|
|
|
Soohyeon Choi and Dohoon Kim
Illegally filmed images, the sharing of non-consensually filmed images over social media, and the secret recording and distribution of celebrity images are increasing. To catch distributors of illegally filmed images, many investigation techniques based ...
ver más
|
|
|
|
|
|
Natasha Tanzila Monalisa,Shinthi Tasnim Himi,Nayeema Ferdous,Md. Ezharul Islam,Anup Majumder
Pág. pp. 97 - 112
Though in this modern society men and women are said to be given equal rights, having no gender discrimination, women are still considered weak and endlessly facing rape, domestic violence, eve-teasing, workplace violence, physical assault, cyberbullying...
ver más
|
|
|
|
|
|
Hayder Najm,Haider K. Hoomod,Rehab Hassan
Pág. pp. 184 - 199
The concept Web of Things (WoT) goes well beyond the emphasis on the Internet as a means of sharing data, instead of introducing all resources and connections involving computers, data, and people to the Web. It, therefore, focuses on a range of problems...
ver más
|
|
|
|
|
|
Kewei Ouyang, Yi Hou, Shilin Zhou and Ye Zhang
Recently, some researchers adopted the convolutional neural network (CNN) for time series classification (TSC) and have achieved better performance than most hand-crafted methods in the University of California, Riverside (UCR) archive. The secret to the...
ver más
|
|
|
|
|
|
Tao Liu, Bin Yan and Jeng-Shyang Pan
Visual secret sharing is a secret sharing scheme where the decryption requires no computation. It has found many applications in online transaction security, privacy protection, and bar code security, etc. Recently, researches have indicated that combini...
ver más
|
|
|