From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Noninteractive pairwise key establishment for sensor networks., , и . IEEE Trans. Inf. Forensics Secur., 5 (3): 556-569 (2010)QISTA-Net: DNN Architecture to Solve $\ell_Q$-Norm Minimization Problem., и . MLSP, стр. 1-6. IEEE, (2020)Fast compressive sensing of high-dimensional signals with tree-structure sparsity pattern., и . ChinaSIP, стр. 738-742. IEEE, (2014)Privacy-preserving data collection and recovery of compressive sensing., , и . ChinaSIP, стр. 473-477. IEEE, (2015)Near-perfect cover image recovery anti-multiple watermark embedding approaches., и . ISCAS (6), стр. 5517-5520. IEEE, (2005)Shape from texture: estimation of planar surface orientation through the ridge surfaces of continuous wavelet transform., , и . IEEE Trans. Image Process., 7 (5): 773-780 (1998)Robust Image Deepfake Detection with Perceptual Hashing., и . ICISSP, стр. 374-378. SCITEPRESS, (2024)Media Hash-dependent Image Watermarking Resilent Against Both Geometric Attacks and Estimation Attacks Based on Fals Positive-Oriented Detection., , , и . ICDAT, стр. 155-174. (2005)Constraint-optimized keypoint inhibition/insertion attack: security threat to scale-space image feature extraction., и . ACM Multimedia, стр. 629-638. ACM, (2012)Highly Robust Image Watermarking Using Complementary Modulations., , , и . ISW, том 1729 из Lecture Notes in Computer Science, стр. 136-153. Springer, (1999)