The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for tampering with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1984-1999 (18) 2000-2001 (17) 2002-2003 (32) 2004 (20) 2005 (33) 2006 (44) 2007 (56) 2008 (55) 2009 (29) 2010 (18) 2011 (23) 2012 (16) 2013 (22) 2014 (29) 2015 (23) 2016 (31) 2017 (35) 2018 (43) 2019 (53) 2020 (47) 2021 (50) 2022 (47) 2023 (50) 2024 (15)
Publication types (Num. hits)
article(319) incollection(2) inproceedings(481) phdthesis(4)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 323 occurrences of 220 keywords

Results
Found 806 publication records. Showing 806 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
17Edgar González Fernández, Ana Lucila Sandoval Orozco, Luis Javier García-Villalba A multi-channel approach for detecting tampering in colour filter images. Search on Bibsonomy Expert Syst. Appl. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Qiyuan Zhang, Xiaochen Yuan, Tong Liu, Chan-Tong Lam, Guoheng Huang, Di Lin 0002, Ping Li 0016 Tampering localization and self-recovery using block labeling and adaptive significance. Search on Bibsonomy Expert Syst. Appl. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Aditya Kumar Sahu, Krishnan Umachandran, Vaishali D. Biradar, Olebara Comfort, V. Sri Vigna Hema, Frank Odimegwu, Saifullah M. A A Study on Content Tampering in Multimedia Watermarking. Search on Bibsonomy SN Comput. Sci. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Ferreira Daniel Brantes, Cristiane Giovannini, Elizaveta A Gromova, Jorge Brantes Ferreira Arbitration chambers and technology: witness tampering and perceived effectiveness in videoconferenced dispute resolution proceedings. Search on Bibsonomy Int. J. Law Inf. Technol. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Xun Lin, Shuai Wang, Jiahao Deng, Ying Fu, Xiao Bai 0001, Xinlei Chen, Xiaolei Qu, Wenzhong Tang Image manipulation detection by multiple tampering traces and edge artifact enhancement. Search on Bibsonomy Pattern Recognit. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Xiaoqian Shi, Ping Li, Hao Wu, Qidong Chen, Haoyu Zhu A lightweight image splicing tampering localization method based on MobileNetV2 and SRM. Search on Bibsonomy IET Image Process. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Zhen Liu Image Tampering Recognition Algorithm Based on Improved YOLOv5s. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Fahd N. Al-Wesabi, Fadwa M. Alrowais, Heba G. Mohamed, Mesfer Al Duhayyim, Anwer Mustafa Hilal, Abdelwahed Motwakel Heuristic Optimization Algorithm Based Watermarking on Content Authentication and Tampering Detection for English Text. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Changhui You, Hong Zheng, Zhongyuan Guo, Tianyu Wang, Xiongbin Wu Tampering detection and localization base on sample guidance and individual camera device convolutional neural network features. Search on Bibsonomy Expert Syst. J. Knowl. Eng. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Staffy Kingra, Naveen Aggarwal, Nirmal Kaur Emergence of deepfakes and video tampering detection approaches: A survey. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Yipeng Zhang, Ye Li, Zhoujun Li 0001 Aye: A Trusted Forensic Method for Firmware Tampering Attacks. Search on Bibsonomy Symmetry The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Xuting Duan, Huiwen Yan, Daxin Tian, Jianshan Zhou, Jian Su, Wei Hao 0002 In-Vehicle CAN Bus Tampering Attacks Detection for Connected and Autonomous Vehicles Using an Improved Isolation Forest Method. Search on Bibsonomy IEEE Trans. Intell. Transp. Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Hao Liang 0005, Li Zhu 0002, F. Richard Yu, Xuan Wang A Cross-Layer Defense Method for Blockchain Empowered CBTC Systems Against Data Tampering Attacks. Search on Bibsonomy IEEE Trans. Intell. Transp. Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Wei Lu 0001, Wenbo Xu, Ziqi Sheng An Interpretable Image Tampering Detection Approach Based on Cooperative Game. Search on Bibsonomy IEEE Trans. Circuits Syst. Video Technol. