default search action
Husrev T. Sencar
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c47]Preslav Nakov, Jisun An, Haewoon Kwak, Muhammad Arslan Manzoor, Zain Muhammad Mujahid, Husrev T. Sencar:
A Survey on Predicting the Factuality and the Bias of News Media. ACL (Findings) 2024: 15947-15962 - [c46]Udesh Kumarasinghe, Ahmed Lekssays, Husrev Taha Sencar, Sabri Boughorbel, Charitha Elvitigala, Preslav Nakov:
Semantic Ranking for Automated Adversarial Technique Annotation in Security Text. AsiaCCS 2024 - [i15]Udesh Kumarasinghe, Ahmed Lekssays, Husrev Taha Sencar, Sabri Boughorbel, Charitha Elvitigala, Preslav Nakov:
Semantic Ranking for Automated Adversarial Technique Annotation in Security Text. CoRR abs/2403.17068 (2024) - [i14]Enes Altinisik, Safa Messaoud, Husrev Taha Sencar, Hassan Sajjad, Sanjay Chawla:
Exploiting the Layered Intrinsic Dimensionality of Deep Models for Practical Adversarial Training. CoRR abs/2405.17130 (2024) - 2023
- [j23]Enes Altinisik, Safa Messaoud, Husrev Taha Sencar, Sanjay Chawla:
A3T: accuracy aware adversarial training. Mach. Learn. 112(9): 3191-3210 (2023) - [c45]Enes Altinisik, Hassan Sajjad, Husrev T. Sencar, Safa Messaoud, Sanjay Chawla:
Impact of Adversarial Training on Robustness and Generalizability of Language Models. ACL (Findings) 2023: 7828-7840 - [c44]Enes Altinisik, Fatih Deniz, Hüsrev Taha Sencar:
ProvG-Searcher: A Graph Representation Learning Approach for Efficient Provenance Graph Search. CCS 2023: 2247-2261 - [i13]Enes Altinisik, Fatih Deniz, Husrev Taha Sencar:
ProvG-Searcher: A Graph Representation Learning Approach for Efficient Provenance Graph Search. CoRR abs/2309.03647 (2023) - 2022
- [j22]Enes Altinisik, Hüsrev Taha Sencar, Diram Tabaa:
Video Source Characterization Using Encoding and Encapsulation Characteristics. IEEE Trans. Inf. Forensics Secur. 17: 3211-3224 (2022) - [c43]Panayot Panayotov, Utsav Shukla, Husrev Taha Sencar, Mohamed Nabeel, Preslav Nakov:
GREENER: Graph Neural Networks for News Media Profiling. EMNLP 2022: 7470-7480 - [i12]Enes Altinisik, Husrev Taha Sencar:
Camera Model Identification Using Container and Encoding Characteristics of Video Files. CoRR abs/2201.02949 (2022) - [i11]Enes Altinisik, Husrev Taha Sencar, Mohamed Nabeel, Issa Khalil, Ting Yu:
Exploration of Enterprise Server Data to Assess Ease of Modeling System Behavior. CoRR abs/2206.05679 (2022) - [i10]Sanjay Chawla, Preslav Nakov, Ahmed Ali, Wendy Hall, Issa Khalil, Xiaosong Ma, Husrev Taha Sencar, Ingmar Weber, Michael A. Wooldridge, Ting Yu:
Ten Years after ImageNet: A 360° Perspective on AI. CoRR abs/2210.01797 (2022) - [i9]Enes Altinisik, Hassan Sajjad, Husrev Taha Sencar, Safa Messaoud, Sanjay Chawla:
Impact of Adversarial Training on Robustness and Generalizability of Language Models. CoRR abs/2211.05523 (2022) - [i8]Panayot Panayotov, Utsav Shukla, Husrev Taha Sencar, Mohamed Nabeel, Preslav Nakov:
GREENER: Graph Neural Networks for News Media Profiling. CoRR abs/2211.05533 (2022) - [i7]Enes Altinisik, Safa Messaoud, Husrev Taha Sencar, Sanjay Chawla:
A3T: Accuracy Aware Adversarial Training. CoRR abs/2211.16316 (2022) - 2021
- [j21]Enes Altinisik, Husrev Taha Sencar:
Source Camera Verification for Strongly Stabilized Videos. IEEE Trans. Inf. Forensics Secur. 16: 643-657 (2021) - [j20]Sinan E. Tandogan, Husrev Taha Sencar:
Estimating Uniqueness of I-Vector-Based Representation of Human Voice. IEEE Trans. Inf. Forensics Secur. 16: 3054-3067 (2021) - [j19]Enes Altinisik, Hüsrev T. Sencar:
Automatic Generation of H.264 Parameter Sets to Recover Video File Fragments. IEEE Trans. Inf. Forensics Secur. 16: 4857-4868 (2021) - [c42]Enes Altinisik, Kasim Tasdemir, Hüsrev Taha Sencar:
