APA (7th ed.) Citation

Wu, Q., Feng, Z., Huang, Y., Zhong, J., & Liu, X. (2022, September 27). Covert Communication and Image Authentication Algorithm Based on Adversarial Examples. International Symposium on Communications and Information Technologies (Online), 199-203. https://doi.org/10.1109/ISCIT55906.2022.9931289

Chicago Style (17th ed.) Citation

Wu, Qiwen, Zijing Feng, Yingkai Huang, Jiehui Zhong, and Xiaolong Liu. "Covert Communication and Image Authentication Algorithm Based on Adversarial Examples." International Symposium on Communications and Information Technologies (Online) 27 Sep. 2022: 199-203. https://doi.org/10.1109/ISCIT55906.2022.9931289.

MLA (9th ed.) Citation

Wu, Qiwen, et al. "Covert Communication and Image Authentication Algorithm Based on Adversarial Examples." International Symposium on Communications and Information Technologies (Online), 27 Sep. 2022, pp. 199-203, https://doi.org/10.1109/ISCIT55906.2022.9931289.

Warning: These citations may not always be 100% accurate.