Author of the publication

From Rank Estimation to Rank Approximation: Rank Residual Constraint for Image Restoration.

, , , , , and . IEEE Trans. Image Process., (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Successive refinement based Wyner-Ziv video compression., , , , and . Signal Process. Image Commun., 25 (1): 47-63 (2010)Halftone image watermarking via optimization., , , , and . Signal Process. Image Commun., (2016)Ciphertext-Only Attack on an Image Homomorphic Encryption Scheme with Small Ciphertext Expansion., , and . ACM Multimedia, page 1063-1066. ACM, (2015)On reachability graphs of Petri nets., , and . Comput. Electr. Eng., 29 (2): 263-272 (2003)Image Reconstruction from Local Descriptors Using Conditional Adversarial Networks., , and . APSIPA, page 1773-1779. IEEE, (2019)Privacy-Preserving distributed deep learning based on secret sharing., , and . Inf. Sci., (2020)Bi-level Protected Compressive Sampling., , , and . IEEE Trans. Multim., 18 (9): 1720-1732 (2016)Social Network Analytic-Based Online Counterfeit Seller Detection using User Shared Images., , , and . ACM Trans. Multim. Comput. Commun. Appl., 19 (1): 23:1-23:18 (January 2023)Toward Visual Behavior and Attention Understanding for Augmented 360 Degree Videos., , , , , , , and . ACM Trans. Multim. Comput. Commun. Appl., 19 (2s): 99:1-99:24 (2023)Improved known-plaintext attack to permutation-only multimedia ciphers., , , , , and . Inf. Sci., (2018)