PRNU Estimation from Encoded Videos Using Block-Based Weighting. Media Watermarking, Security, and Forensics 2021 - [c41]Muhammed Ali Yurdagul, Husrev Taha Sencar:
BLEKeeper: Response Time Behavior Based Man-In-The-Middle Attack Detection. SP (Workshops) 2021: 214-220 - [i6]Preslav Nakov, Husrev Taha Sencar, Jisun An, Haewoon Kwak:
A Survey on Predicting the Factuality and the Bias of News Media. CoRR abs/2103.12506 (2021) - [i5]Muhammed Ali Yurdagul, Husrev Taha Sencar:
BLEKeeper: Response Time Behavior Based Man-In-The-Middle Attack Detection. CoRR abs/2103.16235 (2021) - [i4]Enes Altinisik, Hüsrev T. Sencar:
Automatic Generation of H.264 Parameter Sets to Recover Video File Fragments. CoRR abs/2104.14522 (2021) - 2020
- [j18]Enes Altinisik, Kasim Tasdemir, Husrev Taha Sencar:
Mitigation of H.264 and H.265 Video Compression for Reliable PRNU Estimation. IEEE Trans. Inf. Forensics Secur. 15: 1557-1571 (2020) - [j17]Erkam Uzun, Hüsrev T. Sencar:
JpgScraper: An Advanced Carver for JPEG Files. IEEE Trans. Inf. Forensics Secur. 15: 1846-1857 (2020) - [i3]Enes Altinisik, Kasim Tasdemir, Husrev Taha Sencar:
PRNU Estimation from Encoded Videos Using Block-Based Weighting. CoRR abs/2008.08138 (2020) - [i2]Erkam Sinan Tandogan, Husrev Taha Sencar:
Estimating Uniqueness of Human Voice UsingI-Vector Representation. CoRR abs/2008.11985 (2020)
2010 – 2019
- 2019
- [c40]Sinan E. Tandogan, Enes Altinisik, Salim Sarimurat, Hüsrev T. Sencar:
Tackling In-Camera Downsizing for Reliable Camera ID Verification. Media Watermarking, Security, and Forensics 2019 - [i1]Enes Altinisik, Husrev Taha Sencar:
Source Camera Attribution from Strongly Stabilized Videos. CoRR abs/1912.05018 (2019) - 2018
- [c39]Enes Altinisik, Kasim Tasdemir, Husrev Taha Sencar:
Extracting Prnu Noise from H.264 Coded Videos. EUSIPCO 2018: 1367-1371 - 2017
- [c38]Samet Taspinar, Husrev T. Sencar, Sevinc Bayram, Nasir D. Memon:
Fast camera fingerprint matching in very large databases. ICIP 2017: 4088-4092 - [c37]Sinan E. Tandogan, Husrev T. Sencar, Bülent Tavli:
Towards measuring uniqueness of human voice. WIFS 2017: 1-6 - 2016
- [j16]Pratik Narang, Chittaranjan Hota, Husrev Taha Sencar:
Noise-resistant mechanisms for the detection of stealthy peer-to-peer botnets. Comput. Commun. 96: 29-42 (2016) - 2015
- [j15]Sevinc Bayram, Husrev Taha Sencar, Nasir D. Memon:
Sensor Fingerprint Identification Through Composite Fingerprints and Group Testing. IEEE Trans. Inf. Forensics Secur. 10(3): 597-612 (2015) - [j14]Erkam Uzun, Husrev Taha Sencar:
Carving Orphaned JPEG File Fragments. IEEE Trans. Inf. Forensics Secur. 10(8): 1549-1563 (2015) - [c36]Ahmet Karaküçük, Ahmet Emir Dirik, Hüsrev T. Sencar, Nasir D. Memon:
Recent advances in counter PRNU based source attribution and beyond. Media Watermarking, Security, and Forensics 2015: 94090N - 2014
- [j13]Erkam Uzun, Husrev T. Sencar:
A preliminary examination technique for audio evidence to distinguish speech from non-speech using objective speech quality measures. Speech Commun. 61: 1-16 (2014) - [j12]Ahmet Emir Dirik, Hüsrev T. Sencar, Nasir D. Memon:
Analysis of Seam-Carving-Based Anonymization of Images Against PRNU Noise Pattern-Based Source Attribution. IEEE Trans. Inf. Forensics Secur. 9(12): 2277-2290 (2014) - [c35]Napa Sae-Bae, Xiaoxi Sun, Husrev T. Sencar, Nasir D. Memon:
Towards automatic detection of child pornography. ICIP 2014: 5332-5336 - [c34]Shize Shang, Husrev T. Sencar, Nasir D. Memon, Xiangwei Kong:
A semi-automatic deshredding method based on curve matching. ICIP 2014: 5537-5541 - 2013
- [j11]Samet Hicsonmez, Husrev T. Sencar, Ismail Avcibas:
Audio codec identification from coded and transcoded audios. Digit. Signal Process. 23(5): 1720-1730 (2013) - [c33]Liyun Li, Husrev Taha Sencar, Nasir D. Memon:
A cost-effective decision tree based approach to steganalysis. Media Watermarking, Security, and Forensics 2013: 86650P - [c32]Sevinc Bayram, Husrev T. Sencar, Nasir D. Memon:
Seam-carving based anonymization against image & video source attribution. MMSP 2013: 272-277 - [c31]Samet Hicsonmez, Erkam Uzun, Husrev Taha Sencar:
Methods for identifying traces of compression in audio. SIU 2013: 1-4 - 2012
- [j10]Sevinç Bayram, Hüsrev T. Sencar, Nasir D. Memon:
Efficient Sensor Fingerprint Matching Through Fingerprint Binarization. IEEE Trans. Inf. Forensics Secur. 7(4): 1404-1413 (2012) - [c30]Samet Hicsonmez, Husrev T. Sencar, Ismail Avcibas:
Classification of audio codecs based on coding characteristics. SIU 2012: 1-4 - [c29]Erkam Uzun, Husrev Taha Sencar:
Classification of audios containing speech and music. SIU 2012: 1-4 - 2011
- [c28]Samet Hicsonmez, Husrev T. Sencar, Ismail Avcibas:
Audio codec identification through payload sampling. WIFS 2011: 1-6 - 2010
- [c27]Yagiz Sutcu, Husrev T. Sencar, Nasir D. Memon:
How to Measure Biometric Information? ICPR 2010: 1469-1472 - [c26]Sevinc Bayram, Ahmet Emir Dirik, Husrev T. Sencar, Nasir D. Memon:
An Ensemble of Classifiers Approach to Steganalysis. ICPR 2010: 4376-4379 - [c25]Sevinc Bayram, Husrev T. Sencar, Nasir D. Memon:
Efficient techniques for sensor fingerprint matching in large image and video databases. Media Forensics and Security 2010: 754109 - [p1]Shiguo Lian, Nikolaos Nikolaidis, Husrev T. Sencar:
Content-Based Video Copy Detection - A Survey. Intelligent Multimedia Analysis for Security Applications 2010: 253-273 - [e1]Husrev T. Sencar, Sergio A. Velastin, Nikolaos Nikolaidis, Shiguo Lian:
Intelligent Multimedia Analysis for Security Applications. Studies in Computational Intelligence 282, Springer 2010, ISBN 978-3-642-11754-1 [contents]
2000 – 2009
- 2009
- [j9]Husrev T. Sencar, Nasir D. Memon:
Identification and recovery of JPEG files with missing fragments. Digit. Investig. 6(Supplement): S88-S98 (2009) - [c24]Sevinc Bayram, Husrev T. Sencar, Nasir D. Memon:
An efficient and robust method for detecting copy-move forgery. ICASSP 2009: 1053-1056 - [c23]Ahmet Emir Dirik, Husrev T. Sencar, Nasir D. Memon:
Flatbed scanner identification based on dust and scratches over scanner platen. ICASSP 2009: 1385-1388 - [c22]Kurt Rosenfeld, Husrev T. Sencar:
A study of the robustness of PRNU-based camera identification. Media Forensics and Security 2009: 72540M - 2008
- [j8]Sevinc Bayram, Husrev T. Sencar, Nasir D. Memon:
Classification of digital camera-models based on demosaicing artifacts. Digit. Investig. 5(1-2): 49-59 (2008) - [j7]Anandabrata Pal, Husrev T. Sencar, Nasir D. Memon:
Detecting file fragmentation point using sequential hypothesis testing. Digit. Investig. 5(Supplement): S2-S13 (2008) - [j6]Ahmet Emir Dirik, Husrev T. Sencar, Nasir D. Memon:
Digital Single Lens Reflex Camera Identification From Traces of Sensor Dust. IEEE Trans. Inf. Forensics Secur. 3(3): 539-552 (2008) - [c21]Sevinc Bayram, Husrev T. Sencar, Nasir D. Memon:
Video copy detection based on source device characteristics: a complementary approach to content-based methods. Multimedia Information Retrieval 2008: 435-442 - 2007
- [j5]Husrev T. Sencar, Mahalingam Ramkumar, Ali N. Akansu, Amol Sukerkar:
Improved utilization of embedding distortion in scalar quantization based data hiding techniques. Signal Process. 87(5): 877-890 (2007) - [j4]Husrev T. Sencar, Nasir D. Memon:
Combatting Ambiguity Attacks via Selective Detection of Embedded Watermarks. IEEE Trans. Inf. Forensics Secur. 2(4): 664-682 (2007) - [c20]Sintayehu Dehnie, Husrev T. Sencar, Nasir D. Memon:
