Author of the publication

Iterative Detection Method for CDMA-Based Fingerprinting Scheme.

, and . Information Hiding, volume 5284 of Lecture Notes in Computer Science, page 357-371. Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Collusion-Resistant Fingerprinting Scheme Based on the CDMA-Technique., , and . IWSEC, volume 4752 of Lecture Notes in Computer Science, page 28-43. Springer, (2007)Tardos's Fingerprinting Code over AWGN Channel.. Information Hiding, volume 6387 of Lecture Notes in Computer Science, page 103-117. Springer, (2010)Iterative Detection Method for CDMA-Based Fingerprinting Scheme., and . Information Hiding, volume 5284 of Lecture Notes in Computer Science, page 357-371. Springer, (2008)Detecting and Correcting Adversarial Images Using Image Processing Operations., , , and . CoRR, (2019)Efficient Decoding Algorithm for Cyclically Permutable Code., , and . ITW, page 1-5. IEEE, (2018)Universal Scoring Function Based on Bias Equalizer for Bias-Based Fingerprinting Codes., and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 101-A (1): 119-128 (2018)Improved DM-QIM Watermarking Scheme for PDF Document., and . IWDW, volume 12022 of Lecture Notes in Computer Science, page 171-183. Springer, (2019)Benchmarking of scoring functions for bias-based fingerprinting code.. ICASSP, page 2039-2043. IEEE, (2016)A throughput estimation model under two-link concurrent communications with partially overlapping channels and its application to channel assignment in IEEE 802.11n WLAN., , , , and . Int. J. Space Based Situated Comput., 8 (3): 123-137 (2018)An Active Access-Point Configuration Algorithm for Elastic Wireless Local-Area Network System Using Heterogeneous Devices., , , , and . Int. J. Netw. Comput., 6 (2): 395-419 (2016)