Issue Date | Title | Author(s) |
2017 | Classifier ensembles for image identification using multi-objective Pareto features | Albukhanajer, Wissam A.; Jin, Yaochu; Briffa, Johann A. |
2017 | NEREUS : an ERASMUS+ strategic partnership for skills development in the field of “next generation networked media over 4G+ infrastructures" | Pallis, E.; Papadourakis, G.; Debono, C. J.; Briffa, Johann A.; Negru, D.; Mavromoustakis, C. X.; Politis, C.; Tsaptsinos, D.; Mastorakis, G. |
2015 | Cloning localization approach using k-means clustering and support vector machine | Alfraih, Areej S.; Briffa, Johann A.; Wesemeyer, Stephan |
2015 | Trade-off between computational complexity and accuracy in evolutionary image feature extraction | Albukhanajer, Wissam A.; Jin, Yaochu; Briffa, Johann A. |
2014 | Cloning localization based on feature extraction and K-means clustering | Alfraih, Areej S.; Briffa, Johann A.; Wesemeyer, Stephan |
2014 | SimCommSys : taking the errors out of error-correcting code simulations | Briffa, Johann A.; Wesemeyer, Stephan |
2014 | Graphics processing unit implementation and optimisation of a flexible maximum a-posteriori decoder for synchronisation correction | Briffa, Johann A. |
2014 | Evolutionary multiobjective image feature extraction in the presence of noise | Albukhanajer, Wissam A.; Briffa, Johann A.; Jin, Yaochu |
2014 | Neural network ensembles for image identification using pareto-optimal features | Albukhanajer, Wissam A.; Jin, Yaochu; Briffa, Johann A. |
2013 | Eavesdropping near-field contactless payments : a quantitative analysis | Diakos, Thomas P.; Briffa, Johann A.; Brown, Tim W. C.; Wesemeyer, Stephan |
2013 | Formal security analysis of NFC M-coupon protocols using Casper/FDR | Alshehri, Ali; Briffa, Johann A.; Schneider, Steve; Wesemeyer, Stephan |
2013 | Evaluating the eavesdropping range of varying magnetic field strengths in NFC standards | Brown, Tim W. C.; Diakos, Thomas; Briffa, Johann A. |
2013 | A comparative study of multi-objective evolutionary trace transform methods for robust feature extraction | Albukhanajer, Wissam A.; Jin, Yaochu; Briffa, Johann A.; Williams, Godfried |
2012 | Evolutionary multi-objective optimization of trace transform for invariant feature extraction | Albukhanajer, Wissam A.; Jin, Yaochu; Briffa, Johann A. |
2011 | Image forensics of high dynamic range imaging | Bateman, Philip J.; Ho, Anthony T. S.; Briffa, Johann A. |
2013 | A GPU implementation of a MAP decoder for synchronization error correcting codes | Briffa, Johann A. |
2013 | Forgery localization based on image chroma feature extraction | Alfraih, Areej S.; Briffa, Johann A.; Wesemeyer, Stephan |
2009 | Conditional probability based steganalysis for JPEG steganography | Ainuddin, Wahid Wahab; Briffa, Johann A.; Schaathun, Hans Georg; TS Ho, Anthony |
2009 | Has F5 really been broken? | Briffa, Johann A.; Schaathun, Hans Georg; Ainuddin, Wahid Abdul Wahab |
2008 | On the performance of wavelet decomposition steganalysis with JSteg steganography | Abdul, Wahab Ainuddin Wahid; Briffa, Johann A.; Schaathun, Hans Georg |
Collection's Items (Sorted by Submit Date in Descending order): 21 to 40 of 365