Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Face spoof detection using feature map superposition and CNN., , , , and . Int. J. Comput. Sci. Eng., 22 (2/3): 355-363 (2020)A Data Integrity Authentication Scheme in WSNs Based on Double Watermark., , , , and . IEEE Internet Things J., 10 (9, May 1): 8245-8256 (2023)Fingerprint Liveness Detection Using an Improved CNN With Image Scale Equalization., , , , , and . IEEE Access, (2019)Exposing AI-generated videos with motion magnification., , , and . Multim. Tools Appl., 80 (20): 30789-30802 (2021)A Survey on Deepfake Video Detection., , , and . IET Biom., 10 (6): 607-624 (2021)A Privacy-Preserving Image Retrieval Scheme Using Secure Local Binary Pattern in Cloud Computing., , , , and . IEEE Trans. Netw. Sci. Eng., 8 (1): 318-330 (2021)Absolute and relative entrainment in Mandarin conversations., , and . ICPhS, University of Glasgow, (2015)基于关键词的加密云数据模糊搜索策略研究 (Research on Fuzzy Search over Encrypted Cloud Data Based on Keywords)., , and . 计算机科学, 42 (3): 136-139 (2015)STR: Secure Computation on Additive Shares Using the Share-Transform-Reveal Strategy., , , , , and . IEEE Trans. Computers, 73 (2): 340-352 (February 2024)Privacy-preserving DeepFake face image detection., , , and . Digit. Signal Process., (November 2023)