Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Absolute and relative entrainment in Mandarin conversations., , and . ICPhS, University of Glasgow, (2015)基于关键词的加密云数据模糊搜索策略研究 (Research on Fuzzy Search over Encrypted Cloud Data Based on Keywords)., , and . 计算机科学, 42 (3): 136-139 (2015)A Survey on Deepfake Video Detection., , , and . IET Biom., 10 (6): 607-624 (2021)Fingerprint Liveness Detection Using an Improved CNN With Image Scale Equalization., , , , , and . IEEE Access, (2019)A Privacy-Preserving Image Retrieval Scheme Using Secure Local Binary Pattern in Cloud Computing., , , , and . IEEE Trans. Netw. Sci. Eng., 8 (1): 318-330 (2021)A Data Integrity Authentication Scheme in WSNs Based on Double Watermark., , , , and . IEEE Internet Things J., 10 (9, May 1): 8245-8256 (2023)Exposing AI-generated videos with motion magnification., , , and . Multim. Tools Appl., 80 (20): 30789-30802 (2021)STR: Secure Computation on Additive Shares Using the Share-Transform-Reveal Strategy., , , , , and . IEEE Trans. Computers, 73 (2): 340-352 (February 2024)Deepfake Fingerprint Detection Model Intellectual Property Protection via Ridge Texture Enhancement., , , , and . IEEE Signal Process. Lett., (2023)Face spoof detection using feature map superposition and CNN., , , , and . Int. J. Comput. Sci. Eng., 22 (2/3): 355-363 (2020)