Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimizing Feature for JPEG Steganalysis via Gabor Filter and Co-occurrences Matrices., , and . ICCCS (1), volume 10039 of Lecture Notes in Computer Science, page 84-93. (2016)Deep Optimization model for Screen Content Image Quality Assessment using Neural Networks., , , , and . CoRR, (2019)Convergence of an Online Gradient Method for BP Neural Networks with Stochastic Inputs., , , and . ICNC (1), volume 3610 of Lecture Notes in Computer Science, page 720-729. Springer, (2005)Low-Complexity Scalable Extension of the High-Efficiency Video Coding (SHVC) Encoding System., , and . TOMM, 15 (2): 44:1-44:23 (2019)Efficient reversible data hiding in encrypted images., , , and . J. Vis. Commun. Image Represent., 25 (2): 322-328 (2014)Privacy-Enhanced and Verification-Traceable Aggregation for Federated Learning., , , and . IEEE Internet Things J., 9 (24): 24933-24948 (2022)Compressing Encrypted Image Using Compressive Sensing., , , and . IIH-MSP, page 222-225. IEEE Computer Society, (2011)Defining cost functions for adaptive steganography at the microscale., , , , and . WIFS, page 1-6. IEEE, (2016)Deep learning for steganalysis based on filter diversity selection., , , and . Sci. China Inf. Sci., 61 (12): 129105:1-129105:3 (2018)Altered Fingerprints Detection Based on Deep Feature Fusion., , , , and . IEICE Trans. Inf. Syst., 105-D (9): 1647-1651 (September 2022)