Results
Found 234 publication records. Showing 234 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
32 | Xiang-Yang Li 0001, Yanwei Wu, Ping Xu, Guihai Chen, Mo Li 0001 |
Hidden information and actions in multi-hop wireless ad hoc networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiHoc ![In: Proceedings of the 9th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc 2008, Hong Kong, China, May 26-30, 2008, pp. 283-292, 2008, ACM, 978-1-60558-073-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
ad hoc networks, selfish, hidden-information, truthful mechanism, hidden action |
31 | Lingyun Xiang, Xingming Sun, Gang Luo, Can Gan |
Research on Steganalysis for Text Steganography Based on Font Format. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Third International Symposium on Information Assurance and Security, IAS 2007, August 29-31, 2007, Manchester, United Kingdom, pp. 490-495, 2007, IEEE Computer Society, 978-0-7695-2876-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Font format, Hidden information length, Support vector machine, Steganalysis, Text |
27 | Thanasis G. Papaioannou, George D. Stamoulis |
Reputation-Based Estimation of Individual Performance in Grids. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCGRID ![In: 8th IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2008), 19-22 May 2008, Lyon, France, pp. 500-509, 2008, IEEE Computer Society, 978-0-7695-3156-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
collective performance, grid, reputation, hidden information |
26 | Zouheir Trabelsi, Hesham El-Sayed, Lilia Frikha, Tamer Rabie |
Traceroute Based IP Channel for Sending Hidden Short Messages. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security, First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006, Proceedings, pp. 421-436, 2006, Springer, 3-540-47699-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
IP header Record route option, Steganalysis, Covert channel, Traceroute, Hidden information |
26 | Yufeng Wang 0001, Yoshiaki Hori, Kouichi Sakurai |
On Characterizing Economic-Based Incentive-Compatible Mechanisms to Solving Hidden Information and Hidden Action in Ad Hoc Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UIC ![In: Ubiquitous Intelligence and Computing, 4th International Conference, UIC 2007, Hong Kong, China, July 11-13, 2007, Proceedings, pp. 382-391, 2007, Springer, 978-3-540-73548-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Dimitrios I. Rigas, James L. Alty, F. W. Long |
Can music support interfaces to complex databases? ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROMICRO ![In: 23rd EUROMICRO Conference '97, New Frontiers of Information Technology, 1-4 September 1997, Budapest, Hungary, pp. 78-, 1997, IEEE Computer Society, 0-8186-8129-2. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
complex database interfaces, graphical browsing application, PCTE OMS, music support, graphical browsing displays, simple musical messages, software engineering database, Portable Common Tool Environment Object Management System, user interfaces, multimedia, programming environments, communication channel, hidden information |
23 | Jinping Li, Yanbin Han, Hongbo Zhong, Jianqin Yin |
A universal scheme of hidden information detection from original signals via wavelet neural networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICARCV ![In: 8th International Conference on Control, Automation, Robotics and Vision, ICARCV 2004, Kunming, China, 6-9 December 2004, Proceedings, pp. 2264-2269, 2004, IEEE, 0-7803-8653-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
23 | Li Lin 0008, Jinpeng Huai, Yanmin Zhu, Chunming Hu, Xianxian Li |
A Multi-agents Contractual Approach to Incentive Provision in Non-cooperative Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OTM Conferences (1) ![In: On the Move to Meaningful Internet Systems: OTM 2008, OTM 2008 Confederated International Conferences, CoopIS, DOA, GADA, IS, and ODBASE 2008, Monterrey, Mexico, November 9-14, 2008, Proceedings, Part I, pp. 231-248, 2008, Springer, 978-3-540-88870-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Non-cooperative network, incentive contracts, unique implementation, mechanism design, collusion, hidden-information, hidden-action |
20 | Michal Feldman, John Chuang, Ion Stoica, Scott Shenker |
Hidden-action in multi-hop routing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EC ![In: Proceedings 6th ACM Conference on Electronic Commerce (EC-2005), Vancouver, BC, Canada, June 5-8, 2005, pp. 117-126, 2005, ACM, 1-59593-049-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
principal-agent model, routing, mechanism design, contracts, incentives, multi-hop, hidden-action, moral-hazard |
