These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
165 related articles for article (PubMed ID: 20227981)
1. Risk-distortion analysis for video collusion attacks: a mouse-and-cat game. Chen Y; Lin WS; Liu KJ IEEE Trans Image Process; 2010 Jul; 19(7):1798-807. PubMed ID: 20227981 [TBL] [Abstract][Full Text] [Related]
2. Forensic analysis of nonlinear collusion attacks for multimedia fingerprinting. Zhao HV; Wu M; Wang ZJ; Liu KJ IEEE Trans Image Process; 2005 May; 14(5):646-61. PubMed ID: 15887559 [TBL] [Abstract][Full Text] [Related]
3. Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation. Wang ZJ; Wu M; Zhao HV; Trappe W; Liu KJ IEEE Trans Image Process; 2005 Jun; 14(6):804-21. PubMed ID: 15971779 [TBL] [Abstract][Full Text] [Related]
4. Choosing what to protect. Bier VM Risk Anal; 2007 Jun; 27(3):607-20. PubMed ID: 17640211 [TBL] [Abstract][Full Text] [Related]
5. Resource distribution in multiple attacks with imperfect detection of the attack outcome. Levitin G; Hausken K Risk Anal; 2012 Feb; 32(2):304-18. PubMed ID: 21801189 [TBL] [Abstract][Full Text] [Related]
6. Collusion-resistant audio fingerprinting system in the modulated complex lapped transform domain. Garcia-Hernandez JJ; Feregrino-Uribe C; Cumplido R PLoS One; 2013; 8(6):e65985. PubMed ID: 23762455 [TBL] [Abstract][Full Text] [Related]
7. Defender-Attacker Games with Asymmetric Player Utilities. Zhai Q; Peng R; Zhuang J Risk Anal; 2020 Feb; 40(2):408-420. PubMed ID: 31529803 [TBL] [Abstract][Full Text] [Related]
8. Temporal frequency of flickering-distortion optimized video halftoning for electronic paper. Hsu CY; Lu CS; Pei SC IEEE Trans Image Process; 2011 Sep; 20(9):2502-14. PubMed ID: 21435981 [TBL] [Abstract][Full Text] [Related]
9. Security under Uncertainty: Adaptive Attackers Are More Challenging to Human Defenders than Random Attackers. Moisan F; Gonzalez C Front Psychol; 2017; 8():982. PubMed ID: 28690557 [TBL] [Abstract][Full Text] [Related]
10. Accurate distortion estimation and optimal bandwidth allocation for scalable H.264 video transmission over MIMO systems. Jubran MK; Bansal M; Kondi LP; Grover R IEEE Trans Image Process; 2009 Jan; 18(1):106-16. PubMed ID: 19095522 [TBL] [Abstract][Full Text] [Related]
11. Cooperation stimulation strategies for peer-to-peer wireless live video-sharing social networks. Lin WS; Zhao HV; Liu KJ IEEE Trans Image Process; 2010 Jul; 19(7):1768-84. PubMed ID: 20227979 [TBL] [Abstract][Full Text] [Related]
12. Frequency Spectrum Modification Process-Based Anti-Collusion Mechanism for Audio Signals. Zhao J; Zong T; Xiang Y; Hua G; Lei X; Gao L; Beliakov G IEEE Trans Cybern; 2023 Sep; 53(9):5510-5522. PubMed ID: 35316204 [TBL] [Abstract][Full Text] [Related]
13. An anti-collusion attack defense method for physical layer key generation scheme based on transmission delay. Wang X; Huang J; Qi C; Peng Y; Zhang S PeerJ Comput Sci; 2023; 9():e1349. PubMed ID: 37346720 [TBL] [Abstract][Full Text] [Related]
14. Error protection and interleaving for wireless transmission of JPEG 2000 images and video. Baruffa G; Micanti P; Frescura F IEEE Trans Image Process; 2009 Feb; 18(2):346-56. PubMed ID: 19126472 [TBL] [Abstract][Full Text] [Related]
15. Robust allocation of a defensive budget considering an attacker's private information. Nikoofal ME; Zhuang J Risk Anal; 2012 May; 32(5):930-43. PubMed ID: 22050276 [TBL] [Abstract][Full Text] [Related]
16. Reach-Avoid Games With Two Defenders and One Attacker: An Analytical Approach. Yan R; Shi Z; Zhong Y IEEE Trans Cybern; 2019 Mar; 49(3):1035-1046. PubMed ID: 29994434 [TBL] [Abstract][Full Text] [Related]
17. Detection Games under Fully Active Adversaries. Tondi B; Merhav N; Barni M Entropy (Basel); 2018 Dec; 21(1):. PubMed ID: 33266739 [TBL] [Abstract][Full Text] [Related]
18. Resource allocation for downlink multiuser video transmission over wireless lossy networks. Maani E; Pahalawatta PV; Berry R; Pappas TN; Katsaggelos AK IEEE Trans Image Process; 2008 Sep; 17(9):1663-71. PubMed ID: 18713672 [TBL] [Abstract][Full Text] [Related]
19. Resource distribution in multiple attacks against a single target. Levitin G; Hausken K Risk Anal; 2010 Aug; 30(8):1231-9. PubMed ID: 20412523 [TBL] [Abstract][Full Text] [Related]
20. Attack-Defense Game Model with Multi-Type Attackers Considering Information Dilemma. Qi G; Li J; Xu C; Chen G; Yang K Entropy (Basel); 2022 Dec; 25(1):. PubMed ID: 36673201 [TBL] [Abstract][Full Text] [Related] [Next] [New Search]