Author of the publication

Image splicing forgery detection combining coarse to refined convolutional neural network and adaptive clustering.

, , , , and . Inf. Sci., (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Ridra: A Rigorous Decentralized Randomized Authentication in VANETs., , , , and . IEEE Access, (2018)SRDPV: secure route discovery and privacy-preserving verification in MANETs., , and . Wireless Networks, 25 (4): 1731-1747 (2019)Two-Layer Storage Scheme and Repair Method of Failure Data in Wireless Sensor Networks., , , , and . IJDSN, (2012)NetPro: detecting attacks in MANET routing with provenance and verification., , and . Sci. China Inf. Sci., 60 (11): 118101 (2017)Universally composable anonymous Hash certification model., , and . Sci. China Ser. F Inf. Sci., 50 (3): 440-455 (2007)Publicly verifiable database scheme with efficient keyword search., , , and . Inf. Sci., (2019)New and efficient conditional e-payment systems with transferability., , , , and . Future Gener. Comput. Syst., (2014)A Collaborative Self-Governing Privacy-Preserving Wireless Sensor Network Architecture Based on Location Optimization for Dynamic Service Discovery in MANET Environment., , and . Int. J. Distributed Sens. Networks, (2015)Efficient and privacy-preserving skyline computation framework across domains., , , , and . Future Gener. Comput. Syst., (2016)Privacy-Preserving Patient-Centric Clinical Decision Support System on Naïve Bayesian Classification., , , , and . IEEE J. Biomed. Health Informatics, 20 (2): 655-668 (2016)