Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Targeted Speech Adversarial Example Generation With Generative Adversarial Network., , , , and . IEEE Access, (2020)Quantization Step Parity-based Steganography for MP3 Audio., , and . Fundam. Informaticae, 97 (1-2): 1-14 (2009)Semi-Supervised Semantic Segmentation with Cross Teacher Training., , , , , , and . CoRR, (2022)Iteratively Generated Adversarial Perturbation for Audio Stego Post-processing., , and . WIFS, page 1-6. IEEE, (2021)Identification of Synthetic Spoofed Speech with Deep Capsule Network., , , and . FCS, volume 1558 of Communications in Computer and Information Science, page 257-265. Springer, (2021)Robust Document Image Forgery Localization Against Image Blending., , , , and . TrustCom, page 810-817. IEEE, (2022)Reversible Data Hiding for Audio Based on Prediction Error Expansion., and . IIH-MSP, page 249-252. IEEE Computer Society, (2008)Source Cell-Phone Identification Using Spectral Features of Device Self-noise., , , , , and . IWDW, volume 10082 of Lecture Notes in Computer Science, page 29-45. (2016)Source smartphone identification by exploiting encoding characteristics of recorded speech., , and . Digital Investigation, (2019)A novel detection scheme for MP3Stego with low payload., , , , and . ChinaSIP, page 602-606. IEEE, (2014)