Author of the publication

Hiding cipher-images generated by 2-D compressive sensing with a multi-embedding strategy.

, , , , and . Signal Process., (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An image encryption algorithm based on chaotic system and compressive sensing., , , , and . Signal Process., (2018)Research on Multitarget Recognition and Detection Based on Computer Vision., and . J. Sensors, (2022)Voltage Driven Nondestructive Self-Reference Sensing Scheme of Spin-Transfer Torque Memory., , , and . IEEE Trans. Very Large Scale Integr. Syst., 20 (11): 2020-2030 (2012)Reliability-aware energy minimization for real-time embedded systems with window-constraints., , and . SIGBED Rev., 10 (2): 26 (2013)Stable and Causal Inference for Discriminative Self-supervised Deep Visual Representations., , and . ICCV, page 16063-16074. IEEE, (2023)Editorial Special Issue for 50th Birthday of Memristor Theory and Application of Neuromorphic Computing Based on Memristor - Part I., , , and . IEEE Trans. Circuits Syst. I Regul. Pap., 68 (11): 4417-4418 (2021)Memristive LSTM Network for Sentiment Analysis., , , , , , and . IEEE Trans. Syst. Man Cybern. Syst., 51 (3): 1794-1804 (2021)Neural Predictor for Neural Architecture Search., , , , , and . CoRR, (2019)Snooping Attacks on Deep Reinforcement Learning., , and . CoRR, (2019)Common-source-line array: An area efficient memory architecture for bipolar nonvolatile devices., , , , and . ACM Trans. Design Autom. Electr. Syst., 18 (4): 57:1-57:18 (2013)