Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Digital watermarking with network bandwidth efficiency for multimedia security., and . ICUFN, page 294-295. IEEE, (2012)Secure Client-Side Digital Watermarking Using Optimal Key Selection., and . FGIT-FGCN (2), volume 266 of Communications in Computer and Information Science, page 162-168. Springer, (2011)Digital Watermarking Based on Patchwork and Radial Basis Neural Network., and . CICSyN, page 242-246. IEEE Computer Society, (2011)Key-Selective Patchwork Method for Audio Watermarking., and . JDCTA, 4 (4): 117-126 (2010)A Novel Self-Synchroniztion Method for Audio Watermarking., and . CGIV, page 114-118. IEEE Computer Society, (2011)Adaptive Client-Side LUT-Based Digital Watermarking., , and . TrustCom, page 795-799. IEEE Computer Society, (2011)Siamese Pre-Trained Transformer Encoder for Knowledge Base Completion., , and . Neural Process. Lett., 53 (6): 4143-4158 (2021)On the Secrecy for Relay-Aided SWIPT Internet of Things System With Cooperative Eavesdroppers., , , , and . IEEE Access, (2021)Panoramic Scanning Optical Pyrometer for the Temperature Field Measurement of Turbine Components., , , , , , , and . IEEE Trans. Instrum. Meas., (2022)What are the Characteristics of Reopened Pull Requests? A Case Study on Open Source Projects in GitHub., , and . IEEE Access, (2019)