From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Survey of Watermarking Security.. IWDW, том 3710 из Lecture Notes in Computer Science, стр. 201-215. Springer, (2005)EM decoding of tardos traitor tracing codes., и . MM&Sec, стр. 99-106. ACM, (2009)Defending Adversarial Examples via DNN Bottleneck Reinforcement., , , и . ACM Multimedia, стр. 1930-1938. ACM, (2020)Fooling an Automatic Image Quality Estimator., , и . MediaEval, том 2882 из CEUR Workshop Proceedings, CEUR-WS.org, (2020)Towards Joint Tardos Decoding: The 'Don Quixote' Algorithm., и . Information Hiding, том 6958 из Lecture Notes in Computer Science, стр. 28-42. Springer, (2011)Estimating the probability fo false alarm for a zero-bit watermarking technique., , , и . DPS, стр. 1-8. IEEE, (2009)Three Bricks to Consolidate Watermarks for Large Language Models., , , , и . WIFS, стр. 1-6. IEEE, (2023)Randomized Smoothing Under Attack: How Good is it in Practice?, , и . ICASSP, стр. 3014-3018. IEEE, (2022)On the Design and Optimization of Tardos Probabilistic Fingerprinting Codes, , и . (2008)Side-informed watermarking using nth-order polynomial detectors., , и . EUSIPCO, стр. 1-4. IEEE, (2002)