Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Spatial error concealment technique for losslessly compressed images using data hiding in error-prone channels., , and . J. Commun. Networks, 12 (2): 168-173 (2010)Region-based tampering detection and recovery using homogeneity analysis in quality-sensitive imaging., , , , and . Comput. Vis. Image Underst., 115 (9): 1308-1323 (2011)Development of Enhanced Data Mining System to Approximate Empirical Formula for Ship Design., , , , , and . KSEM, volume 4798 of Lecture Notes in Computer Science, page 425-436. Springer, (2007)Fourier Phase Retrieval with Extended Support Estimation via Deep Neural Network., and . CoRR, (2019)Forensic Tracking Watermarking against In-theater Piracy., , and . Information Hiding, volume 5806 of Lecture Notes in Computer Science, page 117-131. Springer, (2009)Robust watermark detection against D-A/A-D conversion for digital cinema using local auto-correlation function., , , , , and . ICIP, page 425-428. IEEE, (2008)Tree search network for sparse estimation., and . Digit. Signal Process., (2020)3D unsupervised anomaly detection and localization through virtual multi-view projection and reconstruction: Clinical validation on low-dose chest computed tomography., , , and . CoRR, (2022)Improved Generative Model for Weakly Supervised Chest Anomaly Localization via Pseudo-paired Registration with Bilaterally Symmetrical Data Augmentation., , , and . CoRR, (2022)Low-Dose Computed Tomography Reconstruction without Learning Data: Performance Improvement by Exploiting Joint Correlation Between Adjacent Slices., , and . ISBI, page 1-5. IEEE, (2022)