Author of the publication

Copy-move forgery detection using combined features and transitive matching.

, , , , , , and . Multimedia Tools Appl., 78 (21): 30081-30096 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Social-aware peer discovery and resource allocation for device-to-device communication., , , , and . DMIAF, page 83-88. IEEE, (2016)Joint Access Selection and Resource Allocation in Cache-Enabled HCNs with D2D Communications., , , , , and . WCNC, page 1-6. IEEE, (2017)FairEdge: A Fairness-Oriented Task Offloading Scheme for Iot Applications in Mobile Cloudlet Networks., , , , , , and . IEEE Access, (2020)Automatic Generation of Adversarial Metamorphic Malware Using MAP-Elites., , and . EvoApplications, volume 12104 of Lecture Notes in Computer Science, page 117-132. Springer, (2020)ARCA-IoT: An Attack-Resilient Cloud-Assisted IoT System., , , , , and . IEEE Access, (2019)Vehicular Computation Offloading for Industrial Mobile Edge Computing., , , , , , and . IEEE Trans. Ind. Informatics, 17 (11): 7871-7881 (2021)A Novel Web Attack Detection System for Internet of Things via Ensemble Classification., , , , , and . IEEE Trans. Ind. Informatics, 17 (8): 5810-5818 (2021)Introduction to the Special Issue on Privacy and Security in Evolving Internet of Multimedia Things., , , and . ACM Trans. Multim. Comput. Commun. Appl., 16 (3s): 93:1-93:3 (2020)Intrusion detection method based on nonlinear correlation measure., , , , , and . Int. J. Internet Protoc. Technol., 8 (2/3): 77-86 (2014)Conceptual Text Region Network: Cognition-Inspired Accurate Scene Text Detection., , , and . CoRR, (2021)