Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A New High Capacity Image Steganography Method Combined With Image Elliptic Curve Cryptography and Deep Neural Network., , , , , and . IEEE Access, (2020)Efficient image noise estimation based on skewness invariance and adaptive noise injection., , , , and . IET Image Process., 14 (7): 1393-1401 (2020)Image Manipulation Localization Using Spatial-Channel Fusion Excitation and Fine-Grained Feature Enhancement., , , and . IEEE Trans. Instrum. Meas., (2024)Guided filtering based color image reversible data hiding., , , and . J. Vis. Commun. Image Represent., (2017)Graph-based Robust Model Hashing., and . WIFS, page 1-6. IEEE, (2022)Angle-of-Arrival Acquisition and Tracking via Virtual Subarrays in an Analog Array., , , and . VTC Fall, page 1-5. IEEE, (2019)Embedding Fairness into the AI-Based Talent Recruitment Systems:The Perspective of Environment Cycle and Knowledge Cycle., , , , and . PACIS, page 15. (2021)Large-Scale Talent Flow Embedding for Company Competitive Analysis., , , , , , and . WWW, page 2354-2364. ACM / IW3C2, (2020)Unified Performance Evaluation Method for Perceptual Image Hashing., , , , and . IEEE Trans. Inf. Forensics Secur., (2022)A hierarchical threshold secret image sharing., , and . Pattern Recognit. Lett., 33 (1): 83-91 (2012)