Author of the publication

Recurrent Convolutional Structures for Audio Spoof and Video Deepfake Detection.

, , , , , , and . IEEE J. Sel. Top. Signal Process., 14 (5): 1024-1037 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modified Relay Selection and Circuit Selection for Faster Tor., , and . CoRR, (2016)Designing Musical Instruments for the Browser., , , and . Computer Music Journal, 39 (1): 27-40 (2015)Finding Minimal Spanning Forests in a Grap., , and . CoRR, (2017)Gibber: Abstractions for Creative Multimedia Programming., , , and . ACM Multimedia, page 67-76. ACM, (2014)Value-offset bifiltrations for digital images., , and . Comput. Geom., (2023)Multiculturalism and Muslim Accommodation: Policy and Predisposition Across Three Political Contexts, , , and . Comparative Political Studies, (2016)(ISSP).WTF-PAD: Toward an Efficient Website Fingerprinting Defense for Tor., , , , and . CoRR, (2015)Mockingbird: Defending Against Deep-Learning-Based Website Fingerprinting Attacks With Adversarial Traces., , , and . IEEE Trans. Inf. Forensics Secur., (2021)Recurrent Convolutional Structures for Audio Spoof and Video Deepfake Detection., , , , , , and . IEEE J. Sel. Top. Signal Process., 14 (5): 1024-1037 (2020)Guard Sets in Tor using AS Relationships., , and . Proc. Priv. Enhancing Technol., 2018 (1): 145-165 (2018)