PrFAHP-GT: A New Privacy Risk Analysis Framework Using FAHP and Game Theory for Digital Supply Chain Management.
IEEE Trans. Engineering Management, 2024
HS-McHF: Hypersharpening With Multicomponent-Based Hierarchical Features Fusion Network.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2024
Privacy-Preserving Techniques in Cloud/Fog and Internet of Things.
Cryptogr., September, 2023
Multimodal sentiment analysis for social media contents during public emergencies.
J. Data Inf. Sci., June, 2023
AFPr-AM: A novel Fuzzy-AHP based privacy risk assessment model for strategic information management of social media platforms.
Comput. Secur., 2023
Deepfakes, Misinformation, and Disinformation in the Era of Frontier AI, Generative AI, and Large AI Models.
Proceedings of the International Conference on Computer and Applications, 2023
AITSteg: An Innovative Text Steganography Technique for Hidden Transmission of Text Message via Social Media.
Dataset, May, 2022
Misinformation Detection on Social Media: Challenges and the Road Ahead.
IT Prof., 2022
CovertSYS: A systematic covert communication approach for providing secure end-to-end conversation via social networks.
J. Inf. Secur. Appl., 2022
Modern Authentication Schemes in Smartphones and IoT Devices: An Empirical Survey.
IEEE Internet Things J., 2022
Classification of ADHD Patients Using Kernel Hierarchical Extreme Learning Machine.
CoRR, 2022
Information Hiding in Digital Textual Contents: Techniques and Current Challenges.
Computer, 2022
Opinion mining towards blockchain technology adoption for accessing digital library resources.
Aslib J. Inf. Manag., 2022
Do Dark Web and Cryptocurrencies Empower Cybercriminals?
Proceedings of the Digital Forensics and Cyber Crime - 12th EAI International Conference, 2021
A New Gene Selection Algorithm using Fuzzy-Rough Set Theory for Tumor Classification.
CoRR, 2020
An Overview of Two Age Synthesis and Estimation Techniques.
CoRR, 2020
An Effective Automatic Image Annotation Model Via Attention Model and Data Equilibrium.
CoRR, 2020
A Survey on Smartphones Security: Software Vulnerabilities, Malware, and Attacks.
CoRR, 2020
ANiTW: A Novel Intelligent Text Watermarking technique for forensic identification of spurious information on social media.
Comput. Secur., 2020
A Survey of Genetic Programming and Its Applications.
KSII Trans. Internet Inf. Syst., 2019
Modern Text Hiding, Text Steganalysis, and Applications: A Comparative Analysis.
Entropy, 2019
EACMS: Emergency Access Control Management System for Personal Health Record Based on Blockchain.
IEEE Access, 2019
Safety Risk Monitoring of Cyber-Physical Power Systems Based on Ensemble Learning Algorithm.
IEEE Access, 2019
A Comparative Analysis of Information Hiding Techniques for Copyright Protection of Text Documents.
Secur. Commun. Networks, 2018
AITSteg: An Innovative Text Steganography Technique for Hidden Transmission of Text Message via Social Media.
IEEE Access, 2018
An innovative technique for web text watermarking (AITW).
Inf. Secur. J. A Glob. Perspect., 2016