Abstract: Environmental planning, hazard monitoring, and coastal management depend critically on accurate shoreline definition. This work utilizes high-resolution UAV data to develop a deep learning ...
Abstract: With the growing volume of VoIP traffic, many steganography algorithms exploit VoIP speech as a carrier, posing a threat to cybersecurity. Among them, quantization index modulation ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results