Ashwin Swaminathan

According to our database1, Ashwin Swaminathan authored at least 44 papers between 2004 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
CPR: Retrieval Augmented Generation for Copyright Protection.
CoRR, 2024

Multi-Modal Hallucination Control by Visual Information Grounding.
CoRR, 2024

Fast Sparse View Guided NeRF Update for Object Reconfigurations.
CoRR, 2024

A Quantitative Evaluation of Score Distillation Sampling Based Text-to-3D.
CoRR, 2024

2023
Training Data Protection with Compositional Diffusion Models.
CoRR, 2023

Towards Visual Foundational Models of Physical Scenes.
CoRR, 2023

Introspective Cross-Attention Probing for Lightweight Transfer of Pre-trained Models.
CoRR, 2023

Your representations are in the network: composable and parallel adaptation for large scale models.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

SAFE: Machine Unlearning With Shard Graphs.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

A Meta-Learning Approach to Predicting Performance and Data Requirements.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

Learning Expressive Prompting With Residuals for Vision Transformers.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

2016
Diagnosis of Multiple Stuck-at Faults Using Fault Element Graph with Reduced Power.
Proceedings of the Security in Computing and Communications - 4th International Symposium, 2016

2011
Information-theoretic database building and querying for mobile Augmented Reality applications.
Proceedings of the 10th IEEE International Symposium on Mixed and Augmented Reality, 2011

2010
Relating Reputation and Money in Online Markets.
ACM Trans. Web, 2010

2009
Fingerprinting compressed multimedia signals.
IEEE Trans. Inf. Forensics Secur., 2009

Intrinsic sensor noise features for forensic analysis on scanners and scanned images.
IEEE Trans. Inf. Forensics Secur., 2009

Component forensics.
IEEE Signal Process. Mag., 2009

Essential Pages.
Proceedings of the 2009 IEEE/WIC/ACM International Conference on Web Intelligence, 2009

Relating Reputation and Money in On-line Markets.
Proceedings of the 2009 IEEE/WIC/ACM International Conference on Web Intelligence, 2009

Enabling search over encrypted multimedia databases.
Proceedings of the Media Forensics and Security I, 2009

Secure image retrieval through feature protection.
Proceedings of the IEEE International Conference on Acoustics, 2009

Tampering identification using Empirical Frequency Response.
Proceedings of the IEEE International Conference on Acoustics, 2009

2008
Multimedia Forensic Analysis via Intrinsic and Extrinsic Fingerprints.
PhD thesis, 2008

Digital Image Forensics via Intrinsic Fingerprints.
IEEE Trans. Inf. Forensics Secur., 2008

A pattern classification framework for theoretical analysis of component forensics.
Proceedings of the IEEE International Conference on Acoustics, 2008

Image acquisition forensics: Forensic analysis to identify imaging source.
Proceedings of the IEEE International Conference on Acoustics, 2008

A decision theoretic framework for analyzing binary hash-based content identification systems.
Proceedings of the 8th ACM Workshop on Digital Rights Management, 2008

2007
Nonintrusive Component Forensics of Visual Sensors Using Output Images.
IEEE Trans. Inf. Forensics Secur., 2007

Confidentiality-preserving rank-ordered search.
Proceedings of the 2007 ACM Workshop On Storage Security And Survivability, 2007

Intrinsic fingerprints for image authentication and steganalysis.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007

Robust scanner identification based on noise features.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007

A Component Estimation Framework for Information Forensics.
Proceedings of the IEEE 9th Workshop on Multimedia Signal Processing, 2007

Analysis of Nonlinear Collusion Attacks on Fingerprinting Systems for Compressed Multimedia.
Proceedings of the International Conference on Image Processing, 2007

Noise Features for Image Tampering Detection and Steganalysis.
Proceedings of the International Conference on Image Processing, 2007

Collusion-Resistant Fingerprinting for Compressed Multimedia Signals.
Proceedings of the IEEE International Conference on Acoustics, 2007

Optimization of Input Pattern for Semi Non-Intrusive Component Forensics of Digital Cameras.
Proceedings of the IEEE International Conference on Acoustics, 2007

2006
Robust and secure image hashing.
IEEE Trans. Inf. Forensics Secur., 2006

Exploring QIM-based anti-collusion fingerprinting for multimedia.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006

Image Tampering Identification using Blind Deconvolution.
Proceedings of the International Conference on Image Processing, 2006

Non-Intrusive Forensic Analysis of Visual Sensors Using Output Images.
Proceedings of the 2006 IEEE International Conference on Acoustics Speech and Signal Processing, 2006

Component Forensics of Digital Cameras: A Non-Intrusive Approach.
Proceedings of the 40th Annual Conference on Information Sciences and Systems, 2006

2005
Data Hiding in Compiled Program Binaries for Enhancing Computer System Performance.
Proceedings of the Information Hiding, 7th International Workshop, 2005

Security of feature extraction in image hashing.
Proceedings of the 2005 IEEE International Conference on Acoustics, 2005

2004
Image hashing resilient to geometric and filtering operations.
Proceedings of the IEEE 6th Workshop on Multimedia Signal Processing, 2004


  Loading...