Author of the publication

An efficient cybersecurity framework for facial video forensics detection based on multimodal deep learning.

, , , , , , and . Neural Comput. Appl., 34 (2): 1251-1268 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Neural-FIR Predictor: Minimum Size Estimation Based on Nonlinearity Analysis of Input Sequence., , and . ICANN, volume 1327 of Lecture Notes in Computer Science, page 1047-1052. Springer, (1997)Two-phase multi-model automatic brain tumour diagnosis system from magnetic resonance images using convolutional neural networks., , , and . EURASIP J. Image Video Process., (2018)Spectral width reduction using apodized cascaded fiber Bragg grating for post-dispersion compensation in WDM optical networks., , , and . Photonic Netw. Commun., 41 (3): 231-241 (2021)Deep Learning Modalities for Biometric Alteration Detection in 5G Networks-Based Secure Smart Cities., , , , , , , and . IEEE Access, (2021)A novel deep learning framework for copy-moveforgery detection in images., , , , , , , , , and . Multim. Tools Appl., 79 (27-28): 19167-19192 (2020)Text-dependent and text-independent speaker recognition of reverberant speech based on CNN., , , , , , , , , and 6 other author(s). Int. J. Speech Technol., 24 (4): 993-1006 (2021)Visual tracking using convolutional features with sparse coding., , , , , and . Artif. Intell. Rev., 54 (5): 3349-3360 (2021)Detection of Abnormal Activities from Various Signals Based on Statistical Analysis., , , , , , , , , and 6 other author(s). Wirel. Pers. Commun., 125 (2): 1013-1046 (2022)Two-Element Pharaonic Ankh-Key Array Antenna Design, Simulation, and Fabrication for 5G and Millimeter-Wave Broadband Applications., , and . IEEE Access, (2022)Cancelable biometric security system based on advanced chaotic maps., , , , , , and . Vis. Comput., 38 (6): 2171-2187 (2022)