Alert button
Picture for Nasir Memon

Nasir Memon

Alert button

Hard-Attention for Scalable Image Classification

Add code
Bookmark button
Alert button
Feb 20, 2021
Athanasios Papadopoulos, Paweł Korus, Nasir Memon

Figure 1 for Hard-Attention for Scalable Image Classification
Figure 2 for Hard-Attention for Scalable Image Classification
Figure 3 for Hard-Attention for Scalable Image Classification
Figure 4 for Hard-Attention for Scalable Image Classification
Viaarxiv icon

The Role of the Crowd in Countering Misinformation: A Case Study of the COVID-19 Infodemic

Add code
Bookmark button
Alert button
Nov 12, 2020
Nicholas Micallef, Bing He, Srijan Kumar, Mustaque Ahamad, Nasir Memon

Figure 1 for The Role of the Crowd in Countering Misinformation: A Case Study of the COVID-19 Infodemic
Figure 2 for The Role of the Crowd in Countering Misinformation: A Case Study of the COVID-19 Infodemic
Figure 3 for The Role of the Crowd in Countering Misinformation: A Case Study of the COVID-19 Infodemic
Figure 4 for The Role of the Crowd in Countering Misinformation: A Case Study of the COVID-19 Infodemic
Viaarxiv icon

Empirical Evaluation of PRNU Fingerprint Variation for Mismatched Imaging Pipelines

Add code
Bookmark button
Alert button
Apr 04, 2020
Sharad Joshi, Pawel Korus, Nitin Khanna, Nasir Memon

Figure 1 for Empirical Evaluation of PRNU Fingerprint Variation for Mismatched Imaging Pipelines
Figure 2 for Empirical Evaluation of PRNU Fingerprint Variation for Mismatched Imaging Pipelines
Figure 3 for Empirical Evaluation of PRNU Fingerprint Variation for Mismatched Imaging Pipelines
Figure 4 for Empirical Evaluation of PRNU Fingerprint Variation for Mismatched Imaging Pipelines
Viaarxiv icon

Fusion of Camera Model and Source Device Specific Forensic Methods for Improved Tamper Detection

Add code
Bookmark button
Alert button
Feb 24, 2020
Ahmet Gökhan Poyraz, Ahmet Emir Dirik, Ahmet Karaküçük, Nasir Memon

Figure 1 for Fusion of Camera Model and Source Device Specific Forensic Methods for Improved Tamper Detection
Figure 2 for Fusion of Camera Model and Source Device Specific Forensic Methods for Improved Tamper Detection
Figure 3 for Fusion of Camera Model and Source Device Specific Forensic Methods for Improved Tamper Detection
Figure 4 for Fusion of Camera Model and Source Device Specific Forensic Methods for Improved Tamper Detection
Viaarxiv icon

Neural Imaging Pipelines - the Scourge or Hope of Forensics?

Add code
Bookmark button
Alert button
Feb 27, 2019
Pawel Korus, Nasir Memon

Figure 1 for Neural Imaging Pipelines - the Scourge or Hope of Forensics?
Figure 2 for Neural Imaging Pipelines - the Scourge or Hope of Forensics?
Figure 3 for Neural Imaging Pipelines - the Scourge or Hope of Forensics?
Figure 4 for Neural Imaging Pipelines - the Scourge or Hope of Forensics?
Viaarxiv icon

Content Authentication for Neural Imaging Pipelines: End-to-end Optimization of Photo Provenance in Complex Distribution Channels

Add code
Bookmark button
Alert button
Dec 04, 2018
Pawel Korus, Nasir Memon

Figure 1 for Content Authentication for Neural Imaging Pipelines: End-to-end Optimization of Photo Provenance in Complex Distribution Channels
Figure 2 for Content Authentication for Neural Imaging Pipelines: End-to-end Optimization of Photo Provenance in Complex Distribution Channels
Figure 3 for Content Authentication for Neural Imaging Pipelines: End-to-end Optimization of Photo Provenance in Complex Distribution Channels
Figure 4 for Content Authentication for Neural Imaging Pipelines: End-to-end Optimization of Photo Provenance in Complex Distribution Channels
Viaarxiv icon

DeepMasterPrints: Generating MasterPrints for Dictionary Attacks via Latent Variable Evolution

Add code
Bookmark button
Alert button
Oct 18, 2018
Philip Bontrager, Aditi Roy, Julian Togelius, Nasir Memon, Arun Ross

Figure 1 for DeepMasterPrints: Generating MasterPrints for Dictionary Attacks via Latent Variable Evolution
Figure 2 for DeepMasterPrints: Generating MasterPrints for Dictionary Attacks via Latent Variable Evolution
Figure 3 for DeepMasterPrints: Generating MasterPrints for Dictionary Attacks via Latent Variable Evolution
Figure 4 for DeepMasterPrints: Generating MasterPrints for Dictionary Attacks via Latent Variable Evolution
Viaarxiv icon

Kid on The Phone! Toward Automatic Detection of Children on Mobile Devices

Add code
Bookmark button
Alert button
Aug 05, 2018
Toan Nguyen, Aditi Roy, Nasir Memon

Figure 1 for Kid on The Phone! Toward Automatic Detection of Children on Mobile Devices
Figure 2 for Kid on The Phone! Toward Automatic Detection of Children on Mobile Devices
Figure 3 for Kid on The Phone! Toward Automatic Detection of Children on Mobile Devices
Figure 4 for Kid on The Phone! Toward Automatic Detection of Children on Mobile Devices
Viaarxiv icon

Tap-based User Authentication for Smartwatches

Add code
Bookmark button
Alert button
Aug 05, 2018
Toan Nguyen, Nasir Memon

Figure 1 for Tap-based User Authentication for Smartwatches
Figure 2 for Tap-based User Authentication for Smartwatches
Figure 3 for Tap-based User Authentication for Smartwatches
Figure 4 for Tap-based User Authentication for Smartwatches
Viaarxiv icon