Author of the publication

Image manipulation detection by multiple tampering traces and edge artifact enhancement.

, , , , , , , and . Pattern Recognit., (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CDS-Net: Cooperative dual-stream network for image manipulation detection., , , , and . Pattern Recognit. Lett., (December 2023)Space-Time Variation of Property Crime in Beijing with ESDA Method., and . IWCMC, page 799-804. IEEE, (2019)Suppress and Rebalance: Towards Generalized Multi-Modal Face Anti-Spoofing., , , , , , , and . CoRR, (2024)Context-adaptive matching for optical flow., , , , and . Multimedia Tools Appl., 78 (1): 641-659 (2019)Multi-head enhanced self-attention network for novelty detection., , , , and . Pattern Recognit., (2020)Image manipulation detection by multiple tampering traces and edge artifact enhancement., , , , , , , and . Pattern Recognit., (2023)Multivariate time series anomaly detection with adversarial transformer architecture in the Internet of Things., , , , , and . Future Gener. Comput. Syst., (July 2023)Time-Sensitive Data Processing Strategy for Enhancing the Performance of BFT Consensus Mechanism in IoT Edge Computing Environment., , and . ADMIT, page 181-188. ACM, (2023)Predator - An experience guided configuration optimizer for Hadoop MapReduce., , and . CloudCom, page 419-426. IEEE Computer Society, (2012)Optimizing RSUs Network against Cascading Failure., , , , and . UIC/ATC/ScalCom, page 1670-1675. IEEE Computer Society, (2015)