Author of the publication

You Can Clone But You Cannot Hide: A Survey of Clone Prevention and Detection for RFID.

, , , , and . IEEE Commun. Surv. Tutorials, 19 (3): 1682-1700 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

High performance and security in cloud computing., , and . Concurr. Comput. Pract. Exp., (2017)A Utility Model for Photo Selection in Mobile Crowdsensing., , , and . IEEE Trans. Mob. Comput., 20 (1): 48-62 (2021)Image splicing localization using residual image and residual-based fully convolutional network., , , , , and . J. Vis. Commun. Image Represent., (2020)A Robust and Power-Efficient SoC Implementation in 65 nm., , , , , and . J. Comput. Sci. Technol., 28 (4): 682-688 (2013)Privacy-Preserving Krawtchouk Moment feature extraction over encrypted image data., , , , , , and . Inf. Sci., (2020)Locally GAN-generated face detection based on an improved Xception., , , , , and . Inf. Sci., (2021)Fractional discrete Tchebyshev moments and their applications in image encryption and watermarking., , , , and . Inf. Sci., (2020)PIVOT: An adaptive information discovery framework for computational grids., , , , and . Inf. Sci., 180 (23): 4543-4556 (2010)Controlling Neural Learning Network with Multiple Scales for Image Splicing Forgery Detection., , , , , and . ACM Trans. Multim. Comput. Commun. Appl., 16 (4): 124:1-124:22 (2021)A Novel Multi-Sample Generation Method for Adversarial Attacks., , , , and . ACM Trans. Multim. Comput. Commun. Appl., 18 (4): 112:1-112:21 (2022)