Author of the publication

A Copy-Move Forgery Detection Scheme with Improved Clone Region Estimation.

, , , and . TSA, page 8-16. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Copy-Move Forgery Detection Scheme with Improved Clone Region Estimation., , , and . TSA, page 8-16. IEEE, (2016)TaintMan: An ART-Compatible Dynamic Taint Analysis Framework on Unmodified and Non-Rooted Android Devices., , , , and . IEEE Trans. Dependable Secur. Comput., 17 (1): 209-222 (2020)一种基于动态插桩的JavaScript反事实执行方法 (JavaScript Counterfactual Execution Method Based on Dynamic Instrumentation)., , , , and . 计算机科学, 44 (11): 22-26 (2017)Cecoin: A decentralized PKI mitigating MitM attacks., , , , , and . Future Gener. Comput. Syst., (2020)Network traffic monitoring, analysis and anomaly detection Guest Editorial., , , , and . IEEE Netw., 25 (3): 6-7 (2011)MVP: Detecting Vulnerabilities using Patch-Enhanced Vulnerability Signatures., , , , , , , , , and 1 other author(s). USENIX Security Symposium, page 1165-1182. USENIX Association, (2020)On the fine-grained fingerprinting threat to software-defined networks., , , , , and . Future Gener. Comput. Syst., (2020)Deep Text Classification Can be Fooled., , , , , and . CoRR, (2017)Asymmetric Cross-cryptosystem Re-encryption Applicable to Efficient and Secure Mobile Access to Outsourced Data., , , , , and . AsiaCCS, page 393-404. ACM, (2015)Corrections to "Detecting Bugs by Discovering Expectations and Their Violations"., , , , , and . IEEE Trans. Software Eng., 46 (1): 113 (2020)