Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adversarial Detection of Counterfeited Printable Graphical Codes: Towards Ädversarial Games" In Physical World., , , and . ICASSP, page 2812-2816. IEEE, (2020)A Machine Learning-Based Digital Twin for Anti-Counterfeiting Applications With Copy Detection Patterns., , , , , , , and . IEEE Trans. Inf. Forensics Secur., (2024)Machine learning attack on copy detection patterns: are 1x1 patterns cloneable?, , , , , and . CoRR, (2021)Defending Against Adversarial Attacks by Randomized Diversification., , , and . CVPR, page 11226-11233. Computer Vision Foundation / IEEE, (2019)Stochastic Digital Twin for Copy Detection Patterns., , , and . WIFS, page 1-6. IEEE, (2023)Reconstruction of Privacy-Sensitive Data from Protected Templates., , , , and . ICIP, page 1163-1167. IEEE, (2019)Mobile authentication of copy detection patterns., , , , , and . EURASIP J. Inf. Secur., 2023 (1): 4 (December 2023)Machine learning through cryptographic glasses: combating adversarial attacks by key-based diversified aggregation., , , and . EURASIP J. Inf. Secur., (2020)Clonability of Anti-counterfeiting Printable Graphical Codes: A Machine Learning Approach., , and . ICASSP, page 2482-2486. IEEE, (2019)Printing variability of copy detection patterns., , , , , , and . WIFS, page 1-6. IEEE, (2022)