Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Low-power Robustness Learning Framework for Adversarial Attack on Edges., , , and . MSN, page 821-828. IEEE, (2022)Design of Data Encryption Transmission System Based on FPGA., , , , and . ECC (2), volume 298 of Advances in Intelligent Systems and Computing, page 293-299. Springer, (2014)Rewriting-Stego: Generating Natural and Controllable Steganographic Text with Pre-trained Language Model., , , , , , , and . DASFAA (1), volume 13943 of Lecture Notes in Computer Science, page 617-626. Springer, (2023)Comparisons of Typical Discrete Logistic Map and Henon Map., and . ECC (1), volume 297 of Advances in Intelligent Systems and Computing, page 267-275. Springer, (2014)Double-Flow-based Steganography without Embedding for Image-to-Image Hiding., , , , , and . CoRR, (2023)Multi-source Transfer Learning Based on the Power Set Framework., , , and . Int. J. Comput. Intell. Syst., 16 (1): 103 (December 2023)Discrete Chaotic Circuit Design and Performance Analysis., , and . RVSP, page 200-203. IEEE Computer Society, (2015)A survey on Deep-Learning-based image steganography., , , , and . Expert Syst. Appl., (2024)The Identification of Human Errors in the Power Dispatching Based on the TRACEr Method., , , , , , and . HCI (6), volume 10906 of Lecture Notes in Computer Science, page 80-89. Springer, (2018)A Multidimensional Workload Assessment Method for Power Grid Dispatcher., , , , , , , and . HCI (6), volume 10906 of Lecture Notes in Computer Science, page 55-68. Springer, (2018)