Login / Signup
Learning to localize image forgery using end-to-end attention network.
Iyyakutti Iyappan Ganapathi
Sajid Javed
Syed Sadaf Ali
Arif Mahmood
Ngoc-Son Vu
Naoufel Werghi
Published in:
Neurocomputing (2022)
Keyphrases
</>
end to end
congestion control
high bandwidth
wireless ad hoc networks
image data
digital images
internet protocol
rate adaptation
rate allocation
wireless sensor networks
wireless networks
computer networks
multipath
admission control
scalable video
transport layer