Author of the publication

Cryptanalysis of a secure image encryption scheme based on a novel 2D sine-cosine cross‑chaotic map.

, , , and . J. Real Time Image Process., 18 (6): 2135-2149 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adaptive Sparse Array Reconfiguration based on Machine Learning Algorithms., , and . ICASSP, page 1159-1163. IEEE, (2018)Trajectory tracking and balance control of an autonomous bikebot., , , and . ICRA, page 2414-2419. IEEE, (2017)Robust fuzzy sliding mode control based on low pass filter for the welding robot with dynamic uncertainty., , and . Ind. Robot, 47 (1): 111-120 (2020)Dim Moving Point Target Detection in Cloud Clutter Scenes Based on Temporal Profile Learning., , , , and . IEEE Geosci. Remote. Sens. Lett., (2023)Moving Point Target Detection Based on Temporal Transient Disturbance Learning in Low SNR., , , , , , and . Remote. Sens., 15 (10): 2523 (2023)Road-Side Individual Tree Segmentation from Urban MLS Point Clouds Using Metric Learning., , , , , , and . Remote. Sens., 15 (8): 1992 (April 2023)Virtuoso: Video-based Intelligence for real-time tuning on SOCs., , , , , , , and . CoRR, (2021)GLGE: A New General Language Generation Evaluation Benchmark., , , , , , , , , and 8 other author(s). CoRR, (2020)FoMO and the brain: Loneliness and problematic social networking site use mediate the association between the topology of the resting-state EEG brain network and fear of missing out., , , , , and . Comput. Hum. Behav., (April 2023)Intrusion Detection of Imbalanced Network Traffic Based on Machine Learning and Deep Learning., , , and . IEEE Access, (2021)