Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
17 | Edgar González Fernández, Ana Lucila Sandoval Orozco, Luis Javier García-Villalba |
A multi-channel approach for detecting tampering in colour filter images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Expert Syst. Appl. ![In: Expert Syst. Appl. 230, pp. 120498, November 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Qiyuan Zhang, Xiaochen Yuan, Tong Liu, Chan-Tong Lam, Guoheng Huang, Di Lin 0002, Ping Li 0016 |
Tampering localization and self-recovery using block labeling and adaptive significance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Expert Syst. Appl. ![In: Expert Syst. Appl. 226, pp. 120228, September 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Aditya Kumar Sahu, Krishnan Umachandran, Vaishali D. Biradar, Olebara Comfort, V. Sri Vigna Hema, Frank Odimegwu, Saifullah M. A |
A Study on Content Tampering in Multimedia Watermarking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SN Comput. Sci. ![In: SN Comput. Sci. 4(3), pp. 222, May 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Ferreira Daniel Brantes, Cristiane Giovannini, Elizaveta A Gromova, Jorge Brantes Ferreira |
Arbitration chambers and technology: witness tampering and perceived effectiveness in videoconferenced dispute resolution proceedings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Law Inf. Technol. ![In: Int. J. Law Inf. Technol. 31(1), pp. 75-90, July 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Xun Lin, Shuai Wang, Jiahao Deng, Ying Fu, Xiao Bai 0001, Xinlei Chen, Xiaolei Qu, Wenzhong Tang |
Image manipulation detection by multiple tampering traces and edge artifact enhancement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Pattern Recognit. ![In: Pattern Recognit. 133, pp. 109026, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Xiaoqian Shi, Ping Li, Hao Wu, Qidong Chen, Haoyu Zhu |
A lightweight image splicing tampering localization method based on MobileNetV2 and SRM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IET Image Process. ![In: IET Image Process. 17(6), pp. 1883-1892, May 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Zhen Liu |
Image Tampering Recognition Algorithm Based on Improved YOLOv5s. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 11, pp. 95114-95119, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Fahd N. Al-Wesabi, Fadwa M. Alrowais, Heba G. Mohamed, Mesfer Al Duhayyim, Anwer Mustafa Hilal, Abdelwahed Motwakel |
Heuristic Optimization Algorithm Based Watermarking on Content Authentication and Tampering Detection for English Text. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 11, pp. 86104-86111, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Changhui You, Hong Zheng, Zhongyuan Guo, Tianyu Wang, Xiongbin Wu |
Tampering detection and localization base on sample guidance and individual camera device convolutional neural network features. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Expert Syst. J. Knowl. Eng. ![In: Expert Syst. J. Knowl. Eng. 40(1), 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Staffy Kingra, Naveen Aggarwal, Nirmal Kaur |
Emergence of deepfakes and video tampering detection approaches: A survey. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Tools Appl. ![In: Multim. Tools Appl. 82(7), pp. 10165-10209, March 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Yipeng Zhang, Ye Li, Zhoujun Li 0001 |
Aye: A Trusted Forensic Method for Firmware Tampering Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Symmetry ![In: Symmetry 15(1), pp. 145, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Xuting Duan, Huiwen Yan, Daxin Tian, Jianshan Zhou, Jian Su, Wei Hao 0002 |
In-Vehicle CAN Bus Tampering Attacks Detection for Connected and Autonomous Vehicles Using an Improved Isolation Forest Method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Intell. Transp. Syst. ![In: IEEE Trans. Intell. Transp. Syst. 24(2), pp. 2122-2134, February 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Hao Liang 0005, Li Zhu 0002, F. Richard Yu, Xuan Wang |
A Cross-Layer Defense Method for Blockchain Empowered CBTC Systems Against Data Tampering Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Intell. Transp. Syst. ![In: IEEE Trans. Intell. Transp. Syst. 24(1), pp. 501-515, January 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Wei Lu 0001, Wenbo Xu, Ziqi Sheng |
