


default search action
9th WIFS 2017: Rennes, France
- 2017 IEEE Workshop on Information Forensics and Security, WIFS 2017, Rennes, France, December 4-7, 2017. IEEE 2017, ISBN 978-1-5090-6769-5

- Shruti Agarwal, Hany Farid:

Photo forensics from JPEG dimples. 1-6 - Borui Li, Han Sun, Yang Gao, Vir V. Phoha

, Zhanpeng Jin:
Enhanced free-text keystroke continuous authentication based on dynamics of wrist motion. 1-6 - Omid Avatefipour, Azeem Hafeez

, Muhammad Tayyab, Hafiz Malik
:
Linking received packet to the transmitter through physical-fingerprinting of controller area network. 1-6 - Gabriele Lenzini

, Samir Ouchani
, Peter B. Rønne
, Peter Y. A. Ryan
, Yong Geng, Jan Lagerwall, JungHyun Noh:
Security in the shell: An optical physical unclonable function made of shells of cholesteric liquid crystals. 1-6 - Zhaohui Sun, Anthony Hoogs:

Object insertion and removal in images with mirror reflection. 1-6 - Fabian Knirsch, Dominik Engel, Zekeriya Erkin

:
A fault-tolerant and efficient scheme for data aggregation over groups in the smart grid. 1-6 - Nicolas Rahmouni, Vincent Nozick, Junichi Yamagishi, Isao Echizen:

Distinguishing computer graphics from natural images using convolution neural networks. 1-6 - Holger Boche, Christian Deppe:

Secure identification under jamming attacks. 1-6 - Matteo Testa, Tiziano Bianchi, Enrico Magli:

Energy obfuscation for compressive encryption and processing. 1-6 - Sebastiano Verde

, Simone Milani, Paolo Bestagini
, Stefano Tubaro:
Audio phylogenetic analysis using geometric transforms. 1-6 - Laurent Amsaleg, James Bailey, Dominique Barbe, Sarah M. Erfani, Michael E. Houle, Vinh Nguyen, Milos Radovanovic

:
The vulnerability of learning to adversarial perturbation increases with intrinsic dimensionality. 1-6 - Luca Bondi

, Fernando Pérez-González
, Paolo Bestagini
, Stefano Tubaro:
Design of projection matrices for PRNU compression. 1-6 - Mauro Conti

, Daniele Lain, Riccardo Lazzeretti, Giulio Lovisotto, Walter Quattrociocchi
:
It's always April fools' day!: On the difficulty of social network misinformation classification via propagation features. 1-6 - Karthik Nandakumar, Nalini K. Ratha

, Sharath Pankanti, Shelby Darnell:
Secure one-time biometrie tokens for non-repudiable multi-party transactions. 1-6 - Yanming Zhu

, Xuefei Yin
, Xiuping Jia
, Jiankun Hu
:
Latent fingerprint segmentation based on convolutional neural networks. 1-6 - Taras Stanko, Boris Skoric:

Minutia-pair spectral representations for fingerprint template protection. 1-6 - Ngoc-Dung T. Tieu, Huy H. Nguyen

, Hoang-Quoc Nguyen-Son, Junichi Yamagishi, Isao Echizen:
An approach for gait anonymization using deep learning. 1-6 - Sho Iwazaki, Koichi Ichige:

Extended beamforming by sum and difference composite co-array for radio surveillance. 1-6 - Rudolf Schraml, Luca Debiasi, Christof Kauba

, Andreas Uhl:
On the feasibility of classification-based product package authentication. 1-6 - Irene Amerini

, Tiberio Uricchio
, Roberto Caldelli
:
Tracing images back to their social network of origin: A CNN-based approach. 1-6 - Abelino Jimenez, Bhiksha Raj:

A two factor transformation for speaker verification through ℓ1 comparison. 1-6 - Leon J. Helsloot, Gamze Tillem, Zekeriya Erkin

:
AHEad: Privacy-preserving online behavioural advertising using homomorphic encryption. 1-6 - Thomas Gougeon, Morgan Barbier

, Patrick Lacharme, Gildas Avoine, Christophe Rosenberger
:
Retrieving dates in smart card dumps is as hard as finding a needle in a haystack. 1-6 - Behrooz Razeghi

, Slava Voloshynovskiy
, Dimche Kostadinov, Olga Taran:
Privacy preserving identification using sparse approximation with ambiguization. 1-6 - Emre Durmus, Manoranjan Mohanty, Samet Taspinar, Erkam Uzun, Nasir D. Memon

:
Image carving with missing headers and missing fragments. 1-6 - Sinan E. Tandogan, Husrev T. Sencar, Bülent Tavli

:
Towards measuring uniqueness of human voice. 1-6 - Hayreddin Çeker, Shambhu J. Upadhyaya:

Sensitivity analysis in keystroke dynamics using convolutional neural networks. 1-6 - Zhipeng Chen, Benedetta Tondi, Xiaolong Li, Rongrong Ni, Yao Zhao, Mauro Barni:

A gradient-based pixel-domain attack against SVM detection of global image manipulations. 1-6 - Sebastian Baur, Holger Boche:

Robust secure storage of data sources with perfect secrecy. 1-6 - Jiaju Huang, Daqing Hou, Stephanie Schuckers

, Timothy Law, Adam Sherwin:
Benchmarking keystroke authentication algorithms. 1-6

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














