Author of the publication

A Robust and Adaptive Watermarking Technique for Relational Database.

, , , and . CNCERT, volume 1506 of Communications in Computer and Information Science, page 3-26. Springer, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CloudDLP: Transparent and Automatic Data Sanitization for Browser-Based Cloud Storage., , , , , and . ICCCN, page 1-8. IEEE, (2019)Find the 'Lost' Cursor: A Comparative Experiment of Visually Enhanced Cursor Techniques., and . ICIC (2), volume 10955 of Lecture Notes in Computer Science, page 85-92. Springer, (2018)Natural and Fluid 3D Operations with Multiple Input Channels of a Digital Pen., , and . ICIC (3), volume 10956 of Lecture Notes in Computer Science, page 585-598. Springer, (2018)Automatically Crawling Dynamic Web Applications via Proxy-Based JavaScript Injection and Runtime Analysis., , , and . DSC, page 242-249. IEEE, (2018)Deep Learning Based Scene Text Reading for Cloud Audit Information Extraction., , , , , and . DSC, page 686-693. IEEE, (2019)The Design of Fast Content-Defined Chunking for Data Deduplication Based Storage Systems., , , , , , , , and . IEEE Trans. Parallel Distributed Syst., 31 (9): 2017-2031 (2020)A Cloud Access Security Broker based approach for encrypted data search and sharing., , , , and . ICNC, page 422-426. IEEE Computer Society, (2017)A practical coverage algorithm for wireless sensor networks in real terrain surface., , and . Int. J. Wirel. Mob. Comput., 5 (4): 358-364 (2012)Improving Cache Partitioning Algorithms for Pseudo-LRU Policies., , , and . IEICE Trans. Inf. Syst., 96-D (12): 2514-2523 (2013)Sampled Data Debugging via Fuzzy C-Means., , , , and . DSC, page 32-39. IEEE, (2021)