203 results on '"Chunfang Yang"'
Search Results
2. Digital watermarking method based on context word prediction and window compression coding
3. SEGCN: a subgraph encoding based graph convolutional network model for social bot detection
4. Transcriptomic Analysis of Sodium-Silicate-Induced Resistance against Rhizoctonia solani AG-3 in Potato
5. Digital economy empowers sustainable agriculture: Implications for farmers’ adoption of ecological agricultural technologies
6. AENet: attention efficient network for cross-view image geo-localization
7. Biochemical and structural insights of multifunctional flavin-dependent monooxygenase FlsO1-catalyzed unexpected xanthone formation
8. Corrigendum to 'Apigenin inhibits STAT3/CD36 signaling axis and reduces visceral obesity' [Pharmacol. Res. (2020) 152 104586]
9. Flavin-enabled reductive and oxidative epoxide ring opening reactions
10. Extracting embedded messages using adaptive steganography based on optimal syndrome-trellis decoding paths
11. JPEG image steganography payload location based on optimal estimation of cover co-frequency sub-image
12. Characterization and Identification of a New Daidzein Reductase Involved in (S)-Equol Biosynthesis in Clostridium sp. ZJ6
13. Stego key recovery method for F5 steganography with matrix encoding
14. Locating secret messages based on quantitative steganalysis
15. Steganalysis of Content-Adaptive Steganography Based on Massive Datasets Pre-Classification and Feature Selection
16. Color image steganalysis based on embedding change probabilities in differential channels
17. Payload location for JPEG image steganography based on co-frequency sub-image filtering
18. Molecular basis of dimer formation during the biosynthesis of benzofluorene-containing atypical angucyclines
19. A Word-Embedding-Based Steganalysis Method for Linguistic Steganography via Synonym Substitution
20. Color image steganalysis based on channel gradient correlation
21. Research on a Control Strategy of the Symmetrical Four-Roller Bending Process Based on Experiment and Numerical Simulation
22. Marine Bacterial Aromatic Polyketides From Host-Dependent Heterologous Expression and Fungal Mode of Cyclization
23. Discovery of Stealthin Derivatives and Implication of the Amidotransferase FlsN3 in the Biosynthesis of Nitrogen-Containing Fluostatins
24. MTD-RTPE: A Malicious Traffic Detection Method Based on Relative Time-Delay Positional Encoding.
25. Privacy-Preserving Image Scaling Using Bicubic Interpolation and Homomorphic Encryption.
26. An Improved Purdue Enterprise Reference Architecture to Enhance Cybersecurity.
27. Double umbilical artery converging into a single umbilical artery: A case report.
28. Video steganography algorithm based on the relative relationship between DWT coefficients.
29. Steganalysis of Adaptive Steganography Under the Known Cover Image.
30. On the Sharing-Based Model of Steganography.
31. Enhanced branch obfuscation based on exception handling and encrypted mapping table.
32. A Security-Sensitive Function Mining Framework for Source Code.
33. Optimization of rich model based on fisher criterion for image steganalysis.
34. Steganalysis Feature Subspace Selection Based on Fisher Criterion.
35. PNG-Stega: Progressive Non-Autoregressive Generative Linguistic Steganography
36. Steganalysis of Adaptive JPEG Steganography Using 2D Gabor Filters.
37. A JPEG-Compression Resistant Adaptive Steganography Based on Relative Relationship between DCT Coefficients.
38. Robust JPEG steganography based on DCT and SVD in nonsubsampled shearlet transform domain
39. The impact of the Internet on household consumption expenditure: an empirical study based on China Family Panel Studies data
40. High-Efficiency Photocatalytic Ammonia Synthesis by Facet Orientation-Supported Heterojunction Cu2O@BiOCl[100] Boosted by Double Built-In Electric Fields
41. Image Steganalysis Based on Deep Content Features Clustering.
42. The impact of the Internet on household consumption expenditure: an empirical study based on China Family Panel Studies data
43. An Improved Purdue Enterprise Reference Architecture to Enhance Cybersecurity
44. Embedding Ratio Estimation based on Weighted Stego Image for Embedding in 2LSB.
45. Embedding Ratio Estimating for Each Bit Plane of Image.
46. Classification between PS and Stego Images Based on Noise Model.
47. Steganalysis Based on Weighted Stego-Image for 2LSB Replacement Steganography.
48. Secure Steganography in Compressed Video Bitstreams.
49. Discovery of an Unexpected 1,4-Oxazepine-Linked seco-Fluostatin Heterodimer by Inactivation of the Oxidoreductase-Encoding Gene flsP
50. Equivalence Analysis Among DIH, SPA, and RS Steganalysis Methods.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.