Author of the publication

Image Inpainting Detection Based on a Modified Formulation of Canonical Correlation Analysis.

, , , and . MMSP, page 1-5. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A light-weight scalable truthful routing protocol in MANETs with selfish nodes., and . IJAHUC, 4 (3/4): 210-222 (2009)LSTOP: A Light-Weight Scalable Truthful Routing Protocol in MANETs with Selfish Nodes., and . ADHOC-NOW, volume 4104 of Lecture Notes in Computer Science, page 280-293. Springer, (2006)A Secure Position-Based Protocol Framework for Multi-hop Ad-Hoc Networks., , and . WiMob, page 55. IEEE Computer Society, (2007)Quantitative Method for Network Security Situation Based on Attack Prediction., , , and . Security and Communication Networks, (2017)Truthful multipath routing for ad hoc networks with selfish nodes., , and . J. Parallel Distrib. Comput., 68 (6): 778-789 (2008)On supporting high-throughput routing metrics in on-demand routing protocols for multi-hop wireless networks., , and . J. Parallel Distrib. Comput., 67 (10): 1108-1118 (2007)Sparsity-Based Image Inpainting Detection via Canonical Correlation Analysis With Low-Rank Constraints., , , , , and . IEEE Access, (2018)Image Inpainting Detection Based on a Modified Formulation of Canonical Correlation Analysis., , , and . MMSP, page 1-5. IEEE, (2018)A Truthful Geographic Forwarding Algorithm for Ad-hoc Networks with Selfish Nodes., , and . I. J. Network Security, 5 (3): 252-263 (2007)Evaluation of trunk borer infestation duration using MOS E-nose combined with different feature extraction methods and GS-SVM., , , , and . Comput. Electron. Agric., (2020)