Author:
Jia Jun,Zhang Guojiang,Hu Chengbo,Zhang Zhaohui,Liu Ziquan
Publisher
Springer Science and Business Media LLC
Reference22 articles.
1. Arpa S, Süsstrunk S, Hersch RD (2017) Revealing information by averaging. J Opt Soc Am A Opt Image Sci Vis 34(5):743–751
2. Caviglione L, Gaggero M, Lalande JF (2017) Seeing the Unseen: revealing Mobile Malware Hidden Communications via Energy Consumption and Artificial Intelligence. IEEE Trans Inf Forensics Secur 11(4):799–810
3. Chang CC, Chen TS, Wang YK (2017) A reversible data hiding scheme based on absolute moment block truncation coding compression using exclusive OR operator. Multimedia Tools Appl 77(7):1–15
4. Deng X, Sun R, Yang H (2017) Data transmission method of pasture IOT based on opportunistic network. Trans Chin Soc Agric Mach 48(2):208–214
5. Gao JX, Wu XS, Gao W (2017) A summary of the research on electromagnetic induction contactless power transmission technology. J Power Supply 15(2):166–178
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Algorithmic Protection Study Based on a Virtual Location;Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering;2024