Author of the publication

Making DeepFakes more spurious: evading deep face forgery detection via trace removal attack.

, , , , and . CoRR, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Performance and Security Evaluations of Identity- and Pairing-Based Digital Signature Algorithms on Windows, Android, and Linux Platforms: Revisiting the Algorithms of Cha and Cheon, Hess, Barreto, Libert, Mccullagh and Quisquater, and Paterson and Schuldt., , , , and . IEEE Access, (2018)Efficiently Constructing Adversarial Examples by Feature Watermarking., , , , , and . CoRR, (2020)Defense against membership inference attack in graph neural networks through graph perturbation., , , , and . Int. J. Inf. Sec., 22 (2): 497-509 (April 2023)Prioritized Experience Replay based on Multi-armed Bandit., , , , and . Expert Syst. Appl., (2022)Evolution of cooperation in malicious social networks with differential privacy mechanisms., , , , and . Neural Comput. Appl., 35 (18): 12979-12994 (June 2023)Image fairness in deep learning: problems, models, and challenges., , , and . Neural Comput. Appl., 34 (15): 12875-12893 (2022)Semantic analysis in location privacy preserving., , and . Concurr. Comput. Pract. Exp., 28 (6): 1884-1899 (2016)A novel differentially private advising framework in cloud server environment., , , , , and . Concurr. Comput. Pract. Exp., (2022)Towards Personalized Task-Oriented Worker Recruitment in Mobile Crowdsensing., , , , , , and . IEEE Trans. Mob. Comput., 20 (5): 2080-2093 (2021)Multi-agent reinforcement learning via knowledge transfer with differentially private noise., , , , , and . Int. J. Intell. Syst., 37 (1): 799-828 (2022)