Author of the publication

Classification of indecent videos by low complexity repetitive motion detection.

, , and . AIPR, page 1-7. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Classification of indecent videos by low complexity repetitive motion detection., , and . AIPR, page 1-7. IEEE Computer Society, (2008)Using triggers for emulation of opportunistic networking., , , and . MobiOpp, page 155-158. ACM, (2010)An Evaluation of Side-Information Assisted Forensic Hash Matching.. COMPSAC Workshops, page 331-336. IEEE Computer Society, (2014)Using Partial Signatures in Intrusion Detection for Multipath TCP., , , and . NordSec, volume 11875 of Lecture Notes in Computer Science, page 71-86. Springer, (2019)Examining cellular access systems on trains: Measurements and change detection., , and . TMA, page 1-6. IEEE, (2017)A Fragment Hashing Approach for Scalable and Cloud-Aware Network File Detection.. NTMS, page 1-5. IEEE, (2018)Slice Distance: An Insert-Only Levenshtein Distance with a Focus on Security Applications., , , and . NTMS, page 1-5. IEEE, (2018)Duplications and Misattributions of File Fragment Hashes in Image and Compressed Files.. NTMS, page 1-5. IEEE, (2018)DIOPT: Extremely Fast Classification Using Lookups and Optimal Feature Discretization., and . IJCNN, page 1-8. IEEE, (2020)A clustering-based analysis of DPI-labeled video flow characteristics in cellular networks.. IM, page 991-994. IEEE, (2017)