Author of the publication

SHIELD: A Specialized Dataset for Hybrid Blind Forensics of World Leaders.

, , , , , , , , and . ICDF2C (2), volume 571 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 79-91. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Research of Spatial Domain Image Digital Watermarking Payload., , , , and . EURASIP J. Information Security, (2011)Observer-Based Control for the Two-Time-Scale Cyber-Physical Systems: The Dual-Scale DoS Attacks Case., , , , , and . IEEE Trans. Netw. Sci. Eng., 8 (4): 3369-3379 (2021)Sampled-data H∞ filtering for Markovian jump singularly perturbed systems with time-varying delay and missing measurements., , , and . Int. J. Syst. Sci., 49 (3): 464-478 (2018)H∞ sampled-data control for T-S fuzzy singularly perturbed systems with actuator saturation., , , , and . J. Intell. Fuzzy Syst., 33 (2): 779-790 (2017)Formation Control for Multiple Quadrotors Under DoS Attacks via Singular Perturbation., , , , , and . IEEE Trans. Aerosp. Electron. Syst., 59 (4): 4753-4762 (August 2023)A Novel Equivalent Input Disturbance-Based Adaptive Sliding Mode Control for Singularly Perturbed Systems., , , and . IEEE Access, (2021)Adaptive event-triggered synchronization of neural networks under stochastic cyber-attacks with application to Chua's circuit., , , , and . Neural Networks, (September 2023)A dynamic online protection framework for Android applications., and . Comput. Syst. Sci. Eng., (2018)Unearthing Common Inconsistency for Generalisable Deepfake Detection., , , and . CoRR, (2023)Sampled-data control for singularly perturbed systems with actuator saturation., , , , and . ACC, page 5756-5761. IEEE, (2017)