Nasir D. Memon
Orcid: 0000-0002-0103-9762Affiliations:
- NYU Polytechnic School of Engineering, Department of Computer Science and Engineering
- New York University Tandon School of Engineering, Department of Computer Science and Engineering
- Northern Illinois University, DeKalb, Department of Computer Science
According to our database1,
Nasir D. Memon
authored at least 290 papers
between 1989 and 2024.
Collaborative distances:
Collaborative distances:
Awards
IEEE Fellow
IEEE Fellow 2011, "For contributions to media security and compression".
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on viaf.org
-
on twitter.com
-
on orcid.org
-
on id.loc.gov
-
on isni.org
On csauthors.net:
Bibliography
2024
Alpha-Wolves and Alpha-mammals: Exploring Dictionary Attacks on Iris Recognition Systems.
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision Workshops, 2024
Proceedings of the 9th IEEE European Symposium on Security and Privacy, 2024
2023
IEEE Signal Process. Mag., July, 2023
The Effect of Inverse Square Law of Light on ENF in Videos Exposed by Rolling Shutter.
IEEE Trans. Inf. Forensics Secur., 2023
Proceedings of the IEEE International Joint Conference on Biometrics, 2023
Proceedings of the IEEE International Joint Conference on Biometrics, 2023
2022
Proc. ACM Hum. Comput. Interact., 2022
Cross-Platform Multimodal Misinformation: Taxonomy, Characteristics and Detection for Textual Posts and Videos.
Proceedings of the Sixteenth International AAAI Conference on Web and Social Media, 2022
Proceedings of the IEEE International Joint Conference on Biometrics, 2022
Diversity and Novelty MasterPrints: Generating Multiple DeepMasterPrints for Increased User Coverage.
Proceedings of the 21st International Conference of the Biometrics Special Interest Group, 2022
2021
FiFTy: Large-Scale File Fragment Type Identification Using Convolutional Neural Networks.
IEEE Trans. Inf. Forensics Secur., 2021
Crossing the Bridge to STEM: Retaining Women Students in an Online CS Conversion Program.
ACM Trans. Comput. Educ., 2021
Proceedings of the NSPW '21: New Security Paradigms Workshop, Virtual Event, USA, October 25, 2021
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021
Proceedings of the IEEE International Conference on Acoustics, 2021
2020
IEEE Trans. Inf. Forensics Secur., 2020
Editorial: Media Authentication and Forensics - New Solutions and Research Opportunities.
IEEE J. Sel. Top. Signal Process., 2020
Fusion of Camera Model and Source Device Specific Forensic Methods for Improved Tamper Detection.
CoRR, 2020
IEEE Access, 2020
Proceedings of the 12th IEEE International Workshop on Information Forensics and Security, 2020
Quantifying the Cost of Reliable Photo Authentication via High-Performance Learned Lossy Representations.
Proceedings of the 8th International Conference on Learning Representations, 2020
Proceedings of the CHI '20: CHI Conference on Human Factors in Computing Systems, 2020
The Role of the Crowd in Countering Misinformation: A Case Study of the COVID-19 Infodemic.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020
2019
IEEE Trans. Inf. Forensics Secur., 2019
IEEE Trans. Inf. Forensics Secur., 2019
IEEE Trans. Biom. Behav. Identity Sci., 2019
CoRR, 2019
Comput. Secur., 2019
Proceedings of the 20th Annual Conference of the International Speech Communication Association, 2019
Proceedings of the IEEE International Conference on Acoustics, 2019
Content Authentication for Neural Imaging Pipelines: End-To-End Optimization of Photo Provenance in Complex Distribution Channels.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2019
MasterPrint Attack Resistance: A Maximum Cover Based Approach for Automatic Fingerprint Template Selection.