An Interpretable Image Tampering Detection Approach Based on Cooperative Game. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Circuits Syst. Video Technol. ![In: IEEE Trans. Circuits Syst. Video Technol. 33(2), pp. 952-962, February 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Chunyan Zeng, Shuai Kong, Zhifeng Wang, Kun Li, Yuhao Zhao |
Digital Audio Tampering Detection Based on Deep Temporal-Spatial Features of Electrical Network Frequency. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. ![In: Inf. 14(5), pp. 253, May 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Jin Guo 0003, Ruizhe Jia, Ruinan Su, Yanlong Zhao |
Identification of FIR Systems With Binary-Valued Observations Against Data Tampering Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Syst. Man Cybern. Syst. ![In: IEEE Trans. Syst. Man Cybern. Syst. 53(9), pp. 5861-5873, September 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Jianhong Zhang, Chenghe Dong |
Privacy-preserving data aggregation scheme against deletion and tampering attacks from aggregators. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. King Saud Univ. Comput. Inf. Sci. ![In: J. King Saud Univ. Comput. Inf. Sci. 35(4), pp. 100-111, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Md. Rafi Ur Rashid, Vishnu Asutosh Dasu, Kang Gu, Najrin Sultana, Shagufta Mehnaz |
FLTrojan: Privacy Leakage Attacks against Federated Language Models Through Selective Weight Tampering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2310.16152, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Alexander Naumann, Felix Hertlein, Laura Dörr, Kai Furmans |
TAMPAR: Visual Tampering Detection for Parcel Logistics in Postal Supply Chains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2311.03124, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Pengfei Pei, Xianfeng Zhao, Jinchuan Li, Yun Cao |
UVL: A Unified Framework for Video Tampering Localization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2309.16126, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Marco Fabris, Daniel Zelazo |
A Robustness Analysis to Structured Channel Tampering Over Secure-by-Design Consensus Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2306.13427, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Kun Guo, Haochen Zhu, Gang Cao |
Effective Image Tampering Localization via Enhanced Transformer and Co-attention Fusion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2309.09306, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Fabien Roger, Ryan Greenblatt, Max Nadeau, Buck Shlegeris, Nate Thomas |
Measurement Tampering Detection Benchmark. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2308.15605, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Yuqi Wang, Gang Cao, Zijie Lou, Haochen Zhu |
Transferable Adversarial Attack on Image Tampering Localization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2309.10243, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Pranav Mantini, Shishir K. Shah |
A Survey of Feature Types and Their Contributions for Camera Tampering Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2310.07886, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
17 | J. S. Sujin, S. Sophia |
Copy-Move Geometric Tampering Estimation Through Enhanced SIFT Detector Method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Syst. Sci. Eng. ![In: Comput. Syst. Sci. Eng. 44(1), pp. 157-171, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Mathias K. Nilsen, Tønnes F. Nygaard, Kai Olav Ellefsen |
Reward tampering and evolutionary computation: a study of concrete AI-safety problems using evolutionary algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Genet. Program. Evolvable Mach. ![In: Genet. Program. Evolvable Mach. 24(2), pp. 12, December 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Peiyu Zhuang, Haodong Li 0001, Rui Yang 0006, Jiwu Huang |
ReLoc: A Restoration-Assisted Framework for Robust Image Tampering Localization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 18, pp. 5243-5257, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Tahoura Mosavirik, Patrick Schaumont, Shahin Tajik |
ImpedanceVerif: On-Chip Impedance Sensing for System-Level Tampering Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Trans. Cryptogr. Hardw. Embed. Syst. ![In: IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(1), pp. 301-325, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Riyanka Jena, Priyanka Singh, Manoranjan Mohanty |
PP-JPEG: A Privacy-Preserving JPEG Image-Tampering Localization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Imaging ![In: J. Imaging 9(9), pp. 172, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Hsiang-Ping Hsu, Zhong-Ren Jiang, Lo-Ya Li, Tsai-Chuan Tsai, Chao-Hsiang Hung, Sheng-Chain Chang, Syu-Siang Wang, Shih-Hau Fang |
Detection of Audio Tampering Based on Electric Network Frequency Signal. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sensors ![In: Sensors 23(16), pp. 7029, August 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Mamunur Akand, Reihaneh Safavi-Naini, Marc Kneppers, Matthieu Giraud, Pascal Lafourcade 0001 |
Privacy-Preserving Proof-of-Location With Security Against Geo-Tampering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 20(1), pp. 131-146, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Xiaodong Guo, Chenxi Lyu, Zhenyi Chen, Xiaoding Wang, Ruishen Bao, Chen Dong |
Actuation Sequence Tampering Attack Detection on Field-Level Micro-Electrode Dot Arrays Based on 2-Layer Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCNS ![In: Proceedings of the 2023 13th International Conference on Communication and Network Security, ICCNS 2023, Fuzhou, China, December 6-8, 2023, pp. 106-111, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Phondanai Khanti, Pannathorn Sathirasattayanon, Patthranit Kaewcharuay, Nanthayod Termkoh, Ekachai Phaisangittisagul, Kasorn Galajit, Jessada Karnjana |
Speech Watermarking for Tampering Detection Using Singular Spectrum Analysis with a Psychoacoustic Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
O-COCOSDA ![In: 26th Conference of the Oriental COCOSDA International Committee for the Co-ordination and Standardisation of Speech Databases and Assessment Techniques, O-COCOSDA 2023, Delhi, India, December 4-6, 2023, pp. 1-7, 2023, IEEE, 979-8-3503-4402-8. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Rohini Poolat Parameswarath, Nalam Venkata Abhishek, Biplab Sikdar 0001 |
PREVENT: A Mechanism for Preventing Message Tampering Attacks in Electric Vehicle Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VTC2023-Spring ![In: 97th IEEE Vehicular Technology Conference, VTC Spring 2023, Florence, Italy, June 20-23, 2023, pp. 1-5, 2023, IEEE, 979-8-3503-1114-3. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Ram Sundara Raman, Louis-Henri Merino, Kevin Bock 0001, Marwan Fayed, Dave Levin, Nick Sullivan, Luke Valenta |
Global, Passive Detection of Connection Tampering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCOMM ![In: Proceedings of the ACM SIGCOMM 2023 Conference, ACM SIGCOMM 2023, New York, NY, USA, 10-14 September 2023, pp. 622-636, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Hsiang-Ping Hsu, Sheng-Chain Chang, Chao-Hsiang Hung, Syu-Siang Wang, Shih-Hau Fang |
Performance Comparison of Audio Tampering Detection Using Different Datasets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MDM ![In: 24th IEEE International Conference on Mobile Data Management, MDM 2023, Singapore, July 3-6, 2023, pp. 286-290, 2023, IEEE, 979-8-3503-4101-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Weiyi Wei, Futong Zhang, Guo Chen, Huanhuan Lei |
Faster R-CNN image splicing tampering detection based on multilayer feature refinement fusion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICBSP ![In: Proceedings of the 2023 8th International Conference on Biomedical Imaging, Signal Processing, ICBSP 2023, Singapore, Singapore, October 20-22, 2023, pp. 89-96, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Jiaqi Xu, Zhenlong Du, Xiaoli Li 0005, Dong Chen |
Image Tampering Detection Method Based on Swin Transformer and Dense Upsampling Convolution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDIP ![In: Proceedings of the 15th International Conference on Digital Image Processing, ICDIP 2023, Nanjing, China, May 19-22, 2023, pp. 31:1-31:7, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Young Lee, Arlen P. McDonald, Jeong Yang |
