Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reversible Data Hiding in Encrypted Three-Dimensional Mesh Models., , , and . IEEE Trans. Multim., 20 (1): 55-67 (2018)M2SPL: Generative multiview features with adaptive meta-self-paced sampling for class-imbalance learning., , , and . Expert Syst. Appl., (2022)CAAD 2018: Iterative Ensemble Adversarial Attack., , and . CoRR, (2018)Language universal font watermarking with multiple cross-media robustness., , , , and . Signal Process., (2023)PointCAT: Contrastive Adversarial Training for Robust Point Cloud Recognition., , , , , , , and . CoRR, (2022)A Task Assignment Algorithm for Multiple Aerial Vehicles to Attack Targets With Dynamic Values., , , , , and . IEEE Trans. Intell. Transp. Syst., 14 (1): 236-248 (2013)Measuring the Consistency and Diversity of 3D Face Generation., , , , , , and . IEEE J. Sel. Top. Signal Process., 17 (6): 1208-1220 (November 2023)Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption., , , , and . IEEE Trans. Inf. Forensics Secur., 8 (3): 553-562 (2013)Minimum Rate Prediction and Optimized Histograms Modification for Reversible Data Hiding., , , and . IEEE Trans. Inf. Forensics Secur., 10 (3): 653-664 (2015)Towards optimal noise distribution for privacy preserving in data aggregation., , , and . Comput. Secur., (2014)