Author of the publication

A Danger Theory Inspired Multi-agent Fusion Model for Network Security Assessment.

, , and . ICNC (3), page 599-603. IEEE Computer Society, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adaptive JPEG steganography with new distortion function., , , and . Annales des Télécommunications, 69 (7-8): 431-440 (2014)Effective reversible data hiding in encrypted image with privacy protection for image content., and . J. Visual Communication and Image Representation, (2015)Efficient reversible data hiding in encrypted images., , , and . J. Visual Communication and Image Representation, 25 (2): 322-328 (2014)Efficient Steganographic Embedding by Exploiting Modification Direction., and . IEEE Communications Letters, 10 (11): 781-783 (2006)Efficient Data Hiding With Plus-Minus One or Two.. IEEE Signal Process. Lett., 17 (7): 635-638 (2010)Reversible Data Hiding in Encrypted Images Based on Image Interpolation., , , and . IJDCF, 6 (3): 16-29 (2014)Separable Reversible Data Hiding in Encrypted Image.. IEEE Trans. Information Forensics and Security, 7 (2): 826-832 (2012)Compressing Encrypted Image Using Compressive Sensing., , , and . IIH-MSP, page 222-225. IEEE Computer Society, (2011)Semi-fragile watermarking for image authentication based on compressive sensing., , , , , and . SCIENCE CHINA Information Sciences, 59 (5): 059104:1-059104:3 (2016)Lossless and Reversible Data Hiding in Encrypted Images With Public-Key Cryptography., , , and . IEEE Trans. Circuits Syst. Video Techn., 26 (9): 1622-1631 (2016)