Author of the publication

JPEG Compression Forensics against Resizing.

, and . Trustcom/BigDataSE/ISPA, page 1001-1007. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Research on Evaluation of Power Supply Companies External Service Quality Based on improved grey Interrelated Analysis Method., , and . J. Comput., 7 (4): 982-987 (2012)Development of Search-and-rescue Robots for Underground Coal Mine Applications., , , , and . J. Field Robotics, 31 (3): 386-407 (2014)The Detection of Fraudulent Financial Statements: an Integrated Language Model., , , , , and . PACIS, page 383. (2014)Collaborative Indexing and Knowledge Exploration: A Social Learning Model., and . IEEE Intelligent Systems, 27 (1): 39-46 (2012)A Piezo-Actuated High-Precision Flexible Parallel Pointing Mechanism: Conceptual Design, Development, and Experiments., , and . IEEE Trans. Robotics, 30 (1): 131-137 (2014)Conflict Resolution in Remote Collaborative Problem Solving: A Comparison of Different Computer Mediated Communication Methods., and . CogSci, cognitivesciencesociety.org, (2011)CARE: Corruption-Aware Retransmission with Adaptive Coding for the Low-Power Wireless., , and . ICNP, page 235-244. IEEE Computer Society, (2015)Symbolic verification of regular properties., , , , and . ICSE, page 871-881. ACM, (2018)Slicing Hierarchical Automata for Model Checking UML Statecharts., , and . ICFEM, volume 2495 of Lecture Notes in Computer Science, page 435-446. Springer, (2002)TOC: Lightweight Event Tracing Using Online Compression for Networked Embedded Systems., , , and . IJDSN, (2015)