19 | Joseph A. Goguen, Grigore Rosu |
Composing Hidden Information Modules over Inclusive Institutions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Essays in Memory of Ole-Johan Dahl ![In: From Object-Orientation to Formal Methods, Essays in Memory of Ole-Johan Dahl, pp. 96-123, 2004, Springer, 3-540-21366-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
19 | Sheng Huang, Jian Kang Wu |
Optical Watermarking for Printed Document Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 2(2), pp. 164-173, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Arnaldo de Albuquerque Araújo, Bernardo Moreira De Faria, Helton J. Rees, Marco Aurélio R. Silva |
Enhancing Microscope Biological Images with DIP Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIBGRAPI ![In: 13th Brazilian Symposium on Computer Graphics and Image Processing (SIBGRAPI 2000), 17-20 October 2000, Gramado (RS), Brazil, pp. 349, 2000, IEEE Computer Society, 0-7695-0878-2. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
biological image enhancement, nervous system, laser-scanning confocal microscope, digital image processing techniques, cell nucleus, nervous terminations, nonideal image acquisition, error elimination, nonuniform brightness, image artifacts, regions of interest, neurophysiology, microscope images, hidden information, image noise |
18 | Huajun Huang, Xingming Sun, Zishuai Li, Guang Sun |
Detection of Hidden Information in Webpage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSKD (4) ![In: Fourth International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2007, 24-27 August 2007, Haikou, Hainan, China, Proceedings, Volume 4, pp. 317-321, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Tapio Seppänen, Kaisu Mäkelä, Anja Keskinarkaus |
Hiding Information in Color Images Using Small Color Palettes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, Third International Workshop, ISW 2000, Wollongong, NSW, Australia, December 20-21, 2000, Proceedings, pp. 69-81, 2000, Springer, 3-540-41416-9. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
17 | Patrick W. Schmitz |
On the Interplay of Hidden Action and Hidden Information in Simple Bilateral Trading Problems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Econ. Theory ![In: J. Econ. Theory 103(2), pp. 444-460, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
16 | Keye Martin |
Steganographic Communication with Quantum Information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, 9th International Workshop, IH 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers, pp. 32-49, 2007, Springer, 978-3-540-77369-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Yanwei Wu, Shaojie Tang 0001, Ping Xu, Xiang-Yang Li 0001 |
Dealing with Selfishness and Moral Hazard in Noncooperative Wireless Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Mob. Comput. ![In: IEEE Trans. Mob. Comput. 9(3), pp. 420-434, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Noncooperative networks, reliability, mechanism, truthful, selfish, hidden information, hidden action |
14 | Michal Feldman, John Chuang |
Overcoming free-riding behavior in peer-to-peer systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGecom Exch. ![In: SIGecom Exch. 5(4), pp. 41-50, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
performance, design, algorithms, reliability, peer-to-peer, game-theory, cooperation, economics, incentives, hidden-information, hidden-action |
14 | Amarnag Subramanya, Li Deng 0001, Zicheng Liu 0001, Zhengyou Zhang |
Multi-sensory speech processing: incorporating automatically extracted hidden dynamic information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICME ![In: Proceedings of the 2005 IEEE International Conference on Multimedia and Expo, ICME 2005, July 6-9, 2005, Amsterdam, The Netherlands, pp. 1074-1077, 2005, IEEE Computer Society, 0-7803-9331-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
multisensory speech processing, automatic hidden information extraction, noisy speech enhancement, air-conductive microphone, bone-conductive microphone, speech data capturing, bone sensor signal distortion, virtual noise-free dynamic information, formant trajectory, speech waveform synthesis, LPC cepstra, speech recognition, data stream |
13 | Saeed Sedghi, Morteza Khademi, Nedeljko Cvejic |
Channel Capacity Analysis of Spread Spectrum Audio Watermarking for Noisy Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IIH-MSP ![In: Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), Pasadena, California, USA, December 18-20, 2006, Proceedings, pp. 33-36, 2006, IEEE Computer Society, 0-7695-2745-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
13 | Adam L. Young, Moti Yung |
