


default search action
11th WIFS 2019: Delft, The Netherlands
- IEEE International Workshop on Information Forensics and Security, WIFS 2019, Delft, The Netherlands, December 9-12, 2019. IEEE 2019, ISBN 978-1-7281-3217-4
- Matthias Kirchner, Cecilia Pasquini
, Ilia Shumailov:
Information Security Meets Adversarial Examples. 1-2 - Vincent van der Meer, Hugo Jonker
, Guy Dols, Harm M. A. van Beek
, Jeroen van den Bos
, Marko C. J. D. van Eekelen:
File Fragmentation in the Wild: a Privacy-Friendly Approach. 1-6 - Jascha Kolberg
, Pia Bauspieß, Marta Gomez-Barrero, Christian Rathgeb, Markus Dürmuth, Christoph Busch
:
Template Protection based on Homomorphic Encryption: Computationally Efficient Application to Iris-Biometric Verification and Identification. 1-6 - Clemens Seibold
, Anna Hilsmann, Andrey Makrushin
, Christian Kraetzer, Tom Neubert, Jana Dittmann, Peter Eisert:
Visual Feature Space Analyses of Face Morphing Detectors. 1-6 - Luca Debiasi, Simon Kirchgasser, Bernhard Prommegger
, Andreas Uhl, Artur Grudzien, Marcin Kowalski:
Biometric Template Protection in the Image Domain Using Non-invertible Grey-scale Transforms. 1-6 - Marzieh Gheisari, Teddy Furon, Laurent Amsaleg:
Group Membership Verification with Privacy: Sparse or Dense? 1-7 - Clara Borrelli
, Paolo Bestagini, Fabio Antonacci, Augusto Sarti, Stefano Tubaro:
Automatic Reliability Estimation for Speech Audio Surveillance Recordings. 1-6 - Hendrik Vogt, Chu Li, Aydin Sezgin
, Christian T. Zenger
:
On the Precise Phase Recovery for Physical-Layer Authentication in Dynamic Channels. 1-6 - Alessandro Brighente
, Francesco Formaggio, G. Ruvoletto, Stefano Tomasin
:
Ranking-Based Attacks to In-Region Location Verification Systems. 1-6 - Shantanu Rane, Alejandro E. Brito:
A Version Space Perspective on Differentially Private Pool-Based Active Learning. 1-6 - Patrick Bours, Halvor Kulsrud:
Detection of Cyber Grooming in Online Conversation. 1-6 - Sebastian Baur, Ning Cai, Moritz Wiese, Holger Boche:
Secret Key Generation from a Two Component Compound Source with Rate Constrained One Way Communication: Perfect Secrecy. 1-6 - Andrey Garnaev, Wade Trappe:
A Power Control Game Involving Jamming and Eavesdropping Defense. 1-6 - Pin-Hsun Lin, Christiane Kuhn, Thorsten Strufe, Eduard A. Jorswieck:
Physical Layer Privacy in Broadcast Channels. 1-6 - Lieneke Kusters, Frans M. J. Willems:
Debiasing of SRAM PUFs: Selection and Balancing. 1-6 - Behrooz Razeghi
, Taras Stanko, Boris Skoric, Slava Voloshynovskiy
:
Single-Component Privacy Guarantees in Helper Data Systems and Sparse Coding with Ambiguation. 1-6 - Ahmad Zakaria, Marc Chaumont, Gérard Subsol:
Pooled Steganalysis in JPEG: how to deal with the spreading strategy? 1-6 - Ece Naz Erdemir, Pier Luigi Dragotti
, Deniz Gündüz
:
Privacy-Aware Location Sharing with Deep Reinforcement Learning. 1-6 - Florian Wilde
, Christoph Frisch, Michael Pehl:
Efficient Bound for Conditional Min-Entropy of Physical Unclonable Functions Beyond IID. 1-6 - Francesco Marra, Cristiano Saltori
, Giulia Boato, Luisa Verdoliva:
Incremental learning for the detection and classification of GAN-generated images. 1-6 - Romain Giot, Anderson Rocha:
Siamese Networks for Static Keystroke Dynamics Authentication. 1-6 - Huaxiao Mo, Tingting Song, Bolin Chen, Weiqi Luo, Jiwu Huang:
Enhancing JPEG Steganography using Iterative Adversarial Examples. 1-6 - Caroline Mazini Rodrigues
, Luís A. M. Pereira, Anderson Rocha, Zanoni Dias:
Image Semantic Representation for Event Understanding. 1-6 - Matthias Kirchner, Cameron Johnson:
SPN-CNN: Boosting Sensor-Based Source Camera Attribution With Deep Learning. 1-6 - Rohit Yadav
, Iuliia Tkachenko
, Alain Trémeau, Thierry Fournel:
Copy Sensitive Graphical Code Estimation: Physical vs Numerical Resolution. 1-6 - Linda Senigagliesi
, Lorenzo Cintioni, Marco Baldi, Ennio Gambi:
Blind Physical Layer Authentication over Fading Wireless Channels through Machine Learning. 1-6 - Yoav Blum, David Burshtein:
Blind Vocoder Speech Reconstruction using Generative Adversarial Networks. 1-6 - Xu Zhang, Svebor Karaman, Shih-Fu Chang:
Detecting and Simulating Artifacts in GAN Fake Images. 1-6 - Holger Boche, Rafael F. Schaefer
, H. Vincent Poor:
Resource Allocation for Secure Communication Systems: Algorithmic Solvability. 1-6 - Fabio Carrara
, Roberto Caldelli
, Fabrizio Falchi
, Giuseppe Amato
:
On the Robustness to Adversarial Examples of Neural ODE Image Classifiers. 1-6 - Mauro Barni, Dequ Huang, Bin Li, Benedetta Tondi:
Adversarial CNN Training Under JPEG Laundering Attacks: a Game-Theoretic Approach. 1-6

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.