Proceedings of the 10th IEEE International Conference on Biometrics Theory, 2019
2018
Pattern Recognit. Lett., 2018
Pattern Recognit., 2018
Proceedings of the 2018 IEEE International Conference on Image Processing, 2018
Proceedings of the IEEE International Conference on Consumer Electronics, 2018
Proceedings of the IEEE International Conference on Consumer Electronics, 2018
Evolutionary Methods for Generating Synthetic MasterPrint Templates: Dictionary Attack in Fingerprint Recognition.
Proceedings of the 2018 International Conference on Biometrics, 2018
Peeling the Onion's User Experience Layer: Examining Naturalistic Use of the Tor Browser.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
DeepMasterPrints: Generating MasterPrints for Dictionary Attacks via Latent Variable Evolution<sup>*</sup>.
Proceedings of the 9th IEEE International Conference on Biometrics Theory, 2018
Proceedings of the 15th IEEE International Conference on Advanced Video and Signal Based Surveillance, 2018
2017
IEEE Trans. Inf. Forensics Secur., 2017
MasterPrint: Exploring the Vulnerability of Partial Fingerprint-Based Authentication Systems.
IEEE Trans. Inf. Forensics Secur., 2017
IEEE Trans. Inf. Forensics Secur., 2017
How Biometric Authentication Poses New Challenges to Our Security and Privacy [In the Spotlight].
IEEE Signal Process. Mag., 2017
IEEE Signal Process. Lett., 2017
Comput. Secur., 2017
Comput. Secur., 2017
Profiling cybersecurity competition participants: Self-efficacy, decision-making and interests predict effectiveness of competitions as a recruitment tool.
Comput. Secur., 2017
Proceedings of the 2017 IEEE Workshop on Information Forensics and Security, 2017
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017
New Me: Understanding Expert and Non-Expert Perceptions and Usage of the Tor Anonymity Network.
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017
Internet-scale Probing of CPS: Inference, Characterization and Orchestration Analysis.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
Proceedings of the 2017 IEEE International Conference on Image Processing, 2017
Proceedings of the Financial Cryptography and Data Security, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Boolean Circuit Camouflage: Cryptographic Models, Limitations, Provable Results and a Random Oracle Realization.
Proceedings of the 2017 Workshop on Attacks and Solutions in Hardware Security, 2017
2016
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2016
Proceedings of the 13th IEEE Symposium on Visualization for Cyber Security, 2016
Self-Efficacy in Cybersecurity Tasks and Its Relationship with Cybersecurity Competition and Work-Related Outcomes.
Proceedings of the 2016 USENIX Workshop on Advances in Security Education (ASE 16), 2016
Proceedings of the 2nd Workshop on Security Information Workers, 2016
Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, 2016
Proceedings of the 2016 IEEE International Conference on Image Processing, 2016
2015
IEEE Trans. Inf. Forensics Secur., 2015
Proceedings of the Technology and Practice of Passwords - 9th International Conference, 2015
Proceedings of the 34th IEEE Military Communications Conference, 2015
Proceedings of the Media Watermarking, 2015
Proceedings of the IEEE International Conference on Identity, 2015
Proceedings of the IEEE International Conference on Identity, 2015
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015
Design and Analysis of Shoulder Surfing Resistant PIN Based Authentication Mechanisms on Google Glass.
Proceedings of the Financial Cryptography and Data Security, 2015
Proceedings of the Financial Cryptography and Data Security, 2015
Proceedings of the 2015 ACM International Workshop on International Workshop on Security and Privacy Analytics, 2015
2014
IEEE Trans. Inf. Forensics Secur., 2014
Analysis of Seam-Carving-Based Anonymization of Images Against PRNU Noise Pattern-Based Source Attribution.
