Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Robust Adaptive Steganography Based on Adaptive STC-ECC., , , , , and . IEEE Trans. Multim., (2024)Variability of structurally constrained and unconstrained functional connectivity in schizophrenia.. University of Warwick, Coventry, UK, (2016)British Library, EThOS.Distortion-Aware Mutual Constraint for Screen Content Image Quality Assessment., , , and . ICIG (1), volume 14355 of Lecture Notes in Computer Science, page 403-414. Springer, (2023)4×96 Gbit/s PAM8 for Short-Reach Applications Employing Low-Cost DML without Pre-Equalization., , , , , , , and . OFC, page 1-3. IEEE, (2019)Enabling Privacy-Preserving and Publicly Auditable Federated Learning., , , , , , and . ICC, page 5178-5183. IEEE, (2024)Privacy-preserving face recognition method based on extensible feature extraction., , , , , and . J. Vis. Commun. Image Represent., (2024)CGNet: Detecting computer-generated images based on transfer learning with attention module., , , , , and . Signal Process. Image Commun., (2022)High invisibility image steganography with wavelet transform and generative adversarial network., , , , and . Expert Syst. Appl., (2024)High-capacity reversible data hiding in encrypted images based on adaptive block coding selection., , , and . J. Vis. Commun. Image Represent., (2024)Estimation of wetland aboveground biomass based on SAR image: A case study of Honghe National Natural Reserve in Heilongjiang, China., , , and . Geoinformatics, page 1-6. IEEE, (2010)