不规则 发表于 2025-3-23 12:23:53

http://reply.papertrans.cn/15/1486/148547/148547_11.png

Mangle 发表于 2025-3-23 15:20:52

Performance Evaluation on Permission-Based Detection for Android Malware,ty of detecting malicious applications in Android operating system based on permissions. Compare against previous researches, we collect a relative large number of benign and malicious applications (124,769 and 480, respectively) and conduct experiments based on the collected samples. In addition to

conformity 发表于 2025-3-23 21:50:30

http://reply.papertrans.cn/15/1486/148547/148547_13.png

Interim 发表于 2025-3-23 23:24:12

Digital Watermarking Based on JND Model and QR Code Features, parts. First, Using JND Model to find the JND map of images and using Sobel operation to find contour of images. Second, find the area there QR Code will embed by scanning the JND map and contour of images with the mask. Finally, in order to hide QR Codes in Images, we adjust the pixel value in the

Osteons 发表于 2025-3-24 04:40:28

Multi-dimensional and Multi-level Histogram-Shifting-Imitated Reversible Data Hiding Scheme,limited to a fixed range, the visual quality of the stego-image is very good and is independent of the volume of the embedded data. In this paper, we have proposed an extra information-free multi-dimensional multi-layer data embedding scheme, which improves two aspects of Wang et al.’s scheme. First

Laconic 发表于 2025-3-24 10:35:29

http://reply.papertrans.cn/15/1486/148547/148547_16.png

植物学 发表于 2025-3-24 14:04:17

Theoretical Analysis and Realistic Implementation of Secure Servers Switching System,ons with endless streams of security mechanisms should be employed attentively to reduce the loss of data due to successful intrusion attacks on any system. This paper focus on the implementation of an embedded system technology developed in a host control module group in which the entire server ach

易于交谈 发表于 2025-3-24 16:21:14

Design and Implementation of a Self-growth Security Baseline Database for Automatic Security Auditiseline database a crucial research domain. In this paper, we proposed a security baseline database to assist information security auditors to maintain the security update patch baseline automatically with the help of the Microsoft knowledge base and automatic audit process. A practical implementatio

止痛药 发表于 2025-3-24 19:04:41

Conference proceedings 2013ea are growing rapidly due to many successful applications and new theories derived from many diverse problems. This book is dedicated to the Intelligent Systems and Applications in many different aspects. In particular, this book is to provide highlights of the current research in Intelligent Syste

exacerbate 发表于 2025-3-25 01:59:58

http://reply.papertrans.cn/15/1486/148547/148547_20.png
页: 1 [2] 3 4 5 6
查看完整版本: Titlebook: Advances in Intelligent Systems and Applications - Volume 2; Proceedings of the I Jeng-Shyang Pan,Ching-Nung Yang,Chia-Chen Lin Conference