Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A content security protection scheme in JPEG compressed domain., , , and . J. Vis. Commun. Image Represent., 25 (5): 805-813 (2014)The effectiveness of location-based advertising: when, where, and to whom., , , and . Int. J. Mob. Commun., 14 (3): 273-290 (2016)Multi-objective optimization and algorithm improvement on thermal coupling of SOFC-GT-ORC integrated system., , , , , , , and . Comput. Chem. Eng., (2022)A Privacy-preserving Image Retrieval Scheme in Edge Computing Environment., , , , and . KSII Trans. Internet Inf. Syst., 17 (2): 450-470 (February 2023)Collaboration Matrix Factorization on Rate and Review for Recommendation., , , and . J. Database Manag., 30 (2): 27-43 (2019)Motion-Adaptive Frame Deletion Detection for Digital Video Forensics., , , , and . IEEE Trans. Circuits Syst. Video Technol., 27 (12): 2543-2554 (2017)Blockchain-Assisted Verifiable and Secure Remote Sensing Image Retrieval in Cloud Environment., , , , , and . IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., (2023)Enhancing Unsupervised Anomaly Detection with Score-Guided Network., , , , , and . CoRR, (2021)Trainable back-propagated functional transfer matrices., , , , and . CoRR, (2017)Hop Doubling Label Indexing for Point-to-Point Distance Querying on Scale-Free Networks., , , , and . CoRR, (2014)