From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Efficiently secure multiparty computation based on homomorphic encryption., , , и . CCIS, стр. 343-349. IEEE, (2016)Invisible Steganography via Generative Adversarial Network., , и . CoRR, (2018)A Fully Reversible Data Hiding Scheme in Encrypted Images Based on Homomorphic Encryption and Pixel Prediction., , и . Circuits Syst. Signal Process., 39 (7): 3532-3552 (2020)Linguistic Steganalysis by Enhancing and Integrating Local and Global Features., , и . IEEE Signal Process. Lett., (2023)Linguistic Steganalysis Merging Semantic and Statistical Features., , , , и . IEEE Signal Process. Lett., (2022)Efficient data possession-checking protocol with deduplication in cloud., , , , и . IJDSN, (2017)Cone-beam computed tomography study of root and canal morphology of mandibular premolars in a western Chinese population., , , , , , и . BMC Medical Imaging, (2012)One Prediction Model Based on BP Neural Network for Newcastle Disease., , , , и . CCTA (2), том 294 из IFIP Advances in Information and Communication Technology, стр. 1209-1216. Springer, (2008)Optimal full-duplex relay selection for physical layer security in cooperative wireless networks., , и . ICCC, стр. 1-6. IEEE, (2017)Evolutionary machine learning builds smart education big data platform: Data-driven higher education., , , , , и . Appl. Soft Comput., (марта 2023)