Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Dora M. Ballesteros L.
@article{DBLP:journals/bdcc/PachonRL23, author = {C{\'{e}}sar G. Pach{\'{o}}n and Diego Renza and Dora M. Ballesteros L.}, title = {Is My Pruned Model Trustworthy? PE-Score: {A} New CAM-Based Evaluation Metric}, journal = {Big Data Cogn. Comput.}, volume = {7}, number = {2}, pages = {111}, year = {2023}, url = {https://doi.org/10.3390/bdcc7020111}, doi = {10.3390/BDCC7020111}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bdcc/PachonRL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/PachonLR23, author = {C{\'{e}}sar G. Pach{\'{o}}n and Dora M. Ballesteros L. and Diego Renza}, title = {An efficient deep learning model using network pruning for fake banknote recognition}, journal = {Expert Syst. Appl.}, volume = {233}, pages = {120961}, year = {2023}, url = {https://doi.org/10.1016/j.eswa.2023.120961}, doi = {10.1016/J.ESWA.2023.120961}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eswa/PachonLR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/informatics/RenzaL23, author = {Diego Renza and Dora M. Ballesteros L.}, title = {Sp2PS: Pruning Score by Spectral and Spatial Evaluation of {CAM} Images}, journal = {Informatics}, volume = {10}, number = {3}, pages = {72}, year = {2023}, url = {https://doi.org/10.3390/informatics10030072}, doi = {10.3390/INFORMATICS10030072}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/informatics/RenzaL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/asc/PachonLR22, author = {C{\'{e}}sar G. Pach{\'{o}}n and Dora M. Ballesteros L. and Diego Renza}, title = {SeNPIS: Sequential Network Pruning by class-wise Importance Score}, journal = {Appl. Soft Comput.}, volume = {129}, pages = {109558}, year = {2022}, url = {https://doi.org/10.1016/j.asoc.2022.109558}, doi = {10.1016/J.ASOC.2022.109558}, timestamp = {Tue, 06 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/asc/PachonLR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/LRRA21, author = {Dora M. Ballesteros L. and Yohanna Rodr{\'{\i}}guez{-}Ortega and Diego Renza and Gonzalo R. Arce}, title = {Deep4SNet: deep learning for fake speech classification}, journal = {Expert Syst. Appl.}, volume = {184}, pages = {115465}, year = {2021}, url = {https://doi.org/10.1016/j.eswa.2021.115465}, doi = {10.1016/J.ESWA.2021.115465}, timestamp = {Wed, 27 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eswa/LRRA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jimaging/Rodriguez-Ortega21, author = {Yohanna Rodr{\'{\i}}guez{-}Ortega and Dora M. Ballesteros L. and Diego Renza}, title = {Copy-Move Forgery Detection {(CMFD)} Using Deep Learning for Image and Video Forensics}, journal = {J. Imaging}, volume = {7}, number = {3}, pages = {59}, year = {2021}, url = {https://doi.org/10.3390/jimaging7030059}, doi = {10.3390/JIMAGING7030059}, timestamp = {Sun, 16 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jimaging/Rodriguez-Ortega21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wea2/CamachoLR21, author = {Steven Camacho and Dora Mar{\'{\i}}a Ballesteros L. and Diego Renza}, editor = {Juan Carlos Figueroa{-}Garc{\'{\i}}a and Yesid D{\'{\i}}az Guti{\'{e}}rrez and Elvis Eduardo Gaona{-}Garc{\'{\i}}a and Alvaro David Orjuela{-}Ca{\~{n}}{\'{o}}n}, title = {Fake Speech Recognition Using Deep Learning}, booktitle = {Applied Computer Sciences in Engineering - 8th Workshop on Engineering Applications, {WEA} 2021, Medell{\'{\i}}n, Colombia, October 6-8, 2021, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1431}, pages = {38--48}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-86702-7\_4}, doi = {10.1007/978-3-030-86702-7\_4}, timestamp = {Sun, 12 Dec 2021 00:12:58 +0100}, biburl = {https://dblp.org/rec/conf/wea2/CamachoLR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icai2/Rodriguez-Ortega20, author = {Yohanna Rodr{\'{\i}}guez{-}Ortega and Dora Mar{\'{\i}}a Ballesteros L. and Diego Renza}, editor = {Hector Florez and Sanjay Misra}, title = {A Machine Learning Model to Detect Fake Voice}, booktitle = {Applied Informatics - Third International Conference, {ICAI} 2020, Ota, Nigeria, October 29-31, 2020, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1277}, pages = {3--13}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-61702-8\_1}, doi = {10.1007/978-3-030-61702-8\_1}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icai2/Rodriguez-Ortega20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/CamachoLR19, author = {Steven Camacho and Dora M. Ballesteros L. and Diego Renza}, title = {A cloud-oriented integrity verification system for audio forensics}, journal = {Comput. Electr. Eng.}, volume = {73}, pages = {259--267}, year = {2019}, url = {https://doi.org/10.1016/j.compeleceng.2018.11.022}, doi = {10.1016/J.COMPELECENG.2018.11.022}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cee/CamachoLR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/RenzaML19, author = {Diego Renza and Sebasti{\'{a}}n Mendoza and Dora M. Ballesteros L.}, title = {High-uncertainty audio signal encryption based on the Collatz conjecture}, journal = {J. Inf. Secur. Appl.}, volume = {46}, pages = {62--69}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2019.02.010}, doi = {10.1016/J.JISA.2019.02.010}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/RenzaML19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwbf/VasquezLR19, author = {Angie Natalia Vasquez and Dora Mar{\'{\i}}a Ballesteros L. and Diego Renza}, title = {Speaker verification with fake intonation based on Neural Networks}, booktitle = {7th International Workshop on Biometrics and Forensics, {IWBF} 2019, Cancun, Mexico, May 2-3, 2019}, pages = {1--5}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/IWBF.2019.8739173}, doi = {10.1109/IWBF.2019.8739173}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwbf/VasquezLR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/entropy/LPR18, author = {Dora M. Ballesteros L. and Jimmy Pe{\~{n}}a and Diego Renza}, title = {A Novel Image Encryption Scheme Based on Collatz Conjecture}, journal = {Entropy}, volume = {20}, number = {12}, pages = {901}, year = {2018}, url = {https://doi.org/10.3390/e20120901}, doi = {10.3390/E20120901}, timestamp = {Fri, 25 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entropy/LPR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/RenzaLL18, author = {Diego Renza and Dora M. Ballesteros L. and Camilo Lemus}, title = {Authenticity verification of audio signals based on fragile watermarking for audio forensics}, journal = {Expert Syst. Appl.}, volume = {91}, pages = {211--222}, year = {2018}, url = {https://doi.org/10.1016/j.eswa.2017.09.003}, doi = {10.1016/J.ESWA.2017.09.003}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/eswa/RenzaLL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jihmsp/LSR18, author = {Dora M. Ballesteros L. and Alejandro Sandoval and Diego Renza}, title = {Evolutionary Algorithm for Speech Scrambling based on Asexual Reproduction}, journal = {J. Inf. Hiding Multim. Signal Process.}, volume = {9}, number = {4}, pages = {796--806}, year = {2018}, url = {http://bit.kuas.edu.tw/\%7Ejihmsp/2018/vol9/JIH-MSP-2018-04-003.pdf}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jihmsp/LSR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/symmetry/LR18, author = {Dora M. Ballesteros L. and Diego Renza}, title = {Secure Speech Content Based on Scrambling and Adaptive Hiding}, journal = {Symmetry}, volume = {10}, number = {12}, pages = {694}, year = {2018}, url = {https://doi.org/10.3390/sym10120694}, doi = {10.3390/SYM10120694}, timestamp = {Wed, 13 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/symmetry/LR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jihmsp/LRC17, author = {Dora M. Ballesteros L. and Diego Renza and Steven Camacho}, title = {Security Analysis of The Speech Scrambling Method Based on Imitation of {A} Super-Gaussian Signal}, journal = {J. Inf. Hiding Multim. Signal Process.}, volume = {8}, number = {1}, pages = {156--167}, year = {2017}, url = {http://bit.kuas.edu.tw/\%7Ejihmsp/2017/vol8/JIH-MSP-2017-01-016.pdf}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jihmsp/LRC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jihmsp/RenzaLL17, author = {Diego Renza and Camilo Lemus and Dora M. Ballesteros L.}, title = {Audio Authenticity and Tampering Detection based on Information Hiding and Collatz p-bit Code}, journal = {J. Inf. Hiding Multim. Signal Process.}, volume = {8}, number = {6}, pages = {1294--1304}, year = {2017}, url = {http://bit.kuas.edu.tw/\%7Ejihmsp/2017/vol8/JIH-MSP-2017-06-010.pdf}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jihmsp/RenzaLL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wea2/CamachoRL17, author = {Steven Camacho and Diego Renza and Dora M. Ballesteros L.}, editor = {Juan Carlos Figueroa Garc{\'{\i}}a and Eduyn Ramiro L{\'{o}}pez{-}Santana and Jos{\'{e}} Luis Villa{-}Ram{\'{\i}}rez and Roberto Ferro Escobar}, title = {A Semi-supervised Speaker Identification Method for Audio Forensics Using Cochleagrams}, booktitle = {Applied Computer Sciences in Engineering - 4th Workshop on Engineering Applications, {WEA} 2017, Cartagena, Colombia, September 27-29, 2017, Proceedings}, series = {Communications in Computer and Information Science}, volume = {742}, pages = {55--64}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66963-2\_6}, doi = {10.1007/978-3-319-66963-2\_6}, timestamp = {Wed, 29 May 2019 09:34:39 +0200}, biburl = {https://dblp.org/rec/conf/wea2/CamachoRL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jihmsp/LRC16, author = {Dora M. Ballesteros L. and Diego Renza and Steven Camacho}, title = {An Unconditionally Secure Speech Scrambling Scheme Based on An Imitation Process to {A} Gaussian Noise Signal}, journal = {J. Inf. Hiding Multim. Signal Process.}, volume = {7}, number = {2}, pages = {233--242}, year = {2016}, url = {http://bit.kuas.edu.tw/\%7Ejihmsp/2016/vol7/JIH-MSP-2016-02-002.pdf}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jihmsp/LRC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ciarp/RenzaLL16, author = {Diego Renza and Camilo Lemus and Dora M. Ballesteros L.}, editor = {C{\'{e}}sar Armando Beltr{\'{a}}n Casta{\~{n}}{\'{o}}n and Ingela Nystr{\"{o}}m and Fazel Famili}, title = {Highly Transparent and Secure Scheme for Concealing Text Within Audio}, booktitle = {Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications - 21st Iberoamerican Congress, {CIARP} 2016, Lima, Peru, November 8-11, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10125}, pages = {27--35}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-52277-7\_4}, doi = {10.1007/978-3-319-52277-7\_4}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/ciarp/RenzaLL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mcpr2/RenzaLS16, author = {Diego Renza and Dora M. Ballesteros L. and Jeisson S{\'{a}}nchez}, editor = {Jos{\'{e}} Francisco Mart{\'{\i}}nez Trinidad and Jes{\'{u}}s Ariel Carrasco{-}Ochoa and V{\'{\i}}ctor Ayala{-}Ram{\'{\i}}rez and Jos{\'{e}} Arturo Olvera{-}L{\'{o}}pez and Xiaoyi Jiang}, title = {Highly Transparent Steganography Scheme of Speech Signals into Color Images Using Quantization Index Modulation}, booktitle = {Pattern Recognition - 8th Mexican Conference, {MCPR} 2016, Guanajuato, Mexico, June 22-25, 2016. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9703}, pages = {241--250}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-39393-3\_24}, doi = {10.1007/978-3-319-39393-3\_24}, timestamp = {Thu, 14 Oct 2021 10:41:43 +0200}, biburl = {https://dblp.org/rec/conf/mcpr2/RenzaLS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mcpr2/LRC16, author = {Dora M. Ballesteros L. and Diego Renza and Steven Camacho}, editor = {Jos{\'{e}} Francisco Mart{\'{\i}}nez Trinidad and Jes{\'{u}}s Ariel Carrasco{-}Ochoa and V{\'{\i}}ctor Ayala{-}Ram{\'{\i}}rez and Jos{\'{e}} Arturo Olvera{-}L{\'{o}}pez and Xiaoyi Jiang}, title = {High Scrambling Degree in Audio Through Imitation of an Unintelligible Signal}, booktitle = {Pattern Recognition - 8th Mexican Conference, {MCPR} 2016, Guanajuato, Mexico, June 22-25, 2016. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9703}, pages = {251--259}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-39393-3\_25}, doi = {10.1007/978-3-319-39393-3\_25}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mcpr2/LRC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jihmsp/LRR15, author = {Dora M. Ballesteros L. and Diego Renza and Ramiron Rincon}, title = {Gray-scale Images within Color Images using Similarity Histogram-Based Selection and Replacement Algorithm}, journal = {J. Inf. Hiding Multim. Signal Process.}, volume = {6}, number = {6}, pages = {1156--1166}, year = {2015}, url = {http://bit.kuas.edu.tw/\%7Ejihmsp/2015/vol6/JIH-MSP-2015-06-008.pdf}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jihmsp/LRR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cssp/LA14, author = {Dora M. Ballesteros L. and Juan M. Moreno A}, title = {Speech Scrambling Based on Imitation of a Target Speech Signal with Non-confidential Content}, journal = {Circuits Syst. Signal Process.}, volume = {33}, number = {11}, pages = {3475--3498}, year = {2014}, url = {https://doi.org/10.1007/s00034-014-9810-9}, doi = {10.1007/S00034-014-9810-9}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cssp/LA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/LA13, author = {Dora M. Ballesteros L. and Juan M. Moreno A}, title = {Real-time, speech-in-speech hiding scheme based on least significant bit substitution and adaptive key}, journal = {Comput. Electr. Eng.}, volume = {39}, number = {4}, pages = {1192--1203}, year = {2013}, url = {https://doi.org/10.1016/j.compeleceng.2013.02.006}, doi = {10.1016/J.COMPELECENG.2013.02.006}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cee/LA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/LA13a, author = {Dora M. Ballesteros L. and Juan M. Moreno A}, title = {Wavelet-denoising on hardware devices with Perfect Reconstruction, low latency and adaptive thresholding}, journal = {Comput. Electr. Eng.}, volume = {39}, number = {4}, pages = {1300--1311}, year = {2013}, url = {https://doi.org/10.1016/j.compeleceng.2013.03.005}, doi = {10.1016/J.COMPELECENG.2013.03.005}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cee/LA13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/LA12, author = {Dora M. Ballesteros L. and Juan M. Moreno A}, title = {Highly transparent steganography model of speech signals using Efficient Wavelet Masking}, journal = {Expert Syst. Appl.}, volume = {39}, number = {10}, pages = {9141--9149}, year = {2012}, url = {https://doi.org/10.1016/j.eswa.2012.02.066}, doi = {10.1016/J.ESWA.2012.02.066}, timestamp = {Fri, 14 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eswa/LA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/LA12a, author = {Dora M. Ballesteros L. and Juan M. Moreno A}, title = {On the ability of adaptation of speech signals and data hiding}, journal = {Expert Syst. Appl.}, volume = {39}, number = {16}, pages = {12574--12579}, year = {2012}, url = {https://doi.org/10.1016/j.eswa.2012.05.027}, doi = {10.1016/J.ESWA.2012.05.027}, timestamp = {Fri, 14 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eswa/LA12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.