Author of the publication

Using Insider Swapping of Time Intervals to Perform Highly Invisible Network Flow Watermarking.

, , , , , and . Secur. Commun. Networks, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Thermal Properties Reduced Models by ANN in Process Simulation., , , and . ISNN (2), volume 3973 of Lecture Notes in Computer Science, page 1065-1070. Springer, (2006)Decentralized Fair Resource Allocation for Relay-Assisted Cognitive Cellular Downlink Systems., , , , , and . ICC, page 1-5. IEEE, (2009)基于TrustZone的指纹识别安全技术研究与实现 (Research and Implementation of Fingerprint Identification Security Technology Based on ARM TrustZone)., , and . 计算机科学, 43 (7): 147-152 (2016)Construction of the comprehensive student service platform for institutions of higher education exploration and practice.. LISS, page 1-5. IEEE, (2016)A novel method for generation of motion saliency., , , and . ICIP, page 4685-4688. IEEE, (2010)CLTC: A Chinese-English Cross-lingual Topic Corpus., , , and . LREC, page 532-537. European Language Resources Association (ELRA), (2012)Ontology-based model for Chinese Calligraphy Synthesis., , , , and . Comput. Graph. Forum, 32 (7): 11-20 (2013)Relations among convergence concepts of uncertain sequences., and . Inf. Sci., (2012)Dynamical Behaviors of the Tumor-Immune System in a Stochastic Environment., , , and . SIAM J. Appl. Math., 79 (6): 2193-2217 (2019)Fusing Knowledge and Aspect Sentiment for Explainable Recommendation., , and . IEEE Access, (2020)