Author of the publication

An interval centroid based spread spectrum watermarking scheme for multi-flow traceback.

, , and . J. Network and Computer Applications, 35 (1): 60-71 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

RIHT: A Novel Hybrid IP Traceback Scheme., and . IEEE Trans. Information Forensics and Security, 7 (2): 789-797 (2012)An Anonymous Car Rental System Based on NFC., , and . ISBAST, IEEE, (2013)Tracking and identifying a magnetic spheroid target using unscented particle filter., , , and . ICDIP, volume 8009 of SPIE Proceedings, page 800931. SPIE, (2011)Magnetic Field Extrapolation Based on Improved Back Propagation Neural Network., , , , and . AICI (1), volume 6319 of Lecture Notes in Computer Science, page 64-70. Springer, (2010)Knowledge-Based Simulation Experiment Data Integrative Analysis Technology., , , and . PADS, page 165-167. IEEE Computer Society, (2012)De-anonymizing and countermeasures in anonymous communication networks., , , , and . IEEE Communications Magazine, 53 (4): 60-66 (2015)Self Adaptive Application Level Fault Tolerance for Parallel and Distributed Computing., , , and . IPDPS, page 1-8. IEEE, (2007)A bi-subspace model for robust visual tracking., , and . ICIP, page 2660-2663. IEEE, (2008)Tracking Motion-Blurred Targets in Video., , , and . ICIP, page 2389-2392. IEEE, (2006)Violation of Clauser-Horne-Shimony-Holt inequality and teleportation enhanced for a class of two-qubit X-states resulting from entanglement swapping., , , , and . Quantum Information Processing, 14 (10): 3845-3855 (2015)