Author of the publication

Multiple forgery detection in video using inter-frame correlation distance with dual-threshold.

, and . Multim. Tools Appl., 81 (30): 43979-43998 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Planning for Cryptographic Readiness in an Era of Quantum Computing Advancement., , and . ICISSP, page 491-498. SCITEPRESS, (2022)A behavioural theory for intrusion detection system in mobile ad-hoc networks., and . HP3C, page 51-60. ACM, (2018)Counting the Cost in the Picalculus (Extended Abstract)., and . ICE@ICALP, volume 229 of Electronic Notes in Theoretical Computer Science, page 117-129. Elsevier, (2008)On Efficiency Preorders., and . FSEN, volume 8161 of Lecture Notes in Computer Science, page 83-94. Springer, (2013)Multiple forgery detection in video using inter-frame correlation distance with dual-threshold., and . Multim. Tools Appl., 81 (30): 43979-43998 (2022)A trustworthy model of recommender system using hyper-tuned restricted boltzmann machine., , , and . Multim. Tools Appl., 82 (6): 8261-8285 (March 2023)Deep feature based forgery detection in video using parallel convolutional neural network: VFID-Net., , and . Multim. Tools Appl., 81 (29): 42223-42240 (2022)A trust based model for recommendations of malignant people in social network., , , and . Int. J. Syst. Assur. Eng. Manag., 14 (1): 415-428 (February 2023)Process Calculi for Intrusion Detection System in Mobile Ad-hoc Networks., and . J. Commun., 13 (Nocember): 635-647 (2018)A trust-worthy approach to recommend movies for communities., , and . Multim. Tools Appl., 81 (14): 19655-19682 (2022)