Author of the publication

A New Blind Attack Procedure for DCT-Based Image Encryption with Spectrum Learning.

, and . Int. J. Image Graph., 7 (3): 481-496 (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

3-D target height extraction via high squint airborne SAR., and . IGARSS, page 6661-6664. IEEE, (2016)A speed-up seed point otsu method for ship detection in various scenarios., , , , and . IGARSS, page 6421-6424. IEEE, (2016)Flow Guided Siamese Network for Visual Tracking., , , and . ICIP, page 231-235. IEEE, (2018)Robust Anomaly Detection via Fusion of Appearance and Motion Features., , , , and . VCIP, page 1-4. IEEE, (2018)Object and patch based anomaly detection and localization in crowded scenes., , , and . Multimedia Tools Appl., 78 (15): 21375-21390 (2019)A New Type of Two-dimensional Anti-counterfeit Code for Document Authentication Using Neural Networks., , , and . ICCSP, page 68-73. ACM, (2020)Sub-channel and Power Allocation for Multiuser OFDM Systems with Proportional Rate Constraints Based on Genetic Algorithms., , and . ICoC, volume 401 of Communications in Computer and Information Science, page 31-39. Springer, (2013)Fuzzy Keyword Search over Encrypted Cloud Data with Dynamic Fine-grained Access Control., , , , and . TrustCom, page 1340-1347. IEEE, (2022)High precision rotation angle estimation for rotated images., , and . ICME Workshops, page 1-4. IEEE Computer Society, (2013)Pyramid Sub-Region Sensitive Network for Object Detection., , , and . ICIP, page 1303-1307. IEEE, (2018)