Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 40 matches
- 2010
- Peter A. Johnson, Bozhao Tan, Stephanie Schuckers:
Multimodal fusion vulnerability to non-zero effort (spoof) imposters. WIFS 2010: 1-5 - Telidevara Aditya, Venkatachalam Chandrasekaran, Avinash Srinivasan, Ravi Mukkamala, Sandeep Gampa:
Similarity coefficient generators for network forensics. WIFS 2010: 1-6 - Donald A. Adjeroh, Deng Cao, Marco Piccirilli, Arun Ross:
Predictability and correlation in human metrology. WIFS 2010: 1-6 - Fernanda A. Andaló, Gabriel Taubin, Siome Goldenstein:
Detecting vanishing points by segment clustering on the projective plane for single-view photogrammetry. WIFS 2010: 1-6 - Mauro Barni, Jorge Guajardo, Riccardo Lazzeretti:
Privacy preserving evaluation of signal quality with application to ECG analysis. WIFS 2010: 1-6 - Abhijit Bendale, Terrance E. Boult:
id-Privacy in large scale biometric systems. WIFS 2010: 1-6 - Ileana Buhan, Jorge Guajardo, Emile Kelkboom:
Efficient strategies to play the indistinguishability game for fuzzy sketches. WIFS 2010: 1-6 - Roberto Caldelli, Irene Amerini, Francesco Picchioni, Matteo Innocenti:
Fast image clustering of unknown source images. WIFS 2010: 1-5 - Vincent Christlein, Christian Riess, Elli Angelopoulou:
On rotation invariance in copy-move forgery detection. WIFS 2010: 1-6 - Wei-Hong Chuang, Min Wu:
Semi non-intrusive training for cell-phone camera model linkage. WIFS 2010: 1-6 - Zanoni Dias, Anderson Rocha, Siome Goldenstein:
First steps toward image phylogeny. WIFS 2010: 1-6 - Tomás Filler, Jessica J. Fridrich:
Minimizing additive distortion functions with non-binary embedding operation in steganography. WIFS 2010: 1-6 - Dinei Florêncio, Cormac Herley:
Phishing and money mules. WIFS 2010: 1-5 - Jérôme François, Radu State, Thomas Engel, Olivier Festor:
Digital forensics in VoIP networks. WIFS 2010: 1-6 - Martin Franz, Björn Deiseroth, Kay Hamacher, Somesh Jha, Stefan Katzenbeisser, Heike Schröder:
Secure computations on non-integer values. WIFS 2010: 1-6 - Ravindra B. Gadde, Donald A. Adjeroh, Arun Ross:
Indexing iris images using the Burrows-Wheeler Transform. WIFS 2010: 1-6 - Matthew Gaubatz, Steven J. Simske:
Towards a feature set for robust printing-imaging cycle device identification using structured printed markings. WIFS 2010: 1-6 - Pei-Lun Hsieh, Yu-Ming Liang, Hong-Yuan Mark Liao:
Recognition of blurred license plate images. WIFS 2010: 1-6 - Yen-Wei Huang, Pierre Moulin:
Maximin optimality of the arcsine fingerprinting distribution and the interleaving attack for large coalitions. WIFS 2010: 1-6 - Deniz Karakoyunlu, Berk Sunar:
Differential template attacks on PUF enabled cryptographic devices. WIFS 2010: 1-6 - Kannan Karthik, Dimitrios Hatzinakos:
MIX-SPLIT: Controlled mixing of secrets and traceable pseudonym generation using codebooks. WIFS 2010: 1-6 - Eric Kee, Hany Farid:
Exposing digital forgeries from 3-D lighting environments. WIFS 2010: 1-6 - Bei-Bei Liu, Heung-Kyu Lee, Yongjian Hu, Chang-Hee Choi:
On classification of source cameras: A graph based approach. WIFS 2010: 1-5 - Antonis Mairgiotis, Nikolaos Galatsanos:
Bayesian watermark detection and new perceptual mask based on a spatially weighted Total Variation image prior. WIFS 2010: 1-6 - Mehrdad Majzoobi, Farinaz Koushanfar, Srinivas Devadas:
FPGA PUF using programmable delay lines. WIFS 2010: 1-6 - Benjamin Mathon, Patrick Bas, François Cayre, Benoît Macq:
Security and robustness constraints for spread-spectrum Tardos fingerprinting. WIFS 2010: 1-6 - Karthik Nandakumar:
A fingerprint cryptosystem based on minutiae phase spectrum. WIFS 2010: 1-6 - Ikenna Odinaka, Po-Hsiang Lai, Alan David Kaplan, Joseph A. O'Sullivan, Erik J. Sirevaag, Sean D. Kristjansson, Amanda K. Sheffield, John W. Rohrbaugh:
ECG biometrics: A robust short-time frequency analysis. WIFS 2010: 1-6 - Stephen B. Pollard, Steven J. Simske, Guy B. Adams:
Model based print signature profile extraction for forensic analysis of individual text glyphs. WIFS 2010: 1-6 - Shantanu Rane, Wei Sun:
Privacy preserving string comparisons based on Levenshtein distance. WIFS 2010: 1-6
skipping 10 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-14 07:16 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint