has been cited by the following article(s):
[1]
|
Research on Edge Detection Algorithm of Indoor Soft Decoration Pattern
Mobile Information Systems,
2022
DOI:10.1155/2022/6818919
|
|
|
[2]
|
Cyberspace Security Using Adversarial Learning and Conformal Prediction
Intelligent Information Management,
2015
DOI:10.4236/iim.2015.74016
|
|
|
[3]
|
Biometric Security and Privacy Using Smart Identity Management and Interoperability: Validation and Vulnerabilities of Various Techniques
Review of Policy Research,
2012
DOI:10.1111/j.1541-1338.2011.00538.x
|
|
|