Information forensics: An overview of the first decade
In recent decades, we have witnessed the evolution of information technologies from the
development of VLSI technologies, to communication and networking infrastructure, to the …
development of VLSI technologies, to communication and networking infrastructure, to the …
CNN-based adversarial embedding for image steganography
Steganographic schemes are commonly designed in a way to preserve image statistics or
steganalytic features. Since most of the state-of-the-art steganalytic methods employ a …
steganalytic features. Since most of the state-of-the-art steganalytic methods employ a …
Adversarial multimedia forensics: Overview and challenges ahead
In recent decades, a significant research effort has been devoted to the development of
forensic tools for retrieving information and detecting possible tampering of multimedia …
forensic tools for retrieving information and detecting possible tampering of multimedia …
Audio steganography based on iterative adversarial attacks against convolutional neural networks
Recently, convolutional neural networks (CNNs) have demonstrated superior performance
on digital multimedia steganalysis. However, some studies have noted that most CNN …
on digital multimedia steganalysis. However, some studies have noted that most CNN …
Differential game-based strategies for preventing malware propagation in wireless sensor networks
S Shen, H Li, R Han, AV Vasilakos… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) are prone to propagating malware because of special
characteristics of sensor nodes. Considering the fact that sensor nodes periodically enter …
characteristics of sensor nodes. Considering the fact that sensor nodes periodically enter …
Adam and the ants: on the influence of the optimization algorithm on the detectability of DNN watermarks
As training Deep Neural Networks (DNNs) becomes more expensive, the interest in
protecting the ownership of the models with watermarking techniques increases. Uchida et …
protecting the ownership of the models with watermarking techniques increases. Uchida et …
DDoS attacks with randomized traffic innovation: Botnet identification challenges and strategies
Distributed Denial-of-Service (DDoS) attacks are usually launched through the botnet, an
“army” of compromised nodes hidden in the network. Inferential tools for DDoS mitigation …
“army” of compromised nodes hidden in the network. Inferential tools for DDoS mitigation …
Second-order statistics analysis to cope with contrast enhancement counter-forensics
A De Rosa, M Fontani, M Massai… - IEEE Signal …, 2015 - ieeexplore.ieee.org
Image forensic analysis for the detection of contrast enhancement and other histogram-
based processing, usually relies on the study of first-order statistics derived from image …
based processing, usually relies on the study of first-order statistics derived from image …
Privacy against a hypothesis testing adversary
Privacy against an adversary (AD) that tries to detect the underlying privacy-sensitive data
distribution is studied. The original data sequence is assumed to come from one of the two …
distribution is studied. The original data sequence is assumed to come from one of the two …
Botnet identification in DDoS attacks with multiple emulation dictionaries
In a Distributed Denial of Service (DDoS) attack, a network (botnet) of dispersed agents
(bots) sends requests to a website to saturate its resources. Since the requests are sent by …
(bots) sends requests to a website to saturate its resources. Since the requests are sent by …