Search

Your search keyword '"Memon, Nasir"' showing total 796 results

Search Constraints

Start Over You searched for: Author "Memon, Nasir" Remove constraint Author: "Memon, Nasir"
796 results on '"Memon, Nasir"'

Search Results

1. TraSCE: Trajectory Steering for Concept Erasure

2. Classifier-Free Guidance inside the Attraction Basin May Cause Memorization

3. Mitigating the Impact of Attribute Editing on Face Recognition

4. PITCH: AI-assisted Tagging of Deepfake Audio Calls using Challenge-Response

5. Alpha-wolves and Alpha-mammals: Exploring Dictionary Attacks on Iris Recognition Systems

6. Information Forensics and Security: A quarter-century-long journey

7. Fair GANs through model rebalancing for extremely imbalanced class distributions

8. Identity-Preserving Aging of Face Images via Latent Diffusion Models

9. Zero-shot racially balanced dataset generation using an existing biased StyleGAN2

10. A Dataless FaceSwap Detection Approach Using Synthetic Images

11. GOTCHA: Real-Time Video Deepfake Detection via Challenge-Response

12. Diversity and Novelty MasterPrints: Generating Multiple DeepMasterPrints for Increased User Coverage

13. Dictionary Attacks on Speaker Verification

14. Hard-Attention for Scalable Image Classification

15. The Role of the Crowd in Countering Misinformation: A Case Study of the COVID-19 Infodemic

16. Empirical Evaluation of PRNU Fingerprint Variation for Mismatched Imaging Pipelines

17. Fusion of Camera Model and Source Device Specific Forensic Methods for Improved Tamper Detection

18. Camera Identification at Large Scale

19. What’s in This Book and Why?

20. Camera Fingerprint Extraction via Spatial Domain Averaged Frames

21. FiFTy: Large-scale File Fragment Type Identification using Neural Networks

22. Source Camera Attribution of Multi-Format Devices

23. Detecting the Presence of ENF Signal in Digital Videos: a Superpixel based Approach

24. Analysis of Rolling Shutter Effect on ENF based Video Forensics

25. Neural Imaging Pipelines - the Scourge or Hope of Forensics?

26. Content Authentication for Neural Imaging Pipelines: End-to-end Optimization of Photo Provenance in Complex Distribution Channels

27. Kid on The Phone! Toward Automatic Detection of Children on Mobile Devices

28. Tap-based User Authentication for Smartwatches

29. Crossing the Bridge to STEM: Retaining Women Students in an Online CS Conversion Program

30. An HMM-based behavior modeling approach for continuous mobile authentication

31. An HMM-based Multi-sensor Approach for Continuous Mobile Authentication

32. IllusionPIN: Shoulder-Surfing Resistant Authentication Using Hybrid Images

33. DeepMasterPrints: Generating MasterPrints for Dictionary Attacks via Latent Variable Evolution

38. AI-assisted Tagging of Deepfake Audio Calls using Challenge-Response

41. Leveraging Personalization To Facilitate Privacy

42. Phishing, Personality Traits and Facebook

44. Flame Synthesis of Graphene Films in Open Environments

45. Comparison between Two Doses of Suprachoroidal Triamcinolone Acetonide among Cases of Resistant Diabetic Macular Edema.

47. X-Platform Phishing: Abusing Trust for Targeted Attacks Short Paper

49. 'I Can Actually Be a Super Sleuth': Promising Practices for Engaging Adolescent Girls in Cybersecurity Education

Catalog

Books, media, physical & digital resources