Author of the publication

Novel Steganographic Schemes Based on Row-Major Mapping Relation.

, , , and . IIH-MSP, page 392-395. IEEE Computer Society, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

HHUIF and MSICF: Novel algorithms for privacy preserving utility mining., and . Expert Syst. Appl., 37 (7): 4779-4786 (2010)Novel Steganographic Schemes Based on Row-Major Mapping Relation., , , and . IIH-MSP, page 392-395. IEEE Computer Society, (2006)Assigning Keys in a Hierarchy., , , and . IIH-MSP, page 1363-1366. IEEE Computer Society, (2008)A new data structure for asynchronous periodic pattern mining., and . ICUIMC, page 426-431. ACM, (2009)A Fast Algorithm for Mining Share-Frequent Itemsets., , and . APWeb, volume 3399 of Lecture Notes in Computer Science, page 417-428. Springer, (2005)Direct Candidates Generation: A Novel Algorithm for Discovering Complete Share-Frequent Itemsets., , and . FSKD (2), volume 3614 of Lecture Notes in Computer Science, page 551-560. Springer, (2005)SP&EPPF: A Novel Algorithm for Sequential Interval-based Pattern Mining., and . DMIN, page 343-349. CSREA Press, (2010)Novel Algorithms for Privacy Preserving Utility Mining., , and . ISDA (1), page 291-296. IEEE Computer Society, (2008)Preference Utility algorithm using GPGPU architecture., , , , , and . ICIS, page 155-160. IEEE Computer Society, (2013)Efficient algorithms for incremental utility mining., , and . ICUIMC, page 212-217. ACM, (2008)