Author of the publication

Stretchable, Conducting and Large-Range Monitoring PEDOT: PSS-PVA Hydrogel Strain Sensor.

, , , , , , and . ICIRA (2), volume 13456 of Lecture Notes in Computer Science, page 305-314. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

NMF-Based Privacy-Preserving Collaborative Filtering on Cloud Computing., , , , , and . iThings/GreenCom/CPSCom/SmartData, page 476-481. IEEE, (2019)Adaptive time-stepping and computational stability, and . Journal of Computational and Applied Mathematics, 185 (2): 225--243 (January 2006)A Direct Anonymous Attestation Protocol Based on Hierarchical Group Signature., , , and . CSE (2), page 721-726. IEEE Computer Society, (2009)Chronic Poisoning: Backdoor Attack against Split Learning., , , , and . AAAI, page 16531-16538. AAAI Press, (2024)Combined and Calibrated Features for Steganalysis of Motion Vector-Based Steganography in H.264/AVC., , and . IH&MMSec, page 135-146. ACM, (2017)Designing Non-additive Distortions for JPEG Steganography Based on Blocking Artifacts Reduction., , and . IWDW, volume 12022 of Lecture Notes in Computer Science, page 268-280. Springer, (2019)MGAAttack: Toward More Query-efficient Black-box Attack by Microbial Genetic Algorithm., , , , and . ACM Multimedia, page 2229-2236. ACM, (2020)Multi-domain Embedding Strategies for Video Steganography by Combining Partition Modes and Motion Vectors., , and . ICME, page 1402-1407. IEEE, (2019)A Hash Function based on Sponge Structure with Chaotic Map for Spinal Codes., and . CITS, page 1-5. IEEE, (2019)Simulation Study on Influencing Factors of Image Reconstruction Quality Based on UT System., , and . I2MTC, page 1-6. IEEE, (2022)