Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Watermarking With Flexible Self-Recovery Quality Based on Compressive Sensing and Compositive Reconstruction., , , and . IEEE Trans. Inf. Forensics Secur., 6 (4): 1223-1232 (2011)Efficient Algorithm for Secure Outsourcing of Modular Exponentiation with Single Server., , , , and . IEEE Trans. Cloud Comput., 9 (1): 145-154 (2021)Privacy-enhanced and non-interactive linear regression with dropout-resilience., , , , and . Inf. Sci., (2023)Multichannel Steganography in Digital Images for Multiple Receivers., , , and . IEEE Multim., 28 (1): 65-73 (2021)Feature compensation network based on non-uniform quantization of channels for digital image global manipulation forensics., , and . Signal Process. Image Commun., (2022)Reference Sharing Mechanism for Watermark Self-Embedding., , , and . IEEE Trans. Image Process., 20 (2): 485-495 (2011)Deterministic convergence of an online gradient method for BP neural networks., , , and . IEEE Trans. Neural Networks, 16 (3): 533-540 (2005)An Improved Reversible Information Hiding Scheme Based on AMBTC Compressed Images., , , and . ICCCS (1), volume 10602 of Lecture Notes in Computer Science, page 49-60. Springer, (2017)SHVC CU Processing Aided by a Feedforward Neural Network., , and . IEEE Trans. Ind. Informatics, 15 (11): 5803-5815 (2019)Exploiting Language Model For Efficient Linguistic Steganalysis., , , and . ICASSP, page 3074-3078. IEEE, (2022)