Author of the publication

Reversible data hiding in encrypted image using two-pass pixel value ordering.

, , , and . J. Inf. Secur. Appl., (August 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Median filtering detection using optimal multi-direction threshold on higher-order difference pixels., and . Multim. Tools Appl., 82 (20): 30875-30893 (2023)BagPipe: Accelerating Deep Recommendation Model Training., , and . CoRR, (2022)On the Utility of Gradient Compression in Distributed Training Systems., , , and . CoRR, (2021)Framework for Application Mapping over Packet-Switched Network of FPGAs: Case Studies., , , , , , and . CoRR, (2015)Scalable K-Medoids via True Error Bound and Familywise Bandits., , , and . CoRR, (2019)Impact of Job Allocation Strategies on Communication-Driven Coscheduling in Clusters., , , , and . Euro-Par, volume 2790 of Lecture Notes in Computer Science, page 160-168. Springer, (2003)Bagpipe: Accelerating Deep Recommendation Model Training., , , and . SOSP, page 348-363. ACM, (2023)Pufferfish: Communication-efficient Models At No Extra Cost., , and . MLSys, mlsys.org, (2021)Generalizable Inter-Institutional Classification of Abnormal Chest Radiographs Using Efficient Convolutional Neural Networks., , and . J. Digital Imaging, 32 (5): 888-896 (2019)Graph based Question Answering System., , , , , , , , and . CoRR, (2018)