Author of the publication

SafeHidden: An Efficient and Secure Information Hiding Technique Using Re-randomization.

, , , , , , , , , and . USENIX Security Symposium, page 1239-1256. USENIX Association, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Representing Software Process in Description Logics: An Ontology Approach for Software Process Reasoning and Verification., , , and . SPICE, volume 609 of Communications in Computer and Information Science, page 362-376. Springer, (2016)Mirror Presence: Secure Web Identity Resolution and Call Control for WebRTC., , , , and . iiWAS, page 523. ACM, (2013)Efficient top-K query calculation in distributed networks., and . PODC, page 206-215. ACM, (2004)An Analytical Study of Power Delivery Systems for Many-Core Processors Using On-Chip and Off-Chip Voltage Regulators., , , , , , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 34 (9): 1401-1414 (2015)Observer-based robust control for singular switched fractional order systems subject to actuator saturation., , and . Appl. Math. Comput., (2021)RLPGB-Net: Reinforcement Learning of Feature Fusion and Global Context Boundary Attention for Infrared Dim Small Target Detection., , , , and . IEEE Trans. Geosci. Remote. Sens., (2023)The Fusion of Electroencephalography and Facial Expression for Continuous Emotion Recognition., , , , , , , , and . IEEE Access, (2019)Cross-Layer Distillation with Semantic Calibration., , , , , , and . CoRR, (2020)Deep learning in physics: a study of dielectric quasi-cubic particles in a uniform electric field., and . CoRR, (2021)The link between math anxiety and math achievement: The role of afterschool learning., , , and . J. Numer. Cogn., 9 (3): 418-432 (November 2023)