Author of the publication

Location Spoofing Detection for Social Network Service using Camera Fingerprint.

, , and . ICVISP, page 20:1-20:6. ACM, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Resilient Privacy-Preserving Average Consensus for Multi-agent Systems under Attacks., , , , , and . ICARCV, page 1399-1405. IEEE, (2020)KallaxDB: A Table-less Hash-based Key-Value Store on Storage Hardware with Built-in Transparent Compression., , , , , , and . DaMoN, page 3:1-3:10. ACM, (2021)Issues on simulation and optimization I: optimal experimental design for systems involving both quantitative and qualitative factors., , , and . WSC, page 556-564. IEEE Computer Society, (2003)Weight sorting based scheme and architecture for distributed particle filters., , , and . ISCAS, page 1472-1475. IEEE, (2012)Generalized multiple maximum scatter difference feature extraction using QR decomposition., , and . J. Vis. Commun. Image Represent., 25 (6): 1460-1471 (2014)Geographical position spoofing detection based on camera sensor fingerprint., , , , and . J. Vis. Commun. Image Represent., (2021)Robust steganography in practical communication: a comparative study., , , , , , , and . EURASIP J. Image Video Process., 2023 (1): 15 (December 2023)A Webmail Reconstructing Method from Windows XP Memory Dumps., , , , , and . MUE, volume 240 of Lecture Notes in Electrical Engineering, page 211-217. Springer, (2013)Two-dimensional discriminant multi-manifolds locality preserving projection for facial expression recognition., , , and . ISCAS, page 2065-2068. IEEE, (2015)EHSTC: an enhanced method for semantic trajectory compression., , , , and . IWGS, page 43-49. ACM, (2013)