Author of the publication

Attribution of Gradient Based Adversarial Attacks for Reverse Engineering of Deceptions.

, , , , , and . Media Watermarking, Security, and Forensics, Society for Imaging Science and Technology, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploiting Spatial Structure for Localizing Manipulated Image Regions., , , , and . ICCV, page 4980-4989. IEEE Computer Society, (2017)Malware Detection Using Frequency Domain-Based Image Visualization and Deep Learning., , , , and . HICSS, page 1-10. ScholarSpace, (2021)Detection, Attribution and Localization of GAN Generated Images., , , , , and . CoRR, (2020)SATTVA: SpArsiTy inspired classificaTion of malware VAriants., , and . IH&MMSec, page 135-140. ACM, (2015)Features we trust!, , and . ICIP, page 3476-3480. IEEE, (2015)Precise localization of key-points to identify local regions for robust data hiding., , and . ICIP, page 3681-3684. IEEE, (2010)Detection of seam carving and localization of seam insertions in digital images., , and . MM&Sec, page 107-116. ACM, (2009)Improving re-sampling detection by adding noise., , and . Media Forensics and Security, volume 7541 of SPIE Proceedings, page 75410I. SPIE, (2010)SeeTheSeams: Localized Detection of Seam Carving based Image Forgery in Satellite Imagery., , , , and . CoRR, (2021)HAPSSA: Holistic Approach to PDF malware detection using Signal and Statistical Analysis., , , , and . MILCOM, page 709-714. IEEE, (2021)