Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Attribute-Based Encryption with Efficient Keyword Search and User Revocation., , , and . Inscrypt, volume 11449 of Lecture Notes in Computer Science, page 490-509. Springer, (2018)User Travelling Pattern Prediction via Indistinct Cellular Data Mining., , , , , , and . UIC/ATC, page 17-24. IEEE Computer Society, (2013)MLRP-KG: Mine Landslide Risk Prediction Based on Knowledge Graph., , , , and . IEEE Trans. Artif. Intell., 3 (1): 78-87 (2022)Location-Aware Routing Protocol for Underwater Sensor Networks., , , , and . EMC/HumanCom, volume 260 of Lecture Notes in Electrical Engineering, page 609-617. Springer, (2013)Performance study on block-based image steganalysis., , , and . ISCAS, page 2649-2652. IEEE, (2011)Human Ageing Genomic Resources: new and updated databases., , , , , , , , , and 2 other author(s). Nucleic Acids Research, 46 (Database-Issue): D1083-D1090 (2018)Multistimuli-Responsive Insect-Scale Soft Robotics Based on Anisotropic Super-Aligned VO 2 Nanowire/Carbon Nanotube Bimorph Actuators., , , , , , , , , and 2 other author(s). Adv. Intell. Syst., 2 (8): 2000051 (2020)Understanding benford's law and its vulnerability in image forensics., , , and . ICME, page 1568-1571. IEEE, (2009)A Video Watermarking Based on 3-D Complex Wavelet., , and . ICIP (5), page 493-496. IEEE, (2007)Block-based image steganalysis: Algorithm and performance evaluation., , , and . ISCAS, page 1679-1682. IEEE, (2010)