Author of the publication

Cycle-Consistent Adversarial GAN: The Integration of Adversarial Attack and Defense.

, , , , , , , and . Secur. Commun. Networks, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Visual cryptography scheme for secret color images with color QR codes., , , , , and . J. Vis. Commun. Image Represent., (2022)Multitone reconstruction visual cryptography based on phase periodicity., , , , and . J. Vis. Commun. Image Represent., (May 2023)Interval Type-2 Fuzzy Sliding-Mode Control of Three-Axis Stabilization Gimbal., , , and . IEEE Access, (2020)Metal Artifact Reduction for X-Ray Computed Tomography Using U-Net in Image Domain., , , , , and . IEEE Access, (2019)A novel public key encryption model based on transformed biometrics., and . DSC, page 424-428. IEEE, (2017)Reversible data hiding in dual encrypted halftone images using matrix embedding., , , , and . Multim. Tools Appl., 79 (37-38): 27659-27682 (2020)Data Hiding in Symmetric Circular String Art., , and . Symmetry, 12 (8): 1227 (2020)Multi-Type Interdependent Feature Analysis Based on Hybrid Neural Networks for Computer-Aided Diagnosis of Epidermal Growth Factor Receptor Mutations., , , , , , , , and . IEEE Access, (2020)Print-Scan Resistant Two-Level QR Code., , , and . J. Inf. Hiding Multim. Signal Process., 10 (2): 300-312 (2019)A Secure Finger Vein Recognition Algorithm Based on MB-GLBP and Logistic Mapping., , and . J. Inf. Hiding Multim. Signal Process., 7 (6): 1231-1242 (2016)