Author of the publication

Hierarchical Neural Networks for Detecting Anomalous Traffic Flows.

, , , and . GLOBECOM, page 1-6. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Source camcorder identification from cropped and scaled videos., , , , , and . Media Watermarking, Security, and Forensics, volume 8303 of SPIE Proceedings, page 83030E. SPIE, (2012)Hierarchical Neural Networks for Detecting Anomalous Traffic Flows., , , and . GLOBECOM, page 1-6. IEEE, (2019)Screenshot identification using combing artifact from interlaced video., , , , and . MM&Sec, page 49-54. ACM, (2010)Electrophotographic printer identification by halftone texture analysis., , , , and . ICASSP, page 1846-1849. IEEE, (2010)Detection of Copy-Rotate-Move Forgery Using Zernike Moments., , and . Information Hiding, volume 6387 of Lecture Notes in Computer Science, page 51-65. Springer, (2010)Detection of Upscale-Crop and Partial Manipulation in Surveillance Video Based on Sensor Pattern Noise., , , and . Sensors, 13 (9): 12605-12631 (2013)Document Forgery Detection with SVM Classifier and Image Quality Measures., , , and . PCM, volume 5353 of Lecture Notes in Computer Science, page 486-495. Springer, (2008)Improved Watermark Estimation Scheme Based on Neighborhood Filter., , , , and . IIH-MSP, page 55-58. IEEE Computer Society, (2010)Invisible logo watermarking using visualization of spread spectrum signal on high-definition video., , and . ISPA, page 218-223. IEEE, (2011)Detecting Re-captured Videos Using Shot-Based Photo Response Non-Uniformity., , , , , and . IWDW, volume 7128 of Lecture Notes in Computer Science, page 281-291. Springer, (2011)