Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving replay attack detection by combination of spatial and spectral features., , , and . APSIPA, page 833-837. IEEE, (2019)Filtering Adversarial Noise with Double Quantization., , and . APSIPA, page 1745-1749. IEEE, (2019)Performance Evaluation of Two-layer lossless HDR Coding using Histogram Packing Technique under Various Tone-mapping Operators., and . GCCE, page 359-360. IEEE, (2019)Secure Sparse Representations in L0 Norm Minimization and Its Application to EtC Systems., and . ICSPCS, page 1-7. IEEE, (2019)Compressible and Learnable Encryption for Untrusted Cloud Environments.. CoRR, (2018)Privacy-Preserving SVM Computing by Using Random Unitary Transformation., , , and . ISPACS, page 146-150. IEEE, (2018)An Image Identification Scheme Of Encrypted Jpeg Images For Privacy-Preserving Photo Sharing Services., and . ICIP, page 4564-4568. IEEE, (2019)Privacy-Preserving Deep Neural Networks with Pixel-Based Image Encryption Considering Data Augmentation in the Encrypted Domain., , , and . ICIP, page 674-678. IEEE, (2019)Convolutional Neural Networks Considering Local and Global Features for Image Enhancement., and . ICIP, page 2110-2114. IEEE, (2019)Privacy-Preserving Machine Learning Using EtC Images., , and . CoRR, (2019)