Author of the publication

HDR video quality assessment: Perceptual evaluation of compressed HDR video.

, , , , , , and . J. Vis. Commun. Image Represent., (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DDHCS: Distributed Denial-of-service Threat to YARN Clusters based on Health Check Service., , , , and . ICISSP, page 146-156. SciTePress, (2016)Whispers in the Cloud - A Covert Channel using the Result of Creating a Virtual Machine., , , , and . ICISSP, page 380-387. SciTePress, (2016)Trusted Isolation Environment: An Attestation Architecture with Usage Control Model., , , , , , and . ICICS, volume 5927 of Lecture Notes in Computer Science, page 226-240. Springer, (2009)HDR video quality assessment: Perceptual evaluation of compressed HDR video., , , , , , and . J. Vis. Commun. Image Represent., (2018)The Research and Implementation of the Fine-Grained Implicit Authentication Framework for Android., and . GSKI (2), volume 849 of Communications in Computer and Information Science, page 641-649. Springer, (2017)Statically Defend Network Consumption Against Acker Failure Vulnerability in Storm., , , , and . ICICS, volume 10631 of Lecture Notes in Computer Science, page 661-673. Springer, (2017)Multi-Instance Multi-Label Learning For Automatic Tag Recommendation., , , and . SMC, page 4910-4914. IEEE, (2009)Identifying the Motives of Using Weibo from Digital Traces., , , , , and . NLPIR, page 169-172. ACM, (2020)Improving BitTorrent Network's Performance via Deploying Helpers., , and . EUC (2), page 507-512. IEEE Computer Society, (2008)978-0-7695-3492-3.An Automated Mechanism of Security Test on Network Protocols., , , and . IAS, page 503-506. IEEE Computer Society, (2009)