Author of the publication

Controlling Neural Learning Network with Multiple Scales for Image Splicing Forgery Detection.

, , , , , and . ACM Trans. Multim. Comput. Commun. Appl., 16 (4): 124:1-124:22 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Secure Document Self-Destruction Scheme: An ABE Approach., , , , and . HPCC/EUC, page 59-64. IEEE, (2013)Lightweight Outsourced Privacy-Preserving Heart Failure Prediction Based on GRU., , , , and . ICA3PP (2), volume 11945 of Lecture Notes in Computer Science, page 521-536. Springer, (2019)Cross-domain dynamic anonymous authenticated group key management with symptom-matching for e-health social system., , , , and . Future Gener. Comput. Syst., (2018)PRAM: privacy preserving access management scheme in cloud services., , , , , and . SCC@ASIACCS, page 41-46. ACM, (2013)A Secure Flexible and Tampering-Resistant Data Sharing System for Vehicular Social Networks., , , , , and . IEEE Trans. Veh. Technol., 69 (11): 12938-12950 (2020)Verifiable online/offline multi-keyword search for cloud-assisted Industrial Internet of Things., , , , and . J. Inf. Secur. Appl., (2022)When Evolutionary Computation Meets Privacy., , , , , and . IEEE Comput. Intell. Mag., 19 (1): 66-74 (February 2024)Achieving Trust-Based and Privacy-Preserving Customer Selection in Ubiquitous Computing., , , , , , and . CoRR, (2019)When Evolutionary Computation Meets Privacy., , , , , and . CoRR, (2023)MaskBlock: Transferable Adversarial Examples with Bayes Approach., , , and . CoRR, (2022)