From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Extended Exploiting-Modification-Direction Data Hiding with High Capacity., , и . ICVIP, стр. 151-155. ACM, (2017)Research on User Model Construction for Individualized Knowledge Recommendation., , , , , и . SKG, стр. 165-169. IEEE, (2017)A Secret Image Restoring Scheme Using Threshold Pairs of Unordered Image Shares., , , и . IEEE Access, (2019)A Cloud-assisted Passenger Authentication Scheme for Japan Rail Pass Based on Image Morphing., и . Int. J. Netw. Secur., 21 (2): 211-220 (2019)An Integratable Verifiable Secret Sharing Mechanism., и . Int. J. Netw. Secur., 18 (4): 617-624 (2016)Efficient Information Hiding Based on Theory of Numbers., , , и . Symmetry, 10 (1): 19 (2018)Explicit3D: Graph Network with Spatial Inference \Single Image 3D Object Detection., , , и . CoRR, (2023)Semi-disentangled non-negative matrix factorization for rating prediction., , , и . Appl. Soft Comput., 149 (Part B): 111034 (декабря 2023)Temporal-Spatial-Frequency Feature Selection of Brain-Computer Interface Based on BQPSO., , и . ICBBS, стр. 71-76. ACM, (2020)Observer-Based Adaptive Neural Networks Control for Large-Scale Interconnected Systems With Nonconstant Control Gains., , и . IEEE Trans. Neural Networks Learn. Syst., 32 (4): 1575-1585 (2021)