From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Locally optimum detection for Barni's multiplicative watermarking in DWT domain., , , , , и . Signal Process., 88 (1): 117-130 (2008)Detection of TCP covert channel based on Markov model., , и . Telecommun. Syst., 54 (3): 333-343 (2013)Prospect Theoretic Study of Honeypot Defense Against Advanced Persistent Threats in Power Grid., , , , , , и . IEEE Access, (2020)Provably Secure Identity-Based Threshold Decryption on Access Structure., , и . CIS, стр. 464-468. IEEE Computer Society, (2014)A RST-Resilient Watermarking Scheme Based on Invariant Features., , , и . SITIS, стр. 927-933. IEEE Computer Society, (2007)Data Hiding in Neural Network Prediction Errors., , , , и . ISNN (2), том 3973 из Lecture Notes in Computer Science, стр. 273-278. Springer, (2006)Semi-Fragile Watermarking Authentication with Local and Global Watermarks., , , , и . AIAI, том 204 из IFIP, стр. 681-688. Springer, (2006)Robustness Analysis of Watermarking Schemes Based on Two Novel Transforms., , , , и . ICICIC (3), стр. 471-474. IEEE Computer Society, (2006)An evaluation method of operational effectiveness for the emergency plans., , , и . SOLI, стр. 169-172. IEEE, (2009)Detecting Stealthy Domain Generation Algorithms Using Heterogeneous Deep Neural Network Framework., , , , и . IEEE Access, (2020)