


default search action
11th WIFS 2019: Delft, The Netherlands
- IEEE International Workshop on Information Forensics and Security, WIFS 2019, Delft, The Netherlands, December 9-12, 2019. IEEE 2019, ISBN 978-1-7281-3217-4

- Matthias Kirchner, Cecilia Pasquini

, Ilia Shumailov:
Information Security Meets Adversarial Examples. 1-2 - Vincent van der Meer, Hugo Jonker

, Guy Dols, Harm M. A. van Beek
, Jeroen van den Bos
, Marko C. J. D. van Eekelen:
File Fragmentation in the Wild: a Privacy-Friendly Approach. 1-6 - Jascha Kolberg

, Pia Bauspieß, Marta Gomez-Barrero, Christian Rathgeb, Markus Dürmuth, Christoph Busch
:
Template Protection based on Homomorphic Encryption: Computationally Efficient Application to Iris-Biometric Verification and Identification. 1-6 - Clemens Seibold

, Anna Hilsmann, Andrey Makrushin
, Christian Kraetzer, Tom Neubert, Jana Dittmann, Peter Eisert:
Visual Feature Space Analyses of Face Morphing Detectors. 1-6 - Luca Debiasi, Simon Kirchgasser

, Bernhard Prommegger
, Andreas Uhl, Artur Grudzien, Marcin Kowalski:
Biometric Template Protection in the Image Domain Using Non-invertible Grey-scale Transforms. 1-6 - Marzieh Gheisari, Teddy Furon, Laurent Amsaleg:

Group Membership Verification with Privacy: Sparse or Dense? 1-7 - Clara Borrelli

, Paolo Bestagini, Fabio Antonacci, Augusto Sarti, Stefano Tubaro:
Automatic Reliability Estimation for Speech Audio Surveillance Recordings. 1-6 - Hendrik Vogt, Chu Li, Aydin Sezgin

, Christian T. Zenger
:
On the Precise Phase Recovery for Physical-Layer Authentication in Dynamic Channels. 1-6 - Alessandro Brighente

, Francesco Formaggio, G. Ruvoletto, Stefano Tomasin
:
Ranking-Based Attacks to In-Region Location Verification Systems. 1-6 - Shantanu Rane, Alejandro E. Brito:

A Version Space Perspective on Differentially Private Pool-Based Active Learning. 1-6 - Patrick Bours, Halvor Kulsrud:

Detection of Cyber Grooming in Online Conversation. 1-6 - Sebastian Baur, Ning Cai, Moritz Wiese, Holger Boche:

Secret Key Generation from a Two Component Compound Source with Rate Constrained One Way Communication: Perfect Secrecy. 1-6 - Andrey Garnaev, Wade Trappe

:
A Power Control Game Involving Jamming and Eavesdropping Defense. 1-6 - Pin-Hsun Lin, Christiane Kuhn, Thorsten Strufe, Eduard A. Jorswieck:

Physical Layer Privacy in Broadcast Channels. 1-6 - Lieneke Kusters, Frans M. J. Willems:

Debiasing of SRAM PUFs: Selection and Balancing. 1-6 - Behrooz Razeghi

, Taras Stanko, Boris Skoric, Slava Voloshynovskiy
:
Single-Component Privacy Guarantees in Helper Data Systems and Sparse Coding with Ambiguation. 1-6 - Ahmad Zakaria, Marc Chaumont, Gérard Subsol:

Pooled Steganalysis in JPEG: how to deal with the spreading strategy? 1-6 - Ece Naz Erdemir, Pier Luigi Dragotti

, Deniz Gündüz
:
Privacy-Aware Location Sharing with Deep Reinforcement Learning. 1-6 - Florian Wilde

, Christoph Frisch, Michael Pehl:
Efficient Bound for Conditional Min-Entropy of Physical Unclonable Functions Beyond IID. 1-6 - Francesco Marra, Cristiano Saltori

, Giulia Boato, Luisa Verdoliva:
Incremental learning for the detection and classification of GAN-generated images. 1-6 - Romain Giot, Anderson Rocha:

Siamese Networks for Static Keystroke Dynamics Authentication. 1-6 - Huaxiao Mo, Tingting Song, Bolin Chen, Weiqi Luo

, Jiwu Huang:
Enhancing JPEG Steganography using Iterative Adversarial Examples. 1-6 - Caroline Mazini Rodrigues

, Luís A. M. Pereira, Anderson Rocha, Zanoni Dias:
Image Semantic Representation for Event Understanding. 1-6 - Matthias Kirchner, Cameron Johnson:

SPN-CNN: Boosting Sensor-Based Source Camera Attribution With Deep Learning. 1-6 - Rohit Yadav

, Iuliia Tkachenko
, Alain Trémeau, Thierry Fournel:
Copy Sensitive Graphical Code Estimation: Physical vs Numerical Resolution. 1-6 - Linda Senigagliesi

, Lorenzo Cintioni, Marco Baldi, Ennio Gambi:
Blind Physical Layer Authentication over Fading Wireless Channels through Machine Learning. 1-6 - Yoav Blum, David Burshtein:

Blind Vocoder Speech Reconstruction using Generative Adversarial Networks. 1-6 - Xu Zhang, Svebor Karaman, Shih-Fu Chang:

Detecting and Simulating Artifacts in GAN Fake Images. 1-6 - Holger Boche, Rafael F. Schaefer

, H. Vincent Poor:
Resource Allocation for Secure Communication Systems: Algorithmic Solvability. 1-6 - Fabio Carrara

, Roberto Caldelli
, Fabrizio Falchi
, Giuseppe Amato
:
On the Robustness to Adversarial Examples of Neural ODE Image Classifiers. 1-6 - Mauro Barni, Dequ Huang, Bin Li, Benedetta Tondi:

Adversarial CNN Training Under JPEG Laundering Attacks: a Game-Theoretic Approach. 1-6

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














