Author of the publication

Hybridized Hierarchical Watermarking and Selective Encryption for Social Image Security.

, , , , and . Entropy, 25 (7): 1031 (July 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Selective Knowledge Sharing for Personalized Federated Learning Under Capacity Heterogeneity., , , , and . CoRR, (2024)Automatic Variable-timing Animation Transition based on Hierarchical Interpolation Method., , , and . GRAPP, page 309-316. SciTePress, (2015)Exploiting Dynamic Scheduling for VM-Based Code Obfuscation., , , , , , , , and . Trustcom/BigDataSE/ISPA, page 489-496. IEEE, (2016)Broadcast throughput Capacity of Wireless Ad Hoc Networks with Multipacket Reception., , and . ICC, page 2243-2247. IEEE, (2008)Capacity of Wireless Networks with Heterogeneous Traffic., , , and . GLOBECOM, page 1-6. IEEE, (2009)A dual-window model for flow and congestion control., and . Distributed Systems Engineering, 1 (3): 162-172 (1994)Levelized low cost delay test compaction considering IR-drop induced power supply noise., , , and . VTS, page 52-57. IEEE Computer Society, (2011)A high-power multi-port 0.46THz radiation source in nano-scale silicon technology using fundamental-frequency oscillation beyond fMAX of transistors., , and . NANOCOM, page 26:1-26:6. ACM, (2017)Querying discriminative and representative samples for batch mode active learning., and . KDD, page 158-166. ACM, (2013)Adaptive neural control for high order Markovian jump nonlinear systems with unmodeled dynamics and dead zone inputs., , , and . Neurocomputing, (2017)