Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing., , , , , and . IEEE Trans. Information Forensics and Security, 11 (11): 2594-2608 (2016)A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data., , , and . IEEE Trans. Parallel Distrib. Syst., 27 (2): 340-352 (2016)Steganalysis of least significant bit matching using multi-order differences., , , and . Security and Communication Networks, 7 (8): 1283-1291 (2014)Interference of Heavy Aerosol Loading on the VIIRS Aerosol Optical Depth (AOD) Retrieval Algorithm., , , , , , and . Remote Sensing, 9 (4): 397 (2017)Speeding up the Dreyfus-Wagner algorithm for minimum Steiner trees., , and . Math. Meth. of OR, 66 (1): 117-125 (2007)A Novel Linguistic Steganography Based on Synonym Run-Length Encoding., , , and . IEICE Transactions, 100-D (2): 313-322 (2017)Multi-User Shared Access for Internet of Things., , , , , and . VTC Spring, page 1-5. IEEE, (2016)On full components for Rectilinear Steiner tree., and . CTW, page 85-88. University of Twente, (2007)Non-specific filtering of beta-distributed data., , , , and . BMC Bioinformatics, (2014)Dynamic Programming for Minimum Steiner Trees., , , , , and . Theory Comput. Syst., 41 (3): 493-500 (2007)