Author of the publication

A coverless steganography method based on generative adversarial network.

, , , , and . EURASIP J. Image Video Process., 2020 (1): 18 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Predictive Precompute with Recurrent Neural Networks., , and . CoRR, (2019)Modeling and Verifying Intelligent Unit Transmission Protocol Using CSP Model Checker PAT., , , , and . QRS Companion, page 244-251. IEEE, (2016)一种TTCN-3编解码器的演化方法 (Evolution Method for TTCN-3 Codec)., and . 计算机科学, 44 (4): 131-134 (2017)Comprehensive Criteria-Based Generalized Steganalysis Feature Selection Method., , , , and . IEEE Access, (2020)LandmarkMiner: Street-level Network Landmarks Mining Method for IP Geolocation., , , and . ACM Trans. Internet Things, 2 (3): 21:1-21:22 (2021)Unsupervised Neural Network for Modulation Format Discrimination and Identification., , , , , , and . IEEE Access, (2019)Nonlinear expression and visualization of nonmetric relationships in genetic diseases and microbiome data., , , , , , , and . BMC Bioinform., 19-S (20): 37-48 (2018)Gain-Loss Evaluation-Based Generic Selection for Steganalysis Feature., , , , and . Symmetry, 13 (10): 1775 (2021)Different Characteristics and Drivers of the Extraordinary Pakistan Rainfall in July and August 2022., , , , , and . Remote. Sens., 15 (9): 2311 (May 2023)The association between non-symbolic number comparison and mathematical abilities depends on fluency., , and . Cogn. Process., 23 (3): 423-439 (2022)