• Reference Citation Analysis
  • v
  • v
  • Find an Article
  • Find an Author
Download
Number Citation Analysis
1
Khan AN, Mehmood A, Bhutta MNM, Khan IA, Khan AUR. An efficient and compromise-resilient image encryption scheme for resource-constrained environments. PLoS One 2024;19:e0297534. [PMID: 38635816 PMCID: PMC11025941 DOI: 10.1371/journal.pone.0297534] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [MESH Headings] [Grants] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 10/13/2023] [Accepted: 01/08/2024] [Indexed: 04/20/2024]  Open
2
Kumar R, Saraswat M, Ather D, Mumtaz Bhutta MN, Basheer S, Thakur RN. Deformation Adjustment with Single Real Signature Image for Biometric Verification Using CNN. Comput Intell Neurosci 2022;2022:4406101. [PMID: 35789609 PMCID: PMC9250446 DOI: 10.1155/2022/4406101] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 03/29/2022] [Revised: 04/23/2022] [Accepted: 05/16/2022] [Indexed: 01/15/2023]
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA