Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Xiaohui Ba
@article{DBLP:journals/ieicetd/XiangZBC21, author = {Hengyong Xiang and Li Zhou and Xiaohui Ba and Jie Chen}, title = {Matching with GUISAC-Guided Sample Consensus}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {104-D}, number = {2}, pages = {346--349}, year = {2021}, url = {http://search.ieice.org/bin/summary.php?id=e104-d\_2\_346}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicetd/XiangZBC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/YangBC19, author = {Yuheng Yang and Xiaohui Ba and Jie Chen}, title = {A Novel {VLSI} Architecture for Multi-Constellation and Multi-Frequency {GNSS} Acquisition Engine}, journal = {{IEEE} Access}, volume = {7}, pages = {655--665}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2018.2885592}, doi = {10.1109/ACCESS.2018.2885592}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/YangBC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icassp/ChuYKB04, author = {Rufeng Chu and Xingang You and Xiangwei Kong and Xiaohui Ba}, title = {A DCT-based image steganographic method resisting statistical attacks}, booktitle = {2004 {IEEE} International Conference on Acoustics, Speech, and Signal Processing, {ICASSP} 2004, Montreal, Quebec, Canada, May 17-21, 2004}, pages = {953--956}, publisher = {{IEEE}}, year = {2004}, url = {https://doi.org/10.1109/ICASSP.2004.1327270}, doi = {10.1109/ICASSP.2004.1327270}, timestamp = {Mon, 22 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icassp/ChuYKB04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ideal/KongCBZY03, author = {Xiangwei Kong and Rufeng Chu and Xiaohui Ba and Ting Zhang and Deli Yang}, editor = {Jiming Liu and Yiu{-}ming Cheung and Hujun Yin}, title = {A Perception Evaluation Scheme for Steganography}, booktitle = {Intelligent Data Engineering and Automated Learning, 4th International Conference, {IDEAL} 2003, Hong Kong, China, March 21-23, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2690}, pages = {426--430}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45080-1\_56}, doi = {10.1007/978-3-540-45080-1\_56}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/ideal/KongCBZY03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.