Author of the publication

Improved schemes for visual secret sharing based on random grids.

, , , , and . Multimedia Tools Appl., 78 (9): 12055-12082 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Natural Language Information Hiding Based on Chinese Mathematical Expression., , , and . Int. J. Netw. Secur., 8 (1): 10-15 (2009)Enterprise LST Algorithm Development and Its Evaluation with NOAA 20 Data., , , , and . Remote. Sens., 11 (17): 2003 (2019)Ten Years of VIIRS Land Surface Temperature Product Validation., , , , and . Remote. Sens., 14 (12): 2863 (2022)A parameter-free approach to lossless summarization of fully dynamic graphs., , , , and . Inf. Sci., (2022)CNN-BiLSTM-Attention: A multi-label neural classifier for short texts with a small set of labels., , , and . Inf. Process. Manag., 60 (3): 103320 (May 2023)Optimal Defense Strategies for DDoS Defender Using Bayesian Game Model., , , , and . ISPEC, volume 7863 of Lecture Notes in Computer Science, page 44-59. Springer, (2013)C-BEDIM and S-BEDIM: Lateral movement detection in enterprise network through behavior deviation measurement., , , , , and . Comput. Secur., (2023)Quantitative Method for Network Security Situation Based on Attack Prediction., , , and . Secur. Commun. Networks, (2017)Confusing-Keyword Based Secure Search over Encrypted Cloud Data., , , , and . Mob. Networks Appl., 25 (1): 125-132 (2020)Blockchain-Based Cloud Data Integrity Verification Scheme with High Efficiency., , , and . Secur. Commun. Networks, (2021)