Author of the publication

Detection of radio frequency interference using an improved generative adversarial network.

, , , , and . Astron. Comput., (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Facial Privacy Protection Framework Based on Component Difference and Template Morphing., , , and . ICCCN, page 1-9. IEEE, (2020)Identifying natural images and computer generated graphics based on binary similarity measures of PRNU., , and . Multimedia Tools Appl., 78 (1): 489-506 (2019)3-D Printed Object Authentication Based on Printing Noise and Digital Signature., , and . IEEE Trans. Reliab., 68 (1): 342-353 (2019)A reversible watermarking for authenticating 2D CAD engineering graphics based on iterative embedding and virtual coordinates., , , and . Multim. Tools Appl., 78 (19): 26885-26905 (2019)BullyNet: Unmasking Cyberbullies on Social Networks., , , and . IEEE Trans. Comput. Soc. Syst., 8 (2): 332-344 (2021)S-Box Design Based on Discrete Chaotic Map and Improved Artificial Bee Colony Algorithm., and . IEEE Access, (2021)Securing data services: a security architecture design for private storage cloud based on HDFS., , , , and . Int. J. Grid Util. Comput., 4 (4): 242-254 (2013)BDC-GAN: Bidirectional Conversion Between Computer-Generated and Natural Facial Images for Anti-Forensics., , and . IEEE Trans. Circuits Syst. Video Technol., 32 (10): 6657-6670 (2022)An Effective Selective Encryption Scheme for H.264 Video based on Chaotic Qi System., , and . Int. J. Digit. Crime Forensics, 5 (2): 35-49 (2013)Outage performance of double-relay cooperative transmission network with energy harvesting., and . Phys. Commun., (2018)