Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secret key generation exploiting channel characteristics in wireless communications., , and . IEEE Wirel. Commun., 18 (4): 6-12 (2011)Contrast-based unsupervised hashing method with margin limit., , , , and . Multim. Tools Appl., 83 (9): 27973-27994 (March 2024)Publisher Correction: Pathologist-level interpretable whole-slide cancer diagnosis with deep learning., , , , , , , , , and 8 other author(s). Nat. Mach. Intell., 1 (6): 289 (2019)Secure wireless communication system for smart grid with rechargeable electric vehicles., , and . IEEE Communications Magazine, 50 (8): 62-68 (2012)Balance of security strength and energy for a PMU monitoring system in smart grid., , , , and . IEEE Communications Magazine, 50 (5): 142-149 (2012)Pathologist-level interpretable whole-slide cancer diagnosis with deep learning., , , , , , , , , and 8 other author(s). Nat. Mach. Intell., 1 (5): 236-245 (2019)Can Image Watermarking Efficiently Protect Deep-Learning-Based Image Classifiers? - A Preliminary Security Analysis of an IP-Protecting Method., , , , and . ICDF2C, volume 508 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 34-57. Springer, (2022)Structured orthogonal matching pursuit for feature selection., , , , , and . Neurocomputing, (2019)A Color Image Steganography Based on Frequency Sub-band Selection., , , and . CoRR, (2021)Steganalysis of Image with Adaptively Parametric Activation., , , and . CoRR, (2022)