Backdoor Attacks on Black-Box Ciphers Exploiting Low-Entropy Plaintexts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003, Proceedings, pp. 297-311, 2003, Springer, 3-540-40515-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
hidden ciphers, obfuscated ciphers, black-box ciphers, Huffman compression, reverse-engineering, data compression, entropy, subliminal channel, Digital Rights Management (DRM), Symmetric ciphers, kleptography |
13 | Russell M. Mersereau, Faisal Alturki |
Secure blind image steganographic technique using discrete Fourier transformation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP (2) ![In: Proceedings of the 2001 International Conference on Image Processing, ICIP 2001, Thessaloniki, Greece, October 7-10, 2001, pp. 542-545, 2001, IEEE, 0-7803-6725-1. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
13 | Xiaobin Fu, Jay Budzik, Kristian J. Hammond |
Mining navigation history for recommendation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IUI ![In: Proceedings of the 5th International Conference on Intelligent User Interfaces, IUI 2000, New Orleans, LA, USA, January 9-12, 2000, pp. 106-112, 2000, ACM, 1-58113-134-8. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
collaborative information recommendation, data mining, intelligent user interface |
12 | Jannica Heinström, Shahrokh Nikou, Eero Sormunen |
Hide and seek - the role of personality, sense of coherence and experiential information in hidden information needs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Documentation ![In: J. Documentation 78(4), pp. 780-799, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Nathan Lervold, Gilbert L. Peterson, David W. King |
Incentivizing Information Gain in Hidden Information Multi-Action Games. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CG ![In: Computers and Games - International Conference, CG 2022, Virtual Event, November 22-24, 2022, Revised Selected Papers, pp. 59-69, 2022, Springer, 978-3-031-34016-1. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Edward Jack Powley, Peter I. Cowling, Daniel Whitehouse |
Information capture and reuse strategies in Monte Carlo Tree Search, with applications to games of hidden information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Artif. Intell. ![In: Artif. Intell. 217, pp. 92-116, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
12 | Nicolas Friot |
Itérations chaotiques pour la sécurité de l'information dissimulée. (Chaotic iterations for the Hidden Information Security). ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2014 |
RDF |
|
12 | Vladimir S. Lerner |
Hidden Information and Regularities of an Information Observer: A review of the main results ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1303.0777, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
12 | Cathel Zitzmann |
Détection statistique d'information cachée dans des images naturelles. (Statistical detection of hidden information in natural images). ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2013 |
RDF |
|
12 | Vladimir S. Lerner |
Hidden information and regularities of information dynamics III ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1208.3241, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
12 | Vladimir S. Lerner |
Hidden information and regularities of information dynamics II ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1207.6563, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
12 | Vladimir S. Lerner |
Hidden information and regularities of information dynamics I ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1207.5265, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
12 | Mathieu Sassolas |
Méthodes qualitatives et quantitatives pour la détection d'information cachée. (Qualitative and Quantitative Methods for Detection of Hidden Information). ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2011 |
RDF |
|
11 | Jianquan Xie, Chunhua Yang 0001, Dazu Huang, Duosi Xie |
A Large Capacity Blind Information Hiding Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISECS ![In: Proceedings of The International Symposium on Electronic Commerce and Security, ISECS 2008, August 3-5, 2008, Guangzhou, China, pp. 934-937, 2008, IEEE Computer Society, 978-0-7695-3258-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
DCT transformation, uniform spectrum, blind extracting, information hiding, quantification |
10 | Kaibo Xu, Junkang Feng, Malcolm K. Crowe |
Defining the notion of 'Information Content' and reasoning about it in a database. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Knowl. Inf. Syst. ![In: Knowl. Inf. Syst. 18(1), pp. 29-59, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Semantic information theory, Reasoning, Inference rules, Information content, Data semantics |
