Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Part-Based Deep Hashing for Large-Scale Person Re-Identification., , , , and . IEEE Trans. Image Processing, 26 (10): 4806-4817 (2017)Steganalysis on Internet images via domain adaptive classifier., , , , and . Neurocomputing, (2019)JPEG quantization table mismatched steganalysis via robust discriminative feature transformation., , , and . Media Watermarking, Security, and Forensics, volume 9409 of SPIE Proceedings, page 94090U. SPIE, (2015)Amplitude-adaptive spread-spectrum data embedding., , , , and . IET Image Processing, 10 (2): 138-148 (2016)Laser Printer Source Forensics for Arbitrary Chinese Characters., , , , and . Security and Management, page 356-360. CSREA Press, (2010)Multi-View Analysis Dictionary Learning for Image Classification., , , , and . IEEE Access, (2018)Semantic consistency hashing for cross-modal retrieval., , , and . Neurocomputing, (2016)Steganalysis of LSB Matching Based on the Sum Features of Average Co-occurrence Matrix Using Image Estimation., , , and . IWDW, volume 7809 of Lecture Notes in Computer Science, page 34-43. Springer, (2012)Coupled Dictionary Learning for Target Recognition in SAR Images., , , , and . IEEE Geosci. Remote. Sens. Lett., 14 (6): 791-795 (2017)$$U^2F^2S^2$$ U 2 F 2 S 2 : Uncovering Feature-level Similarities for Unsupervised Feature Selection., , , and . Neural Process. Lett., 49 (3): 1071-1091 (2019)