IEEE Trans. Inf. Forensics Secur., 2014
EURASIP J. Adv. Signal Process., 2014
Proceedings of the Eighth ACM Conference on Recommender Systems, 2014
Proceedings of the 9th IEEE Conference on Visual Analytics Science and Technology, 2014
Proceedings of the 2014 IEEE International Conference on Image Processing, 2014
Proceedings of the 2014 IEEE International Conference on Image Processing, 2014
Proceedings of the 2014 IEEE International Conference on Image Processing, 2014
Proceedings of the IEEE International Conference on Acoustics, 2014
Proceedings of the Communications and Multimedia Security, 2014
2013
Proceedings of the 22nd International World Wide Web Conference, 2013
Proceedings of the 15th IEEE International Workshop on Multimedia Signal Processing, 2013
A Lightweight Combinatorial Approach for Inferring the Ground Truth from Multiple Annotators.
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2013
Mining Groups of Common Interest: Discovering Topical Communities with Network Flows.
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2013
Proceedings of the Media Watermarking, 2013
Proceedings of the Multimedia Communications, Services and Security, 2013
Proceedings of the 2013 BIOSIG, 2013
Proceedings of the Security and Privacy in Biometrics, 2013
2012
IEEE Trans. Inf. Forensics Secur., 2012
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2012
Proceedings of the IEEE Fifth International Conference on Biometrics: Theory, 2012
2011
ACE-Cost: Acquisition Cost Efficient Classifier by Hybrid Decision Tree with Local SVM Leaves.
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2011
2010
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010
Efficient techniques for sensor fingerprint matching in large image and video databases.
Proceedings of the Media Forensics and Security II, 2010
Proceedings of the 20th International Conference on Pattern Recognition, 2010
Proceedings of the 20th International Conference on Pattern Recognition, 2010
Proceedings of the IEEE International Conference on Acoustics, 2010
Friends of an enemy: identifying local members of peer-to-peer botnets using mutual contacts.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010
2009
EURASIP J. Adv. Signal Process., 2009
Digit. Investig., 2009
Comput. Electr. Eng., 2009
Proceedings of the 2009 IEEE International Workshop on Multimedia Signal Processing, 2009
Proceedings of the International Conference on Image Processing, 2009
Proceedings of the ICDM 2009, 2009
Proceedings of the IEEE International Conference on Acoustics, 2009
Proceedings of the IEEE International Conference on Acoustics, 2009
Proceedings of the IEEE International Conference on Acoustics, 2009
Out-of-Core Progressive Lossless Compression and Selective Decompression of Large Triangle Meshes.
Proceedings of the 2009 Data Compression Conference (DCC 2009), 2009
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009
2008
IEEE Trans. Inf. Forensics Secur., 2008
Digit. Investig., 2008
Digit. Investig., 2008
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008
Video copy detection based on source device characteristics: a complementary approach to content-based methods.
Proceedings of the 1st ACM SIGMM International Conference on Multimedia Information Retrieval, 2008
Proceedings of the 42nd Annual Conference on Information Sciences and Systems, 2008
2007
IEEE Trans. Inf. Forensics Secur., 2007
IEEE Trans. Inf. Forensics Secur., 2007
IEEE Trans. Commun., 2007
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007
Proceedings of the 3rd Symposium on Usable Privacy and Security, 2007
Proceedings of the 9th workshop on Multimedia & Security, 2007
Proceedings of the Multimedia Content Analysis and Mining, International Workshop, 2007
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007
Proceedings of the International Conference on Image Processing, 2007
Proceedings of the International Conference on Image Processing, 2007
Proceedings of the International Conference on Image Processing, 2007
Proceedings of the 2007 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 2007), 2007
Proceedings of the 41st Annual Conference on Information Sciences and Systems, 2007
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007
2006
IEEE Trans. Image Process., 2006
IEEE Trans. Inf. Forensics Secur., 2006
Trans. Data Hiding Multim. Secur., 2006
J. Electronic Imaging, 2006
Digit. Signal Process., 2006
Proceedings of the 8th Joint Eurographics - IEEE VGTC Symposium on Visualization, 2006
Proceedings of the Advances in Digital Forensics II - IFIP International Conference on Digital Forensics, National Centre for Forensic Science, Orlando, Florida, USA, January 29, 2006
Proceedings of the Information Systems Security, Second International Conference, 2006
Proceedings of the International Conference on Image Processing, 2006
Digital Image Forensics for Identifying Computer Generated and Digital Camera Images.
