From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

EM decoding of tardos traitor tracing codes., и . MM&Sec, стр. 99-106. ACM, (2009)A New Measure of Watermarking Security Applied on QIM., и . Information Hiding, том 7692 из Lecture Notes in Computer Science, стр. 207-223. Springer, (2012)A Survey of Watermarking Security.. IWDW, том 3710 из Lecture Notes in Computer Science, стр. 201-215. Springer, (2005)Towards Joint Tardos Decoding: The 'Don Quixote' Algorithm., и . Information Hiding, том 6958 из Lecture Notes in Computer Science, стр. 28-42. Springer, (2011)Iterative single tardos decoder with controlled probability of false positive., и . ICME, стр. 1-6. IEEE Computer Society, (2011)Side-informed watermarking using nth-order polynomial detectors., , и . EUSIPCO, стр. 1-4. IEEE, (2002)Decoding fingerprints using the Markov Chain Monte Carlo method., , и . WIFS, стр. 187-192. IEEE, (2012)On the Design and Optimization of Tardos Probabilistic Fingerprinting Codes, , и . (2008)Randomized Smoothing Under Attack: How Good is it in Practice?, , и . ICASSP, стр. 3014-3018. IEEE, (2022)Fooling an Automatic Image Quality Estimator., , и . MediaEval, том 2882 из CEUR Workshop Proceedings, CEUR-WS.org, (2020)