Suchergebnisse
Katalog
Aufsätze & mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Art der Quelle
Thema
- feature extraction 17 Treffer
- receivers 10 Treffer
- security 10 Treffer
- training 10 Treffer
- cameras 9 Treffer
-
45 weitere Werte:
- databases 9 Treffer
- covert communication 8 Treffer
- privacy 8 Treffer
- protocols 8 Treffer
- biometrics 7 Treffer
- forensics 7 Treffer
- communication system security 6 Treffer
- face recognition 6 Treffer
- robustness 6 Treffer
- task analysis 6 Treffer
- wireless communication 6 Treffer
- algorithm design and analysis 5 Treffer
- authentication 5 Treffer
- dynamic time warping 5 Treffer
- jamming 5 Treffer
- low probability of detection 5 Treffer
- reliability 5 Treffer
- throughput 5 Treffer
- transmitters 5 Treffer
- biometrics (access control) 4 Treffer
- cryptography 4 Treffer
- deep learning 4 Treffer
- detectors 4 Treffer
- forgery 4 Treffer
- interference 4 Treffer
- synchronization 4 Treffer
- uncertainty 4 Treffer
- wireless sensor networks 4 Treffer
- adaptation models 3 Treffer
- array signal processing 3 Treffer
- awgn channels 3 Treffer
- computational modeling 3 Treffer
- covert communications 3 Treffer
- data mining 3 Treffer
- differential privacy 3 Treffer
- digital forensics 3 Treffer
- encoding 3 Treffer
- encryption 3 Treffer
- face 3 Treffer
- hardware 3 Treffer
- iris recognition 3 Treffer
- machine learning 3 Treffer
- malware 3 Treffer
- media 3 Treffer
- millimeter wave communication 3 Treffer
Inhaltsanbieter
76 Treffer
-
In: IEEE Transactions on Information Forensics and Security, Jg. 17 (2022), S. 317-331Online academicJournalZugriff:
-
In: IEEE Transactions on Information Forensics and Security, Jg. 15 (2020), S. 1026-1039Online academicJournalZugriff:
-
In: IEEE Transactions on Information Forensics and Security, Jg. 2 (2007-09-01), Heft 3, S. 430-437Online academicJournalZugriff:
-
In: IEEE Transactions on Information Forensics and Security, Jg. 11 (2016-06-01), Heft 6, S. 1346-1346Online academicJournalZugriff:
-
In: IEEE Transactions on Information Forensics and Security, Jg. 9 (2014-12-01), Heft 12, S. 2035-2035Online academicJournalZugriff:
-
In: IEEE Transactions on Information Forensics and Security, Jg. 2 (2007-09-01), Heft 3, S. 513-528Online academicJournalZugriff:
-
In: IEEE Transactions on Information Forensics and Security, Jg. 12 (2017-07-01), Heft 7, S. 1625-1625Online academicJournalZugriff:
-
In: IEEE Transactions on Information Forensics and Security, Jg. 11 (2016-09-01), Heft 9, S. 1970-1970Online academicJournalZugriff:
-
In: IEEE Transactions on Information Forensics and Security, Jg. 17 (2022), S. 2198-2212Online academicJournalZugriff:
-
In: IEEE Transactions on Information Forensics and Security, Jg. 16 (2021), S. 4249-4264Online academicJournalZugriff:
-
In: IEEE Transactions on Information Forensics and Security, Jg. 14 (2019-06-01), Heft 6, S. 1624-1637Online academicJournalZugriff:
-
In: IEEE Transactions on Information Forensics and Security, Jg. 12 (2017-06-01), Heft 6, S. 1393-1393Online academicJournalZugriff:
-
In: IEEE Transactions on Information Forensics and Security, Jg. 12 (2017-03-01), Heft 3, S. 705-705Online academicJournalZugriff:
-
In: IEEE Transactions on Information Forensics and Security, Jg. 7 (2012-04-01), Heft 2, S. 553-562Online academicJournalZugriff:
-
In: IEEE Transactions on Information Forensics and Security, Jg. 13 (2018-04-01), Heft 4, S. 861-861Online academicJournalZugriff:
-
In: IEEE Transactions on Information Forensics and Security, Jg. 6 (2011-12-01), Heft 4, S. 1200-1213Online academicJournalZugriff:
-
In: IEEE Transactions on Information Forensics and Security, Jg. 6 (2011-09-01), Heft 3, S. 803-817Online academicJournalZugriff:
-
In: IEEE Transactions on Information Forensics and Security, Jg. 6 (2011-03-01), Heft 1, S. 213-226Online academicJournalZugriff:
-
In: IEEE Transactions on Information Forensics and Security, Jg. 12 (2017-09-01), Heft 9, S. 2078-2078Online academicJournalZugriff:
-
In: IEEE Transactions on Information Forensics and Security, Jg. 3 (2008-09-01), Heft 3, S. 466-474Online academicJournalZugriff: