default search action
Jennifer Newman
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c24]Jennifer L. Newman:
Steganography on Mobile Apps. IH&MMSec 2023: 3 - 2021
- [c23]Wenhao Chen, Li Lin, Jennifer Newman, Yong Guan:
Automatic Detection of Android Steganography Apps via Symbolic Execution and Tree Matching. CNS 2021: 254-262 - [e1]Dirk Borghys, Patrick Bas, Luisa Verdoliva, Tomás Pevný, Bin Li, Jennifer Newman:
IH&MMSec '21: ACM Workshop on Information Hiding and Multimedia Security, Virtual Event, Belgium, June, 22-25, 2021. ACM 2021, ISBN 978-1-4503-8295-3 [contents] - 2020
- [c22]Stephanie Reinders, Li Lin, Wenhao Chen, Yong Guan, Jennifer Newman:
Score-based likelihood ratios for camera device identification. Media Watermarking, Security, and Forensics 2020
2010 – 2019
- 2019
- [c21]Jennifer Newman, Li Lin, Wenhao Chen, Stephanie Reinders, Yangxiao Wang, Min Wu, Yong Guan:
StegoAppDB: a Steganography Apps Forensics Image Database. Media Watermarking, Security, and Forensics 2019 - [c20]Stephanie Reinders, Li Lin, Yong Guan, Min Wu, Jennifer Newman:
Algorithm Mismatch in Spatial Steganalysis. Media Watermarking, Security, and Forensics 2019 - [i2]Jennifer Newman, Li Lin, Wenhao Chen, Stephanie Reinders, Yangxiao Wang, Min Wu, Yong Guan:
StegoAppDB: a Steganography Apps Forensics Image Database. CoRR abs/1904.09360 (2019) - 2018
- [c19]Wenhao Chen, Li Lin, Min Wu, Jennifer Newman:
Tackling Android Stego Apps in the Wild. APSIPA 2018: 1564-1573 - [c18]Jennifer L. Davidson, Jofish Kaye, Michael Verdi, Michelle Heubusch, Saptarshi Guha, Peter Dolanjski, Gemma Petrie:
Will Automatically Importing User Data Help Overcome the Blank Slate Problem? CHI Extended Abstracts 2018 - [c17]Li Lin, Wenhao Chen, Yangxiao Wang, Stephanie Reinders, Yong Guan, Jennifer Newman, Min Wu:
The Impact of Exposure Settings in Digital Image Forensics. ICIP 2018: 540-544 - [c16]Wenhao Chen, Yangxiao Wang, Yong Guan, Jennifer Newman, Li Lin, Stephanie Reinders:
Forensic Analysis of Android Steganography Apps. IFIP Int. Conf. Digital Forensics 2018: 293-312 - [c15]Li Lin, Jennifer Newman, Stephanie Reinders, Yong Guan, Min Wu:
Domain Adaptation in Steganalysis for the Spatial Domain. Media Watermarking, Security, and Forensics 2018 - [i1]Wenhao Chen, Li Lin, Min Wu, Jennifer Newman:
Tackling Android Stego Apps in the Wild. CoRR abs/1808.00430 (2018) - 2014
- [c14]Jennifer L. Davidson, Rithika Naik, Umme Ayda Mannan, Amir Azarbakht, Carlos Jensen:
On older adults in free/open source software: reflections of contributors and community leaders. VL/HCC 2014: 93-100 - [c13]Jennifer L. Davidson, Umme Ayda Mannan, Rithika Naik, Ishneet Dua, Carlos Jensen:
Older Adults and Free/Open Source Software: A Diary Study of First-Time Contributors. OpenSym 2014: 5:1-5:10 - 2013
- [c12]Jennifer L. Davidson, Carlos Jensen:
What health topics older adults want to track: a participatory design study. ASSETS 2013: 26:1-26:8 - [c11]Jennifer L. Davidson, Carlos Jensen:
Participatory design with older adults: an analysis of creativity in the design of mobile healthcare applications. Creativity & Cognition 2013: 114-123 - [c10]Jennifer L. Davidson:
Involving older adults in the design and development of free/open source software. VL/HCC 2013: 177-178 - 2012
- [c9]Darren Forrest, Carlos Jensen, Nitin Mohan, Jennifer L. Davidson:
Exploring the Role of Outside Organizations in Free / Open Source Software Projects. OSS 2012: 201-215 - [c8]Jennifer L. Davidson:
Involving older adults in the design and development of free/open source software. VL/HCC 2012: 221-222 - 2011
- [c7]Jennifer L. Davidson, Nitin Mohan, Carlos Jensen:
Coping with duplicate bug reports in free/open source software projects. VL/HCC 2011: 101-108 - 2010
- [c6]Jennifer L. Davidson, Jaikishan Jalan:
Steganalysis Using Partially Ordered Markov Models. Information Hiding 2010: 118-132 - [c5]Jennifer L. Davidson, Jaikishan Jalan:
Feature selection for steganalysis using the Mahalanobis distance. Media Forensics and Security 2010: 754104
2000 – 2009
- 2005
- [c4]Clifford Bergman, Jennifer L. Davidson:
Unitary embedding for data hiding with the SVD. Security, Steganography, and Watermarking of Multimedia Contents 2005: 619-630
1990 – 1999
- 1999
- [j5]Jennifer L. Davidson, Noel Cressie, X. Hua:
Texture synthesis and pattern recognition for partially ordered Markov models. Pattern Recognit. 32(9): 1475-1505 (1999) - [c3]Daniel A. Ashlock, Jennifer L. Davidson:
Texture synthesis with tandem genetic algorithms using nonparametric partially ordered Markov models. CEC 1999: 1157-1163 - 1997
- [j4]Trevor E. Meyer, James A. Davis, Jennifer L. Davidson:
Analysis of Load Average and its Relationship to Program Run Time on Networks of Workstations. J. Parallel Distributed Comput. 44(2): 141-146 (1997) - 1995
- [j3]Jeffrey D. Helterbrand, Jennifer L. Davidson, Noel Cressie:
Optimal closed boundary identification in gray-scale imagery. J. Math. Imaging Vis. 5(3): 179-205 (1995) - [c2]Ashit Talukder, Jennifer L. Davidson:
Model selection and texture segmentation using partially ordered Markov models. ICASSP 1995: 2527-2530 - 1994
- [c1]Jennifer L. Davidson, Ashit Talukder, Noel Cressie:
Texture Analsyis Using Partially Ordered Markov Models. ICIP (3) 1994: 402-406 - 1992
- [j2]Jennifer L. Davidson:
Nonlinear matrix decompositions and an application to parallel processing. J. Math. Imaging Vis. 1(2): 169-192 (1992) - 1990
- [j1]Gerhard X. Ritter, Joseph N. Wilson, Jennifer L. Davidson:
Image Algebra: An Overview. Comput. Vis. Graph. Image Process. 49(3): 297-331 (1990)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:07 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint