Open Access
ARTICLE
Hoon Ko1, Marek R. Ogiela2,*
1 Division of Computer Science and Engineering, Sunmoon University, Asan, 31460, Republic of Korea
2 AGH University of Krakow, Cryptography and Cognitive Informatics Laboratory, Krakow, 30-059, Poland
* Corresponding Author: Marek R. Ogiela. Email:
(This article belongs to the Special Issue: Innovative AI Applications in Pattern Recognition and Visual Data Processing and Hiding)
Computers, Materials & Continua https://doi.org/10.32604/cmc.2024.057257
Received 13 August 2024; Accepted 29 November 2024; Published online 13 December 2024
View
Download
Like
Automatic Mining of Security-Sensitive Functions from Source Code
Lin Chen, Chunfang Yang, Fenlin...Phishing Detection with Image Retrieval Based on Improved Texton Correlation Descriptor
Guoyuan Lin, Bowen Liu, Pengcheng...Dynamic Proofs of Retrievability Based on Partitioning-Based Square Root Oblivious RAM
Jian Xu, Zhihao Jiang, Andi Wang,...Blockchain-Based Trusted Electronic Records Preservation in Cloud Storage
Zhiliang Deng, Yongjun Ren, Yepeng...A Blockchain-Based Authentication Protocol for WLAN Mesh Security Access
Xin Jiang, Mingzhe Liu, Chen Yang,...