In this paper, we present a new ID-based two-party authenticated key exchange (AKE) protocol, which makes use of a new technique called twin Diffie-Hellman problem proposed by Cas...
This paper discusses the construction and implementation problem of trellis coded quantization (TCQ) based data hiding. We explore the robustness and distortion of data hiding by ...
IEEE 802.22 wireless regional area network (WRAN) is an emerging cognitive radio-based system. One of the major challenges for WRANs is how to efficiently schedule both channel sen...
In cancer treatment, understanding the aggressiveness of the tumor is essential in therapy planning and patient follow-up. In this article, we present a novel method for quantifyin...
The null space N(St) of total scatter matrix St contains no useful information for pattern classification. So, discarding the null space N(St) results in dimensionality reduction ...
Wen-Sheng Chen, Pong Chi Yuen, Jian Huang, Jian-Hu...