驾驶 发表于 2025-3-27 00:16:48

A Novel Method for Detecting Double Compressed Facebook JPEG Imagespose an algorithm to infer whether the given image is double compressed without referring to the original image. To demonstrate the correctness of our algorithm, we correctly predict the number of compressions being applied to a Facebook image.

inveigh 发表于 2025-3-27 04:01:08

1865-0929 ional Conference on Applications and Techniques in Information Security, ATIS 2014, held in Melbourne, Australia, in November 2014. The 16 revised full papers and 8 short papers presented were carefully reviewed and selected from 56 submissions. The papers are organized in topical sections on applic

CLAY 发表于 2025-3-27 09:03:28

http://reply.papertrans.cn/16/1593/159236/159236_33.png

漂泊 发表于 2025-3-27 10:47:35

http://reply.papertrans.cn/16/1593/159236/159236_34.png

foreign 发表于 2025-3-27 15:36:21

Popularity Prediction of Tianya BBS Posts Based on User Behaviorts consisting of posts on Tianya BBS. Our experimental results show that the prediction accuracy is significantly improved with existing methods. We also analyze the influence of the temporal waveform of information diffusion for the linear prediction model.

Afflict 发表于 2025-3-27 20:05:15

http://reply.papertrans.cn/16/1593/159236/159236_36.png

Modify 发表于 2025-3-28 00:07:23

http://reply.papertrans.cn/16/1593/159236/159236_37.png

极大的痛苦 发表于 2025-3-28 03:45:53

https://doi.org/10.1057/9780230502581rity model for enhancing Android security. Our security framework assigns security level to application at installation and performs runtime monitoring. We describe an implementation of our security framework, and finally evaluate the security and performance.

HEDGE 发表于 2025-3-28 08:32:55

Emotion and the Contemporary Museume feature information of the target surface is extracted. The result of simulation shows that the target surface information extraction algorithm for chest bitmap is characterized by low-complexity, short time-consuming and high efficiency, and meets the real-time requirement.

PANEL 发表于 2025-3-28 14:04:02

http://reply.papertrans.cn/16/1593/159236/159236_40.png
页: 1 2 3 [4] 5 6 7
查看完整版本: Titlebook: Applications and Techniques in Information Security; International Confer Lynn Batten,Gang Li,Matthew Warren Conference proceedings 2014 Sp