Author of the publication

Software Protection Against Illegal Copy Using Software Watermarking.

, , , , and . SoMeT, volume 297 of Frontiers in Artificial Intelligence and Applications, page 503-511. IOS Press, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Growing Cell Neural Network Structure for Off-Line Signature Recognition., , , and . IWANN (2), volume 2085 of Lecture Notes in Computer Science, page 192-199. Springer, (2001)Using Twitter Data to Monitor Natural Disaster Social Dynamics: A Recurrent Neural Network Approach with Word Embeddings and Kernel Density Estimation., , , , , , and . Sensors, 19 (7): 1746 (2019)A Graphical User Interface for Fast Evaluation and Testing of Machine Learning Models Performance., , , , and . IWBF, page 1-5. IEEE, (2019)Compact image steganalysis for LSB-matching steganography., , , , , and . IWBF, page 1-6. IEEE, (2017)IPN Hand: A Video Dataset and Benchmark for Real-Time Continuous Hand Gesture Recognition., , , and . ICPR, page 4340-4347. IEEE, (2020)A Fast-RCNN Implementation for Human Silhouette Detection in Video Sequences., , , , , and . SoMeT, volume 327 of Frontiers in Artificial Intelligence and Applications, page 65-75. IOS Press, (2020)Security attack prediction based on user sentiment analysis of Twitter data., , , , , , , and . ICIT, page 610-617. IEEE, (2016)An automatic visible watermark detection method using total variation., , , , , and . IWBF, page 1-5. IEEE, (2017)Improving Real-Time Hand Gesture Recognition with Semantic Segmentation., , , , , , and . Sensors, 21 (2): 356 (2021)Automatic Malware Clustering using Word Embeddings and Unsupervised Learning., , , , , and . IWBF, page 1-6. IEEE, (2019)