Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Breaking row-column shuffle based image cipher., , and . ACM Multimedia, page 1097-1100. ACM, (2012)Towards More Powerful Multi-column Convolutional Network for Crowd Counting., , , , , and . ICIG (1), volume 12888 of Lecture Notes in Computer Science, page 381-392. Springer, (2021)Cascaded Residual Density Network for Crowd Counting., , , , and . ICIP, page 2199-2203. IEEE, (2019)Real Time Compressed Video Object Segmentation., , , and . ICME, page 628-633. IEEE, (2019)A New Blind Attack Procedure for DCT-Based Image Encryption with Spectrum Learning., and . Int. J. Image Graph., 7 (3): 481-496 (2007)Real Time Video Object Segmentation in Compressed Domain., , , , , , and . IEEE Trans. Circuits Syst. Video Technol., 31 (1): 175-188 (2021)Nest Detection Using Coarse-to-Fine Searching Strategy., , , , and . IFTC, volume 815 of Communications in Computer and Information Science, page 503-512. Springer, (2017)ATDD: Fine-Grained Assured Time-Sensitive Data Deletion Scheme in Cloud Storage., , , and . ICC, page 3448-3453. IEEE, (2022)Improving Security of an Image Encryption Algorithm based on Chaotic Circular Shift., and . SMC, page 3694-3698. IEEE, (2009)Ship Classification in High-Resolution SAR Images via Transfer Learning with Small Training Dataset., and . Sensors, 19 (1): 63 (2019)