Author of the publication

Visually semantic-preserving and people-oriented color image encryption based on cross-plane thumbnail preservation.

, , , , , and . Expert Syst. Appl., (December 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hybrid Multilevel Converter: Capacitor Voltage Balancing Limits and its Extension., , , , and . IEEE Trans. Ind. Informatics, 9 (4): 2063-2073 (2013)A Generation Method of Network Security Hardening Strategy Based on Attack Graphs., , , , and . Int. J. Web Serv. Res., 12 (1): 45-61 (2015)A Continuous-Time Algorithm for Distributed Optimization Based on Multiagent Networks., , , , and . IEEE Trans. Syst. Man Cybern. Syst., 49 (12): 2700-2709 (2019)Energy Management and Cross Layer Optimization for Wireless Sensor Network Powered by Heterogeneous Energy Sources., , , and . IEEE Trans. Wirel. Commun., 14 (5): 2814-2826 (2015)Exploiting the Security Aspects of Compressive Sampling., , , , and . Secur. Commun. Networks, (2018)On Construction of Rate-Compatible Raptor-Like QC-LDPC Code for Enhanced IDMA in 5G and Beyond., and . ISTC, page 1-5. IEEE, (2018)The adaptive complex shock diffusion for seismic random noise attenuation., and . GlobalSIP, page 333-337. IEEE, (2017)FingerChain: Copyrighted Multi-Owner Media Sharing by Introducing Asymmetric Fingerprinting Into Blockchain., , , , and . IEEE Trans. Netw. Serv. Manag., 20 (3): 2869-2885 (September 2023)DCIV: Decentralized cross-chain data integrity verification with blockchain., , , , , and . J. King Saud Univ. Comput. Inf. Sci., 34 (10 Part A): 7988-7999 (2022)Turn Passive to Active: A Survey on Active Intellectual Property Protection of Deep Learning Models., , , and . CoRR, (2023)