Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Smartphones Identification Through the Built-In Microphones With Convolutional Neural Network., and . IEEE Access, (2019)Online Distributed Denial of Service (DDoS) intrusion detection based on adaptive sliding window and morphological fractal dimension., and . Comput. Networks, (2022)Media Forensics and the Challenge of Big Data (Dagstuhl Seminar 23021)., , , and . Dagstuhl Reports, 13 (1): 1-35 (January 2023)Media forensics on social media platforms: a survey., , and . EURASIP J. Inf. Secur., 2021 (1): 4 (2021)An Evaluation of Entropy Measures for Microphone Identification., and . Entropy, 22 (11): 1235 (2020)Forensic Analysis of SIFT Keypoint Removal and Injection., , , and . IEEE Trans. Inf. Forensics Secur., 9 (9): 1450-1464 (2014)Dealing with video source identification in social networks., , , , , and . Signal Process. Image Commun., (2017)Convolutional neural networks combined with feature selection for radio-frequency fingerprinting., , , and . Comput. Intell., 39 (5): 734-758 (October 2023)Why Don't You Speak?: A Smartphone Application to Engage Museum Visitors Through Deepfakes Creation., , and . SUMAC @ ACM Multimedia, page 29-37. ACM, (2023)DepthFake: A Depth-Based Strategy for Detecting Deepfake Videos., , , and . ICPR Workshops (4), volume 13646 of Lecture Notes in Computer Science, page 17-31. Springer, (2022)