Identifying Code Tampering Using A Bytecode Comparison Analysis Tool. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SERA ![In: 21st IEEE/ACIS International Conference on Software Engineering Research, Management and Applications, SERA 2023, Orlando, FL, USA, May 23-25, 2023, pp. 69-76, 2023, IEEE, 979-8-3503-4588-9. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Khasanboy Kodirov, HoonJae Lee, Young Sil Lee |
Blockchain Technology as a Defense Mechanism Against Data Tampering in Smart Vehicle Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IHCI (2) ![In: Intelligent Human Computer Interaction - 15th International Conference, IHCI 2023, Daegu, South Korea, November 8-10, 2023, Revised Selected Papers, Part II, pp. 20-25, 2023, Springer, 978-3-031-53829-2. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Ara Hur, Yeonseung Ryu, Hyunkyoo Park |
Anti-tampering Process for the Protection of Weapon Systems Technology in Korea. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (Workshops 3) ![In: Computational Science and Its Applications - ICCSA 2023 Workshops - Athens, Greece, July 3-6, 2023, Proceedings, Part III, pp. 163-174, 2023, Springer, 978-3-031-37110-3. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Ying Guo, Shan Jiang, JinHong Li |
CSARUNet: an attention mechanism-based model for image tampering localization with ringed residual block. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IJCNN ![In: International Joint Conference on Neural Networks, IJCNN 2023, Gold Coast, Australia, June 18-23, 2023, pp. 1-8, 2023, IEEE, 978-1-6654-8867-9. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
17 | I Luk Kim, Weihang Wang 0001, Yonghwi Kwon 0001, Xiangyu Zhang 0001 |
BFTDETECTOR: Automatic Detection of Business Flow Tampering for Digital Content Service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSE ![In: 45th IEEE/ACM International Conference on Software Engineering, ICSE 2023, Melbourne, Australia, May 14-20, 2023, pp. 448-459, 2023, IEEE, 978-1-6654-5701-9. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Honghui Liu, Rongsheng Xie, Yufeng Zhang |
A DWT Domain High-Fidelity Anti-Tampering Digital Watermarking Algorithm for Medical Image. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCMS ![In: Proceedings of the 15th International Conference on Computer Modeling and Simulation, ICCMS 2023, Dalian, China, June 16-18, 2023, pp. 264-270, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Atoosa Kasirzadeh, Charles Evans |
User Tampering in Reinforcement Learning Recommender Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AIES ![In: Proceedings of the 2023 AAAI/ACM Conference on AI, Ethics, and Society, AIES 2023, Montréal, QC, Canada, August 8-10, 2023, pp. 58-69, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Huiru Shao, Kaizhu Huang, Wei Wang, Xiaowei Huang 0001, Qiufeng Wang |
Progressive Supervision for Tampering Localization in Document Images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICONIP (15) ![In: Neural Information Processing - 30th International Conference, ICONIP 2023, Changsha, China, November 20-23, 2023, Proceedings, Part XV, pp. 140-151, 2023, Springer, 978-981-99-8183-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Gianluca Brian |
Non-malleable secret sharing against joint tampering attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2023 |
RDF |
|
17 | Janine Schneider, Linus Düsel, Benedikt Lorch, Julia Drafz, Felix C. Freiling |
Prudent design principles for digital tampering experiments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digit. Investig. ![In: Digit. Investig. 40(Supplement), pp. 301334, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
17 | Rajan Cristin, Sasi Padma Premnath, John Patrick Ananth |
Image tampering detection in image forensics using earthworm-rider optimization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Concurr. Comput. Pract. Exp. ![In: Concurr. Comput. Pract. Exp. 34(26), 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
17 | Mohassin Ahmad, Farida Khursheed |
Detection and localization of image tampering in digital images with fused features. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Concurr. Comput. Pract. Exp. ![In: Concurr. Comput. Pract. Exp. 34(23), 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
17 | Changsheng Chen, Lin Zhao, Jiabin Yan, Haodong Li 0001 |
