Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cryptanalysis of a Semi-Quantum Bi-Signature Scheme Based on W States., , , and . Entropy, 24 (10): 1408 (2022)Prediction of Mathematical Expression Constraints (ME-Con)., , and . DocEng, page 19:1-19:4. ACM, (2018)A Large Payload Data Hiding Scheme Using Scalable Secret Reference Matrix., , , and . Symmetry, 14 (4): 828 (2022)CRED: a rapid peak caller for Chem-seq data., , , and . J. Open Source Softw., 4 (37): 1423 (2019)Quantifying Tactical Risk: A Framework for Statistical Classification Using MECH., , , and . SBP, volume 9021 of Lecture Notes in Computer Science, page 446-451. Springer, (2015)A novel data hiding scheme based on multidimensional reference tensors., , and . Multim. Tools Appl., 83 (9): 25695-25712 (March 2024)Authenticated Semi-Quantum Key Distribution Protocol Based on W States., , , and . Sensors, 22 (13): 4998 (2022)ScreenAI: A Vision-Language Model for UI and Infographics Understanding., , , , , , , , , and . CoRR, (2024)A Novel Secure Data Hiding Scheme Using a Secret Reference Matrix., , , and . IIH-MSP, page 369-373. IEEE Computer Society, (2009)Behavior Profiling of Role-Playing Game Players Based on Heuristic Event Log Mining., , , and . ICS, volume 1723 of Communications in Computer and Information Science, page 521-532. Springer, (2022)