Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SAR despeckling based on soft classification., , , and . IGARSS, page 2378-2381. IEEE, (2015)Image forgery localization through the fusion of camera-based, feature-based and pixel-based techniques., , and . ICIP, page 5302-5306. IEEE, (2014)The 1st Competition on Counter Measures to Finger Vein Spoofing Attacks., , , , , , , , , and . ICB, page 513-518. IEEE, (2015)Do GANs Leave Artificial Fingerprints?, , , and . MIPR, page 506-511. IEEE, (2019)Analysis of Adversarial Attacks against CNN-based Image Forgery Detectors., , , and . EUSIPCO, page 967-971. IEEE, (2018)Scale Invariant Descriptor for Content Based Image Retrieval in Biomedical Applications., , and . SITIS, page 199-203. IEEE Computer Society, (2016)Biometric Spoofing Detection by a Domain-Aware Convolutional Neural Network., , , and . SITIS, page 193-198. IEEE Computer Society, (2016)On-Chip Spike Detection and Classification using Neural Networks and Approximate Computing., , , and . BioCAS, page 1-5. IEEE, (2023)An Unsupervised Approach for Eye Sclera Segmentation., , , and . CIARP, volume 10657 of Lecture Notes in Computer Science, page 550-557. Springer, (2017)A Full-Image Full-Resolution End-to-End-Trainable CNN Framework for Image Forgery Detection., , , and . IEEE Access, (2020)