Probabilistic pursuit-evasion games: A one-step Nash approach. IEEE CONFERENCE ON DECISION AND CONTROL - PROCEEDINGS. :2272-2277.. 2000.
Video fingerprinting: Features for duplicate and similar video detection and query-based video retrieval - art. no. 68200E. PROCEEDINGS OF THE SOCIETY OF PHOTO-OPTICAL INSTRUMENTATION ENGINEERS (SPIE). 6820:E8200-E8200.. 2008.
Image Dependent Log-likelihood Ratio Allocation for Repeat Accumulate Code based Decoding in Data Hiding Channels. Proceedings of SPIE. 7541. 2010.
Estimating steganographic capacity for odd-even based embedding and its use in individual compensation. IEEE International Conference on Image Processing ICIP. :409-412.. 2007.
PRECISE LOCALIZATION OF KEY-POINTS TO IDENTIFY LOCAL REGIONS FOR ROBUST DATA HIDING. IEEE International Conference on Image Processing ICIP. :3681-3684.. 2010.
Obtaining Higher Rates for Steganographic Schemes While Maintaining the Same Detectability. Lecture Notes in Computer Science. 6387:178-+.. 2010.
Steganographic capacity estimation for the statistical restoration framework. Proceedings of SPIE. 6819. 2008.
Further study on YASS: Steganography based on randomized embedding to resist blind steganalysis. Proceedings of SPIE. 6819. 2008.
Matrix Embedding With Pseudorandom Coefficient Selection and Error Correction for Robust and Secure Steganography. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY. 5:225-239.. 2010.
YASS: Yet another steganographic scheme that resists blind steganalysis. Lecture Notes in Computer Science. 4567:16-+.. 2007.
Adaptive MPEG-2 video data hiding scheme. Proceedings of SPIE. 6505. 2007.
Robust Dynamical Model for Simultaneous Registration and Segmentation in a Variational Framework: A Bayesian Approach. IEEE International Conference on Computer Vision. :709-716.. 2009.
Generalized Simultaneous Registration and Segmentation. IEEE Conference on Computer Vision and Pattern Recognition. :1363-1370.. 2010.
Probabilistic Occlusion Boundary Detection on Spatio-Temporal Lattices. IEEE International Conference on Computer Vision. :560-567.. 2009.
Legitimacy of the stochastic Michaelis-Menten approximation. IET SYSTEMS BIOLOGY. 5:58-69.. 2011.
Linear noise approximation is valid over limited times for any chemical system that is sufficiently large. IET SYSTEMS BIOLOGY. 6:102-115.. 2012.
Results on convergence in hybrid systems via detectability and an invariance principle. PROCEEDINGS OF THE AMERICAN CONTROL CONFERENCE. :551-556.. 2005.
Joint Channel and Mismatch Correction for OFDM Reception with Time-interleaved ADCs: Towards Mostly Digital MultiGigabit Transceiver Architectures. IEEE Global Telecommunications Conference (Globecom).. 2008.
Stochastic stability and its application to the analysis of gene regulatory networks. IEEE Conference on Decision and Control. :3001-3006.. 2004.
Stochastic modelling of gene regulatory networks. INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL. 15:691-711.. 2005.
Solution of MIMO H(2)/l(l) problem without zero interpolation. SIAM JOURNAL ON CONTROL AND OPTIMIZATION. 37:1865-1873.. 1999.
Filtering of nonlinear chaotic time-series with noise. IEEE CONFERENCE ON DECISION AND CONTROL - PROCEEDINGS. :1669-1671.. 1997.