default search action
16th WIFS 2024: Rome, Italy
- IEEE International Workshop on Information Forensics and Security, WIFS 2024, Rome, Italy, December 2-5, 2024. IEEE 2024, ISBN 979-8-3503-6442-2
- Augustin Diers, Christophe Rosenberger:
Explainable Presentation Attack Detection of Digital Fingerprints. 1-6 - Stefano Bianchi, Massimo Iuliani, Andrea Paghera, Marco Fontani, Martino Jerian:
Assessing shadows and reflections consistency in AI-generated images. 1-6 - Benedikt Lorch, Rainer Böhme:
Steganalysis in Directional JPEG Images. 1-6 - C. Guan, Jorrit van Assen, Zekeriya Erkin:
Collective Threshold Multiparty Private Set Intersection Protocols for Cyber Threat Intelligence. 1-6 - Xiangyu Zhao, Hanzhou Wu, Xinpeng Zhang:
Transferable Watermarking to Self-supervised Pre-trained Graph Encoders by Trigger Embeddings. 1-6 - Shane Dirksen, John Korah:
GUARD: Graph-based Unknown Attack Recognition and Detection. 1-6 - Sara Mandelli, Paolo Bestagini, Stefano Tubaro:
When Synthetic Traces Hide Real Content: Analysis of Stable Diffusion Image Laundering. 1-6 - Enoal Gesny, Eva Giboulot, Teddy Furon:
When does gradient estimation improve black-box adversarial attacks? 1-6 - Arthur Pimentel, Yi Zhu, Heitor R. Guimarães, Tiago H. Falk:
Efficient Audio Deepfake Detection using WavLM with Early Exiting. 1-6 - Franck V. Souop Kouam, Christian Rathgeb, Mathias Ibsen, Christoph Busch:
SynChildFace: Fine-tuning Face Recognition for Children with Synthetic Data. 1-6 - Jun Wang, Benedetta Tondi, Mauro Barni:
On the Use of Mixup Augmentation for Synthetic Image Attribution in the Wild. 1-6 - Guido Borghi, Nicolò Di Domenico, Matteo Ferrara, Annalisa Franco, Uzma Latif, Davide Maltoni:
MONOT: High-Quality Privacy-compliant Morphed Synthetic Images for Everyone. 1-8 - Kratika Bhagtani, Amit Kumar Singh Yadav, Paolo Bestagini, Edward J. Delp:
Attribution of Diffusion Based Deepfake Speech Generators. 1-6 - Gautier Evennou, Vivien Chappelier, Ewa Kijak, Teddy Furon:
SWIFT: Semantic Watermarking for Image Forgery Thwarting. 1-6 - Daniele Mari, Saverio Cavasin, Simone Milani, Mauro Conti:
Effectiveness of learning-based image codecs on fingerprint storage. 1-6 - Soonhong Kwon, Wooyoung Son, Jong-Hyouk Lee:
Smart Contract Kill Switch for Security in a Private Blockchain-based Software Transaction System. 1-6 - Gianpaolo Perelli, Andrea Panzino, Roberto Casula, Marco Micheletto, Giulia Orrù, Gian Luca Marcialis:
Vulnerabilities in Machine Learning-Based Voice Disorder Detection Systems. 1-6 - Joakim Tutt, Slava Voloshynovskiy:
Provable Performance Guarantees of Copy Detection Patterns. 1-6 - Martin Benes, Rainer Böhme:
Kerckhoffs in Prison: A Study of the Steganalyst's Knowledge. 1-6 - Jing Yang, Anderson Rocha:
Take It Easy: Label-Adaptive Self-Rationalization for Fact Verification and Explanation Generation. 1-6 - Fernando Alonso-Fernandez, Kevin Hernandez-Diaz, Prayag Tiwari, Josef Bigün:
Combined CNN and ViT features off-the-shelf: Another astounding baseline for recognition. 1-6 - Alin-Petru Rosu, Tamara Tataru, Jegor Zelenjak, Roland Kromes, Zekeriya Erkin:
Demo - MedTech Chain: Decentralised, Secure and Privacy-preserving Platform for Medical Device Data Research*. 1-3 - Vincenzo De Rosa, Fabrizio Guillaro, Giovanni Poggi, Davide Cozzolino, Luisa Verdoliva:
Exploring the Adversarial Robustness of CLIP for AI-generated Image Detection. 1-6 - Mahyar Gohari, Paolo Bestagini, Sergio Benini, Nicola Adami:
Spectrogram-Based Detection of Auto-Tuned Vocals in Music Recordings. 1-6 - Eli Dworetzky, Jessica J. Fridrich:
How to Form Bags in Batch Steganography. 1-6 - Luca Bindini, Giulia Bertazzini, Daniele Baracchi, Dasara Shullani, Paolo Frasconi, Alessandro Piva:
Tiny Autoencoders are Effective Few-Shot Generative Model Detectors. 1-6 - Cohen Archbold, Usman Hassan, Nazmus Sakib, Sen-Ching Cheung, Abdullah-Al-Zubaer Imran:
Privacy Preserving Protest Dynamics. 1-6 - Vitaliy Kinakh, Brian Pulfer, Yury Belousov, Pierre Fernandez, Teddy Furon, Slava Voloshynovskiy:
