Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detection of Quantization Artifacts and Its Applications to Transform Encoder Identification., , and . IEEE Trans. Inf. Forensics Secur., 5 (4): 810-815 (2010)Adversarial Steganography Embedding via Stego Generation and Selection., , , , and . IEEE Trans. Dependable Secur. Comput., 20 (3): 2375-2389 (May 2023)SDGAN: Disentangling Semantic Manipulation for Facial Attribute Editing., , , and . AAAI, page 2374-2381. AAAI Press, (2024)KG4Ex: An Explainable Knowledge Graph-Based Approach for Exercise Recommendation., , , , , , and . CIKM, page 597-607. ACM, (2023)Knowledge Tracing Model with Learning and Forgetting Behavior., , , , , and . CIKM, page 3863-3867. ACM, (2022)Enhancing Image Steganography Via Stego Generation And Selection., , , and . ICASSP, page 2695-2699. IEEE, (2021)Fast and Effective Global Covariance Pooling Network for Image Steganalysis., , , and . IH&MMSec, page 230-234. ACM, (2019)Generalized Linear Integer Numeric Planning., , , , , and . ICAPS, page 241-251. AAAI Press, (2022)Keyword Spotting in the Homomorphic Encrypted Domain Using Convolution Decomposition., , and . TrustCom, page 1592-1597. IEEE, (2023)Fake Faces Identification via Convolutional Neural Network., , and . IH&MMSec, page 43-47. ACM, (2018)