Author of the publication

Multitiered Reversible Data Privacy Protection Scheme for IoT Based on Compression Sensing and Digital Watermarking.

, , , , , and . IEEE Internet Things J., 11 (7): 11524-11539 (April 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Chaotic Ant Swarm., , , and . ICNC (3), page 446-450. IEEE Computer Society, (2007)A secure and efficient mutual authentication scheme for session initiation protocol., , , and . Peer-to-Peer Netw. Appl., 9 (2): 449-459 (2016)Finite-Time Lag Synchronization of Memristive Neural Networks With Multi-Links via Adaptive Control., , , , and . IEEE Access, (2020)Adaptive synchronization of memristor-based BAM neural networks with mixed delays., , , and . Appl. Math. Comput., (2018)Fishers Harvest Parallel Unlearning in Inherited Model Networks., , , , , , , and . CoRR, (2024)An Efficient Image Privacy Preservation Scheme for Smart City Applications Using Compressive Sensing and Multi-Level Encryption., , , and . IEEE Trans. Intell. Transp. Syst., 25 (10): 14958-14972 (October 2024)Finite-time synchronization of memristor-based neural networks with mixed delays., , , , and . Neurocomputing, (2017)Parameters identification of chaotic systems via chaotic ant swarm, , , and . Chaos, Solitons & Fractals, 28 (5): 1204--1211 (June 2006)Improving Chaotic Ant Swarm Performance with Three Strategies., , and . ICSI (1), volume 7928 of Lecture Notes in Computer Science, page 268-277. Springer, (2013)Intrusion Detection Method Based on Complementary Adversarial Generation Network., , and . ICSI (2), volume 13969 of Lecture Notes in Computer Science, page 260-271. Springer, (2023)