From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Analyzing the Performance of Dither Modulation in Presence of Composite Attacks.. ICICS, том 7043 из Lecture Notes in Computer Science, стр. 297-305. Springer, (2011)Performance Analysis of Dither Modulation against Composite Attacks., и . J. Inf. Hiding Multim. Signal Process., 3 (2): 164-175 (2012)A Deep Learning Framework of Quantized Compressed Sensing for Wireless Neural Recording., , , и . IEEE Access, (2016)Better Use of Human Visual Model in Watermarking Based on Linear Prediction Synthesis Filter., и . IWDW, том 3304 из Lecture Notes in Computer Science, стр. 66-76. Springer, (2004)Asymptotic Critical Transmission Radii in Wireless Networks over a Convex Region., , и . CoRR, (2022)A transformer-CNN for deep image inpainting forensics., , , , и . Vis. Comput., 39 (10): 4721-4735 (октября 2023)A Novel Multibit Watermarking Scheme Combining Spread Spectrum and Quantization., , и . IWDW, том 4283 из Lecture Notes in Computer Science, стр. 111-122. Springer, (2006)Calculating the response time based on action flow in Stochastic Process Algebra models., , и . SMC, стр. 3618-3623. IEEE, (2016)Image-Adaptive Spread Transform Dither Modulation Using Human Visual Model.. CIS, том 4456 из Lecture Notes in Computer Science, стр. 913-923. Springer, (2006)A Note on the k-NN Density Estimate., и . IDEAL, том 9937 из Lecture Notes in Computer Science, стр. 79-88. Springer, (2016)