default search action
11th WIFS 2019: Delft, The Netherlands
- IEEE International Workshop on Information Forensics and Security, WIFS 2019, Delft, The Netherlands, December 9-12, 2019. IEEE 2019, ISBN 978-1-7281-3217-4
- Matthias Kirchner, Cecilia Pasquini, Ilia Shumailov:
Information Security Meets Adversarial Examples. 1-2 - Vincent van der Meer, Hugo Jonker, Guy Dols, Harm M. A. van Beek, Jeroen van den Bos, Marko C. J. D. van Eekelen:
File Fragmentation in the Wild: a Privacy-Friendly Approach. 1-6 - Jascha Kolberg, Pia Bauspieß, Marta Gomez-Barrero, Christian Rathgeb, Markus Dürmuth, Christoph Busch:
Template Protection based on Homomorphic Encryption: Computationally Efficient Application to Iris-Biometric Verification and Identification. 1-6 - Clemens Seibold, Anna Hilsmann, Andrey Makrushin, Christian Kraetzer, Tom Neubert, Jana Dittmann, Peter Eisert:
Visual Feature Space Analyses of Face Morphing Detectors. 1-6 - Luca Debiasi, Simon Kirchgasser, Bernhard Prommegger, Andreas Uhl, Artur Grudzien, Marcin Kowalski:
Biometric Template Protection in the Image Domain Using Non-invertible Grey-scale Transforms. 1-6 - Marzieh Gheisari, Teddy Furon, Laurent Amsaleg:
Group Membership Verification with Privacy: Sparse or Dense? 1-7 - Clara Borrelli, Paolo Bestagini, Fabio Antonacci, Augusto Sarti, Stefano Tubaro:
Automatic Reliability Estimation for Speech Audio Surveillance Recordings. 1-6 - Hendrik Vogt, Chu Li, Aydin Sezgin, Christian T. Zenger:
On the Precise Phase Recovery for Physical-Layer Authentication in Dynamic Channels. 1-6 - Alessandro Brighente, Francesco Formaggio, G. Ruvoletto, Stefano Tomasin:
Ranking-Based Attacks to In-Region Location Verification Systems. 1-6 - Shantanu Rane, Alejandro E. Brito:
A Version Space Perspective on Differentially Private Pool-Based Active Learning. 1-6 - Patrick Bours, Halvor Kulsrud:
Detection of Cyber Grooming in Online Conversation. 1-6 - Sebastian Baur, Ning Cai, Moritz Wiese, Holger Boche:
Secret Key Generation from a Two Component Compound Source with Rate Constrained One Way Communication: Perfect Secrecy. 1-6 - Andrey Garnaev, Wade Trappe:
A Power Control Game Involving Jamming and Eavesdropping Defense. 1-6 - Pin-Hsun Lin, Christiane Kuhn, Thorsten Strufe, Eduard A. Jorswieck:
Physical Layer Privacy in Broadcast Channels. 1-6 - Lieneke Kusters, Frans M. J. Willems:
Debiasing of SRAM PUFs: Selection and Balancing. 1-6 - Behrooz Razeghi, Taras Stanko, Boris Skoric, Slava Voloshynovskiy:
Single-Component Privacy Guarantees in Helper Data Systems and Sparse Coding with Ambiguation. 1-6 - Ahmad Zakaria, Marc Chaumont, Gérard Subsol:
Pooled Steganalysis in JPEG: how to deal with the spreading strategy? 1-6 - Ece Naz Erdemir, Pier Luigi Dragotti, Deniz Gündüz:
Privacy-Aware Location Sharing with Deep Reinforcement Learning. 1-6 - Florian Wilde, Christoph Frisch, Michael Pehl:
Efficient Bound for Conditional Min-Entropy of Physical Unclonable Functions Beyond IID. 1-6 - Francesco Marra, Cristiano Saltori, Giulia Boato, Luisa Verdoliva:
Incremental learning for the detection and classification of GAN-generated images. 1-6 - Romain Giot, Anderson Rocha:
Siamese Networks for Static Keystroke Dynamics Authentication. 1-6 - Huaxiao Mo, Tingting Song, Bolin Chen, Weiqi Luo, Jiwu Huang:
Enhancing JPEG Steganography using Iterative Adversarial Examples. 1-6 - Caroline Mazini Rodrigues, Luís A. M. Pereira, Anderson Rocha, Zanoni Dias:
Image Semantic Representation for Event Understanding. 1-6 - Matthias Kirchner, Cameron Johnson:
SPN-CNN: Boosting Sensor-Based Source Camera Attribution With Deep Learning. 1-6 - Rohit Yadav, Iuliia Tkachenko, Alain Trémeau, Thierry Fournel:
Copy Sensitive Graphical Code Estimation: Physical vs Numerical Resolution. 1-6 - Linda Senigagliesi, Lorenzo Cintioni, Marco Baldi, Ennio Gambi:
Blind Physical Layer Authentication over Fading Wireless Channels through Machine Learning. 1-6 - Yoav Blum, David Burshtein:
Blind Vocoder Speech Reconstruction using Generative Adversarial Networks. 1-6 - Xu Zhang, Svebor Karaman, Shih-Fu Chang:
Detecting and Simulating Artifacts in GAN Fake Images. 1-6 - Holger Boche, Rafael F. Schaefer, H. Vincent Poor:
Resource Allocation for Secure Communication Systems: Algorithmic Solvability. 1-6 - Fabio Carrara, Roberto Caldelli, Fabrizio Falchi, Giuseppe Amato:
On the Robustness to Adversarial Examples of Neural ODE Image Classifiers. 1-6 - Mauro Barni, Dequ Huang, Bin Li, Benedetta Tondi:
Adversarial CNN Training Under JPEG Laundering Attacks: a Game-Theoretic Approach. 1-6
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.