Author of the publication

An Image Steganalysis Algorithm Based on Rotation Forest Transformation and Multiple Classifiers Ensemble.

, , , , and . EIDWT, volume 6 of Lecture Notes on Data Engineering and Communications Technologies, page 1-12. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Calculation of utility of network services based on state manifolds., , and . Comput. Networks, (2022)Malware classification for the cloud via semi-supervised transfer learning., , , , , and . J. Inf. Secur. Appl., (2020)Privacy Protection Method Based On Multidimensional Feature Fusion Under 6G Networks., , , and . IEEE Trans. Netw. Sci. Eng., 10 (3): 1462-1471 (May 2023)Adaptive Information Hiding Method Based on Feature Extraction for Visible Light Communication., , , , and . IEEE Commun. Mag., 61 (4): 102-106 (April 2023)Real-time Processing and Storage of Multimedia Data with Content Delivery Network in Vehicle Monitoring System., , , and . WINCOM, page 1-4. IEEE, (2018)Research on a Multi-Level Combination of Software Defect Localization Method., , , and . SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI, page 1305-1311. IEEE, (2019)A Detecting Method of Array Bounds Defects Based on Symbolic Execution., , , , and . NSS, volume 10394 of Lecture Notes in Computer Science, page 373-385. Springer, (2017)Design and implementation of Data Center Network Global Congestion Price Calculating method based on Software Defined Networking., and . 3PGCIC, volume 1 of Lecture Notes on Data Engineering and Communications Technologies, page 459-466. Springer, (2016)Outsourcing Online/offline Proxy Re-encryption for Mobile Cloud Storage Sharing., , , , and . 3PGCIC, volume 24 of Lecture Notes on Data Engineering and Communications Technologies, page 478-485. Springer, (2018)Predicting Vulnerable Software Components Using Software Network Graph., , , and . CSS, volume 10581 of Lecture Notes in Computer Science, page 280-290. Springer, (2017)