Author of the publication

An Analysis of Recent Advances in Deepfake Image Detection in an Evolving Threat Landscape.

, , , , , , and . SP, page 91-109. IEEE, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Characterizing Conversation Patterns in Reddit: From the Perspectives of Content Properties and User Participation Behaviors., , , , , and . COSN, page 233-243. ACM, (2015)Sharing Topics in Pinterest: Understanding Content Creation and Diffusion Behaviors., , , , , , , and . COSN, page 245-255. ACM, (2015)You Are Who You Appear to Be: A Longitudinal Study of Domain Impersonation in TLS Certificates., , , , , and . ACM Conference on Computer and Communications Security, page 2489-2504. ACM, (2019)The Reality of Algorithm Agility: Studying the DNSSEC Algorithm Life-Cycle., , , , and . Internet Measurement Conference, page 295-308. ACM, (2020)CoRC: coordinated routing and caching for named data networking., , , , , and . ANCS, page 161-172. ACM, (2014)Spatial and Temporal Locality of Swarm Dynamics in BitTorrent., , , , , and . PAM, volume 7799 of Lecture Notes in Computer Science, page 264-266. Springer, (2013)Unveiling group characteristics in online social games: a socio-economic analysis., , , , , and . WWW, page 889-900. ACM, (2014)Content Publishing and Downloading Practice in BitTorrent., , , , , and . Networking (2), volume 7290 of Lecture Notes in Computer Science, page 97-110. Springer, (2012)TTL Violation of DNS Resolvers in the Wild., , , and . PAM, volume 13882 of Lecture Notes in Computer Science, page 550-563. Springer, (2023)Measurement and Analysis of Automated Certificate Reissuance., , , , , and . PAM, volume 12671 of Lecture Notes in Computer Science, page 161-174. Springer, (2021)