Behavior Steganography in Social Network via Secret Sharing

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:ICAIS (8. : 2022 : Qinghai) Artificial intelligence and security ; Part 3
1. Verfasser: Zhu, Xuan (VerfasserIn)
Weitere Verfasser: Mo, Qun (VerfasserIn), Li, Fengyong (VerfasserIn), Zhang, Lei (VerfasserIn), Qin, Chuan (VerfasserIn)
Pages:3
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2022
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Intrusion Detection Model Based on KNN-AE-DNN 2022 Chen, Hongtao
A Vulnerability Detection Algorithm Based on Transformer Model 2022 Hou, Fujin
Research on Offense and Defense of DDos Based on Evolutionary Game Theory 2022 Zhao, Tengteng
An Improved Image Authentication Method Using QR Code Watermarking Approach 2022 Liu, Xiaomei
Effect of Language Mixture on Speaker Verification: An Investigation with Amharic, English, and Mandarin Chinese 2022 Tadele, Firew
A Scheme to Improve the Security of IoT Communication 2022 Fu, Junjie
Multi-level Federated Learning Mechanism with Reinforcement Learning Optimizing in Smart City 2022 Guo, Shaoyong
A Cyberspace Security Knowledge System Based on Knowledge Graph 2022 Ma, Bin
A Data Reconciliation Model Based on QLDPC for Satellite-Ground Quantum Key Distribution Network 2022 Zhou, Wenting
Spatial Image Steganography Using a Correlational Model 2022 Ni, Jiangqun
Blockchain Enable IoT Using Deep Reinforcement Learning: A Novel Architecture to Ensure Security of Data Sharing and Storage 2022 Bai, Xuetao
A Binary Code Vulnerability Mining Method Based on Generative Adversarial Networks 2022 Lai, Ji
Efficiency Improvement Method of Flyback Switching Power Supply Based on Quasi-Resonance 2022 Liu, Jianbin
A New Transparent File Encryption Method Based on SM4 for Android Platform 2022 Li, Yuheng
Multi-objective Dual-Route Planning Algorithm for Grid Communication Network 2022 Gou, Xiaojun
A Routing Algorithm for Node Protection in Wireless Sensor Network Based on Clustering Ant Colony Strategy 2022 Feng, Xiao
Blockchain-Based Efficient Incentive Mechanism in Crowdsensing 2022 Jiang, Qiulu
An Efficient Certificate-Based Encryption Scheme Without Random Oracles 2022 Guo, Lan
A Rational Hierarchical Quantum State Sharing Protocol 2022 Zhang, Huali
Multi-carrier Steganography Algorithm Based on Executable Program 2022 Tian, Zuwei
Alle Artikel auflisten