default search action
Pawel Korus
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j13]Mirko Marras, Pawel Korus, Anubhav Jain, Nasir D. Memon:
Dictionary Attacks on Speaker Verification. IEEE Trans. Inf. Forensics Secur. 18: 773-788 (2023) - 2022
- [j12]Pawel Korus, Nasir D. Memon:
Computational Sensor Fingerprints. IEEE Trans. Inf. Forensics Secur. 17: 2508-2523 (2022) - [d1]Govind Mittal, Pawel Korus, Nasir D. Memon:
File Fragment Type (FFT) - 75 Dataset. IEEE DataPort, 2022 - [i8]Mirko Marras, Pawel Korus, Anubhav Jain, Nasir D. Memon:
Dictionary Attacks on Speaker Verification. CoRR abs/2204.11304 (2022) - 2021
- [j11]Govind Mittal, Pawel Korus, Nasir D. Memon:
FiFTy: Large-Scale File Fragment Type Identification Using Convolutional Neural Networks. IEEE Trans. Inf. Forensics Secur. 16: 28-41 (2021) - [c16]Athanasios Papadopoulos, Pawel Korus, Nasir D. Memon:
Hard-Attention for Scalable Image Classification. NeurIPS 2021: 14694-14707 - [i7]Athanasios Papadopoulos, Pawel Korus, Nasir D. Memon:
Hard-Attention for Scalable Image Classification. CoRR abs/2102.10212 (2021) - 2020
- [c15]Pawel Korus, Nasir D. Memon:
Quantifying the Cost of Reliable Photo Authentication via High-Performance Learned Lossy Representations. ICLR 2020 - [c14]Sharad Joshi, Pawel Korus, Nitin Khanna, Nasir D. Memon:
Empirical Evaluation of PRNU Fingerprint Variation for Mismatched Imaging Pipelines. WIFS 2020: 1-6 - [i6]Sharad Joshi, Pawel Korus, Nitin Khanna, Nasir D. Memon:
Empirical Evaluation of PRNU Fingerprint Variation for Mismatched Imaging Pipelines. CoRR abs/2004.01929 (2020)
2010 – 2019
- 2019
- [j10]Emre Durmus, Pawel Korus, Nasir D. Memon:
Every Shred Helps: Assembling Evidence From Orphaned JPEG Fragments. IEEE Trans. Inf. Forensics Secur. 14(9): 2372-2386 (2019) - [c13]Pawel Korus, Nasir D. Memon:
Content Authentication for Neural Imaging Pipelines: End-To-End Optimization of Photo Provenance in Complex Distribution Channels. CVPR 2019: 8621-8629 - [c12]Mirko Marras, Pawel Korus, Nasir D. Memon, Gianni Fenu:
Adversarial Optimization for Dictionary Attacks on Speaker Verification. INTERSPEECH 2019: 2913-2917 - [i5]Pawel Korus, Nasir D. Memon:
Neural Imaging Pipelines - the Scourge or Hope of Forensics? CoRR abs/1902.10707 (2019) - [i4]Govind Mittal, Pawel Korus, Nasir D. Memon:
FiFTy: Large-scale File Fragment Type Identification using Neural Networks. CoRR abs/1908.06148 (2019) - 2018
- [j9]Da Luo, Pawel Korus, Jiwu Huang:
Band Energy Difference for Source Attribution in Audio Forensics. IEEE Trans. Inf. Forensics Secur. 13(9): 2179-2189 (2018) - [i3]Pawel Korus:
Large-Scale and Fine-Grained Evaluation of Popular JPEG Forgery Localization Schemes. CoRR abs/1811.12915 (2018) - [i2]Pawel Korus, Nasir D. Memon:
Content Authentication for Neural Imaging Pipelines: End-to-end Optimization of Photo Provenance in Complex Distribution Channels. CoRR abs/1812.01516 (2018) - 2017
- [j8]Pawel Korus:
Digital image integrity - a survey of protection and verification techniques. Digit. Signal Process. 71: 1-26 (2017) - [j7]Pawel Korus, Jiwu Huang:
Multi-Scale Analysis Strategies in PRNU-Based Tampering Localization. IEEE Trans. Inf. Forensics Secur. 12(4): 809-824 (2017) - 2016
