共 21 条
- [2] Almohammad A., 2010, 2010 2nd International Conference on Image Processing Theory, Tools and Applications (IPTA 2010), P215, DOI 10.1109/IPTA.2010.5586786
- [3] Balasaraswathi VR, 2014, 2014 INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION CONTROL AND COMPUTING TECHNOLOGIES (ICACCCT), P1190, DOI 10.1109/ICACCCT.2014.7019286
- [5] An Approach to Image Spam Filtering Based on Base64 Encoding and N-Gram Feature Extraction [J]. 22ND INTERNATIONAL CONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE (ICTAI 2010), PROCEEDINGS, VOL 1, 2010,
- [6] Khajeh-Hosseini A., 2010, RES CHALLENGES ENTER, P7
- [7] Lee B., 2018, 2018 SPACEOPS C, P1, DOI [DOI 10.1007/978-3-319-68517-5_1, DOI 10.1145/3170427.3170631, 10.1145/3170427.3170631]
- [8] Li Y., 2016, INTELLIGENT CRYPTOGR, P1
- [9] Manaa M.E, 2018, J ENG APPL SCI, V13, P2382, DOI [10.3923/jeasci.2018.2382.2387, DOI 10.36478/JEASCI.2018.2382.2387]
- [10] Manaa M.E., 2017, J TELECOMMUN ELECT C, V9, P1