Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
17 | Abdullah L. Shah, Ali T. Al-Awami, Wessam Mesbah |
Time Skew Mitigation in Smart Meters for Tampering Detection and Correction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Instrum. Meas. ![In: IEEE Trans. Instrum. Meas. 70, pp. 1-15, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
17 | Da-Wen Huang, Wanping Liu, Jichao Bi |
Data tampering attacks diagnosis in dynamic wireless sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Commun. ![In: Comput. Commun. 172, pp. 84-92, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
17 | Thi-Ngoc-Canh Doan, Florent Retraint, Cathel Zitzmann |
Image tampering detection based on a statistical model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Tools Appl. ![In: Multim. Tools Appl. 80(21), pp. 32905-32924, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
17 | Hanen Rhayma, Achraf Makhloufi, Habib Hamam, Ahmed Ben Hamida |
Semi-fragile watermarking scheme based on perceptual hash function (PHF) for image tampering detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Tools Appl. ![In: Multim. Tools Appl. 80(17), pp. 26813-26832, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
17 | Guo-Dong Su, Chin-Chen Chang 0001, Chih-Cheng Chen |
A hybrid-Sudoku based fragile watermarking scheme for image tampering detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Tools Appl. ![In: Multim. Tools Appl. 80(8), pp. 12881-12903, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
17 | Qiu-yu Zhang, Deng-hai Zhang, Fu-jiu Xu |
An encrypted speech authentication and tampering recovery method based on perceptual hashing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Tools Appl. ![In: Multim. Tools Appl. 80(16), pp. 24925-24948, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
17 | Raphaël C.-W. Phan, Yin Yin Low, KokSheik Wong, Kazuki Minemura |
Strengthening speech content authentication against tampering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Speech Commun. ![In: Speech Commun. 129, pp. 41-57, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
17 | R. Padma Priya, Aditya Tiwari, Ayushi Pandey, Siddharth Krishna 0002 |
Identifying Video Tampering using Watermarked Blockchain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Perform. Eng. ![In: Int. J. Perform. Eng. 17(8), pp. 722, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
17 | Jin Guo 0003, Xuebin Wang, Wenchao Xue 0001, Yanlong Zhao |
System Identification With Binary-Valued Observations Under Data Tampering Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Autom. Control. ![In: IEEE Trans. Autom. Control. 66(8), pp. 3825-3832, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
17 | Alessio Merlo, Antonio Ruggia, Luigi Sciolla, Luca Verderame |
ARMAND: Anti-Repackaging through Multi-pattern Anti-tampering based on Native Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Pervasive Mob. Comput. ![In: Pervasive Mob. Comput. 76, pp. 101443, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
17 | Quanxin Yang, Dongjin Yu, Zhuxi Zhang, Ye Yao, Linqiang Chen |
Spatiotemporal Trident Networks: Detection and Localization of Object Removal Tampering in Video Passive Forensics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Circuits Syst. Video Technol. ![In: IEEE Trans. Circuits Syst. Video Technol. 31(10), pp. 4131-4144, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
17 | Digambar Pawar, Mayank Gajpal |
Image Forensic Tool (IFT): Image Retrieval, Tampering Detection, and Classification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Digit. Crime Forensics ![In: Int. J. Digit. Crime Forensics 13(6), pp. 1-15, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
17 | Yongzhen Ke, Yiping Cui |
Multiple Fusion Strategies in Localization of Local Deformation Tampering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Digit. Crime Forensics ![In: Int. J. Digit. Crime Forensics 13(2), pp. 103-114, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
17 | Ayush Jain 0002, Ziqi Zhou, Ujjwal Guin |
TAAL: Tampering Attack on Any Key-based Logic Locked Circuits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Design Autom. Electr. Syst. ![In: ACM Trans. Design Autom. Electr. Syst. 26(4), pp. 28:1-28:22, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
17 | Duilio Balsamo, Paolo Bajardi, Alberto Salomone, Rossano Schifanella |
Patterns of Routes of Administration and Drug Tampering for Nonmedical Opioid Consumption: Data Mining and Content Analysis of Reddit Discussions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2102.11235, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
17 | Charles Evans, Atoosa Kasirzadeh |
User Tampering in Reinforcement Learning Recommender Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2109.04083, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
17 | Bishshoy Das, Milton Mondal, Brejesh Lall, Shiv Dutt Joshi, Sumantra Dutta Roy |
Softmax Gradient Tampering: Decoupling the Backward Pass for Improved Fitting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2111.12495, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
17 | Ahmed M. Nagm, Mohamed Torky, Mohammed Mahmoud Abo Ghazala, Hosam Eldin Fawzan Sayed |
Image Protection against Forgery and Pixel Tampering based on a Triple Hybrid Security Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2110.09520, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
17 | Polychronis Charitidis, Giorgos Kordopatis-Zilos, Symeon Papadopoulos, Ioannis Kompatsiaris |
Operation-wise Attention Network for Tampering Localization Fusion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2105.05515, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
17 | Alexander Gamero-Garrido, Esteban Carisimo, Shuai Hao 0001, Bradley Huffaker, Alex C. Snoeren, Alberto Dainotti |
Quantifying Nations Exposure to Traffic Observation and Selective Tampering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2110.05772, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
17 | Marco Fabris, Daniel Zelazo |
Secure Consensus via Objective Coding: Robustness Analysis to Channel Tampering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2107.04276, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
17 | Wei Liu 0137 |
Correlation analysis for illegal tampering image evidence detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Internet Technol. Lett. ![In: Internet Technol. Lett. 4(3), 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
17 | Peiyu Zhuang, Haodong Li 0001, Shunquan Tan, Bin Li 0011, Jiwu Huang |
Image Tampering Localization Using a Dense Fully Convolutional Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 16, pp. 2986-2999, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
17 | Gianluca Brian, Antonio Faonio, Daniele Venturi 0001 |
Continuously Non-Malleable Secret Sharing: Joint Tampering, Plain Model and Capacity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2021, pp. 1128, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
17 | Sebastian Gonzalez, Andres Valenzuela, Juan E. Tapia |
Hybrid Two-Stage Architecture for Tampering Detection of Chipless ID Cards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Biom. Behav. Identity Sci. ![In: IEEE Trans. Biom. Behav. Identity Sci. 3(1), pp. 89-100, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
17 | Han Pu, Tianqiang Huang, Bin Weng 0001, Feng Ye, Chenbin Zhao |
Overcome the Brightness and Jitter Noises in Video Inter-Frame Tampering Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sensors ![In: Sensors 21(12), pp. 3953, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
17 | Poh Yuen Chan, Alexander I-Chi Lai, Pei-Yuan Wu, Ruey-Beei Wu |
Physical Tampering Detection Using Single COTS Wi-Fi Endpoint. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sensors ![In: Sensors 21(16), pp. 5665, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
17 | Xiaochen Yuan, Xinhang Li, Tong Liu |
Gauss-Jordan elimination-based image tampering detection and self-recovery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Signal Process. Image Commun. ![In: Signal Process. Image Commun. 90, pp. 116038, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
17 | Jiaxin Chen, Xin Liao, Zheng Qin 0001 |
Identifying tampering operations in image operator chains based on decision fusion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Signal Process. Image Commun. ![In: Signal Process. Image Commun. 95, pp. 116287, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
17 | Qiang Zeng 0001, Lannan Luo, Zhiyun Qian, Xiaojiang Du, Zhoujun Li 0001, Chin-Tser Huang, Csilla Farkas |
Resilient User-Side Android Application Repackaging and Tampering Detection Using Cryptographically Obfuscated Logic Bombs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 18(6), pp. 2582-2600, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
17 | Shengbei Wang, Weitao Yuan, Zhen Zhang, Jianming Wang, Masashi Unoki |
Tampering Detection for Speech Signals Using Synchronization Code and LSF-based Watermarks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APSIPA ASC ![In: Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, APSIPA ASC 2021, Tokyo, Japan, December 14-17, 2021, pp. 1621-1626, 2021, IEEE, 978-988-14768-9-0. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
17 | Polychronis Charitidis, Giorgos Kordopatis-Zilos, Symeon Papadopoulos, Ioannis Kompatsiaris |
Operation-wise Attention Network for Tampering Localization Fusion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CBMI ![In: 18th International Conference on Content-Based Multimedia Indexing, CBMI 2021, Lille, France, June 28-30, 2021, pp. 1-6, 2021, IEEE, 978-1-6654-4220-6. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
