Author of the publication

REPAIR: fragile watermarking for encrypted speech authentication with recovery ability.

, , , and . Telecommun. Syst., 75 (3): 273-289 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

BFLS: Blockchain and Federated Learning for sharing threat detection models as Cyber Threat Intelligence., , , , and . Comput. Networks, (April 2023)A Fragile Watermarking Algorithm for Speech Authentication by Modifying Least Significant Digits., and . ICCCS, page 680-684. IEEE, (2020)Towards Feature Selection for Detecting LDDoS in SD-IoT of Smart Grids: A Multi-correlation Information EA-based Method., , , , , and . ISCAI, page 60-66. ACM, (2023)Human mobility and COVID-19 transmission: a systematic review and future directions., , , , , , , , , and 2 other author(s). Ann. GIS, 28 (4): 501-514 (2022)The Named Entity Recognition of Chinese Cybersecurity Using an Active Learning Strategy., , , and . Wirel. Commun. Mob. Comput., (2021)USAGE : Uncertain flow graph and spatio-temporal graph convolutional network-based saturation attack detection method., , , , , and . J. Netw. Comput. Appl., (October 2023)LNAD: Towards Lightweight Network Anomaly Detection in Software-Defined Networking., , , and . HPCC/DSS/SmartCity, page 855-860. IEEE, (2020)VICTOR: An Adaptive Framing-based Speech Content Authentication and Recovery Algorithm., , , , and . HPCC/DSS/SmartCity/DependSys, page 1649-1654. IEEE, (2022)EX-Action: Automatically Extracting Threat Actions from Cyber Threat Intelligence Report Based on Multimodal Learning., , , , and . Secur. Commun. Networks, (2021)METER: An Ensemble DWT-based Method for Identifying Low-rate DDoS Attack in SDN., , , , , and . EUC, page 79-86. IEEE, (2021)