Author of the publication

Secure Image Retrieval Based on Visual Content and Watermarking Protocol.

, , , , and . Comput. J., 54 (10): 1661-1674 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Method for Implementing a Probabilistic Model as a Relational Database, , and . CoRR, (2013)A Proposal of An Article Network Analysis Approach to Reduce Systematic Review Workload., , , , and . Nursing Informatics, volume 201 of Studies in Health Technology and Informatics, IOS Press, (2012)Trustworthiness-hypercube-based reliable communication in mobile social networks., , , and . Inf. Sci., (2016)Building Intelligent Sensor Networks with Multiagent Graphical Models.. Intelligent Decision Making: An AI-Based Approach, volume 97 of Studies in Computational Intelligence, Springer, (2008)Secure independent-update concise-expression access control for video on demand in cloud., , , , , , and . Inf. Sci., (2017)A. Darwiche, Modeling and Reasoning with Bayesian Networks , Cambridge (2009).. Artif. Intell., 174 (2): 147-151 (2010)Catering to Your Concerns: Automatic Generation of Personalised Security-Centric Descriptions for Android Apps., , , , , , , and . CoRR, (2018)Task-specific Word Identification from Short Texts Using a Convolutional Neural Network., , and . CoRR, (2017)Cartesian contour: a concise representation for a collection of frequent sets., , and . KDD, page 417-426. ACM, (2009)Twitter spam detection based on deep learning., , , and . ACSW, page 3:1-3:8. ACM, (2017)