Author of the publication

Architecture of a fake news detection system combining digital watermarking, signal processing, and machine learning.

, , , , and . J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 13 (1): 33-55 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Quality of Experience-based Reputation Models for Future Web Service Provisioning, , , , , and . Future Internet Architectures: New Trends in Service Architectures (2nd Euro-NF Workshop), Santander, Spain, (June 2009)Steganographic Routing in Multi Agent System Environment, , and . CoRR, (2008)Lost audio packets steganography: the first practical evaluation.. Secur. Commun. Networks, 5 (12): 1394-1403 (2012)Code Augmentation for Detecting Covert Channels Targeting the IPv6 Flow Label., , , , and . NetSoft, page 450-456. IEEE, (2021)LACK - a VoIP steganographic method., and . Telecommun. Syst., 45 (2-3): 153-163 (2010)Steganography of VoIP Streams., and . OTM Conferences (2), volume 5332 of Lecture Notes in Computer Science, page 1001-1018. Springer, (2008)Hiding Information in Retransmissions, , and . CoRR, (2009)Cyber Regulatory Networks: Towards a Bio-inspired Auto-resilient Framework for Cyber-Defense., , and . BICT, volume 289 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 156-174. Springer, (2019)Mobile Communications and Networks., , , and . IEEE Communications Magazine, 57 (12): 37 (2019)Design and performance evaluation of reversible network covert channels., , , and . ARES, page 68:1-68:8. ACM, (2020)