345 results on '"Martin Steinebach"'
Search Results
2. Improved identification of check-worthiness in social media data through multimodal analyses.
3. Adapter fusion for check-worthiness detection - combining a task adapter with a NER adapter.
4. Unveiling the Darkness: Analysing Organised Crime on the Wall Street Market Darknet Marketplace using PGP Public Keys.
5. Natural Language Steganography by ChatGPT.
6. Robustness and Collision-Resistance of PhotoDNA.
7. KI-generierte Abbildungen von Kindesmissbrauch.
8. A Photo and a Few Spoken Words Is All It Needs?! On the Challenges of Targeted Deepfake Attacks and Their Detection.
9. Unveiling the Potential of BERTopic for Multilingual Fake News Analysis - Use Case: Covid-19.
10. An Analysis of PhotoDNA.
11. Scraping and Analyzing Data of a Large Darknet Marketplace.
12. Image Hashing Robust Against Cropping and Rotation.
13. Deepfakes, Dall-E & Co.
14. Erkennung von Kindesmissbrauch in Medien.
15. Cultural assets identification using transfer learning.
16. Recognition of objects from looted excavations by smartphone app and deep learning.
17. Image montage detection based on image segmentation and robust hashing techniques.
18. Smartphone-supported integrity verification of printed documents.
19. NoiseSeg: An image splicing localization fusion CNN with noise extraction and error level analysis branches.
20. Natural Language Processing (NLP) und der Datenschutz - Chancen und Risiken für den Schutz der Privatheit.
21. Towards Image Hashing Robust Against Cropping and Rotation.
22. Data Acquisition on a Large Darknet Marketplace.
23. Using Telegram as a carrier for image steganography: Analysing Telegrams API limits.
24. Audio captcha breaking and consequences for human users.
25. Privacy preserving leak detection in peer-to-peer communication.
26. Predicting positions of flipped bits in robust image hashes.
27. Detection of deepfakes using background-matching.
28. Fraunhofer SIT@SMM4H'22: Learning to Predict Stances and Premises in Tweets related to COVID-19 Health Orders Using Generative Models.
29. Technische Herausforderungen bei der Umsetzung von Uploadfiltern.
30. Comparison of Cyber Attacks on Services in the Clearnet and Darknet.
31. Discovery of Single-Vendor Marketplace Operators in the Tor-Network.
32. exHide: Hiding Data within the exFAT File System.
33. JAB Code - A Versatile Polychrome 2D Barcode.
34. Privacy-enhanced robust image hashing with bloom filters.
35. Non-blind steganalysis.
36. Critical traffic analysis on the tor network.
37. Detecting double compression and splicing using benfords first digit law.
38. Privacy-Enhanced Robust Image Hashing with Bloom Filters.
39. Critical Traffic Analysis on the Tor Network.
40. Cover-aware Steganalysis.
41. Verwendung computergenerierter Kinderpornografie zu Ermittlungszwecken im Darknet.
42. Automatisierte Analyse Radikaler Inhalte im Internet.
43. Privacy and Robust Hashes.
44. Improved Manipulation Detection with Convolutional Neural Network for JPEG Images.
45. Fake News Detection by Image Montage Recognition.
46. Detection and Analysis of Tor Onion Services.
47. Privacy and Robust Hashes Privacy-Preserving Forensics for Image Re-Identification.
48. Fake News Detection by Image Montage Recognition.
49. Detection and Analysis of Tor Onion Services.
50. Video Source Identification from MP4 Data Based on Field Values in Atom/Box Attributes.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.