Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Queuing Analysis on Adaptive Transmission in MIMO Systems with Imperfect CSI., , and . VTC Fall, IEEE, (2009)Medical JPEG image steganography based on preserving inter-block dependencies., , , , and . Comput. Electr. Eng., (2018)Scalable Computing Infrastructure for Online and Blended Learning Environments.. Scalable Comput. Pract. Exp., 24 (3): 597-607 (September 2023)Exploiting Fine-Grained DCT Representations for Hiding Image-Level Messages within JPEG Images., and . ACM Multimedia, page 7373-7382. ACM, (2023)Generative Steganography via Live Comments on Streaming Video Frames., , , , and . IEEE Trans. Comput. Soc. Syst., 11 (3): 4412-4425 (June 2024)Research on collaborative design platform of Launch Vehicle based on desktop grid., , , , and . CSCWD, page 356-360. IEEE, (2010)GIFMarking: The robust watermarking for animated GIF based deep learning., , and . J. Vis. Commun. Image Represent., (2021)Multi-party covert communication with steganography and quantum secret sharing., , , and . J. Syst. Softw., 83 (10): 1801-1804 (2010)Efficient color image encryption by color-grayscale conversion based on steganography., , , , and . Multim. Tools Appl., 82 (7): 10835-10866 (March 2023)A dual-population search differential evolution algorithm for functional distributed constraint optimization problems., , and . Ann. Math. Artif. Intell., 90 (10): 1055-1078 (2022)