A distortion model-based pre-screening method for document image tampering localization under recapturing attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Signal Process. ![In: Signal Process. 200, pp. 108666, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
17 | Pascal Lefèvre, Philippe Carré, Caroline Fontaine, Philippe Gaborit, Jiwu Huang |
Efficient image tampering localization using semi-fragile watermarking and error control codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Signal Process. ![In: Signal Process. 190, pp. 108342, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
17 | Tao Wang 0029, Wei Liu 0142, Luis Valencia-Cabrera, Peng Wang, Xiaoguang Wei, Tianlei Zang |
A novel fault diagnosis method of smart grids based on memory spiking neural P systems considering measurement tampering attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Sci. ![In: Inf. Sci. 596, pp. 520-536, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
17 | Roland Bolboaca |
Adaptive Ensemble Methods for Tampering Detection in Automotive Aftertreatment Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 10, pp. 105497-105517, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
17 | Gejian Zhao, Chuan Qin 0001, Heng Yao, Yanfang Han |
DNN self-embedding watermarking: Towards tampering detection and parameter recovery for deep neural network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Pattern Recognit. Lett. ![In: Pattern Recognit. Lett. 164, pp. 16-22, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
17 | Rajesh Kumar Shrivastava, Simar Preet Singh, Mohammad Kamrul Hasan, Gagandeep, Shayla Islam, Salwani Abdullah, Azana Hafizah Mohd Aman |
Securing Internet of Things devices against code tampering attacks using Return Oriented Programming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Commun. ![In: Comput. Commun. 193, pp. 38-46, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
17 | Alluvenkateswara Rao, Chanamallu Srinivasa Rao, Dharma Raj Cheruku |
Differentiating digital image forensics and tampering localization by a novel hybrid approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Tools Appl. ![In: Multim. Tools Appl. 81(13), pp. 18693-18713, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
17 | Yangxia Hu, Wenhuan Lu, Maode Ma, Qilong Sun, Jianguo Wei |
A semi fragile watermarking algorithm based on compressed sensing applied for audio tampering detection and recovery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Tools Appl. ![In: Multim. Tools Appl. 81(13), pp. 17729-17746, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
17 | Piroska Haller, Béla Genge, Fabrizio Forloni, Gianmarco Baldini, Massimo Carriero, Georgios Fontaras |
VetaDetect: Vehicle tampering detection with closed-loop model ensemble. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Crit. Infrastructure Prot. ![In: Int. J. Crit. Infrastructure Prot. 37, pp. 100525, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
17 | Piroska Haller, Béla Genge, Fabrizio Forloni, Gianmarco Baldini, Massimo Carriero, Georgios Fontaras |
Corrigendum to 'VetaDetect: Vehicle tampering detection with closed-loop model ensemble' International Journal of Critical Infrastructure Protection, 37 (2022), 100525. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Crit. Infrastructure Prot. ![In: Int. J. Crit. Infrastructure Prot. 38, pp. 100543, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
17 | Tae-Hyung Kim, Cheol Woo Park, Il Kyu Eom |
Frame Identification of Object-Based Video Tampering Using Symmetrically Overlapped Motion Residual. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Symmetry ![In: Symmetry 14(2), pp. 364, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
17 | Kai Yang, Haining Wang, Hongsong Zhu, Limin Sun |
An effective intrusion-resilient mechanism for programmable logic controllers against data tampering attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Ind. ![In: Comput. Ind. 138, pp. 103613, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
17 | Marco Fabris, Daniel Zelazo |
Secure Consensus via Objective Coding: Robustness Analysis to Channel Tampering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Syst. Man Cybern. Syst. ![In: IEEE Trans. Syst. Man Cybern. Syst. 52(12), pp. 7885-7897, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
