From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Knowledge Tracing Model with Learning and Forgetting Behavior., , , , , и . CIKM, стр. 3863-3867. ACM, (2022)KG4Ex: An Explainable Knowledge Graph-Based Approach for Exercise Recommendation., , , , , , и . CIKM, стр. 597-607. ACM, (2023)Enhancing Image Steganography Via Stego Generation And Selection., , , и . ICASSP, стр. 2695-2699. IEEE, (2021)Adversarial Steganography Embedding via Stego Generation and Selection., , , , и . IEEE Trans. Dependable Secur. Comput., 20 (3): 2375-2389 (мая 2023)Detection of Quantization Artifacts and Its Applications to Transform Encoder Identification., , и . IEEE Trans. Inf. Forensics Secur., 5 (4): 810-815 (2010)SDGAN: Disentangling Semantic Manipulation for Facial Attribute Editing., , , и . AAAI, стр. 2374-2381. AAAI Press, (2024)Fast and Effective Global Covariance Pooling Network for Image Steganalysis., , , и . IH&MMSec, стр. 230-234. ACM, (2019)Generalized Linear Integer Numeric Planning., , , , , и . ICAPS, стр. 241-251. AAAI Press, (2022)Fake Faces Identification via Convolutional Neural Network., , и . IH&MMSec, стр. 43-47. ACM, (2018)Keyword Spotting in the Homomorphic Encrypted Domain Using Convolution Decomposition., , и . TrustCom, стр. 1592-1597. IEEE, (2023)