Author of the publication

High Capacity Steganography on Float-Point Number with Single Precision.

, , and . VSIP, page 48-54. ACM, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An efficient protocol for RFID multigroup threshold-based classification., , and . INFOCOM, page 890-898. IEEE, (2013)A novel failure response policy for single-arm cluster tools with residency time constraints., , , and . SMC, page 120-126. IEEE, (2014)Optimal scheduling analysis of treelike hybrid multi-cluster tools., , , and . CASE, page 1400-1404. IEEE, (2016)Using MTD and SDN-based Honeypots to Defend DDoS Attacks in IoT., , , and . ComComAP, page 392-395. IEEE, (2019)Real-Time Scheduling of Single-Arm Cluster Tools Subject to Residency Time Constraints and Bounded Activity Time Variation., , and . IEEE Trans Autom. Sci. Eng., 9 (3): 564-577 (2012)Optimally Scheduling Single-Arm Multicluster Tools for Manufacturing Hybrid-Type Wafers., , , , , and . SMC, page 3379-3384. IEEE, (2023)MVFAN: Multi-view Feature Assisted Network for 4D Radar Object Detection., and . ICONIP (4), volume 14450 of Lecture Notes in Computer Science, page 493-511. Springer, (2023)Adversarial Attack and Defense for Webshell Detection on Machine Learning Models., , and . CyberC, page 33-41. IEEE, (2022)An actor-critic reinforcement learning-based resource management in mobile edge computing systems., , , and . Int. J. Machine Learning & Cybernetics, 11 (8): 1875-1889 (2020)'Technology foresight towards 2020 in China': the practice and its impacts., , , and . Technol. Anal. Strateg. Manag., 20 (3): 287-307 (2008)