Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Performance of Wavelet Decomposition Steganalysis with JSteg Steganography., , and . IWDW, volume 5450 of Lecture Notes in Computer Science, page 342-349. Springer, (2008)Local descriptor for retinal fundus image registration., , , , , , , and . IET Comput. Vis., 14 (4): 144-153 (2020)Deep learning-based breast cancer classification through medical imaging modalities: state of the art and research challenges., , , , , , , , and . Artif. Intell. Rev., 53 (3): 1655-1720 (2020)A Feedback-based Admission Control Unit for QoS provision of video Transmission over WLANs., , , , , and . CCWC, page 1-6. IEEE, (2017)Has F5 really been broken?, , and . ICDP, page 1-5. IET / IEEE, (2009)Explainable deep learning approach for advanced persistent threats (APTs) detection in cybersecurity: a review., , , , and . Artif. Intell. Rev., 57 (11): 297 (November 2024)SIDNFF: Source identification network forensics framework for cloud computing., , , and . ICCE-TW, page 418-419. IEEE, (2015)A tree-based multiclassification of breast tumor histopathology images through deep learning., , , and . Comput. Medical Imaging Graph., (2021)Concept of Entire Boolean Values Recalculation From Aggregates in the Preprocessed Category of Incomplete Soft Sets., , , , and . IEEE Access, (2017)SIFT-Symmetry: A robust detection method for copy-move forgery with reflection attack., , , , and . J. Vis. Commun. Image Represent., (2017)