Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Digital Right Management Model Based on Cryptography and Digital Watermarking., and . CSSE (3), page 656-660. IEEE Computer Society, (2008)978-0-7695-3336-0.Mesh Deformation Based on Preserving Distances and Angles., and . CSSE (2), page 1016-1019. IEEE Computer Society, (2008)978-0-7695-3336-0.Transmission over 9, 100 km with a capacity of 49.3 Tb/s using variable spectral efficiency 16 QAM based coded modulation., , , , , , , and . OFC, page 1-3. IEEE, (2014)Image Watermarking Capacity Analysis Using Hopfield Neural Network., and . PCM (3), volume 3333 of Lecture Notes in Computer Science, page 755-762. Springer, (2004)Recursive Constrained Maximum Versoria Criterion Algorithm for Adaptive Filtering., , , , and . ICONIP (7), volume 1961 of Communications in Computer and Information Science, page 433-445. Springer, (2023)Trust Evaluation Model of Social Internet of Things Based on Multi-relationships., , , , , and . NaNA, page 1-6. IEEE, (2022)An Active Defense Model and Framework of Insider Threats Detection and Sense., , , and . IAS, page 258-261. IEEE Computer Society, (2009)Power-efficient 100 Gb/s transmission over transoceanic distance using 8-dimensional coded modulation., , , , , , , , , and 1 other author(s). ECOC, page 1-3. IEEE, (2015)Early determination of intra mode and segment-wise DC coding for depth map based on hierarchical coding structure in 3D-HEVC., , , , and . APSIPA, page 374-378. IEEE, (2015)Multi-Agent Belief Merger and Interaction Based On BDI., , and . IITA, page 274-277. IEEE Computer Society, (2007)