Author of the publication

Adaptive Encrypted Information Hiding Scheme for Images.

, , , and . CIS, page 950-953. IEEE Computer Society, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Learning a generative classifier from label proportions., , , , , and . Neurocomputing, (2014)Calibration of the VGSSDOption Pricing Model using a Quantum-inspired Evolutionary Algorithm., , , , and . Quantum Inspired Intelligent Systems, volume 121 of Studies in Computational Intelligence, Springer, (2008)Option pricing model calibration using a real-valued quantum-inspired evolutionary algorithm., , , and . GECCO, page 1983-1990. ACM, (2007)An Ensemble Learning Approach to Detect Malwares Based on Static Information., , , , , , and . ICA3PP (3), volume 12454 of Lecture Notes in Computer Science, page 676-686. Springer, (2020)Differentially Private Data Releasing for Smooth Queries., , , , , , and . J. Mach. Learn. Res., (2016)Cloud-based radio frequency identification authentication protocol with location privacy protection., , , and . IJDSN, (2018)Non-Smooth Control of PMSM Position Servo System Based on Model Compensation., , , , and . IECON, page 601-606. IEEE, (2018)A new RFID ultra-lightweight authentication protocol for medical privacy protection in smart living., , , , , , and . Comput. Commun., (2022)A new proxy blind signature scheme., , and . Int. J. Grid Util. Comput., 3 (1): 38-42 (2012)Mobile ip registration in certificateless public key infrastructure., , , , , and . IET Inf. Secur., 1 (4): 167-173 (2007)