Author of the publication

Behavior forensics with side information for multimedia fingerprinting social networks.

, , and . IEEE Trans. Inf. Forensics Secur., 4 (4): 911-927 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Extrinsic Channel-Like Fingerprinting Overlays Using Subspace Embedding., , , and . IEEE Trans. Inf. Forensics Secur., 6 (4): 1355-1369 (2011)Behavior forensics with side information for multimedia fingerprinting social networks., , and . IEEE Trans. Inf. Forensics Secur., 4 (4): 911-927 (2009)Extrinsic Channel-Like Fingerprint Embedding for Authenticating MIMO Systems., , , and . IEEE Trans. Wirel. Commun., 10 (12): 4270-4281 (2011)Game-Theoretic Strategies and Equilibriums in Multimedia Fingerprinting Social Networks., , and . IEEE Trans. Multim., 13 (2): 191-205 (2011)Modulation forensics for wireless digital communications., and . ICASSP, page 1789-1792. IEEE, (2008)Digital image source coder forensics via intrinsic fingerprints., , , and . IEEE Trans. Inf. Forensics Secur., 4 (3): 460-475 (2009)Best-Effort Cooperative Relaying., , , and . IEEE Trans. Wirel. Commun., 10 (6): 1833-1843 (2011)Cooperation and Coalition in Multimedia Fingerprinting Colluder Social Networks., , and . IEEE Trans. Multim., 14 (3-2): 717-733 (2012)A game theoretic framework for incentive-based peer-to-peer live-streaming social networks., , and . ICASSP, page 2141-2144. IEEE, (2008)Uncovering insider threats from the digital footprints of individuals., , , , , , , , , and 4 other author(s). IBM J. Res. Dev., 60 (4): 8 (2016)