10 | Pradeepa S., Niveda Gaspar, Vimal Shanmuganathan, P. Subbulakshmi, Ahmed Alkhayyat, Kaliappan M. |
Classifying promoters by interpreting the hidden information of DNA sequences for disease prediction in clinical laboratories using Gaussian decision boundary estimation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Intell. Decis. Technol. ![In: Intell. Decis. Technol. 18(1), pp. 613-631, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
10 | Xiaohang Li, Dunke Lu, Yueying Wang, Weidong Zhang 0004 |
Exponential Synchronization of Markovian Jump Neural Networks Based on Asynchronous Delayed-Feedback Controller With Uncertain Hidden Information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Cybern. ![In: IEEE Trans. Cybern. 54(4), pp. 2408-2419, April 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
10 | Ian Ball, Deniz Kattwinkel |
Corrigendum to "Role of linking mechanisms in multitask agency with hidden information" [J. Econ. Theory 145 (2010) 2241-2259]. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Econ. Theory ![In: J. Econ. Theory 210, pp. 105666, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
10 | Ewa M. Kubicka, Grzegorz Kubicki, Malgorzata Kuchta, Michal Morayne |
Secretary problem with hidden information; searching for a high merit candidate. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Adv. Appl. Math. ![In: Adv. Appl. Math. 144, pp. 102468, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
10 | Chang Liu 0020, Yuru Guo, Zhuo Wang 0003, Yong Xu 0003, Chun-Yi Su |
State Estimation for Nonuniformly Sampled Neural Networks With Hidden Information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Syst. Man Cybern. Syst. ![In: IEEE Trans. Syst. Man Cybern. Syst. 53(10), pp. 6342-6352, October 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
10 | Zeping Zhang, Xiaowen Wang, Jie Huang 0016, Shuaishuai Zhang |
Analysis and Utilization of Hidden Information in Model Inversion Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 18, pp. 4449-4462, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
10 | Dahuin Jung, Ho Bae, Hyun-Soo Choi, Sungroh Yoon |
PixelSteganalysis: Pixel-Wise Hidden Information Removal With Low Visual Degradation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 20(1), pp. 331-342, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
10 | Tingfeng Pan, Guang Feng, Xin Liu, Wenyan Wu 0007 |
Using Feature Interaction for Mining Learners' Hidden Information in MOOC Dropout Prediction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITS ![In: Augmented Intelligence and Intelligent Tutoring Systems - 19th International Conference, ITS 2023, Corfu, Greece, June 2-5, 2023, Proceedings, pp. 507-517, 2023, Springer, 978-3-031-32882-4. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
10 | Alessio Sacco, Flavio Esposito, Guido Marchetto |
Hide & Seek: Traffic Matrix Completion and Inference Using Hidden Information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCNC ![In: 20th IEEE Consumer Communications & Networking Conference, CCNC 2023, Las Vegas, NV, USA, January 8-11, 2023, pp. 529-534, 2023, IEEE, 978-1-6654-9734-3. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
10 | Mengmeng Liu, Jinyong Yu, Yu Liu 0009 |
Dynamic event-triggered asynchronous fault detection for Markov jump systems with partially accessible hidden information and subject to aperiodic DoS attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Appl. Math. Comput. ![In: Appl. Math. Comput. 431, pp. 127317, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
10 | Peng Cheng 0010, Shuping He, Vladimir Stojanovic, Xiaoli Luan, Fei Liu 0001 |
Fuzzy Fault Detection for Markov Jump Systems With Partly Accessible Hidden Information: An Event-Triggered Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Cybern. ![In: IEEE Trans. Cybern. 52(8), pp. 7352-7361, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
10 | A. Monika, Rajagopal Eswari |
Prevention of hidden information security attacks by neutralizing Stego-Malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Electr. Eng. ![In: Comput. Electr. Eng. 101, pp. 107990, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
10 | Mingjia Shi, Yuhao Zhou, Qing Ye, Jiancheng Lv 0001 |
Personalized Federated Learning with Hidden Information on Personalized Prior. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2211.10684, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
10 | Zhengliang Lai, Xishun Zhu, Jianhua Wu |
Generative focused feedback residual networks for image steganalysis and hidden information reconstruction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Appl. Soft Comput. ![In: Appl. Soft Comput. 129, pp. 109550, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
