Author of the publication

A City-Level Boundary Nodes Identification Algorithm Based on Bidirectional Approaching.

, , , and . KSII Trans. Internet Inf. Syst., 15 (8): 2764-2782 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

LTSB Steganalysis Based on Quartic Equation., , , and . Trans. Data Hiding Multim. Secur., (2007)Steganalysis Based on Difference Image., , , and . IWDW, volume 5450 of Lecture Notes in Computer Science, page 184-198. Springer, (2008)Equivalence Analysis Among DIH, SPA, and RS Steganalysis Methods., , and . Communications and Multimedia Security, volume 4237 of Lecture Notes in Computer Science, page 161-172. Springer, (2006)Video Quality Assessment Algorithm Based on Persistence-of-Vision Effect., , and . ICCCS (2), volume 11064 of Lecture Notes in Computer Science, page 366-376. Springer, (2018)A landmark calibration-based IP geolocation approach., , , , and . EURASIP J. Inf. Secur., (2016)A City-Level Boundary Nodes Identification Algorithm Based on Bidirectional Approaching., , , and . KSII Trans. Internet Inf. Syst., 15 (8): 2764-2782 (2021)Enhanced branch obfuscation based on exception handling and encrypted mapping table., , , and . ACM TUR-C, page 140:1-140:9. ACM, (2019)Improved RS Method for Detection of LSB Steganography., , and . ICCSA (2), volume 3481 of Lecture Notes in Computer Science, page 508-516. Springer, (2005)A JPEG-Compression Resistant Adaptive Steganography Based on Relative Relationship between DCT Coefficients., , , , and . ARES, page 461-466. IEEE Computer Society, (2015)City-Level Geolocation Based on Routing Feature., , , , , and . AINA, page 414-419. IEEE Computer Society, (2015)