Dora M. Ballesteros L.

Orcid: 0000-0003-3864-818X

According to our database1, Dora M. Ballesteros L. authored at least 29 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
FlexiPrune: A Pytorch tool for flexible CNN pruning policy selection.
SoftwareX, 2024

2023
An efficient deep learning model using network pruning for fake banknote recognition.
Expert Syst. Appl., December, 2023

Sp2PS: Pruning Score by Spectral and Spatial Evaluation of CAM Images.
Informatics, 2023

Is My Pruned Model Trustworthy? PE-Score: A New CAM-Based Evaluation Metric.
Big Data Cogn. Comput., 2023

2022
SeNPIS: Sequential Network Pruning by class-wise Importance Score.
Appl. Soft Comput., 2022

2021
Copy-Move Forgery Detection (CMFD) Using Deep Learning for Image and Video Forensics.
J. Imaging, 2021

Deep4SNet: deep learning for fake speech classification.
Expert Syst. Appl., 2021

Fake Speech Recognition Using Deep Learning.
Proceedings of the Applied Computer Sciences in Engineering, 2021

2020
A Machine Learning Model to Detect Fake Voice.
Proceedings of the Applied Informatics - Third International Conference, 2020

2019
High-uncertainty audio signal encryption based on the Collatz conjecture.
J. Inf. Secur. Appl., 2019

A cloud-oriented integrity verification system for audio forensics.
Comput. Electr. Eng., 2019

Speaker verification with fake intonation based on Neural Networks.
Proceedings of the 7th International Workshop on Biometrics and Forensics, 2019

2018
Secure Speech Content Based on Scrambling and Adaptive Hiding.
Symmetry, 2018

Evolutionary Algorithm for Speech Scrambling based on Asexual Reproduction.
J. Inf. Hiding Multim. Signal Process., 2018

Authenticity verification of audio signals based on fragile watermarking for audio forensics.
Expert Syst. Appl., 2018

A Novel Image Encryption Scheme Based on Collatz Conjecture.
Entropy, 2018

2017
Audio Authenticity and Tampering Detection based on Information Hiding and Collatz p-bit Code.
J. Inf. Hiding Multim. Signal Process., 2017

Security Analysis of The Speech Scrambling Method Based on Imitation of A Super-Gaussian Signal.
J. Inf. Hiding Multim. Signal Process., 2017

A Semi-supervised Speaker Identification Method for Audio Forensics Using Cochleagrams.
Proceedings of the Applied Computer Sciences in Engineering, 2017

2016
An Unconditionally Secure Speech Scrambling Scheme Based on An Imitation Process to A Gaussian Noise Signal.
J. Inf. Hiding Multim. Signal Process., 2016

Highly Transparent Steganography Scheme of Speech Signals into Color Images Using Quantization Index Modulation.
Proceedings of the Pattern Recognition - 8th Mexican Conference, 2016

High Scrambling Degree in Audio Through Imitation of an Unintelligible Signal.
Proceedings of the Pattern Recognition - 8th Mexican Conference, 2016

Highly Transparent and Secure Scheme for Concealing Text Within Audio.
Proceedings of the Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications, 2016

2015
Gray-scale Images within Color Images using Similarity Histogram-Based Selection and Replacement Algorithm.
J. Inf. Hiding Multim. Signal Process., 2015

2014
Speech Scrambling Based on Imitation of a Target Speech Signal with Non-confidential Content.
Circuits Syst. Signal Process., 2014

2013
Wavelet-denoising on hardware devices with Perfect Reconstruction, low latency and adaptive thresholding.
Comput. Electr. Eng., 2013

Real-time, speech-in-speech hiding scheme based on least significant bit substitution and adaptive key.
Comput. Electr. Eng., 2013

2012
On the ability of adaptation of speech signals and data hiding.
Expert Syst. Appl., 2012

Highly transparent steganography model of speech signals using Efficient Wavelet Masking.
Expert Syst. Appl., 2012


  Loading...