Wang, Shiuh
322  Ergebnisse:
Personensuche X
?
1

Über ein Vorkommen von Adonit:

Wessely, F. ; Wang, Shiuh
Monatshefte für Chemie.  72 (1939)  1 - p. 168-168 , 1939
 
?
 
?
4

Lawful Remote Forensics Mechanism With Admissibility of Evi..:

Chew, Chit-Jie ; Lee, Wei-Bin ; Sung, Tzu-Li...
IEEE Transactions on Information Forensics and Security.  19 (2024)  - p. 5956-5970 , 2024
 
?
 
?
7

Efficient Steganographic Method Based on Modulo Cube:

, In: 2021 International Conference on Security and Information Technologies with AI, Internet Computing and Big-data Applications; Smart Innovation, Systems and Technologies,
 
?
 
?
10

A High Capacity Reversible Data Hiding in Encrypted Images ..:

, In: 2021 International Conference on Security and Information Technologies with AI, Internet Computing and Big-data Applications; Smart Innovation, Systems and Technologies,
 
?
11

Security with Intelligent Computing and Big-Data Services 2.. 

Advances in Intelligent Systems and Computing, 1145
Jain, Lakhmi C ; Peng, Sheng-Lung ; Wang, Shiuh-Jeng - 1st ed. 2020 . , 2020
 
?
12

Embedding Advanced Persistent Threat in Steganographic Imag..:

, In: Advances in Intelligent Systems and Computing; Security with Intelligent Computing and Big-Data Services 2019,
 
?
 
?
14

Profiling Operations of Cyber Army in Manipulating Public O..:

, In: Proceedings of the 6th International Conference on Frontiers of Educational Technologies,
Chiang, Chang-Po ; Chen, Hung-Yuan ; Tsai, Tyan-Muh... - p. 222-225 , 2020
 
?
15

A Chaotic Attack Offering with Improving Mechanism in Econo..:

, In: 2020 International Conference on Pervasive Artificial Intelligence (ICPAI),
Ko, Hung-Jui ; Wang, Guan-Yu ; Horng, Gwoboa. - p. 41-45 , 2020
 
1-15