End Framework for Robust Image Watermarking

21. Seam Carving based visible watermarking robust to removal attacks

22. Privacy-Preserving and Collusion-Resistant Charging Coordination Schemes for Smart Grids

23. Real-Time Performance-Focused Localization Techniques for Autonomous Vehicle: A Review

24. Guessing Based on Compressed Side Information

25. Demonstrating Eye Movement Biometrics in Virtual Reality

26. There is an elephant in the room: towards a critique on the use of fairness in biometrics

27. Sequential subspace estimator for an efficient multibiometrics authentication and encryption

28. Biometric-based Remote Mutual Authentication Scheme for Mobile Device

29. Detecting Digital Watermarking Image Attacks Using a Convolution Neural Network Approach

30. Joint Pricing and Security Investment in Cloud Security Service Market With User Interdependency

31. Watermarking-Based Secure Plaintext Image Protocols for Storage, Show, Deletion and Retrieval in the Cloud

32. Security in Cloud: From Individual to Multi Cloud

33. Anonymization of Quasi-Sensitive Attribute Sets in Aggregated Dataset

34. Finger Print Based ATM System

35. Comprehensive Review on Video Watermarking Security Threats, Challenges, and Its Applications

36. A Novel Image Watermarking Method Against Crop Attack Using Two-Step Sudoku Puzzle

37. Accountable Monero System with Privacy Protection

38. Scrutiny on colour psychology by utilising colour wheel to determine its effect on gen Z for website design

39. A Blockchain-Based Location Privacy-Preserving Scheme in Location-Based Service

40. Improved l-diversity: Scalable anonymization approach for Privacy Preserving Big Data Publishing

41. A Secured Authentication Technique-3D Password

42. Privacy Preserving Bio-Metric Authentication

43. Multi Cloud Data Hosting with SIC Architecture

44. Spectral-Loc

45. Overview of Anonymous Authentication in Mobile Communication

46. Design and Implementation of Multiple Biometrics Recognition Using Personal Identification System

47. Robust Watermarking Algorithm against the Geometric Attacks based on Non-Subsampled Shearlet Transform and Harris-Laplace Detector

48. Biometric Cloud Services for Web-Based Examinations

49. Optimal Colour Image Watermarking Using Neural Networks and Multiobjective Memetic Optimization

50. 言語景観としての車ステッカーのスタイル

Catalog

Books, media, physical & digital resources