Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Robust Digital Image Watermarking Based on Principal Component Analysis and Discrete Wavelet Transform., , , , and . PCM, volume 5353 of Lecture Notes in Computer Science, page 506-514. Springer, (2008)A high-speed pin-memory architecture using multiport dynamic RAMs., and . ITC, page 347-354. IEEE Computer Society, (1990)Geodesic distance-based pose-invariant blind watermarking algorithm for three-dimensional triangular mesh model., , , and . ICIP, page 209-212. IEEE, (2010)TIDES: A Trust-Aware IoT Data Economic System With Blockchain-Enabled Multi-Access Edge Computing., , , , and . IEEE Access, (2020)A multilevel Bit Vector minimization method for fast online detection of conflicting flow entries in OpenFlow table., , and . Comput. Commun., (2021)A Reliable IoT Data Economic System Based on Edge Computing., , , , and . PIMRC, page 1-5. IEEE, (2018)Geodesic-based robust blind watermarking method for three-dimensional mesh animation by using mesh segmentation and vertex trajectory., , , and . ICASSP, page 1757-1760. IEEE, (2012)A Feature-Based Digital Image Watermarking for Copyright Protection and Content Authentication., , , and . ICIP (5), page 469-472. IEEE, (2007)Multi-graph Zero-knowledge-based authentication system in Internet of Things., , , and . ICC, page 1-6. IEEE, (2017)QoS-Aware Fog Service Orchestration for Industrial Internet of Things., , , , and . IEEE Trans. Serv. Comput., 15 (3): 1265-1279 (2022)