Author of the publication

Hiding cipher-images generated by 2-D compressive sensing with a multi-embedding strategy.

, , , , and . Signal Process., (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Construction of Rate-Compatible Raptor-Like QC-LDPC Code for Enhanced IDMA in 5G and Beyond., and . ISTC, page 1-5. IEEE, (2018)InFIP: An Explainable DNN Intellectual Property Protection Method based on Intrinsic Features., , , , , and . CoRR, (2022)Adaptive 3D Mesh Steganography Based on Feature-Preserving Distortion., , , , and . CoRR, (2022)Hierarchical Invariance for Robust and Interpretable Vision Tasks at Larger Scales., , , , , and . CoRR, (2024)A Principled Design of Image Representation: Towards Forensic Tasks., , , , and . CoRR, (2022)Turn Passive to Active: A Survey on Active Intellectual Property Protection of Deep Learning Models., , , and . CoRR, (2023)Performance Analysis of Practical QC-LDPC Codes: From DVB-S2 to ATSC 3.0., , , and . IEEE Trans. Broadcast., 65 (1): 172-178 (2019)4DPM: Deepfake Detection With a Denoising Diffusion Probabilistic Mask., , , , and . IEEE Signal Process. Lett., (2024)FingerChain: Copyrighted Multi-Owner Media Sharing by Introducing Asymmetric Fingerprinting Into Blockchain., , , , and . IEEE Trans. Netw. Serv. Manag., 20 (3): 2869-2885 (September 2023)Anomaly detection of aircraft lead-acid battery., , , and . Qual. Reliab. Eng. Int., 37 (3): 1186-1197 (2021)