Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Decentralized Hierarchical Aggregation Scheme Using Fermat Points in Wireless Sensor Networks., , , and . EvoWorkshops, volume 4448 of Lecture Notes in Computer Science, page 153-160. Springer, (2007)An Aggregation Point Selection Scheme for Directed Diffusion in Wireless Sensor Networks., , , , , and . ICWN, page 468-474. CSREA Press, (2005)Perceptual 3D Watermarking Using Mesh Saliency., , , , and . ICISA, volume 424 of Lecture Notes in Electrical Engineering, page 315-322. Springer, (2017)Fingerprint Spoof Detection Using Contrast Enhancement and Convolutional Neural Networks., , , , and . ICISA, volume 424 of Lecture Notes in Electrical Engineering, page 331-338. Springer, (2017)A Detection Scheme of Aggregation Point for Directed Diffusion in Wireless Sensor Networks., , and . ADHOC-NOW, volume 3738 of Lecture Notes in Computer Science, page 311-319. Springer, (2005)Determination of Aggregation Point Using Fermat's Point in Wireless Sensor Networks., , and . APWeb Workshops, volume 3842 of Lecture Notes in Computer Science, page 257-261. Springer, (2006)Blind 3D mesh watermarking based on cropping-resilient synchronization., , , and . Multimedia Tools Appl., 76 (24): 26695-26721 (2017)Blind 3D Mesh Watermarking Based on Sphere-Shape Template., , , and . IWDW, volume 10082 of Lecture Notes in Computer Science, page 280-295. (2016)Cropping-resilient 3D mesh watermarking based on consistent segmentation and mesh steganalysis., , , , , , and . Multim. Tools Appl., 77 (5): 5685-5712 (2018)Detecting composite image manipulation based on deep neural networks., , , , , , and . IWSSIP, page 1-5. IEEE, (2017)