The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for tampering with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1984-1999 (18) 2000-2001 (17) 2002-2003 (32) 2004 (20) 2005 (33) 2006 (44) 2007 (56) 2008 (55) 2009 (29) 2010 (18) 2011 (23) 2012 (16) 2013 (22) 2014 (29) 2015 (23) 2016 (31) 2017 (35) 2018 (43) 2019 (53) 2020 (47) 2021 (50) 2022 (47) 2023 (50) 2024 (15)
Publication types (Num. hits)
article(319) incollection(2) inproceedings(481) phdthesis(4)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 323 occurrences of 220 keywords

Results
Found 806 publication records. Showing 806 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
17Paulo Max Gil Innocencio Reis, João Paulo Carvalho Lustosa da Costa, Ricardo Kehrle Miranda, Giovanni Del Galdo ESPRIT-Hilbert-Based Audio Tampering Detection With SVM Classifier for Forensic Analysis via Electrical Network Frequency. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
17Sebastian Faust, Kristina Hostáková, Pratyay Mukherjee, Daniele Venturi 0001 Non-Malleable Codes for Space-Bounded Tampering. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2017 DBLP  BibTeX  RDF
17Marshall Ball, Dana Dachman-Soled, Mukul Kulkarni, Tal Malkin Non-Malleable Codes from Average-Case Hardness: AC0, Decision Trees, and Streaming Space-Bounded Tampering. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2017 DBLP  BibTeX  RDF
17Saeed Mahloujifar, Mohammad Mahmoody Blockwise p-Tampering Attacks on Cryptographic Primitives, Extractors, and Learners. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2017 DBLP  BibTeX  RDF
17Vincent Haupert, Tilo Müller Rest in Protection - A Kernel-level Approach to Mitigate RIP Tampering. Search on Bibsonomy ICISSP The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
17Jianfeng Lu 0005, Peng Gao, Shanqing Zhang, Li Li 0014, Wenqiang Yuan, Qili Zhou Tampering Detection in Oral History Video Using Watermarking. Search on Bibsonomy ICCCS (1) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
17Jessada Karnjana, Kasorn Galajit, Pakinee Aimmanee, Chai Wutiwiwatchai, Masashi Unoki Speech watermarking scheme based on singular-spectrum analysis for tampering detection and identification. Search on Bibsonomy APSIPA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
17Ronald Cramer, Ivan Damgård, Nico Döttling, Irene Giacomelli, Chaoping Xing Linear-Time Non-Malleable Codes in the Bit-Wise Independent Tampering Model. Search on Bibsonomy ICITS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
17Saeed Mahloujifar, Mohammad Mahmoody Blockwise p-Tampering Attacks on Cryptographic Primitives, Extractors, and Learners. Search on Bibsonomy TCC (2) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
17Xiaodan Lin, Xiangui Kang Supervised audio tampering detection using an autoregressive model. Search on Bibsonomy ICASSP The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
17Songpon Teerakanok, Tetsutaro Uehara Digital Media Tampering Detection Techniques: An Overview. Search on Bibsonomy COMPSAC (2) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
17Takamichi Saito, Koki Yasuda, Kazuhisa Tanabe, Kazushi Takahashi Web Browser Tampering: Inspecting CPU Features from Side-Channel Information. Search on Bibsonomy BWCCA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
17Kui Ye, Xiaobo Sun, Jindong Xu, Jing Dong 0003, Tieniu Tan Influence Evaluation for Image Tampering Using Saliency Mechanism. Search on Bibsonomy CCCV (1) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
17Cédric Maigrot, Ewa Kijak, Ronan Sicre, Vincent Claveau Tampering Detection and Localization in Images from Social Networks: A CBIR Approach. Search on Bibsonomy ICIAP (1) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
17Aras Asaad, Sabah Jassim Topological Data Analysis for Image Tampering Detection. Search on Bibsonomy IWDW The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
17Shau-Yu Chou, Yu-Shiang Chen, Jun-Hao Chang, Yu-Der Chih, Tsung-Yung Jonathan Chang 11.3 A 10nm 32Kb low-voltage logic-compatible anti-fuse one-time-programmable memory with anti-tampering sensing scheme. Search on Bibsonomy ISSCC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
17Luca Bondi, Silvia Lameri, David Guera, Paolo Bestagini, Edward J. Delp, Stefano Tubaro Tampering Detection and Localization Through Clustering of Camera-Based CNN Features. Search on Bibsonomy CVPR Workshops The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
