Author of the publication

A Privacy Reinforcement Approach against De-identified Dataset.

, , , , , and . ICEBE, page 370-375. IEEE Computer Society, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modified YOLOv4-DenseNet Algorithm for Detection of Ventricular Septal Defects in Ultrasound Images., , , , , and . Int. J. Interact. Multim. Artif. Intell., 6 (7): 101 (2021)Image Tamper Detection and Recovery Based on Dual Watermarks Sharing Strategy., and . J. Digit. Inf. Manag., 10 (1): 39-49 (2012)Design of Halftone-Based AR Markers under Infrared Detection., , , and . CSSE (6), page 97-100. IEEE Computer Society, (2008)978-0-7695-3336-0.D-Box: DMA-enabled Compartmentalization for Embedded Applications., , , , and . NDSS, The Internet Society, (2022)A New Two-objective Single Machine Scheduling Problem Considers a Past-sequence-dependent Setup Time and Learning Effect., and . ICKII, page 309-312. IEEE, (2018)A Privacy Reinforcement Approach against De-identified Dataset., , , , , and . ICEBE, page 370-375. IEEE Computer Society, (2011)A (n, n)-threshold Secret Sharing Scheme for Barcode Application., , and . ICS, volume 274 of Frontiers in Artificial Intelligence and Applications, page 1023-1028. IOS Press, (2014)Secret sharing mechanism with cheater detection., , , and . APSIPA, page 1-4. IEEE, (2013)Diverse augmented reality exhibitions for differential users based upon private quick response code., , and . APSIPA, page 1121-1125. IEEE, (2015)Tuning applications for efficient GPU offloading to in-memory processing., , , and . ICS, page 37:1-37:12. ACM, (2020)