17 | Toshiki Itagaki, Yuki Funabiki, Toru Akishita |
Robust Image Hashing for Detecting Small Tampering Using a Hyperrectangular Region. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WIFS ![In: IEEE International Workshop on Information Forensics and Security, WIFS 2021, Montpellier, France, December 7-10, 2021, pp. 1-6, 2021, IEEE, 978-1-6654-1717-4. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
17 | José Miguel Blanco 0002, Bruno Rossi 0001, Tomás Pitner |
A Time-Sensitive Model for Data Tampering Detection for the Advanced Metering Infrastructure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FedCSIS ![In: Proceedings of the 16th Conference on Computer Science and Intelligence Systems, Online, September 2-5, 2021., pp. 511-519, 2021, 978-83-959183-6-0. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
17 | Gianluca Brian, Antonio Faonio, Daniele Venturi 0001 |
Continuously Non-malleable Secret Sharing: Joint Tampering, Plain Model and Capacity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC (2) ![In: Theory of Cryptography - 19th International Conference, TCC 2021, Raleigh, NC, USA, November 8-11, 2021, Proceedings, Part II, pp. 333-364, 2021, Springer, 978-3-030-90452-4. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
17 | Aditya Kumar Pathak, Saguna, Karan Mitra, Christer Åhlund |
Anomaly Detection using Machine Learning to Discover Sensor Tampering in IoT Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: ICC 2021 - IEEE International Conference on Communications, Montreal, QC, Canada, June 14-23, 2021, pp. 1-6, 2021, IEEE, 978-1-7281-7122-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
17 | Haodong Li 0001, Xiaoming Chen, Peiyu Zhuang, Bin Li 0011 |
Image Tampering Localization Using Unified Two-Stream Features Enhanced with Channel and Spatial Attention. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PRCV (2) ![In: Pattern Recognition and Computer Vision - 4th Chinese Conference, PRCV 2021, Beijing, China, October 29 - November 1, 2021, Proceedings, Part II, pp. 610-622, 2021, Springer, 978-3-030-88006-4. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
17 | Kha-Tu Huynh, Tu-Nga Ly, Thuong Le-Tien |
A Deep Learning-Based Method for Image Tampering Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FDSE (CCIS Volume) ![In: Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications - 8th International Conference, FDSE 2021, Virtual Event, November 24-26, 2021, Proceedings, pp. 170-184, 2021, Springer, 978-981-16-8061-8. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
17 | Zhenyu Xu, Thomas Mauldin, Qing Yang 0001, Tao Wei |
Runtime Detection of Probing/Tampering on Interconnecting Buses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCCM ![In: 29th IEEE Annual International Symposium on Field-Programmable Custom Computing Machines, FCCM 2021, Orlando, FL, USA, May 9-12, 2021, pp. 247-251, 2021, IEEE, 978-1-6654-3555-0. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
17 | Archana V. Mire, Shaveta Malik, Srushti Jichkar |
Tampering Localization Using Divergence in First Digit Probability Distribution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HIS ![In: Hybrid Intelligent Systems - 21st International Conference on Hybrid Intelligent Systems (HIS 2021), December 14-16, 2021, pp. 575-584, 2021, Springer, 978-3-030-96304-0. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
17 | Swapnil S. Chaughule, Dalila B. Megherbi |
A DWT-Based Blind Robust High Capacity and Secure Digital Watermarking and Information Hiding Scheme for Image Authentication, Tampering Localization and Automatic Self-Recovery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIVEMSA ![In: IEEE International Conference on Computational Intelligence and Virtual Environments for Measurement Systems and Applications, CIVEMSA 2021, Hong Kong, China, June 18-20, 2021, pp. 1-6, 2021, IEEE, 978-1-6654-1249-0. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
17 | Tobiasz Wróbel, Michal Kedziora, Michal Szczepanik, Piotr P. Józwiak, Alicja M. Józwiak, Jolanta Mizera-Pietraszko |
Progressive Mobile Web Application Subresource Tampering During Penetration Testing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA (1) ![In: Advanced Information Networking and Applications - Proceedings of the 35th International Conference on Advanced Information Networking and Applications (AINA-2021), Toronto, ON, Canada, 12-14 May, 2021, Volume 1., pp. 297-306, 2021, Springer, 978-3-030-75099-2. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
17 | Dana Dachman-Soled, Ilan Komargodski, Rafael Pass |
Non-malleable Codes for Bounded Parallel-Time Tampering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO (3) ![In: Advances in Cryptology - CRYPTO 2021 - 41st Annual International Cryptology Conference, CRYPTO 2021, Virtual Event, August 16-20, 2021, Proceedings, Part III, pp. 535-565, 2021, Springer, 978-3-030-84251-2. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
