Author of the publication

SafeHidden: An Efficient and Secure Information Hiding Technique Using Re-randomization.

, , , , , , , , , and . USENIX Security Symposium, page 1239-1256. USENIX Association, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An IBP-CNN Based Fast Block Partition For Intra Prediction., , , and . PCS, page 1-5. IEEE, (2019)Formal Modelling and Verification of Spinlocks at Instruction Level., , , , , and . APSEC, page 355-362. IEEE, (2019)On Hit Rate Improving and Energy Consumption Minimizing in Cache-Based Convergent Overlay Network on High-speed Train., , , , and . BMSB, page 1-6. IEEE, (2019)Joint design of sensing and transmission in energyefficient cognitive radio systems over fading channels., , and . IET Commun., (2013)Lightdet: A Lightweight and Accurate Object Detection Network., , , and . ICASSP, page 2243-2247. IEEE, (2020)Clustering-Enhanced Knowledge Graph Embedding., , , , , and . Big Data (CCF), volume 1709 of Communications in Computer and Information Science, page 104-123. Springer, (2022)Formalizing the Transaction Flow Process of Hyperledger Fabric., , , , and . ICFEM, volume 12531 of Lecture Notes in Computer Science, page 233-250. Springer, (2020)Formalizing the Matrix Inversion Based on the Adjugate Matrix in HOL4., , , , and . Intelligent Information Processing, volume 432 of IFIP Advances in Information and Communication Technology, page 178-186. Springer, (2014)A New Way to Prevent UKS Attacks Using Hardware Security Chips., and . Int. J. Netw. Secur., 19 (5): 823-831 (2017)Fusing semantic aspects for image annotation and retrieval., , , , and . J. Vis. Commun. Image Represent., 21 (8): 798-805 (2010)