17Bor-Chun Chen, Pallabi Ghosh, Vlad I. Morariu, Larry S. Davis Detection of Metadata Tampering Through Discrepancy Between Image Content and Metadata Using Multi-task Deep Learning. Search on Bibsonomy CVPR Workshops The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
17Ali A. Elrowayati, Mohammad Faiz Liew Abdullah, Azizah Abd Manaf, Abdalrahman S. Alfagi Tampering detection of double-compression with the same quantization parameter in HEVC video streams. Search on Bibsonomy ICCSCE The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
17Sebastian Faust, Kristina Hostáková, Pratyay Mukherjee, Daniele Venturi 0001 Non-Malleable Codes for Space-Bounded Tampering. Search on Bibsonomy CRYPTO (2) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
17Badal Soni, Pradip K. Das, Dalton Meitei Thounaojam Copy-Move Tampering Detection based on Local Binary Pattern Histogram Fourier Feature. Search on Bibsonomy ICCCT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
17Pedro Garcia Freitas, Ronaldo Rigoni, Mylène C. Q. Farias Secure self-recovery watermarking scheme for error concealment and tampering detection. Search on Bibsonomy J. Braz. Comput. Soc. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
17K. Sitara, Babu M. Mehtre Digital video tampering detection: An overview of passive techniques. Search on Bibsonomy Digit. Investig. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
17Cai-Ping Yan, Chi-Man Pun, Xiaochen Yuan Multi-scale image hashing using adaptive local feature extraction for robust tampering detection. Search on Bibsonomy Signal Process. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
17Ronaldo Rigoni, Pedro Garcia Freitas, Mylène C. Q. Farias Detecting tampering in audio-visual content using QIM watermarking. Search on Bibsonomy Inf. Sci. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
17Alejandro Cabrera Aldaya, Alejandro Cabrera Sarmiento, Santiago Sánchez-Solano AES T-Box tampering attack. Search on Bibsonomy J. Cryptogr. Eng. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
17Hong Liu, Di Xiao 0001, Yunpeng Xiao, Yushu Zhang Robust image hashing with tampering recovery capability via low-rank and sparse representation. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
17Pawel Korus, Jiwu Huang Improved Tampering Localization in Digital Image Forensics Based on Maximal Entropy Random Walk. Search on Bibsonomy IEEE Signal Process. Lett. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
17Archana V. Mire, Sanjay B. Dhok, Naresh J. Mistry, Prakash D. Porey Tampering Localization in Double Compressed Images by Investigating Noise Quantization. Search on Bibsonomy Int. J. Digit. Crime Forensics The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
17Sharareh Zamanzadeh, Ali Jahanian 0001 Security Path: An Emerging Design Methodology to Protect the FPGA IPs Against Passive/Active Design Tampering. Search on Bibsonomy J. Electron. Test. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
17Sebastian Faust, Pratyay Mukherjee, Daniele Venturi 0001, Daniel Wichs Efficient Non-Malleable Codes and Key Derivation for Poly-Size Tampering Circuits. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
17Amin Ghafouri, Waseem Abbas, Yevgeniy Vorobeychik, Xenofon D. Koutsoukos Vulnerability of Fixed-Time Control of Signalized Intersections to Cyber-Tampering. Search on Bibsonomy CoRR The full citation details ... 2016 DBLP  BibTeX  RDF
17Mabrouka Hagui, Mohamed Ali Mahjoub, Ahmed Boukhris Comparative study and enhancement of Camera Tampering Detection algorithms. Search on Bibsonomy CoRR The full citation details ... 2016 DBLP  BibTeX  RDF
17Cai-Ping Yan, Chi-Man Pun, Xiaochen Yuan Quaternion-Based Image Hashing for Adaptive Tampering Localization. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
17Ronald Cramer, Ivan Damgård, Nico Döttling, Irene Giacomelli, Chaoping Xing Linear-Time Non-Malleable Codes in the Bit-Wise Independent Tampering Model. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2016 DBLP  BibTeX  RDF
17Kunlun Li, Shuo Sun 基于改进SIFT算法的图像复制粘贴篡改检测 (Image Copy-Paste Tampering Detection Based on Improved SIFT Algorithm). Search on Bibsonomy 计算机科学 The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
17Pawel Korus, Jiwu Huang Multi-Scale Fusion for Improved Localization of Malicious Tampering in Digital Images. Search on Bibsonomy IEEE Trans. Image Process. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
17Musaed A. Alhussein Image Tampering Detection Based on Local Texture Descriptor and Extreme Learning Machine. Search on Bibsonomy UKSim The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
