Author of the publication

Security enhancement for video transmission via noise aggregation in immersive systems.

, , , and . Multim. Tools Appl., 75 (9): 5345-5357 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Novel Two-Staged Decision Support based Threat Evaluation and Weapon Assignment Algorithm, Asset-based Dynamic Weapon Scheduling using Artificial Intelligence Techinques, , , and . CoRR, (2009)An Automated User Transparent Approach to log Web URLs for Forensic Analysis., , and . IMF, page 120-127. IEEE Computer Society, (2009)Low-Rank Estimation for Image Denoising Using Fractional-Order Gradient-Based Similarity Measure., , , and . Circuits Syst. Signal Process., 40 (10): 4946-4968 (2021)An adaptive framework for trust based security in pervasive computing environment., , and . CCNC, page 624-628. IEEE, (2012)On Trust Management for Multimedia P2P Applications in Autonomic Networking., , and . APSCC, page 24-28. IEEE Computer Society, (2011)A Secure Group Rekeying Scheme with Compromised Node Revocation in Wireless Sensor Networks., and . ISA, volume 5576 of Lecture Notes in Computer Science, page 712-721. Springer, (2009)Hardware-Based Random Number Generation in Wireless Sensor Networks(WSNs)., and . ISA, volume 5576 of Lecture Notes in Computer Science, page 732-740. Springer, (2009)Security protection over wireless fading channels by exploiting frequency selectivity., , , and . WCSP, page 1-5. IEEE, (2016)Security enhancement for video transmission via noise aggregation in immersive systems., , , and . Multim. Tools Appl., 75 (9): 5345-5357 (2016)Discovering a data interpreted petri net model of industrial control systems for anomaly detection., , , and . Expert Syst. Appl., (November 2023)