Detecting Malicious Behavior in Cooperative Diversity. CISS 2007: 895-899 - [c19]Yagiz Sutcu, Baris Coskun, Husrev T. Sencar, Nasir D. Memon:
Tamper Detection Based on Regularity of Wavelet Transform Coefficients. ICIP (1) 2007: 397-400 - [c18]Ahmet Emir Dirik, Sevinc Bayram, Husrev T. Sencar, Nasir D. Memon:
New Features to Identify Computer Generated Images. ICIP (4) 2007: 433-436 - [c17]Yagiz Sutcu, Sevinc Bayram, Husrev T. Sencar, Nasir D. Memon:
Improvements on Sensor Noise Based Source Camera Identification. ICME 2007: 24-27 - [c16]Husrev T. Sencar, Qiming Li, Nasir D. Memon:
A new approach to countering ambiguity attacks. MM&Sec 2007: 205-214 - 2006
- [j3]Mehdi Kharrazi, Husrev T. Sencar, Nasir D. Memon:
Performance study of common image steganography and steganalysis techniques. J. Electronic Imaging 15(4): 041104 (2006) - [j2]Husrev T. Sencar, Mahalingam Ramkumar, Ali N. Akansu:
An overview of scalar quantization based data hiding methods. Signal Process. 86(5): 893-914 (2006) - [j1]Mehdi Kharrazi, Husrev T. Sencar, Nasir D. Memon:
Improving Steganalysis by Fusion Techniques: A Case Study with Image Steganography. Trans. Data Hiding Multim. Secur. 1: 123-137 (2006) - [c15]Mehdi Kharrazi, Husrev Taha Sencar, Nasir D. Memon:
Cover Selection for Steganographic Embedding. ICIP 2006: 117-120 - [c14]Sintayehu Dehnie, Husrev T. Sencar, Nasir D. Memon:
Digital Image Forensics for Identifying Computer Generated and Digital Camera Images. ICIP 2006: 2313-2316 - [c13]Sevinc Bayram, Husrev T. Sencar, Nasir D. Memon:
Identifying Digital Cameras Using CFA Interpolation. IFIP Int. Conf. Digital Forensics 2006: 289-299 - [c12]Mehdi Kharrazi, Husrev T. Sencar, Nasir D. Memon:
Improving steganalysis by fusion techniques: a case study with image steganography. Security, Steganography, and Watermarking of Multimedia Contents 2006: 607205 - 2005
- [c11]Husrev T. Sencar, Nasir D. Memon:
Watermarking and ownership problem: a revisit. Digital Rights Management Workshop 2005: 93-101 - [c10]Kyle Petrowski, Mehdi Kharrazi, Hüsrev T. Sencar, Nasir D. Memon:
PSteg: steganographic embedding through patching. ICASSP (2) 2005: 537-540 - [c9]Sevinc Bayram, Husrev T. Sencar, Nasir D. Memon, Ismail Avcibas:
Source camera identification based on CFA interpolation. ICIP (3) 2005: 69-72 - [c8]Yagiz Sutcu, Husrev T. Sencar, Nasir D. Memon:
A secure biometric authentication scheme based on robust hashing. MM&Sec 2005: 111-116 - [c7]Mehdi Kharrazi, Husrev T. Sencar, Nasir D. Memon:
Benchmarking steganographic and steganalysis techniques. Security, Steganography, and Watermarking of Multimedia Contents 2005: 252-263 - 2004
- [c6]Hüsrev T. Sencar, Mahalingam Ramkumar, Ali N. Akansu:
An analysis of quantization based embedding-detection techniques. ICASSP (3) 2004: 77-80 - [c5]Mehdi Kharrazi, Husrev T. Sencar, Nasir D. Memon:
Blind source camera identification. ICIP 2004: 709-712 - 2003
- [c4]Husrev T. Sencar, Mahalingam Ramkumar, Ali N. Akansu:
A new perspective for embedding-detection methods with distortion compensation and thresholding processing techniques. ICIP (2) 2003: 507-510 - 2002
- [c3]Husrev T. Sencar, Ali N. Akansu, Mahalingam Ramkumar:
Improvements on data hiding for lossy compression. ICASSP 2002: 3449-3452
1990 – 1999
- 1999
- [c2]Gozde Bozdagi, Hüsrev T. Sencar:
Preprocessing tool for compressed video editing. MMSP 1999: 283-288 - [c1]Ricardo L. de Queiroz, Gozde Bozdagi, Husrev Taha Sencar:
Fast video segmentation using encoding cost data. Storage and Retrieval for Image and Video Databases (SPIE) 1999: 699-709
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint