Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Deterministic convergence of an online gradient method for BP neural networks., , , and . IEEE Trans. Neural Networks, 16 (3): 533-540 (2005)BFDAC: A Blockchain-Based and Fog-Computing-Assisted Data Access Control Scheme in Vehicular Social Networks., , , , and . IEEE Internet Things J., 11 (2): 3510-3523 (January 2024)Image Inpainting Anti-Forensics Network via Attention-Guided Hierarchical Reconstruction., , and . Symmetry, 15 (2): 393 (February 2023)Detection of double JPEG compression using modified DenseNet model., , and . Multim. Tools Appl., 78 (7): 8183-8196 (2019)Hierarchical Authorization of Convolutional Neural Networks for Multi-User., , and . IEEE Signal Process. Lett., (2021)Image Steganalysis Network Based on Dual-Attention Mechanism., , and . IEEE Signal Process. Lett., (2023)A Fast Method for Robust Video Watermarking Based on Zernike Moments., , , , and . IEEE Trans. Circuits Syst. Video Technol., 33 (12): 7342-7353 (December 2023)CADW: CGAN-Based Attack on Deep Robust Image Watermarking., , , and . IEEE Multim., 30 (1): 28-35 (January 2023)Multichannel Steganography in Digital Images for Multiple Receivers., , , and . IEEE Multim., 28 (1): 65-73 (2021)Compressing Encrypted Images With Auxiliary Information., , , , and . IEEE Trans. Multim., 16 (5): 1327-1336 (2014)