Author of the publication

An entity matching-based image topic verification framework for online fact-checking.

, , , , and . Int. J. Multim. Intell. Secur., 4 (1): 65-85 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Robust Black-box Watermarking for Deep Neural Network using Inverse Document Frequency., , , and . DASC/PiCom/CBDCom/CyberSciTech, page 574-581. IEEE, (2021)Correction to: Two-Factor Blockchain for Traceability Cacao Supply Chain., , and . INCoS, volume 23 of Lecture Notes on Data Engineering and Communications Technologies, Springer, (2018)Threshold based Technique to Detect Anomalies using Log Files., , , and . ICMLT, page 191-198. ACM, (2022)Verification Based Scheme to Restrict IoT Attacks., , , , , and . BDCAT, page 63-68. ACM, (2021)Multimodal Fake News Analysis Based on Image-Text Similarity., , , , and . IEEE Trans. Comput. Soc. Syst., 11 (1): 959-972 (February 2024)Transferability of Machine Learning Algorithm for IoT Device Profiling and Identification., , , , , , and . IEEE Internet Things J., 11 (2): 2322-2335 (January 2024)A real-time hostile activities analyses and detection system., , , , and . Appl. Soft Comput., (2021)Data breach: analysis, countermeasures and challenges., , , , , and . Int. J. Inf. Comput. Secur., 19 (3/4): 402-442 (2022)An effective SVD-based image tampering detection and self-recovery using active watermarking., , , , and . Signal Process. Image Commun., 29 (10): 1197-1210 (2014)Security issues in Internet of Vehicles (IoV): A comprehensive survey., , , , , and . Internet Things, (July 2023)