Ahmad, Tohari
226  Ergebnisse:
Personensuche X
?
1

Feature Selection Using Pearson Correlation with Lasso Regr..:

, In: 2024 12th International Symposium on Digital Forensics and Security (ISDFS),
 
?
2

Enigma on the Board: Chess-Based Steganography for Secure C..:

, In: 2024 International Conference on Green Energy, Computing and Sustainable Technology (GECOST),
 
?
3

Analysis of Large Capacity Reversible Data Hiding for ECG U..:

, In: 2024 International Conference on Green Energy, Computing and Sustainable Technology (GECOST),
 
?
5

Image Steganography using Customized Differences between th..:

, In: 2024 7th International Conference on Informatics and Computational Sciences (ICICoS),
 
?
6

A Steganographic Approach Based on Pixel Blocks Differencin..:

, In: 2024 Conference on Information Communications Technology and Society (ICTAS),
 
?
10

Load Characterization of AI Applications using DQoES Schedu..:

, In: 2024 12th International Symposium on Digital Forensics and Security (ISDFS),
 
?
12

Enhancing Data Security Using Steganography in Spatial Doma..:

, In: 2024 Second International Conference on Emerging Trends in Information Technology and Engineering (ICETITE),
 
?
14

Analysis of Anomaly with Machine Learning Based Model for D..:

, In: 2024 International Conference on Green Energy, Computing and Sustainable Technology (GECOST),
 
?
15

Reduced Difference Expansion based on Cover Image Bisection..:

, In: 2024 Conference on Information Communications Technology and Society (ICTAS),
 
1-15