Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Machine Learning-Based Digital Twin for Anti-Counterfeiting Applications With Copy Detection Patterns., , , , , , , and . IEEE Trans. Inf. Forensics Secur., (2024)Machine learning attack on copy detection patterns: are 1x1 patterns cloneable?, , , , , and . CoRR, (2021)Correction: Mobile authentication of copy detection patterns., , , , , and . EURASIP J. Inf. Secur., 2023 (1): 8 (December 2023)Authentication of Copy Detection Patterns: A Pattern Reliability Based Approach., , , , , , and . IEEE Trans. Inf. Forensics Secur., (2024)Mobile authentication of copy detection patterns., , , , , and . CoRR, (2022)Mathematical model of printing-imaging channel for blind detection of fake copy detection patterns., , , , , , and . WIFS, page 1-6. IEEE, (2022)Machine learning attack on copy detection patterns: are $11$ patterns cloneable?, , , , , and . WIFS, page 1-6. IEEE, (2021)Digital twins of physical printing-imaging channel., , , , , , and . WIFS, page 1-6. IEEE, (2022)Authentication Of Copy Detection Patterns Under Machine Learning Attacks: A Supervised Approach., , , , , , and . ICIP, page 1296-1300. IEEE, (2022)Mobile authentication of copy detection patterns., , , , , and . EURASIP J. Inf. Secur., 2023 (1): 4 (December 2023)