What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Min Wu
Google Scholar
ORCID:
0000-0001-7672-9357
27
publications in security and cryptology related venues
Year
Venue
Title
2024
journals/tifs
A Canonical Data Transformation for Achieving Inter- and Within-Group Fairness.
Zachary McBride Lazri
Ivan Brugere
Xin Tian
Dana Dachman-Soled
Antigoni Polychroniadou
Danial Dervovic
Min Wu
2023
journals/tifs
Analysis of ENF Signal Extraction From Videos Acquired by Rolling Shutters.
Jisoo Choi
Chau-Wai Wong
Hui Su
Min Wu
2022
journals/tifs
Invisible Geolocation Signature Extraction From a Single Image.
Jisoo Choi
Chau-Wai Wong
Adi Hajj-Ahmad
Min Wu
Yanpin Ren
2022
journals/tifs
PulseEdit: Editing Physiological Signals in Facial Videos for Privacy Protection.
Mingliang Chen
Xin Liao
Min Wu
2021
journals/tifs
Adaptive Multi-Trace Carving for Robust Frequency Tracking in Forensic Applications.
Qiang Zhu
Mingliang Chen
Chau-Wai Wong
Min Wu
2020
conf/ih
Exploiting Micro-Signals for Physiological Forensics.
Min Wu
2019
journals/tifs
Factors Affecting ENF Capture in Audio.
Adi Hajj-Ahmad
Chau-Wai Wong
Steven Gambino
Qiang Zhu
Miao Yu
Min Wu
2017
journals/tifs
Flicker Forensics for Camcorder Piracy.
Adi Hajj-Ahmad
Séverine Baudry
Bertrand Chupeau
Gwenaël J. Doërr
Min Wu
2017
journals/tifs
Counterfeit Detection Based on Unclonable Feature of Paper Using Mobile Camera.
Chau-Wai Wong
Min Wu
2015
journals/tifs
ENF-Based Region-of-Recording Identification for Media Signals.
Adi Hajj-Ahmad
Ravi Garg
Min Wu
2013
journals/tifs
"Seeing" ENF: Power-Signature-Based Timestamp for Digital Multimedia via Optical Sensing and Signal Processing.
Ravi Garg
Avinash L. Varna
Adi Hajj-Ahmad
Min Wu
2013
journals/tifs
Anti-Forensics and Countermeasures of Electrical Network Frequency Analysis.
Wei-Hong Chuang
Ravi Garg
Min Wu
2012
journals/tifs
An Efficient Gradient Descent Approach to Secure Localization in Resource Constrained Wireless Sensor Networks.
Ravi Garg
Avinash L. Varna
Min Wu
2012
conf/ccs
How secure are power network signature based time stamps?
Wei-Hong Chuang
Ravi Garg
Min Wu
2012
conf/ih
Robustness of Color Interpolation Identification against Anti-forensic Operations.
Wei-Hong Chuang
Min Wu
2011
journals/tifs
Modeling and Analysis of Correlated Binary Fingerprints for Content Identification.
Avinash L. Varna
Min Wu
2009
journals/tifs
Fingerprinting compressed multimedia signals.
Avinash L. Varna
Shan He
Ashwin Swaminathan
Min Wu
2009
journals/tifs
Intrinsic sensor noise features for forensic analysis on scanners and scanned images.
Hongmei Gou
Ashwin Swaminathan
Min Wu
2008
journals/tifs
Digital Image Forensics via Intrinsic Fingerprints.
Ashwin Swaminathan
Min Wu
K. J. Ray Liu
2007
journals/tifs
Collusion-Resistant Video Fingerprinting for Large User Group.
Shan He
Min Wu
2007
journals/tifs
Nonintrusive Component Forensics of Visual Sensors Using Output Images.
Ashwin Swaminathan
Min Wu
K. J. Ray Liu
2007
journals/tifs
Unicity Distance of Robust Image Hashing.
Yinian Mao
Min Wu
2007
journals/tifs
Tracing Malicious Relays in Cooperative Wireless Communications.
Yinian Mao
Min Wu
2006
journals/tifs
Joint coding and embedding techniques for MultimediaFingerprinting.
Shan He
Min Wu
2006
journals/tifs
Robust and secure image hashing.
Ashwin Swaminathan
Yinian Mao
Min Wu
2005
conf/ih
Data Hiding in Compiled Program Binaries for Enhancing Computer System Performance.
Ashwin Swaminathan
Yinian Mao
Min Wu
Krishnan Kailas
2001
conf/uss
Reading Between the Lines: Lessons from the SDMI Challenge.
Scott Craver
Min Wu
Bede Liu
Adam Stubblefield
Ben Swartzlander
Dan S. Wallach
Drew Dean
Edward W. Felten
Coauthors
Adam Stubblefield
(1)
Adi Hajj-Ahmad
(5)
Antigoni Polychroniadou
(1)
Ashwin Swaminathan
(6)
Avinash L. Varna
(4)
Bede Liu
(1)
Ben Swartzlander
(1)
Bertrand Chupeau
(1)
Chau-Wai Wong
(5)
Dan S. Wallach
(1)
Dana Dachman-Soled
(1)
Danial Dervovic
(1)
Drew Dean
(1)
Edward W. Felten
(1)
Gwenaël J. Doërr
(1)
Hongmei Gou
(1)
Hui Su
(1)
Ivan Brugere
(1)
Jisoo Choi
(2)
K. J. Ray Liu
(2)
Krishnan Kailas
(1)
Miao Yu
(1)
Min Wu
(27)
Mingliang Chen
(2)
Qiang Zhu
(2)
Ravi Garg
(5)
Scott Craver
(1)
Séverine Baudry
(1)
Shan He
(3)
Steven Gambino
(1)
Wei-Hong Chuang
(3)
Xin Liao
(1)
Xin Tian
(1)
Yanpin Ren
(1)
Yinian Mao
(4)
Zachary McBride Lazri
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to