Author of the publication

Noise suppression using modified NOLM for stealth signal receiving in optical steganography system.

, , , , , and . WOCC, page 630-633. IEEE, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optical steganographic transmission of spectral-phase-encoded OCDMA signal over a public DPSK channel., , , , , , and . WOCC, page 552-554. IEEE, (2013)Empowering Practical Root Cause Analysis by Large Language Models for Cloud Incidents., , , , , , , , , and 7 other author(s). CoRR, (2023)Automatic Root Cause Analysis via Large Language Models for Cloud Incidents., , , , , , , , , and 8 other author(s). EuroSys, page 674-688. ACM, (2024)SHADEWATCHER: Recommendation-guided Cyber Threat Analysis using System Audit Records., , , , , , and . SP, page 489-506. IEEE, (2022)Noise suppression using modified NOLM for stealth signal receiving in optical steganography system., , , , , and . WOCC, page 630-633. IEEE, (2013)Push-Button Reliability Testing for Cloud-Backed Applications with Rainmaker., , , , and . NSDI, page 1701-1716. USENIX Association, (2023)WATSON: Abstracting Behaviors from Audit Logs via Aggregation of Contextual Semantics., , , , , and . NDSS, The Internet Society, (2021)Configuration Validation with Large Language Models., , , , , and . CoRR, (2023)SoK: History is a Vast Early Warning System: Auditing the Provenance of System Intrusions., , , , , , , , and . SP, page 2620-2638. IEEE, (2023)