Author of the publication

Seek-and-Hide: Adversarial Steganography via Deep Reinforcement Learning.

, , , , and . IEEE Trans. Pattern Anal. Mach. Intell., 44 (11): 7871-7884 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Research on Some Phenomenon of E-Government Service Capacity Distribution in Mainland China Based on Multi-channel Perspective., , , , and . PACIS, page 252. (2018)Combining a continuous location model and Heuristic techniques to determine oilfield warehouse locations under future oil well location uncertainty., , , , and . Soft Comput., 22 (3): 823-837 (2018)A scheduling and planning method for geological disasters., , , , , and . Appl. Soft Comput., (2021)Conceptualizing and examining E-government service capability: A Review and empirical study., , and . J. Assoc. Inf. Sci. Technol., 64 (11): 2379-2395 (2013)Collaboration by Competition: Self-coordinated Knowledge Amalgamation for Multi-talent Student Learning., , , , , and . ECCV (6), volume 12351 of Lecture Notes in Computer Science, page 631-646. Springer, (2020)TAVT: Towards Transferable Audio-Visual Text Generation., , , , , , and . ACL (1), page 14983-14999. Association for Computational Linguistics, (2023)Towards Fast and High-Quality Sign Language Production., , , and . ACM Multimedia, page 3172-3181. ACM, (2021)The Influencing Path of Public Engaging Intention in the Value Co-Creation of E-Gov Services:An Empirical Investigation., , , , and . PACIS, page 65. (2018)A hierarchical model of e-government service capability: An empirical analysis., , , and . Gov. Inf. Q., 29 (4): 564-572 (2012)A mathematical method for solving multi-depot vehicle routing problem., , , , and . Soft Comput., 27 (21): 15699-15717 (November 2023)