- [j6]Pawel Korus, Jiwu Huang:
Improved Tampering Localization in Digital Image Forensics Based on Maximal Entropy Random Walk. IEEE Signal Process. Lett. 23(1): 169-173 (2016) - [j5]Jaroslaw Duda, Pawel Korus, Neeraj J. Gadgil, Khalid Tahboub, Edward J. Delp:
Image-Like 2D Barcodes Using Generalizations of the Kuznetsov-Tsybakov Problem. IEEE Trans. Inf. Forensics Secur. 11(4): 691-703 (2016) - [j4]Pawel Korus, Jiwu Huang:
Multi-Scale Fusion for Improved Localization of Malicious Tampering in Digital Images. IEEE Trans. Image Process. 25(3): 1312-1326 (2016) - [c11]Pawel Korus, Jiwu Huang:
Evaluation of random field models in multi-modal unsupervised tampering localization. WIFS 2016: 1-6 - 2015
- [j3]Pawel Korus, Jaroslaw Bialas, Andrzej Dziech:
Towards Practical Self-Embedding for JPEG-Compressed Digital Images. IEEE Trans. Multim. 17(2): 157-170 (2015) - 2014
- [j2]Pawel Korus, Jaroslaw Bialas, Andrzej Dziech:
A new approach to high-capacity annotation watermarking based on digital fountain codes. Multim. Tools Appl. 68(1): 59-77 (2014) - [c10]Pawel Korus, Jaroslaw Bialas, Andrzej Dziech:
Iterative filtering for semi-fragile self-recovery. WIFS 2014: 36-41 - 2013
- [j1]Pawel Korus, Andrzej Dziech:
Efficient Method for Content Reconstruction With Self-Embedding. IEEE Trans. Image Process. 22(3): 1134-1147 (2013) - [c9]Andrzej Dziech, Jaroslaw Bialas, Andrzej Glowacz, Pawel Korus, Mikolaj Leszczuk, Andrzej Matiolanski, Remigiusz Baran:
Overview of Recent Advances in CCTV Processing Chain in the INDECT and INSIGMA Projects. ARES 2013: 836-843 - [c8]Pawel Korus, Jaroslaw Bialas, Andrzej Dziech:
High-quality self-embedding for JPEG-compressed digital images. EUSIPCO 2013: 1-5 - [c7]Katarzyna Zarnowiec, Pawel Korus, Andrzej Dziech, Andrzej Glowacz:
Practical Implementation of Visual Hash Functions for CCTV Footage Authentication. MCSS 2013: 309-323 - 2012
- [c6]Pawel Korus, Andrzej Dziech:
Reconfigurable self-embedding with high quality restoration under extensive tampering. ICIP 2012: 2193-2196 - [i1]Jaroslaw Duda, Pawel Korus:
Correction Trees as an Alternative to Turbo Codes and Low Density Parity Check Codes. CoRR abs/1204.5317 (2012) - 2011
- [c5]Pawel Korus, Andrzej Dziech:
A novel approach to adaptive image authentication. ICIP 2011: 2765-2768 - [c4]Pawel Korus, Lucjan Janowski, Piotr Romaniak:
Automatic quality control of digital image content reconstruction schemes. ICME 2011: 1-6 - [c3]Pawel Korus, Jaroslaw Bialas, Piotr Olech, Andrzej Dziech:
A High-Capacity Annotation Watermarking Scheme. MCSS 2011: 1-9 - 2010
- [c2]Pawel Korus, W. Szmuc, Andrzej Dziech:
A scheme for censorship of sensitive image content with high-quality reconstruction ability. ICME 2010: 1073-1078
2000 – 2009
- 2009
- [c1]Luca Valcarenghi, Pawel Korus, Francesco Paolucci, Filippo Cugini, Miroslaw Kantor, Krzysztof Wajda, Piero Castoldi:
Experimental Evaluation of PCE-Based Batch Provisioning of Grid Service Interconnections. GLOBECOM 2009: 1-6
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-19 20:54 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint