Awang, Suryanti
55  Ergebnisse:
Personensuche X
?
2

Suspicious Activity Trigger System using YOLOv6 Convolution..:

, In: 2023 International Conference on Artificial Intelligence in Information and Communication (ICAIIC),
 
?
4

Robust blind watermarking approach against the compression ..:

Lebcir, Mohamed ; Awang, Suryanti ; Benziane, Ali
Multimedia Tools and Applications.  81 (2022)  15 - p. 20561-20583 , 2022
 
?
7

Android mobile malware detection using fuzzy AHP:

Mohamad Arif, Juliza ; Ab Razak, Mohd Faizal ; Tuan Mat, Sharfah Ratibah...
Journal of Information Security and Applications.  61 (2021)  - p. 102929 , 2021
 
?
10

A Review: Static Analysis of Android Malware and Detection ..:

, In: 2021 International Conference on Software Engineering & Computer Systems and 4th International Conference on Computational Science and Information Management (ICSECS-ICOCSIM),
 
?
12

Reversible Watermarking Technique for Fingerprint authentic..:

Lebcir, Mohamed ; Awang, Suryanti ; Benziane, Ali
IOP Conference Series: Materials Science and Engineering.  769 (2020)  1 - p. 012070 , 2020
 
?
13

Improvement of the POLISAS e-Request Transcript System usin..:

Hariz bin Ibrahim, Mohd ; Awang, Suryanti ; Moorthy, Kohbalan
IOP Conference Series: Materials Science and Engineering.  769 (2020)  1 - p. 012010 , 2020
 
?
15

The Impact of Pre-processing and Feature Selection on Text ..:

, In: Lecture Notes in Electrical Engineering; Advances in Electronics Engineering,
 
1-15