- DocumentVariable-Length Signature for Near-Duplicateuploaded byshalini
- DocumentSteganography Using Reversible Texture Synthesisuploaded byshalini
- DocumentRobust Representation and Recognition of Facialuploaded byshalini
- DocumentReversible Image Data Hiding Withuploaded byshalini
- DocumentRevealing the Trace of High-Quality JPEGuploaded byshalini
- DocumentPareto-Depth for Multiple-Query Image Retrievaluploaded byshalini
- DocumentMultifocus Image Fusion Based on NSCTuploaded byshalini
- DocumentImage Denoising by Exploring Externaluploaded byshalini
- DocumentFractal Analysis for Reduced Referenceuploaded byshalini
- DocumentFace Sketch Synthesis via Sparse Representation-Based Greedy Searchuploaded byshalini
- DocumentFace Recognition Across Non-Uniform Motionuploaded byshalini
- DocumentBoundary Detection Using Double-Opponencyuploaded byshalini
- DocumentA Probabilistic Approach for Color Correctionuploaded byshalini
- DocumentA No-Reference Texture Regularity Metricuploaded byshalini
- DocumentA Feature-Enriched Completely Blind Imageuploaded byshalini
- DocumentUniversal Network Coding-Baseduploaded byshalini
- DocumentSteganography Using Reversible Texture Synthesisuploaded byshalini
- DocumentSingle Image Superresolution Based Onuploaded byshalini
- DocumentSelCSP a Framework to Facilitateuploaded byshalini
- DocumentQuery Aware Determinization of Uncertainuploaded byshalini
- DocumentPSMPA Patient Self-Controllableuploaded byshalini
- DocumentPrivacy-Preserving and Truthful Detectionuploaded byshalini
- DocumentPrivacy Policy Inference of User-Uploadeduploaded byshalini
- DocumentPanda Public Auditing for Shared Datauploaded byshalini
- DocumentPAGE a Partition Aware Engineuploaded byshalini
- DocumentOptimal Configuration of Networkuploaded byshalini
- DocumentMultiview Alignment Hashing Foruploaded byshalini
- DocumentMobile Data Gathering With Load Balanceduploaded byshalini
- DocumentLocation-Aware and Personalizeduploaded byshalini
- DocumentLearning Fingerprint Reconstructionuploaded byshalini
- DocumentKey-Recovery Attacks on KIDS, A Keyeduploaded byshalini
- DocumentImproved Privacy-Preserving P2P Multimediauploaded byshalini
- DocumentIdentity-Based Distributed Provable Datauploaded byshalini
- DocumentGenerating Searchable Public-Key Ciphertextsuploaded byshalini
- DocumentEye Gaze Tracking With a Web Camerauploaded byshalini
- DocumentEnergy-Aware Load Balancing and Application Scaling for the Clouduploaded byshalini
- DocumentEnabling Fine-grained Multi-keyword Searchuploaded byshalini
- DocumentDiscovery of Ranking Fraud for Mobile Appsuploaded byshalini
- DocumentDetection and Rectificationuploaded byshalini
- DocumentDefeating Jamming With the Power of Silenceuploaded byshalini
- DocumentCost-Minimizing Dynamic Migration of Content Distributionuploaded byshalini
- DocumentControl Cloud Data Access Privilege Anduploaded byshalini
- DocumentCollision Tolerant and Collision Free Packetuploaded byshalini
- DocumentCloud-Based Multimedia Content Protection Systemuploaded byshalini
- DocumentBehavior Rule Specification-Based Intrusionuploaded byshalini
- DocumentAutomatic Face Naming by Learning Discriminativeuploaded byshalini
- DocumentAuthenticated Key Exchange Protocols for Paralleluploaded byshalini
- DocumentAn Attribute-Assisted Reranking Modeluploaded byshalini
- DocumentA Secure and Dynamic Multi-keyword Rankeduploaded byshalini