Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Digital Image Authentication From JPEG Headers., , and . IEEE Trans. Inf. Forensics Secur., 6 (3-2): 1066-1075 (2011)Exposing photo manipulation with inconsistent shadows., , and . ACM Trans. Graph., 32 (3): 28:1-28:12 (2013)Exposing photo manipulation from user-guided 3D lighting analysis., , and . Media Watermarking, Security, and Forensics, volume 9409 of SPIE Proceedings, page 940902. SPIE, (2015)Removing Reflections from RAW Photos, , , and . (2024)Exposing digital forgeries from 3-D lighting environments., and . WIFS, page 1-6. IEEE, (2010)Digital image authentication from thumbnails., and . Media Forensics and Security, volume 7541 of SPIE Proceedings, page 75410E. SPIE, (2010)Universal Embeddings for Spatio-Temporal Tagging of Self-Driving Logs., , , , , and . CoRL, volume 155 of Proceedings of Machine Learning Research, page 973-983. PMLR, (2020)Realistic Saliency Guided Image Enhancement., , , , and . CVPR, page 186-194. IEEE, (2023)Efficient sensory coding of multidimensional stimuli., , , and . PLoS Comput. Biol., (2020)DeepSignals: Predicting Intent of Drivers Through Visual Signals., , and . ICRA, page 9697-9703. IEEE, (2019)