Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

"Wow! you are so beautiful today!"., , , , , and . ACM Multimedia, page 437-438. ACM, (2013)Hiding Bitcoin Transaction Information Based on HEVC., , , , and . SmartBlock, volume 11373 of Lecture Notes in Computer Science, page 1-11. Springer, (2018)Open Category Detection with PAC Guarantees, , , , and . (2018)cite arxiv:1808.00529.Beauty eMakeup: A Deep Makeup Transfer System., , , and . ACM Multimedia, page 701-702. ACM, (2016)Event Space-Correlation Analysis Algorithm Based on Ant Colony Optimization., , and . ICIC (1), volume 9771 of Lecture Notes in Computer Science, page 563-570. Springer, (2016)A HEVC Steganography Method Based on QDCT Coefficient., , , , and . ICIC (3), volume 12465 of Lecture Notes in Computer Science, page 624-632. Springer, (2020)The NWSC benchmark suite using scientific throughput to measure supercomputer performance., , , , and . SC State of the Practice Reports, page 7:1-7:5. ACM, (2011)A Video Steganography Method Based on Transform Block Decision for H.265/HEVC., , , , and . IEEE Access, (2021)Optimizing GPU-Enhanced HPC System and Cloud Procurements for Scientific Workloads., , , , , , , , and . ISC, volume 12728 of Lecture Notes in Computer Science, page 313-331. Springer, (2021)Weakly Supervised Graph Propagation Towards Collective Image Parsing., , , , , and . IEEE Trans. Multim., 14 (2): 361-373 (2012)