Cited By
View all- Chechet AChernykh MPanasiuk IAbdullin I(2024)Front-end security architecture: protection of user data and privacyScientific journal of the Ternopil national technical university10.33108/visnyk_tntu2024.03.005115:3(5-16)Online publication date: 2024
- Toguchi SMiyata T(2024)Real image noise aware steganography with image denoising and generative adversarial networkNonlinear Theory and Its Applications, IEICE10.1587/nolta.15.73715:4(737-749)Online publication date: 2024
- Bhaskar APearce PLuo BLiao XXu JKirda ELie D(2024)Understanding Routing-Induced Censorship Changes GloballyProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3670336(437-451)Online publication date: 2-Dec-2024
- Show More Cited By