From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A distributed algorithm for computing Connected Dominating Set in ad hoc networks., , и . Int. J. Wirel. Mob. Comput., 1 (2): 148-155 (2006)A New High Capacity Image Steganography Method Combined With Image Elliptic Curve Cryptography and Deep Neural Network., , , , , и . IEEE Access, (2020)3D elastic optical networking in the temporal, spectral, and spatial domains., , , , , , , и . IEEE Commun. Mag., 53 (2): 79-87 (2015)Efficient image noise estimation based on skewness invariance and adaptive noise injection., , , , и . IET Image Process., 14 (7): 1393-1401 (2020)GAN-based spatial image steganography with cross feedback mechanism., , и . Signal Process., (2022)On the fault-tolerant performance for a class of robust image steganography., , , , и . Signal Process., (2018)A novel image hashing scheme with perceptual robustness using block truncation coding., , , , и . Inf. Sci., (2016)Unbundling Smart Meter Services Through Spatiotemporal Decomposition Agents in DER-Rich Environment., , и . IEEE Trans. Ind. Informatics, 18 (1): 666-676 (2022)A hierarchical threshold secret image sharing., , и . Pattern Recognit. Lett., 33 (1): 83-91 (2012)Reversible Image Steganography Scheme Based on a U-Net Structure., , , , , и . IEEE Access, (2019)