Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A steganalysis method in the DCT domain., , , , and . Multim. Tools Appl., 75 (10): 5999-6019 (2016)Co-Evolutionary Niching Differential Evolution Algorithm for Global Optimization., , , , and . IEEE Access, (2021)A watermarking scheme based on rotating vector for image content authentication., , , and . Soft Comput., 24 (8): 5755-5772 (2020)Spark-based real-time proactive image tracking protection model., , , , and . EURASIP J. Information Security, (2019)Trinity-Yolo: High-precision logo detection in the real world., , , , and . IET Image Process., 17 (7): 2272-2283 (2023)Research on realizing the 3D occlusion tracking location method of fish's school target., , , , and . Neurocomputing, (2016)Adaptive Multisubpopulation Competition and Multiniche Crowding-Based Memetic Algorithm for Automatic Data Clustering., , , , , and . IEEE Trans. Evol. Comput., 20 (6): 838-858 (2016)A Super-Resolution Generative Adversarial Network with Simplified Gradient Penalty and Relativistic Discriminator., , , , and . IJCNN, page 1-8. IEEE, (2019)A three-dimensional coordinate positioning method of fish target based on computer vision using a single camera., , , , , and . MDA, page 25-43. ibai Publishing, (2017)Target Depth Measurement for Machine Monocular Vision., , , , and . PCM (2), volume 10736 of Lecture Notes in Computer Science, page 583-595. Springer, (2017)