author: selwyn piramuthu

Future Network Systems and Security: 4th International Conference, FNSS 2018, Paris, France, July 9–11, 2018, Proceedings

... PDF-related CVEs each year. 2016 and 2017 saw an increase in reported CVEs, compared to previous years. Figures collected from [5] than doubling the number of reported CVEs (31 in 2015, 67 in 2016), which continued in 2017, increasing ...

Future Network Systems and Security: Second International Conference, FNSS 2016, Paris, France, November 23-25, 2016, Proceedings

... OpenCV library [5] and is implemented using the FloodFill algorithm. The basic idea underlying this square recognition algorithm is to start the scanning process from the top left corner, and scan from left to right and top to bottom ...

Smart Data Intelligence: Proceedings of ICSMDI 2022

... Foolbox native: fast adversarial attacks to benchmark the robustness of machine learning models in pytorch, tensorflow, and jax. J Open Source Softw 5(53):2607 9. Carlini N, Wagner D (2017) Adversarial examples are not easily detected ...

Data Intelligence and Cognitive Informatics: Proceedings of ICDICI 2020

... Suma, S., 709 Sumithra Devi, K. A., 725 Supreeth, H. V., 287 Suresh, Meenu, 397, 409, 433, 781 Swetha, O., 873 T ... Sharma, Bharti, 699 Sharma, Chetanya, 307 Sharma, Luv, 423 Sharma, Riya, 315 Sharma, Tanisha, 333 Shatheesh Sam, I., 781 ...

Data Intelligence and Cognitive Informatics: Proceedings of ICDICI 2023

... upload the files. The uploaded file is shown to the user in table format. The table has Share Link column through which the user can copy the link of file and share it with other users securely. Since the link can be viewed by ...

Future Network Systems and Security: Third International Conference, FNSS 2017, Gainesville, FL, USA, August 31 - September 2, 2017, Proceedings

... no longer a need to convert the password into a hash. It is important to ... survey that brute force attack often takes the longest to find a password. It does, however, go ... Password Hacking 31 2.1 Brute Force Attack 2.2 Dictionary Attack.

Advances in Signal Processing and Intelligent Recognition Systems: 5th International Symposium, SIRS 2019, Trivandrum, India, December 18–21, 2019, Revised Selected Papers

... traffic sign recognition until the arrival of German Traffic Sign Recognition Benchmark (GTSRB) [17] and the German Traffic Sign Detection Benchmark (GTSDB) [9] which are two openly accessible broad datasets for the correlation of ...

This website uses cookies and collects data for optimal performance. Your continued use signifies agreement to our Privacy Policy.