Author of the publication

Transparency-Orientated Encoding Strategies for Voice-over-IP Steganography.

, , , and . Comput. J., 55 (6): 702-716 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Uncertainty analysis of forest above-ground biomass increments in southern Qilian Mountains., , , , and . IGARSS, page 4430-4433. IEEE, (2016)Distributed Systems Middleware Architecture from a Software Engineering Perspective., , and . IRI, page 572-579. IEEE Systems, Man, and Cybernetics Society, (2003)Surveillance Video Processing Using Compressive Sensing, , and . CoRR, (2013)A User-level Socket Layer over Multiple Physical Network Interfaces., , , and . IASTED PDCS, page 804-810. IASTED/ACTA Press, (2002)Research on the Critical Nodes Compensation Algorithm in Sparse Ad Hoc Wireless Networks., , and . DASC, page 359-363. IEEE Computer Society, (2009)Blind multi-target detection for bistatic MIMO radar based on random matrix theory., , , and . ChinaSIP, page 1047-1051. IEEE, (2015)The interpreters glossary in simultaneous interpreting: A survey. Interpreting, (2013)Impact of Priority-Based ATM Switch Design on System Performance., and . ICCI, page 128-132. IEEE Computer Society, (1993)Dynamic Load Balancing for I/O- and Memory-Intensive Workload in clusters Using a Feedback Control Mechanism., , , and . Euro-Par, volume 2790 of Lecture Notes in Computer Science, page 224-229. Springer, (2003)Self-stabilizing Population Protocols., , , and . OPODIS, volume 3974 of Lecture Notes in Computer Science, page 103-117. Springer, (2005)