Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The adaptive complex shock diffusion for seismic random noise attenuation., and . GlobalSIP, page 333-337. IEEE, (2017)On Construction of Rate-Compatible Raptor-Like QC-LDPC Code for Enhanced IDMA in 5G and Beyond., and . ISTC, page 1-5. IEEE, (2018)A hybrid scheme for self-adaptive double color-image encryption., , , and . Multim. Tools Appl., 77 (11): 14285-14304 (2018)Chaotic Image Encryption of Regions of Interest., , , and . Int. J. Bifurc. Chaos, 26 (11): 1650193:1-1650193:15 (2016)TPE-GAN: Thumbnail Preserving Encryption Based on GAN With Key., , , , and . IEEE Signal Process. Lett., (2022)DCIV: Decentralized cross-chain data integrity verification with blockchain., , , , , and . J. King Saud Univ. Comput. Inf. Sci., 34 (10 Part A): 7988-7999 (2022)FingerChain: Copyrighted Multi-Owner Media Sharing by Introducing Asymmetric Fingerprinting Into Blockchain., , , , and . IEEE Trans. Netw. Serv. Manag., 20 (3): 2869-2885 (September 2023)Compression-Resistant Backdoor Attack against Deep Neural Networks., , , , , and . CoRR, (2022)InFIP: An Explainable DNN Intellectual Property Protection Method based on Intrinsic Features., , , , , and . CoRR, (2022)Turn Passive to Active: A Survey on Active Intellectual Property Protection of Deep Learning Models., , , and . CoRR, (2023)