Johann A. Briffa

Orcid: 0000-0003-3532-9474

According to our database1, Johann A. Briffa authored at least 30 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Passersby-Anonymizer: Safeguard the Privacy of Passersby in Social Videos.
Proceedings of the IEEE International Joint Conference on Biometrics, 2024

2023
Multitemporal and Multispectral Data Fusion for Super-Resolution of Sentinel-2 Images.
IEEE Trans. Geosci. Remote. Sens., 2023

2021
Automated segmentation of microtomography imaging of Egyptian mummies.
CoRR, 2021

2020
On the displacement of eigenvalues when removing a twin vertex.
Discuss. Math. Graph Theory, 2020

2019
Multi-Stream TCP: Leveraging the Performance of a Per-Packet Multipath Routing Algorithm When Using TCP and SDN.
Proceedings of the 44th IEEE Conference on Local Computer Networks, 2019

Lossless Light Field Compression Using 4D Wavelet Transforms.
Proceedings of the 2019 IEEE International Conference on Image Processing, 2019

Solving the Multi-Commodity Flow Problem using a Multi-Objective Genetic Algorithm.
Proceedings of the IEEE Congress on Evolutionary Computation, 2019

2018
Fast algorithms for indices of nested split graphs approximating real complex networks.
Discret. Appl. Math., 2018

Time-Varying Block Codes for Synchronization Errors: MAP Decoder and Practical Issues.
CoRR, 2018

SimCommSys: Taking the errors out of error-correcting code simulations.
CoRR, 2018

GPU Implementation and Optimization of a Flexible MAP Decoder for Synchronization Correction.
CoRR, 2018

An Evolutionary Multipath Routing Algorithm using SDN.
Proceedings of the 9th International Conference on the Network of the Future, 2018

Time-Varying Variable-Length Error-Correcting Codes.
Proceedings of the International Symposium on Information Theory and Its Applications, 2018

A globally optimised multipath routing algorithm using SDN.
Proceedings of the 21st Conference on Innovation in Clouds, 2018

2017
Classifier ensembles for image identification using multi-objective Pareto features.
Neurocomputing, 2017

2015
Evolutionary Multiobjective Image Feature Extraction in the Presence of Noise.
IEEE Trans. Cybern., 2015

Cloning localization approach using k-means clustering and support vector machine.
J. Electronic Imaging, 2015

Trade-off between computational complexity and accuracy in evolutionary image feature extraction.
Proceedings of the IEEE Congress on Evolutionary Computation, 2015

2014
Cloning Localization Based on Feature Extraction and K-means Clustering.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014

Neural network ensembles for image identification using Pareto-optimal features.
Proceedings of the IEEE Congress on Evolutionary Computation, 2014

2013
A {GPU} Implementation of a {MAP} Decoder for Synchronization Error Correcting Codes.
IEEE Commun. Lett., 2013

Forgery localization based on image chroma feature extraction.
Proceedings of the 5th International Conference on Imaging for Crime Detection and Prevention, 2013

A Comparative Study of Multi-objective Evolutionary Trace Transform Methods for Robust Feature Extraction.
Proceedings of the Evolutionary Multi-Criterion Optimization, 2013

2012
Evolutionary multi-objective optimization of trace transform for invariant feature extraction.
Proceedings of the IEEE Congress on Evolutionary Computation, 2012

2011
Image Forensics of High Dynamic Range Imaging.
Proceedings of the Digital Forensics and Watermarking - 10th International Workshop, 2011

Codebook and marker sequence design for synchronization-correcting codes.
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011

Forensic data hiding optimized for JPEG 2000.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2011), 2011

2010
An Improved Decoding Algorithm for the Davey-MacKay Construction.
Proceedings of IEEE International Conference on Communications, 2010

2009
Has F5 really been broken?
Proceedings of the 3rd International Conference on Imaging for Crime Detection and Prevention, 2009

2008
On the Performance of Wavelet Decomposition Steganalysis with JSteg Steganography.
Proceedings of the Digital Watermarking, 7th International Workshop, 2008


  Loading...