From post

A LBP-Based Method for Detecting Copy-Move Forgery with Rotation.

, , и . MUE, том 240 из Lecture Notes in Electrical Engineering, стр. 261-267. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

How to Protect Personal Information against Keyloggers., , и . IMSA, стр. 275-280. IASTED/ACTA Press, (2005)Impact of Limited Feedback on Multiple Relay Zero-Forcing Precoding Systems., , и . ICC, стр. 4992-4997. IEEE, (2008)An Improved Privacy-Preserving Biometric Identification Scheme in Cloud Computing., , , и . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 99-A (10): 1891-1894 (2016)Charged-Spacecraft Formation: Concept, Deployment and Coulomb-Force Control., и . IEEE Access, (2020)Overview of Control and Matching Design of Hydraulic Retarder., , и . ICITEE, стр. 124:1-124:4. ACM, (2019)A Semantic Sequential Correlation Based LSTM Model for Next POI Recommendation., , , , , и . MDM, стр. 128-137. IEEE, (2019)A Novel Grey Wolf Optimizer Algorithm With Refraction Learning., , , , , и . IEEE Access, (2019)Robust Frequency Domain Spline Adaptive Filtering Based on the Half-Quadratic Criterion: Performance Analysis and Applications., , , и . IEEE Trans. Instrum. Meas., (2023)A New Efficient Algorithm for Secure Outsourcing of Modular Exponentiations., , и . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 103-A (1): 221-224 (2020)Model checking QCTL plus on quantum Markov chains., , , и . Theor. Comput. Sci., (2022)