Proceedings of the International Conference on Image Processing, 2006
Proceedings of the 40th Annual Conference on Information Sciences and Systems, 2006
Proceedings of the 40th Annual Conference on Information Sciences and Systems, 2006
Proceedings of the Advances in Cryptology, 2006
2005
ACM Trans. Embed. Comput. Syst., 2005
IEEE J. Sel. Areas Commun., 2005
Int. J. Hum. Comput. Stud., 2005
EURASIP J. Adv. Signal Process., 2005
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005
Proceedings of the 1st Symposium on Usable Privacy and Security, 2005
Proceedings of the IEEE 7th Workshop on Multimedia Signal Processing, 2005
Proceedings of the 7th workshop on Multimedia & Security, 2005
Proceedings of the 7th workshop on Multimedia & Security, 2005
Proceedings of the Advances in Digital Forensics, 2005
Proceedings of the 2005 International Conference on Image Processing, 2005
Proceedings of the 2005 IEEE International Conference on Acoustics, 2005
Proceedings of the 2005 IEEE International Conference on Acoustics, 2005
Proceedings of the 13th European Signal Processing Conference, 2005
Proceedings of the 13th European Signal Processing Conference, 2005
Proceedings of the Fifth ACM Workshop on Digital Rights Management, 2005
Proceedings of the 2005 Data Compression Conference (DCC 2005), 2005
2004
IACR Cryptol. ePrint Arch., 2004
Proceedings of the 2004 IEEE International Conference on Multimedia and Expo, 2004
Steganalysis of boundary-based steganography using autoregressive model of digital boundaries.
Proceedings of the 2004 IEEE International Conference on Multimedia and Expo, 2004
Proceedings of the 2004 International Conference on Image Processing, 2004
Proceedings of the 2004 International Conference on Image Processing, 2004
A classifier design for detecting Image manipulations.
Proceedings of the 2004 International Conference on Image Processing, 2004
Proceedings of the Third International Conference on Image and Graphics, 2004
Proceedings of the 8th International Conference on Control, 2004
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004
Proceedings of the 2004 12th European Signal Processing Conference, 2004
Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004
Proceedings of the Combinatorial and Algorithmic Aspects of Networking, 2004
Nabs: A System for Detecting Resource Abuses via Characterization of Flow Content Type.
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), 2004
2003
Guest editorial special issue on signal processing for data hiding in digital media and secure content delivery.
IEEE Trans. Signal Process., 2003
IACR Cryptol. ePrint Arch., 2003
IACR Cryptol. ePrint Arch., 2003
Proceedings of the Security and Watermarking of Multimedia Contents V, 2003
Proceedings of the Security and Watermarking of Multimedia Contents V, 2003
Proceedings of the Computer Network Security, 2003
Proceedings of the Digital Watermarking, Second International Workshop, 2003
Design of a Laboratory for Information Security Education.
Proceedings of the Security Education and Critical Infrastructures, 2003
Proceedings of the 2003 International Conference on Image Processing, 2003
Proceedings of the 2003 IEEE International Conference on Acoustics, 2003
Proceedings of the 2003 ACM workshop on Digital rights management 2003, Washington, 2003
Optimal Alphabet Partitioning for Semi-Adaptive Coding of Sources of Unknown Sparse Distributions.
Proceedings of the 2003 Data Compression Conference (DCC 2003), 2003
Proceedings of the 2003 Data Compression Conference (DCC 2003), 2003
Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC 2003), 2003
2002
IEEE Trans. Circuits Syst. Video Technol., 2002
IEEE Signal Process. Lett., 2002
J. Electronic Imaging, 2002
Proceedings of the 3rd International Conference on Web Information Systems Engineering, 2002
Proceedings of the Security and Watermarking of Multimedia Contents IV, 2002
Proceedings of the Security and Watermarking of Multimedia Contents IV, 2002
Proceedings of the 2002 International Conference on Image Processing, 2002
Proceedings of the 2002 International Conference on Image Processing, 2002
Proceedings of the IEEE 5th Workshop on Multimedia Signal Processing, 2002
2001
Secret and public key image watermarking schemes for image authentication and ownership verification.