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Chunyan Zeng, Shuai Kong, Zhifeng Wang, Kun Li, Yuhao Zhao Digital Audio Tampering Detection Based on Deep Temporal-Spatial Features of Electrical Network Frequency. Search on Bibsonomy Inf. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Jin Guo 0003, Ruizhe Jia, Ruinan Su, Yanlong Zhao Identification of FIR Systems With Binary-Valued Observations Against Data Tampering Attacks. Search on Bibsonomy IEEE Trans. Syst. Man Cybern. Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Jianhong Zhang, Chenghe Dong Privacy-preserving data aggregation scheme against deletion and tampering attacks from aggregators. Search on Bibsonomy J. King Saud Univ. Comput. Inf. Sci. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Md. Rafi Ur Rashid, Vishnu Asutosh Dasu, Kang Gu, Najrin Sultana, Shagufta Mehnaz FLTrojan: Privacy Leakage Attacks against Federated Language Models Through Selective Weight Tampering. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Alexander Naumann, Felix Hertlein, Laura Dörr, Kai Furmans TAMPAR: Visual Tampering Detection for Parcel Logistics in Postal Supply Chains. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Pengfei Pei, Xianfeng Zhao, Jinchuan Li, Yun Cao UVL: A Unified Framework for Video Tampering Localization. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Marco Fabris, Daniel Zelazo A Robustness Analysis to Structured Channel Tampering Over Secure-by-Design Consensus Networks. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Kun Guo, Haochen Zhu, Gang Cao Effective Image Tampering Localization via Enhanced Transformer and Co-attention Fusion. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Fabien Roger, Ryan Greenblatt, Max Nadeau, Buck Shlegeris, Nate Thomas Measurement Tampering Detection Benchmark. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Yuqi Wang, Gang Cao, Zijie Lou, Haochen Zhu Transferable Adversarial Attack on Image Tampering Localization. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Pranav Mantini, Shishir K. Shah A Survey of Feature Types and Their Contributions for Camera Tampering Detection. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17J. S. Sujin, S. Sophia Copy-Move Geometric Tampering Estimation Through Enhanced SIFT Detector Method. Search on Bibsonomy Comput. Syst. Sci. Eng. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Mathias K. Nilsen, Tønnes F. Nygaard, Kai Olav Ellefsen Reward tampering and evolutionary computation: a study of concrete AI-safety problems using evolutionary algorithms. Search on Bibsonomy Genet. Program. Evolvable Mach. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Peiyu Zhuang, Haodong Li 0001, Rui Yang 0006, Jiwu Huang ReLoc: A Restoration-Assisted Framework for Robust Image Tampering Localization. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Tahoura Mosavirik, Patrick Schaumont, Shahin Tajik ImpedanceVerif: On-Chip Impedance Sensing for System-Level Tampering Detection. Search on Bibsonomy IACR Trans. Cryptogr. Hardw. Embed. Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Riyanka Jena, Priyanka Singh, Manoranjan Mohanty PP-JPEG: A Privacy-Preserving JPEG Image-Tampering Localization. Search on Bibsonomy J. Imaging The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Hsiang-Ping Hsu, Zhong-Ren Jiang, Lo-Ya Li, Tsai-Chuan Tsai, Chao-Hsiang Hung, Sheng-Chain Chang, Syu-Siang Wang, Shih-Hau Fang Detection of Audio Tampering Based on Electric Network Frequency Signal. Search on Bibsonomy Sensors The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Mamunur Akand, Reihaneh Safavi-Naini, Marc Kneppers, Matthieu Giraud, Pascal Lafourcade 0001 Privacy-Preserving Proof-of-Location With Security Against Geo-Tampering. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Xiaodong Guo, Chenxi Lyu, Zhenyi Chen, Xiaoding Wang, Ruishen Bao, Chen Dong Actuation Sequence Tampering Attack Detection on Field-Level Micro-Electrode Dot Arrays Based on 2-Layer Authentication. Search on Bibsonomy ICCNS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Phondanai Khanti, Pannathorn Sathirasattayanon, Patthranit Kaewcharuay, Nanthayod Termkoh, Ekachai Phaisangittisagul, Kasorn Galajit, Jessada Karnjana Speech Watermarking for Tampering Detection Using Singular Spectrum Analysis with a Psychoacoustic Model. Search on Bibsonomy O-COCOSDA The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Rohini Poolat Parameswarath, Nalam Venkata Abhishek, Biplab Sikdar 0001 PREVENT: A Mechanism for Preventing Message Tampering Attacks in Electric Vehicle Networks. Search on Bibsonomy VTC2023-Spring The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Ram Sundara Raman, Louis-Henri Merino, Kevin Bock 0001, Marwan Fayed, Dave Levin, Nick Sullivan, Luke Valenta Global, Passive Detection of Connection Tampering. Search on Bibsonomy SIGCOMM The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Hsiang-Ping Hsu, Sheng-Chain Chang, Chao-Hsiang Hung, Syu-Siang Wang, Shih-Hau Fang Performance Comparison of Audio Tampering Detection Using Different Datasets. Search on Bibsonomy MDM The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Weiyi Wei, Futong Zhang, Guo Chen, Huanhuan Lei Faster R-CNN image splicing tampering detection based on multilayer feature refinement fusion. Search on Bibsonomy ICBSP The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Jiaqi Xu, Zhenlong Du, Xiaoli Li 0005, Dong Chen Image Tampering Detection Method Based on Swin Transformer and Dense Upsampling Convolution. Search on Bibsonomy ICDIP The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Young Lee, Arlen P. McDonald, Jeong Yang Identifying Code Tampering Using A Bytecode Comparison Analysis Tool. Search on Bibsonomy SERA The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Khasanboy Kodirov, HoonJae Lee, Young Sil Lee Blockchain Technology as a Defense Mechanism Against Data Tampering in Smart Vehicle Systems. Search on Bibsonomy IHCI (2) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Ara Hur, Yeonseung Ryu, Hyunkyoo Park Anti-tampering Process for the Protection of Weapon Systems Technology in Korea. Search on Bibsonomy ICCSA (Workshops 3) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Ying Guo, Shan Jiang, JinHong Li CSARUNet: an attention mechanism-based model for image tampering localization with ringed residual block. Search on Bibsonomy IJCNN The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17I Luk Kim, Weihang Wang 0001, Yonghwi Kwon 0001, Xiangyu Zhang 0001 BFTDETECTOR: Automatic Detection of Business Flow Tampering for Digital Content Service. Search on Bibsonomy ICSE The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Honghui Liu, Rongsheng Xie, Yufeng Zhang A DWT Domain High-Fidelity Anti-Tampering Digital Watermarking Algorithm for Medical Image. Search on Bibsonomy ICCMS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Atoosa Kasirzadeh, Charles Evans User Tampering in Reinforcement Learning Recommender Systems. Search on Bibsonomy AIES The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Huiru Shao, Kaizhu Huang, Wei Wang, Xiaowei Huang 0001, Qiufeng Wang Progressive Supervision for Tampering Localization in Document Images. Search on Bibsonomy ICONIP (15) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Gianluca Brian Non-malleable secret sharing against joint tampering attacks. Search on Bibsonomy 2023   RDF
17Janine Schneider, Linus Düsel, Benedikt Lorch, Julia Drafz, Felix C. Freiling Prudent design principles for digital tampering experiments. Search on Bibsonomy Digit. Investig. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
17Rajan Cristin, Sasi Padma Premnath, John Patrick Ananth Image tampering detection in image forensics using earthworm-rider optimization. Search on Bibsonomy Concurr. Comput. Pract. Exp. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
17Mohassin Ahmad, Farida Khursheed Detection and localization of image tampering in digital images with fused features. Search on Bibsonomy Concurr. Comput. Pract. Exp. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
17Changsheng Chen, Lin Zhao, Jiabin Yan, Haodong Li 0001 A distortion model-based pre-screening method for document image tampering localization under recapturing attack. Search on Bibsonomy Signal Process. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
17Pascal Lefèvre, Philippe Carré, Caroline Fontaine, Philippe Gaborit, Jiwu Huang Efficient image tampering localization using semi-fragile watermarking and error control codes. Search on Bibsonomy Signal Process. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
17Tao Wang 0029, Wei Liu 0142, Luis Valencia-Cabrera, Peng Wang, Xiaoguang Wei, Tianlei Zang A novel fault diagnosis method of smart grids based on memory spiking neural P systems considering measurement tampering attacks. Search on Bibsonomy Inf. Sci. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
17Roland Bolboaca Adaptive Ensemble Methods for Tampering Detection in Automotive Aftertreatment Systems. Search on Bibsonomy IEEE Access The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
17Gejian Zhao, Chuan Qin 0001, Heng Yao, Yanfang Han DNN self-embedding watermarking: Towards tampering detection and parameter recovery for deep neural network. Search on Bibsonomy Pattern Recognit. Lett. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
17Rajesh Kumar Shrivastava, Simar Preet Singh, Mohammad Kamrul Hasan, Gagandeep, Shayla Islam, Salwani Abdullah, Azana Hafizah Mohd Aman Securing Internet of Things devices against code tampering attacks using Return Oriented Programming. Search on Bibsonomy Comput. Commun. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
17Alluvenkateswara Rao, Chanamallu Srinivasa Rao, Dharma Raj Cheruku Differentiating digital image forensics and tampering localization by a novel hybrid approach. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
17Yangxia Hu, Wenhuan Lu, Maode Ma, Qilong Sun, Jianguo Wei A semi fragile watermarking algorithm based on compressed sensing applied for audio tampering detection and recovery. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
17Piroska Haller, Béla Genge, Fabrizio Forloni, Gianmarco Baldini, Massimo Carriero, Georgios Fontaras VetaDetect: Vehicle tampering detection with closed-loop model ensemble. Search on Bibsonomy Int. J. Crit. Infrastructure Prot. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
17Piroska Haller, Béla Genge, Fabrizio Forloni, Gianmarco Baldini, Massimo Carriero, Georgios Fontaras Corrigendum to 'VetaDetect: Vehicle tampering detection with closed-loop model ensemble' International Journal of Critical Infrastructure Protection, 37 (2022), 100525. Search on Bibsonomy Int. J. Crit. Infrastructure Prot. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
17Tae-Hyung Kim, Cheol Woo Park, Il Kyu Eom Frame Identification of Object-Based Video Tampering Using Symmetrically Overlapped Motion Residual. Search on Bibsonomy Symmetry The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
17Kai Yang, Haining Wang, Hongsong Zhu, Limin Sun An effective intrusion-resilient mechanism for programmable logic controllers against data tampering attacks. Search on Bibsonomy Comput. Ind. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
17Marco Fabris, Daniel Zelazo Secure Consensus via Objective Coding: Robustness Analysis to Channel Tampering. Search on Bibsonomy IEEE Trans. Syst. Man Cybern. Syst. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
17Chunyan Zeng, Yao Yang, Zhifeng Wang, Shuai Kong, Shixiong Feng Audio Tampering Forensics Based on Representation Learning of ENF Phase Sequence. Search on Bibsonomy Int. J. Digit. Crime Forensics The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
17Wenjin Wang, Xinghua Liu, Yuxin Zhang, Jia Liu, Ping Jiang Study on the detection and recovery algorithm of important financial information tampering. Search on Bibsonomy Int. J. Inf. Commun. Technol. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
