Author of the publication

New 5-Step Discrete-Time Zeroing Neuronet for Time-Dependent Matrix Square Root Finding.

, , , , , and . ICSAI, page 943-949. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Forensic sensor pattern noise extraction from large image data set., , , and . ICASSP, page 3023-3027. IEEE, (2013)Recognition of spoofed voice using convolutional neural networks., , , and . GlobalSIP, page 293-297. IEEE, (2017)New 5-Step Discrete-Time Zeroing Neuronet for Time-Dependent Matrix Square Root Finding., , , , , and . ICSAI, page 943-949. IEEE, (2019)Beyond the Prior Forgery Knowledge: Mining Critical Clues for General Face Forgery Detection., , , , , and . CoRR, (2023)ResNeXt+: Attention Mechanisms Based on ResNeXt for Malware Detection and Classification., , , and . IEEE Trans. Inf. Forensics Secur., (2024)An Adaptive IPM-Based HEVC Video Steganography via Minimizing Non-Additive Distortion., , , , and . IEEE Trans. Dependable Secur. Comput., 20 (4): 2896-2912 (July 2023)A Multi-purpose Image Counter-anti-forensic Method Using Convolutional Neural Networks., , , and . IWDW, volume 10082 of Lecture Notes in Computer Science, page 3-15. (2016)Improve robustness of image watermarking via adaptive receiving., , and . ICIP, page 2343-2346. IEEE, (2004)Boosting Transferability of Adversarial Example via an Enhanced Euler's Method., , , , and . ICASSP, page 1-5. IEEE, (2023)Robust Image Steganography: Hiding Messages in Frequency Coefficients., , , , and . AAAI, page 14955-14963. AAAI Press, (2023)