UM

Browse/Search Results:  1-3 of 3 Help

Selected(0)Clear Items/Page:    Sort:
Reversible image watermarking using prediction value computation with gradient analysis Conference paper
Jiang Z., Pun C.-M.. Reversible image watermarking using prediction value computation with gradient analysis[C], 2018, 48-53.
Authors:  Jiang Z.;  Pun C.-M.
Favorite | TC[WOS]:1 TC[Scopus]:1 | Submit date:2019/02/14
Gradient Analysis  Prediction Value  Reversible Watermarking  Two-step Embedding  
On the strategy and behavior of bitcoin mining with N-attackers Conference paper
Liu H., Du R., Ruan N., Jia W.. On the strategy and behavior of bitcoin mining with N-attackers[C], 2018, 357-368.
Authors:  Liu H.;  Du R.;  Ruan N.;  Jia W.
Favorite | TC[WOS]:28 TC[Scopus]:34 | Submit date:2019/04/04
Bitcoin  Mining  N-attackers  Selfish Mining  
Blind recognition of touched keys on mobile devices Conference paper
Yue, Qinggang, Ling, Zhen, Fu, Xinwen, Liu, Benyuan, Ren, Kui, Zhao, Wei. Blind recognition of touched keys on mobile devices[C]. Association for Computing Machinery, 2017, 1403-1414.
Authors:  Yue, Qinggang;  Ling, Zhen;  Fu, Xinwen;  Liu, Benyuan;  Ren, Kui; et al.
Favorite | TC[WOS]:56 TC[Scopus]:75 | Submit date:2018/11/06