IEEE Trans. Image Process., 2001
Lossless and near-lossless image compression with successive refinement.
Proceedings of the Visual Communications and Image Processing 2001, 2001
Proceedings of the Security and Watermarking of Multimedia Contents III, 2001
Proceedings of the Security and Watermarking of Multimedia Contents III, 2001
Proceedings of the Fourth IEEE Workshop on Multimedia Signal Processing, 2001
Proceedings of the 2001 International Conference on Image Processing, 2001
Proceedings of the 2001 International Conference on Image Processing, 2001
Proceedings of the 2001 International Conference on Image Processing, 2001
Proceedings of the Data Compression Conference, 2001
2000
IEEE Trans. Image Process., 2000
IEEE Trans. Image Process., 2000
Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes.
IEEE Trans. Image Process., 2000
Secret and public key authentication watermarking schemes that resist vector quantization attack.
Proceedings of the Security and Watermarking of Multimedia Contents II, 2000
Proceedings of the Security and Watermarking of Multimedia Contents II, 2000
Proceedings of the Security and Watermarking of Multimedia Contents II, 2000
Proceedings of the ACM Multimedia 2000 Workshops, Los Angeles, CA, USA, October 30, 2000
Proceedings of the 2000 International Symposium on Information Technology (ITCC 2000), 2000
Proceedings of the 2000 International Conference on Image Processing, 2000
1999
IEEE Trans. Inf. Technol. Biomed., 1999
Buyer-seller watermarking protocol based on amplitude modulation and the El Gamal Public Key Crypto System.
Proceedings of the Security and Watermarking of Multimedia Contents, 1999
Proceedings of the Security and Watermarking of Multimedia Contents, 1999
On the Security of the Yeung Mintzer Authentication Watermark.
Proceedings of the PICS 1999: Proceedings of the Conference on Image Processing, 1999
1998
Resolving rightful ownerships with invisible watermarking techniques: limitations, attacks, and implications.
IEEE J. Sel. Areas Commun., 1998
Proceedings of the Storage and Retrieval for Image and Video Databases VI, 1998
Improved Techniques for Lossless Image Compression with Reversible Integer Wavelet Transforms.
Proceedings of the 1998 IEEE International Conference on Image Processing, 1998
Proceedings of the 1998 IEEE International Conference on Image Processing, 1998
Proceedings of the 1998 IEEE International Conference on Image Processing, 1998
Proceedings of the Data Compression Conference, 1998
1997
Recent Developments in Context-Based Predictive Techniques for Lossless Image Compression.
Comput. J., 1997
Proceedings of the Storage and Retrieval for Image and Video Databases V, 1997
Proceedings of the Proceedings 1997 International Conference on Image Processing, 1997
Proceedings of the Proceedings 1997 International Conference on Image Processing, 1997
1996
IEEE Trans. Image Process., 1996
IEEE Trans. Image Process., 1996
Proceedings of the 1996 IEEE International Conference on Acoustics, 1996
1995
IEEE J. Sel. Areas Commun., 1995
Proceedings of the Proceedings 1995 International Conference on Image Processing, 1995
1994
IEEE Trans. Geosci. Remote. Sens., 1994
Proceedings of the Proceedings 1994 International Conference on Image Processing, 1994
1993
Simple method for enhancing the performance of lossy plus lossless image compression schemes.
J. Electronic Imaging, 1993
1992
1991
Proceedings of the IEEE Data Compression Conference, 1991
1989
Proceedings of the Computing in the 90's, 1989