Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An analytical approach to real-time misbehavior detection in IEEE 802.11 based wireless networks., , and . INFOCOM, page 1638-1646. IEEE, (2011)A New Restoration Algorithm for Single Image Defogging., , and . CCPR (2), volume 484 of Communications in Computer and Information Science, page 169-178. Springer, (2014)Data Fusion with Different Accuracy., , and . ROBIO, page 811-815. IEEE, (2004)An objective assessment method for image defogging effects., , and . IJAACS, 8 (2/3): 180-199 (2015)Blind channel estimation in aperiodic time-hopping ultra-wideband communications., and . IEEE Trans. Signal Processing, 54 (6-1): 2333-2346 (2006)Data detection for UWB transmitted reference systems with inter-pulse interference., , and . ICASSP (3), page 601-604. IEEE, (2005)High capacity reversible steganography in encrypted images based on feature mining in plaintext domain., , , and . IJES, 8 (2/3): 249-257 (2016)Gesture recognition of traffic police based on static and dynamic descriptor fusion., , and . Multimedia Tools Appl., 76 (6): 8915-8936 (2017)Reversible data hiding in encrypted AMBTC images., , , , and . Multimedia Tools Appl., 77 (14): 18067-18083 (2018)Saliency detection via multi-view graph based saliency optimization., , , , , and . Neurocomputing, (2019)