17 | Beibei Yu, Mingnan Hu, Zhe Sun, Bo Chen 0003 |
Data Tampering Attack Design for ROS-Based Object Detection and Tracking Robotic Platform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCAIS ![In: 2021 International Conference on Control, Automation and Information Sciences, ICCAIS 2021, Xi'an, China, October 14-17, 2021, pp. 159-164, 2021, IEEE, 978-1-6654-4029-5. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
17 | Marshall Ball |
On Resilience to Computable Tampering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2021 |
DOI RDF |
|
17 | Jianfei Sun, Hu Xiong, Shufan Zhang, Ximeng Liu, Jiaming Yuan, Robert H. Deng |
A Secure Flexible and Tampering-Resistant Data Sharing System for Vehicular Social Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Veh. Technol. ![In: IEEE Trans. Veh. Technol. 69(11), pp. 12938-12950, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
17 | Pamela Johnston, Eyad Elyan, Chrisina Jayne |
Video tampering localisation using features learned from authentic content. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Neural Comput. Appl. ![In: Neural Comput. Appl. 32(16), pp. 12243-12257, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
17 | Stefano Berlato, Mariano Ceccato |
A large-scale study on the adoption of anti-debugging and anti-tampering protections in android apps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Secur. Appl. ![In: J. Inf. Secur. Appl. 52, pp. 102463, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
17 | Fahd N. Al-Wesabi, Khalid Mahmood 0005, Nadhem Nemri |
A zero watermarking approach for content authentication and tampering detection of Arabic text based on fourth level order and word mechanism of Markov model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Secur. Appl. ![In: J. Inf. Secur. Appl. 52, pp. 102473, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
17 | Janine Schneider, Julian Wolf 0003, Felix C. Freiling |
Tampering with Digital Evidence is Hard: The Case of Main Memory Images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digit. Investig. ![In: Digit. Investig. 32 Supplement, pp. 300924, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
17 | Wei Wang 0305, Aydin Sadeqi, Hojatollah Rezaei Nejad, Sameer Sonkusale |
Cost-Effective Wireless Sensors for Detection of Package Opening and Tampering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 8, pp. 117122-117132, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
17 | Guo-Dong Su, Chin-Chen Chang 0001, Chia-Chen Lin 0001 |
Effective Self-Recovery and Tampering Localization Fragile Watermarking for Medical Images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 8, pp. 160840-160857, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
17 | Bilal Thonnam Thodi, Timothy Mulumba, Saif Eddin Jabari |
Noticeability Versus Impact in Traffic Signal Tampering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 8, pp. 86149-86161, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
17 | Shuai Ren, Tao Zhang 0088, Meng Wang 0030, Khurram Shahzad |
Identifiable Tampering Multi-Carrier Image Information Hiding Algorithm Based on Compressed Sensing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 8, pp. 214992-215009, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
17 | Hitesh D. Panchal, Hitesh B. Shah |
Video tampering dataset development in temporal domain for video forgery authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Tools Appl. ![In: Multim. Tools Appl. 79(33-34), pp. 24553-24577, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
17 | Sami Bourouis, Roobaea Alroobaea, Abdullah M. Alharbi, Murad Andejany, Saeed Rubaiee |
Recent Advances in Digital Multimedia Tampering Detection for Forensics Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Symmetry ![In: Symmetry 12(11), pp. 1811, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
17 | Saeed Mahloujifar, Dimitrios I. Diochnos, Mohammad Mahmoody |
Learning under p-tampering poisoning attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Ann. Math. Artif. Intell. ![In: Ann. Math. Artif. Intell. 88(7), pp. 759-792, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
17 | Marshall Ball, Eshan Chattopadhyay, Jyun-Jie Liao, Tal Malkin, Li-Yang Tan |
Non-Malleability against Polynomial Tampering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Electron. Colloquium Comput. Complex. ![In: Electron. Colloquium Comput. Complex. TR20, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
17 | Tamzidul Hoque, Kai Yang 0028, Robert Karam, Shahin Tajik, Domenic Forte, Mark M. Tehranipoor, Swarup Bhunia |
Hidden in Plaintext: An Obfuscation-based Countermeasure against FPGA Bitstream Tampering Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Design Autom. Electr. Syst. ![In: ACM Trans. Design Autom. Electr. Syst. 25(1), pp. 4:1-4:32, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
17 | Ziyue Xiang, Daniel E. Acuna |
Scientific Image Tampering Detection Based On Noise Inconsistencies: A Method And Datasets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2001.07799, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
17 | Ramana Kumar, Jonathan Uesato, Richard Ngo, Tom Everitt, Victoria Krakovna, Shane Legg |
REALab: An Embedded Perspective on Tampering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2011.08820, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
17 | Alessio Merlo, Antonio Ruggia, Luigi Sciolla, Luca Verderame |
ARMAND: Anti-Repackaging through Multi-pattern Anti-tampering based on Native Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2012.09292, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
17 | Bilal Thonnam Thodi, Timothy Mulumba, Saif Eddin Jabari |
Noticeability Versus Impact in Traffic Signal Tampering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2002.03119, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
17 | Ayush Jain 0002, Ujjwal Guin |
A Novel Tampering Attack on AES Cores with Hardware Trojans. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2008.03290, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
17 | Jonathan Uesato, Ramana Kumar, Victoria Krakovna, Tom Everitt, Richard Ngo, Shane Legg |
Avoiding Tampering Incentives in Deep RL via Decoupled Approval. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2011.08827, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
17 | J. Nirmal Jothi, S. Letitia |
Tampering detection using hybrid local and global features in wavelet-transformed space with digital images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Soft Comput. ![In: Soft Comput. 24(7), pp. 5427-5443, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
17 | Kelton A. P. da Costa, João P. Papa, Leandro A. Passos, Danilo Colombo, Javier Del Ser, Khan Muhammad 0001, Victor Hugo C. de Albuquerque |
A critical literature survey and prospects on tampering and anomaly detection in image data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Appl. Soft Comput. ![In: Appl. Soft Comput. 97(Part B), pp. 106727, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
17 | Esteban Alejandro Armas Vega, Edgar González Fernández, Ana Lucila Sandoval Orozco, Luis Javier García-Villalba |
Image tampering detection by estimating interpolation patterns. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Future Gener. Comput. Syst. ![In: Future Gener. Comput. Syst. 107, pp. 229-237, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
17 | Fahd N. Al-Wesabi |
Proposing High-Smart Approach for Content Authentication and Tampering Detection of Arabic Text Transmitted via Internet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Inf. Syst. ![In: IEICE Trans. Inf. Syst. 103-D(10), pp. 2104-2112, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
17 | Dengyong Zhang, Xiao Chen, Feng Li, Arun Kumar Sangaiah, Xiangling Ding |
Seam-Carved Image Tampering Detection Based on the Cooccurrence of Adjacent LBPs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Commun. Networks ![In: Secur. Commun. Networks 2020, pp. 8830310:1-8830310:12, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
17 | Dana Dachman-Soled, Ilan Komargodski, Rafael Pass |
Non-Malleable Codes for Bounded Polynomial Depth Tampering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2020, pp. 776, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
17 | Marshall Ball, Eshan Chattopadhyay, Jyun-Jie Liao, Tal Malkin, Li-Yang Tan |
Non-Malleability against Polynomial Tampering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2020, pp. 147, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
17 | Gianluca Brian, Antonio Faonio, Maciej Obremski, Mark Simkin 0001, Daniele Venturi 0001 |
Non-Malleable Secret Sharing against Bounded Joint-Tampering Attacks in the Plain Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2020, pp. 725, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
17 | Javier Molina-Garcia, Beatriz Paulina Garcia Salgado, Volodymyr I. Ponomaryov, Rogelio Reyes-Reyes, Sergiy Sadovnychiy, Clara Cruz-Ramos |
An effective fragile watermarking scheme for color image tampering detection and self-recovery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Signal Process. Image Commun. ![In: Signal Process. Image Commun. 81, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
17 | Diptendu Mohan Kar, Indrajit Ray, Jenna Gallegos, Jean Peccoud, Indrakshi Ray |
Synthesizing DNA molecules with identity-based digital signatures to prevent malicious tampering and enabling source attribution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Secur. ![In: J. Comput. Secur. 28(4), pp. 437-467, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
