default search action
9th IH&MMSec 2021: Virtual Event, Belgium
- Dirk Borghys, Patrick Bas, Luisa Verdoliva, Tomás Pevný, Bin Li, Jennifer Newman:
IH&MMSec '21: ACM Workshop on Information Hiding and Multimedia Security, Virtual Event, Belgium, June, 22-25, 2021. ACM 2021, ISBN 978-1-4503-8295-3 - François-Xavier Standaert:
Evaluating and Designing against Side-Channel Leakage: White Box or Black Box? 1 - Nicholas Carlini:
How Private is Machine Learning? 3 - Alexandre Sablayrolles:
Tracing Data through Learning with Watermarking. 5 - Florian Lugstein, Simon Baier, Gregor Bachinger, Andreas Uhl:
PRNU-based Deepfake Detection. 7-12 - Zhenyu Zhang, Xiaowei Yi, Xianfeng Zhao:
Fake Speech Detection Using Residual Network with Transformer Encoder. 13-22 - Robert Altschaffel, Jonas Hielscher, Stefan Kiltz, Jana Dittmann:
Meta and Media Data Stream Forensics in the Encrypted Domain of Video Conferences. 23-33 - Supriya Adhatarao, Cédric Lauradoux:
Exploitation and Sanitization of Hidden Data in PDF Files: Do Security Agencies Sanitize Their PDF Files? 35-44 - Aykut Büker, Cemal Hanilçi:
Angular Margin Softmax Loss and Its Variants for Double Compressed AMR Audio Detection. 45-50 - Chen Zhao, Yu Wen, Shuailou Li, Fucheng Liu, Dan Meng:
FederatedReverse: A Detection and Defense Method Against Backdoor Attacks in Federated Learning. 51-62 - Alberto Ibarrondo, Hervé Chabanne, Melek Önen:
Banners: Binarized Neural Networks with Replicated Secret Sharing. 63-74 - Sayed Erfan Arefin, Abdul Serwadda:
Deep Neural Exposure: You Can Run, But Not Hide Your Neural Network Architecture! 75-80 - Alexander Schlögl, Tobias Kupek, Rainer Böhme:
iNNformant: Boundary Samples as Telltale Watermarks. 81-86 - Michael Linortner, Andreas Uhl:
Towards Match-on-Card Finger Vein Recognition. 87-92 - Andrey Makrushin, Christof Kauba, Simon Kirchgasser, Stefan Seidlitz, Christian Kraetzer, Andreas Uhl, Jana Dittmann:
General Requirements on Synthetic Fingerprint Images for Biometric Authentication and Forensic Investigations. 93-104 - Solène Bernard, Patrick Bas, Tomás Pevný, John Klein:
Optimizing Additive Approximations of Non-additive Distortion Functions. 105-112 - Kevin Lamshöft, Tom Neubert, Christian Krätzer, Claus Vielhauer, Jana Dittmann:
Information Hiding in Cyber Physical Systems: Challenges for Embedding, Retrieval and Detection using Sensor Data of the SWAT Dataset. 113-124 - Jan Butora, Jessica J. Fridrich:
Revisiting Perturbed Quantization. 125-136 - Huili Wang, Zhongliang Yang, Yuting Hu, Zhen Yang, Yongfeng Huang:
Fast Detection of Heterogeneous Parallel Steganography for Streaming Voice. 137-142 - Jan Butora, Yassine Yousfi, Jessica J. Fridrich:
How to Pretrain for Steganalysis. 143-148 - Yassine Yousfi, Jan Butora, Jessica J. Fridrich, Clément Fuji Tsang:
Improving EfficientNet for JPEG Steganalysis. 149-157 - April Pyone Maung Maung, Hitoshi Kiya:
Piracy-Resistant DNN Watermarking by Block-Wise Image Transformation with Secret Key. 159-164 - Minoru Kuribayashi, Takuro Tanaka, Shunta Suzuki, Tatsuya Yasui, Nobuo Funabiki:
White-Box Watermarking Scheme for Fully-Connected Layers in Fine-Tuning Model. 165-170 - Katarzyna Kapusta, Vincent Thouvenot, Olivier Bettan, Hugo Beguinet, Hugo Senet:
A Protocol for Secure Verification of Watermarks Embedded into Machine Learning Models. 171-176 - Masoumeh Shafieinejad, Nils Lukas, Jiaqi Wang, Xinda Li, Florian Kerschbaum:
On the Robustness of Backdoor-based Watermarking in Deep Neural Networks. 177-188 - Mauro Barni, Fernando Pérez-González, Benedetta Tondi:
DNN Watermarking: Four Challenges and a Funeral. 189-196
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.