17Junke Wang, Zhenxin Li, Chao Zhang, Jingjing Chen, Zuxuan Wu, Larry S. Davis, Yu-Gang Jiang Fighting Malicious Media Data: A Survey on Tampering Detection and Deepfake Detection. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
17Haochen Zhu, Gang Cao, Mo Zhao Effective Image Tampering Localization via Semantic Segmentation Network. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
17Tahir Hassan, Aras Asaad, Dashti Ali, Sabah Jassim Artificial Image Tampering Distorts Spatial Distribution of Texture Landmarks and Quality Characteristics. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
17Zhifeng Wang, Yao Yang, Chunyan Zeng, Shuai Kong, Shixiong Feng, Nan Zhao 0006 Audio Tampering Detection Based on Shallow and Deep Feature Representation Learning. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
17Chunyan Zeng, Shuai Kong, Zhifeng Wang, Xiangkui Wan, Yunfan Chen Digital Audio Tampering Detection Based on ENF Spatio-temporal Features Representation Learning. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
17Peiyu Zhuang, Haodong Li 0001, Rui Yang 0006, Jiwu Huang ReLoc: A Restoration-Assisted Framework for Robust Image Tampering Localization. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
17Anwer Mustafa Hilal, Fahd N. Al-Wesabi, Manar Ahmed Hamza, Mohammed Medani, Khalid Mahmood 0005, Mohammad Mahzari Content authentication and tampering detection of Arabic text: an approach based on zero-watermarking and natural language processing. Search on Bibsonomy Pattern Anal. Appl. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
17K. Sunitha, Krishna A. N, B. G. Prasad Copy-move tampering detection using keypoint based hybrid feature extraction and improved transformation model. Search on Bibsonomy Appl. Intell. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
17Jan Richter-Brockmann, Jakob Feldtkeller, Pascal Sasdrich, Tim Güneysu VERICA - Verification of Combined Attacks Automated formal verification of security against simultaneous information leakage and tampering. Search on Bibsonomy IACR Trans. Cryptogr. Hardw. Embed. Syst. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
17Gianluca Brian, Sebastian Faust, Elena Micheli, Daniele Venturi 0001 Continuously Non-Malleable Codes against Bounded-Depth Tampering. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
17Jan Richter-Brockmann, Jakob Feldtkeller, Pascal Sasdrich, Tim Güneysu VERICA - Verification of Combined Attacks: Automated formal verification of security against simultaneous information leakage and tampering. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
17Tahoura Mosavirik, Patrick Schaumont, Shahin Tajik ImpedanceVerif: On-Chip Impedance Sensing for System-Level Tampering Detection. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
17Zhifeng Wang, Yao Yang, Chunyan Zeng, Shuai Kong, Shixiong Feng, Nan Zhao 0006 Shallow and deep feature fusion for digital audio tampering detection. Search on Bibsonomy EURASIP J. Adv. Signal Process. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
17Zhiping Zeng, Zhizheng Wu 0001 Audio Splicing Localization: Can We Accurately Locate the Splicing Tampering? Search on Bibsonomy ISCSLP The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
17Victor Fedoseev, Anna Denisova Reversible Fragile Medical Image Watermarking Scheme Resistant to Malicious Tampering Attacks. Search on Bibsonomy IMPROVE The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
17Alexander Gamero-Garrido, Esteban Carisimo, Shuai Hao 0001, Bradley Huffaker, Alex C. Snoeren, Alberto Dainotti Quantifying Nations' Exposure to Traffic Observation and Selective Tampering. Search on Bibsonomy PAM The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
17Taisei Awaji, Rintaro Tashima, Ryogo Kubo Detection and Mitigation of Data Tampering Attacks for Cooperative ACC Systems Based on C-V2X. Search on Bibsonomy ICCE-TW The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
