Author of the publication

Identification of Electronic Disguised Voices in the Noisy Environment.

, , , , and . IWDW, volume 10082 of Lecture Notes in Computer Science, page 75-87. (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Self-Embedding Watermarking Scheme Based on MDS Codes., , , and . IWDW, volume 9569 of Lecture Notes in Computer Science, page 250-258. Springer, (2015)Intra-Frame Error Concealment Scheme Using 3D Reversible Data Hiding in Mobile Cloud Environment., , , and . IEEE Access, (2018)Reversible adversarial steganography for security enhancement., , , , , and . J. Vis. Commun. Image Represent., (December 2023)A Feature-Map-Based Large-Payload DNN Watermarking Algorithm., , , and . IWDW, volume 13180 of Lecture Notes in Computer Science, page 135-148. Springer, (2021)Constructing Immune Cover for Secure Steganography Based on an Artificial Immune System Approach., , and . IWDW, volume 12617 of Lecture Notes in Computer Science, page 53-67. Springer, (2020)KRE: A Key-retained Random Erasing Method for Occluded Person Re-identification., , and . CACML, page 467-473. ACM, (2023)Temporal and Spatial Evolution of Green Invention Patent Applications in China., , , and . Inf., 13 (5): 240 (2022)A Two-Stage Cascaded Detection Scheme for Double HEVC Compression Based on Temporal Inconsistency., , , and . Secur. Commun. Networks, (2021)Multi-layer assignment steganography using graph-theoretic approach., , , and . Multim. Tools Appl., 74 (18): 8171-8196 (2015)Damage Monitoring of Braided Composites Using CNT Yarn Sensor Based on Artificial Fish Swarm Algorithm., , , , and . Sensors, 23 (16): 7067 (August 2023)