Author of the publication

Deep Learning on Spatial Rich Model for Steganalysis.

, , , , and . IWDW, volume 10082 of Lecture Notes in Computer Science, page 564-577. (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Software Process for Modeling Complex Systems with UML-RT., and . TASE, page 401-410. IEEE Computer Society, (2007)Steganography algorithms recognition based on match image and deep features verification., , , and . Multimedia Tools Appl., 77 (21): 27955-27979 (2018)Dynamic memory paravirtualization transparent to guest OS., , , , , , , and . SCIENCE CHINA Information Sciences, 53 (1): 77-88 (2010)Steganalysis Based on Difference Image., , , and . IWDW, volume 5450 of Lecture Notes in Computer Science, page 184-198. Springer, (2008)Fast Live Cloning of Virtual Machine Based on Xen., , , , , , and . HPCC, page 392-399. IEEE, (2009)Suggestions on Pattern Transformation in UML-RT., and . ICSEA, page 17. IEEE Computer Society, (2007)Deep Learning on Spatial Rich Model for Steganalysis., , , , and . IWDW, volume 10082 of Lecture Notes in Computer Science, page 564-577. (2016)Improving the program performance through prioritized memory management and disk operation., , and . Concurrency and Computation: Practice and Experience, 27 (13): 3345-3361 (2015)Enabling Prioritized Cloud I/O Service in Hadoop Distributed File System., and . HPCC/CSS/ICESS, page 256-259. IEEE, (2014)SIDE: Isolated and efficient execution of unmodified device drivers., and . DSN, page 1-12. IEEE Computer Society, (2013)