17Alessio Viticchié, Cataldo Basile, Andrea Avancini, Mariano Ceccato, Bert Abrath, Bart Coppens 0001 Reactive Attestation: Automatic Detection and Reaction to Software Tampering Attacks. Search on Bibsonomy SPRO@CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
17Fuchun Lin, Reihaneh Safavi-Naini, Pengwei Wang 0006 Codes for Detection of Limited View Algebraic Tampering. Search on Bibsonomy Inscrypt The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
17Biaoli Tao, Rangding Wang, Diqun Yan, Chao Jin, Yanan Chen, Li Zhang Audio Tampering Detection Based on Quantization Artifacts. Search on Bibsonomy ICCCS (2) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
17Pawel Korus, Jiwu Huang Evaluation of random field models in multi-modal unsupervised tampering localization. Search on Bibsonomy WIFS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
17Santiago Torres-Arias, Anil Kumar Ammula, Reza Curtmola, Justin Cappos On Omitting Commits and Committing Omissions: Preventing Git Metadata Tampering That (Re)introduces Software Vulnerabilities. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2016 DBLP  BibTeX  RDF
17Eiichiro Fujisaki, Keita Xagawa Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions. Search on Bibsonomy ASIACRYPT (1) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
17Abdul Razaque, Fathi H. Amsaad 0001, Musbah Abdulgader, Vijay Chand Mannava, Ibrahim Elwarfalli, Pavan Teja Kilari Automatic Tampering Detection Paradigm to Support Personal Health Record. Search on Bibsonomy CHASE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
17Jian Li, Wenhuan Lu, Chen Zhang, Jianguo Wei, Xiaochun Cao, Jianwu Dang 0001 A Study on Detection and Recovery of Speech Signal Tampering. Search on Bibsonomy Trustcom/BigDataSE/ISPA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
17Aron Laszka, Bradley Potteiger, Yevgeniy Vorobeychik, Saurabh Amin, Xenofon D. Koutsoukos Vulnerability of Transportation Networks to Traffic-Signal Tampering. Search on Bibsonomy ICCPS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
17Steven Paley, Tamzidul Hoque, Swarup Bhunia Active protection against PCB physical tampering. Search on Bibsonomy ISQED The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
17Roshan Sai Ayyalasomayajula, Vinod Pankajakshan Differentiating Photographic and PRCG Images Using Tampering Localization Features. Search on Bibsonomy CVIP (2) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
17Wessam Mesbah Detection and correction of tampering attempts of smart electricity meters. Search on Bibsonomy ISGT Europe The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
17Muhammad Naveed Aman, Kashif Javed, Biplab Sikdar 0001, Kee Chaing Chua Detecting data tampering attacks in synchrophasor networks using time hopping. Search on Bibsonomy ISGT Europe The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
17Daniele Venturi 0001 Tampering in wonderland. Search on Bibsonomy 2016   RDF
17Shengbei Wang, Ryota Miyauchi, Masashi Unoki, Nam Soo Kim Tampering Detection Scheme for Speech Signals using Formant Enhancement based Watermarking. Search on Bibsonomy J. Inf. Hiding Multim. Signal Process. The full citation details ... 2015 DBLP  BibTeX  RDF
17Stefan Wild, Fabian Wiedemann, Sebastian Heil, Alexey Tschudnowsky, Martin Gaedke ProProtect3: An Approach for Protecting User Profile Data from Disclosure, Tampering, and Improper Use in the Context of WebID. Search on Bibsonomy Trans. Large Scale Data Knowl. Centered Syst. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
17Jay Liebowitz, Robert Schaller Biological Warfare: Tampering with Implantable Medical Devices. Search on Bibsonomy IT Prof. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
17Jonathan Goh, Vrizlynn L. L. Thing A hybrid evolutionary algorithm for feature and ensemble selection in image tampering detection. Search on Bibsonomy Int. J. Electron. Secur. Digit. Forensics The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
17Min Long, Yan Liu, Fei Peng A Semi-Fragile Reversible Watermarking for 2D CAD Engineering Graphics with Accurate Tampering Localization. Search on Bibsonomy Int. J. Digit. Crime Forensics The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
17Archana V. Mire, Sanjay B. Dhok, Narendra J. Mistry, Prakash D. Porey Localization of Tampering Created with Facebook Images by Analyzing Block Factor Histogram Voting. Search on Bibsonomy Int. J. Digit. Crime Forensics The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
17N. M. Masoodhu Banu, S. Sujatha Improved Tampering Detection for Image Authentication Based on Image Partitioning. Search on Bibsonomy Wirel. Pers. Commun. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
17Hui Xu 0009, Yangfan Zhou, Michael R. Lyu N-Version Obfuscation: Impeding Software Tampering Replication with Program Diversity. Search on Bibsonomy CoRR The full citation details ... 2015 DBLP  BibTeX  RDF
17Bo Zhao 0005, Guihe Qin, Pingping Liu A Robust Image Tampering Detection Method Based on Maximum Entropy Criteria. Search on Bibsonomy Entropy The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
17Arthur Gervais, Hubert Ritzdorf, Ghassan O. Karame, Srdjan Capkun Tampering with the Delivery of Blocks and Transactions in Bitcoin. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2015 DBLP  BibTeX  RDF
17Zoya Dyka, Thomas Basmer, Christian Wittke, Peter Langendörfer Individualizing Electrical Circuits of Cryptographic Devices as a Means to Hinder Tampering Attacks. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2015 DBLP  BibTeX  RDF
17Qingzhong Liu, Andrew H. Sung, Zhongxue Chen, Lei Chen 0029 Exposing Image Tampering with the Same Quantization Matrix. Search on Bibsonomy Multimedia Data Mining and Analytics The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
17Jiayuan Fan, Tao Chen 0003, Jiuwen Cao Image tampering detection using noise histogram features. Search on Bibsonomy DSP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
17Rupali D. Patil, Shilpa Metkar Fragile video watermarking for tampering detection and localization. Search on Bibsonomy ICACCI The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
17Arthur Gervais, Hubert Ritzdorf, Ghassan O. Karame, Srdjan Capkun Tampering with the Delivery of Blocks and Transactions in Bitcoin. Search on Bibsonomy CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
17Leiva Casemiro Oliveira, Eduardo G. Pereira, Ravena C. Oliveira, Marcos R. A. Morais, Antonio M. N. Lima, Helmut Neff SPR sensor for tampering detection in biofuels. Search on Bibsonomy I2MTC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
17Shashank Agrawal, Divya Gupta 0001, Hemanta K. Maji, Omkant Pandey, Manoj Prabhakaran 0001 A Rate-Optimizing Compiler for Non-malleable Codes Against Bit-Wise Tampering and Permutations. Search on Bibsonomy TCC (1) The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
17Hugues Mercier, Maxime Augier, Arjen K. Lenstra STEP-archival: Storage integrity and anti-tampering using data entanglement. Search on Bibsonomy ISIT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
17Songpon Teerakanok, Tetsutaro Uehara Enhancment of Image Tampering Detection Using JPEG's Quantization and Re-interpolation Processes. Search on Bibsonomy COMPSAC Workshops The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
17Íñigo Monedero, Félix Biscarri, Juán I. Guerrero, Moisés Roldán, Carlos León 0001 An Approach to Detection of Tampering in Water Meters. Search on Bibsonomy KES The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
17Lu Yu 0001, Juan Deng, Richard R. Brooks, SeokBae Yun Automobile ECU Design to Avoid Data Tampering. Search on Bibsonomy CISR The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
17Adriano Gaibotti, Claudio Marchisio, Alexandro Sentinelli, Giacomo Boracchi Tampering Detection in Low-Power Smart Cameras. Search on Bibsonomy EANN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
17Shashank Agrawal, Divya Gupta 0001, Hemanta K. Maji, Omkant Pandey, Manoj Prabhakaran 0001 Explicit Non-malleable Codes Against Bit-Wise Tampering and Permutations. Search on Bibsonomy CRYPTO (1) The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
17Luca Calderoni, Dario Maio Cloning and tampering threats in e-Passports. Search on Bibsonomy Expert Syst. Appl. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
17Deng-Yuan Huang, Chao-Ho Chen, Tsong-Yi Chen, Wu-Chih Hu, Bo-Cin Chen Rapid detection of camera tampering and abnormal disturbance for video surveillance system. Search on Bibsonomy J. Vis. Commun. Image Represent. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
17Mehdi Fallahpour, Shervin Shirmohammadi, Mehdi Semsarzadeh, Jiying Zhao Tampering Detection in Compressed Digital Video Using Watermarking. Search on Bibsonomy IEEE Trans. Instrum. Meas. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
17Eshan Chattopadhyay, David Zuckerman Non-Malleable Codes Against Constant Split-State Tampering. Search on Bibsonomy Electron. Colloquium Comput. Complex. The full citation details ... 2014 DBLP  BibTeX  RDF