10 | Zachary Partridge, Michael Thielscher |
Hidden Information General Game Playing with Deep Learning and Search. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PRICAI (3) ![In: PRICAI 2022: Trends in Artificial Intelligence - 19th Pacific Rim International Conference on Artificial Intelligence, PRICAI 2022, Shanghai, China, November 10-13, 2022, Proceedings, Part III, pp. 161-172, 2022, Springer, 978-3-031-20867-6. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
10 | Dingxiang Wang, Xiaogang Zhang, Hua Chen 0008, Yicong Zhou, Fanyong Cheng |
A Sintering State Recognition Framework to Integrate Prior Knowledge and Hidden Information Considering Class Imbalance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Ind. Electron. ![In: IEEE Trans. Ind. Electron. 68(8), pp. 7400-7411, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
10 | Qing Li 0036, Mingchu Li, Jianyuan Gan, Cheng Guo 0001 |
A game-theoretic approach for the location of terror response facilities with both disruption risk and hidden information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. Trans. Oper. Res. ![In: Int. Trans. Oper. Res. 28(4), pp. 1864-1889, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
10 | Yuanfeng Luo, Chuantao Yao, Yue Mo, Baoji Xie, Guijun Yang, Huiyang Gui |
A creative approach to understanding the hidden information within the business data using Deep Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Process. Manag. ![In: Inf. Process. Manag. 58(5), pp. 102615, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
10 | Marwa Ahmad, Nameer N. El-Emam, Ali F. Al-Azawi |
Improved Deep Hiding/Extraction Algorithm to Enhance the Payload Capacity and Security Level of Hidden Information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Commun. Networks Inf. Secur. ![In: Int. J. Commun. Networks Inf. Secur. 13(3), December 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
10 | Marwa Ahmad, Nameer N. El-Emam, Ali F. Al-Azawi |
Improved Deep Hiding/Extraction Algorithm to Enhance the Payload Capacity and Security Level of Hidden Information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Commun. Networks Inf. Secur. ![In: Int. J. Commun. Networks Inf. Secur. 13(3), December 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
10 | Jiu Lou, Zhongliang Xu, Decheng Zuo, Hongwei Liu 0002 |
Feature Extraction Method for Hidden Information in Audio Streams Based on HM-EMD. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Commun. Networks ![In: Secur. Commun. Networks 2021, pp. 5566347:1-5566347:12, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
10 | Keisuke Tomoda, Koji Hasebe |
Playing Geister by Estimating Hidden Information with Deep Reinforcement Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoG ![In: 2021 IEEE Conference on Games (CoG), Copenhagen, Denmark, August 17-20, 2021, pp. 1-4, 2021, IEEE, 978-1-6654-3886-5. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
10 | Alexander Khazagarov, Alisa A. Vorobeva, Viktoriia Korzhuk |
Preventing Hidden Information Leaks Using Author Attribution Methods and Neural Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FRUCT ![In: 29th Conference of Open Innovations Association, FRUCT 2021, Tampere, Finland, May 12-14, 2021, pp. 177-184, 2021, IEEE, 978-952-69244-5-8. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
10 | Belkacem Athamena, Zina Houhamdi, Ghaleb A. El Refae |
Retention Contracts under Hidden Information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACIT ![In: 22nd International Arab Conference on Information Technology, ACIT 2021, Muscat, Oman, December 21-23, 2021, pp. 1-6, 2021, IEEE, 978-1-6654-1995-6. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
10 | Mahesh Gangarde, Shruti Oza, Janardhan Chitode |
Authenticate audio video-crypto invisible watermarking approach for enhancing hidden information security and robustness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Electron. Secur. Digit. Forensics ![In: Int. J. Electron. Secur. Digit. Forensics 12(1), pp. 16-42, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
10 | Gianluca Ascolani, Timothy M. Skerry, Damien Lacroix, Enrico Dall'Ara, Aban Shuaib |
Revealing hidden information in osteoblast's mechanotransduction through analysis of time patterns of critical events. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BMC Bioinform. ![In: BMC Bioinform. 21(1), pp. 114, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
10 | Yonghyun Jeong, Hyunjin Choi, Byoungjip Kim, Youngjune Gwon |
DefogGAN: Predicting Hidden Information in the StarCraft Fog of War with Generative Adversarial Nets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2003.01927, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
10 | Yonghyun Jeong, Hyunjin Choi, Byoungjip Kim, Youngjune Gwon |
DefogGAN: Predicting Hidden Information in the StarCraft Fog of War with Generative Adversarial Nets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAAI ![In: The Thirty-Fourth AAAI Conference on Artificial Intelligence, AAAI 2020, The Thirty-Second Innovative Applications of Artificial Intelligence Conference, IAAI 2020, The Tenth AAAI Symposium on Educational Advances in Artificial Intelligence, EAAI 2020, New York, NY, USA, February 7-12, 2020., pp. 4296-4303, 2020, AAAI Press, 978-1-57735-823-7. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
10 | Shih-Yun Lo, Elaine Schaertl Short, Andrea Lockerd Thomaz |
Robust Following with Hidden Information in Travel Partners. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAMAS ![In: Proceedings of the 19th International Conference on Autonomous Agents and Multiagent Systems, AAMAS '20, Auckland, New Zealand, May 9-13, 2020, pp. 1910-1912, 2020, International Foundation for Autonomous Agents and Multiagent Systems, 978-1-4503-7518-4. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
10 | |
PixelSteganalysis: Destroying Hidden Information with a Low Degree of Visual Degradation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1902.11113, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
10 | Dahuin Jung, Ho Bae, Hyun-Soo Choi, Sungroh Yoon |
PixelSteganalysis: Pixel-wise Hidden Information Removal with Low Visual Degradation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1902.10905, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
10 | Murugeswari Kandavel, Deisy Chelliah, Ganesan Govindan |
An optimised approach to detect the identity of hidden information in grey scale and colour images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Bus. Intell. Data Min. ![In: Int. J. Bus. Intell. Data Min. 15(1), pp. 1-21, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
10 | Kyungroul Lee, Sun-Young Lee, Kyunghwa Do, Kangbin Yim |
Detecting and Extracting Hidden Information from Stego-Images Based on JPG File on StegoMagic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMIS ![In: Innovative Mobile and Internet Services in Ubiquitous Computing - Proceedings of the 12th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS-2018, Matsue, Japan, July 4-6, 2018, pp. 546-553, 2018, Springer, 978-3-319-93553-9. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
10 | Anier Soria-Lorente, Stefan Berres |
A Secure Steganographic Algorithm Based on Frequency Domain for the Transmission of Hidden Information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Commun. Networks ![In: Secur. Commun. Networks 2017, pp. 5397082:1-5397082:14, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
10 | Bing Zhou 0001, Fan Ye 0003 |
Explore hidden information for indoor floor plan construction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: IEEE International Conference on Communications, ICC 2017, Paris, France, May 21-25, 2017, pp. 1-6, 2017, IEEE, 978-1-4673-8999-0. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
10 | Jun Song 0002, Yugang Niu, Haijuan Zhao, Zhiru Cao |
Finite-time ℓ2-ℓ∞ control of Markovian jump linear systems with partly accessible hidden information via asynchronous output feedback. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASCC ![In: 11th Asian Control Conference, ASCC 2017, Gold Coast, Australia, December 17-20, 2017, pp. 2447-2452, 2017, IEEE, 978-1-5090-1573-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
10 | Candace Suh-Lee, Ju-Yeon Jo, Yoohwan Kim |
Text mining for security threat detection discovering hidden information in unstructured log messages. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CNS ![In: 2016 IEEE Conference on Communications and Network Security, CNS 2016, Philadelphia, PA, USA, October 17-19, 2016, pp. 252-260, 2016, IEEE, 978-1-5090-3065-1. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
10 | Zimin Lin, Rui Wang 0032, Xiaoqi Jia, Jingyu Yang, Daojuan Zhang, Chuankun Wu |
ForceDROID: Extracting Hidden Information in Android Apps by Forced Execution Technique. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Trustcom/BigDataSE/ISPA ![In: 2016 IEEE Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016, pp. 386-393, 2016, IEEE, 978-1-5090-3205-1. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
10 | Hadas Zur, Tamir Tuller |
Exploiting hidden information interleaved in the redundancy of the genetic code without prior knowledge. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Bioinform. ![In: Bioinform. 31(8), pp. 1161-1168, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
10 | Leon A. H. M. van Berlo, Mathijs Natrop |
BIM on the construction site: providing hidden information on task specific drawings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Technol. Constr. ![In: J. Inf. Technol. Constr. 20, pp. 97-106, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
10 | Claude Delpha, Demba Diallo |
Incipient Fault Detection and Diagnosis: A hidden information detection problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISIE ![In: 24th IEEE International Symposium on Industrial Electronics, ISIE 2015, Rio de Janeiro, Brazil, June 3-5, 2015, pp. 837-842, 2015, IEEE. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
10 | Ziheng Wang 0001, Qiang Ji |
Classifier learning with hidden information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CVPR ![In: IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2015, Boston, MA, USA, June 7-12, 2015, pp. 4969-4977, 2015, IEEE Computer Society, 978-1-4673-6964-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
10 | Rémi Cogranne, Florent Retraint, Cathel Zitzmann, Igor V. Nikiforov, Lionel Fillatre, Philippe Cornu |
Hidden information detection using decision theory and quantized samples: Methodology, difficulties and results. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digit. Signal Process. ![In: Digit. Signal Process. 24, pp. 144-161, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
10 | Andrea Burattin, Giuseppe Cascavilla, Mauro Conti |
SocialSpy: Browsing (Supposedly) Hidden Information in Online Social Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1406.3216, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
10 | Wenxin Zhu, Ping Zhong 0003 |
A new one-class SVM based on hidden information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Knowl. Based Syst. ![In: Knowl. Based Syst. 60, pp. 35-43, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
10 | Doron Drusinsky |
Runtime monitoring and verification of systems with hidden information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Innov. Syst. Softw. Eng. ![In: Innov. Syst. Softw. Eng. 10(2), pp. 123-136, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
10 | Dominic Wörner, Thomas von Bomhard, Marc Roeschlin, Felix Wortmann |
Look twice: Uncover hidden information in room climate sensor data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IOT ![In: 4th International Conference on the Internet of Things, IOT 2014, Cambridge, MA, USA, October 6-8, 2014, pp. 25-30, 2014, IEEE, 978-1-4799-5154-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
10 | Andrea Burattin, Giuseppe Cascavilla, Mauro Conti |
SocialSpy: Browsing (Supposedly) Hidden Information in Online Social Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRiSIS ![In: Risks and Security of Internet and Systems - 9th International Conference, CRiSIS 2014, Trento, Italy, August 27-29, 2014, Revised Selected Papers, pp. 83-99, 2014, Springer, 978-3-319-17126-5. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
10 | Ziheng Wang 0001, Tian Gao, Qiang Ji |
Learning with Hidden Information Using a Max-Margin Latent Variable Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPR ![In: 22nd International Conference on Pattern Recognition, ICPR 2014, Stockholm, Sweden, August 24-28, 2014, pp. 1389-1394, 2014, IEEE Computer Society, 978-1-4799-5208-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
10 | Ziheng Wang 0001, Xiaoyang Wang 0001, Qiang Ji |
Learning with Hidden Information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPR ![In: 22nd International Conference on Pattern Recognition, ICPR 2014, Stockholm, Sweden, August 24-28, 2014, pp. 238-243, 2014, IEEE Computer Society, 978-1-4799-5208-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
10 | Daniel Whitehouse |
Monte Carlo Tree Search for games with hidden information and uncertainty. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2014 |
RDF |
|
10 | Xu Sun 0001, Takuya Matsuzaki, Wenjie Li 0002 |
Latent Structured Perceptrons for Large-Scale Learning with Hidden Information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 25(9), pp. 2063-2075, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
10 | James Thorniley, Phil Husbands |
Hidden information transfer in an autonomous swinging robot. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECAL ![In: Proceedings of the Twelfth European Conference on the Synthesis and Simulation of Living Systems: Advances in Artificial Life, ECAL 2013, Sicily, Italy, September 2-6, 2013, pp. 513-520, 2013, MIT Press, 9780262317092. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
10 | Walaa Akram Anwar, Ahmed Shawky Moussa, Akram Salah 0001 |
