Author of the publication

Reversible Data Hiding for JPEG Images Based on Multiple Two-Dimensional Histograms.

, , and . IEEE Signal Process. Lett., (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Migration Law of Heavy Metals in Coal Gangue - Soil System in Mining Reclamation Area., , , and . CSISE (3), volume 106 of Advances in Intelligent and Soft Computing, page 675-678. Springer, (2011)Soil Environmental Quality Analysis and Evaluation of Coal Mine Reclamation Area., , and . CSISE (3), volume 106 of Advances in Intelligent and Soft Computing, page 701-704. Springer, (2011)An axiomatic characterization of adaptive-liquidity market makers., and . EC, page 657-674. ACM, (2013)Study on module control of low-speed PEMS train., , , and . MFI, page 1-6. IEEE, (2014)GeniePath: Graph Neural Networks with Adaptive Receptive Paths., , , , , and . CoRR, (2018)POSTER: Neural Network-based Graph Embedding for Malicious Accounts Detection., , , , , , and . CCS, page 2543-2545. ACM, (2017)POSTER: A PU Learning based System for Potential Malicious URL Detection., , , , , , and . CCS, page 2599-2601. ACM, (2017)aDMSCN: A Novel Perspective for User Intent Prediction in Customer Service Bots., , , , , , , , , and . CIKM, page 2853-2860. ACM, (2020)Site Selection of New PM2.5 Mobile Monitoring Station Based on Ordinary Kriging Interpolation., , , and . Geoinformatics, page 1-5. IEEE, (2022)Research on Offense and Defense of DDos Based on Evolutionary Game Theory., , , , , and . ICAIS (3), volume 13340 of Lecture Notes in Computer Science, page 3-15. Springer, (2022)