Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An object based watermarking solution for MPEG4 video authentication., , and . ICASSP (3), page 537-540. IEEE, (2003)A New Watermarking Scheme Robust to Print-and-Scan., , , and . MMSP, page 1-4. IEEE, (2005)Music Identification Using Embedded HMM., , , and . MMSP, page 1-4. IEEE, (2005)Entanglement-Assisted Quantum Networks: Mechanics, Enabling Technologies, Challenges, and Research Directions., , , , , , , , , and . IEEE Commun. Surv. Tutorials, 25 (4): 2133-2189 (Fourthquarter 2023)LLDM: Low-Latency DoS Attack Detection and Mitigation in SDN., , , , , and . HPSR, page 169-174. IEEE, (2022)TRECVID 2006 by NUS-I2R., , , , , , , , , and 1 other author(s). TRECVID, National Institute of Standards and Technology (NIST), (2006)Content-Aware Routing based on Cached Content Prediction in Satellite Networks., , , , , and . GLOBECOM, page 6541-6546. IEEE, (2022)Robust Respiration Sensing with WiFi., , , , , , and . WCNC, page 1-6. IEEE, (2023)A robust approach to face and eyes detection from images with cluttered background., , , and . ICPR, page 110-113. IEEE Computer Society, (1998)Error resilient content-based image authentication over wireless channel., , and . ISCAS (3), page 2707-2710. IEEE, (2005)