Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Machine Learning-Based Digital Twin for Anti-Counterfeiting Applications With Copy Detection Patterns., , , , , , , and . IEEE Trans. Inf. Forensics Secur., (2024)Machine learning attack on copy detection patterns: are 1x1 patterns cloneable?, , , , , and . CoRR, (2021)Correction: Mobile authentication of copy detection patterns., , , , , and . EURASIP J. Inf. Secur., 2023 (1): 8 (December 2023)Authentication of Copy Detection Patterns: A Pattern Reliability Based Approach., , , , , , and . IEEE Trans. Inf. Forensics Secur., (2024)Authentication Of Copy Detection Patterns Under Machine Learning Attacks: A Supervised Approach., , , , , , and . ICIP, page 1296-1300. IEEE, (2022)Digital twins of physical printing-imaging channel., , , , , , and . WIFS, page 1-6. IEEE, (2022)Mobile authentication of copy detection patterns., , , , , and . EURASIP J. Inf. Secur., 2023 (1): 4 (December 2023)Printing variability of copy detection patterns., , , , , , and . WIFS, page 1-6. IEEE, (2022)Mobile authentication of copy detection patterns: how critical is to know fakes?, , , , , and . WIFS, page 1-6. IEEE, (2021)Anomaly localization for copy detection patterns through print estimations., , , , , , and . WIFS, page 1-6. IEEE, (2022)