Author of the publication

An Authenticating Algorithm with Multi-compression Compatible in DCT Domain.

, , , and . IAS, page 11-14. IEEE Computer Society, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Understanding Application-Battery Interactions on Smartphones: A Large-Scale Empirical Study., , and . IEEE Access, (2017)Energy-aware Fixed-Priority Multi-core Scheduling for Real-time Systems., and . CoRR, (2015)MadDroid: Characterising and Detecting Devious Ad Content for Android Apps., , , , , , , , and . CoRR, (2020)Are we there yet? An Industrial Viewpoint on Provenance-based Endpoint Detection and Response Tools., , , , , , , , , and 1 other author(s). CCS, page 2396-2410. ACM, (2023)Simultaneous Precision Assembly of Multiple Objects through Coordinated Micro-robot Manipulation., , , , and . ICRA, page 6280-6286. IEEE, (2021)Human-Robot Shared Control for Surgical Robot Based on Context-Aware Sim-to-Real Adaptation., , , , , , , , , and 3 other author(s). ICRA, page 7694-7700. IEEE, (2022)Mobile App Squatting., , , , , , , , and . WWW, page 1727-1738. ACM / IW3C2, (2020)Towards OS Heterogeneity Aware Cluster Management for HPC., , , , , , and . APSys, page 16-23. ACM, (2023)RtSNN: Building a Real-time Siamese Neural Networks Model for Few-shot Action Recognition., , , , , , and . BigCom, page 243-250. IEEE, (2022)BREWasm: A General Static Binary Rewriting Framework for WebAssembly., , , and . SAS, volume 14284 of Lecture Notes in Computer Science, page 139-163. Springer, (2023)