17 | Kais Rouis, Petra Gomez-Krämer, Mickaël Coustaty |
Local Geometry Analysis For Image Tampering Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP ![In: IEEE International Conference on Image Processing, ICIP 2020, Abu Dhabi, United Arab Emirates, October 25-28, 2020, pp. 2551-2555, 2020, IEEE, 978-1-7281-6396-3. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
17 | Jun Zhou, Mengquan Li, Pengxing Guo, Weichen Liu |
Mitigation of Tampering Attacks for MR-Based Thermal Sensing in Optical NoCs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISVLSI ![In: 2020 IEEE Computer Society Annual Symposium on VLSI, ISVLSI 2020, Limassol, Cyprus, July 6-8, 2020, pp. 554-559, 2020, IEEE, 978-1-7281-5775-7. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
17 | Walter Tiberti, Alessio Carmenini, Luigi Pomante, Dajana Cassioli |
A Lightweight Blockchain-based Technique for Anti-Tampering in Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSD ![In: 23rd Euromicro Conference on Digital System Design, DSD 2020, Kranj, Slovenia, August 26-28, 2020, pp. 577-582, 2020, IEEE, 978-1-7281-9535-3. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
17 | Xinhua Tang, Weiwei Zhang, Yurong Chen |
Image Tampering Localization Based on Superpixel Segmentation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
iThings/GreenCom/CPSCom/SmartData/Cybermatics ![In: 2020 International Conferences on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData) and IEEE Congress on Cybermatics (Cybermatics), iThings/GreenCom/CPSCom/SmartData/Cybermatics 2020, Rhodes Island, Greece, November 2-6, 2020, pp. 597-602, 2020, IEEE, 978-1-7281-7647-5. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
17 | Roland Bolboaca, Teri Lenard, Béla Genge, Piroska Haller |
Locality sensitive hashing for tampering detection in automotive systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: ARES 2020: The 15th International Conference on Availability, Reliability and Security, Virtual Event, Ireland, August 25-28, 2020, pp. 57:1-57:7, 2020, ACM, 978-1-4503-8833-7. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
17 | Chryssanthi Iakovidou, Symeon Papadopoulos, Yiannis Kompatsiaris |
Knowledge-Based Fusion for Image Tampering Localization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AIAI (1) ![In: Artificial Intelligence Applications and Innovations - 16th IFIP WG 12.5 International Conference, AIAI 2020, Neos Marmaras, Greece, June 5-7, 2020, Proceedings, Part I, pp. 177-188, 2020, Springer, 978-3-030-49160-4. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
17 | Benjamin Reichman, Longlong Jing, Oguz Akin, Yingli Tian |
Medical Image Tampering Detection: A New Dataset and Baseline. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPR Workshops (1) ![In: Pattern Recognition. ICPR International Workshops and Challenges - Virtual Event, January 10-15, 2021, Proceedings, Part I, pp. 266-277, 2020, Springer, 978-3-030-68762-5. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
17 | Hiroki Ueda, Hyunho Kang, Keiichi Iwamura |
Video Tampering Detection based on High-Frequency Features using Machine Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AICCC ![In: AICCC 2020: 2020 3rd Artificial Intelligence and Cloud Computing Conference, Kyoto, Japan, 18-20 December, 2020, pp. 19-24, 2020, ACM, 978-1-4503-8883-2. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
17 | Ayush Jain 0002, Ujjwal Guin |
A Novel Tampering Attack on AES Cores with Hardware Trojans. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITC-Asia ![In: IEEE International Test Conference in Asia, ITC-Asia 2020, Taipei, Taiwan, September 23-25, 2020, pp. 77-82, 2020, IEEE, 978-1-7281-8944-4. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
17 | Rajesh Kumar Shrivastava, Chittaranjan Hota |
Code-Tampering Defense for Internet of Things Using System Call Traces. ![Search on Bibsonomy](Pics/bibsonomy.png) |
I4CS ![In: Innovations for Community Services - 20th International Conference, I4CS 2020, Bhubaneswar, India, January 12-14, 2020, Proceedings, pp. 158-170, 2020, Springer, 978-3-030-37483-9. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
17 | I Luk Kim, Yunhui Zheng, Hogun Park, Weihang Wang 0001, Wei You, Yousra Aafer, Xiangyu Zhang 0001 |
Finding client-side business flow tampering vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSE ![In: ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June - 19 July, 2020, pp. 222-233, 2020, ACM, 978-1-4503-7121-6. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
17 | Marshall Ball, Eshan Chattopadhyay, Jyun-Jie Liao, Tal Malkin, Li-Yang Tan |
Non-malleability Against Polynomial Tampering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO (3) ![In: Advances in Cryptology - CRYPTO 2020 - 40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part III, pp. 97-126, 2020, Springer, 978-3-030-56876-4. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
17 | Gianluca Brian, Antonio Faonio, Maciej Obremski, Mark Simkin 0001, Daniele Venturi 0001 |
Non-malleable Secret Sharing Against Bounded Joint-Tampering Attacks in the Plain Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO (3) ![In: Advances in Cryptology - CRYPTO 2020 - 40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part III, pp. 127-155, 2020, Springer, 978-3-030-56876-4. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
17 | Tongfeng Yang, Jian Wu, Zhifeng Fang |
Image Tampering Detection for Splicing based on Rich Feature and Convolution Neural Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HPCCT/BDAI ![In: HPCCT & BDAI 2020: 4th High Performance Computing and Cluster Technologies Conference & 3rd International Conference on Big Data and Artificial Intelligence, Qingdao, China, July, 2020, pp. 82-86, 2020, ACM, 978-1-4503-7560-3. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
17 | Reginald Tetteh, Samah Mohamed Saeed |
Analysis of Test Data Tampering Attack on Manufacturing Testing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DTIS ![In: 15th Design & Technology of Integrated Systems in Nanoscale Era, DTIS 2020, Marrakech, Morocco, April 1-3, 2020, pp. 1-6, 2020, IEEE, 978-1-7281-5426-8. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
17 | Rabindranath Andujar, Ignacio Peletier, Jesus Oliva, Marc Cymontkowski, Yondon Fu, Eric Tang, Josh Allman |
Video Tampering Detection for Decentralized Video Transcoding Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIAR (1) ![In: Image Analysis and Recognition - 17th International Conference, ICIAR 2020, Póvoa de Varzim, Portugal, June 24-26, 2020, Proceedings, Part I, pp. 316-327, 2020, Springer, 978-3-030-50346-8. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
17 | Pamela Johnston, Eyad Elyan |
A review of digital video tampering: From simple editing to full synthesis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digit. Investig. ![In: Digit. Investig. 29, pp. 67-81, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
17 | Fan Dang 0001, Ennan Zhai, Zhenhua Li 0001, Pengfei Zhou, Aziz Mohaisen, Kaigui Bian, Qingfu Wen, Mo Li 0001 |
Pricing Data Tampering in Automated Fare Collection with NFC-Equipped Smartphones. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Mob. Comput. ![In: IEEE Trans. Mob. Comput. 18(5), pp. 1159-1173, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
17 | Lilei Zheng, Ying Zhang 0047, Vrizlynn L. L. Thing |
A survey on image tampering and its detection in real-world photos. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Vis. Commun. Image Represent. ![In: J. Vis. Commun. Image Represent. 58, pp. 380-399, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
17 | Yanping Xiang, Di Xiao 0001, Hui Wang 0050, Xinyan Li |
A secure image tampering detection and self-recovery scheme using POB number system over cloud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Signal Process. ![In: Signal Process. 162, pp. 282-295, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
17 | Chunbo Ma, Xuewei Lv, Jun Ao |
Normalized Moment of Inertia-Based Detection Algorithm for Copy-Paste Image Tampering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Pattern Recognit. Artif. Intell. ![In: Int. J. Pattern Recognit. Artif. Intell. 33(6), pp. 1954023:1-1954023:16, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
17 | Chengyu Hu, Rupeng Yang, Pengtao Liu, Tong Li 0011, Fanyu Kong |
A countermeasure against cryptographic key leakage in cloud: public-key encryption with continuous leakage and tampering resilience. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Supercomput. ![In: J. Supercomput. 75(6), pp. 3099-3122, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
17 | Weiwei Zhang, Xinhua Tang, Zhenghong Yang, Shaozhang Niu |
Multi-scale segmentation strategies in PRNU-based image tampering localization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Tools Appl. ![In: Multim. Tools Appl. 78(14), pp. 20113-20132, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
17 | Fei Xue, Wei Lu 0001, Ziyi Ye, Hongmei Liu 0001 |
JPEG image tampering localization based on normalized gray level co-occurrence matrix. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Tools Appl. ![In: Multim. Tools Appl. 78(8), pp. 9895-9918, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
17 | Shengbei Wang, Weitao Yuan, Jianming Wang, Masashi Unoki |
Detection of speech tampering using sparse representations and spectral manipulations based information hiding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Speech Commun. ![In: Speech Commun. 112, pp. 1-14, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|