default search action
9th WIFS 2017: Rennes, France
- 2017 IEEE Workshop on Information Forensics and Security, WIFS 2017, Rennes, France, December 4-7, 2017. IEEE 2017, ISBN 978-1-5090-6769-5
- Shruti Agarwal, Hany Farid:
Photo forensics from JPEG dimples. 1-6 - Borui Li, Han Sun, Yang Gao, Vir V. Phoha, Zhanpeng Jin:
Enhanced free-text keystroke continuous authentication based on dynamics of wrist motion. 1-6 - Omid Avatefipour, Azeem Hafeez, Muhammad Tayyab, Hafiz Malik:
Linking received packet to the transmitter through physical-fingerprinting of controller area network. 1-6 - Gabriele Lenzini, Samir Ouchani, Peter B. Rønne, Peter Y. A. Ryan, Yong Geng, Jan Lagerwall, JungHyun Noh:
Security in the shell: An optical physical unclonable function made of shells of cholesteric liquid crystals. 1-6 - Zhaohui Sun, Anthony Hoogs:
Object insertion and removal in images with mirror reflection. 1-6 - Fabian Knirsch, Dominik Engel, Zekeriya Erkin:
A fault-tolerant and efficient scheme for data aggregation over groups in the smart grid. 1-6 - Nicolas Rahmouni, Vincent Nozick, Junichi Yamagishi, Isao Echizen:
Distinguishing computer graphics from natural images using convolution neural networks. 1-6 - Holger Boche, Christian Deppe:
Secure identification under jamming attacks. 1-6 - Matteo Testa, Tiziano Bianchi, Enrico Magli:
Energy obfuscation for compressive encryption and processing. 1-6 - Sebastiano Verde, Simone Milani, Paolo Bestagini, Stefano Tubaro:
Audio phylogenetic analysis using geometric transforms. 1-6 - Laurent Amsaleg, James Bailey, Dominique Barbe, Sarah M. Erfani, Michael E. Houle, Vinh Nguyen, Milos Radovanovic:
The vulnerability of learning to adversarial perturbation increases with intrinsic dimensionality. 1-6 - Luca Bondi, Fernando Pérez-González, Paolo Bestagini, Stefano Tubaro:
Design of projection matrices for PRNU compression. 1-6 - Mauro Conti, Daniele Lain, Riccardo Lazzeretti, Giulio Lovisotto, Walter Quattrociocchi:
It's always April fools' day!: On the difficulty of social network misinformation classification via propagation features. 1-6 - Karthik Nandakumar, Nalini K. Ratha, Sharath Pankanti, Shelby Darnell:
Secure one-time biometrie tokens for non-repudiable multi-party transactions. 1-6 - Yanming Zhu, Xuefei Yin, Xiuping Jia, Jiankun Hu:
Latent fingerprint segmentation based on convolutional neural networks. 1-6 - Taras Stanko, Boris Skoric:
Minutia-pair spectral representations for fingerprint template protection. 1-6 - Ngoc-Dung T. Tieu, Huy H. Nguyen, Hoang-Quoc Nguyen-Son, Junichi Yamagishi, Isao Echizen:
An approach for gait anonymization using deep learning. 1-6 - Sho Iwazaki, Koichi Ichige:
Extended beamforming by sum and difference composite co-array for radio surveillance. 1-6 - Rudolf Schraml, Luca Debiasi, Christof Kauba, Andreas Uhl:
On the feasibility of classification-based product package authentication. 1-6 - Irene Amerini, Tiberio Uricchio, Roberto Caldelli:
Tracing images back to their social network of origin: A CNN-based approach. 1-6 - Abelino Jimenez, Bhiksha Raj:
A two factor transformation for speaker verification through ℓ1 comparison. 1-6 - Leon J. Helsloot, Gamze Tillem, Zekeriya Erkin:
AHEad: Privacy-preserving online behavioural advertising using homomorphic encryption. 1-6 - Thomas Gougeon, Morgan Barbier, Patrick Lacharme, Gildas Avoine, Christophe Rosenberger:
Retrieving dates in smart card dumps is as hard as finding a needle in a haystack. 1-6 - Behrooz Razeghi, Slava Voloshynovskiy, Dimche Kostadinov, Olga Taran:
Privacy preserving identification using sparse approximation with ambiguization. 1-6 - Emre Durmus, Manoranjan Mohanty, Samet Taspinar, Erkam Uzun, Nasir D. Memon:
Image carving with missing headers and missing fragments. 1-6 - Sinan E. Tandogan, Husrev T. Sencar, Bülent Tavli:
Towards measuring uniqueness of human voice. 1-6 - Hayreddin Çeker, Shambhu J. Upadhyaya:
Sensitivity analysis in keystroke dynamics using convolutional neural networks. 1-6 - Zhipeng Chen, Benedetta Tondi, Xiaolong Li, Rongrong Ni, Yao Zhao, Mauro Barni:
A gradient-based pixel-domain attack against SVM detection of global image manipulations. 1-6 - Sebastian Baur, Holger Boche:
Robust secure storage of data sources with perfect secrecy. 1-6 - Jiaju Huang, Daqing Hou, Stephanie Schuckers, Timothy Law, Adam Sherwin:
Benchmarking keystroke authentication algorithms. 1-6
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.