109 | -- | 128 | Muhammad Shafiq, Xiangzhan Yu, Asif Ali Laghari. WeChat traffic classification using machine learning algorithms and comparative analysis of datasets |
129 | -- | 148 | Vandana Mohindru, Yashwant Singh. Node authentication algorithm for securing static wireless sensor networks from node clone attack |
149 | -- | 169 | Shaojing Li, Wanli Su. The research of reputation incentive mechanism of P2P network file sharing system |
170 | -- | 200 | Shashank Gupta 0002, Brij Bhooshan Gupta. Robust injection point-based framework for modern applications against XSS vulnerabilities in online social networks |
201 | -- | 215 | Sujarani Rajendran, Manivannan Doraipandian. A nonlinear two dimensional logistic-tent map for secure image communication |
216 | -- | 236 | Soumitra Roy, Arup Kumar Pal. A robust reversible image watermarking scheme in DCT domain using Arnold scrambling and histogram modification |
237 | -- | 247 | Lihua Song, Xiaofeng Zhang. Improved pixel relevance based on Mahalanobis distance for image segmentation |
248 | -- | 260 | Yujuan Sun, Xiaofeng Zhang, Muwei Jian. 3D reconstruction of human face from an input image under random lighting condition |
261 | -- | 275 | Amita, Amandeep Kaur, Marut Kumar. Reversible data hiding in absolute moment block truncation coding compressed images using adaptive multilevel histogram shifting technique |
276 | -- | 302 | Dulal C. Kar, Anusha Madhuri Nakka, Ajay K. Katangur. A new statistical attack resilient steganography scheme for hiding messages in audio files |
303 | -- | 320 | Rohit Raja, Tilendra Shishir Sinha, Raj Kumar Patra, Shrikant Tiwari. Physiological trait-based biometrical authentication of human-face using LGXP and ANN techniques |