Search
Search Results
-
High-Capacity Adaptive Steganography Based on Transform Coefficient for HEVC
HEVC video is one of the most popular carriers for steganography. The existing transform coefficient-based HEVC steganography algorithms usually... -
Space-Efficient STR-IC-LCS Computation
One of the most fundamental methods for comparing two given strings A and B is the longest common subsequence (LCS), where the task is to find (the... -
Balanced Substructures in Bicolored Graphs
An edge-colored graph is said to be balanced if it has an equal number of edges of each color. Given a graph G whose edges are colored using two... -
Delivery to Safety with Two Cooperating Robots
Two cooperating, autonomous mobile robots with arbitrary nonzero max speeds are placed at arbitrary initial positions in the plane. A remotely... -
On the Preservation of Properties When Changing Communication Models
In a system of processes that communicate asynchronously by means of FIFO channels, there are many options in which these channels can be laid out.... -
Multi-Parameter Analysis of Finding Minors and Subgraphs in Edge-Periodic Temporal Graphs
We study the computational complexity of determining structural properties of edge-periodic temporal graphs (EPGs). EPGs are time-varying graphs... -
The k-Centre Problem for Classes of Cyclic Words
The problem of finding k uniformly spaced points (centres) within a metric space is well known as the k-centre selection problem. In this paper, we... -
High-Performance Steganographic Coding Based on Sub-Polarized Channel
Steganographic coding is the core problem of modern steganography under the minimizing distortion model. Syndrome-Trellis Codes, designed with the... -
Reversible Data Hiding via Arranging Blocks of Bit-Planes in Encrypted Images
Reversible data hiding in encrypted images (RDHEI) is a useful technique for protecting data security, but most RDHEI methods do not make a satisfied... -
Adaptive Despread Spectrum-Based Image Watermarking for Fast Product Tracking
With the digitalization of the physical markets, the number of users engaging in e-commerce and shop** online is rapidly increasing. An important... -
SE-ResNet56: Robust Network Model for Deepfake Detection
In recent years, high quality deepfake face images generated by Generative Adversarial Networks (GAN) technology have caused serious negative impacts... -
Voice Conversion Using Learnable Similarity-Guided Masked Autoencoder
Voice conversion (VC) is an important voice forgery method that poses a serious threat to personal privacy protection, especially with remarkable... -
Spectroscopy-Based Prediction of In Vitro Dissolution Profile Using Random Decision Forests
In the pharmaceutical industry, dissolution testing is part of the target product quality that is essential in the approval of new products. The... -
Convergence of RBF Networks Regression Function Estimates and Classifiers
In the paper convergence of the RBF network regression estimates and classifiers with so-called regular radial kernels is investigated. The... -
Optimization of Parameterized Behavior Trees in RTS Games
Introduction of Behavior Trees (BTs) impacted the field of Artificial Intelligence (AI) in games, by providing flexible and natural representation of... -
Explaining Machine Learning Predictions in Botnet Detection
As the war against cybercrime continues, security experts and attackers improve their skills and tools to accomplish their desired goal. Botnets have... -
ARIMA for Short-Term and LSTM for Long-Term in Daily Bitcoin Price Prediction
The goal of this paper is the insight into the forecasting of Bitcoin price using machine learning models like AutoRegressive Integrated Moving... -
The Impact of Data Preprocessing on Prediction Effectiveness
This study considers a very important issue, which is the impact of preprocessing on model performance. On the example of data describing taxicab... -
Analysis and Detection of DDoS Backscatter Using NetFlow Data, Hyperband-Optimised Deep Learning and Explainability Techniques
The Denial of Service attacks are one of the most common attacks used to disrupt the services of public institutions. The criminal act of exhausting... -
Overload Monitoring System Using Sound Analysis for Electrical Machines
Overloading is one of the faults that occur very often in the operation of electrical machines. Therefore, a continuous monitoring and diagnosis for...