Publications
Probabilistic pursuit-evasion games: A one-step Nash approach. IEEE CONFERENCE ON DECISION AND CONTROL - PROCEEDINGS. :2272-2277.
.
2000. Video fingerprinting: Features for duplicate and similar video detection and query-based video retrieval - art. no. 68200E. PROCEEDINGS OF THE SOCIETY OF PHOTO-OPTICAL INSTRUMENTATION ENGINEERS (SPIE). 6820:E8200-E8200.
.
2008. .
2009. Image Dependent Log-likelihood Ratio Allocation for Repeat Accumulate Code based Decoding in Data Hiding Channels. Proceedings of SPIE. 7541
.
2010. Estimating steganographic capacity for odd-even based embedding and its use in individual compensation. IEEE International Conference on Image Processing ICIP. :409-412.
.
2007. .
2009. PRECISE LOCALIZATION OF KEY-POINTS TO IDENTIFY LOCAL REGIONS FOR ROBUST DATA HIDING. IEEE International Conference on Image Processing ICIP. :3681-3684.
.
2010. Obtaining Higher Rates for Steganographic Schemes While Maintaining the Same Detectability. Lecture Notes in Computer Science. 6387:178-+.
.
2010. Steganographic capacity estimation for the statistical restoration framework. Proceedings of SPIE. 6819
.
2008. Further study on YASS: Steganography based on randomized embedding to resist blind steganalysis. Proceedings of SPIE. 6819
.
2008. Matrix Embedding With Pseudorandom Coefficient Selection and Error Correction for Robust and Secure Steganography. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY. 5:225-239.
.
2010. YASS: Yet another steganographic scheme that resists blind steganalysis. Lecture Notes in Computer Science. 4567:16-+.
.
2007. Adaptive MPEG-2 video data hiding scheme. Proceedings of SPIE. 6505
.
2007. Robust Dynamical Model for Simultaneous Registration and Segmentation in a Variational Framework: A Bayesian Approach. IEEE International Conference on Computer Vision. :709-716.
.
2009. Generalized Simultaneous Registration and Segmentation. IEEE Conference on Computer Vision and Pattern Recognition. :1363-1370.
.
2010. Probabilistic Occlusion Boundary Detection on Spatio-Temporal Lattices. IEEE International Conference on Computer Vision. :560-567.
.
2009. Legitimacy of the stochastic Michaelis-Menten approximation. IET SYSTEMS BIOLOGY. 5:58-69.
.
2011. Linear noise approximation is valid over limited times for any chemical system that is sufficiently large. IET SYSTEMS BIOLOGY. 6:102-115.
.
2012. Results on convergence in hybrid systems via detectability and an invariance principle. PROCEEDINGS OF THE AMERICAN CONTROL CONFERENCE. :551-556.
.
2005. .
2009. Joint Channel and Mismatch Correction for OFDM Reception with Time-interleaved ADCs: Towards Mostly Digital MultiGigabit Transceiver Architectures. IEEE Global Telecommunications Conference (Globecom).
.
2008. Stochastic stability and its application to the analysis of gene regulatory networks. IEEE Conference on Decision and Control. :3001-3006.
.
2004. Stochastic modelling of gene regulatory networks. INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL. 15:691-711.
.
2005. Solution of MIMO H(2)/l(l) problem without zero interpolation. SIAM JOURNAL ON CONTROL AND OPTIMIZATION. 37:1865-1873.
.
1999. Filtering of nonlinear chaotic time-series with noise. IEEE CONFERENCE ON DECISION AND CONTROL - PROCEEDINGS. :1669-1671.
.
1997.