Author of the publication

Damage Monitoring of Braided Composites Using CNT Yarn Sensor Based on Artificial Fish Swarm Algorithm.

, , , , and . Sensors, 23 (16): 7067 (August 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Self-Embedding Watermarking Scheme Based on MDS Codes., , , and . IWDW, volume 9569 of Lecture Notes in Computer Science, page 250-258. Springer, (2015)Reversible adversarial steganography for security enhancement., , , , , and . J. Vis. Commun. Image Represent., (December 2023)Intra-Frame Error Concealment Scheme Using 3D Reversible Data Hiding in Mobile Cloud Environment., , , and . IEEE Access, (2018)Multi-layer assignment steganography using graph-theoretic approach., , , and . Multim. Tools Appl., 74 (18): 8171-8196 (2015)Temporal and Spatial Evolution of Green Invention Patent Applications in China., , , and . Inf., 13 (5): 240 (2022)Sensing Information Modelling for Smart City.. SmartCity, page 40-45. IEEE Computer Society, (2015)New Graph-Theoretic Approach to Social Steganography., , , and . Media Watermarking, Security, and Forensics, Society for Imaging Science and Technology, (2019)Improved image encryption technique using multi chaotic system., and . FIT, page 35. ACM, (2010)A Two-Stage Cascaded Detection Scheme for Double HEVC Compression Based on Temporal Inconsistency., , , and . Secur. Commun. Networks, (2021)Damage Monitoring of Braided Composites Using CNT Yarn Sensor Based on Artificial Fish Swarm Algorithm., , , , and . Sensors, 23 (16): 7067 (August 2023)