Author of the publication

Watermark-Preserving Keypoint Enhancement for Screen-Shooting Resilient Watermarking.

, , , , and . ICME, page 1-6. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Image Sharing Chain Detection VIA Sequence-To-Sequence Model., , , , , and . ICASSP, page 1-5. IEEE, (2023)Secure and Verifiable Outsourcing of Nonnegative Matrix Factorization (NMF)., , and . IH&MMSec, page 63-68. ACM, (2016)Meta-Path Based Neighbors for Behavioral Target Generalization in Sequential Recommendation., , , , , , , , and . IEEE Trans. Netw. Sci. Eng., 9 (3): 1658-1667 (2022)Task Scheduling Game Optimization for Mobile Edge Computing., , , , , , and . ICC, page 1-6. IEEE, (2021)Ciphertext-Only Attack on an Image Homomorphic Encryption Scheme with Small Ciphertext Expansion., , and . ACM Multimedia, page 1063-1066. ACM, (2015)Image Reconstruction from Local Descriptors Using Conditional Adversarial Networks., , and . APSIPA, page 1773-1779. IEEE, (2019)Privacy-Preserving distributed deep learning based on secret sharing., , and . Inf. Sci., (2020)Visually secure image encryption using adaptive-thresholding sparsification and parallel compressive sensing., , , and . Signal Process., (2021)Uformer-ICS: A Specialized U-Shaped Transformer for Image Compressive Sensing., , , , and . CoRR, (2022)SIFT Keypoint Removal and Injection via Convex Relaxation., , , , and . IEEE Trans. Inf. Forensics Secur., 11 (8): 1722-1735 (2016)