Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Survey of Across Social Networks User Identification., , , , , and . IEEE Access, (2019)Iterative Double-Auction-Based Power Allocation in Multiuser Cooperative Networks., , and . IEEE Trans. Vehicular Technology, 64 (9): 4298-4303 (2015)Collaborative P2P Streaming of Interactive Live Free Viewpoint Video, , , , and . CoRR, (2012)Scalable Multimedia Fingerprinting Forensics with Side Information., , and . ICIP, page 2293-2296. IEEE, (2006)Resistance analysis of scalable video fingerprinting systems under fair collusion attacks., and . ICIP (3), page 85-88. IEEE, (2005)Relay power allocation and pricing in multi-user relay networks using game theory., , and . ICASSP, page 2893-2896. IEEE, (2012)Landmarking for Navigational Streaming of Stored High-Dimensional Media., , , , and . IEEE Trans. Circuits Syst. Video Technol., 32 (8): 5663-5679 (2022)Modeling Content Interaction in Information Diffusion with Pre-trained Sentence Embedding., , , and . APSIPA, page 499-507. IEEE, (2019)Modeling Multi-source Information Diffusion: A Graphical Evolutionary Game Approach., , , and . APSIPA, page 486-492. IEEE, (2019)Forensic analysis of nonlinear collusion attacks for multimedia fingerprinting., , , and . IEEE Trans. Image Process., 14 (5): 646-661 (2005)