17 | Chunyan Zeng, Yao Yang, Zhifeng Wang, Shuai Kong, Shixiong Feng |
Audio Tampering Forensics Based on Representation Learning of ENF Phase Sequence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Digit. Crime Forensics ![In: Int. J. Digit. Crime Forensics 14(1), pp. 1-19, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
17 | Wenjin Wang, Xinghua Liu, Yuxin Zhang, Jia Liu, Ping Jiang |
Study on the detection and recovery algorithm of important financial information tampering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Commun. Technol. ![In: Int. J. Inf. Commun. Technol. 21(3), pp. 317-332, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
17 | Junke Wang, Zhenxin Li, Chao Zhang, Jingjing Chen, Zuxuan Wu, Larry S. Davis, Yu-Gang Jiang |
Fighting Malicious Media Data: A Survey on Tampering Detection and Deepfake Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2212.05667, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
17 | Haochen Zhu, Gang Cao, Mo Zhao |
Effective Image Tampering Localization via Semantic Segmentation Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2208.13739, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
17 | Tahir Hassan, Aras Asaad, Dashti Ali, Sabah Jassim |
Artificial Image Tampering Distorts Spatial Distribution of Texture Landmarks and Quality Characteristics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2208.02710, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
17 | Zhifeng Wang, Yao Yang, Chunyan Zeng, Shuai Kong, Shixiong Feng, Nan Zhao 0006 |
Audio Tampering Detection Based on Shallow and Deep Feature Representation Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2210.10506, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
17 | Chunyan Zeng, Shuai Kong, Zhifeng Wang, Xiangkui Wan, Yunfan Chen |
Digital Audio Tampering Detection Based on ENF Spatio-temporal Features Representation Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2208.11920, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
17 | Peiyu Zhuang, Haodong Li 0001, Rui Yang 0006, Jiwu Huang |
ReLoc: A Restoration-Assisted Framework for Robust Image Tampering Localization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2211.03930, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
17 | Anwer Mustafa Hilal, Fahd N. Al-Wesabi, Manar Ahmed Hamza, Mohammed Medani, Khalid Mahmood 0005, Mohammad Mahzari |
Content authentication and tampering detection of Arabic text: an approach based on zero-watermarking and natural language processing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Pattern Anal. Appl. ![In: Pattern Anal. Appl. 25(1), pp. 47-62, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
17 | K. Sunitha, Krishna A. N, B. G. Prasad |
Copy-move tampering detection using keypoint based hybrid feature extraction and improved transformation model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Appl. Intell. ![In: Appl. Intell. 52(13), pp. 15405-15416, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
17 | Jan Richter-Brockmann, Jakob Feldtkeller, Pascal Sasdrich, Tim Güneysu |
VERICA - Verification of Combined Attacks Automated formal verification of security against simultaneous information leakage and tampering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Trans. Cryptogr. Hardw. Embed. Syst. ![In: IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(4), pp. 255-284, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
17 | Gianluca Brian, Sebastian Faust, Elena Micheli, Daniele Venturi 0001 |
Continuously Non-Malleable Codes against Bounded-Depth Tampering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2022, pp. 1231, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
17 | Jan Richter-Brockmann, Jakob Feldtkeller, Pascal Sasdrich, Tim Güneysu |
VERICA - Verification of Combined Attacks: Automated formal verification of security against simultaneous information leakage and tampering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2022, pp. 484, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
17 | Tahoura Mosavirik, Patrick Schaumont, Shahin Tajik |
ImpedanceVerif: On-Chip Impedance Sensing for System-Level Tampering Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2022, pp. 946, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
