Author of the publication

Coverless Information Hiding Based on WGAN-GP Model.

, , , , , and . Int. J. Digit. Crime Forensics, 13 (4): 57-70 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

File Fragment Classification Using Grayscale Image Conversion and Deep Learning in Digital Forensics., , , , , , , , , and 2 other author(s). IEEE Symposium on Security and Privacy Workshops, page 140-147. IEEE Computer Society, (2018)Outsourcing Hierarchical Threshold Secret Sharing Scheme Based on Reputation., , , , and . Secur. Commun. Networks, (2019)Rational Multi-Secret Sharing Scheme in Standard Point-to-Point Communication Networks., and . Int. J. Found. Comput. Sci., 24 (6): 879-898 (2013)DIGDH: A Novel Framework of Difference Image Grafting Deep Hiding for Image Data Hiding., , , , , and . Symmetry, 14 (1): 151 (2022)Practical multi-party private collaborative k-means clustering., , , , , and . Neurocomputing, (2022)Automatic Grading of Student Code with Similarity Measurement., , and . ECML/PKDD (6), volume 13718 of Lecture Notes in Computer Science, page 286-301. Springer, (2022)Covid-19 Related Topic Detection in Catering Industry with Online Review and Embedding., , , and . BCD, page 60-65. IEEE, (2021)An Intelligent Scheduling System for Large-Scale Online Judging., , and . ICCSE (1), volume 2023 of Communications in Computer and Information Science, page 265-279. Springer, (2023)Efficient Multi-Party Private Set Intersection Against Malicious Adversaries., , , , and . CCSW, page 93-104. ACM, (2019)MLadder: An Online Training System for Machine Learning and Data Science Education., , , , , and . CIKM, page 4862-4866. ACM, (2022)