Author of the publication

Nowhere to Hide: Detecting Live Video Forgery via Vision-WiFi Silhouette Correspondence.

, , , , , and . INFOCOM, page 1-10. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Polyethylene nanofibres with very high thermal conductivities, , , , and . Nature Nanotechnology, (2010)Collaborative Education Practice in a Data Structure E-learning Course, and . (2009)Application of Constructivism Theory Explore Electronic Technology Design Course Teaching., , , , , and . CSEE (3), volume 216 of Communications in Computer and Information Science, page 299-302. Springer, (2011)Subtyping Parametric and Dependent Types, and . (1996)iGlasses: A Novel Recommendation System for Best-fit Glasses., , , , , and . SIGIR, page 1109-1112. ACM, (2016)Top-k Similarity Search on Uncertain Trajectories., , , , and . SSDBM, volume 6809 of Lecture Notes in Computer Science, page 589-591. Springer, (2011)Adaptive Neural Network Control for Multi-fingered Robot Hand Manipulation in the Constrained Environment., , and . ICNC (2), volume 3611 of Lecture Notes in Computer Science, page 270-273. Springer, (2005)Assessment of MongoDB's spatial retrieval performance., and . Geoinformatics, page 1-4. IEEE, (2015)A Fast and reliable switching median filter for highly corrupted images by impulse noise., , , and . ISCAS, page 3427-3430. IEEE, (2007)Towards Efficient Concurrent Scans on Flash Disks., , , , , and . DEXA (1), volume 6261 of Lecture Notes in Computer Science, page 198-212. Springer, (2010)