Search

Your search keyword '"FORGERY"' showing total 232 results

Search Constraints

Start Over You searched for: Descriptor "FORGERY" Remove constraint Descriptor: "FORGERY" Publisher ieee Remove constraint Publisher: ieee
232 results on '"FORGERY"'

Search Results

1. No Thumbs Up in Pictures! Experimental Fingerprint Forgery for Inexperienced Impostors

3. PSCC-Net: Progressive Spatio-Channel Correlation Network for Image Manipulation Detection and Localization.

4. SynSig2Vec: Forgery-Free Learning of Dynamic Signature Representations by Sigma Lognormal-Based Synthesis and 1D CNN.

5. PERFECT: Positional-Forgery Resistant Traffic Gap Estimation for Connected Intersection Management.

6. MSTA-Net: Forgery Detection by Generating Manipulation Trace Based on Multi-Scale Self-Texture Attention.

7. Multi-Task SE-Network for Image Splicing Localization.

8. Two-Stage Copy-Move Forgery Detection With Self Deep Matching and Proposal SuperGlue.

9. Domain-Agnostic Document Authentication Against Practical Recapturing Attacks.

10. LiSiam: Localization Invariance Siamese Network for Deepfake Detection.

11. Detect and Locate: Exposing Face Manipulation by Semantic- and Noise-Level Telltales.

12. Self-Adversarial Training Incorporating Forgery Attention for Image Forgery Localization.

13. Improving Generalization by Commonality Learning in Face Forgery Detection.

14. ForgeryNIR: Deep Face Forgery and Detection in Near-Infrared Scenario.

15. Robust Image Forgery Detection Against Transmission Over Online Social Networks.

16. Blockchain-Integrated Multiagent Deep Reinforcement Learning for Securing Cooperative Adaptive Cruise Control.

17. Forgery Attack Detection in Surveillance Video Streams Using Wi-Fi Channel State Information.

18. Improved Secure Transaction Scheme With Certificateless Cryptographic Primitives for IoT-Based Mobile Payments.

19. ET: Edge-Enhanced Transformer for Image Splicing Detection.

20. IID-Net: Image Inpainting Detection Network via Neural Architecture Search and Attention.

21. eChain: A Blockchain-Enabled Ecosystem for Electronic Device Authenticity Verification.

22. Locking by Untuning: A Lock-Less Approach for Analog and Mixed-Signal IC Security.

23. Spatiotemporal Trident Networks: Detection and Localization of Object Removal Tampering in Video Passive Forensics.

24. Deep Convolutional Neural Network for Identifying Seam-Carving Forgery.

25. Flash-DNA: Identifying NAND Flash Memory Origins Using Intrinsic Array Properties.

26. Image Splicing Detection, Localization and Attribution via JPEG Primary Quantization Matrix Estimation and Clustering.

27. MTD-Net: Learning to Detect Deepfakes Images by Multi-Scale Texture Difference.

28. Copy Move Source-Target Disambiguation Through Multi-Branch CNNs.

29. Intrapersonal Parameter Optimization for Offline Handwritten Signature Augmentation.

30. On Addressing the Impact of ISO Speed Upon PRNU and Forgery Detection.

31. INDFORG: Industrial Forgery Detection Using Automatic Rotation Angle Detection and Correction.

32. Analysis and Improvement of a Certificateless Signature Scheme for Resource-Constrained Scenarios.

33. Sequential and Patch Analyses for Object Removal Video Forgery Detection and Localization.

34. Schnorr-Based Implicit Certification: Improving the Security and Efficiency of Vehicular Communications.

35. TimingCamouflage+: Netlist Security Enhancement With Unconventional Timing.

36. AR-Net: Adaptive Attention and Residual Refinement Network for Copy-Move Forgery Detection.

37. The Hidden Authenticators: Nanometer-Scale Electromechanical Tags Could Thwart Counterfeiters.

38. An Enhanced Symmetric Cryptosystem and Biometric-Based Anonymous User Authentication and Session Key Establishment Scheme for WSN

39. Comments on “SEPDP: Secure and Efficient Privacy Preserving Provable Data Possession in Cloud Storage”.

40. Editorial: Media Authentication and Forensics—New Solutions and Research Opportunities.

41. Exposing Fake Images With Forensic Similarity Graphs.

42. Recurrent Convolutional Structures for Audio Spoof and Video Deepfake Detection.

43. An End-to-End Dense-InceptionNet for Image Copy-Move Forgery Detection.

44. Meta-Learning for Fast Classifier Adaptation to New Users of Signature Verification Systems.

45. Investigating the Common Authorship of Signatures by Off-Line Automatic Signature Verification Without the Use of Reference Signatures.

46. A PUF-Based Data-Device Hash for Tampered Image Detection and Source Camera Identification.

47. Machine Learning for Web Vulnerability Detection: The Case of Cross-Site Request Forgery.

48. Fake But True: Model Maker Roberto Guatelli, Science Museums and Replicated Artifacts of Computing History.

49. Hu-Fu: Replay-Resilient RFID Authentication.

50. EMFORCED: EM-Based Fingerprinting Framework for Remarked and Cloned Counterfeit IC Detection Using Machine Learning Classification.

Catalog

Books, media, physical & digital resources