您当前的位置:
首页 >
文章列表页 >
Image tampering localization model for intensive post-processing scenarios
Papers | 更新时间:2024-06-12
    • Image tampering localization model for intensive post-processing scenarios

    • Journal on Communications   Vol. 45, Issue 4, Pages: 146-159(2024)
    • DOI:10.11959/j.issn.1000-436x.2024079    

      CLC: TN391
    • Received:13 November 2023

      Revised:2024-03-11

      Published:30 April 2024

    移动端阅览

  • TAN Shunquan, LIAO Guiying, PENG Rongxuan, et al. Image tampering localization model for intensive post-processing scenarios[J]. Journal on Communications, 2024, 45(4): 146-159. DOI: 10.11959/j.issn.1000-436x.2024079.

  •  
  •  

0

Views

1046

下载量

0

CSCD

Alert me when the article has been cited
提交
Tools
Download
Export Citation
Share
Add to favorites
Add to my album

Related Articles

High-robustness integrated adversarial training method for fingerprint-based indoor localization systems
Robust authentication key agreement protocol for cross-domain data security
Survey on adversarial attacks and defenses for object detection
CLB-Defense: based on contrastive learning defense for graph neural network against backdoor attack
A Graph Masked Contrastive Learning Method for Insider User Behavior Anomaly Detection

Related Author

WANG Guohua
CHEN Hui
LI Mei
ZHANG Xuejun
LI Fenghua
Tian Youliang
LIU Hai
ZHANG Qijia

Related Institution

School of Computer and Artificial Intelligence, Lanzhou University of Information Science and Technology
School of Electronics and Information Engineering, Lanzhou Jiaotong University
College of Big Data and Information Engineering, Guizhou University
College of Computer Science and Technology, Guizhou University
State Key Laboratory of Cyberspace Security Defense
0