Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A novel scheme of cross-network radio resources scheduling in SAGN based on unified resources mapping and genetic algorithm., , , , , , , and . Int. J. Commun. Syst., (2021)A discrete wavelet transform based recoverable image processing for privacy protection., , , , and . ICIP, page 1372-1375. IEEE, (2008)Resource Mapping Allocation Scheme in 6G Satellite Twin Network., and . Sensors, 22 (15): 5816 (2022)Integrating Vision Transformer-Based Bilinear Pooling and Attention Network Fusion of RGB and Skeleton Features for Human Action Recognition., , , , and . Int. J. Comput. Intell. Syst., 16 (1): 116 (December 2023)Steganalysis of Data Hiding in Binary Images., , and . ICPR (4), page 877-880. IEEE Computer Society, (2004)Compact Binary Feature for Open Set Recognition., , , and . DAS, page 235-238. IEEE Computer Society, (2018)Automatic Neural Network Search Method for Open Set Recognition., , , , , , and . ICIP, page 4090-4094. IEEE, (2019)A fast and effective method to detect multiple least significant bits steganography., and . SAC, page 1443-1447. ACM, (2008)Recoverable Privacy Protection for Video Content Distribution., , , , and . EURASIP J. Information Security, (2009)Extended optimization method of LSB steganalysis., , and . ICIP (2), page 1102-1105. IEEE, (2005)