Publications
Export 927 results:
Author Title [ Type] Year Filters: First Letter Of Last Name is W [Clear All Filters]
2011. Seam carving estimation using forensic hash. Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security. :9-14.
2009. Secure image retrieval through feature protection. Acoustics, Speech and Signal Processing, 2009. ICASSP 2009. IEEE International Conference on. :1533-1536.
2011. Secure video processing: Problems and challenges. Acoustics, Speech and Signal Processing (ICASSP), 2011 IEEE International Conference on. :5856-5859.
2004. Security evaluation for communication-friendly encryption of multimedia. Image Processing, 2004. ICIP '04. 2004 International Conference on. 1:569-572Vol.1-569-572Vol.1.
2006. Security Issues in Cooperative Communications: Tracing Adversarial Relays. Acoustics, Speech and Signal Processing, 2006. ICASSP 2006 Proceedings. 2006 IEEE International Conference on. 4:IV-IV.
2005. Security of feature extraction in image hashing. Acoustics, Speech, and Signal Processing, 2005. Proceedings. (ICASSP '05). IEEE International Conference on. 2:ii/1041-ii/1044Vol.2-ii/1041-ii/1044Vol.2.
2011. "Seeing" ENF: natural time stamp for digital video via optical sensing and signal processing. Proceedings of the 19th ACM international conference on Multimedia. :23-32.
2010. Semi non-intrusive training for cell-phone camera model linkage. Information Forensics and Security (WIFS), 2010 IEEE International Workshop on. :1-6.
2007. A Signal Processing and Randomization Perspective of Robust and Secure Image Hashing. Statistical Signal Processing, 2007. SSP '07. IEEE/SP 14th Workshop on. :166-170.
1996. Simplification envelopes. Proceedings of the 23rd annual conference on Computer graphics and interactive techniques. :119-128.
1996. Simplification envelopes. Proceedings of the 23rd annual conference on Computer graphics and interactive techniques. :119-128.
1993. SOCAP: lessons learned in automating military operations planning. Proceedings of the 6th international conference on Industrial and engineering applications of artificial intelligence and expert systems. :384-393.
2011. Spam or ham?: characterizing and detecting fraudulent "not spam" reports in web mail systems Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference. :210-219.
2008. Sparse terrain pyramids. Proceedings of the 16th ACM SIGSPATIAL international conference on Advances in geographic information systems. :15:1–15:10-15:1–15:10.
2007. A spatial model of the red queen effect. Proceedings of the 9th annual conference on Genetic and evolutionary computation. :490-491.
2003. Starting an intergenerational technology design team: a case study. Proceedings of the 2003 conference on Interaction design and children. :51-58.
1995. Stochastic completion fields: a neural model of illusory contour shape and salience. Computer Vision, 1995. Proceedings., Fifth International Conference on. :408-415.
2004. Structural and algorithmic aspects of massive social networks. Proceedings of the fifteenth annual ACM-SIAM symposium on Discrete algorithms. :718-727.
2009. Supervised and unsupervised methods in employing discourse relations for improving opinion polarity classification. Proceedings of the 2009 Conference on Empirical Methods in Natural Language Processing: Volume 1 - Volume 1. :170-179.
2007. Taking Advantage of Collective Operation Semantics for Loosely Coupled Simulations. Parallel and Distributed Processing Symposium, International. :128-128.
2009. Tampering identification using Empirical Frequency Response. Acoustics, Speech and Signal Processing, 2009. ICASSP 2009. IEEE International Conference on. :1517-1520.
2003. Technology probes: inspiring design for and with families. Proceedings of the SIGCHI conference on Human factors in computing systems. :17-24.