Author:
Subramanian Nandhini,Elharrouss Omar,Al-Maadeed Somaya,Abou El-Seoud M. Samir
Publisher
Springer International Publishing
Reference31 articles.
1. Al-Khater, W., Al-Ma’adeed, S., Ahmed, A., Sadiq, A., Khan, K.: Comprehensive review of cybercrime detection techniques. IEEE Access 8, 137293–137311 (2020). https://doi.org/10.1109/ACCESS.2020.3011259
2. Al-Khater, W., Kunhoth, S., Al-ma’adeed, S.: A review on radio frequency identification methods. In: 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC), pp. 1751–1758, June 2017. https://doi.org/10.1109/IWCMC.2017.7986549
3. Ali, M.A., Jaoua, A., Al-Maadeed, S.A.: A novel conceptual machine learning method using random conceptual decomposition. In: 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT), pp. 18–22 (2020)
4. Baluja, S.: Hiding images in plain sight: deep steganography. In: Advances in Neural Information Processing Systems, pp. 2069–2079 (2017)
5. Chu, C., Zhmoginov, A., Sandler, M.: Cyclegan, a master of steganography. arXiv preprint arXiv:1712.02950 (2017)
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. AI and Network Security Curricula: Minding the Gap;2024 IEEE Global Engineering Education Conference (EDUCON);2024-05-08
2. Convolutional Autoencoders-Based Image Watermarking Techniques;2023 International Conference of Computer Science and Information Technology (ICOSNIKOM);2023-11-10
3. Video steganography: recent advances and challenges;Multimedia Tools and Applications;2023-04-04
4. End-to-End Image Steganography Using Deep Convolutional Autoencoders;IEEE Access;2021