Author of the publication

Reversible Data Hiding Over Encrypted Images via Preprocessing-Free Matrix Secret Sharing.

, , , , and . IEEE Trans. Circuits Syst. Video Technol., 34 (3): 1799-1814 (March 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Generation Method of Network Security Hardening Strategy Based on Attack Graphs., , , , and . Int. J. Web Serv. Res., 12 (1): 45-61 (2015)Exploiting the Security Aspects of Compressive Sampling., , , , and . Secur. Commun. Networks, (2018)Energy Management and Cross Layer Optimization for Wireless Sensor Network Powered by Heterogeneous Energy Sources., , , and . IEEE Trans. Wirel. Commun., 14 (5): 2814-2826 (2015)The adaptive complex shock diffusion for seismic random noise attenuation., and . GlobalSIP, page 333-337. IEEE, (2017)On Construction of Rate-Compatible Raptor-Like QC-LDPC Code for Enhanced IDMA in 5G and Beyond., and . ISTC, page 1-5. IEEE, (2018)Anomaly detection of vectorized time series on aircraft battery data., , , , , and . Expert Syst. Appl., (October 2023)Efficient Byzantine-Robust and Privacy-Preserving Federated Learning on Compressive Domain., , , and . IEEE Internet Things J., 11 (4): 7116-7127 (February 2024)Anomaly detection of aircraft lead-acid battery., , , and . Qual. Reliab. Eng. Int., 37 (3): 1186-1197 (2021)A Low-Overhead, Confidentiality-Assured, and Authenticated Data Acquisition Framework for IoT., , , , and . IEEE Trans. Ind. Informatics, 16 (12): 7566-7578 (2020)A hybrid scheme for self-adaptive double color-image encryption., , , and . Multim. Tools Appl., 77 (11): 14285-14304 (2018)