Author of the publication

A New Wavelet Threshold Function Based on Gaussian Kernel Function for Image De-noising.

, , and . J. Inf. Hiding Multim. Signal Process., 10 (1): 91-101 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

GSAPSO-MQC: medical image encryption based on genetic simulated annealing particle swarm optimization and modified quantum chaos system., and . Evol. Intell., 14 (4): 1817-1829 (2021)Facial expression recognition based on convolutional block attention module and multi-feature fusion., and . Int. J. Comput. Vis. Robotics, 13 (1): 21-37 (2023)Research on the online parameter identification method of train driving dynamic model., , , , and . Int. J. Comput. Vis. Robotics, 13 (5): 497-509 (2023)P3OI-MELSH: Privacy Protection Target Point of Interest Recommendation Algorithm Based on Multi-Exploring Locality Sensitive Hashing., , , , , and . Frontiers Neurorobotics, (2021)An Improved Discrete Firefly Algorithm Used for Traveling Salesman Problem., , and . ICSI (1), volume 10385 of Lecture Notes in Computer Science, page 593-600. Springer, (2017)Ad Hoc Networks in Healthcare Intelligent Transportation Systems Humanitary Relief – MANETs, VANETs, and FANETs, , , , , , , , , and 1 other author(s). page 66–89. CRC Press, (July 2023)A Proxy Re-Encryption Scheme Based on Elliptic Curve Group., , , and . J. Inf. Hiding Multim. Signal Process., 8 (1): 218-227 (2017)A Network Intrusion Detection Method Based on Deep Multi-scale Convolutional Neural Network., , , , and . Int. J. Wirel. Inf. Networks, 27 (4): 503-517 (2020)Medical Image Encryption Based on Stream Cipher Algorithm and Krill Group., , , and . Int. J. Netw. Secur., 22 (2): 314-320 (2020)Research on Medical Image Encryption Method Based on Improved Krill Herb Algorithm and Chaotic Systems., , , , and . Int. J. Netw. Secur., 22 (3): 484-489 (2020)