Search

Your search keyword '"Memon, Nasir"' showing total 67 results

Search Constraints

Start Over You searched for: Author "Memon, Nasir" Remove constraint Author: "Memon, Nasir" Publication Type Electronic Resources Remove constraint Publication Type: Electronic Resources
67 results on '"Memon, Nasir"'

Search Results

1. Mitigating the Impact of Attribute Editing on Face Recognition

2. AI-assisted Tagging of Deepfake Audio Calls using Challenge-Response

Catalog

Books, media, physical & digital resources

3. Zero-shot racially balanced dataset generation using an existing biased StyleGAN2

4. Alpha-wolves and Alpha-mammals: Exploring Dictionary Attacks on Iris Recognition Systems

5. Information Forensics and Security: A quarter-century-long journey

6. Fair GANs through model rebalancing for extremely imbalanced class distributions

7. Identity-Preserving Aging of Face Images via Latent Diffusion Models

8. A Dataless FaceSwap Detection Approach Using Synthetic Images

9. GOTCHA: Real-Time Video Deepfake Detection via Challenge-Response

10. Diversity and Novelty MasterPrints: Generating Multiple DeepMasterPrints for Increased User Coverage

11. Dictionary Attacks on Speaker Verification

12. An ensemble of classifiers approach to steganalysis

13. FLATBED SCANNER IDENTIFICATION BASED ON DUST AND SCRATCHES OVER SCANNER PLATEN

14. AN EFFICIENT AND ROBUST METHOD FOR DETECTING COPY-MOVE FORGERY

15. Efficient Techniques For Sensor Fingerprint Matching In Large Image & Video Databases

16. A Cost-Effective Decision Tree Based Approach to Steganalysis

17. Identification and recovery of JPEG files with missing fragments

18. Efficient Sensor Fingerprint Matching Through Fingerprint Binarization

19. Seam-Carving Based Anonymization Against Image & Video Source Attribution

20. An ensemble of classifiers approach to steganalysis

21. A SEMI-AUTOMATIC DESHREDDING METHOD BASED ON CURVE MATCHING

22. Efficient Sensor Fingerprint Matching Through Fingerprint Binarization

23. Seam-Carving Based Anonymization Against Image & Video Source Attribution

24. Hard-Attention for Scalable Image Classification

25. Empirical Evaluation of PRNU Fingerprint Variation for Mismatched Imaging Pipelines

26. Fusion of Camera Model and Source Device Specific Forensic Methods for Improved Tamper Detection

27. The Role of the Crowd in Countering Misinformation: A Case Study of the COVID-19 Infodemic

28. Towards Automatic Detection of Child Pornography

29. Fast camera fingerprint matching in very large databases

30. Sensor Fingerprint Identification Through Composite Fingerprints and Group Testing

31. Recent Advances in Counter PRNU Based Source Attribution and Beyond

32. Analysis of Seam-Carving-Based Anonymization of Images Against PRNU Noise Pattern-Based Source Attribution

33. Sensor Fingerprint Identification Through Composite Fingerprints and Group Testing

34. Analysis of Seam-Carving-Based Anonymization of Images Against PRNU Noise Pattern-Based Source Attribution

35. Camera Fingerprint Extraction via Spatial Domain Averaged Frames

36. FiFTy: Large-scale File Fragment Type Identification using Neural Networks

37. Source Camera Attribution of Multi-Format Devices

38. Analysis of Rolling Shutter Effect on ENF based Video Forensics

39. Detecting the Presence of ENF Signal in Digital Videos: a Superpixel based Approach

40. Neural Imaging Pipelines - the Scourge or Hope of Forensics?

41. Fast camera fingerprint matching in very large databases

42. Resampling Forgery Detection Using Deep Learning and A-Contrario Analysis.

43. Boosting Image Forgery Detection using Resampling Features and Copy-move Analysis.

44. Content Authentication for Neural Imaging Pipelines: End-to-end Optimization of Photo Provenance in Complex Distribution Channels

45. Kid on The Phone! Toward Automatic Detection of Children on Mobile Devices

46. Tap-based User Authentication for Smartwatches

47. IllusionPIN: Shoulder-Surfing Resistant Authentication Using Hybrid Images

48. DeepMasterPrints: Generating MasterPrints for Dictionary Attacks via Latent Variable Evolution

49. An HMM-based Multi-sensor Approach for Continuous Mobile Authentication

50. An HMM-based behavior modeling approach for continuous mobile authentication