Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient stego key recovery based on distribution differences of extracting message bits., , , , and . J. Real-Time Image Processing, 16 (3): 649-660 (2019)QoS-aware virtual SDN network planning., , and . IM, page 644-647. IEEE, (2017)A blockchain-based eHealthcare system interoperating with WBANs., , , , , , , and . Future Gener. Comput. Syst., (2020)Using Arithmetic Transform to Calculate Ranges of Arithmetic Datapaths., , , , and . J. Comput., 7 (12): 2906-2912 (2012)Security-as-a-Service with Cyberspace Mimic Defense Technologies in Cloud., , and . ICPCSEE (2), volume 1452 of Communications in Computer and Information Science, page 129-138. Springer, (2021)Migrating Live Streaming Applications onto Clouds: Challenges and a CloudStorm Solution., , , , , , and . UCC Companion, page 321-326. IEEE, (2018)一种基于主动认知决策的高效能模型 (High-productivity Model Based on Proactive Cognition and Decision)., , , , and . 计算机科学, 42 (11): 68-72 (2015)Stego key recovery method for F5 steganography with matrix encoding., , , and . EURASIP J. Image Video Process., 2020 (1): 40 (2020)Stochastic Computing based BCH Decoder for WBAN Systems., , and . MWSCAS, page 729-732. IEEE, (2018)A 16-bit carry skip adder designed by reversible logic., , and . BMEI, page 1332-1335. IEEE, (2012)