Name
Affiliation
Papers
RONGRONG NI
Beijing Jiaotong Univ, Inst Informat Sci, Beijing 100044, Peoples R China
109
Collaborators
Citations 
PageRank 
110
718
53.52
Referers 
Referees 
References 
1212
1069
962
Search Limit
1001000
Title
Citations
PageRank
Year
Quantization Step Estimation for JPEG Image Forensics00.342022
Detection of Double JPEG Compression With the Same Quantization Matrix via Convergence Analysis00.342022
Detection of AI-Manipulated Fake Faces via Mining Generalized Features00.342022
MFAN: Multi-Level Features Attention Network for Fake Certificate Image Detection00.342022
ET: Edge-Enhanced Transformer for Image Splicing Detection00.342022
Exploring Complementarity of Global and Local Spatiotemporal Information for Fake Face Video Detection.00.342022
Image Splicing Detection, Localization and Attribution via JPEG Primary Quantization Matrix Estimation and Clustering00.342021
Enhancing Adversarial Examples Transferability via Ensemble Feature Manifolds00.342021
Dual-Domain Fusion Convolutional Neural Network for Contrast Enhancement Forensics00.342021
Anti-Forensics Of Image Contrast Enhancement Based On Generative Adversarial Network00.342021
Adversarial Attack on Fake-Faces Detectors Under White and Black Box Scenarios.00.342021
Attention Guided Spatio-Temporal Artifacts Extraction for Deepfake Detection.00.342021
Pvo-Based Reversible Data Hiding Using Adaptive Multiple Histogram Generation And Modification00.342021
A Survey of Deep Learning-Based Source Image Forensics30.362020
Improved PPVO-based high-fidelity reversible data hiding.40.382020
Double compression detection for H.264 videos with adaptive GOP structure20.372020
Efficient Video Integrity Analysis Through Container Characterization10.352020
Primary Quality Factor Estimation Of Resized Double Compressed Jpeg Images00.342020
Source camera identification based on content-adaptive fusion residual networks50.462019
Reversible data hiding based on pairwise embedding and optimal expansion path.30.372019
An enhanced approach for detecting double JPEG compression with the same quantization matrix40.422019
Robust median filtering detection based on the difference of frequency residuals20.372019
Improved reversible data hiding based on PVO and adaptive pairwise embedding30.382019
An approach to detect video frame deletion under anti-forensics10.342019
Detection And Localization Of Video Object Removal By Spatio-Temporal Lbp Coherence Analysis00.342019
A Blind Print-Recapture Robust Watermark Scheme by Calculating Self-Convolution00.342019
Cycle Gan-Based Attack On Recaptured Images To Fool Both Human And Machine00.342018
Robust Contrast Enhancement Forensics Using Convolutional Neural Networks.00.342018
Copy-Move Forgery Localization Using Convolutional Neural Networks and CFA Features10.342018
A New Dataset for Source Identification of High Dynamic Range Images.10.362018
Security Consideration For Deep Learning-Based Image Forensics10.362018
Facial Expression Recognition Using Weighted Mixture Deep Neural Network Based on Double-Channel Facial Images.40.392018
Nonoverlapping Blocks Based Copy-Move Forgery Detection10.432018
Median filtering detection of small-size image based on CNN.70.542018
Secure Detection of Image Manipulation by Means of Random Feature Selection30.352018
Anomaly Detection in Moving Crowds through Spatiotemporal Autoencoding and Additional Attention10.342018
Double JPEG Compression Detection by Exploring the Correlations in DCT Domain.10.362018
Detection of various image operations based on CNN.00.342017
Source Camera Identification Based On Content-Adaptive Fusion Network.10.372017
A gradient-based pixel-domain attack against SVM detection of global image manipulations10.342017
A 3D mesh watermarking based on improved vertex grouping and piecewise mapping function00.342017
Robust median filtering detection based on local difference descriptor.110.532017
Detection of operation chain: JPEG-Resampling-JPEG.00.342017
A new detector for JPEG decompressed bitmap identification.00.342017
Detection of Seam Carving and Contrast Enhancement Operation Chain00.342015
Detection for Operation Chain: Histogram Equalization and Dither-like Operation.00.342015
Efficient color image reversible data hiding based on channel-dependent payload partition and adaptive embedding.210.612015
On the Security of Image Manipulation Forensics00.342015
Redundancy filtering and fusion verification for video copy detection10.352015
An Effective Detection Method Based on Physical Traits of Recaptured Images on LCD Screens.30.542015
  • 1
  • 2