17Mohammad S. Obaidat, Isaac Woungang, Sanjay Kumar Dhurandher, Vincent Koo A cryptography-based protocol against packet dropping and message tampering attacks on mobile ad hoc networks. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
17Wei Wang 0025, Jing Dong 0003, Tieniu Tan Exploring DCT Coefficient Quantization Effects for Local Tampering Detection. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
17Shashank Agrawal, Divya Gupta 0001, Hemanta K. Maji, Omkant Pandey, Manoj Prabhakaran 0001 Explicit Optimal-Rate Non-malleable Codes Against Bit-wise Tampering and Permutations. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2014 DBLP  BibTeX  RDF
17Sajjad Dadkhah, Azizah Abd Manaf, Yoshiaki Hori, Aboul Ella Hassanien, Somayeh Sadeghi An effective SVD-based image tampering detection and self-recovery using active watermarking. Search on Bibsonomy Signal Process. Image Commun. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
17Prithvi Bisht, Timothy L. Hinrichs, Nazari Skrupsky, V. N. Venkatakrishnan Automated detection of parameter tampering opportunities and vulnerabilities in web applications. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
17Giuseppe Cattaneo, Gianluca Roscigno A Possible Pitfall in the Experimental Analysis of Tampering Detection Algorithms. Search on Bibsonomy NBiS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
17Adonis P. H. Fung, Tielei Wang, K. W. Cheung 0003, Tsz-Yeung Wong Scanning of real-world web applications for parameter tampering vulnerabilities. Search on Bibsonomy AsiaCCS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
17Jie Lin, Chuanyi Liu, Binxing Fang POSTER: TraceVirt: A Framework for Detecting the Non-tampering Attacks in the Virtual Machine. Search on Bibsonomy CCS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
17Shengbei Wang, Masashi Unoki, Nam Soo Kim Formant enhancement based speech watermarking for tampering detection. Search on Bibsonomy INTERSPEECH The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
17Yan-Li Huang, Shao-Zhang Liu, Jian-Cheng Zou, Lin-Na Zhou Forensics of image tampering based on the consistency of illuminant chromaticity. Search on Bibsonomy APSIPA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
17Luisa Verdoliva, Davide Cozzolino, Giovanni Poggi A feature-based approach for image tampering detection and localization. Search on Bibsonomy WIFS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
17Lorenzo Gaborini, Paolo Bestagini, Simone Milani, Marco Tagliasacchi, Stefano Tubaro Multi-Clue Image Tampering Localization. Search on Bibsonomy WIFS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
17Dana Dachman-Soled, Yael Tauman Kalai Securing Circuits and Protocols against 1/poly(k) Tampering Rate. Search on Bibsonomy TCC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
17Mahdi Cheraghchi, Venkatesan Guruswami Non-malleable Coding against Bit-Wise and Split-State Tampering. Search on Bibsonomy TCC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
17Eshan Chattopadhyay, David Zuckerman Non-malleable Codes against Constant Split-State Tampering. Search on Bibsonomy FOCS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
17Silvia Mella, Filippo Melzani, Andrea Visconti Differential Fault Attacks against AES Tampering with the Instruction Flow. Search on Bibsonomy SECRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
17Simone Milani, Pier Francesco Piazza, Paolo Bestagini, Stefano Tubaro Audio tampering detection using multimodal features. Search on Bibsonomy ICASSP The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
17Khosro Bahrami, Alex C. Kot Image tampering detection by exposing blur type inconsistency. Search on Bibsonomy ICASSP The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
17Guanshuo Xu, Jingyu Ye, Yun-Qing Shi 0001 New Developments in Image Tampering Detection. Search on Bibsonomy IWDW The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
17Ronaldo Rigoni, Pedro Garcia Freitas, Mylène C. Q. Farias Tampering Detection of Audio-Visual Content Using Encrypted Watermarks. Search on Bibsonomy SIBGRAPI The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
17Xudong Zhao, Jianhua Li 0001, Shilin Wang, Shenghong Li 0001 A Distributed Local Margin Learning based scheme for high-dimensional feature processing in image tampering detection. Search on Bibsonomy ICME The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
Displaying result #401 - #500 of 806 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license