Posts

old
Attacking LSB Based Image Steganographic Technique Seminar Report

Attacking LSB Based Image Steganographic Technique Semi...

Attacking LSB Based Image Steganographic Technique Seminar Report

old
A New Robust Approach for Reversible Database Watermarking with Distortion Control

A New Robust Approach for Reversible Database Watermark...

A New Robust Approach for Reversible Database Watermarking with Distortion Control

old
A New Formulation of Linear Discriminant Analysis for Robust Dimensionality Reduction

A New Formulation of Linear Discriminant Analysis for R...

A New Formulation of Linear Discriminant Analysis for Robust Dimensionality Redu...

old
Advancing the State-of-the-Art in Hardware Trojans Detection

Advancing the State-of-the-Art in Hardware Trojans Dete...

Advancing the State-of-the-Art in Hardware Trojans Detection

old
MOBILE COMPUTING 2013

MOBILE COMPUTING 2013

MOBILE COMPUTING 2013

old
Exemplar-Based Recursive Instance Segmentation With Application to Plant Image Analysis

Exemplar-Based Recursive Instance Segmentation With App...

Exemplar-Based Recursive Instance Segmentation With Application to Plant Image A...

old
Residual Learning for Salient Object Detection

Residual Learning for Salient Object Detection

Residual Learning for Salient Object Detection

old
A New Probabilistic Output Constrained Optimization Extreme Learning Machine

A New Probabilistic Output Constrained Optimization Ext...

A New Probabilistic Output Constrained Optimization Extreme Learning Machine

old
Automatic First Arrival Picking via Deep Learning With Human Interactive Learning

Automatic First Arrival Picking via Deep Learning With ...

Automatic First Arrival Picking via Deep Learning With Human Interactive Learning

old
Deep Neural Networks for In Situ Hybridization Grid Completion and Clustering

Deep Neural Networks for In Situ Hybridization Grid Com...

Deep Neural Networks for In Situ Hybridization Grid Completion and Clustering

old
Guest Editorial Special Section on Emerging Privacy and Security Issues Brought by Artificial Intelligence in Industrial Informatics

Guest Editorial Special Section on Emerging Privacy and...

Guest Editorial Special Section on Emerging Privacy and Security Issues Brought ...

old
Machine-Learning Algorithms for Mapping Debris-Covered Glaciers The Hunza Basin Case Study

Machine-Learning Algorithms for Mapping Debris-Covered ...

Machine-Learning Algorithms for Mapping Debris-Covered Glaciers The Hunza Basin ...

old
Profiling Users Behavior and Identifying Important Features Helpfulness

Profiling Users Behavior and Identifying Important Feat...

Profiling Users Behavior and Identifying Important Features Helpfulness

old
Torque Ripple Reduction of PMSMs Using a Novel Angle-Based Repetitive Observer

Torque Ripple Reduction of PMSMs Using a Novel Angle-Ba...

Torque Ripple Reduction of PMSMs Using a Novel Angle-Based Repetitive Observer

old
An Analysis of the Thermal Interaction Between Components in Power Converter Applications

An Analysis of the Thermal Interaction Between Componen...

An Analysis of the Thermal Interaction Between Components in Power Converter App...

old
Identifying Optimal Portfolios of Resilient Network Investments Against Natural Hazards With Applications to Earthquakes

Identifying Optimal Portfolios of Resilient Network Inv...

Identifying Optimal Portfolios of Resilient Network Investments Against Natural ...