Source Camera Verification for Strongly Stabilized Videos
Altinisik, Enes, Sencar, Husrev Taha
Published in IEEE transactions on information forensics and security (2021)
Published in IEEE transactions on information forensics and security (2021)
Get full text
Journal Article
Efficient Sensor Fingerprint Matching Through Fingerprint Binarization
Bayram, S., Sencar, H. T., Memon, N.
Published in IEEE transactions on information forensics and security (01.08.2012)
Published in IEEE transactions on information forensics and security (01.08.2012)
Get full text
Journal Article
Automatic Generation of H.264 Parameter Sets to Recover Video File Fragments
Get full text
Paper
Journal Article
An efficient and robust method for detecting copy-move forgery
Bayram, S., Sencar, H.T., Memon, N.
Published in 2009 IEEE International Conference on Acoustics, Speech and Signal Processing (01.04.2009)
Published in 2009 IEEE International Conference on Acoustics, Speech and Signal Processing (01.04.2009)
Get full text
Conference Proceeding
Mitigation of H.264 and H.265 Video Compression for Reliable PRNU Estimation
Get full text
Paper
Journal Article
Ten years after ImageNet: a 360° perspective on artificial intelligence
Chawla, Sanjay, Nakov, Preslav, Ali, Ahmed, Hall, Wendy, Khalil, Issa, Ma, Xiaosong, Taha Sencar, Husrev, Weber, Ingmar, Wooldridge, Michael, Yu, Ting
Published in Royal Society open science (01.03.2023)
Published in Royal Society open science (01.03.2023)
Get full text
Journal Article
Video Source Characterization Using Encoding and Encapsulation Characteristics
Get full text
Paper
Journal Article
Jpg[Formula Omitted]: An Advanced Carver for JPEG Files
Uzun, Erkam, Husrev Taha Sencar
Published in IEEE transactions on information forensics and security (01.01.2020)
Published in IEEE transactions on information forensics and security (01.01.2020)
Get full text
Journal Article
Jpg Scraper : An Advanced Carver for JPEG Files
Uzun, Erkam, Sencar, Husrev Taha
Published in IEEE transactions on information forensics and security (2020)
Published in IEEE transactions on information forensics and security (2020)
Get full text
Journal Article
A3T: accuracy aware adversarial training
Altinisik, Enes, Messaoud, Safa, Sencar, Husrev Taha, Chawla, Sanjay
Published in Machine learning (01.09.2023)
Published in Machine learning (01.09.2023)
Get full text
Journal Article
Noise-resistant mechanisms for the detection of stealthy peer-to-peer botnets
Narang, Pratik, Hota, Chittaranjan, Sencar, Husrev Taha
Published in Computer communications (15.12.2016)
Published in Computer communications (15.12.2016)
Get full text
Journal Article