Extracting Hidden Information and Conclusions in Software Testing Via Distributed Relational Visual Mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IV ![In: 17th International Conference on Information Visualisation, IV 2013, London, United Kingdom, July 16-18, 2013, pp. 527-531, 2013, IEEE Computer Society, 978-0-7695-5049-7. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
10 | Fahimeh Rezaei, Michael Hempel, Tao Ma, Pradhumna Lal Shrestha, Dongming Peng, Hamid Sharif |
Adaptive Threshold Displacement algorithm for removing hidden information from digital images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GLOBECOM ![In: 2013 IEEE Global Communications Conference, GLOBECOM 2013, Atlanta, GA, USA, December 9-13, 2013, pp. 635-640, 2013, IEEE, 978-1-4799-1353-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
10 | Lee Hoffer, Shah Jamal Alam |
"Copping" in Heroin Markets: The Hidden Information Costs of Indirect Sales and Why They Matter. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SBP ![In: Social Computing, Behavioral-Cultural Modeling and Prediction - 6th International Conference, SBP 2013, Washington, DC, USA, April 2-5, 2013. Proceedings, pp. 83-92, 2013, Springer, 978-3-642-37209-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
10 | Julio Aráuz |
Estimating Hidden Information for Self-organization and Self-healing in Modern Wireless Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Complex Adaptive Systems ![In: Proceedings of the Complex Adaptive Systems 2013 Conference, Baltimore Marriott Inner Harbor at Camden Yards, Baltimore, Maryland, USA, November 13-15, 2013, pp. 516-521, 2013, Elsevier. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
10 | María Verónica Alderete |
SME E-Cooperation: A Theoretical Team Contract Analysis Under Hidden Information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. e Collab. ![In: Int. J. e Collab. 8(1), pp. 53-64, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
10 | Doron Drusinsky |
Behavioral and Temporal Pattern Detection within Financial Data with Hidden Information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Univers. Comput. Sci. ![In: J. Univers. Comput. Sci. 18(14), pp. 1950-1966, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
10 | Juyong Lee, Steven P. Gross, Jooyoung Lee 0002 |
Extraction of hidden information by efficient community detection in networks ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1209.2873, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
10 | Fahimeh Rezaei, Michael Hempel, Pradhumna Shrestha, Tao Ma, Dongming Peng, Hamid Sharif |
A quality-preserving hidden information removal approach for digital images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: Proceedings of IEEE International Conference on Communications, ICC 2012, Ottawa, ON, Canada, June 10-15, 2012, pp. 1021-1025, 2012, IEEE, 978-1-4577-2052-9. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
10 | Cathel Zitzmann, Rémi Cogranne, Lionel Fillatre, Igor V. Nikiforov, Florent Retraint, Philippe Cornu |
Hidden information detection based on quantized Laplacian distribution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICASSP ![In: 2012 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2012, Kyoto, Japan, March 25-30, 2012, pp. 1793-1796, 2012, IEEE, 978-1-4673-0046-9. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
10 | Katia Lida Kermanidis, Panagiotis Pandis, Costas Boletsis, Dimitra Chasanidou |
LSA for Mining Hidden Information in Action Game Semantics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECAI ![In: ECAI 2012 - 20th European Conference on Artificial Intelligence. Including Prestigious Applications of Artificial Intelligence (PAIS-2012) System Demonstrations Track, Montpellier, France, August 27-31 , 2012, pp. 967-968, 2012, IOS Press, 978-1-61499-097-0. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
10 | Doron Drusinsky |
Runtime Verification of Systems with Hidden Information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Infotech@Aerospace ![In: Infotech@Aerospace 2012, Garden Grove, California, USA, June 19-21, 2012, 2012, 978-1-60086-939-6. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
10 | Ningning Cheng, Prasant Mohapatra, Mathieu Cunche, Mohamed Ali Kâafar, Roksana Boreli, Srikanth V. Krishnamurthy |
Inferring user relationship from hidden information in WLANs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MILCOM ![In: 31st IEEE Military Communications Conference, MILCOM 2012, Orlando, FL, USA, October 29 - November 1, 2012, pp. 1-6, 2012, IEEE, 978-1-4673-1729-0. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 234 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ >>] |