Author of the publication

GAN-generated fake face detection via two-stream CNN with PRNU in the wild.

, , , , , , and . Multim. Tools Appl., 81 (29): 42527-42545 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Assessment of Integrated Electronic Information System survivability based on u-function., , and . ICNSC, page 1837-1841. IEEE, (2008)An adaptive matrix embedding based on LSB matching for grey-scale images., and . Int. J. Multim. Intell. Secur., 2 (3/4): 238-251 (2011)A Wireless Covert Channel Based on Constellation Shaping Modulation., , , , , and . Secur. Commun. Networks, (2018)基于Snort的Modbus TCP工控协议异常数据检测规则设计 (Design of Modbus TCP Industrial Control Network Protocol Abnormal Data Detection Rules Based on Snort)., , and . 计算机科学, 42 (11): 212-216 (2015)An Improved Retransmission-based Network Steganography: Design and Detection., , and . J. Networks, 8 (1): 182-188 (2013)SkyLen: a Skype-based length covert channel., , , and . J. Inf. Hiding Multim. Signal Process., 6 (3): 473-481 (2015)A deep learning-based framework to identify and characterise heterogeneous secure network traffic., , , and . IET Inf. Secur., 17 (2): 294-308 (March 2023)Securing Network Traffic Classification Models against Adversarial Examples Using Derived Variables., , , , and . Future Internet, 15 (12): 405 (2023)A passive image authentication scheme for detecting region-duplication forgery with rotation., , , and . J. Netw. Comput. Appl., 34 (5): 1557-1565 (2011)A correlation-based approach to detecting wireless physical covert channels., , , , and . Comput. Commun., (2021)