54 results on '"Mauro Barni"'
Search Results
2. Deepfake Media Forensics: State of the Art and Challenges Ahead.
3. JMA: a General Algorithm to Craft Nearly Optimal Targeted Adversarial Example.
4. BOSC: A Backdoor-based Framework for Open Set Synthetic Image Attribution.
5. Robust Retraining-free GAN Fingerprinting via Personalized Normalization.
6. A Siamese-based Verification System for Open-set Architecture Attribution of Synthetic Images.
7. Wide Flat Minimum Watermarking for Robust Ownership Verification of GANs.
8. A One-Class Classifier for the Detection of GAN Manipulated Multi-Spectral Satellite Images.
9. Open Set Classification of GAN-based Image Manipulations via a ViT-based Hybrid Architecture.
10. Information Forensics and Security: A quarter-century-long journey.
11. Universal Detection of Backdoor Attacks via Density-based Clustering and Centroids Analysis.
12. Physical Realization of a Hyper Unclonable Function.
13. Fusing Multiscale Texture and Residual Descriptors for Multilevel 2D Barcode Rebroadcasting Detection.
14. An Architecture for the detection of GAN-generated Flood Images with Localization Capabilities.
15. Robust DNN Watermarking via Fixed Embedding Weights with Optimized Distribution.
16. Supervised GAN Watermarking for Intellectual Property Protection.
17. An Overview on the Generation and Detection of Synthetic and Manipulated Satellite Images.
18. A temporal chrominance trigger for clean-label backdoor attack against anti-spoof rebroadcast detection.
19. Which country is this picture from? New data and methods for DNN-based country recognition.
20. Improving Cost Learning for JPEG Steganography by Exploiting JPEG Domain Knowledge.
21. Detection of GAN-synthesized street videos.
22. VIPPrint: A Large Scale Dataset of Printed and Scanned Images for Synthetic Face Images Detection and Source Linking.
23. A Master Key Backdoor for Universal Impersonation Attack against DNN-based Face Verification.
24. An Overview of Backdoor Attacks Against Deep Neural Networks and Possible Defences.
25. Image Splicing Detection, Localization and Attribution via JPEG Primary Quantization Matrix Estimation and Clustering.
26. A survey of deep neural network watermarking techniques.
27. Increased-confidence adversarial examples for improved transferability of Counter-Forensic attacks.
28. On the adversarial robustness of DNNs based on error correcting output codes.
29. CNN Detection of GAN-Generated Face Images based on Cross-Band Co-occurrences Analysis.
30. Spread-Transform Dither Modulation Watermarking of Deep Neural Network.
31. Effectiveness of random deep feature selection for securing image manipulation detectors against adversarial examples.
32. Improving the Security of Image Manipulation Detection through One-and-a-half-class Multiple Classification.
33. CNN-based Steganalysis and Parametric Adversarial Embedding: a Game-Theoretic Framework.
34. Attacking CNN-based anti-spoofing face authentication in the physical domain.
35. A new Backdoor Attack in CNNs by training set corruption without label poisoning.
36. Copy Move Source-Target Disambiguation through Multi-Branch CNNs.
37. Secure Detection of Image Manipulation by means of Random Feature Selection.
38. Detection Games Under Fully Active Adversaries.
39. An Improved Statistic for the Pooled Triangle Test against PRNU-Copy Attack.
40. CNN Based Adversarial Embedding with Minimum Alteration for Image Steganography.
41. On the Transferability of Adversarial Examples Against CNN-Based Image Forensics.
42. SEMBA: SEcure multi-biometric authentication.
43. CNN-Based Detection of Generic Constrast Adjustment with JPEG Post-processing.
44. Adversarial Source Identification Game with Corrupted Training.
45. Aligned and Non-Aligned Double JPEG Detection Using Convolutional Neural Networks.
46. A Message Passing Approach for Decision Fusion in Adversarial Multi-Sensor Networks.
47. Optimum Fusion of Possibly Corrupted Reports for Distributed Detection in Multi-Sensor Networks.
48. Piecewise Function Approximation with Private Data.
49. A Game-Theoretic Framework for Optimum Decision Fusion in the Presence of Byzantines.
50. Source Distinguishability under Distortion-Limited Attack: an Optimal Transport Perspective.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.