Author of the publication

Behavior Steganography in Social Network via Secret Sharing.

, , , , and . ICAIS (3), volume 13340 of Lecture Notes in Computer Science, page 299-308. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Image Super-Resolution based on multi-pairs of dictionaries via Patch Prior Guided Clustering., , , , , , and . IPTA, page 1-6. IEEE, (2018)A New Deception Jamming Signal Detection Technique Based on YOLOv7., , , and . ICCT, page 1444-1449. IEEE, (2023)A New Pulse Modulated LFM Waveform Design Method for Suppressing Interrupted Sampling Repeater Jamming., , , and . ICCT, page 336-340. IEEE, (2023)Super-resolution image reconstruction via patch haar wavelet feature extraction combined with sparse coding., , , and . ICIA, page 770-775. IEEE, (2015)Sub-Array-Based Millimeter Wave Massive MIMO Channel Estimation., , and . IEEE Wirel. Commun. Lett., 12 (9): 1608-1612 (September 2023)Quantitatively analyzing the driving factors of vegetation change in China: Climate change and human activities., , , , , , , and . Ecol. Informatics, (2024)Fusion of Sentinel-2 and PlanetScope time-series data into daily 3 m surface reflectance and wheat LAI monitoring., , , , , , , and . Int. J. Appl. Earth Obs. Geoinformation, (2021)Diversity, Density, and Homogeneity: Quantitative Characteristic Metrics for Text Collections., , , and . LREC, page 1739-1746. European Language Resources Association, (2020)Behavior Steganography in Social Network via Secret Sharing., , , , and . ICAIS (3), volume 13340 of Lecture Notes in Computer Science, page 299-308. Springer, (2022)DoBMark: A double-branch network for screen-shooting resilient image watermarking., , , , and . Expert Syst. Appl., (2024)