From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Processing encrypted signals: a new frontier for multimedia security.. MM&Sec, стр. 1. ACM, (2006)Parallel Implementation of GC-Based MPC Protocols in the Semi-Honest Setting., , , , и . DPM/SETOP, том 8247 из Lecture Notes in Computer Science, стр. 66-82. Springer, (2013)Error resilient transmission of H.263 video for mobile communications., , , и . Eur. Trans. Telecommun., 12 (3): 181-187 (2001)Watermark Embedding and Recovery in the Presence of C-LPCD De-synchronization Attacks., , и . IWDW, том 5703 из Lecture Notes in Computer Science, стр. 54-68. Springer, (2009)Information Fusion in Distributed Sensor Networks with Byzantines, , , и . Springer, (2021)Wide Flat Minimum Watermarking for Robust Ownership Verification of GANs., , , и . CoRR, (2023)Image segmentation and region filling for virtual restoration of artworks., , , и . ICIP (1), стр. 562-565. IEEE, (2001)Discrete cosine transform of encrypted images., , и . ICIP, стр. 1668-1671. IEEE, (2008)A video forensic technique for detecting frame deletion and insertion., , , , и . ICASSP, стр. 6226-6230. IEEE, (2014)A data hiding approach for correcting errors in H.263 video transmitted over a noisy channel., , , и . MMSP, стр. 65-70. IEEE, (2001)