Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

$\alpha$ -Trimmed Weber Representation and Cross Section Asymmetrical Coding for Human Identification Using Finger Images., , , and . IEEE Trans. Inf. Forensics Secur., 14 (1): 90-101 (2019)A Survey on Knowledge Graph-Based Recommender Systems., , , , , , and . CoRR, (2020)An automatic extraction algorithm of high voltage transmission lines from airborne LIDAR point cloud data., , , , and . Turkish J. Electr. Eng. Comput. Sci., 26 (4): 2043-2055 (2018)Reversible Data Hiding Scheme Based on Image Inpainting., , , and . Fundam. Informaticae, 120 (1): 59-70 (2012)Reversible PRNU anonymity for device privacy protection based on data hiding., , , , and . Expert Syst. Appl., (December 2023)Robustness enhancement against adversarial steganography via steganalyzer outputs., , , , , and . J. Inf. Secur. Appl., (2022)Robust Image Hashing in Encrypted Domain., , , , and . IEEE Trans. Emerg. Top. Comput. Intell., 8 (1): 670-683 (February 2024)A Survey on Large Language Models for Recommendation., , , , , , , , , and 2 other author(s). CoRR, (2023)Harnessing the Power of LLM to Support Binary Taint Analysis., , , , , , , and . CoRR, (2023)A Comprehensive Survey of Artificial Intelligence Techniques for Talent Analytics., , , , , , , , and . CoRR, (2023)