Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Variational Flow Models: Flowing in Your Style., , , , , , and . CoRR, (2024)Rethinking the Combined and Individual Orders of Derivative of States for Differential Recurrent Neural Networks: Deep Differential Recurrent Neural Networks., , , and . ACM Trans. Multim. Comput. Commun. Appl., 15 (3): 83:1-83:21 (2019)Using nearest covering codes to embed secret information in grayscale images., , and . ICUIMC, page 315-320. ACM, (2008)Information Hiding in Dual Images with Reversibility., , and . MUE, page 145-152. IEEE Computer Society, (2009)Secret Sharing and Information Hiding by Shadow Images., and . IIH-MSP, page 457-460. IEEE Computer Society, (2007)Convolutional Nonlinear Differential Recurrent Neural Networks for Crowd Scene Understanding., , , and . Int. J. Semantic Comput., 12 (4): 480-500 (2018)Reversible Data Embedding for Vector Quantization Indices., and . IIH-MSP, page 481-484. IEEE Computer Society, (2007)Sharing Secrets and Reversibly Reconstructing the Cover Image Using Two Meaningful Shadows., , , and . IIH-MSP, page 324-327. IEEE Computer Society, (2009)A reversible steganographic scheme for VQ indices based on locally adaptive coding., , and . J. Vis. Commun. Image Represent., 25 (6): 1378-1386 (2014)A High Payload Steganographic Scheme Based on (7, 4) Hamming Code for Digital Images., , and . ISECS, page 16-21. IEEE Computer Society, (2008)