Author of the publication

Research on extraction method of urban impervious surface information.

, , , and . Geoinformatics, page 1-4. IEEE, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Network covert timing channel with distribution matching., , and . Telecommun. Syst., 49 (2): 199-205 (2012)Network Packet Length Covert Channel Based on Empirical Distribution Function., , and . J. Networks, 9 (6): 1440-1446 (2014)Using Insider Swapping of Time Intervals to Perform Highly Invisible Network Flow Watermarking., , , , , and . Secur. Commun. Networks, (2018)Detecting JitterBug covert timing channel with sparse embedding., , , and . Secur. Commun. Networks, 9 (11): 1509-1519 (2016)Detecting Stealthy Domain Generation Algorithms Using Heterogeneous Deep Neural Network Framework., , , , and . IEEE Access, (2020)GANs-LSTM Model for Soil Temperature Estimation From Meteorological: A New Approach., , , , , , and . IEEE Access, (2020)GAN-generated fake face detection via two-stream CNN with PRNU in the wild., , , , , , and . Multim. Tools Appl., 81 (29): 42527-42545 (2022)Designing Rich-Secure Network Covert Timing Channels Based on Nested Lattices., , , , and . KSII Trans. Internet Inf. Syst., 13 (4): 1866-1883 (2019)Covert Communication Gains From Adversary's Uncertainty of Phase Angles., , , , and . IEEE Trans. Inf. Forensics Secur., (2023)Secure multimedia watermarking authentication in wavelet domain., , , , , and . J. Electronic Imaging, 17 (3): 033010 (2008)