Wu, Q., Feng, Z., Huang, Y., Zhong, J., & Liu, X. (2022, September 27). Covert Communication and Image Authentication Algorithm Based on Adversarial Examples. International Symposium on Communications and Information Technologies (Online), 199-203. https://doi.org/10.1109/ISCIT55906.2022.9931289
Chicago Style (17th ed.) CitationWu, Qiwen, Zijing Feng, Yingkai Huang, Jiehui Zhong, and Xiaolong Liu. "Covert Communication and Image Authentication Algorithm Based on Adversarial Examples." International Symposium on Communications and Information Technologies (Online) 27 Sep. 2022: 199-203. https://doi.org/10.1109/ISCIT55906.2022.9931289.
MLA (9th ed.) CitationWu, Qiwen, et al. "Covert Communication and Image Authentication Algorithm Based on Adversarial Examples." International Symposium on Communications and Information Technologies (Online), 27 Sep. 2022, pp. 199-203, https://doi.org/10.1109/ISCIT55906.2022.9931289.