Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DMML: A Design Thinking Process Modeling Language., , and . CAD/Graphics, page 44-48. IEEE Computer Society, (2011)Parallel Long Messages Encryption Scheme Based on Certificateless Cryptosystem for Big Data., , , and . Inscrypt, volume 10726 of Lecture Notes in Computer Science, page 211-222. Springer, (2017)A Novel Information Hiding Algorithm Based on Grey Relational Analysis for H.264/AVC., , , and . INCoS, page 365-369. IEEE, (2015)Reversible Data Hiding for Encrypted Image Based on Interpolation Error Expansion., , , and . IJMCMC, 9 (4): 76-96 (2018)Generative Steganography with Kerckhoffs' Principle based on Generative Adversarial Networks., , , and . CoRR, (2017)Encrypted Image-Based Reversible Data Hiding with Public Key Cryptography from Interpolation-Error Expansion., , , , and . EIDWT, volume 6 of Lecture Notes on Data Engineering and Communications Technologies, page 138-149. Springer, (2017)Generative Steganography by Sampling., , , , , , and . IEEE Access, (2019)Cryptanalysis of a Fuzzy Identity Based Encryption Scheme in the Standard Model., , , and . Informatica, Lith. Acad. Sci., 23 (2): 299-314 (2012)IB-VPRE: adaptively secure identity-based proxy re-encryption scheme from LWE with re-encryption verifiability., , , and . J. Ambient Intell. Humaniz. Comput., 13 (1): 469-482 (2022)Recent Advances of Image Steganography with Generative Adversarial Networks., , , , , , , and . CoRR, (2019)