Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A High-Imperceptibility and Histogram-Shifting Data Hiding Scheme for JPEG Images., , , , and . IEEE Access, (2019)A sensitive network jitter measurement for covert timing channels over interactive traffic., , , , and . Multim. Tools Appl., 78 (3): 3493-3509 (2019)Tuner and demodulator design of antenna control system., , , , and . Int. J. Wirel. Mob. Comput., 8 (2): 141-146 (2015)A VoLTE Encryption Experiment for Android Smartphones., , , and . GSKI (1), volume 848 of Communications in Computer and Information Science, page 115-125. Springer, (2017)Building packet length covert channel over mobile VoIP traffics., , , , , and . J. Netw. Comput. Appl., (2018)Descrambling data on solid-state disks by reverse-engineering the firmware., , , , , and . Digit. Investig., (2015)A methodology for determining the image base of ARM-based industrial control system firmware., , , , and . Int. J. Crit. Infrastructure Prot., (2017)Determining Image Base of Firmware Files for ARM Devices., , , , , and . IEICE Trans. Inf. Syst., 99-D (2): 351-359 (2016)An Identity-Based Anti-Quantum Privacy-Preserving Blind Authentication in Wireless Sensor Networks., , , , , and . Sensors, 18 (5): 1663 (2018)Determining image base of firmware for ARM devices by matching literal pools., , , , and . Digit. Investig., (2016)