Author of the publication

Protecting the Visual Fidelity of Machine Learning Datasets Using QR Codes.

, , , , , , and . ML4CS, volume 11806 of Lecture Notes in Computer Science, page 320-335. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploiting QR Code Error Correction for Digital Image Watermarking., , , , and . J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 12 (2): 114-140 (2021)Utilizing QR codes to verify the visual fidelity of image datasets for machine learning., , , , , , and . J. Netw. Comput. Appl., (2021)Functional encryption for computational hiding in prime order groups via pair encodings., , , and . Des. Codes Cryptogr., 86 (1): 97-120 (2018)Subversion in Practice: How to Efficiently Undermine Signatures., , , and . IEEE Access, (2019)Harnessing Policy Authenticity for Hidden Ciphertext Policy Attribute-Based Encryption., , , and . IEEE Trans. Dependable Secur. Comput., 19 (3): 1856-1870 (2022)Efficient Semi-static Secure Broadcast Encryption Scheme., , , and . Pairing, volume 8365 of Lecture Notes in Computer Science, page 62-76. Springer, (2013)QR Code Watermarking for Digital Images., , , and . WISA, volume 11897 of Lecture Notes in Computer Science, page 25-37. Springer, (2019)TLS Goes Low Cost: When TLS Meets Edge., , , , and . WISA, volume 13720 of Lecture Notes in Computer Science, page 102-113. Springer, (2022)Functional Encryption for Pattern Matching with a Hidden String., , , , and . Cryptogr., 6 (1): 1 (2022)Generic Construction of Fair Exchange Scheme with Semi-Trusted Adjudicator., , , , and . J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 10 (4): 68-87 (2019)