Peristalsis 发表于 2025-3-25 05:34:47

http://reply.papertrans.cn/48/4702/470137/470137_21.png

anticipate 发表于 2025-3-25 10:53:25

http://reply.papertrans.cn/48/4702/470137/470137_22.png

无意 发表于 2025-3-25 15:00:46

Ulpan Tokkozhina,Joao C Ferreira,Ana Lúcia Martins networks (SNs). One noticeable behaviour is taking pictures using smartphone cameras and sharing them with friends through online social platforms. On the downside, this has contributed to the growth of the cyber crime through SNs. In this paper, we present a method to extract the characteristic fi

dandruff 发表于 2025-3-25 16:29:00

http://reply.papertrans.cn/48/4702/470137/470137_24.png

CRAB 发表于 2025-3-25 23:25:06

http://reply.papertrans.cn/48/4702/470137/470137_25.png

palpitate 发表于 2025-3-26 01:51:00

http://reply.papertrans.cn/48/4702/470137/470137_26.png

muster 发表于 2025-3-26 05:21:03

Sandra P. Gonçalves,Joao C Ferreira,Ana Madureiras to check the awareness level and knowledge gap among email users with respect to the actions that need to be taken in case of scam email victimization, and awareness regarding common practices that are used in identifying scam email and types of online scam media. Most common actions mentioned by

骄傲 发表于 2025-3-26 08:48:32

ng attack, choosing an appropriate classifier for learning relevant information from speech feature is an important issue. In this paper, a GRU-SVM model for synthetic speech detection is proposed. The Gate Recurrent Unit (GRU) neural network is considered to learn the feature. The GRU can overcome

omnibus 发表于 2025-3-26 16:13:40

Carlos Carvalho,Ricardo Pessoa,Rui Josées such as median filtering to hide the obvious traces of these tampered images. Therefore, median filtering detection is one of the key technologies in the field of image forensics. Recently, with the rapid development of the deep learning, more and more researchers have proposed many image median

ALLEY 发表于 2025-3-26 19:11:45

Alexander Fazari,Maurizio Arnone,Cristiana Botta,Brunella Caroleo,Stefano Pensa are commonly used to cover fingerprints of falsification that does alter image content such as copy-move and splicing. Therefore image forensics researchers are interested in detecting these basic operations. Some existing detectors track local inconsistencies in statistics of the image. However th
页: 1 2 [3] 4 5 6
查看完整版本: Titlebook: Intelligent Transport Systems; 5th EAI Internationa Ana Lúcia Martins,Joao C Ferreira,Alexander Kocian Conference proceedings 2022 ICST Ins