Author of the publication

Cooperation Stimulation Strategies for Peer-to-Peer Wireless Live Video-Sharing Social Networks.

, , and . IEEE Trans. Image Processing, 19 (7): 1768-1784 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Behavior forensics with side information for multimedia fingerprinting social networks., , and . IEEE Trans. Inf. Forensics Secur., 4 (4): 911-927 (2009)Extrinsic Channel-Like Fingerprinting Overlays Using Subspace Embedding., , , and . IEEE Trans. Inf. Forensics Secur., 6 (4): 1355-1369 (2011)Extrinsic Channel-Like Fingerprint Embedding for Authenticating MIMO Systems., , , and . IEEE Trans. Wirel. Commun., 10 (12): 4270-4281 (2011)Game-Theoretic Strategies and Equilibriums in Multimedia Fingerprinting Social Networks., , and . IEEE Trans. Multim., 13 (2): 191-205 (2011)Modulation forensics for wireless digital communications., and . ICASSP, page 1789-1792. IEEE, (2008)Digital image source coder forensics via intrinsic fingerprints., , , and . IEEE Trans. Inf. Forensics Secur., 4 (3): 460-475 (2009)Best-Effort Cooperative Relaying., , , and . IEEE Trans. Wirel. Commun., 10 (6): 1833-1843 (2011)Cooperation and Coalition in Multimedia Fingerprinting Colluder Social Networks., , and . IEEE Trans. Multim., 14 (3-2): 717-733 (2012)Uncovering insider threats from the digital footprints of individuals., , , , , , , , , and 4 other author(s). IBM J. Res. Dev., 60 (4): 8 (2016)Undetectable image tampering through JPEG compression anti-forensics., , , and . ICIP, page 2109-2112. IEEE, (2010)