Author of the publication

Detection of steganographic information in tags of webpage.

, , , and . Infoscale, volume 304 of ACM International Conference Proceeding Series, page 72. ACM, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Long PN code based DSSS watermarking., , , and . INFOCOM, page 2426-2434. IEEE, (2011)Does patent abandonment weaken performance persistence? A real option perspective., and . Technol. Anal. Strateg. Manag., 34 (6): 717-731 (2022)Cross-Modal Hashing by lp-Norm Multiple Subgraph Combination., , , and . IEEE Access, (2021)Detection of Hidden Information in Tags of Webpage Based on Tag-Mismatch., , , and . IIH-MSP, page 257-260. IEEE Computer Society, (2007)FindAdaptNet: Find and Insert Adapters by Learned Layer Importance., , , , , , and . ICASSP, page 1-5. IEEE, (2023)A 5V-to-0.5V Inductor-First Inductor-on-Ground Switched Capacitor Multi-Path Hybrid DC-DC Converter., , , , and . CICC, page 1-2. IEEE, (2023)A Quad-Output Hybrid Buck Converter with 8-Inductor Helping One Spot from All Quarters for Multi-Core XPUs., , , , and . CICC, page 1-2. IEEE, (2024)Detection of steganographic information in tags of webpage., , , and . Infoscale, volume 304 of ACM International Conference Proceeding Series, page 72. ACM, (2007)SmoPSI: Analysis and Prediction of Small Molecule Binding Sites Based on Protein Sequence Information., , , , , and . Comput. Math. Methods Medicine, (2019)When Digital Forensic Research Meets Laws., , , , and . ICDCS Workshops, page 542-551. IEEE Computer Society, (2012)