17Zhengguang Zhang, Marwan Krunz SIGTAM: A Tampering Attack on Wi-Fi Preamble Signaling and Countermeasures. Search on Bibsonomy CNS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
17G. Melendez-Melendez, René Cumplido Reversible Image Authentication Scheme with Tampering Reconstruction Based on Very Deep Super Resolution Network. Search on Bibsonomy MICAI (1) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
17Yuchao Deng Utilizing Sensitive Features for Image Tampering Detection. Search on Bibsonomy ICISCAE The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
17Yuling Luo, Ce Liang, Shunsheng Zhang, Sheng Qin A Combined Feature Encoding Network with Semantic Enhancement for Image Tampering Forensics. Search on Bibsonomy IFIP Int. Conf. Digital Forensics The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
17Robin Elizabeth Yancey Deep Learning for Localization of Mixed Image Tampering Techniques. Search on Bibsonomy IWSSIP The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
17Cheng Xiong, Guorui Feng, Xinran Li, Xinpeng Zhang 0001, Chuan Qin 0001 Neural Network Model Protection with Piracy Identification and Tampering Localization Capability. Search on Bibsonomy ACM Multimedia The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
17Gianluca Brian, Sebastian Faust, Elena Micheli, Daniele Venturi 0001 Continuously Non-malleable Codes Against Bounded-Depth Tampering. Search on Bibsonomy ASIACRYPT (4) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
17Roland Bolboaca, Piroska Haller, Dimitris Kontses, Alexandros Papageorgiou-Koutoulas, Stylianos Doulgeris, Nikolaos Zingopis, Zissis Samaras Tampering Detection for Automotive Exhaust Aftertreatment Systems using Long Short-Term Memory Predictive Networks. Search on Bibsonomy EuroS&P Workshops The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
17Qi Xing, Yun Luo, Zhaoyuan Zhang, Fan Zhang Video Inter-frame Tampering Detection Based on SN-VGG+BiLSTM-AE Composite Model. Search on Bibsonomy ICIT The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
17Xiaochen Tang, Shanshan Liu 0001, Wenjie Che, Wei Tang 0002 Tampering Attack Detection in Analog to Feature Converter for Wearable Biosensor. Search on Bibsonomy ISCAS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
17Xiangyu Fan, Jilong Yang, Wei Zhao, Jincheng Deng, Fangming Liu Webpage Tampering Detection Method Based on BiGRU-CRF-RCNN. Search on Bibsonomy CNCERT The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
17Zhihui Zhao, Yicheng Zeng, Jinfa Wang, Hong Li 0004, Hongsong Zhu, Limin Sun Detection and Incentive: A Tampering Detection Mechanism for Object Detection in Edge Computing. Search on Bibsonomy SRDS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
17Xianghong Li An anti-tampering model of sensitive data in link network based on blockchain technology. Search on Bibsonomy Web Intell. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
17Tom Everitt, Marcus Hutter, Ramana Kumar, Victoria Krakovna Reward tampering problems and solutions in reinforcement learning: a causal influence diagram perspective. Search on Bibsonomy Synth. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
17Xiaofeng Wang, Qian Zhang, Chuntao Jiang, Jianru Xue Perceptual hash-based coarse-to-fine grained image tampering forensics method. Search on Bibsonomy J. Vis. Commun. Image Represent. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
17Cheol Woo Park, Yong Ho Moon, Il Kyu Eom Image Tampering Localization Using Demosaicing Patterns and Singular Value Based Prediction Residue. Search on Bibsonomy IEEE Access The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
17Kento Aida, Kenta Yamada, Ryosuke Hotchi, Ryogo Kubo Dynamic Network Path Provisioning and Selection for the Detection and Mitigation of Data Tampering Attacks in Networked Control Systems. Search on Bibsonomy IEEE Access The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
Displaying result #101 - #200 of 806 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license