default search action
Kassem Kallas
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j4]Quentin Le Roux, Eric Bourbao, Yannick Teglia, Kassem Kallas:
A Comprehensive Survey on Backdoor Attacks and Their Defenses in Face Recognition Systems. IEEE Access 12: 47433-47468 (2024) - [j3]Kassem Kallas, Quentin Le Roux, Wassim Hamidouche, Teddy Furon:
Strategic safeguarding: A game theoretic approach for analyzing attacker-defender behavior in DNN backdoors. EURASIP J. Inf. Secur. 2024(1): 32 (2024) - [c13]Quentin Le Roux, Kassem Kallas, Teddy Furon:
A Double-Edged Sword: The Power of Two in Defending Against DNN Backdoor Attacks. EUSIPCO 2024: 2007-2011 - [c12]Quentin Le Roux, Kassem Kallas, Teddy Furon:
REStore: Exploring a Black-Box Defense against DNN Backdoors using Rare Event Simulation. SaTML 2024: 286-308 - [i9]Kassem Kallas:
Deep Learning for Resilient Adversarial Decision Fusion in Byzantine Networks. CoRR abs/2412.12739 (2024) - 2023
- [c11]Kassem Kallas, Teddy Furon:
Mixer: DNN Watermarking using Image Mixup. ICASSP 2023: 1-5 - 2022
- [c10]Thao T. Nguyen, Raied Caromi, Kassem Kallas, Michael R. Souryal:
Deep Learning for Path Loss Prediction in the 3.5 GHz CBRS Spectrum Band. WCNC 2022: 1665-1670 - [c9]Kassem Kallas, Teddy Furon:
ROSE: A RObust and SEcure DNN Watermarking. WIFS 2022: 1-6 - [i8]Kassem Kallas, Teddy Furon:
ROSE: A RObust and SEcure DNN Watermarking. CoRR abs/2206.11024 (2022) - [i7]Kassem Kallas, Teddy Furon:
Mixer: DNN Watermarking using Image Mixup. CoRR abs/2212.02814 (2022) - 2021
- [b1]Andrea Abrardo, Mauro Barni, Kassem Kallas, Benedetta Tondi:
Information Fusion in Distributed Sensor Networks with Byzantines. Springer 2021, ISBN 978-981-32-9000-6, pp. 1-104 - [c8]Raied Caromi, Alex Lackpour, Kassem Kallas, Thao T. Nguyen, Michael R. Souryal:
Deep Learning for Radar Signal Detection in the 3.5 GHz CBRS Band. DySPAN 2021: 1-8 - 2020
- [c7]Mauro Barni, Kassem Kallas, Ehsan Nowroozi, Benedetta Tondi:
CNN Detection of GAN-Generated Face Images based on Cross-Band Co-occurrences Analysis. WIFS 2020: 1-6 - [i6]Mauro Barni, Kassem Kallas, Ehsan Nowroozi, Benedetta Tondi:
CNN Detection of GAN-Generated Face Images based on Cross-Band Co-occurrences Analysis. CoRR abs/2007.12909 (2020)
2010 – 2019
- 2019
- [c6]Mauro Barni, Kassem Kallas, Ehsan Nowroozi, Benedetta Tondi:
On the Transferability of Adversarial Examples against CNN-based Image Forensics. ICASSP 2019: 8286-8290 - [c5]Mauro Barni, Kassem Kallas, Benedetta Tondi:
A New Backdoor Attack in CNNS by Training Set Corruption Without Label Poisoning. ICIP 2019: 101-105 - [c4]Abhir Bhalerao, Kassem Kallas, Benedetta Tondi, Mauro Barni:
Luminance-based video backdoor attack against anti-spoofing rebroadcast detection. MMSP 2019: 1-6 - [i5]Mauro Barni, Kassem Kallas, Benedetta Tondi:
A new Backdoor Attack in CNNs by training set corruption without label poisoning. CoRR abs/1902.11237 (2019) - 2018
- [j2]Andrea Abrardo, Mauro Barni, Kassem Kallas, Benedetta Tondi:
A message passing approach for decision fusion in adversarial multi-sensor networks. Inf. Fusion 40: 101-111 (2018) - [c3]Andrea Abrardo, Mauro Barni, Kassem Kallas, Benedetta Tondi:
Decision Fusion with Unbalanced Priors under Synchronized Byzantine Attacks: a Message-Passing Approach. APSIPA 2018: 1160-1167 - [i4]Mauro Barni, Kassem Kallas, Ehsan Nowroozi, Benedetta Tondi:
On the Transferability of Adversarial Examples Against CNN-Based Image Forensics. CoRR abs/1811.01629 (2018) - 2017
- [i3]Andrea Abrardo, Mauro Barni, Kassem Kallas, Benedetta Tondi:
A Message Passing Approach for Decision Fusion in Adversarial Multi-Sensor Networks. CoRR abs/1702.08357 (2017) - 2016
- [j1]Andrea Abrardo, Mauro Barni, Kassem Kallas, Benedetta Tondi:
A Game-Theoretic Framework for Optimum Decision Fusion in the Presence of Byzantines. IEEE Trans. Inf. Forensics Secur. 11(6): 1333-1345 (2016) - [c2]Kassem Kallas, Benedetta Tondi, Riccardo Lazzeretti, Mauro Barni:
Consensus Algorithm with Censored Data for Distributed Detection with Corrupted Measurements: A Game-Theoretic Approach. GameSec 2016: 455-466 - 2015
- [i2]Andrea Abrardo, Mauro Barni, Kassem Kallas, Benedetta Tondi:
Optimum Fusion of Possibly Corrupted Reports for Distributed Detection in Multi-Sensor Networks. CoRR abs/1503.05829 (2015) - [i1]Andrea Abrardo, Mauro Barni, Kassem Kallas, Benedetta Tondi:
A Game-Theoretic Framework for Optimum Decision Fusion in the Presence of Byzantines. CoRR abs/1507.00400 (2015) - 2014
- [c1]Andrea Abrardo, Mauro Barni, Kassem Kallas, Benedetta Tondi:
Decision fusion with corrupted reports in multi-sensor networks: A game-theoretic approach. CDC 2014: 505-510
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-22 21:28 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint