Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

High quality multi-focus polychromatic composite image fusion algorithm based on filtering in frequency domain and synthesis in space domain., , , and . Journal of Zhejiang University - Science C, 11 (5): 365-374 (2010)WP-GBDT: An Approach for Winner Prediction using Gradient Boosting Decision Tree., , , and . IEEE BigData, page 5691-5698. IEEE, (2021)An Improved Method for Reversible Data Hiding in Encrypted Image., and . ICA3PP (Workshops and Symposiums), volume 9532 of Lecture Notes in Computer Science, page 24-34. Springer, (2015)Moving target defense of routing randomization with deep reinforcement learning against eavesdropping attack., , , , , and . Digit. Commun. Networks, 8 (3): 373-387 (2022)一种社交网络Sybil用户检测方法 (Compound Approach for Sybil Users Detection in Social Networks)., , , and . 计算机科学, 43 (1): 172-177 (2016)Pseudo-Random Encryption for Security Data Transmission in Wireless Sensor Networks., , , and . Sensors, 19 (11): 2452 (2019)Assessing the Reliability of the MODIS LST Product to Detect Temporal Variability., , , , and . IEEE Geosci. Remote. Sens. Lett., (2023)An Efficient Linguistic Steganography for Chinese Text., , , and . ICME, page 2094-2097. IEEE Computer Society, (2007)Similarity Regression Of Functions In Different Compiled Forms With Neural Attentions On Dual Control-Flow Graphs., , , and . Comput. J., 67 (5): 1710-1718 (2024)Aparecium: understanding and detecting scam behaviors on Ethereum via biased random walk., , , , , , , and . Cybersecur., 6 (1): 46 (December 2023)