17 | Zhifeng Wang, Yao Yang, Chunyan Zeng, Shuai Kong, Shixiong Feng, Nan Zhao 0006 |
Shallow and deep feature fusion for digital audio tampering detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EURASIP J. Adv. Signal Process. ![In: EURASIP J. Adv. Signal Process. 2022(1), pp. 69, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
17 | Zhiping Zeng, Zhizheng Wu 0001 |
Audio Splicing Localization: Can We Accurately Locate the Splicing Tampering? ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCSLP ![In: 13th International Symposium on Chinese Spoken Language Processing, ISCSLP 2022, Singapore, December 11-14, 2022, pp. 120-124, 2022, IEEE, 979-8-3503-9796-3. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
17 | Victor Fedoseev, Anna Denisova |
Reversible Fragile Medical Image Watermarking Scheme Resistant to Malicious Tampering Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMPROVE ![In: Proceedings of the 2nd International Conference on Image Processing and Vision Engineering, IMPROVE 2022, Online Streaming, April 22-24, 2022., pp. 57-65, 2022, SCITEPRESS, 978-989-758-563-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
17 | Alexander Gamero-Garrido, Esteban Carisimo, Shuai Hao 0001, Bradley Huffaker, Alex C. Snoeren, Alberto Dainotti |
Quantifying Nations' Exposure to Traffic Observation and Selective Tampering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PAM ![In: Passive and Active Measurement - 23rd International Conference, PAM 2022, Virtual Event, March 28-30, 2022, Proceedings, pp. 645-674, 2022, Springer, 978-3-030-98784-8. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
17 | Taisei Awaji, Rintaro Tashima, Ryogo Kubo |
Detection and Mitigation of Data Tampering Attacks for Cooperative ACC Systems Based on C-V2X. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCE-TW ![In: IEEE International Conference on Consumer Electronics - Taiwan, ICCE-TW 2022, Taipei, Taiwan, July 6-8, 2022, pp. 149-150, 2022, IEEE, 978-1-6654-7050-6. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
17 | Zhengguang Zhang, Marwan Krunz |
SIGTAM: A Tampering Attack on Wi-Fi Preamble Signaling and Countermeasures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CNS ![In: 10th IEEE Conference on Communications and Network Security, CNS 2022, Austin, TX, USA, October 3-5, 2022, pp. 1-9, 2022, IEEE, 978-1-6654-6255-6. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
17 | G. Melendez-Melendez, René Cumplido |
Reversible Image Authentication Scheme with Tampering Reconstruction Based on Very Deep Super Resolution Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MICAI (1) ![In: Advances in Computational Intelligence - 21st Mexican International Conference on Artificial Intelligence, MICAI 2022, Monterrey, Mexico, October 24-29, 2022, Proceedings, Part I, pp. 308-326, 2022, Springer, 978-3-031-19492-4. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
17 | Yuchao Deng |
Utilizing Sensitive Features for Image Tampering Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISCAE ![In: 5th IEEE International Conference on Information Systems and Computer Aided Education, ICISCAE 2022, Dalian, China, September 23-25, 2022, pp. 109-112, 2022, IEEE, 978-1-6654-8122-9. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
17 | Yuling Luo, Ce Liang, Shunsheng Zhang, Sheng Qin |
A Combined Feature Encoding Network with Semantic Enhancement for Image Tampering Forensics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IFIP Int. Conf. Digital Forensics ![In: Advances in Digital Forensics XVIII - 18th IFIP WG 11.9 International Conference, Virtual Event, January 3-4, 2022, Revised Selected Papers, pp. 107-121, 2022, Springer, 978-3-031-10077-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
17 | Robin Elizabeth Yancey |
Deep Learning for Localization of Mixed Image Tampering Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSSIP ![In: 29th International Conference on Systems, Signals and Image Processing, IWSSIP 2022, Sofia, Bulgaria, June 1-3, 2022, pp. 1-4, 2022, IEEE, 978-1-6654-9578-3. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
17 | Cheng Xiong, Guorui Feng, Xinran Li, Xinpeng Zhang 0001, Chuan Qin 0001 |
