From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Equivalence Analysis Among DIH, SPA, and RS Steganalysis Methods., , и . Communications and Multimedia Security, том 4237 из Lecture Notes in Computer Science, стр. 161-172. Springer, (2006)Blind recognition of punctured convolutional codes., , , и . ISIT, стр. 459. IEEE, (2004)Survive and Thrive: A Stochastic Game for DDoS Attacks in Bitcoin Mining Pools., , , , , и . IEEE/ACM Trans. Netw., 28 (2): 874-887 (2020)A City-Level Boundary Nodes Identification Algorithm Based on Bidirectional Approaching., , , и . KSII Trans. Internet Inf. Syst., 15 (8): 2764-2782 (2021)A landmark calibration-based IP geolocation approach., , , , и . EURASIP J. Inf. Secur., (2016)Statistical Model-Based Detector via Texture Weight Map: Application in Re-Sampling Authentication., , , , , и . IEEE Trans. Multim., 21 (5): 1077-1092 (2019)LTSB Steganalysis Based on Quartic Equation., , , и . Trans. Data Hiding Multim. Secur., (2007)Class-Aware Analysis Dictionary Learning for Pattern Classification., , , , и . IEEE Signal Process. Lett., 24 (12): 1822-1826 (2017)Perceptual image hashing via dual-cross pattern encoding and salient structure detection., , , , и . Inf. Sci., (2018)Improved RS Method for Detection of LSB Steganography., , и . ICCSA (2), том 3481 из Lecture Notes in Computer Science, стр. 508-516. Springer, (2005)