Author of the publication

Using Insider Swapping of Time Intervals to Perform Highly Invisible Network Flow Watermarking.

, , , , , and . Secur. Commun. Networks, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

GANs-LSTM Model for Soil Temperature Estimation From Meteorological: A New Approach., , , , , , and . IEEE Access, (2020)Using Insider Swapping of Time Intervals to Perform Highly Invisible Network Flow Watermarking., , , , , and . Secur. Commun. Networks, (2018)Detecting JitterBug covert timing channel with sparse embedding., , , and . Secur. Commun. Networks, 9 (11): 1509-1519 (2016)Detecting Stealthy Domain Generation Algorithms Using Heterogeneous Deep Neural Network Framework., , , , and . IEEE Access, (2020)Network covert timing channel with distribution matching., , and . Telecommun. Syst., 49 (2): 199-205 (2012)Network Packet Length Covert Channel Based on Empirical Distribution Function., , and . J. Networks, 9 (6): 1440-1446 (2014)Secure multimedia watermarking authentication in wavelet domain., , , , , and . J. Electronic Imaging, 17 (3): 033010 (2008)GAN-generated fake face detection via two-stream CNN with PRNU in the wild., , , , , , and . Multim. Tools Appl., 81 (29): 42527-42545 (2022)Designing Rich-Secure Network Covert Timing Channels Based on Nested Lattices., , , , and . KSII Trans. Internet Inf. Syst., 13 (4): 1866-1883 (2019)Route Optimization Algorithm Based on Game Theory for Tourism Routes at Pseudo-Imperial Palace., , , , and . J. Inf. Process. Syst., 17 (5): 879-891 (2021)