261 results on '"Chunfang, Yang"'
Search Results
2. 4SCIG: A Four-Branch Framework to Reduce the Interference of Sky Area in Cross-View Image Geo-Localization.
3. Digital watermarking method based on context word prediction and window compression coding
4. SEGCN: a subgraph encoding based graph convolutional network model for social bot detection
5. MTD-RTPE: A Malicious Traffic Detection Method Based on Relative Time-Delay Positional Encoding.
6. Privacy-Preserving Image Scaling Using Bicubic Interpolation and Homomorphic Encryption.
7. Digital economy empowers sustainable agriculture: Implications for farmers’ adoption of ecological agricultural technologies
8. AENet: attention efficient network for cross-view image geo-localization
9. PNG-Stega: Progressive Non-Autoregressive Generative Linguistic Steganography.
10. ENTREPRENEURIAL OPPORTUNITY, VALUE EVOLUTION, AND ORGANIZATIONAL INTEGRATION OF PROFESSIONAL FARMER ENTREPRENEURSHIP: A MULTI-CASE COMPARISON IN CHINA
11. Transcriptomic Analysis of Sodium-Silicate-Induced Resistance against Rhizoctonia solani AG-3 in Potato
12. An Improved Purdue Enterprise Reference Architecture to Enhance Cybersecurity.
13. Linguistic steganalysis via multi-task with crossing generative-natural domain.
14. HSTW: A robust network flow watermarking method based on hybrid packet sequence-timing.
15. Corrigendum to 'Apigenin inhibits STAT3/CD36 signaling axis and reduces visceral obesity' [Pharmacol. Res. (2020) 152 104586]
16. Biochemical and structural insights of multifunctional flavin-dependent monooxygenase FlsO1-catalyzed unexpected xanthone formation
17. Flavin-enabled reductive and oxidative epoxide ring opening reactions
18. Extracting embedded messages using adaptive steganography based on optimal syndrome-trellis decoding paths
19. Robust JPEG steganography based on DCT and SVD in nonsubsampled shearlet transform domain.
20. Inverse Interpolation and Its Application in Robust Image Steganography.
21. Video steganography algorithm based on the relative relationship between DWT coefficients.
22. Steganalysis of Adaptive Steganography Under the Known Cover Image.
23. On the Sharing-Based Model of Steganography.
24. Feature Selection of the Rich Model Based on the Correlation of Feature Components.
25. PRUDA: A Novel Measurement Attribute Set towards Robust Steganography in Social Networks.
26. Double umbilical artery converging into a single umbilical artery: A case report.
27. JPEG image steganography payload location based on optimal estimation of cover co-frequency sub-image
28. Stego key recovery method for F5 steganography with matrix encoding
29. Characterization and Identification of a New Daidzein Reductase Involved in (S)-Equol Biosynthesis in Clostridium sp. ZJ6
30. Enhanced branch obfuscation based on exception handling and encrypted mapping table.
31. A Security-Sensitive Function Mining Framework for Source Code.
32. Steganalysis of homogeneous-representation based steganography for high dynamic range images.
33. Locating secret messages based on quantitative steganalysis
34. Optimization of rich model based on fisher criterion for image steganalysis.
35. Steganalysis aided by fragile detection of image manipulations.
36. Steganalysis of Content-Adaptive Steganography Based on Massive Datasets Pre-Classification and Feature Selection.
37. Color image steganalysis based on embedding change probabilities in differential channels
38. HeteroTiC: A robust network flow watermarking based on heterogeneous time channels.
39. Molecular basis of dimer formation during the biosynthesis of benzofluorene-containing atypical angucyclines
40. Steganalysis Feature Subspace Selection Based on Fisher Criterion.
41. Reliable steganalysis of HUGO steganography based on partially known plaintext.
42. A linguistic steganography based on word indexing compression and candidate selection.
43. Dither modulation based adaptive steganography resisting jpeg compression and statistic detection.
44. A Word-Embedding-Based Steganalysis Method for Linguistic Steganography via Synonym Substitution.
45. Blind forensics of image gamma transformation and its application in splicing detection.
46. Parameter estimation of image gamma transformation based on zero-value histogram bin locations.
47. Payload location for JPEG image steganography based on co-frequency sub-image filtering.
48. Color image steganalysis based on channel gradient correlation
49. Improving side-informed JPEG steganography using two-dimensional decomposition embedding method.
50. Joint JPEG compression and detection resistant performance enhancement for adaptive steganography using feature regions selection.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.