nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
An adaptive mutual trust based access control model for electronic healthcare system
|
Singh, Ashish |
|
|
11 |
5 |
p. 2117-2136 |
artikel |
2 |
An efficient watermarking technique for tamper detection and localization of medical images
|
Gull, Solihah |
|
|
11 |
5 |
p. 1799-1808 |
artikel |
3 |
An improved authentication and security scheme for LTE/LTE-A networks
|
Panda, Prabhat Kumar |
|
|
11 |
5 |
p. 2163-2185 |
artikel |
4 |
An improved industrial sub-pixel edge detection algorithm based on coarse and precise location
|
Xie, Xin |
|
|
11 |
5 |
p. 2061-2070 |
artikel |
5 |
An intelligent flying system for automatic detection of faults in photovoltaic plants
|
Carletti, Vincenzo |
|
|
11 |
5 |
p. 2027-2040 |
artikel |
6 |
Application of new multi-objective optimization algorithm for EV scheduling in smart grid through the uncertainties
|
Yin, WanJun |
|
|
11 |
5 |
p. 2071-2103 |
artikel |
7 |
A robust blind watermarking framework based on Dn structure
|
Singh, Satendra Pal |
|
|
11 |
5 |
p. 1869-1887 |
artikel |
8 |
A robust image steganography based on the concatenated error correction encoder and discrete cosine transform coefficients
|
Bao, Zhenkun |
|
|
11 |
5 |
p. 1889-1901 |
artikel |
9 |
A study on user recognition using 2D ECG based on ensemble of deep convolutional neural networks
|
Kim, Min-Gu |
|
|
11 |
5 |
p. 1859-1867 |
artikel |
10 |
Correction to: A robust image steganography based on the concatenated error correction encoder and discrete cosine transform coefficients
|
Bao, Zhenkun |
|
|
11 |
5 |
p. 1903 |
artikel |
11 |
Design and security analysis of two robust keyed hash functions based on chaotic neural networks
|
Abdoun, Nabil |
|
|
11 |
5 |
p. 2137-2161 |
artikel |
12 |
Effect of identity mapping, transfer learning and domain knowledge on the robustness and generalization ability of a network: a biometric based case study
|
Singh, Avantika |
|
|
11 |
5 |
p. 1905-1922 |
artikel |
13 |
Efficient user authentication protocol for distributed multimedia mobile cloud environment
|
Vivekanandan, Manojkumar |
|
|
11 |
5 |
p. 1933-1956 |
artikel |
14 |
Environmental assessment under uncertainty using Dempster–Shafer theory and Z-numbers
|
Kang, Bingyi |
|
|
11 |
5 |
p. 2041-2060 |
artikel |
15 |
Guest editorial: Recent trends in multimedia data-hiding: a reliable mean for secure communications
|
Singh, Amit Kumar |
|
|
11 |
5 |
p. 1795-1797 |
artikel |
16 |
Hybrid domain watermarking technique for copyright protection of images using speech watermarks
|
Thanki, Rohit M. |
|
|
11 |
5 |
p. 1835-1857 |
artikel |
17 |
Identifying tiny faces in thermal images using transfer learning
|
Singh, Rishav |
|
|
11 |
5 |
p. 1957-1966 |
artikel |
18 |
Key feature identification for recognition of activities performed by a smart-home resident
|
Tahir, Syed Fahad |
|
|
11 |
5 |
p. 2105-2115 |
artikel |
19 |
Multi-criteria PROMETHEE method based on possibility degree with Z-numbers under uncertain linguistic environment
|
Qiao, Dong |
|
|
11 |
5 |
p. 2187-2201 |
artikel |
20 |
Personal recognition using convolutional neural network with ECG coupling image
|
Kim, Jin Su |
|
|
11 |
5 |
p. 1923-1932 |
artikel |
21 |
Profiling and improving the duty-cycling performance of Linux-based IoT devices
|
Amirtharaj, Immanuel |
|
|
11 |
5 |
p. 1967-1995 |
artikel |
22 |
RETRACTED ARTICLE: Secret image sharing scheme with encrypted shadow images using optimal homomorphic encryption technique
|
Shankar, K. |
|
|
11 |
5 |
p. 1821-1833 |
artikel |
23 |
Video transcoding scheme of multimedia data-hiding for multiform resources based on intra-cloud
|
Kim, Hyun-Woo |
|
|
11 |
5 |
p. 1809-1819 |
artikel |
24 |
Visual process maps: a visualization tool for discovering habits in smart homes
|
Leotta, Francesco |
|
|
11 |
5 |
p. 1997-2025 |
artikel |