Author of the publication

Steganalysis of analysis-by-synthesis speech exploiting pulse-position distribution characteristics.

, , , , , , , and . Secur. Commun. Networks, 9 (15): 2934-2944 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Stability of synchronous oscillations in a system of Hodgkin-Huxley neurons with delayed diffusive and pulsed coupling, , , and . Phys.~Rev.~E, 71 (6): 061904 (2005)Digital image watermarking based on Super-Resolution Image Reconstruction., and . FSKD, page 1778-1782. IEEE, (2012)A Novel Botnet Detection Method Based on Preprocessing Data Packet by Graph Structure Clustering., , , , , and . CyberC, page 42-45. IEEE, (2016)Cellular direction information based differential evolution for numerical optimization: an empirical study., , , , and . Soft Comput., 20 (7): 2801-2827 (2016)They are Just Butterflies., and . COCOON, volume 1276 of Lecture Notes in Computer Science, page 512-513. Springer, (1997)Detecting Targets Based on a Realistic Detection and Decision Model in Wireless Sensor Networks., , , , , , and . WASA, volume 9204 of Lecture Notes in Computer Science, page 836-844. Springer, (2015)Tilting Path Optimization of Tilt Quad Rotor in Conversion Process Based on Ant Colony Optimization Algorithm., , , , , , , and . IEEE Access, (2020)The Energy Efficiency of Heterogeneous Cellular Networks Based on the Poisson Hole Process., , and . Future Internet, 15 (2): 56 (February 2023)MISO Unlocks Billions in Savings Through the Application of Operations Research for Energy and Ancillary Services Markets., , , , , , , , , and 3 other author(s). Interfaces, 42 (1): 58-73 (2012)Steganalysis of Inactive Voice-Over-IP Frames Based on Poker Test., , , , , and . Symmetry, 10 (8): 336 (2018)