Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Research on Key Technologies and Standard Framework of Secure and Smart Container., , , , and . Trustcom/BigDataSE/ISPA, page 2063-2067. IEEE, (2016)The Application of Ad-Hoc Network in Smart Container Tracking System., , , , and . Trustcom/BigDataSE/ISPA, page 2068-2072. IEEE, (2016)Video Frame Interpolation via Local Lightweight Bidirectional Encoding with Channel Attention Cascade., , , and . ICASSP, page 1915-1919. IEEE, (2022)Maintaining Rate-Distortion Optimization for IPM-Based Video Steganography by Constructing Isolated Channels in HEVC., , , , and . IH&MMSec, page 97-107. ACM, (2018)A Novel Embedding Distortion for Motion Vector-Based Steganography Considering Motion Characteristic, Local Optimality and Statistical Distribution., , , and . IH&MMSec, page 127-137. ACM, (2016)Constructing Near-optimal Double-layered Syndrome-Trellis Codes for Spatial Steganography., , and . IH&MMSec, page 139-148. ACM, (2016)Image Forgery Localization based on Multi-Scale Convolutional Neural Networks., , , and . IH&MMSec, page 85-90. ACM, (2018)Deepfake Video Detection Using Audio-Visual Consistency., , , and . IWDW, volume 12617 of Lecture Notes in Computer Science, page 168-180. Springer, (2020)On the Sharing-Based Model of Steganography., , and . IWDW, volume 12617 of Lecture Notes in Computer Science, page 94-105. Springer, (2020)Detection of Deepfake Videos Using Long Distance Attention., , , , , and . CoRR, (2021)