Evaluation of Security of ML-based Watermarking: Copy and Removal Attacks. 1-6 - Robert Jöchl, Andreas Uhl:
PLUS Temporal Image Forensics Dataset. 1-6 - Xavier Martínez Luaña, Manuel Fernández-Veiga, Rebeca P. Díaz Redondo:
Privacy-aware Berrut Approximated Coded Computing applied to Federated Learning. 1-6 - Usman Hassan, Jiangyue Zhu, Dongjie Chen, Sen-Ching Samson Cheung:
DPGEM: Differentially Private Generative Model with Exponential Mechanism. 1-6 - Hannes Mareen, Dimitrios Karageorgiou, Glenn Van Wallendael, Peter Lambert, Symeon Papadopoulos:
TGIF: Text-Guided Inpainting Forgery Dataset. 1-6 - Zhiyu Pan, Yongjie Duan, Jianjiang Feng, Jie Zhou:
Fixed-length Dense Descriptor for Efficient Fingerprint Matching. 1-6 - Nora Hofer, Rainer Böhme:
A Taxonomy of Miscompressions: Preparing Image Forensics for Neural Compression. 1-6 - João P. Cardenuto, Sara Mandelli, Daniel Moreira, Paolo Bestagini, Edward J. Delp, Anderson Rocha:
Explainable Artifacts for Synthetic Western Blot Source Attribution. 1-6 - Matheus Simão, Fabiano O. Costa Prado, Omar Abdul Wahab, Anderson R. Avila:
TempCharBERT: Keystroke Dynamics for Continuous Access Control Based on Pre-trained Language Models. 1-6 - Gabriel Bertocco, Fernanda A. Andaló, Terrance E. Boult, Anderson Rocha:
Vision through distortions: Atmospheric Turbulence-and Clothing-invariant long-range recognition. 1-6 - Enrique Argones-Rúa, Emanuele Maiorana, Patrizio Campisi:
Strengthened Fuzzy Extractors using Turbo-codes: Case Study on Finger Vein Authentication. 1-6 - Denise Moussa, Leon Huber, Germans Hirsch, Christian Riess:
Now ForReal: Towards Practical Forensic Room Identification with Real-World Audio Data. 1-6 - Marcel Grimmer, Christoph Busch:
AgeDiff: Latent Diffusion-based Face Age Editing with Dual Cross-Attention. 1-6 - Giulia Bertazzini, Chiara Albisani, Daniele Baracchi, Dasara Shullani, Alessandro Piva:
Beyond the Brush: Fully-automated Crafting of Realistic Inpainted Images. 1-6 - Praveen Kumar Chandaliya, Kiran B. Raja, Haoyu Zhang, Raghavendra Ramachandra, Christoph Busch:
Synthetic Ethnicity Alteration for Diversifying Face Datasets - Investigating Recognition and Quality. 1-6 - Anmol Manjunath, Viola Negroni, Sara Mandelli, Daniel Moreira, Paolo Bestagini:
Localization of Synthetic Manipulations in Western Blot Images. 1-6 - José Nascimento, Nathan Jacobs, Anderson Rocha:
Interactive Event Sifting using Bayesian Graph Neural Networks. 1-5 - Andrea Ciamarra, Roberto Caldelli, Alberto Del Bimbo:
Spotting fully-synthetic facial images via local camera surface frames. 1-6 - Dimitris Santorinaios, Michail-Alexandros Kourtis, Anna Santorinaiou, George Oikonomakis:
Demo - MedGuard: Securing Medical IoT with compiler polymorphism. 1-3 - Onur Günlü:
Randomized Distributed Function Computation with Semantic Communications: Applications to Privacy. 1-6 - Jan Butora, Etienne Levecque, Patrick Bas:
Errorless Robust JPEG Steganography for Pixel Images. 1-6 - Atefeh Zareh Chahoki, Hamid Reza Shahriari, Marco Roveri:
Demo - Unmasking the Unseen: CryptojackingTrap, the Most Resilient Evasion-Proof Cryptojacking Malware Detection Algorithm. 1-4 - Matteo Varotto, Florian Heinrichs, Timo Schuerg, Stefano Tomasin, Stefan Valentin:
Detecting 5G Narrowband Jammers with CNN, k-nearest Neighbors, and Support Vector Machines. 1-6 - Johannes Voichtleitner, Christoph Frisch, Ullrich J. Mönich, Michael Pehl, Luis Torres-Figueroa, Moritz Wiese:
PUF Authentication for a Modular Coding Scheme. 1-6 - Giacomo Agnetti, Andrea Migliorati, Daniele Mari, Tiziano Bianchi, Simone Milani, Enrico Magli:
Ternary Neural Networks for Gait Identification in Wearable Devices. 1-6 - Roman Chaban, Brian Pulfer, Slava Voloshynovskiy:
Assessing the Viability of Synthetic Physical Copy Detection Patterns on Different Imaging Systems. 1-6
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.