subject area of
- A Robust Image Encryption Algorithm Based on a 32-bit Chaotic System
- A new protocol to counter online dictionary attacks
- Achieving Privacy-Preserving Group Recommendation with Local Differential Privacy and Random Transmission
- Adaptive selection of coefficient's portions in the transform domain watermarking
- An evaluation of void-filling interpolation methods for SRTM data
- An example of decision support for trypanosomiasis control using a geographical information system in eastern Zambia.
- An image encryption scheme based on precision limited chaotic system
- Dynamic Connection-Based Social Group Recommendation
- Hierarchically defining Internet of Things security: From CIA to CACA
- How to solve a multicriterion problem for which Pareto dominance relationship cannot be applied? A case study from medicine
- Mining Frequent Items Over the Distributed Hierarchical Continuous Weighted Data Streams in Internet of Things
- Novel Symbol Timing Recovery Algorithm for Multi-level Signal
- Real-time context-aware social media recommendation
- Rebalancing the car-sharing system with reinforcement learning
- Retro-conversion exercise in an online thesaurus environment: A post card-catalogue conversion experience at the International Institute of Tropical Agriculture in Ibadan
- Security Measurement for Unknown Threats Based on Attack Preferences
- Spot evasion attacks: Adversarial examples for license plate recognition systems with convolutional neural networks
- Stock index modeling using Hierarchical Radial Basis Function Networks
- Tell me who you are and I will tell you which SNS you use: SNSs participation
- The QoS and privacy trade-off of adversarial deep learning: An evolutionary game approach
- Using auxiliary information to adjust fuzzy membership functions for improved mapping of soil qualities
- Working with activity theory: Context, technology, and information behavior
- Wrapper for building classification models using Covering Arrays