| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2023 | A | conf |
IROS
|
| 2023 | J | jnl |
CoRR
|
| 2014 | — | ch. |
Computer Vision, A Reference Guide
|
| 2013 | J | jnl |
Int. J. Comput. Vis.
|
| 2011 | J | jnl |
CG2Real: Improving the Realism of Computer Generated Images Using a Large Collection of Photographs.
IEEE Trans. Vis. Comput. Graph.
|
| 2011 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2011 | B | conf |
ICCP
|
| 2011 | J | jnl |
ACM Trans. Graph.
|
| 2011 | A* | conf |
CVPR
|
| 2011 | J | jnl |
ACM Trans. Graph.
|
| 2011 | A* | conf |
UIST
|
| 2010 | — | conf |
ECCV (1)
|
| 2010 | J | jnl |
ACM Trans. Graph.
|
| 2009 | — | conf |
SIGGRAPH Emerging Technologies
|
| 2009 | A* | conf |
ICCV
|
| 2009 | A* | conf |
ICCV
|
| 2009 | — | conf |
Media Forensics and Security
|
| 2009 | A* | conf |
CVPR
|
| 2008 | — | conf |
ICMC
|
| 2007 | C | conf |
IWDW
|
| 2007 | — | conf |
Information Hiding
|
| 2007 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2007 | — | — |
|
| 2006 | J | jnl |
IEEE Multim.
|
| 2006 | — | conf |
MM&Sec
|
| 2005 | — | conf |
MM&Sec
|
| 2005 | — | conf |
Security, Steganography, and Watermarking of Multimedia Contents
|