Neural Network Model Protection with Piracy Identification and Tampering Localization Capability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Multimedia ![In: MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10 - 14, 2022, pp. 2881-2889, 2022, ACM, 978-1-4503-9203-7. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
17 | Gianluca Brian, Sebastian Faust, Elena Micheli, Daniele Venturi 0001 |
Continuously Non-malleable Codes Against Bounded-Depth Tampering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT (4) ![In: Advances in Cryptology - ASIACRYPT 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part IV, pp. 384-413, 2022, Springer, 978-3-031-22971-8. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
17 | Roland Bolboaca, Piroska Haller, Dimitris Kontses, Alexandros Papageorgiou-Koutoulas, Stylianos Doulgeris, Nikolaos Zingopis, Zissis Samaras |
Tampering Detection for Automotive Exhaust Aftertreatment Systems using Long Short-Term Memory Predictive Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroS&P Workshops ![In: IEEE European Symposium on Security and Privacy, EuroS&P 2022 - Workshops, Genoa, Italy, June 6-10, 2022, pp. 358-367, 2022, IEEE, 978-1-6654-9560-8. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
17 | Qi Xing, Yun Luo, Zhaoyuan Zhang, Fan Zhang |
Video Inter-frame Tampering Detection Based on SN-VGG+BiLSTM-AE Composite Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIT ![In: Proceedings of the 2022 10th International Conference on Information Technology: IoT and Smart City, ICIT 2022, Shanghai, China, December 23-25, 2022, pp. 80-87, 2022, ACM, 978-1-4503-9743-8. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
17 | Xiaochen Tang, Shanshan Liu 0001, Wenjie Che, Wei Tang 0002 |
Tampering Attack Detection in Analog to Feature Converter for Wearable Biosensor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS ![In: IEEE International Symposium on Circuits and Systems, ISCAS 2022, Austin, TX, USA, May 27 - June 1, 2022, pp. 1150-1154, 2022, IEEE, 978-1-6654-8485-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
17 | Xiangyu Fan, Jilong Yang, Wei Zhao, Jincheng Deng, Fangming Liu |
Webpage Tampering Detection Method Based on BiGRU-CRF-RCNN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CNCERT ![In: Cyber Security - 19th China Annual Conference, CNCERT 2022, Beijing, China, August 16-17, 2022, Revised Selected Papers, pp. 113-126, 2022, Springer, 978-981-19-8284-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
17 | Zhihui Zhao, Yicheng Zeng, Jinfa Wang, Hong Li 0004, Hongsong Zhu, Limin Sun |
Detection and Incentive: A Tampering Detection Mechanism for Object Detection in Edge Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SRDS ![In: 41st International Symposium on Reliable Distributed Systems, SRDS 2022, Vienna, Austria, September 19-22, 2022, pp. 166-177, 2022, IEEE, 978-1-6654-9753-4. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
17 | Xianghong Li |
An anti-tampering model of sensitive data in link network based on blockchain technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Web Intell. ![In: Web Intell. 19(3), pp. 227-237, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
17 | Tom Everitt, Marcus Hutter, Ramana Kumar, Victoria Krakovna |
Reward tampering problems and solutions in reinforcement learning: a causal influence diagram perspective. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Synth. ![In: Synth. 198(27), pp. 6435-6467, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
17 | Xiaofeng Wang, Qian Zhang, Chuntao Jiang, Jianru Xue |
Perceptual hash-based coarse-to-fine grained image tampering forensics method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Vis. Commun. Image Represent. ![In: J. Vis. Commun. Image Represent. 78, pp. 103124, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
17 | Cheol Woo Park, Yong Ho Moon, Il Kyu Eom |
Image Tampering Localization Using Demosaicing Patterns and Singular Value Based Prediction Residue. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 9, pp. 91921-91933, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
17 | Kento Aida, Kenta Yamada, Ryosuke Hotchi, Ryogo Kubo |
Dynamic Network Path Provisioning and Selection for the Detection and Mitigation of Data Tampering Attacks in Networked Control Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 9, pp. 147430-147441, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|