Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

JPEG encryption for image rescaling in the encrypted domain., , and . J. Vis. Commun. Image Represent., (2015)Reversible data hiding in encrypted images using adaptive reversible integer transformation., , , , and . Signal Process., (2020)Computing in Covert Domain Using Data Hiding., , and . CoRR, (2020)Watermarking With Flexible Self-Recovery Quality Based on Compressive Sensing and Compositive Reconstruction., , , and . IEEE Trans. Inf. Forensics Secur., 6 (4): 1223-1232 (2011)Trojaning semi-supervised learning model via poisoning wild images on the web., , , and . CoRR, (2023)Perceptual Robust Hashing for Color Images with Canonical Correlation Analysis., , , , and . CoRR, (2020)Reference Sharing Mechanism for Watermark Self-Embedding., , , and . IEEE Trans. Image Process., 20 (2): 485-495 (2011)Efficient Algorithm for Secure Outsourcing of Modular Exponentiation with Single Server., , , , and . IEEE Trans. Cloud Comput., 9 (1): 145-154 (2021)Forward Creation, Reverse Selection: Achieving Highly Pertinent Multimodal Responses in Dialogue Contexts., , , , , and . CIKM, page 1687-1696. ACM, (2023)Bootstrapping Multi-View Representations for Fake News Detection., , , , , and . AAAI, page 5384-5392. AAAI Press, (2023)