Author of the publication

Enhanced image compression method exploiting NTT for internet of thing.

, , , , , and . Int. J. Circuit Theory Appl., 51 (4): 1879-1892 (April 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Comments and Further Results on 'Performance Evaluation of a New BPSK-OFDM Timing Estimation Algorithm'., , , and . Wireless Personal Communications, 49 (2): 149-159 (2009)Barrier: a lightweight hypervisor for protecting kernel integrity via memory isolation., and . SAC, page 1470-1477. ACM, (2012)EV-Linker: Mapping eavesdropped Wi-Fi packets to individuals via electronic and visual signal matching., , , and . J. Comput. Syst. Sci., 82 (1): 156-172 (2016)Wireless localization based on the time sum of arrival and Taylor expansion., , , , and . ICON, page 1-4. IEEE, (2013)A Dynamic Clustering-Based Algorithm for Wireless Sensor Networks., , , and . ISCSCT (2), page 720-723. IEEE Computer Society, (2008)Differentially Private Matrix Factorization., , and . IJCAI, page 1763-1770. AAAI Press, (2015)A Privacy-Preserving Scheme For Convolutional Neural Network-Based Applications In Mobile Cloud., , , , and . ICME, page 1-6. IEEE, (2020)Advertiser and Publisher-centric Privacy Aware Online Behavioral Advertising., , and . ICDCS, page 298-307. IEEE Computer Society, (2015)Turbo detection and decoding for single-carrier block transmission systems., , , , , and . PIMRC, page 1163-1167. IEEE, (2004)Differentially private publication of general time-serial trajectory data., , and . INFOCOM, page 549-557. IEEE, (2015)