Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi-agent deep reinforcement learning algorithm with self-adaption division strategy for VNF-SC deployment in SDN/NFV-Enabled Networks., , , and . Appl. Soft Comput., (May 2023)Speech watermarking robust against recapturing and de-synchronization attacks., , , and . Multimedia Tools Appl., 79 (9-10): 6009-6024 (2020)An Authentication and Recovery Scheme for Digital Speech Signal Based on DWT., , , and . IWDW, volume 9569 of Lecture Notes in Computer Science, page 206-219. Springer, (2015)Speech Content Authentication Scheme based on High-Capacity Watermark Embedding., , and . Int. J. Digit. Crime Forensics, 9 (2): 1-14 (2017)Authentication and recovery algorithm for speech signal based on digital watermarking., , , , and . Signal Process., (2016)Multi-Scheme Frame Rate Up-Conversion Using Space-Time Saliency., , and . IEEE Access, (2018)A security watermark scheme used for digital speech forensics., , , and . Multim. Tools Appl., 76 (7): 9297-9317 (2017)Patchwork-Based Audio Watermarking Robust Against De-Synchronization and Recapturing Attacks., , and . IEEE Trans. Inf. Forensics Secur., 14 (5): 1171-1180 (2019)Multiobjective Model and Improved Artificial Raindrop Algorithm for Virtual Network Mapping., , , , and . Mob. Inf. Syst., (2021)Target Specificity of the CRISPR-Cas9 System in Arabidopsis thaliana, Oryza sativa, and Glycine max Genomes., , , , , , , , and . J. Comput. Biol., 27 (10): 1544-1552 (2020)