273 | -- | 285 | Junhui He, Jiwu Huang. Steganalysis of stochastic modulation steganography |
286 | -- | 301 | Bin Zhang, Dengguo Feng. Security analysis of a new stream cipher |
302 | -- | 312 | Jiande Sun, Ju Liu. A blind video watermarking scheme based on ICA and shot segmentation |
313 | -- | 327 | Yao Zhao. Geometrically robust video watermarking based on wavelet transform |
328 | -- | 338 | Yanxia Zhang, Lei Guo. Convergence analysis of cautious control |
339 | -- | 363 | Hongxing Li. Probability representations of fuzzy systems |
364 | -- | 371 | Xiaozhu Lin, Yun Sha, Junwei Ji, Yanmin Wang. A proof of image Euler Number formula |
372 | -- | 385 | Minghu Ha, Yan Li, Jia Li, Dazeng Tian. The key theorem and the bounds on the rate of uniform convergence of learning theory on Sugeno measure space |
386 | -- | 396 | Hai Li, Zhenfang Li, Guisheng Liao, Zheng Bao. An estimation method for InSAR interferometric phase combined with image auto-coregistration |
397 | -- | 408 | Yuanyuan Xu, Shanhong Xia, Chao Bian, Shaofeng Chen. A micro amperometric immunosensor for detection of human immunoglobulin |