Author of the publication

SWOT-based Countermeasure Research on Demand-side Resources Development in China Jibei.

, , , , , and . ICMSS, page 44-48. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Correction to Improved PHARM for JPEG Steganalysis: Making PHARM More Efficient and Effective., , , , , and . IEEE Access, (2019)A subspace learning-based method for JPEG mismatched steganalysis., , , , and . Multim. Tools Appl., 78 (7): 8151-8166 (2019)SWOT-based Countermeasure Research on Demand-side Resources Development in China Jibei., , , , , and . ICMSS, page 44-48. IEEE, (2022)Adversarial Example Does Good: Preventing Painting Imitation from Diffusion Models via Adversarial Examples., , , , , , , , and . ICML, volume 202 of Proceedings of Machine Learning Research, page 20763-20786. PMLR, (2023)A Test-Time Entropy Minimization Method for Cross-Domain Linguistic Steganalysis., , , , and . IEEE Signal Process. Lett., (2024)Optimized CNN with Point-Wise Parametric Rectified Linear Unit for Spatial Image Steganalysis., , , , and . IWDW, volume 12022 of Lecture Notes in Computer Science, page 32-42. Springer, (2019)Analysis and Detection of Android App Privilege Escalation Vulnerability Based on Machine Learning., , , and . IIH-MSP (1), volume 109 of Smart Innovation, Systems and Technologies, page 117-123. Springer, (2018)HDTC: Hybrid Model of Dual-Transformer and Convolutional Neural Network from RGB-D for Detection of Lettuce Growth Traits., , , , and . ICIP, page 2185-2189. IEEE, (2023)A Generation-based Text Steganography by Maintaining Consistency of Probability Distribution., , , and . KSII Trans. Internet Inf. Syst., 15 (11): 4184-4202 (2021)Linguistic Steganography Based on Adaptive Probability Distribution., , , , , and . IEEE Trans. Dependable Secur. Comput., 19 (5): 2982-2997 (2022)