We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 21-40 of 10,000 results
  1. High-Capacity Adaptive Steganography Based on Transform Coefficient for HEVC

    HEVC video is one of the most popular carriers for steganography. The existing transform coefficient-based HEVC steganography algorithms usually...
    Lin Yang, Rangding Wang, ... Fan Liu in Digital Forensics and Watermarking
    Conference paper 2023
  2. Space-Efficient STR-IC-LCS Computation

    One of the most fundamental methods for comparing two given strings A and B is the longest common subsequence (LCS), where the task is to find (the...
    Yuuki Yonemoto, Yuto Nakashima, ... Hideo Bannai in SOFSEM 2023: Theory and Practice of Computer Science
    Conference paper 2023
  3. Balanced Substructures in Bicolored Graphs

    An edge-colored graph is said to be balanced if it has an equal number of edges of each color. Given a graph G whose edges are colored using two...
    P. S. Ardra, R. Krithika, ... Roohani Sharma in SOFSEM 2023: Theory and Practice of Computer Science
    Conference paper 2023
  4. Delivery to Safety with Two Cooperating Robots

    Two cooperating, autonomous mobile robots with arbitrary nonzero max speeds are placed at arbitrary initial positions in the plane. A remotely...
    Jared Coleman, Evangelos Kranakis, ... Oscar Morales-Ponce in SOFSEM 2023: Theory and Practice of Computer Science
    Conference paper 2023
  5. On the Preservation of Properties When Changing Communication Models

    In a system of processes that communicate asynchronously by means of FIFO channels, there are many options in which these channels can be laid out....
    Olav Bunte, Louis C. M. van Gool, Tim A. C. Willemse in SOFSEM 2023: Theory and Practice of Computer Science
    Conference paper 2023
  6. Multi-Parameter Analysis of Finding Minors and Subgraphs in Edge-Periodic Temporal Graphs

    We study the computational complexity of determining structural properties of edge-periodic temporal graphs (EPGs). EPGs are time-varying graphs...
    Emmanuel Arrighi, Niels Grüttemeier, ... Petra Wolf in SOFSEM 2023: Theory and Practice of Computer Science
    Conference paper 2023
  7. The k-Centre Problem for Classes of Cyclic Words

    The problem of finding k uniformly spaced points (centres) within a metric space is well known as the k-centre selection problem. In this paper, we...
    Duncan Adamson, Argyrios Deligkas, ... Igor Potapov in SOFSEM 2023: Theory and Practice of Computer Science
    Conference paper 2023
  8. High-Performance Steganographic Coding Based on Sub-Polarized Channel

    Steganographic coding is the core problem of modern steganography under the minimizing distortion model. Syndrome-Trellis Codes, designed with the...
    Haocheng Fu, **anfeng Zhao, **aolei He in Digital Forensics and Watermarking
    Conference paper 2023
  9. Reversible Data Hiding via Arranging Blocks of Bit-Planes in Encrypted Images

    Reversible data hiding in encrypted images (RDHEI) is a useful technique for protecting data security, but most RDHEI methods do not make a satisfied...
    Yingying Sun, Guoxiong **e, ... Zhenjun Tang in Digital Forensics and Watermarking
    Conference paper 2023
  10. Adaptive Despread Spectrum-Based Image Watermarking for Fast Product Tracking

    With the digitalization of the physical markets, the number of users engaging in e-commerce and shop** online is rapidly increasing. An important...
    Fei Zhang, Hongxia Wang, ... **he Li in Digital Forensics and Watermarking
    Conference paper 2023
  11. SE-ResNet56: Robust Network Model for Deepfake Detection

    In recent years, high quality deepfake face images generated by Generative Adversarial Networks (GAN) technology have caused serious negative impacts...
    **aofeng Wang, Zekun Zhao, ... **ngfu Hu in Digital Forensics and Watermarking
    Conference paper 2023
  12. Voice Conversion Using Learnable Similarity-Guided Masked Autoencoder

    Voice conversion (VC) is an important voice forgery method that poses a serious threat to personal privacy protection, especially with remarkable...
    Yewei Gu, **anfeng Zhao, ... Junchao **ao in Digital Forensics and Watermarking
    Conference paper 2023
  13. Spectroscopy-Based Prediction of In Vitro Dissolution Profile Using Random Decision Forests

    In the pharmaceutical industry, dissolution testing is part of the target product quality that is essential in the approval of new products. The...
    Mohamed Azouz Mrad, Kristóf Csorba, ... Brigitta Nagy in Artificial Intelligence and Soft Computing
    Conference paper 2023
  14. Convergence of RBF Networks Regression Function Estimates and Classifiers

    In the paper convergence of the RBF network regression estimates and classifiers with so-called regular radial kernels is investigated. The...
    Adam Krzyżak, Tomasz Gałkowski, Marian Partyka in Artificial Intelligence and Soft Computing
    Conference paper 2023
  15. Optimization of Parameterized Behavior Trees in RTS Games

    Introduction of Behavior Trees (BTs) impacted the field of Artificial Intelligence (AI) in games, by providing flexible and natural representation of...
    Tomasz Machalewski, Mariusz Marek, Adrian Ochmann in Artificial Intelligence and Soft Computing
    Conference paper 2023
  16. Explaining Machine Learning Predictions in Botnet Detection

    As the war against cybercrime continues, security experts and attackers improve their skills and tools to accomplish their desired goal. Botnets have...
    Sean Miller, Curtis Busby-Earle in Artificial Intelligence and Soft Computing
    Conference paper 2023
  17. ARIMA for Short-Term and LSTM for Long-Term in Daily Bitcoin Price Prediction

    The goal of this paper is the insight into the forecasting of Bitcoin price using machine learning models like AutoRegressive Integrated Moving...
    Tran Kim Toai, Roman Senkerik, ... Vo Minh Huan in Artificial Intelligence and Soft Computing
    Conference paper 2023
  18. The Impact of Data Preprocessing on Prediction Effectiveness

    This study considers a very important issue, which is the impact of preprocessing on model performance. On the example of data describing taxicab...
    Adam Kiersztyn, Krystyna Kiersztyn in Artificial Intelligence and Soft Computing
    Conference paper 2023
  19. Analysis and Detection of DDoS Backscatter Using NetFlow Data, Hyperband-Optimised Deep Learning and Explainability Techniques

    The Denial of Service attacks are one of the most common attacks used to disrupt the services of public institutions. The criminal act of exhausting...
    Marek Pawlicki, Martin Zadnik, ... Michał Choraś in Artificial Intelligence and Soft Computing
    Conference paper 2023
  20. Overload Monitoring System Using Sound Analysis for Electrical Machines

    Overloading is one of the faults that occur very often in the operation of electrical machines. Therefore, a continuous monitoring and diagnosis for...
    Nguyen Cong-Phuong, Nguyen Tuan Ninh in Artificial Intelligence and Soft Computing
    Conference paper 2023
Did you find what you were looking for? Share feedback.