Author of the publication

Underwater image enhancement method based on entropy weight fusion.

, , , , and . Comput. Animat. Virtual Worlds, (March 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Subfield Attacks on HSVP in Ideal Lattices., , , and . Inscrypt, volume 13837 of Lecture Notes in Computer Science, page 447-462. Springer, (2022)Leveled Strongly-Unforgeable Identity-Based Fully Homomorphic Signatures., , , and . ISC, volume 9290 of Lecture Notes in Computer Science, page 42-60. Springer, (2015)Deterministic Encoding into Twisted Edwards Curves., , , , and . ACISP (2), volume 9723 of Lecture Notes in Computer Science, page 285-297. Springer, (2016)Verifiable Decryption for Fully Homomorphic Encryption., and . ISC, volume 11060 of Lecture Notes in Computer Science, page 347-365. Springer, (2018)Learning Adaptive Fusion Bank for Multi-Modal Salient Object Detection., , , , and . IEEE Trans. Circuits Syst. Video Technol., 34 (8): 7344-7358 (August 2024)Convolutional long-short term memory network for space debris detection and tracking., , , , and . Knowl. Based Syst., (2024)Bidirectional Alternating Fusion Network for RGB-T Salient Object Detection., , , , , and . PRCV (8), volume 15038 of Lecture Notes in Computer Science, page 34-48. Springer, (2024)OBC-YOLOv8: an improved road damage detection model based on YOLOv8., , , , and . PeerJ Comput. Sci., (2025)Circuit Bootstrapping: Faster and Smaller., , , , , , and . EUROCRYPT (2), volume 14652 of Lecture Notes in Computer Science, page 342-372. Springer, (2024)Revisiting Key Switching Techniques with Applications to Light-Key FHE., , , , , and . ICISC (1), volume 14561 of Lecture Notes in Computer Science, page 41-64. Springer, (2023)