WIFS 2019 Accepted Papers
- Patrick Bours and Halvor Kulsrud. Detection of Cyber Grooming in Online Conversation
- Romain Giot and Anderson Rocha. Siamese Networks for Static Keystroke Dynamics Authentication
- Pin-Hsun Lin, Christiane Kuhn, Thorsten Strufe and Eduard A. Jorswieck. Physical Layer Privacy in Broadcast Channels
- Ahmad Zakaria, Marc Chaumont and Gérard Subsol. Pooled Steganalysis in JPEG: how to deal with the spreading strategy?
- Linda Senigagliesi, Lorenzo Cintioni, Marco Baldi and Ennio Gambi. Blind Physical Layer Authentication over Fading Wireless Channels through Machine Learning
- Jascha Kolberg, Pia Bauspieß, Marta Gomez-Barrero, Christian Rathgeb, Markus Dürmuth and Christoph Busch. Template Protection based on Homomorphic Encryption: Computational Efficient Application to Iris-Biometric Verification and Identification
- Yoav Blum and David Burshtein. Blind Vocoder Speech Reconstruction using Generative Adversarial Networks
- Luca Debiasi, Simon Kirchgasser, Bernhard Prommegger, Andreas Uhl, Grudzien Artur and Kowalski Marcin. Biometric Template Protection in the Image Domain Using Non-invertible Grey-scale Transforms
- Huaxiao Mo, Tingting Song, Bolin Chen, Weiqi Luo and Jiwu Huang. Enhancing JPEG Steganography using Iterative Adversarial Examples
- Marzieh Gheisari, Teddy Furon and Laurent Amsaleg. Group Membership Verification: Sparse or Dense?
- Hendrik Vogt, Chu Li, Christian Zenger and Aydin Sezgin. On the Precise Phase Recovery for Physical-Layer Authentication in Dynamic Channels
- Vincent van der Meer, Hugo Jonker, Guy Dols, Harm Van Beek, Jeroen van den Bos and Marko Van Eekelen. File Fragmentation in the Wild: a Privacy-Friendly Approach
- Shantanu Rane and Alejandro Brito. A Version Space Perspective on Differentially Private Pool-Based Active Learning
- Lieneke Kusters and Frans Willems. Debiasing of SRAM PUFs: Selection and Balancing
- Fabio Carrara, Roberto Caldelli, Fabrizio Falchi and Giuseppe Amato. On the Robustness to Adversarial Examples of Neural ODE Image Classifiers
- Mauro Barni, Dequ Huang, Bin Li and Benedetta Tondi. Adversarial CNN Training Under JPEG Laundering Attacks: a Game-Theoretic Approach
- Rohit Yadav, Iuliia Tkachenko, Alain Tremeau and Thierry Fournel. Copy Sensitive Graphical Code Estimation: Physical vs Numerical Resolution
- Clemens Seibold, Anna Hilsmann, Andrey Makrushin, Christian Kraetzer, Tom Neubert, Prof. Dr. Jana Dittmann and Peter Eisert. Visual Feature Space Analyses of Face Morphing Detectors to Predict Generalization Ability
- Florian Wilde, Christoph Frisch and Michael Pehl. Efficient Bound for Conditional Min-Entropy of Physical Unclonable Functions Beyond IID
- Matthias Kirchner and Cameron Johnson. SPN-CNN: Boosting Sensor-Based Source Camera Attribution With Deep Learning
- Behrooz Razeghi, Taras Stanko, Boris Škorić and Slava Voloshynovskiy. Single-Component Privacy Guarantees in Helper Data Systems and Sparse Coding
- Sebastian Baur, Ning Cai, Moritz Wiese and Holger Boche. Secret Key Generation from a Two Component Compound Source with Rate Constrained One Way Communication: Perfect Secrecy
- Andrey Garnaev and Wade Trappe. A Power Control Game Involving Jamming and Eavesdropping Defense
- Caroline Mazini Rodrigues, Luis Pereira, Anderson Rocha and Zanoni Dias. Image Semantic Representation for Event Understanding
- Alessandro Brighente, Francesco Formaggio, Gabriele Ruvoletto and Stefano Tomasin. Ranking-Based Attacks to In-Region Location Verification Systems
- Holger Boche, Rafael F. Schaefer and H. Vincent Poor. Resource Allocation for Secure Communication Systems: Algorithmic Solvability
- Francesco Marra, Cristiano Saltori, Giulia Boato and Luisa Verdoliva. Incremental learning for the detection and classification of GAN-generated images
- Nitish Mital, Cong Ling and Deniz Gunduz. PolyMat Codes for Secure Distributed Multiple Matrix Multiplication
- Xu Zhang, Svebor Karaman and Shih-Fu Chang. Detecting and Simulating Artifacts in GAN Fake Images
- Clara Borrelli, Paolo Bestagini, Fabio Antonacci, Augusto Sarti and Stefano Tubaro. Automatic Reliability Estimation for Speech Audio Surveillance Recordings
- Ecenaz Erdemir, Pier Luigi Dragotti and Deniz Gunduz. Privacy-Aware Location Sharing with Deep Reinforcement Learning
Download Accepted Papers (password required)